redhat/enterprise_linux: The latest CVE Vulnerabilities and Exploits for Penetration Test
redhat/enterprise_linux Vulnerability Summary
- Vendor name: redhat
- Product name: enterprise_linux
- Total vulnerabilities: 2390 (as 2023-05-04)
redhat/enterprise_linux Vulnerability List
CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in…
Published: 2022-02-04T23:15:00 Last Modified: 2022-02-09T20:00:00
Summary
A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2022-0487 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2044561
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=42933c8aa14be1caa9eda41f65cde8a3a95d3e39
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-4154: A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux…
Published: 2022-02-04T23:15:00 Last Modified: 2022-02-10T02:31:00
Summary
A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel’s cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-4154 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2034514
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-4034: A local privilege escalation vulnerability was found on polkit’s pkexec utility. The pkexec…
Published: 2022-01-28T20:15:00 Last Modified: 2022-01-31T17:50:00
Summary
A local privilege escalation vulnerability was found on polkit’s pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn’t handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it’ll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2021-4034 vulnerability.
References
- https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
- https://access.redhat.com/security/vulnerabilities/RHSB-2022-001
- https://bugzilla.redhat.com/show_bug.cgi?id=2025869
- https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-4145: A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to…
Published: 2022-01-25T20:15:00 Last Modified: 2022-02-01T15:03:00
Summary
A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The self
pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it’s not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when writing data reaches the threshold of mirroring node.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-4145 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2034602
- https://gitlab.com/qemu-project/qemu/-/commit/66fed30c9cd11854fc878a4eceb507e915d7c9cd
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-45417: AIDE before 0.17.4 allows local users to obtain root privileges via crafted file metadata (such…
Published: 2022-01-20T18:15:00 Last Modified: 2022-01-26T19:49:00
Summary
AIDE before 0.17.4 allows local users to obtain root privileges via crafted file metadata (such as XFS extended attributes or tmpfs ACLs), because of a heap-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-45417 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2022/01/20/3
- http://www.openwall.com/lists/oss-security/2022/01/20/3
- https://www.debian.org/security/2022/dsa-5051
- https://lists.debian.org/debian-lts-announce/2022/01/msg00024.html
- https://www.ipi.fi/pipermail/aide/2022-January/001713.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2022-21682: Flatpak is a Linux application sandboxing and distribution framework. A path traversal…
Published: 2022-01-13T21:15:00 Last Modified: 2022-02-10T07:52:00
Summary
Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies finish-args
last in the build. At this point the build directory will have the full access that is specified in the manifest, so running flatpak build
against it will gain those permissions. Normally this will not be done, so this is not problem. However, if --mirror-screenshots-url
is specified, then flatpak-builder will launch flatpak build --nofilesystem=host appstream-utils mirror-screenshots
after finalization, which can lead to issues even with the --nofilesystem=host
protection. In normal use, the only issue is that these empty directories can be created wherever the user has write permissions. However, a malicious application could replace the appstream-util
binary and potentially do something more hostile. This has been resolved in Flatpak 1.12.3 and 1.10.6 by changing the behaviour of --nofilesystem=home
and --nofilesystem=host
.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2022-21682 vulnerability.
References
- https://github.com/flatpak/flatpak/security/advisories/GHSA-8ch7-5j3h-g4fx
- https://github.com/flatpak/flatpak/commit/4d11f77aa7fd3e64cfa80af89d92567ab9e8e6fa
- https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APFTBYGJJVJPFVHRXUW5PII5XOAFI4KH/
- https://www.debian.org/security/2022/dsa-5049
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXKBERLJRYV7KXKGXOLI6IOXVBQNN4DP/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-43860: Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3…
Published: 2022-01-12T22:15:00 Last Modified: 2022-02-10T15:03:00
Summary
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn’t properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there’s a null byte in the metadata file of an app. Therefore apps can grant themselves permissions without the consent of the user. Flatpak shows permissions to the user during install by reading them from the “xa.metadata” key in the commit metadata. This cannot contain a null terminator, because it is an untrusted GVariant. Flatpak compares these permissions to the actual metadata, from the “metadata” file to ensure it wasn’t lied to. However, the actual metadata contents are loaded in several places where they are read as simple C-style strings. That means that, if the metadata file includes a null terminator, only the content of the file from before the terminator gets compared to xa.metadata. Thus, any permissions that appear in the metadata file after a null terminator are applied at runtime but not shown to the user. So maliciously crafted apps can give themselves hidden permissions. Users who have Flatpaks installed from untrusted sources are at risk in case the Flatpak has a maliciously crafted metadata file, either initially or in an update. This issue is patched in versions 1.12.3 and 1.10.6. As a workaround, users can manually check the permissions of installed apps by checking the metadata file or the xa.metadata key on the commit metadata.
Common Weakness Enumeration (CWE): CWE-276: Incorrect Default Permissions
CWE Description: During installation, installed file permissions are set to allow anyone to modify those files.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-43860 vulnerability.
References
- https://github.com/flatpak/flatpak/commit/d9a8f9d8ccc0b7c1135d0ecde006a75d25f66aee
- https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042
- https://github.com/flatpak/flatpak/commit/93357d357119093804df05acc32ff335839c6451
- https://github.com/flatpak/flatpak/commit/ba818f504c926baaf6e362be8159cfacf994310e
- https://github.com/flatpak/flatpak/security/advisories/GHSA-qpjc-vq3c-572j
- https://github.com/flatpak/flatpak/commit/54ec1a482dfc668127eaae57f135e6a8e0bc52da
- https://github.com/flatpak/flatpak/releases/tag/1.12.3
- https://github.com/flatpak/flatpak/releases/tag/1.10.6
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APFTBYGJJVJPFVHRXUW5PII5XOAFI4KH/
- https://www.debian.org/security/2022/dsa-5049
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-41819: CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also…
Published: 2022-01-01T06:15:00 Last Modified: 2022-02-11T15:32:00
Summary
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
Common Weakness Enumeration (CWE): CWE-565: Reliance on Cookies without Validation and Integrity Checking
CWE Description: The application relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-41819 vulnerability.
References
- https://hackerone.com/reports/910552
- https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/
- https://security.netapp.com/advisory/ntap-20220121-0003/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-41817: Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of…
Published: 2022-01-01T05:15:00 Last Modified: 2022-01-11T21:31:00
Summary
Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-41817 vulnerability.
References
- https://hackerone.com/reports/1254844
- https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-4166: vim is vulnerable to Out-of-bounds Read
Published: 2021-12-25T19:15:00 Last Modified: 2022-02-04T15:45:00
Summary
vim is vulnerable to Out-of-bounds Read
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-4166 vulnerability.
References
- https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
- https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
- http://www.openwall.com/lists/oss-security/2022/01/15/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3621: A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via…
Published: 2021-12-23T21:15:00 Last Modified: 2022-01-07T16:18:00
Summary
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Common Weakness Enumeration (CWE): CWE-77: Improper Neutralization of Special Elements used in a Command (‘Command Injection’)
CWE Description: The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3621 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3622: A flaw was found in the hivex library. This flaw allows an attacker to input a specially crafted…
Published: 2021-12-23T21:15:00 Last Modified: 2022-01-10T13:37:00
Summary
A flaw was found in the hivex library. This flaw allows an attacker to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the _get_children() function, leading to a stack overflow. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3622 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1975489
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/USD4OEV6L3RPHE32V2MJ4JPFBODINWSU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S35TVTAPHORSUIFYNFBHKLQRPVFUPXBE/
- https://github.com/libguestfs/hivex/commit/771728218dac2fbf6997a7e53225e75a4c6b7255
- https://listman.redhat.com/archives/libguestfs/2021-August/msg00002.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-4024: A flaw was found in podman. The podman machine
function (used to create and manage Podman…
Published: 2021-12-23T20:15:00 Last Modified: 2022-02-08T03:15:00
Summary
A flaw was found in podman. The podman machine
function (used to create and manage Podman virtual machine containing a Podman process) spawns a gvproxy
process on the host system. The gvproxy
API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host’s firewall, an attacker can potentially use the gvproxy
API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host’s services by forwarding all ports to the VM.
Common Weakness Enumeration (CWE): CWE-346: Origin Validation Error
CWE Description: The software does not properly verify that the source of data or communication is valid.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-4024 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2026675 ,
- https://github.com/containers/podman/releases/tag/v3.4.3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFFVJ6S3ZRMPDYB7KYAWEMDHXFZYQPU3/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-45463: load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command…
Published: 2021-12-23T06:15:00 Last Modified: 2022-02-07T19:13:00
Summary
load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases before 0.4.34 are used in GIMP releases before 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-45463 vulnerability.
References
- https://gitlab.gnome.org/GNOME/gegl/-/commit/bfce470f0f2f37968862129d5038b35429f2909b
- https://gitlab.gnome.org/GNOME/gegl/-/blob/master/docs/NEWS.adoc
- https://gitlab.gnome.org/GNOME/gimp/-/commit/e8a31ba4f2ce7e6bc34882dc27c97fba993f5868
- https://www.gimp.org/news/2021/12/21/gimp-2-10-30-released/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CG635WJCNXHJM5U4BGMAAP4NK2YFTQXK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZP5NDNOTMPI335FXE7VUPW7FXYTT7PYN/
- https://gitlab.gnome.org/GNOME/gegl/-/issues/298
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-44733: A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through…
Published: 2021-12-22T17:15:00 Last Modified: 2022-01-14T07:15:00
Summary
A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-44733 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/tee/tee_shm.c
- https://lore.kernel.org/lkml/20211215092501.1861229-1-jens.wiklander@linaro.org/
- https://github.com/pjlantz/optee-qemu/blob/main/README.md
- https://security.netapp.com/advisory/ntap-20220114-0003/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-45078: stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a…
Published: 2021-12-15T20:15:00 Last Modified: 2022-01-10T14:10:00
Summary
stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-45078 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=28694
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
- https://security.netapp.com/advisory/ntap-20220107-0002/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-4104: JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has…
Published: 2021-12-14T12:15:00 Last Modified: 2022-02-07T16:16:00
Summary
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
Common Weakness Enumeration (CWE): CWE-502: Deserialization of Untrusted Data
CWE Description: The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Scores
- Impact Score: 6.4
- Exploitability Score: 6.8
- CVSS: 6.0
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-4104 vulnerability.
References
- https://access.redhat.com/security/cve/CVE-2021-4104
- https://www.cve.org/CVERecord?id=CVE-2021-44228
- https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126
- https://www.kb.cert.org/vuls/id/930724
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033
- https://security.netapp.com/advisory/ntap-20211223-0007/
- http://www.openwall.com/lists/oss-security/2022/01/18/3
- https://www.oracle.com/security-alerts/cpujan2022.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-4048: An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in…
Published: 2021-12-08T22:15:00 Last Modified: 2022-01-04T16:09:00
Summary
An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack through version 3.10.0, as also used in OpenBLAS before version 0.3.18. Specially crafted inputs passed to these functions could cause an application using lapack to crash or possibly disclose portions of its memory.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-4048 vulnerability.
References
- https://github.com/JuliaLang/julia/issues/42415
- https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41
- https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c
- https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7
- https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781
- https://github.com/Reference-LAPACK/lapack/pull/625
- https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3802: A vulnerability found in udisks2. This flaw allows an attacker to input a specially crafted image…
Published: 2021-11-29T16:15:00 Last Modified: 2021-12-01T15:44:00
Summary
A vulnerability found in udisks2. This flaw allows an attacker to input a specially crafted image file/USB leading to kernel panic. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 6.8
- CVSS: 6.3
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3802 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2003649
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-045.txt
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3672: A flaw was found in c-ares library, where a missing input validation check of host names returned…
Published: 2021-11-23T19:15:00 Last Modified: 2021-12-14T18:29:00
Summary
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3672 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3935: When PgBouncer is configured to use “cert” authentication, a man-in-the-middle attacker can…
Published: 2021-11-22T16:15:00 Last Modified: 2022-02-14T15:15:00
Summary
When PgBouncer is configured to use “cert” authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of TLS certificate verification and encryption. This flaw affects PgBouncer versions prior to 1.16.1.
Common Weakness Enumeration (CWE): CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
CWE Description: The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3935 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=2021251
- http://www.pgbouncer.org/changelog.html#pgbouncer-116x
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNPCV3KRDI5PLLLKADFVIOHACQJLZMLI/
- https://lists.debian.org/debian-lts-announce/2022/02/msg00016.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-43389: An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds…
Published: 2021-11-04T19:15:00 Last Modified: 2021-12-17T01:15:00
Summary
An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-43389 vulnerability.
References
- https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/
- https://seclists.org/oss-sec/2021/q4/39
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
- https://bugzilla.redhat.com/show_bug.cgi?id=2013180
- http://www.openwall.com/lists/oss-security/2021/11/05/1
- https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3746: A flaw was found in the libtpms code that may cause access beyond the boundary of internal…
Published: 2021-10-19T15:15:00 Last Modified: 2021-10-22T20:28:00
Summary
A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2’s volatile state is written. The highest threat from this vulnerability is to system availability. This issue affects libtpms versions before 0.8.5, before 0.7.9 and before 0.6.6.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3746 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-32672: Redis is an open source, in-memory database that persists on disk. When using the Redis Lua…
Published: 2021-10-04T18:15:00 Last Modified: 2021-11-28T23:16:00
Summary
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-32672 vulnerability.
References
- https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm
- https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/
- https://security.netapp.com/advisory/ntap-20211104-0003/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/
- https://www.debian.org/security/2021/dsa-5001
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3653: A flaw was found in the KVM’s AMD code for supporting SVM nested virtualization. The flaw occurs…
Published: 2021-09-29T20:15:00 Last Modified: 2022-01-06T20:15:00
Summary
A flaw was found in the KVM’s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the “int_ctl” field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.
Common Weakness Enumeration (CWE): CWE-862: Missing Authorization
CWE Description: The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 8.5
- Exploitability Score: 3.9
- CVSS: 6.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3653 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2021/08/16/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1983686
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-39251: A crafted NTFS image can cause a NULL pointer dereference in ntfs_extent_inode_open in NTFS-3G <…
Published: 2021-09-07T15:15:00 Last Modified: 2021-11-29T21:29:00
Summary
A crafted NTFS image can cause a NULL pointer dereference in ntfs_extent_inode_open in NTFS-3G < 2021.8.22.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-39251 vulnerability.
References
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
- https://bugzilla.redhat.com/show_bug.cgi?id=2001649
- http://www.openwall.com/lists/oss-security/2021/08/30/1
- https://github.com/tuxera/ntfs-3g/releases
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988386
- https://www.debian.org/security/2021/dsa-4971
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/766ISTT3KCARKFUIQT7N6WV6T63XOKG3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSEKTKHO5HFZHWZNJNBJZA56472KRUZI/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-33285: In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute is supplied to the…
Published: 2021-09-07T14:15:00 Last Modified: 2021-11-29T21:36:00
Summary
In NTFS-3G versions < 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the “bytes_in_use” field should be less than the “bytes_allocated” field. When it is not, the parsing of the records proceeds into the wild.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-33285 vulnerability.
References
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp
- https://bugzilla.redhat.com/show_bug.cgi?id=2001608
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988386
- https://www.openwall.com/lists/oss-security/2021/08/30/1
- http://www.openwall.com/lists/oss-security/2021/08/30/1
- https://www.debian.org/security/2021/dsa-4971
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/766ISTT3KCARKFUIQT7N6WV6T63XOKG3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSEKTKHO5HFZHWZNJNBJZA56472KRUZI/
- https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3634: A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two…
Published: 2021-08-31T17:15:00 Last Modified: 2022-02-07T16:16:00
Summary
A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating “secret_hash” of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3634 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1978810
- https://www.debian.org/security/2021/dsa-4965
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVWAAB2XMKEUMPMDALINKAA4U2QM4LNG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKYD3ZRAMDAQX3ZW6THHUF3GXN7FF6B4/
- https://security.netapp.com/advisory/ntap-20211004-0003/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRK67AJCWYYVAGF5SGAHNZXCX3PN3ZFP/
- https://www.oracle.com/security-alerts/cpujan2022.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-40153: squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory…
Published: 2021-08-27T15:15:00 Last Modified: 2021-10-07T17:48:00
Summary
squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-40153 vulnerability.
References
- https://bugs.launchpad.net/ubuntu/+source/squashfs-tools/+bug/1941790
- https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
- https://github.com/plougher/squashfs-tools/issues/72
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAOZ4BKWAC4Y3U2K5MMW3S77HWWXHQDL/
- https://lists.debian.org/debian-lts-announce/2021/08/msg00030.html
- https://www.debian.org/security/2021/dsa-4967
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSMRKVJMJFX3MB7D3PXJSYY3TLZROE5S/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3605: There’s a flaw in OpenEXR’s rleUncompress functionality in versions prior to 3.0.5. An attacker…
Published: 2021-08-25T19:15:00 Last Modified: 2021-09-01T02:04:00
Summary
There’s a flaw in OpenEXR’s rleUncompress functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3605 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3573: A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found…
Published: 2021-08-13T14:15:00 Last Modified: 2021-08-24T19:21:00
Summary
A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3573 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1966578
- https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52
- https://www.openwall.com/lists/oss-security/2021/06/08/2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3635: A flaw was found in the Linux kernel netfilter implementation in versions prior to 5.5-rc7. A…
Published: 2021-08-13T14:15:00 Last Modified: 2021-08-23T20:33:00
Summary
A flaw was found in the Linux kernel netfilter implementation in versions prior to 5.5-rc7. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3635 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20314: Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain SPF macros can…
Published: 2021-08-12T15:15:00 Last Modified: 2021-12-02T20:40:00
Summary
Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain SPF macros can lead to Denial of service and potentially code execution via malicious crafted SPF explanation messages.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20314 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1993070
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMSFT2NJDZ7PATRZSQPAOGSE7JD6ELOB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFXJRHPE5OSCPTNA3ZZ4ORDHT4JQH3Y4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y6T4HYXXSUQCGJB2ES6X7Q74YYF7V7XU/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-38160: ** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data…
Published: 2021-08-07T04:15:00 Last Modified: 2022-01-01T17:58:00
Summary
** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-38160 vulnerability.
References
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4
- https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46
- https://access.redhat.com/security/cve/cve-2021-38160
- https://security.netapp.com/advisory/ntap-20210902-0010/
- https://www.debian.org/security/2021/dsa-4978
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3580: A flaw was found in the way nettle’s RSA decryption functions handled specially crafted…
Published: 2021-08-05T21:15:00 Last Modified: 2021-11-26T21:06:00
Summary
A flaw was found in the way nettle’s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3580 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1967983
- https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
- https://security.netapp.com/advisory/ntap-20211104-0006/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3655: A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size…
Published: 2021-08-05T21:15:00 Last Modified: 2022-01-01T17:58:00
Summary
A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.
Common Weakness Enumeration (CWE): CWE-909: Missing Initialization of Resource
CWE Description: The software does not initialize a critical resource.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3655 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1984024
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3682: A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2….
Published: 2021-08-05T20:15:00 Last Modified: 2021-10-18T12:20:00
Summary
A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.
Common Weakness Enumeration (CWE): CWE-763: Release of Invalid Pointer or Reference
CWE Description: The application attempts to return a memory resource to the system, but calls the wrong release function or calls the appropriate release function incorrectly.
Scores
- Impact Score: 6.4
- Exploitability Score: 6.8
- CVSS: 6.0
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3682 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1989651
- https://security.netapp.com/advisory/ntap-20210902-0006/
- https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html
- https://www.debian.org/security/2021/dsa-4980
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to…
Published: 2021-08-05T20:15:00 Last Modified: 2022-01-01T17:58:00
Summary
A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3679 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a
- https://bugzilla.redhat.com/show_bug.cgi?id=1989165
- https://www.debian.org/security/2021/dsa-4978
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3570: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when…
Published: 2021-07-09T11:15:00 Last Modified: 2021-09-14T14:42:00
Summary
A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 8.5
- Exploitability Score: 8.0
- CVSS: 8.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3570 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1966240
- https://www.debian.org/security/2021/dsa-4938
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RHRUVSDP673LXJ5HGIPQPWPIYUPWYQA7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUBKTRCMJ6VKS7DIBSZQB4ATSKVCJYXJ/
- https://lists.debian.org/debian-lts-announce/2021/07/msg00025.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3571: A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a…
Published: 2021-07-09T11:15:00 Last Modified: 2021-09-14T14:43:00
Summary
A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability. This flaw affects linuxptp versions before 3.1.1 and before 2.0.1.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.0
- CVSS: 5.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3571 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1966241
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RHRUVSDP673LXJ5HGIPQPWPIYUPWYQA7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUBKTRCMJ6VKS7DIBSZQB4ATSKVCJYXJ/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3612: An out-of-bounds memory write flaw was found in the Linux kernel’s joystick devices subsystem in…
Published: 2021-07-09T11:15:00 Last Modified: 2021-12-17T01:15:00
Summary
An out-of-bounds memory write flaw was found in the Linux kernel’s joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3612 vulnerability.
References
- https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/
- https://bugzilla.redhat.com/show_bug.cgi?id=1974079
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/
- https://security.netapp.com/advisory/ntap-20210805-0005/
- https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3598: There’s a flaw in OpenEXR’s ImfDeepScanLineInputFile functionality in versions prior to 3.0.5. An…
Published: 2021-07-06T15:15:00 Last Modified: 2021-07-09T15:45:00
Summary
There’s a flaw in OpenEXR’s ImfDeepScanLineInputFile functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3598 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3592: An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU….
Published: 2021-06-15T21:15:00 Last Modified: 2021-09-21T18:04:00
Summary
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the ‘bootp_t’ structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Common Weakness Enumeration (CWE): CWE-824: Access of Uninitialized Pointer
CWE Description: The program accesses or uses a pointer that has not been initialized.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3592 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1970484
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/
- https://security.gentoo.org/glsa/202107-44
- https://security.netapp.com/advisory/ntap-20210805-0004/
- https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html
- https://lists.debian.org/debian-lts-announce/2021/09/msg00004.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3593: An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU….
Published: 2021-06-15T21:15:00 Last Modified: 2021-09-20T13:52:00
Summary
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the ‘udphdr’ structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Common Weakness Enumeration (CWE): CWE-824: Access of Uninitialized Pointer
CWE Description: The program accesses or uses a pointer that has not been initialized.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3593 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1970487
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/
- https://security.gentoo.org/glsa/202107-44
- https://security.netapp.com/advisory/ntap-20210805-0004/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3594: An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU….
Published: 2021-06-15T21:15:00 Last Modified: 2021-09-21T18:04:00
Summary
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the ‘udphdr’ structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Common Weakness Enumeration (CWE): CWE-824: Access of Uninitialized Pointer
CWE Description: The program accesses or uses a pointer that has not been initialized.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3594 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1970491
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/
- https://security.gentoo.org/glsa/202107-44
- https://security.netapp.com/advisory/ntap-20210805-0004/
- https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3595: An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU….
Published: 2021-06-15T21:15:00 Last Modified: 2021-09-21T17:01:00
Summary
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the ’tftp_t’ structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
Common Weakness Enumeration (CWE): CWE-824: Access of Uninitialized Pointer
CWE Description: The program accesses or uses a pointer that has not been initialized.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3595 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1970489
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGPQZFVJCFGDSISFXPCQTTBBD7QZLJKI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCKWZWY64EHTOQMLVLTSZ4AA27EWRJMH/
- https://security.gentoo.org/glsa/202107-44
- https://security.netapp.com/advisory/ntap-20210805-0004/
- https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-0129: Improper access control in BlueZ may allow an authenticated user to potentially enable…
Published: 2021-06-09T20:15:00 Last Modified: 2021-11-29T17:59:00
Summary
Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
Common Weakness Enumeration (CWE): CWE-863: Incorrect Authorization
CWE Description: The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.1
- CVSS: 2.7
- CVSS Vector: AV:A/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2021-0129 vulnerability.
References
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html
- https://security.netapp.com/advisory/ntap-20210716-0002/
- https://www.debian.org/security/2021/dsa-4951
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3532: A flaw was found in Ansible where the secret information present in async_files are getting…
Published: 2021-06-09T12:15:00 Last Modified: 2021-06-21T16:54:00
Summary
A flaw was found in Ansible where the secret information present in async_files are getting disclosed when the user changes the jobdir to a world readable directory. Any secret information in an async status file will be readable by a malicious user on that system. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3532 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3533: A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a…
Published: 2021-06-09T12:15:00 Last Modified: 2021-06-17T17:21:00
Summary
A flaw was found in Ansible if an ansible user sets ANSIBLE_ASYNC_DIR to a subdirectory of a world writable directory. When this occurs, there is a race condition on the managed machine. A malicious, non-privileged account on the remote machine can exploit the race condition to access the async result data. This flaw affects Ansible Tower 3.7 and Ansible Automation Platform 1.2.
Common Weakness Enumeration (CWE): CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CWE Description: The software checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check. This can cause the software to perform invalid actions when the resource is in an unexpected state.
Scores
- Impact Score: 2.9
- Exploitability Score: 1.9
- CVSS: 1.2
- CVSS Vector: AV:L/AC:H/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3533 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3565: A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a…
Published: 2021-06-04T12:15:00 Last Modified: 2021-12-02T13:55:00
Summary
A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality.
Common Weakness Enumeration (CWE): CWE-665: Improper Initialization
CWE Description: The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3565 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1964427
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ESY6HRYUKR5ZG2K5QAJQC5S6HMKZMFK7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XK5M7I66PBXSN663TSLAZ3V6TWWFCV7C/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3569: A stack corruption bug was found in libtpms in versions before 0.7.2 and before 0.8.0 while…
Published: 2021-06-03T12:15:00 Last Modified: 2021-06-14T17:36:00
Summary
A stack corruption bug was found in libtpms in versions before 0.7.2 and before 0.8.0 while decrypting data using RSA. This flaw could result in a SIGBUS (bad memory access) and termination of swtpm. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3569 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10742: A flaw was found in the Linux kernel. An index buffer overflow during Direct IO write leading to…
Published: 2021-06-02T11:15:00 Last Modified: 2021-06-11T12:25:00
Summary
A flaw was found in the Linux kernel. An index buffer overflow during Direct IO write leading to the NFS client to crash. In some cases, a reach out of the index after one memory allocation by kmalloc will cause a kernel panic. The highest threat from this vulnerability is to data confidentiality and system availability.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-10742 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-32027: A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17…
Published: 2021-06-01T14:15:00 Last Modified: 2021-09-14T17:38:00
Summary
A flaw was found in postgresql in versions before 13.3, before 12.7, before 11.12, before 10.17 and before 9.6.22. While modifying certain SQL array values, missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-32027 vulnerability.
References
- https://www.postgresql.org/support/security/CVE-2021-32027/
- https://bugzilla.redhat.com/show_bug.cgi?id=1956876
- https://security.netapp.com/advisory/ntap-20210713-0004/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3516: There’s a flaw in libxml2’s xmllint in versions before 2.9.11. An attacker who is able to submit…
Published: 2021-06-01T14:15:00 Last Modified: 2022-02-07T16:16:00
Summary
There’s a flaw in libxml2’s xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3516 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1954225
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/230
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://security.gentoo.org/glsa/202107-05
- https://security.netapp.com/advisory/ntap-20210716-0005/
- https://www.oracle.com/security-alerts/cpujan2022.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3543: A flaw null pointer dereference in the Nitro Enclaves kernel driver was found in the way that…
Published: 2021-06-01T14:15:00 Last Modified: 2021-06-11T19:14:00
Summary
A flaw null pointer dereference in the Nitro Enclaves kernel driver was found in the way that Enclaves VMs forces closures on the enclave file descriptor. A local user of a host machine could use this flaw to crash the system or escalate their privileges on the system.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3543 vulnerability.
References
- https://lore.kernel.org/lkml/20210429165941.27020-1-andraprs@amazon.com/
- https://bugzilla.redhat.com/show_bug.cgi?id=1953022
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20201: A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote…
Published: 2021-05-28T11:15:00 Last Modified: 2021-06-04T15:34:00
Summary
A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20201 vulnerability.
References
- https://blog.qualys.com/product-tech/2011/10/31/tls-renegotiation-and-denial-of-service-attacks
- https://bugzilla.redhat.com/show_bug.cgi?id=1921846
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20236: A flaw was found in the ZeroMQ server in versions before 4.3.3. This flaw allows a malicious…
Published: 2021-05-28T11:15:00 Last Modified: 2021-06-02T15:35:00
Summary
A flaw was found in the ZeroMQ server in versions before 4.3.3. This flaw allows a malicious client to cause a stack buffer overflow on the server by sending crafted topic subscription requests and then unsubscribing. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20236 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1921976
- https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20239: A flaw was found in the Linux kernel in versions before 5.4.92 in the BPF protocol. This flaw…
Published: 2021-05-28T11:15:00 Last Modified: 2021-06-02T15:28:00
Summary
A flaw was found in the Linux kernel in versions before 5.4.92 in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.
Common Weakness Enumeration (CWE): CWE-822: Untrusted Pointer Dereference
CWE Description: The program obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-20239 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20292: There is a flaw reported in the Linux kernel in versions before 5.9 in…
Published: 2021-05-28T11:15:00 Last Modified: 2021-06-23T02:15:00
Summary
There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-20292 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1939686
- https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25710: A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a…
Published: 2021-05-28T11:15:00 Last Modified: 2021-09-14T17:38:00
Summary
A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-617: Reachable Assertion
CWE Description: The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-25710 vulnerability.
References
- https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html
- https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c
- https://www.debian.org/security/2020/dsa-4792
- https://bugzilla.redhat.com/show_bug.cgi?id=1899678
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://security.netapp.com/advisory/ntap-20210716-0003/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14301: An information disclosure vulnerability was found in libvirt in versions before 6.3.0. HTTP…
Published: 2021-05-27T20:15:00 Last Modified: 2021-06-29T10:15:00
Summary
An information disclosure vulnerability was found in libvirt in versions before 6.3.0. HTTP cookies used to access network-based disks were saved in the XML dump of the guest domain. This flaw allows an attacker to access potentially sensitive information in the domain configuration via the dumpxml
command.
Common Weakness Enumeration (CWE): CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer
CWE Description: The product stores, transfers, or shares a resource that contains sensitive information, but it does not properly remove that information before the product makes the resource available to unauthorized actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-14301 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1848640
- https://security.netapp.com/advisory/ntap-20210629-0007/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-1702: A malicious container image can consume an unbounded amount of memory when being pulled to a…
Published: 2021-05-27T20:15:00 Last Modified: 2021-06-10T15:16:00
Summary
A malicious container image can consume an unbounded amount of memory when being pulled to a container runtime host, such as Red Hat Enterprise Linux using podman, or OpenShift Container Platform. An attacker can use this flaw to trick a user, with privileges to pull container images, into crashing the process responsible for pulling the image. This flaw affects containers-image versions before 5.2.0.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-1702 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-30501: An assertion abort was found in upx MemBuffer::alloc() in mem.cpp, in version UPX 4.0.0. The flow…
Published: 2021-05-27T00:15:00 Last Modified: 2021-06-08T01:59:00
Summary
An assertion abort was found in upx MemBuffer::alloc() in mem.cpp, in version UPX 4.0.0. The flow allows attackers to cause a denial of service (abort) via a crafted file.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-30501 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1948696
- https://github.com/upx/upx/issues/486
- https://github.com/upx/upx/pull/487
- https://github.com/upx/upx/commit/28e761cd42211dfe0124b7a29b2f74730f453e46
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-30500: Null pointer dereference was found in upx PackLinuxElf::canUnpack() in p_lx_elf.cpp,in version…
Published: 2021-05-27T00:15:00 Last Modified: 2021-06-08T02:05:00
Summary
Null pointer dereference was found in upx PackLinuxElf::canUnpack() in p_lx_elf.cpp,in version UPX 4.0.0. That allow attackers to execute arbitrary code and cause a denial of service via a crafted file.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-30500 vulnerability.
References
- https://github.com/upx/upx/issues/485
- https://github.com/upx/upx/commit/90279abdfcd235172eab99651043051188938dcc
- https://bugzilla.redhat.com/show_bug.cgi?id=1948692
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-30471: A flaw was found in PoDoFo 0.9.7. An uncontrolled recursive call in PdfNamesTree::AddToDictionary…
Published: 2021-05-26T22:15:00 Last Modified: 2021-06-08T15:04:00
Summary
A flaw was found in PoDoFo 0.9.7. An uncontrolled recursive call in PdfNamesTree::AddToDictionary function in src/podofo/doc/PdfNamesTree.cpp can lead to a stack overflow.
Common Weakness Enumeration (CWE): CWE-674: Uncontrolled Recursion
CWE Description: The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-30471 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-30469: A flaw was found in PoDoFo 0.9.7. An use-after-free in PoDoFo::PdfVecObjects::Clear() function…
Published: 2021-05-26T22:15:00 Last Modified: 2021-06-08T16:29:00
Summary
A flaw was found in PoDoFo 0.9.7. An use-after-free in PoDoFo::PdfVecObjects::Clear() function can cause a denial of service via a crafted PDF file.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-30469 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-30470: A flaw was found in PoDoFo 0.9.7. An uncontrolled recursive call among PdfTokenizer::ReadArray(),…
Published: 2021-05-26T22:15:00 Last Modified: 2021-06-08T02:07:00
Summary
A flaw was found in PoDoFo 0.9.7. An uncontrolled recursive call among PdfTokenizer::ReadArray(), PdfTokenizer::GetNextVariant() and PdfTokenizer::ReadDataType() functions can lead to a stack overflow.
Common Weakness Enumeration (CWE): CWE-674: Uncontrolled Recursion
CWE Description: The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-30470 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3527: A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined…
Published: 2021-05-26T22:15:00 Last Modified: 2021-11-15T17:22:00
Summary
A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3527 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2021/05/05/5
- https://gitlab.com/qemu-project/qemu/-/commit/05a40b172e4d691371534828078be47e7fff524c
- https://bugzilla.redhat.com/show_bug.cgi?id=1955695
- https://gitlab.com/qemu-project/qemu/-/commit/7ec54f9eb62b5d177e30eb8b1cad795a5f8d8986
- https://security.netapp.com/advisory/ntap-20210708-0008/
- https://lists.debian.org/debian-lts-announce/2021/09/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20297: A flaw was found in NetworkManager in versions before 1.30.0. Setting match.path and activating a…
Published: 2021-05-26T21:15:00 Last Modified: 2021-06-03T17:20:00
Summary
A flaw was found in NetworkManager in versions before 1.30.0. Setting match.path and activating a profile crashes NetworkManager. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-20297 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-25014: A flaw was found in libwebp in versions before 1.0.1. An unitialized variable is used in function…
Published: 2021-05-21T17:15:00 Last Modified: 2021-11-30T22:00:00
Summary
A flaw was found in libwebp in versions before 1.0.1. An unitialized variable is used in function ReadSymbol. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-908: Use of Uninitialized Resource
CWE Description: The software uses or accesses a resource that has not been initialized.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-25014 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1956927
- https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
- https://www.debian.org/security/2021/dsa-4930
- https://support.apple.com/kb/HT212601
- http://seclists.org/fulldisclosure/2021/Jul/54
- https://security.netapp.com/advisory/ntap-20211104-0004/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-25009: A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function…
Published: 2021-05-21T17:15:00 Last Modified: 2021-11-30T22:00:00
Summary
A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function WebPMuxCreateInternal. The highest threat from this vulnerability is to data confidentiality and to the service availability.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-25009 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1956917
- https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
- https://www.debian.org/security/2021/dsa-4930
- https://security.netapp.com/advisory/ntap-20211104-0004/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-25013: A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function…
Published: 2021-05-21T17:15:00 Last Modified: 2021-12-01T14:45:00
Summary
A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ShiftBytes. The highest threat from this vulnerability is to data confidentiality and to the service availability.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-25013 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1956926
- https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
- https://www.debian.org/security/2021/dsa-4930
- https://security.netapp.com/advisory/ntap-20211112-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-25011: A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow was found in…
Published: 2021-05-21T17:15:00 Last Modified: 2021-11-30T22:00:00
Summary
A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow was found in PutLE16(). The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-25011 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1956919
- https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
- https://www.debian.org/security/2021/dsa-4930
- https://support.apple.com/kb/HT212601
- http://seclists.org/fulldisclosure/2021/Jul/54
- https://security.netapp.com/advisory/ntap-20211104-0004/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-25010: A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function…
Published: 2021-05-21T17:15:00 Last Modified: 2021-11-30T22:30:00
Summary
A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ApplyFilter. The highest threat from this vulnerability is to data confidentiality and to the service availability.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-25010 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1956918
- https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
- https://www.debian.org/security/2021/dsa-4930
- https://support.apple.com/kb/HT212601
- http://seclists.org/fulldisclosure/2021/Jul/54
- https://security.netapp.com/advisory/ntap-20211112-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-25012: A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function…
Published: 2021-05-21T17:15:00 Last Modified: 2021-12-01T14:46:00
Summary
A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function WebPMuxCreateInternal. The highest threat from this vulnerability is to data confidentiality and to the service availability.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-25012 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1956922
- https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
- https://security.netapp.com/advisory/ntap-20211112-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-36331: A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function…
Published: 2021-05-21T17:15:00 Last Modified: 2021-12-01T14:44:00
Summary
A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkAssignData. The highest threat from this vulnerability is to data confidentiality and to the service availability.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-36331 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1956856
- https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
- https://www.debian.org/security/2021/dsa-4930
- https://support.apple.com/kb/HT212601
- http://seclists.org/fulldisclosure/2021/Jul/54
- https://security.netapp.com/advisory/ntap-20211112-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-36328: A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function…
Published: 2021-05-21T17:15:00 Last Modified: 2021-12-01T14:45:00
Summary
A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-36328 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1956829
- https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
- https://www.debian.org/security/2021/dsa-4930
- https://support.apple.com/kb/HT212601
- http://seclists.org/fulldisclosure/2021/Jul/54
- https://security.netapp.com/advisory/ntap-20211112-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-36329: A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread…
Published: 2021-05-21T17:15:00 Last Modified: 2021-12-01T14:44:00
Summary
A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-36329 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1956843
- https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
- https://www.debian.org/security/2021/dsa-4930
- https://support.apple.com/kb/HT212601
- http://seclists.org/fulldisclosure/2021/Jul/54
- https://security.netapp.com/advisory/ntap-20211112-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-36330: A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function…
Published: 2021-05-21T17:15:00 Last Modified: 2021-11-30T19:43:00
Summary
A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkVerifyAndAssign. The highest threat from this vulnerability is to data confidentiality and to the service availability.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-36330 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1956853
- https://lists.debian.org/debian-lts-announce/2021/06/msg00005.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00006.html
- https://www.debian.org/security/2021/dsa-4930
- https://support.apple.com/kb/HT212601
- http://seclists.org/fulldisclosure/2021/Jul/54
- https://security.netapp.com/advisory/ntap-20211104-0004/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-36332: A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an…
Published: 2021-05-21T17:15:00 Last Modified: 2021-11-30T19:43:00
Summary
A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive amount of memory. The highest threat from this vulnerability is to the service availability.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-36332 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1956868
- https://www.debian.org/security/2021/dsa-4930
- https://security.netapp.com/advisory/ntap-20211104-0004/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3426: There’s a flaw in Python 3’s pydoc. A local or adjacent attacker who discovers or is able to…
Published: 2021-05-20T13:15:00 Last Modified: 2022-02-07T16:16:00
Summary
There’s a flaw in Python 3’s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 5.1
- CVSS: 2.7
- CVSS Vector: AV:A/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2021-3426 vulnerability.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF2K7HEWADHN6P52R3QLIOX27U3DJ4HI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LM5V4VPLBHBEASSAROYPSHXGXGGPHNOE/
- https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQYPUKLLBOZMKFPO7RD7CENTXHUUEUV7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/25HVHLBGO2KNPXJ3G426QEYSSCECJDU5/
- https://bugzilla.redhat.com/show_bug.cgi?id=1935913
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNGAFMPIYIVJ47FCF2NK2PIX22HUG35B/
- https://security.gentoo.org/glsa/202104-04
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPX7Y5GQDNB4FJTREWONGC4ZSVH7TGHF/
- https://security.netapp.com/advisory/ntap-20210629-0003/
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3421: A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who…
Published: 2021-05-19T14:15:00 Last Modified: 2021-07-20T11:15:00
Summary
A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.
Common Weakness Enumeration (CWE): CWE-347: Improper Verification of Cryptographic Signature
CWE Description: The software does not verify, or incorrectly verifies, the cryptographic signature for data.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3421 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1927747
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://security.gentoo.org/glsa/202107-43
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3445: A flaw was found in libdnf’s signature verification functionality in versions before 0.60.1. This…
Published: 2021-05-19T14:15:00 Last Modified: 2021-06-02T14:58:00
Summary
A flaw was found in libdnf’s signature verification functionality in versions before 0.60.1. This flaw allows an attacker to achieve code execution if they can alter the header information of an RPM package and then trick a user or system into installing it. The highest risk of this vulnerability is to confidentiality, integrity, as well as system availability.
Common Weakness Enumeration (CWE): CWE-347: Improper Verification of Cryptographic Signature
CWE Description: The software does not verify, or incorrectly verifies, the cryptographic signature for data.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3445 vulnerability.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G4NL7TNWAHJ6JVRABQUPWHKKCTHUZMNF/
- https://bugzilla.redhat.com/show_bug.cgi?id=1932079
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPMFGGQ5T6WVFTFX3OKMVTTM5O4EXWZR/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3517: There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An…
Published: 2021-05-19T14:15:00 Last Modified: 2022-02-07T16:16:00
Summary
There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3517 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1954232
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://security.gentoo.org/glsa/202107-05
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://www.oracle.com/security-alerts/cpujan2022.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3518: There’s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted…
Published: 2021-05-18T12:15:00 Last Modified: 2021-12-09T21:30:00
Summary
There’s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3518 vulnerability.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1954242
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
- https://security.gentoo.org/glsa/202107-05
- https://support.apple.com/kb/HT212604
- https://support.apple.com/kb/HT212605
- https://support.apple.com/kb/HT212602
- https://support.apple.com/kb/HT212601
- http://seclists.org/fulldisclosure/2021/Jul/55
- http://seclists.org/fulldisclosure/2021/Jul/54
- http://seclists.org/fulldisclosure/2021/Jul/58
- http://seclists.org/fulldisclosure/2021/Jul/59
- https://www.oracle.com/security-alerts/cpuoct2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3537: A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors…
Published: 2021-05-14T20:15:00 Last Modified: 2021-12-08T20:19:00
Summary
A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3537 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1956522
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://security.gentoo.org/glsa/202107-05
- https://www.oracle.com/security-alerts/cpuoct2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27769: In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of…
Published: 2021-05-14T20:15:00 Last Modified: 2021-05-19T19:08:00
Summary
In ImageMagick versions before 7.0.9-0, there are outside the range of representable values of type ‘float’ at MagickCore/quantize.c.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27769 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20221: An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller…
Published: 2021-05-13T16:15:00 Last Modified: 2021-12-10T19:56:00
Summary
An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-20221 vulnerability.
References
- https://lists.debian.org/debian-lts-announce/2021/02/msg00024.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1924601
- http://www.openwall.com/lists/oss-security/2021/02/05/1
- https://security.netapp.com/advisory/ntap-20210708-0005/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27824: A flaw was found in OpenJPEG’s encoder in the opj_dwt_calc_explicit_stepsizes() function. This…
Published: 2021-05-13T14:15:00 Last Modified: 2021-12-07T19:40:00
Summary
A flaw was found in OpenJPEG’s encoder in the opj_dwt_calc_explicit_stepsizes() function. This flaw allows an attacker who can supply crafted input to decomposition levels to cause a buffer overflow. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27824 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1905723
- https://lists.debian.org/debian-lts-announce/2021/02/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQR4EWRFFZQDMFPZKFZ6I3USLMW6TKTP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJUPGIZE6A4O52EBOF75MCXJOL6MUCRV/
- https://www.debian.org/security/2021/dsa-4882
- https://www.oracle.com/security-alerts/cpuoct2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3504: A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of…
Published: 2021-05-11T23:15:00 Last Modified: 2021-06-21T18:35:00
Summary
A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3504 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1949687
- https://lists.debian.org/debian-lts-announce/2021/05/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQXTEACRWYAZVNEOIWIYUFGG4GOXSQ22/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5BNKNVYFL36P2GBEB5O36LHFRYU575H/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in…
Published: 2021-05-06T17:15:00 Last Modified: 2022-01-01T17:51:00
Summary
An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 8.5
- Exploitability Score: 3.9
- CVSS: 6.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-31916 vulnerability.
References
- https://seclists.org/oss-sec/2021/q1/268
- https://bugzilla.redhat.com/show_bug.cgi?id=1946965
- https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a
- https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
- https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3507: A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It…
Published: 2021-05-06T16:15:00 Last Modified: 2021-06-01T14:55:00
Summary
A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3507 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1951118
- https://security.netapp.com/advisory/ntap-20210528-0005/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3501: A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the…
Published: 2021-05-06T13:15:00 Last Modified: 2021-06-18T10:15:00
Summary
A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM API, is mapped to an array index, which can be updated by a user process at anytime which could lead to an out-of-bounds write. The highest threat from this vulnerability is to data integrity and system availability.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3501 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1950136
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a
- https://security.netapp.com/advisory/ntap-20210618-0008/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20254: A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs)…
Published: 2021-05-05T14:15:00 Last Modified: 2021-06-24T18:30:00
Summary
A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 6.8
- CVSS: 4.9
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20254 vulnerability.
References
- https://security.netapp.com/advisory/ntap-20210430-0001/
- https://www.samba.org/samba/security/CVE-2021-20254.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1949442
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EP2VJ73OVBPVSOSTVOMGIEQA3MWF6F7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZAF6L2M6CNAJ2YYYGXPWETTW5YLCWTVT/
- https://security.gentoo.org/glsa/202105-22
- https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3472: A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in…
Published: 2021-04-26T15:15:00 Last Modified: 2021-05-19T12:54:00
Summary
A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-191: Integer Underflow (Wrap or Wraparound)
CWE Description: The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3472 vulnerability.
References
- https://lists.x.org/archives/xorg-announce/2021-April/003080.html
- https://seclists.org/oss-sec/2021/q2/20
- https://www.zerodayinitiative.com/advisories/ZDI-21-463/
- https://bugzilla.redhat.com/show_bug.cgi?id=1944167
- https://www.debian.org/security/2021/dsa-4893
- https://www.tenable.com/plugins/nessus/148701
- http://www.openwall.com/lists/oss-security/2021/04/13/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MO6S5OPXUDYBSRSVWVLFLJ6AFERG4HNY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEXPCLMVU25AUZTUXC4MYBGPKOAIM5TW/
- https://lists.debian.org/debian-lts-announce/2021/04/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDF7TAJE7NPZPNVOXSD5HBIFLNPUOD2V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N63KL3T22HNFT4FJ7VMVF6U5Q4RFJIQF/
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/7aaf54a1884f71dc363f0b884e57bcb67407a6cd
- https://security.gentoo.org/glsa/202104-02
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20208: A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file…
Published: 2021-04-19T22:15:00 Last Modified: 2021-12-10T19:52:00
Summary
A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.
Common Weakness Enumeration (CWE): CWE-266: Incorrect Privilege Assignment
CWE Description: A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 4.9
- Exploitability Score: 6.8
- CVSS: 4.9
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20208 vulnerability.
References
- https://bugzilla.samba.org/show_bug.cgi?id=14651
- https://bugzilla.redhat.com/show_bug.cgi?id=1921116
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4BZSJXROEFHYATAAHHRR6P3HUSMPQB3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4HSDIWXXNQBUW5ZS37RQMLJ7THK5AS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WJ3SVBHCSNQZAWSGLB6FBOCFU45FFG/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3497: GStreamer before 1.18.4 might access already-freed memory in error code paths when demuxing…
Published: 2021-04-19T21:15:00 Last Modified: 2021-04-27T16:48:00
Summary
GStreamer before 1.18.4 might access already-freed memory in error code paths when demuxing certain malformed Matroska files.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3497 vulnerability.
References
- https://gstreamer.freedesktop.org/security/sa-2021-0002.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1945339
- https://www.debian.org/security/2021/dsa-4900
- https://lists.debian.org/debian-lts-announce/2021/04/msg00027.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3498: GStreamer before 1.18.4 might cause heap corruption when parsing certain malformed Matroska files.
Published: 2021-04-19T21:15:00 Last Modified: 2021-06-03T17:15:00
Summary
GStreamer before 1.18.4 might cause heap corruption when parsing certain malformed Matroska files.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3498 vulnerability.
References
- https://gstreamer.freedesktop.org/security/sa-2021-0003.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1945342
- https://www.debian.org/security/2021/dsa-4900
- http://packetstormsecurity.com/files/162952/Gstreamer-Matroska-Demuxing-Use-After-Free.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3505: A flaw was found in libtpms in versions before 0.8.0. The TPM 2 implementation returns 2048 bit…
Published: 2021-04-19T21:15:00 Last Modified: 2021-06-03T16:19:00
Summary
A flaw was found in libtpms in versions before 0.8.0. The TPM 2 implementation returns 2048 bit keys with ~1984 bit strength due to a bug in the TCG specification. The bug is in the key creation algorithm in RsaAdjustPrimeCandidate(), which is called before the prime number check. The highest threat from this vulnerability is to data confidentiality.
Common Weakness Enumeration (CWE): CWE-331: Insufficient Entropy
CWE Description: The software uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3505 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1950046
- https://github.com/stefanberger/libtpms/issues/183
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NUCZX4S53TUNTSGTCRDNOQZV2V2RI4RJ/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3487: There’s a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a…
Published: 2021-04-15T14:15:00 Last Modified: 2021-05-04T12:55:00
Summary
There’s a flaw in the BFD library of binutils in versions before 2.36. An attacker who supplies a crafted file to an application linked with BFD, and using the DWARF functionality, could cause an impact to system availability by way of excessive memory consumption.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3487 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1947111
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3482: A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation…
Published: 2021-04-08T23:15:00 Last Modified: 2021-09-21T18:15:00
Summary
A flaw was found in Exiv2 in versions before and including 0.27.4-RC1. Improper input validation of the rawData.size property in Jp2Image::readMetadata() in jp2image.cpp can lead to a heap-based buffer overflow via a crafted JPG image containing malicious EXIF data.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3482 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1946314
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P2A5GMJEXQ5Q76JK6F6VKK5JYCLVFGKN/
- https://www.debian.org/security/2021/dsa-4958
- https://lists.debian.org/debian-lts-announce/2021/08/msg00028.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3448: A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for…
Published: 2021-04-08T23:15:00 Last Modified: 2022-02-07T16:16:00
Summary
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
Common Weakness Enumeration (CWE): CWE-358: Improperly Implemented Security Check for Standard
CWE Description: The software does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3448 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1939368
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHURNEHHUBSW45KMIZ4FNBCSUPWPGV5V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FHG7GWSQWKF7JXIMLOGJBKZWBB4VIAJ7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVTJUOFFFHINLKWAOC2ZSC5MOPD4SJ24/
- https://security.gentoo.org/glsa/202105-20
- https://www.oracle.com/security-alerts/cpujan2022.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20305: A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification…
Published: 2021-04-05T22:15:00 Last Modified: 2021-12-06T13:57:00
Summary
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20305 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1942533
- https://security.gentoo.org/glsa/202105-31
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQKWVVMAIDAJ7YAA3VVO32BHLDOH2E63/
- https://www.debian.org/security/2021/dsa-4933
- https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
- https://security.netapp.com/advisory/ntap-20211022-0002/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20291: A deadlock vulnerability was found in ‘github.com/containers/storage’ in versions before 1.28.1….
Published: 2021-04-01T18:15:00 Last Modified: 2021-06-02T13:13:00
Summary
A deadlock vulnerability was found in ‘github.com/containers/storage’ in versions before 1.28.1. When a container image is processed, each layer is unpacked using tar
. If one of those layers is not a valid tar
archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).
Common Weakness Enumeration (CWE): CWE-667: Improper Locking
CWE Description: The software does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20291 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1939485
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5D7XL7FL24TWFMGQ3K2S72EOUSLZMKL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNMB7O2UIXE34PGSCSOULGHPX5LIJBMM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WX24EITRXVHDM5M223BVTJA2ODF2FSHI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYOHNG2Q7DCAQZMGYLMENLKALGDLG3X/
- https://unit42.paloaltonetworks.com/cve-2021-20291/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3393: An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before…
Published: 2021-04-01T14:15:00 Last Modified: 2021-06-04T19:04:00
Summary
An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.
Common Weakness Enumeration (CWE): CWE-209: Generation of Error Message Containing Sensitive Information
CWE Description: The software generates an error message that includes sensitive information about its environment, users, or associated data.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3393 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1924005
- https://security.netapp.com/advisory/ntap-20210507-0006/
- https://security.gentoo.org/glsa/202105-32
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20271: A flaw was found in RPM’s signature check functionality when reading a package file. This flaw…
Published: 2021-03-26T17:15:00 Last Modified: 2021-12-10T19:50:00
Summary
A flaw was found in RPM’s signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
Common Weakness Enumeration (CWE): CWE-345: Insufficient Verification of Data Authenticity
CWE Description: The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20271 vulnerability.
References
- https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
- https://bugzilla.redhat.com/show_bug.cgi?id=1934125
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
- https://security.gentoo.org/glsa/202107-43
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20197: There is an open race window when writing output in the following utilities in GNU binutils…
Published: 2021-03-26T17:15:00 Last Modified: 2021-05-28T10:15:00
Summary
There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.4
- CVSS: 3.3
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-20197 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1913743
- https://sourceware.org/bugzilla/show_bug.cgi?id=26945
- https://security.netapp.com/advisory/ntap-20210528-0009/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-35518: When binding against a DN during authentication, the reply from 389-ds-base will be different…
Published: 2021-03-26T17:15:00 Last Modified: 2021-04-01T14:56:00
Summary
When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-35518 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1905565
- https://github.com/389ds/389-ds-base/issues/4480
- https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc
- https://github.com/389ds/389-ds-base/commit/b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-35508: A flaw possibility of race condition and incorrect initialization of the process id was found in…
Published: 2021-03-26T17:15:00 Last Modified: 2021-12-16T20:42:00
Summary
A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.
Common Weakness Enumeration (CWE): CWE-665: Improper Initialization
CWE Description: The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-35508 vulnerability.
References
- https://github.com/torvalds/linux/commit/b4e00444cab4c3f3fec876dc0cccc8cbb0d1a948
- https://bugzilla.redhat.com/show_bug.cgi?id=1902724
- https://security.netapp.com/advisory/ntap-20210513-0006/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3443: A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled…
Published: 2021-03-25T19:15:00 Last Modified: 2021-03-30T16:52:00
Summary
A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3443 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3446: A flaw was found in libtpms in versions before 0.8.2. The commonly used integration of libtpms…
Published: 2021-03-25T19:15:00 Last Modified: 2021-03-26T18:01:00
Summary
A flaw was found in libtpms in versions before 0.8.2. The commonly used integration of libtpms with OpenSSL contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality.
Common Weakness Enumeration (CWE): CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CWE Description: The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3446 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3466: A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function…
Published: 2021-03-25T19:15:00 Last Modified: 2021-12-15T14:38:00
Summary
A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Only version 0.9.70 is vulnerable.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3466 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1939127
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4334XJNDJPYQNFE6S3S2KUJJ7TMHYCWL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5NEPVGP3L2CZHLZ4UB44PEILHKPDBOG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/75HDMREKITMGPGE62NP7KE62ZJVLETXN/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3409: The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU…
Published: 2021-03-23T21:15:00 Last Modified: 2021-05-07T05:15:00
Summary
The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3409 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2021/03/09/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1928146
- https://lists.debian.org/debian-lts-announce/2021/04/msg00009.html
- https://security.netapp.com/advisory/ntap-20210507-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20270: An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when…
Published: 2021-03-23T17:15:00 Last Modified: 2021-12-10T17:04:00
Summary
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the “exception” keyword.
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20270 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1922136
- https://www.debian.org/security/2021/dsa-4889
- https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html
- https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10196: A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent…
Published: 2021-03-19T20:15:00 Last Modified: 2021-03-25T19:21:00
Summary
A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.
Common Weakness Enumeration (CWE): CWE-665: Improper Initialization
CWE Description: The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Scores
- Impact Score: 8.5
- Exploitability Score: 10.0
- CVSS: 9.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10196 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3416: A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in…
Published: 2021-03-18T20:15:00 Last Modified: 2022-01-04T16:38:00
Summary
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3416 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1932827
- https://www.openwall.com/lists/oss-security/2021/02/26/1
- https://lists.debian.org/debian-lts-announce/2021/04/msg00009.html
- https://security.netapp.com/advisory/ntap-20210507-0002/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14850: A denial of service vulnerability was discovered in nbdkit 1.12.7, 1.14.1 and 1.15.1. An attacker…
Published: 2021-03-18T19:15:00 Last Modified: 2021-03-24T18:05:00
Summary
A denial of service vulnerability was discovered in nbdkit 1.12.7, 1.14.1 and 1.15.1. An attacker could connect to the nbdkit service and cause it to perform a large amount of work in initializing backend plugins, by simply opening a connection to the service. This vulnerability could cause resource consumption and degradation of service in nbdkit, depending on the plugins configured on the server-side.
Common Weakness Enumeration (CWE): CWE-406: Insufficient Control of Network Message Volume (Network Amplification)
CWE Description: The software does not sufficiently monitor or control transmitted network traffic volume, so that an actor can cause the software to transmit more traffic than should be allowed for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-14850 vulnerability.
References
- https://www.redhat.com/archives/libguestfs/2019-September/msg00084.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1757258
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27827: A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause…
Published: 2021-03-18T17:15:00 Last Modified: 2021-08-04T17:14:00
Summary
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27827 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1921438
- https://mail.openvswitch.org/pipermail/ovs-dev/2021-January/379471.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-941426.pdf
- https://us-cert.cisa.gov/ics/advisories/icsa-21-194-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20286: A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go in ilb/opt.c may…
Published: 2021-03-15T18:15:00 Last Modified: 2021-03-22T14:32:00
Summary
A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go in ilb/opt.c may lead to denial of service.
Common Weakness Enumeration (CWE): CWE-617: Reachable Assertion
CWE Description: The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20286 vulnerability.
References
- https://gitlab.com/nbdkit/libnbd/-/commit/fb4440de9cc76e9c14bd3ddf3333e78621f40ad0
- https://bugzilla.redhat.com/show_bug.cgi?id=1934727
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20179: A flaw was found in pki-core. An attacker who has successfully compromised a key could use this…
Published: 2021-03-15T13:15:00 Last Modified: 2021-03-24T01:58:00
Summary
A flaw was found in pki-core. An attacker who has successfully compromised a key could use this flaw to renew the corresponding certificate over and over again, as long as it is not explicitly revoked. The highest threat from this vulnerability is to data confidentiality and integrity.
Common Weakness Enumeration (CWE): CWE-863: Incorrect Authorization
CWE Description: The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.0
- CVSS: 5.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20179 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1914379
- https://github.com/dogtagpki/pki/pull/3475
- https://github.com/dogtagpki/pki/pull/3476
- https://github.com/dogtagpki/pki/pull/3474
- https://github.com/dogtagpki/pki/pull/3477
- https://github.com/dogtagpki/pki/pull/3478
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3I7BRAHLE2WWSY76W3CKFCF5WSSAE24/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDOLFOLEIV7I4EUC3SCZBXL6E2ER7ZEN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRE44N6P24AEDKRMWK7RPRLMCUUBRJII/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20231: A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead…
Published: 2021-03-12T19:15:00 Last Modified: 2021-06-01T14:07:00
Summary
A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20231 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1922276
- https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
- https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E
- https://security.netapp.com/advisory/ntap-20210416-0005/
- https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E
- https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E
- https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E
- https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E
- https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E
- https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E
- https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20232: A flaw was found in gnutls. A use after free issue in client_send_params in…
Published: 2021-03-12T19:15:00 Last Modified: 2021-05-17T14:30:00
Summary
A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20232 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1922275
- https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
- https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779@%3Cissues.spark.apache.org%3E
- https://security.netapp.com/advisory/ntap-20210416-0005/
- https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f@%3Cissues.spark.apache.org%3E
- https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb@%3Cissues.spark.apache.org%3E
- https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158@%3Cissues.spark.apache.org%3E
- https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20@%3Cissues.spark.apache.org%3E
- https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532@%3Cissues.spark.apache.org%3E
- https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168@%3Cissues.spark.apache.org%3E
- https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7@%3Cissues.spark.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20261: A race condition was found in the Linux kernels implementation of the floppy disk drive…
Published: 2021-03-11T21:15:00 Last Modified: 2021-03-19T13:08:00
Summary
A race condition was found in the Linux kernels implementation of the floppy disk drive controller driver software. The impact of this issue is lessened by the fact that the default permissions on the floppy device (/dev/fd0) are restricted to root. If the permissions on the device have changed the impact changes greatly. In the default configuration root (or equivalent) permissions are required to attack this flaw.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-20261 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a0c80efe5956ccce9fe7ae5c78542578c07bc20a
- https://bugzilla.redhat.com/show_bug.cgi?id=1932150
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-35521: A flaw was found in libtiff. Due to a memory allocation failure in tif_read.c, a crafted TIFF…
Published: 2021-03-09T20:15:00 Last Modified: 2021-05-21T09:15:00
Summary
A flaw was found in libtiff. Due to a memory allocation failure in tif_read.c, a crafted TIFF file can lead to an abort, resulting in denial of service.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-35521 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1932034
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMHBYFMX3D5VGR6Y3RXTTH3Q4NF4E6IG/
- https://security.gentoo.org/glsa/202104-06
- https://security.netapp.com/advisory/ntap-20210521-0009/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3411: A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was…
Published: 2021-03-09T20:15:00 Last Modified: 2021-05-21T15:30:00
Summary
A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-3411 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20244: A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted…
Published: 2021-03-09T19:15:00 Last Modified: 2021-03-25T18:45:00
Summary
A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-369: Divide By Zero
CWE Description: The product divides a value by zero.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20244 vulnerability.
References
- https://github.com/ImageMagick/ImageMagick/pull/3194
- https://bugzilla.redhat.com/show_bug.cgi?id=1928959
- https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20245: A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is…
Published: 2021-03-09T19:15:00 Last Modified: 2022-01-01T18:02:00
Summary
A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-369: Divide By Zero
CWE Description: The product divides a value by zero.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20245 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1928943
- https://github.com/ImageMagick/ImageMagick/issues/3176
- https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20246: A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file…
Published: 2021-03-09T19:15:00 Last Modified: 2021-03-25T18:46:00
Summary
A flaw was found in ImageMagick in MagickCore/resample.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-369: Divide By Zero
CWE Description: The product divides a value by zero.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20246 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1928941
- https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25639: A NULL pointer dereference flaw was found in the Linux kernel’s GPU Nouveau driver functionality…
Published: 2021-03-04T22:15:00 Last Modified: 2021-03-10T20:47:00
Summary
A NULL pointer dereference flaw was found in the Linux kernel’s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-25639 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1876995
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUCBCKRHWP3UD2AVVYQJE7BIJEMCMXW5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HE4CT3NL6OEBRRBUKHIX63GLNVOWCVRW/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3404: In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-…
Published: 2021-03-04T22:15:00 Last Modified: 2021-03-10T20:22:00
Summary
In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a crafted file.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3404 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-3403: In ytnef 1.9.3, the TNEFSubjectHandler function in lib/ytnef.c allows remote attackers to cause a…
Published: 2021-03-04T22:15:00 Last Modified: 2021-03-10T20:24:00
Summary
In ytnef 1.9.3, the TNEFSubjectHandler function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a double free which can be triggered via a crafted file.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-3403 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20225: A flaw was found in grub2 in versions prior to 2.06. The option parser allows an attacker to…
Published: 2021-03-03T17:15:00 Last Modified: 2021-05-01T02:15:00
Summary
A flaw was found in grub2 in versions prior to 2.06. The option parser allows an attacker to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-20225 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1924696
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZWZ36QK4IKU6MWDWNOOWKPH3WXZBHT2R/
- https://security.gentoo.org/glsa/202104-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20233: A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code…
Published: 2021-03-03T17:15:00 Last Modified: 2021-05-01T02:15:00
Summary
A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters, while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-20233 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1926263
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZWZ36QK4IKU6MWDWNOOWKPH3WXZBHT2R/
- https://security.gentoo.org/glsa/202104-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14372: A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of…
Published: 2021-03-03T17:15:00 Last Modified: 2021-05-01T02:15:00
Summary
A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.
Common Weakness Enumeration (CWE): CWE-184: Incomplete List of Disallowed Inputs
CWE Description: The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete, leading to resultant weaknesses.
Scores
- Impact Score: 10.0
- Exploitability Score: 1.9
- CVSS: 6.2
- CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-14372 vulnerability.
References
- https://access.redhat.com/security/vulnerabilities/RHSB-2021-003
- https://bugzilla.redhat.com/show_bug.cgi?id=1873150
- https://security.netapp.com/advisory/ntap-20210416-0004/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZWZ36QK4IKU6MWDWNOOWKPH3WXZBHT2R/
- https://security.gentoo.org/glsa/202104-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25632: A flaw was found in grub2 in versions prior to 2.06. The rmmod implementation allows the…
Published: 2021-03-03T17:15:00 Last Modified: 2021-12-16T20:42:00
Summary
A flaw was found in grub2 in versions prior to 2.06. The rmmod implementation allows the unloading of a module used as a dependency without checking if any other dependent module is still loaded leading to a use-after-free scenario. This could allow arbitrary code to be executed or a bypass of Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-25632 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1879577
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZWZ36QK4IKU6MWDWNOOWKPH3WXZBHT2R/
- https://security.gentoo.org/glsa/202104-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25647: A flaw was found in grub2 in versions prior to 2.06. During USB device initialization,…
Published: 2021-03-03T17:15:00 Last Modified: 2021-05-01T02:15:00
Summary
A flaw was found in grub2 in versions prior to 2.06. During USB device initialization, descriptors are read with very little bounds checking and assumes the USB device is providing sane values. If properly exploited, an attacker could trigger memory corruption leading to arbitrary code execution allowing a bypass of the Secure Boot mechanism. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-25647 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1886936
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZWZ36QK4IKU6MWDWNOOWKPH3WXZBHT2R/
- https://security.gentoo.org/glsa/202104-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27749: A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the…
Published: 2021-03-03T17:15:00 Last Modified: 2021-05-01T02:15:00
Summary
A flaw was found in grub2 in versions prior to 2.06. Variable names present are expanded in the supplied command line into their corresponding variable contents, using a 1kB stack buffer for temporary storage, without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution which could also circumvent Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-121: Stack-based Buffer Overflow
CWE Description: A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-27749 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1899966
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZWZ36QK4IKU6MWDWNOOWKPH3WXZBHT2R/
- https://security.gentoo.org/glsa/202104-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27779: A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure…
Published: 2021-03-03T17:15:00 Last Modified: 2021-05-01T02:15:00
Summary
A flaw was found in grub2 in versions prior to 2.06. The cutmem command does not honor secure boot locking allowing an privileged attacker to remove address ranges from memory creating an opportunity to circumvent SecureBoot protections after proper triage about grub’s memory layout. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-285: Improper Authorization
CWE Description: The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-27779 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1900698
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZWZ36QK4IKU6MWDWNOOWKPH3WXZBHT2R/
- https://security.gentoo.org/glsa/202104-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20194: There is a vulnerability in the linux kernel versions higher than 5.2 (if kernel compiled with…
Published: 2021-02-23T23:15:00 Last Modified: 2021-03-31T12:29:00
Summary
There is a vulnerability in the linux kernel versions higher than 5.2 (if kernel compiled with config params CONFIG_BPF_SYSCALL=y , CONFIG_BPF=y , CONFIG_CGROUPS=y , CONFIG_CGROUP_BPF=y , CONFIG_HARDENED_USERCOPY not set, and BPF hook to getsockopt is registered). As result of BPF execution, the local user can trigger bug in __cgroup_bpf_run_filter_getsockopt() function that can lead to heap overflow (because of non-hardened usercopy). The impact of attack could be deny of service or possibly privileges escalation.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-20194 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1912683
- https://security.netapp.com/advisory/ntap-20210326-0003/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20229: A flaw was found in PostgreSQL in versions before 13.2. This flaw allows a user with SELECT…
Published: 2021-02-23T18:15:00 Last Modified: 2021-06-09T15:01:00
Summary
A flaw was found in PostgreSQL in versions before 13.2. This flaw allows a user with SELECT privilege on one column to craft a special query that returns all columns of the table. The highest threat from this vulnerability is to confidentiality.
Common Weakness Enumeration (CWE): CWE-863: Incorrect Authorization
CWE Description: The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2021-20229 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1925296
- https://security.netapp.com/advisory/ntap-20210326-0005/
- https://security.gentoo.org/glsa/202105-32
See also: All popular products CVE Vulnerabilities of redhat
CVE-2021-20188: A flaw was found in podman before 1.7.0. File permissions for non-root users running in a…
Published: 2021-02-11T18:15:00 Last Modified: 2021-02-17T20:12:00
Summary
A flaw was found in podman before 1.7.0. File permissions for non-root users running in a privileged container are not correctly checked. This flaw can be abused by a low-privileged user inside the container to access any other file in the container, even if owned by the root user inside the container. It does not allow to directly escape the container, though being a privileged container means that a lot of security features are disabled when running the container. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-863: Incorrect Authorization
CWE Description: The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2021-20188 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-35513: A flaw incorrect umask during file or directory modification in the Linux kernel NFS (network…
Published: 2021-01-26T18:15:00 Last Modified: 2021-02-02T19:39:00
Summary
A flaw incorrect umask during file or directory modification in the Linux kernel NFS (network file system) functionality was found in the way user create and delete object using NFSv4.2 or newer if both simultaneously accessing the NFS by the other process that is not using new NFSv4.2. A user with access to the NFS could use this flaw to starve the resources causing denial of service.
Common Weakness Enumeration (CWE): CWE-271: Privilege Dropping / Lowering Errors
CWE Description: The software does not drop privileges before passing control of a resource to an actor that does not have those privileges.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-35513 vulnerability.
References
- https://patchwork.kernel.org/project/linux-nfs/patch/20180403203916.GH20297@fieldses.org/
- https://bugzilla.redhat.com/show_bug.cgi?id=1911309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25657: A flaw was found in all released versions of m2crypto, where they are vulnerable to…
Published: 2021-01-12T15:15:00 Last Modified: 2021-04-07T14:58:00
Summary
A flaw was found in all released versions of m2crypto, where they are vulnerable to Bleichenbacher timing attacks in the RSA decryption API via the timed processing of valid PKCS#1 v1.5 Ciphertext. The highest threat from this vulnerability is to confidentiality.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-25657 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-35507: There’s a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34…
Published: 2021-01-04T15:15:00 Last Modified: 2021-07-10T05:15:00
Summary
There’s a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-35507 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1911691
- https://security.netapp.com/advisory/ntap-20210212-0007/
- https://security.gentoo.org/glsa/202107-24
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27846: A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to…
Published: 2020-12-21T16:15:00 Last Modified: 2021-03-31T15:17:00
Summary
A signature verification vulnerability exists in crewjam/saml. This flaw allows an attacker to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Common Weakness Enumeration (CWE): CWE-115: Misinterpretation of Input
CWE Description: The software misinterprets an input, whether from an attacker or another product, in a security-relevant fashion.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27846 vulnerability.
References
- https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9
- https://bugzilla.redhat.com/show_bug.cgi?id=1907670
- https://grafana.com/blog/2020/12/17/grafana-6.7.5-7.2.3-and-7.3.6-released-with-important-security-fix-for-grafana-enterprise/
- https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICP3YRY2VUCNCF2VFUSK77ZMRIC77FEM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUTKIRWT6TWU7DS6GF3EOANVQBFQZYI/
- https://security.netapp.com/advisory/ntap-20210205-0002/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25712: A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo…
Published: 2020-12-15T17:15:00 Last Modified: 2020-12-16T21:42:00
Summary
A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-122: Heap-based Buffer Overflow
CWE Description: A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-25712 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1887276
- https://lists.x.org/archives/xorg-announce/2020-December/003066.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27777: A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On…
Published: 2020-12-15T17:15:00 Last Modified: 2020-12-22T17:18:00
Summary
A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.
Common Weakness Enumeration (CWE): CWE-862: Missing Authorization
CWE Description: The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-27777 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next&id=bd59380c5ba4147dcbaad3e582b55ccfd120b764
- https://www.openwall.com/lists/oss-security/2020/11/23/2
- https://www.openwall.com/lists/oss-security/2020/10/09/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1900844
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1)….
Published: 2020-12-11T19:15:00 Last Modified: 2021-07-15T19:16:00
Summary
A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 7.8
- Exploitability Score: 3.4
- CVSS: 5.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-27825 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1905155
- https://www.debian.org/security/2021/dsa-4843
- https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
- https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
- https://security.netapp.com/advisory/ntap-20210521-0008/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27786: A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local…
Published: 2020-12-11T05:15:00 Last Modified: 2021-07-15T19:16:00
Summary
A flaw was found in the Linux kernel’s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-27786 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d
- https://bugzilla.redhat.com/show_bug.cgi?id=1900933
- https://security.netapp.com/advisory/ntap-20210122-0002/
- http://www.openwall.com/lists/oss-security/2020/12/03/1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25692: A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during…
Published: 2020-12-08T01:15:00 Last Modified: 2021-01-08T12:15:00
Summary
A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-25692 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1894567
- https://security.netapp.com/advisory/ntap-20210108-0006/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-29573: sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has…
Published: 2020-12-06T00:15:00 Last Modified: 2021-01-26T18:15:00
Summary
sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of “Fixed for glibc 2.33” in the 26649 reference.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-29573 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=26649
- https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
- https://security.gentoo.org/glsa/202101-20
- https://security.netapp.com/advisory/ntap-20210122-0004/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27773: A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted…
Published: 2020-12-04T22:15:00 Last Modified: 2021-06-02T19:07:00
Summary
A flaw was found in ImageMagick in MagickCore/gem-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char
or division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
Common Weakness Enumeration (CWE): CWE-369: Divide By Zero
CWE Description: The product divides a value by zero.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27773 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1898295
- https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27772: A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is…
Published: 2020-12-04T22:15:00 Last Modified: 2021-06-02T19:08:00
Summary
A flaw was found in ImageMagick in coders/bmp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned int
. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27772 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1898291
- https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27776: A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file…
Published: 2020-12-04T21:15:00 Last Modified: 2021-06-02T18:57:00
Summary
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned long. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27776 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27775: A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file…
Published: 2020-12-04T21:15:00 Last Modified: 2021-06-02T19:04:00
Summary
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type unsigned char. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27775 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1898300
- https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27774: A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file…
Published: 2020-12-04T21:15:00 Last Modified: 2021-04-28T16:46:00
Summary
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type ssize_t
. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27774 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1898296
- https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27767: A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file…
Published: 2020-12-04T15:15:00 Last Modified: 2021-06-02T18:20:00
Summary
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types float
and unsigned char
. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27767 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1894687
- https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27765: A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file…
Published: 2020-12-04T15:15:00 Last Modified: 2021-06-02T19:16:00
Summary
A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.9-0.
Common Weakness Enumeration (CWE): CWE-369: Divide By Zero
CWE Description: The product divides a value by zero.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27765 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1894684
- https://lists.debian.org/debian-lts-announce/2021/01/msg00010.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27771: In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex()…
Published: 2020-12-04T15:15:00 Last Modified: 2021-06-02T19:13:00
Summary
In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when ImageMagick processes a crafted pdf file. Red Hat Product Security marked this as Low severity because although it could potentially lead to an impact to application availability, no specific impact was demonstrated in this case. This flaw affects ImageMagick versions prior to 7.0.9-0.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27771 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1898290
- https://lists.debian.org/debian-lts-announce/2021/03/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14339: A flaw was found in libvirt, where it leaked a file descriptor for /dev/mapper/control
into the…
Published: 2020-12-03T17:15:00 Last Modified: 2021-02-09T19:59:00
Summary
A flaw was found in libvirt, where it leaked a file descriptor for /dev/mapper/control
into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Common Weakness Enumeration (CWE): CWE-772: Missing Release of Resource after Effective Lifetime
CWE Description: The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-14339 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14351: A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf…
Published: 2020-12-03T17:15:00 Last Modified: 2021-11-04T17:05:00
Summary
A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-14351 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1862849
- https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
- https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27778: A flaw was found in Poppler in the way certain PDF files were converted into HTML. A remote…
Published: 2020-12-03T17:15:00 Last Modified: 2020-12-07T19:30:00
Summary
A flaw was found in Poppler in the way certain PDF files were converted into HTML. A remote attacker could exploit this flaw by providing a malicious PDF file that, when processed by the ‘pdftohtml’ program, would crash the application causing a denial of service.
Common Weakness Enumeration (CWE): CWE-824: Access of Uninitialized Pointer
CWE Description: The program accesses or uses a pointer that has not been initialized.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27778 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-27783: A XSS vulnerability was discovered in python-lxml’s clean module. The module’s parser didn’t…
Published: 2020-12-03T17:15:00 Last Modified: 2021-07-20T23:15:00
Summary
A XSS vulnerability was discovered in python-lxml’s clean module. The module’s parser didn’t properly imitate browsers, which caused different behaviors between the sanitizer and the user’s page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-27783 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1901633
- https://www.debian.org/security/2020/dsa-4810
- https://lists.debian.org/debian-lts-announce/2020/12/msg00028.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/
- https://advisory.checkmarx.net/advisory/CX-2020-4286
- https://security.netapp.com/advisory/ntap-20210521-0003/
- https://www.oracle.com//security-alerts/cpujul2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14318: A flaw was found in the way samba handled file and directory permissions. An authenticated user…
Published: 2020-12-03T16:15:00 Last Modified: 2022-01-01T18:12:00
Summary
A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.
Common Weakness Enumeration (CWE): CWE-266: Incorrect Privilege Assignment
CWE Description: A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-14318 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1892631
- https://www.samba.org/samba/security/CVE-2020-14318.html
- https://security.gentoo.org/glsa/202012-24
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14383: A flaw was found in samba’s DNS server. An authenticated user could use this flaw to the RPC…
Published: 2020-12-02T01:15:00 Last Modified: 2021-05-05T12:57:00
Summary
A flaw was found in samba’s DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-14383 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2020-14383.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1892636
- https://security.gentoo.org/glsa/202012-24
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25656: A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem…
Published: 2020-12-02T01:15:00 Last Modified: 2022-01-01T18:11:00
Summary
A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-25656 vulnerability.
References
- https://lkml.org/lkml/2020/10/29/528
- https://lkml.org/lkml/2020/10/16/84
- https://bugzilla.redhat.com/show_bug.cgi?id=1888726
- https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
- https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25708: A divide by zero issue was found to occur in libvncserver-0.9.12. A malicious client could use…
Published: 2020-11-27T18:15:00 Last Modified: 2020-12-02T19:14:00
Summary
A divide by zero issue was found to occur in libvncserver-0.9.12. A malicious client could use this flaw to send a specially crafted message that, when processed by the VNC server, would lead to a floating point exception, resulting in a denial of service.
Common Weakness Enumeration (CWE): CWE-369: Divide By Zero
CWE Description: The product divides a value by zero.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-25708 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10763: An information-disclosure flaw was found in the way Heketi before 10.1.0 logs sensitive…
Published: 2020-11-24T17:15:00 Last Modified: 2020-12-02T19:16:00
Summary
An information-disclosure flaw was found in the way Heketi before 10.1.0 logs sensitive information. This flaw allows an attacker with local access to the Heketi server to read potentially sensitive information such as gluster-block passwords.
Common Weakness Enumeration (CWE): CWE-532: Insertion of Sensitive Information into Log File
CWE Description: This entry has been deprecated because its abstraction was too low-level. See CWE-532.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-10763 vulnerability.
References
- https://github.com/heketi/heketi/releases/tag/v10.1.0
- https://bugzilla.redhat.com/show_bug.cgi?id=1845387
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25705: A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports….
Published: 2020-11-17T02:15:00 Last Modified: 2021-05-18T12:15:00
Summary
A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version
Common Weakness Enumeration (CWE): CWE-330: Use of Insufficiently Random Values
CWE Description: The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-25705 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25661: A Red Hat only CVE-2020-12351 regression issue was found in the way the Linux kernel’s Bluetooth…
Published: 2020-11-05T21:15:00 Last Modified: 2020-11-19T15:32:00
Summary
A Red Hat only CVE-2020-12351 regression issue was found in the way the Linux kernel’s Bluetooth implementation handled L2CAP packets with A2MP CID. This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Common Weakness Enumeration (CWE): CWE-843: Access of Resource Using Incompatible Type (‘Type Confusion’)
CWE Description: The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Scores
- Impact Score: 10.0
- Exploitability Score: 6.5
- CVSS: 8.3
- CVSS Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2020-25661 vulnerability.
References
- https://access.redhat.com/security/cve/CVE-2020-12351
- https://access.redhat.com/security/vulnerabilities/BleedingTooth
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25661
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25662: A Red Hat only CVE-2020-12352 regression issue was found in the way the Linux kernel’s Bluetooth…
Published: 2020-11-05T21:15:00 Last Modified: 2021-10-19T13:49:00
Summary
A Red Hat only CVE-2020-12352 regression issue was found in the way the Linux kernel’s Bluetooth stack implementation handled the initialization of stack memory when handling certain AMP packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.
Common Weakness Enumeration (CWE): CWE-665: Improper Initialization
CWE Description: The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.5
- CVSS: 3.3
- CVSS Vector: AV:A/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2020-25662 vulnerability.
References
- https://access.redhat.com/security/cve/CVE-2020-12352
- https://access.redhat.com/security/vulnerabilities/BleedingTooth
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25662
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-3864: A logic issue was addressed with improved validation. This issue is fixed in iCloud for Windows…
Published: 2020-10-27T21:15:00 Last Modified: 2021-05-18T13:20:00
Summary
A logic issue was addressed with improved validation. This issue is fixed in iCloud for Windows 7.17, iTunes 12.10.4 for Windows, iCloud for Windows 10.9.2, tvOS 13.3.1, Safari 13.0.5, iOS 13.3.1 and iPadOS 13.3.1. A DOM object context may not have had a unique security origin.
Common Weakness Enumeration (CWE): CWE-346: Origin Validation Error
CWE Description: The software does not properly verify that the source of data or communication is valid.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-3864 vulnerability.
References
- https://support.apple.com/en-us/HT210918
- https://support.apple.com/en-us/HT210923
- https://support.apple.com/en-us/HT210948
- https://support.apple.com/en-us/HT210947
- https://support.apple.com/en-us/HT210920
- https://support.apple.com/en-us/HT210922
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8846: A use after free issue was addressed with improved memory management. This issue is fixed in tvOS…
Published: 2020-10-27T21:15:00 Last Modified: 2021-05-18T13:20:00
Summary
A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8846 vulnerability.
References
- https://support.apple.com/en-us/HT210790
- https://support.apple.com/en-us/HT210793
- https://support.apple.com/en-us/HT210792
- https://support.apple.com/en-us/HT210795
- https://support.apple.com/en-us/HT210794
- https://support.apple.com/en-us/HT210785
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8844: Multiple memory corruption issues were addressed with improved memory handling. This issue is…
Published: 2020-10-27T20:15:00 Last Modified: 2021-05-18T13:19:00
Summary
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8844 vulnerability.
References
- https://support.apple.com/en-us/HT210790
- https://support.apple.com/en-us/HT210793
- https://support.apple.com/en-us/HT210792
- https://support.apple.com/en-us/HT210789
- https://support.apple.com/en-us/HT210795
- https://support.apple.com/en-us/HT210794
- https://support.apple.com/en-us/HT210785
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8835: Multiple memory corruption issues were addressed with improved memory handling. This issue is…
Published: 2020-10-27T20:15:00 Last Modified: 2021-05-18T13:19:00
Summary
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8835 vulnerability.
References
- https://support.apple.com/en-us/HT210790
- https://support.apple.com/en-us/HT210793
- https://support.apple.com/en-us/HT210792
- https://support.apple.com/en-us/HT210795
- https://support.apple.com/en-us/HT210794
- https://support.apple.com/en-us/HT210785
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25648: A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw…
Published: 2020-10-20T22:15:00 Last Modified: 2021-12-07T19:58:00
Summary
A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-25648 vulnerability.
References
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
- https://bugzilla.redhat.com/show_bug.cgi?id=1887319
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14355: Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the…
Published: 2020-10-07T15:15:00 Last Modified: 2020-12-04T18:15:00
Summary
Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-14355 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1868435
- https://www.openwall.com/lists/oss-security/2020/10/06/10
- https://www.debian.org/security/2020/dsa-4771
- https://usn.ubuntu.com/4572-1/
- https://usn.ubuntu.com/4572-2/
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00000.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00001.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00001.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25743: hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a…
Published: 2020-10-06T15:15:00 Last Modified: 2020-10-07T13:31:00
Summary
hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-25743 vulnerability.
References
- https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Fide_nullptr1b
- https://bugzilla.redhat.com/show_bug.cgi?id=1881409
- http://www.openwall.com/lists/oss-security/2020/09/29/1
- https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05967.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25637: A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0,…
Published: 2020-10-06T14:15:00 Last Modified: 2020-12-04T18:15:00
Summary
A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-25637 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1881037
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00072.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25643: A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory…
Published: 2020-10-06T14:15:00 Last Modified: 2021-10-19T13:45:00
Summary
A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 8.5
- Exploitability Score: 6.8
- CVSS: 7.5
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-25643 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=66d42ed8b25b64eb63111a2b8582c5afc8bf1105
- https://bugzilla.redhat.com/show_bug.cgi?id=1879981
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html
- https://www.debian.org/security/2020/dsa-4774
- https://lists.debian.org/debian-lts-announce/2020/10/msg00028.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
- https://security.netapp.com/advisory/ntap-20201103-0002/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-25641: A flaw was found in the Linux kernel’s implementation of biovecs in versions before 5.9-rc7. A…
Published: 2020-10-06T14:15:00 Last Modified: 2020-12-04T18:15:00
Summary
A flaw was found in the Linux kernel’s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-25641 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7e24969022cbd61ddc586f14824fc205661bb124
- https://www.kernel.org/doc/html/latest/block/biovecs.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1881424
- http://www.openwall.com/lists/oss-security/2020/10/06/9
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
- https://usn.ubuntu.com/4576-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00042.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14370: An information disclosure vulnerability was found in containers/podman in versions before 2.0.5….
Published: 2020-09-23T13:15:00 Last Modified: 2021-11-04T16:36:00
Summary
An information disclosure vulnerability was found in containers/podman in versions before 2.0.5. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container will get leaked into subsequent containers. An attacker who has control over the subsequent containers could use this flaw to gain access to sensitive information stored in such variables.
Common Weakness Enumeration (CWE): CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer
CWE Description: The product stores, transfers, or shares a resource that contains sensitive information, but it does not properly remove that information before the product makes the resource available to unauthorized actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-14370 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1874268
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G6BPCZX4ASKNONL3MSCK564IVXNYSKLP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y74V7HGQBNLT6XECCSNZNFZIB7G7XSAR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z4Y2FSGQWP4AFT5AZ6UBN6RKHVXUBRFV/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14382: A vulnerability was found in upstream release cryptsetup-2.2.0 where, there’s a bug in LUKS2…
Published: 2020-09-16T15:15:00 Last Modified: 2022-01-01T18:39:00
Summary
A vulnerability was found in upstream release cryptsetup-2.2.0 where, there’s a bug in LUKS2 format validation code, that is effectively invoked on every device/image presenting itself as LUKS2 container. The bug is in segments validation code in file ’lib/luks2/luks2_json_metadata.c’ in function hdr_validate_segments(struct crypt_device *cd, json_object *hdr_jobj) where the code does not check for possible overflow on memory allocation used for intervals array (see statement “intervals = malloc(first_backup * sizeof(*intervals));”). Due to the bug, library can be tricked to expect such allocation was successful but for far less memory then originally expected. Later it may read data FROM image crafted by an attacker and actually write such data BEYOND allocated memory.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-14382 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1874712
- https://usn.ubuntu.com/4493-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OJTQ4KSVCW2NMSU5WFVPOHY46WMNF4OB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TD6YSD63LLRRC4WQ7DJLSXWNUCY6FWBM/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10759: A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the…
Published: 2020-09-15T19:15:00 Last Modified: 2020-09-22T16:51:00
Summary
A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.
Common Weakness Enumeration (CWE): CWE-347: Improper Verification of Cryptographic Signature
CWE Description: The software does not verify, or incorrectly verifies, the cryptographic signature for data.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.4
- CVSS: 3.3
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-10759 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1844316
- https://github.com/justinsteven/advisories/blob/master/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14331: A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles…
Published: 2020-09-15T19:15:00 Last Modified: 2021-01-13T14:35:00
Summary
A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-14331 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1858679
- https://lists.openwall.net/linux-kernel/2020/07/29/234
- https://www.openwall.com/lists/oss-security/2020/07/28/2
- https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-0570: Uncontrolled search path in the QT Library before 5.14.0, 5.12.7 and 5.9.10 may allow an…
Published: 2020-09-14T19:15:00 Last Modified: 2021-09-21T17:58:00
Summary
Uncontrolled search path in the QT Library before 5.14.0, 5.12.7 and 5.9.10 may allow an authenticated user to potentially enable elevation of privilege via local access.
Common Weakness Enumeration (CWE): CWE-426: Untrusted Search Path
CWE Description: The application searches for critical resources using an externally-supplied search path that can point to resources that are not under the application’s direct control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-0570 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1800604
- https://lists.qt-project.org/pipermail/development/2020-January/038534.html
- https://bugreports.qt.io/browse/QTBUG-81272
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-1749: A flaw was found in the Linux kernel’s implementation of some networking protocols in IPsec, such…
Published: 2020-09-09T15:15:00 Last Modified: 2021-07-15T19:16:00
Summary
A flaw was found in the Linux kernel’s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn’t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
Common Weakness Enumeration (CWE): CWE-319: Cleartext Transmission of Sensitive Information
CWE Description: The software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-1749 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1749
- https://security.netapp.com/advisory/ntap-20201222-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14373: A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local…
Published: 2020-09-03T18:15:00 Last Modified: 2020-09-10T14:46:00
Summary
A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-14373 vulnerability.
References
- https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=ece5cbbd9979cd35737b00e68267762d72feb2ea;hp=1ef5f08f2c2e27efa978f0010669ff22355c385f
- https://bugzilla.redhat.com/show_bug.cgi?id=1873239
- https://bugs.ghostscript.com/show_bug.cgi?id=702851
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14364: An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions…
Published: 2020-08-31T18:15:00 Last Modified: 2020-11-11T06:15:00
Summary
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice ‘setup_len’ exceeds its ‘data_buf[4096]’ in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-14364 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2020/08/24/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1869201
- https://www.openwall.com/lists/oss-security/2020/08/24/3
- https://www.debian.org/security/2020/dsa-4760
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTZQUQ6ZBPMFMNAUQBVJFELYNMUZLL6P/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M52WIRMZL6TZRYZ65N6OAYNNFHV62O2N/
- https://usn.ubuntu.com/4511-1/
- https://security.netapp.com/advisory/ntap-20200924-0006/
- https://security.gentoo.org/glsa/202009-14
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00024.html
- https://security.gentoo.org/glsa/202011-09
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14356: A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10…
Published: 2020-08-19T15:15:00 Last Modified: 2020-11-02T21:15:00
Summary
A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-14356 vulnerability.
References
- https://lore.kernel.org/netdev/CAM_iQpUKQJrj8wE+Qa8NGR3P0L+5Uz=qo-O5+k_P60HzTde6aw%40mail.gmail.com/t/
- https://bugzilla.redhat.com/show_bug.cgi?id=1868453
- https://bugzilla.kernel.org/show_bug.cgi?id=208003
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html
- https://security.netapp.com/advisory/ntap-20200904-0002/
- https://usn.ubuntu.com/4484-1/
- https://usn.ubuntu.com/4483-1/
- https://usn.ubuntu.com/4526-1/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14311: There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A…
Published: 2020-07-31T22:15:00 Last Modified: 2021-10-19T13:23:00
Summary
There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-122: Heap-based Buffer Overflow
CWE Description: A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-14311 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14311
- https://usn.ubuntu.com/4432-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html
- https://security.gentoo.org/glsa/202104-05
- http://www.openwall.com/lists/oss-security/2021/09/17/2
- http://www.openwall.com/lists/oss-security/2021/09/17/4
- http://www.openwall.com/lists/oss-security/2021/09/21/1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14310: There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a…
Published: 2020-07-31T22:15:00 Last Modified: 2021-10-19T13:19:00
Summary
There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn’t verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-14310 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14310
- https://usn.ubuntu.com/4432-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html
- https://security.gentoo.org/glsa/202104-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-15706: GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free…
Published: 2020-07-29T18:15:00 Last Modified: 2021-05-01T02:15:00
Summary
GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-15706 vulnerability.
References
- https://www.suse.com/support/kb/doc/?id=000019673
- http://ubuntu.com/security/notices/USN-4432-1
- https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
- https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011
- https://access.redhat.com/security/vulnerabilities/grub2bootloader
- https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
- https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
- https://www.openwall.com/lists/oss-security/2020/07/29/3
- https://www.debian.org/security/2020/dsa-4735
- http://www.openwall.com/lists/oss-security/2020/07/29/3
- https://security.netapp.com/advisory/ntap-20200731-0008/
- https://usn.ubuntu.com/4432-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html
- https://security.gentoo.org/glsa/202104-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-15705: GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot…
Published: 2020-07-29T18:15:00 Last Modified: 2021-09-21T12:15:00
Summary
GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.
Common Weakness Enumeration (CWE): CWE-347: Improper Verification of Cryptographic Signature
CWE Description: The software does not verify, or incorrectly verifies, the cryptographic signature for data.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-15705 vulnerability.
References
- https://www.suse.com/support/kb/doc/?id=000019673
- http://ubuntu.com/security/notices/USN-4432-1
- https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
- https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011
- https://access.redhat.com/security/vulnerabilities/grub2bootloader
- https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
- https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
- https://www.openwall.com/lists/oss-security/2020/07/29/3
- http://www.openwall.com/lists/oss-security/2020/07/29/3
- https://security.netapp.com/advisory/ntap-20200731-0008/
- https://usn.ubuntu.com/4432-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00067.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00069.html
- http://www.openwall.com/lists/oss-security/2021/03/02/3
- https://security.gentoo.org/glsa/202104-05
- http://www.openwall.com/lists/oss-security/2021/09/17/2
- http://www.openwall.com/lists/oss-security/2021/09/17/4
- http://www.openwall.com/lists/oss-security/2021/09/21/1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-15707: Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the…
Published: 2020-07-29T18:15:00 Last Modified: 2021-09-13T14:25:00
Summary
Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-15707 vulnerability.
References
- https://www.suse.com/support/kb/doc/?id=000019673
- http://ubuntu.com/security/notices/USN-4432-1
- https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
- https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011
- https://access.redhat.com/security/vulnerabilities/grub2bootloader
- https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
- https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
- https://www.openwall.com/lists/oss-security/2020/07/29/3
- https://www.debian.org/security/2020/dsa-4735
- http://www.openwall.com/lists/oss-security/2020/07/29/3
- https://security.netapp.com/advisory/ntap-20200731-0008/
- https://usn.ubuntu.com/4432-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html
- https://security.gentoo.org/glsa/202104-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-15719: libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the…
Published: 2020-07-14T14:15:00 Last Modified: 2021-07-31T08:15:00
Summary
libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
Common Weakness Enumeration (CWE): CWE-295: Improper Certificate Validation
CWE Description: The software does not validate, or incorrectly validates, a certificate.
Scores
- Impact Score: 4.9
- Exploitability Score: 4.9
- CVSS: 4.0
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-15719 vulnerability.
References
- https://access.redhat.com/errata/RHBA-2019:3674
- https://bugzilla.redhat.com/show_bug.cgi?id=1740070
- https://bugs.openldap.org/show_bug.cgi?id=9266
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14300: The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise…
Published: 2020-07-13T22:15:00 Last Modified: 2020-07-21T19:32:00
Summary
The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053 ) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in that update was the fix for CVE-2016-9962, that was previously corrected in the docker packages in Red Hat Enterprise Linux 7 Extras via RHSA-2017:0116 (https://access.redhat.com/errata/RHSA-2017:0116) . The CVE-2020-14300 was assigned to this security regression and it is specific to the docker packages produced by Red Hat. The original issue - CVE-2016-9962 - could possibly allow a process inside container to compromise a process entering container namespace and execute arbitrary code outside of the container. This could lead to compromise of the container host or other containers running on the same container host. This issue only affects a single version of Docker, 1.13.1-108.git4ef4b30, shipped in Red Hat Enterprise Linux 7. Both earlier and later versions are not affected.
Common Weakness Enumeration (CWE): CWE-273: Improper Check for Dropped Privileges
CWE Description: The software attempts to drop privileges but does not check or incorrectly checks to see if the drop succeeded.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-14300 vulnerability.
References
- https://access.redhat.com/security/vulnerabilities/cve-2016-9962
- https://access.redhat.com/errata/RHBA-2020:0427
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9962
- https://access.redhat.com/security/cve/CVE-2016-9962
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-14298: The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053…
Published: 2020-07-13T21:15:00 Last Modified: 2020-07-21T18:08:00
Summary
The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the container host and other containers running on the same host. This issue only affects docker version 1.13.1-108.git4ef4b30.el7, shipped in Red Hat Enterprise Linux 7 Extras. Both earlier and later versions are not affected.
Common Weakness Enumeration (CWE): CWE-273: Improper Check for Dropped Privileges
CWE Description: The software attempts to drop privileges but does not check or incorrectly checks to see if the drop succeeded.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-14298 vulnerability.
References
- https://access.redhat.com/security/vulnerabilities/runcescape
- https://access.redhat.com/security/cve/CVE-2020-14298
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-5736
- https://access.redhat.com/errata/RHBA-2020:0427
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19338: A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5…
Published: 2020-07-13T17:15:00 Last Modified: 2020-07-21T17:17:00
Summary
A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has ‘TSX’ enabled. Confidentiality of data is the highest threat associated with this vulnerability.
Common Weakness Enumeration (CWE): CWE-203: Observable Discrepancy
CWE Description: The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-19338 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2019/12/10/3
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19338
- https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10756: An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU…
Published: 2020-07-09T16:15:00 Last Modified: 2021-08-04T17:14:00
Summary
An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-10756 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1835986
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JYTZ32P67PZER6P7TW6FQK3SZRKQLVEI/
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00040.html
- https://www.debian.org/security/2020/dsa-4728
- https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
- https://usn.ubuntu.com/4437-1/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1005/
- https://usn.ubuntu.com/4467-1/
- https://security.netapp.com/advisory/ntap-20201001-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10769: A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys…
Published: 2020-06-26T16:15:00 Last Modified: 2021-06-14T18:15:00
Summary
A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm’s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-10769 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1708775;
- https://lkml.org/lkml/2019/1/21/675
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10757: A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge…
Published: 2020-06-09T13:15:00 Last Modified: 2021-07-21T11:39:00
Summary
A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
Common Weakness Enumeration (CWE): CWE-843: Access of Resource Using Incompatible Type (‘Type Confusion’)
CWE Description: The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-10757 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1842525
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- https://www.openwall.com/lists/oss-security/2020/06/04/4
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://www.debian.org/security/2020/dsa-4699
- https://www.debian.org/security/2020/dsa-4698
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
- https://security.netapp.com/advisory/ntap-20200702-0004/
- https://usn.ubuntu.com/4439-1/
- https://usn.ubuntu.com/4426-1/
- https://usn.ubuntu.com/4440-1/
- https://usn.ubuntu.com/4483-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10761: An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions…
Published: 2020-06-09T13:15:00 Last Modified: 2020-11-11T06:15:00
Summary
An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.
Common Weakness Enumeration (CWE): CWE-617: Reachable Assertion
CWE Description: The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-10761 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10761
- https://www.openwall.com/lists/oss-security/2020/06/09/1
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00086.html
- https://security.netapp.com/advisory/ntap-20200731-0001/
- https://usn.ubuntu.com/4467-1/
- https://security.gentoo.org/glsa/202011-09
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10749: A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6,…
Published: 2020-06-03T14:15:00 Last Modified: 2021-05-05T13:57:00
Summary
A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending rogue IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.
Scores
- Impact Score: 6.4
- Exploitability Score: 6.8
- CVSS: 6.0
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-10749 vulnerability.
References
- https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10749
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00063.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00065.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DV3HCDZYUTPPVDUMTZXDKK6IUO3JMGJC/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10751: A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where…
Published: 2020-05-26T15:15:00 Last Modified: 2021-06-14T18:15:00
Summary
A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
Common Weakness Enumeration (CWE): CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data
CWE Description: The software, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-10751 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10751
- https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6
- https://www.openwall.com/lists/oss-security/2020/04/30/5
- http://www.openwall.com/lists/oss-security/2020/05/27/3
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://www.debian.org/security/2020/dsa-4699
- https://www.debian.org/security/2020/dsa-4698
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
- https://usn.ubuntu.com/4389-1/
- https://usn.ubuntu.com/4390-1/
- https://usn.ubuntu.com/4391-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
- https://usn.ubuntu.com/4413-1/
- https://usn.ubuntu.com/4412-1/
- https://www.oracle.com/security-alerts/cpuApr2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10711: A NULL pointer dereference flaw was found in the Linux kernel’s SELinux subsystem in versions…
Published: 2020-05-22T15:15:00 Last Modified: 2021-08-04T17:14:00
Summary
A NULL pointer dereference flaw was found in the Linux kernel’s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol’s category bitmap into the SELinux extensible bitmap via the’ ebitmap_netlbl_import’ routine. While processing the CIPSO restricted bitmap tag in the ‘cipso_v4_parsetag_rbm’ routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-10711 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10711
- https://www.openwall.com/lists/oss-security/2020/05/12/2
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://www.debian.org/security/2020/dsa-4699
- https://www.debian.org/security/2020/dsa-4698
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
- https://usn.ubuntu.com/4413-1/
- https://usn.ubuntu.com/4411-1/
- https://usn.ubuntu.com/4412-1/
- https://usn.ubuntu.com/4419-1/
- https://usn.ubuntu.com/4414-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-12826: A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka…
Published: 2020-05-12T19:15:00 Last Modified: 2021-07-15T19:16:00
Summary
A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-12826 vulnerability.
References
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5
- https://github.com/torvalds/linux/commit/7395ea4e65c2a00d23185a3f63ad315756ba9cef
- https://www.openwall.com/lists/kernel-hardening/2020/03/25/1
- https://lists.openwall.net/linux-kernel/2020/03/24/1803
- https://bugzilla.redhat.com/show_bug.cgi?id=1822077
- https://usn.ubuntu.com/4367-1/
- https://usn.ubuntu.com/4369-1/
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://usn.ubuntu.com/4391-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10690: There is a use-after-free in kernel versions before 5.5 due to a race condition between the…
Published: 2020-05-08T15:15:00 Last Modified: 2021-12-20T23:03:00
Summary
There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-10690 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10690
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
- https://usn.ubuntu.com/4419-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-12458: An information-disclosure flaw was found in Grafana through 6.7.3. The database directory…
Published: 2020-04-29T16:15:00 Last Modified: 2021-07-21T11:39:00
Summary
An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-12458 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1827765
- https://github.com/grafana/grafana/issues/8283
- https://access.redhat.com/security/cve/CVE-2020-12458
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEBCIEVSYIDDCA7FTRS2IFUOYLIQU34A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTQCKJZZYXMCSHJFZZ3YXEO5NUBANGZS/
- https://security.netapp.com/advisory/ntap-20200518-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-12430: An issue was discovered in qemuDomainGetStatsIOThread in qemu/qemu_driver.c in libvirt 4.10.0…
Published: 2020-04-28T20:15:00 Last Modified: 2020-06-16T03:15:00
Summary
An issue was discovered in qemuDomainGetStatsIOThread in qemu/qemu_driver.c in libvirt 4.10.0 though 6.x before 6.1.0. A memory leak was found in the virDomainListGetStats libvirt API that is responsible for retrieving domain statistics when managing QEMU guests. This flaw allows unprivileged users with a read-only connection to cause a memory leak in the domstats command, resulting in a potential denial of service.
Common Weakness Enumeration (CWE): CWE-401: Missing Release of Memory after Effective Lifetime
CWE Description: The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-12430 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1804548
- https://bugzilla.redhat.com/show_bug.cgi?id=1828190
- https://libvirt.org/git/?p=libvirt.git;a=commit;h=9bf9e0ae6af38c806f4672ca7b12a6b38d5a9581
- https://security.netapp.com/advisory/ntap-20200518-0003/
- https://usn.ubuntu.com/4371-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5GE6ISYUL3CIWO3FQRUGMKTKP2NYED2/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-1722: A flaw was found in all ipa versions 4.x.x through 4.8.0. When sending a very long password (>=…
Published: 2020-04-27T21:15:00 Last Modified: 2020-05-26T15:12:00
Summary
A flaw was found in all ipa versions 4.x.x through 4.8.0. When sending a very long password (>= 1,000,000 characters) to the server, the password hashing process could exhaust memory and CPU leading to a denial of service and the website becoming unresponsive. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 4.9
- CVSS: 5.4
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-1722 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-1751: An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal…
Published: 2020-04-17T19:15:00 Last Modified: 2020-07-09T20:15:00
Summary
An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 8.5
- Exploitability Score: 3.4
- CVSS: 5.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-1751 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
- https://sourceware.org/bugzilla/show_bug.cgi?id=25423
- https://security.netapp.com/advisory/ntap-20200430-0002/
- https://security.gentoo.org/glsa/202006-04
- https://usn.ubuntu.com/4416-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-11868: ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block…
Published: 2020-04-17T04:15:00 Last Modified: 2021-07-21T11:39:00
Summary
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.
Common Weakness Enumeration (CWE): CWE-346: Origin Validation Error
CWE Description: The software does not properly verify that the source of data or communication is valid.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-11868 vulnerability.
References
- http://support.ntp.org/bin/view/Main/NtpBug3592
- https://bugzilla.redhat.com/show_bug.cgi?id=1716665
- https://security.netapp.com/advisory/ntap-20200424-0002/
- https://lists.debian.org/debian-lts-announce/2020/05/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00044.html
- https://security.gentoo.org/glsa/202007-12
- https://www.oracle.com//security-alerts/cpujul2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-1730: A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR…
Published: 2020-04-13T19:15:00 Last Modified: 2021-09-14T13:39:00
Summary
A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn’t been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-1730 vulnerability.
References
- https://www.libssh.org/security/advisories/CVE-2020-1730.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1730
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VLSWHBQ3EPKGTGLQNH554Z746BJ3C554/
- https://usn.ubuntu.com/4327-1/
- https://security.netapp.com/advisory/ntap-20200424-0001/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2A7BIFKUYIYKTY7FX4BEWVC2OHS5DPOU/
- https://www.oracle.com/security-alerts/cpuoct2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-11669: An issue was discovered in the Linux kernel before 5.2 on the powerpc platform….
Published: 2020-04-10T15:15:00 Last Modified: 2020-05-28T15:15:00
Summary
An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-11669 vulnerability.
References
- https://github.com/torvalds/linux/commit/53a712bae5dd919521a58d7bad773b949358add0
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=53a712bae5dd919521a58d7bad773b949358add0
- https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208660.html
- https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208661.html
- https://access.redhat.com/errata/RHSA-2019:3517
- https://lists.ozlabs.org/pipermail/linuxppc-dev/2020-April/208663.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
- https://security.netapp.com/advisory/ntap-20200430-0001/
- https://usn.ubuntu.com/4368-1/
- https://usn.ubuntu.com/4363-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-2732: A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2…
Published: 2020-04-08T22:15:00 Last Modified: 2020-06-10T20:15:00
Summary
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 4.4
- CVSS: 2.3
- CVSS Vector: AV:A/AC:M/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2020-2732 vulnerability.
References
- https://www.spinics.net/lists/kvm/msg208259.html
- https://linux.oracle.com/errata/ELSA-2020-5540.html
- https://linux.oracle.com/errata/ELSA-2020-5542.html
- https://www.openwall.com/lists/oss-security/2020/02/25/3
- https://git.kernel.org/linus/35a571346a94fb93b5b3b6a599675ef3384bc75c
- https://bugzilla.redhat.com/show_bug.cgi?id=1805135
- https://linux.oracle.com/errata/ELSA-2020-5543.html
- https://git.kernel.org/linus/07721feee46b4b248402133228235318199b05ec
- https://git.kernel.org/linus/e71237d3ff1abf9f3388337cfebf53b96df2020d
- https://www.debian.org/security/2020/dsa-4667
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://www.debian.org/security/2020/dsa-4698
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10696: A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an…
Published: 2020-03-31T22:15:00 Last Modified: 2020-04-01T13:18:00
Summary
A path traversal flaw was found in Buildah in versions before 1.14.5. This flaw allows an attacker to trick a user into building a malicious container image hosted on an HTTP(s) server and then write files to the user’s system anywhere that the user has permissions.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-10696 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10696
- https://github.com/containers/buildah/pull/2245
- https://access.redhat.com/security/cve/cve-2020-10696
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-1712: A heap use-after-free vulnerability was found in systemd before version v245-rc1, where…
Published: 2020-03-31T17:15:00 Last Modified: 2022-01-28T21:24:00
Summary
A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2020-1712 vulnerability.
References
- https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2
- https://www.openwall.com/lists/oss-security/2020/02/05/1
- https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712
- https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb
- https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10179: A vulnerability was found in all pki-core 10.x.x versions, where the Key Recovery Authority (KRA)…
Published: 2020-03-20T15:15:00 Last Modified: 2020-03-25T14:15:00
Summary
A vulnerability was found in all pki-core 10.x.x versions, where the Key Recovery Authority (KRA) Agent Service did not properly sanitize recovery request search page, enabling a Reflected Cross Site Scripting (XSS) vulnerability. An attacker could trick an authenticated victim into executing specially crafted Javascript code.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10179 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10221: A Reflected Cross Site Scripting vulnerability was found in all pki-core 10.x.x versions, where…
Published: 2020-03-20T15:15:00 Last Modified: 2020-03-25T14:09:00
Summary
A Reflected Cross Site Scripting vulnerability was found in all pki-core 10.x.x versions, where the pki-ca module from the pki-core server. This flaw is caused by missing sanitization of the GET URL parameters. An attacker could abuse this flaw to trick an authenticated user into clicking a specially crafted link which can execute arbitrary code when viewed in a browser.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10221 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10146: A Reflected Cross Site Scripting flaw was found in all pki-core 10.x.x versions module from the…
Published: 2020-03-18T15:15:00 Last Modified: 2020-03-20T17:29:00
Summary
A Reflected Cross Site Scripting flaw was found in all pki-core 10.x.x versions module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page. An attacker could inject a specially crafted value that will be executed on the victim’s browser.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10146 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-1720: A flaw was found in PostgreSQL’s “ALTER … DEPENDS ON EXTENSION”, where sub-commands did not…
Published: 2020-03-17T16:15:00 Last Modified: 2020-10-15T13:28:00
Summary
A flaw was found in PostgreSQL’s “ALTER … DEPENDS ON EXTENSION”, where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function, triggers, et al., leading to database corruption. This issue affects PostgreSQL versions before 12.2, before 11.7, before 10.12 and before 9.6.17.
Common Weakness Enumeration (CWE): CWE-862: Missing Authorization
CWE Description: The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-1720 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1720
- https://www.postgresql.org/about/news/2011/
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-10531: An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An…
Published: 2020-03-12T19:15:00 Last Modified: 2021-07-21T11:39:00
Summary
An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-10531 vulnerability.
References
- https://github.com/unicode-org/icu/pull/971
- https://chromium.googlesource.com/chromium/deps/icu/+/9f4020916eb1f28f3666f018fdcbe6c9a37f0e08
- https://unicode-org.atlassian.net/browse/ICU-20958
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html
- https://bugs.chromium.org/p/chromium/issues/detail?id=1044570
- https://github.com/unicode-org/icu/commit/b7d08bc04a4296982fcef8b6b8a354a9e4e7afca
- https://access.redhat.com/errata/RHSA-2020:0738
- https://security.gentoo.org/glsa/202003-15
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
- https://lists.debian.org/debian-lts-announce/2020/03/msg00024.html
- https://www.debian.org/security/2020/dsa-4646
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
- https://usn.ubuntu.com/4305-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00004.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-4650: The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL…
Published: 2020-02-20T17:15:00 Last Modified: 2020-02-26T13:49:00
Summary
The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2014-4650 vulnerability.
References
- http://bugs.python.org/issue21766
- http://openwall.com/lists/oss-security/2014/06/26/3
- https://access.redhat.com/security/cve/cve-2014-4650
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8089: SQL injection vulnerability in Zend Framework before 1.12.9, 2.2.x before 2.2.8, and 2.3.x before…
Published: 2020-02-17T22:15:00 Last Modified: 2020-02-20T15:04:00
Summary
SQL injection vulnerability in Zend Framework before 1.12.9, 2.2.x before 2.2.8, and 2.3.x before 2.3.3, when using the sqlsrv PHP extension, allows remote attackers to execute arbitrary SQL commands via a null byte.
Common Weakness Enumeration (CWE): CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
CWE Description: The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8089 vulnerability.
References
- http://www.securityfocus.com/bid/70011
- https://bugzilla.redhat.com/show_bug.cgi?id=1151277
- http://framework.zend.com/security/advisory/ZF2014-06
- http://seclists.org/oss-sec/2014/q4/276
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-3757: Adobe Flash Player versions 32.0.0.321 and earlier, 32.0.0.314 and earlier, 32.0.0.321 and…
Published: 2020-02-13T16:15:00 Last Modified: 2021-09-16T13:16:00
Summary
Adobe Flash Player versions 32.0.0.321 and earlier, 32.0.0.314 and earlier, 32.0.0.321 and earlier, and 32.0.0.255 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-843: Access of Resource Using Incompatible Type (‘Type Confusion’)
CWE Description: The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-3757 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb20-06.html
- https://access.redhat.com/errata/RHSA-2020:0513
- https://security.gentoo.org/glsa/202003-61
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-1711: An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU…
Published: 2020-02-11T20:15:00 Last Modified: 2021-08-04T17:14:00
Summary
An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 6.8
- CVSS: 6.0
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-1711 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1711
- https://www.openwall.com/lists/oss-security/2020/01/23/3
- https://lists.gnu.org/archive/html/qemu-devel/2020-01/msg05535.html
- https://usn.ubuntu.com/4283-1/
- https://access.redhat.com/errata/RHSA-2020:0669
- https://access.redhat.com/errata/RHSA-2020:0730
- https://access.redhat.com/errata/RHSA-2020:0731
- https://access.redhat.com/errata/RHSA-2020:0773
- https://lists.debian.org/debian-lts-announce/2020/03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00007.html
- https://security.gentoo.org/glsa/202005-02
- https://lists.debian.org/debian-lts-announce/2020/09/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-1726: A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite…
Published: 2020-02-11T20:15:00 Last Modified: 2020-09-28T15:15:00
Summary
A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.
Common Weakness Enumeration (CWE): CWE-552: Files or Directories Accessible to External Parties
CWE Description: The product makes files or directories accessible to unauthorized actors, even though they should not be.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-1726 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1726
- https://access.redhat.com/errata/RHSA-2020:0680
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00097.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00103.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2009-4067: Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux…
Published: 2020-02-11T19:15:00 Last Modified: 2020-02-12T21:42:00
Summary
Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2009-4067 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=722393
- http://labs.mwrinfosecurity.com/files/Advisories/mwri_linux-usb-buffer-overflow_2009-10-29.pdf
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4535: The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers…
Published: 2020-02-11T16:15:00 Last Modified: 2020-02-13T00:25:00
Summary
The virtqueue_map_sg function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary files via a crafted savevm image, related to virtio-block or virtio-serial read.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-4535 vulnerability.
References
- http://git.qemu.org/?p=qemu.git;a=commitdiff;h=36cf2a37132c7f01fa9adb5f95f5312b27742fd4
- http://rhn.redhat.com/errata/RHSA-2014-0744.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1066401
- http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html
- http://rhn.redhat.com/errata/RHSA-2014-0743.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-6402: Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87…
Published: 2020-02-11T15:15:00 Last Modified: 2021-09-16T13:16:00
Summary
Insufficient policy enforcement in downloads in Google Chrome on OS X prior to 80.0.3987.87 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-6402 vulnerability.
References
- https://crbug.com/1029375
- https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html
- https://access.redhat.com/errata/RHSA-2020:0514
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html
- https://www.debian.org/security/2020/dsa-4638
- https://security.gentoo.org/glsa/202003-08
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3B5RWJQD5LA45MYLLR55KZJOJ5NVZGP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4512: The CSS parser (khtml/css/cssparser.cpp) in Konqueror in KDE 4.7.3 allows remote attackers to…
Published: 2020-02-08T19:15:00 Last Modified: 2020-02-14T16:39:00
Summary
The CSS parser (khtml/css/cssparser.cpp) in Konqueror in KDE 4.7.3 allows remote attackers to cause a denial of service (crash) and possibly read memory via a crafted font face source, related to “type confusion.”
Common Weakness Enumeration (CWE): CWE-843: Access of Resource Using Incompatible Type (‘Type Confusion’)
CWE Description: The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2012-4512 vulnerability.
References
- http://secunia.com/advisories/51097
- http://em386.blogspot.com/2010/12/webkit-css-type-confusion.html
- http://quickgit.kde.org/index.php?p=kdelibs.git&a=commitdiff&h=a872c8a969a8bd3706253d6ba24088e4f07f3352
- http://rhn.redhat.com/errata/RHSA-2012-1418.html
- http://www.openwall.com/lists/oss-security/2012/10/11/11
- http://www.securitytracker.com/id?1027709
- http://www.openwall.com/lists/oss-security/2012/10/30/6
- http://rhn.redhat.com/errata/RHSA-2012-1416.html
- http://www.nth-dimension.org.uk/pub/NDSA20121010.txt.asc
- http://archives.neohapsis.com/archives/bugtraq/2012-11/0005.html
- http://secunia.com/advisories/51145
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5741: The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP…
Published: 2020-02-08T19:15:00 Last Modified: 2021-08-04T17:15:00
Summary
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request that contains Content-Length and Transfer-Encoding header fields.
Common Weakness Enumeration (CWE): CWE-444: Inconsistent Interpretation of HTTP Requests (‘HTTP Request Smuggling’)
CWE Description: When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to “smuggle” a request to one device without the other device being aware of it.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5741 vulnerability.
References
- https://github.com/golang/go/commit/300d9a21583e7cf0149a778a0611e76ff7c6680f
- http://seclists.org/oss-sec/2015/q3/292
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168029.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1250352
- http://seclists.org/oss-sec/2015/q3/237
- http://seclists.org/oss-sec/2015/q3/294
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167997.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-15606: Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of…
Published: 2020-02-07T15:15:00 Last Modified: 2021-07-20T23:15:00
Summary
Including trailing white space in HTTP header values in Nodejs 10, 12, and 13 causes bypass of authorization based on header value comparisons
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-15606 vulnerability.
References
- https://nodejs.org/en/blog/release/v13.8.0/
- https://hackerone.com/reports/730779
- https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/
- https://nodejs.org/en/blog/release/v10.19.0/
- https://nodejs.org/en/blog/release/v12.15.0/
- https://access.redhat.com/errata/RHSA-2020:0573
- https://security.netapp.com/advisory/ntap-20200221-0004/
- https://access.redhat.com/errata/RHSA-2020:0579
- https://access.redhat.com/errata/RHSA-2020:0598
- https://access.redhat.com/errata/RHSA-2020:0597
- https://access.redhat.com/errata/RHSA-2020:0602
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00008.html
- https://security.gentoo.org/glsa/202003-48
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.debian.org/security/2020/dsa-4669
- https://www.oracle.com//security-alerts/cpujul2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4166: The gpg_ctx_add_recipient function in camel/camel-gpg-context.c in GNOME Evolution 3.8.4 and…
Published: 2020-02-06T15:15:00 Last Modified: 2020-02-10T18:47:00
Summary
The gpg_ctx_add_recipient function in camel/camel-gpg-context.c in GNOME Evolution 3.8.4 and earlier and Evolution Data Server 3.9.5 and earlier does not properly select the GPG key to use for email encryption, which might cause the email to be encrypted with the wrong key and allow remote attackers to obtain sensitive information.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4166 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2013-1540.html
- https://git.gnome.org/browse/evolution-data-server/commit/?id=5d8b92c622f6927b253762ff9310479dd3ac627d
- https://git.gnome.org/browse/evolution-data-server/commit/?h=gnome-3-8&id=f7059bb37dcce485d36d769142ec9515708d8ae5
- https://bugzilla.redhat.com/show_bug.cgi?id=973728
- http://seclists.org/oss-sec/2013/q3/191
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8141: Heap-based buffer overflow in the getZip64Data function in Info-ZIP UnZip 6.0 and earlier allows…
Published: 2020-01-31T23:15:00 Last Modified: 2020-02-05T21:26:00
Summary
Heap-based buffer overflow in the getZip64Data function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8141 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1174856
- http://www.securitytracker.com/id/1031433
- http://www.ocert.org/advisories/ocert-2014-011.html
- https://access.redhat.com/errata/RHSA-2015:0700
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-6815: The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process…
Published: 2020-01-31T22:15:00 Last Modified: 2021-11-30T19:50:00
Summary
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.1
- CVSS: 2.7
- CVSS Vector: AV:A/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2015-6815 vulnerability.
References
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00011.html
- http://www.openwall.com/lists/oss-security/2015/09/04/4
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg01199.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00005.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168077.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168646.html
- http://www.ubuntu.com/usn/USN-2745-1
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168671.html
- http://www.openwall.com/lists/oss-security/2015/09/05/5
- https://bugzilla.redhat.com/show_bug.cgi?id=1260076
- https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8140: Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier allows…
Published: 2020-01-31T22:15:00 Last Modified: 2020-02-05T20:40:00
Summary
Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8140 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1174851
- http://www.securitytracker.com/id/1031433
- http://www.ocert.org/advisories/ocert-2014-011.html
- https://access.redhat.com/errata/RHSA-2015:0700
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8139: Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows…
Published: 2020-01-31T22:15:00 Last Modified: 2020-02-05T20:50:00
Summary
Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8139 vulnerability.
References
- http://www.securitytracker.com/id/1031433
- http://www.ocert.org/advisories/ocert-2014-011.html
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174844
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-4088: ABRT might allow attackers to obtain sensitive information from crash reports.
Published: 2020-01-31T17:15:00 Last Modified: 2020-02-05T19:01:00
Summary
ABRT might allow attackers to obtain sensitive information from crash reports.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-4088 vulnerability.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2011-December/071027.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/71871
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0294: GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a…
Published: 2020-01-27T16:15:00 Last Modified: 2020-01-31T15:24:00
Summary
GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.
Common Weakness Enumeration (CWE): CWE-295: Improper Certificate Validation
CWE Description: The software does not validate, or incorrectly validates, a certificate.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0294 vulnerability.
References
- http://www.debian.org/security/2015/dsa-3191
- https://bugzilla.redhat.com/show_bug.cgi?id=1196323
- https://gitlab.com/gnutls/gnutls/commit/6e76e9b9fa845b76b0b9a45f05f4b54a052578ff
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14907: All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an…
Published: 2020-01-21T18:15:00 Last Modified: 2021-05-29T13:15:00
Summary
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with “log level = 3” (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-14907 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2019-14907.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907
- https://security.netapp.com/advisory/ntap-20200122-0001/
- https://www.synology.com/security/advisory/Synology_SA_20_01
- https://usn.ubuntu.com/4244-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/
- https://security.gentoo.org/glsa/202003-52
- https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19339: It was found that the Red Hat Enterprise Linux 8 kpatch update did not include the complete fix…
Published: 2020-01-17T19:15:00 Last Modified: 2020-10-19T19:52:00
Summary
It was found that the Red Hat Enterprise Linux 8 kpatch update did not include the complete fix for CVE-2018-12207. A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU’s local cache and system software’s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor. System software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor’s Memory Management Unit (MMU) uses Paging structure entries to translate program’s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses. System software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor’s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-19339 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-2604: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component:…
Published: 2020-01-15T17:15:00 Last Modified: 2021-07-21T11:39:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Common Weakness Enumeration (CWE): CWE-502: Deserialization of Untrusted Data
CWE Description: The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-2604 vulnerability.
References
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://access.redhat.com/errata/RHSA-2020:0122
- https://access.redhat.com/errata/RHSA-2020:0128
- https://access.redhat.com/errata/RHSA-2020:0196
- https://security.netapp.com/advisory/ntap-20200122-0003/
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
- https://access.redhat.com/errata/RHSA-2020:0202
- https://access.redhat.com/errata/RHSA-2020:0232
- https://access.redhat.com/errata/RHSA-2020:0231
- https://usn.ubuntu.com/4257-1/
- https://access.redhat.com/errata/RHSA-2020:0470
- https://access.redhat.com/errata/RHSA-2020:0467
- https://access.redhat.com/errata/RHSA-2020:0465
- https://access.redhat.com/errata/RHSA-2020:0468
- https://access.redhat.com/errata/RHSA-2020:0469
- https://www.debian.org/security/2020/dsa-4621
- https://seclists.org/bugtraq/2020/Feb/22
- https://access.redhat.com/errata/RHSA-2020:0541
- https://access.redhat.com/errata/RHSA-2020:0632
- https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10315
- https://security.gentoo.org/glsa/202101-19
- https://www.oracle.com/security-alerts/cpujul2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-2601: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security)….
Published: 2020-01-15T17:15:00 Last Modified: 2021-03-04T20:49:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-2601 vulnerability.
References
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://access.redhat.com/errata/RHSA-2020:0122
- https://access.redhat.com/errata/RHSA-2020:0128
- https://www.debian.org/security/2020/dsa-4605
- https://seclists.org/bugtraq/2020/Jan/24
- https://access.redhat.com/errata/RHSA-2020:0157
- https://access.redhat.com/errata/RHSA-2020:0196
- https://security.netapp.com/advisory/ntap-20200122-0003/
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
- https://access.redhat.com/errata/RHSA-2020:0202
- https://access.redhat.com/errata/RHSA-2020:0232
- https://access.redhat.com/errata/RHSA-2020:0231
- https://usn.ubuntu.com/4257-1/
- https://www.debian.org/security/2020/dsa-4621
- https://seclists.org/bugtraq/2020/Feb/22
- https://access.redhat.com/errata/RHSA-2020:0541
- https://access.redhat.com/errata/RHSA-2020:0632
- https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
- https://security.gentoo.org/glsa/202101-19
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-2654: Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions…
Published: 2020-01-15T17:15:00 Last Modified: 2021-03-04T20:47:00
Summary
Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-2654 vulnerability.
References
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://access.redhat.com/errata/RHSA-2020:0122
- https://access.redhat.com/errata/RHSA-2020:0128
- https://www.debian.org/security/2020/dsa-4605
- https://seclists.org/bugtraq/2020/Jan/24
- https://access.redhat.com/errata/RHSA-2020:0157
- https://access.redhat.com/errata/RHSA-2020:0196
- https://security.netapp.com/advisory/ntap-20200122-0003/
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
- https://access.redhat.com/errata/RHSA-2020:0202
- https://access.redhat.com/errata/RHSA-2020:0232
- https://access.redhat.com/errata/RHSA-2020:0231
- https://usn.ubuntu.com/4257-1/
- https://www.debian.org/security/2020/dsa-4621
- https://seclists.org/bugtraq/2020/Feb/22
- https://access.redhat.com/errata/RHSA-2020:0541
- https://access.redhat.com/errata/RHSA-2020:0632
- https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10315
- https://security.gentoo.org/glsa/202101-19
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-2590: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security)….
Published: 2020-01-15T17:15:00 Last Modified: 2021-02-26T19:38:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-2590 vulnerability.
References
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://access.redhat.com/errata/RHSA-2020:0122
- https://access.redhat.com/errata/RHSA-2020:0128
- https://www.debian.org/security/2020/dsa-4605
- https://seclists.org/bugtraq/2020/Jan/24
- https://access.redhat.com/errata/RHSA-2020:0157
- https://access.redhat.com/errata/RHSA-2020:0196
- https://security.netapp.com/advisory/ntap-20200122-0003/
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
- https://access.redhat.com/errata/RHSA-2020:0202
- https://access.redhat.com/errata/RHSA-2020:0232
- https://access.redhat.com/errata/RHSA-2020:0231
- https://usn.ubuntu.com/4257-1/
- https://www.debian.org/security/2020/dsa-4621
- https://seclists.org/bugtraq/2020/Feb/22
- https://access.redhat.com/errata/RHSA-2020:0541
- https://access.redhat.com/errata/RHSA-2020:0632
- https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10315
- https://security.gentoo.org/glsa/202101-19
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-2659: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking)….
Published: 2020-01-15T17:15:00 Last Modified: 2021-12-06T15:07:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241 and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-2659 vulnerability.
References
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://access.redhat.com/errata/RHSA-2020:0157
- https://access.redhat.com/errata/RHSA-2020:0196
- https://security.netapp.com/advisory/ntap-20200122-0003/
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
- https://access.redhat.com/errata/RHSA-2020:0202
- https://access.redhat.com/errata/RHSA-2020:0231
- https://usn.ubuntu.com/4257-1/
- https://access.redhat.com/errata/RHSA-2020:0470
- https://access.redhat.com/errata/RHSA-2020:0467
- https://access.redhat.com/errata/RHSA-2020:0465
- https://access.redhat.com/errata/RHSA-2020:0468
- https://access.redhat.com/errata/RHSA-2020:0469
- https://www.debian.org/security/2020/dsa-4621
- https://seclists.org/bugtraq/2020/Feb/22
- https://access.redhat.com/errata/RHSA-2020:0541
- https://access.redhat.com/errata/RHSA-2020:0632
- https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
- https://security.gentoo.org/glsa/202101-19
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-2593: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking)….
Published: 2020-01-15T17:15:00 Last Modified: 2021-03-04T21:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-2593 vulnerability.
References
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://access.redhat.com/errata/RHSA-2020:0122
- https://access.redhat.com/errata/RHSA-2020:0128
- https://www.debian.org/security/2020/dsa-4605
- https://seclists.org/bugtraq/2020/Jan/24
- https://access.redhat.com/errata/RHSA-2020:0157
- https://access.redhat.com/errata/RHSA-2020:0196
- https://security.netapp.com/advisory/ntap-20200122-0003/
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
- https://access.redhat.com/errata/RHSA-2020:0202
- https://access.redhat.com/errata/RHSA-2020:0232
- https://access.redhat.com/errata/RHSA-2020:0231
- https://usn.ubuntu.com/4257-1/
- https://access.redhat.com/errata/RHSA-2020:0470
- https://access.redhat.com/errata/RHSA-2020:0467
- https://access.redhat.com/errata/RHSA-2020:0465
- https://access.redhat.com/errata/RHSA-2020:0468
- https://access.redhat.com/errata/RHSA-2020:0469
- https://www.debian.org/security/2020/dsa-4621
- https://seclists.org/bugtraq/2020/Feb/22
- https://access.redhat.com/errata/RHSA-2020:0541
- https://access.redhat.com/errata/RHSA-2020:0632
- https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10315
- https://security.gentoo.org/glsa/202101-19
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-2655: Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that…
Published: 2020-01-15T17:15:00 Last Modified: 2020-01-28T13:15:00
Summary
Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-2655 vulnerability.
References
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://access.redhat.com/errata/RHSA-2020:0122
- https://access.redhat.com/errata/RHSA-2020:0128
- https://www.debian.org/security/2020/dsa-4605
- https://seclists.org/bugtraq/2020/Jan/24
- https://security.netapp.com/advisory/ntap-20200122-0003/
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
- https://access.redhat.com/errata/RHSA-2020:0232
- https://usn.ubuntu.com/4257-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-2583: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component:…
Published: 2020-01-15T17:15:00 Last Modified: 2021-07-21T11:39:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Common Weakness Enumeration (CWE): CWE-755: Improper Handling of Exceptional Conditions
CWE Description: The software does not handle or incorrectly handles an exceptional condition.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-2583 vulnerability.
References
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://access.redhat.com/errata/RHSA-2020:0122
- https://access.redhat.com/errata/RHSA-2020:0128
- https://www.debian.org/security/2020/dsa-4605
- https://seclists.org/bugtraq/2020/Jan/24
- https://access.redhat.com/errata/RHSA-2020:0157
- https://access.redhat.com/errata/RHSA-2020:0196
- https://security.netapp.com/advisory/ntap-20200122-0003/
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
- https://access.redhat.com/errata/RHSA-2020:0202
- https://access.redhat.com/errata/RHSA-2020:0232
- https://access.redhat.com/errata/RHSA-2020:0231
- https://usn.ubuntu.com/4257-1/
- https://access.redhat.com/errata/RHSA-2020:0470
- https://access.redhat.com/errata/RHSA-2020:0467
- https://access.redhat.com/errata/RHSA-2020:0465
- https://access.redhat.com/errata/RHSA-2020:0468
- https://access.redhat.com/errata/RHSA-2020:0469
- https://www.debian.org/security/2020/dsa-4621
- https://seclists.org/bugtraq/2020/Feb/22
- https://access.redhat.com/errata/RHSA-2020:0541
- https://access.redhat.com/errata/RHSA-2020:0632
- https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10315
- https://security.gentoo.org/glsa/202101-19
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-0602: A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka…
Published: 2020-01-14T23:15:00 Last Modified: 2021-07-21T11:39:00
Summary
A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka ‘ASP.NET Core Denial of Service Vulnerability’.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-0602 vulnerability.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0602
- https://access.redhat.com/errata/RHSA-2020:0130
- https://access.redhat.com/errata/RHSA-2020:0134
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-0603: A remote code execution vulnerability exists in ASP.NET Core software when the software fails to…
Published: 2020-01-14T23:15:00 Last Modified: 2021-07-21T11:39:00
Summary
A remote code execution vulnerability exists in ASP.NET Core software when the software fails to handle objects in memory.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka ‘ASP.NET Core Remote Code Execution Vulnerability’.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-0603 vulnerability.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0603
- https://access.redhat.com/errata/RHSA-2020:0130
- https://access.redhat.com/errata/RHSA-2020:0134
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3147: daemon/abrt-handle-upload.in in Automatic Bug Reporting Tool (ABRT), when moving problem reports…
Published: 2020-01-14T18:15:00 Last Modified: 2020-01-21T15:47:00
Summary
daemon/abrt-handle-upload.in in Automatic Bug Reporting Tool (ABRT), when moving problem reports from /var/spool/abrt-upload, allows local users to write to arbitrary files or possibly have other unspecified impact via a symlink attack on (1) /var/spool/abrt or (2) /var/tmp/abrt.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 4.9
- Exploitability Score: 6.8
- CVSS: 4.9
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3147 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1212953
- http://rhn.redhat.com/errata/RHSA-2015-1083.html
- http://www.openwall.com/lists/oss-security/2015/04/17/5
- https://github.com/abrt/abrt/pull/955
- https://github.com/abrt/abrt/commit/3746b7627218438ae7d781fc8b18a221454e9091
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-7844: BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted…
Published: 2020-01-14T17:15:00 Last Modified: 2020-01-21T16:05:00
Summary
BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.
Common Weakness Enumeration (CWE): CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)
CWE Description: The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-7844 vulnerability.
References
- http://www.debian.org/security/2014/dsa-3104
- http://www.debian.org/security/2014/dsa-3105
- http://seclists.org/oss-sec/2014/q4/1066
- http://linux.oracle.com/errata/ELSA-2014-1999.html
- http://rhn.redhat.com/errata/RHSA-2014-1999.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2020-6377: Use after free in audio in Google Chrome prior to 79.0.3945.117 allowed a remote attacker to…
Published: 2020-01-10T22:15:00 Last Modified: 2021-07-21T11:39:00
Summary
Use after free in audio in Google Chrome prior to 79.0.3945.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2020-6377 vulnerability.
References
- https://crbug.com/1029462
- https://chromereleases.googleblog.com/2020/01/stable-channel-update-for-desktop.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PSUXNEUS6N42UJNQVCQSTSM6CSW2REPG/
- https://access.redhat.com/errata/RHSA-2020:0084
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
- https://seclists.org/bugtraq/2020/Jan/27
- https://www.debian.org/security/2020/dsa-4606
- https://security.gentoo.org/glsa/202003-08
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-2142: The error function in Error.cc in poppler before 0.21.4 allows remote attackers to execute…
Published: 2020-01-09T21:15:00 Last Modified: 2020-01-15T18:30:00
Summary
The error function in Error.cc in poppler before 0.21.4 allows remote attackers to execute arbitrary commands via a PDF containing an escape sequence for a terminal emulator.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-2142 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2013/08/09/5
- https://bugzilla.redhat.com/show_bug.cgi?id=789936
- http://www.openwall.com/lists/oss-security/2013/08/09/6
- http://cgit.freedesktop.org/poppler/poppler/commit/?id=71bad47ed6a36d825b0d08992c8db56845c71e40
- http://cgit.freedesktop.org/poppler/poppler/commit/NEWS?id=2bc48d5369f1dbecfc4db2878f33bdeb80d8d90f
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00049.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19332: An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in…
Published: 2020-01-09T15:15:00 Last Modified: 2020-03-13T14:15:00
Summary
An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel’s KVM hypervisor handled the ‘KVM_GET_EMULATED_CPUID’ ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the ‘/dev/kvm’ device could use this flaw to crash the system, resulting in a denial of service.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 7.8
- Exploitability Score: 3.9
- CVSS: 5.6
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-19332 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2019/12/16/1
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19332
- https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://usn.ubuntu.com/4254-1/
- https://usn.ubuntu.com/4254-2/
- https://security.netapp.com/advisory/ntap-20200204-0002/
- https://usn.ubuntu.com/4258-1/
- https://usn.ubuntu.com/4287-1/
- https://usn.ubuntu.com/4287-2/
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- https://usn.ubuntu.com/4284-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-17016: When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer…
Published: 2020-01-08T22:15:00 Last Modified: 2020-01-13T20:15:00
Summary
When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer incorrectly rewrites a @namespace rule. This could allow for injection into certain types of websites resulting in data exfiltration. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-17016 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1599181
- https://www.mozilla.org/security/advisories/mfsa2020-01/
- https://www.mozilla.org/security/advisories/mfsa2020-02/
- https://seclists.org/bugtraq/2020/Jan/12
- https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html
- https://www.debian.org/security/2020/dsa-4600
- https://usn.ubuntu.com/4234-1/
- https://seclists.org/bugtraq/2020/Jan/18
- https://access.redhat.com/errata/RHSA-2020:0086
- https://access.redhat.com/errata/RHSA-2020:0085
- http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html
- https://access.redhat.com/errata/RHSA-2020:0111
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:0123
- https://access.redhat.com/errata/RHSA-2020:0120
- https://access.redhat.com/errata/RHSA-2020:0127
- https://usn.ubuntu.com/4241-1/
- https://www.debian.org/security/2020/dsa-4603
- https://seclists.org/bugtraq/2020/Jan/26
- https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html
- https://access.redhat.com/errata/RHSA-2020:0295
- https://access.redhat.com/errata/RHSA-2020:0292
- https://security.gentoo.org/glsa/202003-02
- https://usn.ubuntu.com/4335-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-17017: Due to a missing case handling object types, a type confusion vulnerability could occur,…
Published: 2020-01-08T22:15:00 Last Modified: 2020-01-13T20:15:00
Summary
Due to a missing case handling object types, a type confusion vulnerability could occur, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
Common Weakness Enumeration (CWE): CWE-843: Access of Resource Using Incompatible Type (‘Type Confusion’)
CWE Description: The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-17017 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1603055
- https://www.mozilla.org/security/advisories/mfsa2020-01/
- https://www.mozilla.org/security/advisories/mfsa2020-02/
- https://seclists.org/bugtraq/2020/Jan/12
- https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html
- https://www.debian.org/security/2020/dsa-4600
- https://usn.ubuntu.com/4234-1/
- https://seclists.org/bugtraq/2020/Jan/18
- https://access.redhat.com/errata/RHSA-2020:0086
- https://access.redhat.com/errata/RHSA-2020:0085
- http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html
- https://access.redhat.com/errata/RHSA-2020:0111
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:0123
- https://access.redhat.com/errata/RHSA-2020:0120
- https://access.redhat.com/errata/RHSA-2020:0127
- https://usn.ubuntu.com/4241-1/
- https://www.debian.org/security/2020/dsa-4603
- https://seclists.org/bugtraq/2020/Jan/26
- https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html
- https://access.redhat.com/errata/RHSA-2020:0295
- https://access.redhat.com/errata/RHSA-2020:0292
- https://security.gentoo.org/glsa/202003-02
- https://usn.ubuntu.com/4335-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-17022: When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer…
Published: 2020-01-08T22:15:00 Last Modified: 2020-01-13T20:15:00
Summary
When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer does not escape < and > characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node’s innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-17022 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1602843
- https://www.mozilla.org/security/advisories/mfsa2020-01/
- https://www.mozilla.org/security/advisories/mfsa2020-02/
- https://seclists.org/bugtraq/2020/Jan/12
- https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html
- https://www.debian.org/security/2020/dsa-4600
- https://usn.ubuntu.com/4234-1/
- https://seclists.org/bugtraq/2020/Jan/18
- https://access.redhat.com/errata/RHSA-2020:0086
- https://access.redhat.com/errata/RHSA-2020:0085
- http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html
- https://access.redhat.com/errata/RHSA-2020:0111
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:0123
- https://access.redhat.com/errata/RHSA-2020:0120
- https://access.redhat.com/errata/RHSA-2020:0127
- https://usn.ubuntu.com/4241-1/
- https://www.debian.org/security/2020/dsa-4603
- https://seclists.org/bugtraq/2020/Jan/26
- https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html
- https://access.redhat.com/errata/RHSA-2020:0295
- https://access.redhat.com/errata/RHSA-2020:0292
- https://security.gentoo.org/glsa/202003-02
- https://usn.ubuntu.com/4335-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-17024: Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some…
Published: 2020-01-08T22:15:00 Last Modified: 2021-07-21T11:39:00
Summary
Mozilla developers reported memory safety bugs present in Firefox 71 and Firefox ESR 68.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-17024 vulnerability.
References
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1507180%2C1595470%2C1598605%2C1601826
- https://www.mozilla.org/security/advisories/mfsa2020-01/
- https://www.mozilla.org/security/advisories/mfsa2020-02/
- https://seclists.org/bugtraq/2020/Jan/12
- https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html
- https://www.debian.org/security/2020/dsa-4600
- https://usn.ubuntu.com/4234-1/
- https://seclists.org/bugtraq/2020/Jan/18
- https://access.redhat.com/errata/RHSA-2020:0086
- https://access.redhat.com/errata/RHSA-2020:0085
- http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html
- https://access.redhat.com/errata/RHSA-2020:0111
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html
- https://access.redhat.com/errata/RHSA-2020:0123
- https://access.redhat.com/errata/RHSA-2020:0120
- https://access.redhat.com/errata/RHSA-2020:0127
- https://usn.ubuntu.com/4241-1/
- https://www.debian.org/security/2020/dsa-4603
- https://seclists.org/bugtraq/2020/Jan/26
- https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html
- https://access.redhat.com/errata/RHSA-2020:0295
- https://access.redhat.com/errata/RHSA-2020:0292
- https://security.gentoo.org/glsa/202003-02
- https://usn.ubuntu.com/4335-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-11745: When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller…
Published: 2020-01-08T20:15:00 Last Modified: 2021-02-19T17:22:00
Summary
When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-11745 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html
- https://usn.ubuntu.com/4241-1/
- https://access.redhat.com/errata/RHSA-2020:0243
- https://access.redhat.com/errata/RHSA-2020:0466
- https://security.gentoo.org/glsa/202003-02
- https://security.gentoo.org/glsa/202003-10
- https://security.gentoo.org/glsa/202003-37
- https://usn.ubuntu.com/4335-1/
- https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14906: A flaw was found with the RHSA-2019:3950 erratum, where it did not fix the CVE-2019-13616 SDL…
Published: 2020-01-07T21:15:00 Last Modified: 2021-04-05T12:29:00
Summary
A flaw was found with the RHSA-2019:3950 erratum, where it did not fix the CVE-2019-13616 SDL vulnerability. This issue only affects Red Hat SDL packages, SDL versions through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow flaw while copying an existing surface into a new optimized one, due to a lack of validation while loading a BMP image, is possible. An application that uses SDL to parse untrusted input files may be vulnerable to this flaw, which could allow an attacker to make the application crash or execute code.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-14906 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14866: In all versions of cpio before 2.13 does not properly validate input files when generating TAR…
Published: 2020-01-07T17:15:00 Last Modified: 2020-01-10T14:27:00
Summary
In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-14866 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14866
- https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg00003.html
- https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4451: Multiple cross-site scripting (XSS) vulnerabilities in Zend Framework 2.0.x before 2.0.1 allow…
Published: 2020-01-03T17:15:00 Last Modified: 2020-01-14T18:51:00
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Zend Framework 2.0.x before 2.0.1 allow remote attackers to inject arbitrary web script or HTML via unspecified input to (1) Debug, (2) Feed\PubSubHubbub, (3) Log\Formatter\Xml, (4) Tag\Cloud\Decorator, (5) Uri, (6) View\Helper\HeadStyle, (7) View\Helper\Navigation\Sitemap, or (8) View\Helper\Placeholder\Container\AbstractStandalone, related to Escaper.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4451 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=860738
- http://framework.zend.com/security/advisory/ZF2012-03
- https://github.com/zendframework/zf2/commit/27131ca9520bdf1d4c774c71459eba32f2b10733
- http://www.securityfocus.com/bid/55636
- http://seclists.org/oss-sec/2012/q3/571
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688946#10
- https://bugs.gentoo.org/show_bug.cgi?id=436210
- http://seclists.org/oss-sec/2012/q3/573
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14864: Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before…
Published: 2020-01-02T15:15:00 Last Modified: 2021-08-07T15:15:00
Summary
Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.
Common Weakness Enumeration (CWE): CWE-117: Improper Output Neutralization for Logs
CWE Description: The software does not neutralize or incorrectly neutralizes output that is written to logs.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-14864 vulnerability.
References
- https://github.com/ansible/ansible/pull/63527
- https://github.com/ansible/ansible/issues/63522
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html
- https://www.debian.org/security/2021/dsa-4950
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3585: Multiple race conditions in the (1) mount.cifs and (2) umount.cifs programs in Samba 3.6 allow…
Published: 2019-12-31T20:15:00 Last Modified: 2020-01-10T17:53:00
Summary
Multiple race conditions in the (1) mount.cifs and (2) umount.cifs programs in Samba 3.6 allow local users to cause a denial of service (mounting outage) via a SIGKILL signal during a time window when the /etc/mtab~ file exists.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-3585 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=742907
- https://www.openwall.com/lists/oss-security/2011/09/27/1
- https://git.samba.org/?p=cifs-utils.git;a=commitdiff;h=810f7e4e0f2dbcbee0294d9b371071cb08268200
- https://www.openwall.com/lists/oss-security/2011/09/30/5
- https://bugzilla.samba.org/show_bug.cgi?id=7179
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-18390: An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in…
Published: 2019-12-23T16:15:00 Last Modified: 2020-11-16T19:25:00
Summary
An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-18390 vulnerability.
References
- https://access.redhat.com/security/cve/cve-2019-18390
- https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=d2cdbcf6a8f2317f250fd54f08aa35dde2fa3e30#3cd772559e0d73afa136d6818023cfd0c4c8ecc0_0_151
- https://gitlab.freedesktop.org/virgl/virglrenderer/commit/24f67de7a9088a873844a39be03cee6882260ac9
- https://bugzilla.redhat.com/show_bug.cgi?id=1765584
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-18389: A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in…
Published: 2019-12-23T16:15:00 Last Modified: 2020-11-16T19:23:00
Summary
A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-18389 vulnerability.
References
- https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=9c280a28651507e6ef87b17b90d47b6af3a4ab7d
- https://gitlab.freedesktop.org/virgl/virglrenderer/commit/cbc8d8b75be360236cada63784046688aeb6d921
- https://bugzilla.redhat.com/show_bug.cgi?id=1765577
- https://access.redhat.com/security/cve/cve-2019-18389
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-18391: A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in…
Published: 2019-12-23T16:15:00 Last Modified: 2020-11-09T21:47:00
Summary
A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-18391 vulnerability.
References
- https://access.redhat.com/security/cve/cve-2019-18391
- https://bugzilla.redhat.com/show_bug.cgi?id=1765589
- https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=8c9cfb4e425542e96f0717189fe4658555baaf08
- https://gitlab.freedesktop.org/virgl/virglrenderer/commit/2abeb1802e3c005b17a7123e382171b3fb665971
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00028.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19340: A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.3, where…
Published: 2019-12-19T21:15:00 Last Modified: 2020-12-04T18:15:00
Summary
A flaw was found in Ansible Tower, versions 3.6.x before 3.6.2 and 3.5.x before 3.5.3, where enabling RabbitMQ manager by setting it with ‘-e rabbitmq_enable_manager=true’ exposes the RabbitMQ management interface publicly, as expected. If the default admin user is still active, an attacker could guess the password and gain access to the system.
Common Weakness Enumeration (CWE): CWE-1188: Insecure Default Initialization of Resource
CWE Description: The software initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-19340 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8506: A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T12:59:00
Summary
A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-843: Access of Resource Using Incompatible Type (‘Type Confusion’)
CWE Description: The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2019-8506 vulnerability.
References
- https://support.apple.com/HT209605
- https://support.apple.com/HT209604
- https://support.apple.com/HT209601
- https://support.apple.com/HT209603
- https://support.apple.com/HT209599
- https://support.apple.com/HT209602
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8684: Multiple memory corruption issues were addressed with improved memory handling. This issue is…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T13:03:00
Summary
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8684 vulnerability.
References
- https://support.apple.com/HT210348
- https://support.apple.com/HT210351
- https://support.apple.com/HT210358
- https://support.apple.com/HT210346
- https://support.apple.com/HT210357
- https://support.apple.com/HT210356
- https://support.apple.com/HT210355
- https://support.apple.com/HT210353
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8535: A memory corruption issue was addressed with improved state management. This issue is fixed in…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T12:59:00
Summary
A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8535 vulnerability.
References
- https://support.apple.com/HT209605
- https://support.apple.com/HT209604
- https://support.apple.com/HT209601
- https://support.apple.com/HT209603
- https://support.apple.com/HT209599
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8536: A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T12:59:00
Summary
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8536 vulnerability.
References
- https://support.apple.com/HT209605
- https://support.apple.com/HT209604
- https://support.apple.com/HT209601
- https://support.apple.com/HT209603
- https://support.apple.com/HT209599
- https://support.apple.com/HT209602
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8814: Multiple memory corruption issues were addressed with improved memory handling. This issue is…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T13:12:00
Summary
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8814 vulnerability.
References
- https://support.apple.com/HT210725
- https://support.apple.com/HT210726
- https://support.apple.com/HT210723
- https://support.apple.com/HT210721
- https://support.apple.com/HT210727
- https://support.apple.com/HT210728
- https://security.gentoo.org/glsa/202003-22
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8672: Multiple memory corruption issues were addressed with improved memory handling. This issue is…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T13:01:00
Summary
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2019-8672 vulnerability.
References
- https://support.apple.com/HT210348
- https://support.apple.com/HT210351
- https://support.apple.com/HT210358
- https://support.apple.com/HT210346
- https://support.apple.com/HT210357
- https://support.apple.com/HT210356
- https://support.apple.com/HT210355
- https://support.apple.com/HT210353
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8676: Multiple memory corruption issues were addressed with improved memory handling. This issue is…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T13:01:00
Summary
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8676 vulnerability.
References
- https://support.apple.com/HT210348
- https://support.apple.com/HT210351
- https://support.apple.com/HT210358
- https://support.apple.com/HT210346
- https://support.apple.com/HT210357
- https://support.apple.com/HT210356
- https://support.apple.com/HT210355
- https://support.apple.com/HT210353
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8688: Multiple memory corruption issues were addressed with improved memory handling. This issue is…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T13:08:00
Summary
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8688 vulnerability.
References
- https://support.apple.com/HT210348
- https://support.apple.com/HT210351
- https://support.apple.com/HT210358
- https://support.apple.com/HT210346
- https://support.apple.com/HT210357
- https://support.apple.com/HT210356
- https://support.apple.com/HT210355
- https://support.apple.com/HT210353
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8816: Multiple memory corruption issues were addressed with improved memory handling. This issue is…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T13:16:00
Summary
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8816 vulnerability.
References
- https://support.apple.com/HT210725
- https://support.apple.com/HT210726
- https://support.apple.com/HT210723
- https://support.apple.com/HT210724
- https://support.apple.com/HT210721
- https://support.apple.com/HT210727
- https://support.apple.com/HT210728
- https://security.gentoo.org/glsa/202003-22
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8669: Multiple memory corruption issues were addressed with improved memory handling. This issue is…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T13:01:00
Summary
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8669 vulnerability.
References
- https://support.apple.com/HT210348
- https://support.apple.com/HT210351
- https://support.apple.com/HT210358
- https://support.apple.com/HT210346
- https://support.apple.com/HT210357
- https://support.apple.com/HT210356
- https://support.apple.com/HT210355
- https://support.apple.com/HT210353
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8544: A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T13:00:00
Summary
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8544 vulnerability.
References
- https://support.apple.com/HT209605
- https://support.apple.com/HT209604
- https://support.apple.com/HT209601
- https://support.apple.com/HT209603
- https://support.apple.com/HT209599
- https://support.apple.com/HT209602
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8689: Multiple memory corruption issues were addressed with improved memory handling. This issue is…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T13:11:00
Summary
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2019-8689 vulnerability.
References
- https://support.apple.com/HT210348
- https://support.apple.com/HT210351
- https://support.apple.com/HT210358
- https://support.apple.com/HT210346
- https://support.apple.com/HT210357
- https://support.apple.com/HT210356
- https://support.apple.com/HT210355
- https://support.apple.com/HT210353
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8815: Multiple memory corruption issues were addressed with improved memory handling. This issue is…
Published: 2019-12-18T18:15:00 Last Modified: 2021-05-18T13:14:00
Summary
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8815 vulnerability.
References
- https://support.apple.com/HT210725
- https://support.apple.com/HT210726
- https://support.apple.com/HT210723
- https://support.apple.com/HT210721
- https://support.apple.com/HT210727
- https://support.apple.com/HT210728
- https://security.gentoo.org/glsa/202003-22
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-16775: Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible…
Published: 2019-12-13T01:15:00 Last Modified: 2021-10-20T11:15:00
Summary
Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user’s system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the –ignore-scripts install option.
Common Weakness Enumeration (CWE): CWE-61: UNIX Symbolic Link (Symlink) Following
CWE Description: The software, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the software to operate on unauthorized files.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-16775 vulnerability.
References
- https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli
- https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/
- https://access.redhat.com/errata/RHEA-2020:0330
- https://access.redhat.com/errata/RHSA-2020:0573
- https://access.redhat.com/errata/RHSA-2020:0579
- https://access.redhat.com/errata/RHSA-2020:0597
- https://access.redhat.com/errata/RHSA-2020:0602
- https://www.oracle.com/security-alerts/cpuoct2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-16776: Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to…
Published: 2019-12-13T01:15:00 Last Modified: 2020-10-07T16:49:00
Summary
Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to modify and/or gain access to arbitrary files on a user’s system when the package is installed. This behavior is still possible through install scripts. This vulnerability bypasses a user using the –ignore-scripts install option.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.0
- CVSS: 5.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-16776 vulnerability.
References
- https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli
- https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/
- https://access.redhat.com/errata/RHEA-2020:0330
- https://access.redhat.com/errata/RHSA-2020:0573
- https://access.redhat.com/errata/RHSA-2020:0579
- https://access.redhat.com/errata/RHSA-2020:0597
- https://access.redhat.com/errata/RHSA-2020:0602
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-16777: Versions of the npm CLI prior to 6.13.4 are vulnerable to an Arbitrary File Overwrite. It fails…
Published: 2019-12-13T01:15:00 Last Modified: 2020-10-09T13:36:00
Summary
Versions of the npm CLI prior to 6.13.4 are vulnerable to an Arbitrary File Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a serve binary, any subsequent installs of packages that also create a serve binary would overwrite the previous serve binary. This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the –ignore-scripts install option.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.0
- CVSS: 5.5
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-16777 vulnerability.
References
- https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli
- https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/
- https://access.redhat.com/errata/RHEA-2020:0330
- https://access.redhat.com/errata/RHSA-2020:0573
- https://access.redhat.com/errata/RHSA-2020:0579
- https://access.redhat.com/errata/RHSA-2020:0597
- https://access.redhat.com/errata/RHSA-2020:0602
- https://security.gentoo.org/glsa/202003-48
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-13730: Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to…
Published: 2019-12-10T22:15:00 Last Modified: 2022-01-01T20:07:00
Summary
Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-843: Access of Resource Using Incompatible Type (‘Type Confusion’)
CWE Description: The program allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-13730 vulnerability.
References
- https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
- https://crbug.com/1028862
- https://access.redhat.com/errata/RHSA-2019:4238
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
- https://seclists.org/bugtraq/2020/Jan/27
- https://www.debian.org/security/2020/dsa-4606
- https://security.gentoo.org/glsa/202003-08
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19334: In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way…
Published: 2019-12-06T16:15:00 Last Modified: 2019-12-18T18:15:00
Summary
In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type “identityref”. An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-19334 vulnerability.
References
- https://github.com/CESNET/libyang/commit/6980afae2ff9fcd6d67508b0a3f694d75fd059d6
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19334
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PETB6TVMFV5KUD4IKVP2JPLBCYHUGSAJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RL54JMS7XW7PI6JC4BFSNNLSX5AINQUL/
- https://access.redhat.com/errata/RHSA-2019:4360
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19333: In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way…
Published: 2019-12-06T16:15:00 Last Modified: 2019-12-18T04:15:00
Summary
In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type “bits”. An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or possibly gain code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-19333 vulnerability.
References
- https://github.com/CESNET/libyang/commit/f6d684ade99dd37b21babaa8a856f64faa1e2e0d
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19333
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PETB6TVMFV5KUD4IKVP2JPLBCYHUGSAJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RL54JMS7XW7PI6JC4BFSNNLSX5AINQUL/
- https://access.redhat.com/errata/RHSA-2019:4360
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5544: OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has…
Published: 2019-12-06T16:15:00 Last Modified: 2022-02-03T19:50:00
Summary
OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5544 vulnerability.
References
- http://www.vmware.com/security/advisories/VMSA-2019-0022.html
- http://www.openwall.com/lists/oss-security/2019/12/10/2
- http://www.openwall.com/lists/oss-security/2019/12/11/2
- https://access.redhat.com/errata/RHSA-2019:4240
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZPXXJZLPLAQULBCJVI5NNWZ3PGWXGXWG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DA3LYAJ2NRKMOZLZOQNDJ5TNQRFMWGHF/
- https://access.redhat.com/errata/RHSA-2020:0199
- https://security.gentoo.org/glsa/202005-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19624: An out-of-bounds read was discovered in OpenCV before 4.1.1. Specifically, variable…
Published: 2019-12-06T15:15:00 Last Modified: 2019-12-17T20:48:00
Summary
An out-of-bounds read was discovered in OpenCV before 4.1.1. Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocated arrays Ux and Uy.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-19624 vulnerability.
References
- https://github.com/opencv/opencv/issues/14554
- https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418
- https://access.redhat.com/security/cve/cve-2019-19624
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-13456: In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the…
Published: 2019-12-03T20:15:00 Last Modified: 2022-01-01T20:06:00
Summary
In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the “Dragonblood” attack and CVE-2019-9494.
Common Weakness Enumeration (CWE): CWE-203: Observable Discrepancy
CWE Description: The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.9
- CVSS Vector: AV:A/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2019-13456 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1737663
- https://wpa3.mathyvanhoef.com
- https://freeradius.org/security/
- https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00039.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4235: shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees
Published: 2019-12-03T15:15:00 Last Modified: 2021-02-25T17:15:00
Summary
shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees
Common Weakness Enumeration (CWE): CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CWE Description: The software checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check. This can cause the software to perform invalid actions when the resource is in an unexpected state.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.4
- CVSS: 3.3
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-4235 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2013-4235
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4235
- https://access.redhat.com/security/cve/cve-2013-4235
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-18660: The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB…
Published: 2019-11-27T23:15:00 Last Modified: 2020-01-28T19:47:00
Summary
The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-18660 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2019/11/27/1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad
- http://www.openwall.com/lists/oss-security/2019/11/27/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://usn.ubuntu.com/4228-1/
- https://usn.ubuntu.com/4227-1/
- https://usn.ubuntu.com/4226-1/
- https://usn.ubuntu.com/4225-1/
- https://usn.ubuntu.com/4228-2/
- https://usn.ubuntu.com/4227-2/
- https://seclists.org/bugtraq/2020/Jan/10
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://access.redhat.com/errata/RHSA-2020:0174
- https://usn.ubuntu.com/4225-2/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19319: In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can…
Published: 2019-11-27T23:15:00 Last Modified: 2021-02-09T19:15:00
Summary
In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-19319 vulnerability.
References
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19319
- https://security.netapp.com/advisory/ntap-20200103-0001/
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://www.debian.org/security/2020/dsa-4698
- https://usn.ubuntu.com/4391-1/
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=345c0dbf3a30
- https://bugzilla.suse.com/show_bug.cgi?id=1158021
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2717: The DHCPv6 client (dhcp6c) as used in the dhcpv6 project through 2011-07-25 allows remote DHCP…
Published: 2019-11-27T21:15:00 Last Modified: 2019-12-18T21:04:00
Summary
The DHCPv6 client (dhcp6c) as used in the dhcpv6 project through 2011-07-25 allows remote DHCP servers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.
Common Weakness Enumeration (CWE): CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)
CWE Description: The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-2717 vulnerability.
References
- https://vigilance.fr/vulnerability/dhcp6c-shell-command-injection-10869
- https://access.redhat.com/security/cve/cve-2011-2717
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2717
- https://www.openwall.com/lists/oss-security/2011/07/26/9
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2515: PackageKit 0.6.17 allows installation of unsigned RPM packages as though they were signed which…
Published: 2019-11-27T21:15:00 Last Modified: 2020-08-18T15:05:00
Summary
PackageKit 0.6.17 allows installation of unsigned RPM packages as though they were signed which may allow installation of non-trusted packages and execution of arbitrary code.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-2515 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2515
- https://access.redhat.com/security/cve/cve-2011-2515
- https://security-tracker.debian.org/tracker/CVE-2011-2515
- https://www.securityfocus.com/bid/48557/info
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2207: dirmngr before 2.1.0 improperly handles certain system calls, which allows remote attackers to…
Published: 2019-11-27T19:15:00 Last Modified: 2019-12-13T18:04:00
Summary
dirmngr before 2.1.0 improperly handles certain system calls, which allows remote attackers to cause a denial of service (DOS) via a specially-crafted certificate.
Common Weakness Enumeration (CWE): CWE-295: Improper Certificate Validation
CWE Description: The software does not validate, or incorrectly validates, a certificate.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-2207 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2207
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=627377
- https://access.redhat.com/security/cve/cve-2011-2207
- https://www.openwall.com/lists/oss-security/2011/06/15/6
- https://security-tracker.debian.org/tracker/CVE-2011-2207
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6655: An issue exists AccountService 0.6.37 in the user_change_password_authorized_cb() function in…
Published: 2019-11-27T18:15:00 Last Modified: 2020-08-18T15:05:00
Summary
An issue exists AccountService 0.6.37 in the user_change_password_authorized_cb() function in user.c which could let a local users obtain encrypted passwords.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-6655 vulnerability.
References
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95325
- https://security-tracker.debian.org/tracker/CVE-2012-6655
- http://www.openwall.com/lists/oss-security/2014/08/16/7
- http://www.securityfocus.com/bid/69245
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6655
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-6655
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19242: SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated by the TK_COLUMN case in…
Published: 2019-11-27T17:15:00 Last Modified: 2020-04-15T21:15:00
Summary
SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-19242 vulnerability.
References
- https://github.com/sqlite/sqlite/commit/57f7ece78410a8aae86aa4625fb7556897db384c
- https://usn.ubuntu.com/4205-1/
- https://www.oracle.com/security-alerts/cpuapr2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4980: A password generation weakness exists in xquest through 2016-06-13.
Published: 2019-11-27T16:15:00 Last Modified: 2020-01-09T21:15:00
Summary
A password generation weakness exists in xquest through 2016-06-13.
Common Weakness Enumeration (CWE): CWE-330: Use of Insufficiently Random Values
CWE Description: The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-4980 vulnerability.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVW2QJFNZUZYBN4M4YUE7S2NZBWWMGES/
- https://access.redhat.com/security/cve/cve-2016-4980
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-4980
- https://bugzilla.redhat.com/show_bug.cgi?id=1346016
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10216: In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its…
Published: 2019-11-27T13:15:00 Last Modified: 2020-09-30T18:17:00
Summary
In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass -dSAFER
restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10216 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10216
- http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5b85ddd19
- https://security.gentoo.org/glsa/202004-03
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14896: A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32,…
Published: 2019-11-27T09:15:00 Last Modified: 2020-01-03T11:15:00
Summary
A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-14896 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14896
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://usn.ubuntu.com/4228-1/
- https://usn.ubuntu.com/4227-1/
- https://usn.ubuntu.com/4225-1/
- https://usn.ubuntu.com/4228-2/
- https://usn.ubuntu.com/4226-1/
- https://usn.ubuntu.com/4227-2/
- http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://usn.ubuntu.com/4225-2/
- http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3632: Hardlink before 0.1.2 operates on full file system objects path names which can allow a local…
Published: 2019-11-26T04:15:00 Last Modified: 2020-08-18T15:05:00
Summary
Hardlink before 0.1.2 operates on full file system objects path names which can allow a local attacker to use this flaw to conduct symlink attacks.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-3632 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2011/10/20/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516
- https://security-tracker.debian.org/tracker/CVE-2011-3632
- https://www.openwall.com/lists/oss-security/2011/10/15/2
- https://access.redhat.com/security/cve/cve-2011-3632
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3632
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3631: Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows…
Published: 2019-11-26T04:15:00 Last Modified: 2020-08-18T15:05:00
Summary
Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-3631 vulnerability.
References
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516
- https://security-tracker.debian.org/tracker/CVE-2011-3631
- https://access.redhat.com/security/cve/cve-2011-3631
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3631
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3630: Hardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way…
Published: 2019-11-26T04:15:00 Last Modified: 2020-08-18T15:05:00
Summary
Hardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a specially-crafted directory tree, and trick the local user into consolidating it, leading to hardlink executable crash, or, potentially arbitrary code execution with the privileges of the user running the hardlink executable.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-3630 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2011/10/20/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516
- https://security-tracker.debian.org/tracker/CVE-2011-3630
- https://access.redhat.com/security/cve/cve-2011-3630
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3630
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5644: libuser has information disclosure when moving user’s home directory
Published: 2019-11-25T15:15:00 Last Modified: 2020-08-18T15:05:00
Summary
libuser has information disclosure when moving user’s home directory
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: COMPLETE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-5644 vulnerability.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102068.html
- https://access.redhat.com/security/cve/cve-2012-5644
- https://security-tracker.debian.org/tracker/CVE-2012-5644
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5644
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-13723: Use after free in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker…
Published: 2019-11-25T15:15:00 Last Modified: 2020-08-24T17:37:00
Summary
Use after free in WebBluetooth in Google Chrome prior to 78.0.3904.108 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-13723 vulnerability.
References
- https://chromereleases.googleblog.com/2019/11/stable-channel-update-for-desktop_18.html
- https://crbug.com/1024121
- https://access.redhat.com/errata/RHSA-2019:3955
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/54XWRJ5LDFL27QXBPIBX3EHO4TPMKN4R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/USW7PGIHNPE6W3LGY6ZDFLELQGSL52CH/
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00035.html
- https://security.gentoo.org/glsa/202003-08
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5521: quagga (ospf6d) 0.99.21 has a DoS flaw in the way the ospf6d daemon performs routes removal
Published: 2019-11-25T14:15:00 Last Modified: 2020-08-18T15:05:00
Summary
quagga (ospf6d) 0.99.21 has a DoS flaw in the way the ospf6d daemon performs routes removal
Common Weakness Enumeration (CWE): CWE-617: Reachable Assertion
CWE Description: The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.5
- CVSS: 3.3
- CVSS Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2012-5521 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2012-5521
- https://access.redhat.com/security/cve/cve-2012-5521
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80096
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5521
- http://www.openwall.com/lists/oss-security/2012/11/13/14
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-5521
- http://www.securityfocus.com/bid/56530
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5630: libuser 0.56 and 0.57 has a TOCTOU (time-of-check time-of-use) race condition when copying and…
Published: 2019-11-25T14:15:00 Last Modified: 2019-12-04T15:43:00
Summary
libuser 0.56 and 0.57 has a TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees.
Common Weakness Enumeration (CWE): CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CWE Description: The software checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check. This can cause the software to perform invalid actions when the resource is in an unexpected state.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.4
- CVSS: 3.3
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-5630 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2012-5630
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5630
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102068.html
- https://access.redhat.com/security/cve/cve-2012-5630
- https://www.securityfocus.com/bid/59285
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14822: A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to…
Published: 2019-11-25T12:15:00 Last Modified: 2020-08-27T15:15:00
Summary
A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
Common Weakness Enumeration (CWE): CWE-862: Missing Authorization
CWE Description: The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-14822 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14822
- https://usn.ubuntu.com/4134-3/
- https://bugzilla.redhat.com/show_bug.cgi?id=1717958
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10214: The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat…
Published: 2019-11-25T11:15:00 Last Modified: 2021-10-28T13:58:00
Summary
The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.
Common Weakness Enumeration (CWE): CWE-522: Insufficiently Protected Credentials
CWE Description: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10214 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14815: A vulnerability was found in Linux Kernel, where a Heap Overflow was found in…
Published: 2019-11-25T11:15:00 Last Modified: 2020-01-03T11:15:00
Summary
A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-14815 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14815
- https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com
- https://www.openwall.com/lists/oss-security/2019/08/28/1
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a
- https://access.redhat.com/security/cve/cve-2019-14815
- https://access.redhat.com/errata/RHSA-2020:0174
- https://access.redhat.com/errata/RHSA-2020:0328
- https://access.redhat.com/errata/RHSA-2020:0339
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-0877: PyXML: Hash table collisions CPU usage Denial of Service
Published: 2019-11-22T17:15:00 Last Modified: 2019-12-03T14:35:00
Summary
PyXML: Hash table collisions CPU usage Denial of Service
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-0877 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2012-0877
- https://access.redhat.com/security/cve/cve-2012-0877
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0877
- http://www.openwall.com/lists/oss-security/2014/07/08/11
- http://seclists.org/oss-sec/2014/q3/96
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3585: redhat-upgrade-tool: Does not check GPG signatures when upgrading versions
Published: 2019-11-22T15:15:00 Last Modified: 2019-11-25T16:37:00
Summary
redhat-upgrade-tool: Does not check GPG signatures when upgrading versions
Common Weakness Enumeration (CWE): CWE-347: Improper Verification of Cryptographic Signature
CWE Description: The software does not verify, or incorrectly verifies, the cryptographic signature for data.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3585 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3585
- https://access.redhat.com/security/cve/cve-2014-3585
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7810: libbluray MountManager class has a time-of-check time-of-use (TOCTOU) race when expanding JAR files
Published: 2019-11-22T15:15:00 Last Modified: 2020-08-18T15:05:00
Summary
libbluray MountManager class has a time-of-check time-of-use (TOCTOU) race when expanding JAR files
Common Weakness Enumeration (CWE): CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CWE Description: The software checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check. This can cause the software to perform invalid actions when the resource is in an unexpected state.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.4
- CVSS: 3.3
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-7810 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2015-7810
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7810
- https://access.redhat.com/security/cve/cve-2015-7810
- http://www.securityfocus.com/bid/72769
- http://www.openwall.com/lists/oss-security/2015/10/12/7
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5694: Designate does not enforce the DNS protocol limit concerning record set sizes
Published: 2019-11-22T15:15:00 Last Modified: 2020-08-18T15:05:00
Summary
Designate does not enforce the DNS protocol limit concerning record set sizes
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5694 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-5694
- https://security-tracker.debian.org/tracker/CVE-2015-5694
- http://www.openwall.com/lists/oss-security/2015/07/28/11
- http://www.openwall.com/lists/oss-security/2015/07/29/6
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1817: MediaWiki before 1.19.4 and 1.20.x before 1.20.3 contains an error in the api.php script which…
Published: 2019-11-20T20:15:00 Last Modified: 2019-11-21T14:54:00
Summary
MediaWiki before 1.19.4 and 1.20.x before 1.20.3 contains an error in the api.php script which allows remote attackers to obtain sensitive information.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-1817 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2013-1817
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88359
- http://security.gentoo.org/glsa/glsa-201310-21.xml
- http://www.securityfocus.com/bid/58305
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1817
- http://www.openwall.com/lists/oss-security/2013/03/05/4
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1816: MediaWiki before 1.19.4 and 1.20.x before 1.20.3 allows remote attackers to cause a denial of…
Published: 2019-11-20T20:15:00 Last Modified: 2019-11-21T14:58:00
Summary
MediaWiki before 1.19.4 and 1.20.x before 1.20.3 allows remote attackers to cause a denial of service (application crash) by sending a specially crafted request.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-1816 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2013-1816
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1816
- http://www.securityfocus.com/bid/58306
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88360
- http://security.gentoo.org/glsa/glsa-201310-21.xml
- http://www.openwall.com/lists/oss-security/2013/03/05/4
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6136: tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill…
Published: 2019-11-20T15:15:00 Last Modified: 2020-08-18T15:05:00
Summary
tuned 2.10.0 creates its PID file with insecure permissions which allows local users to kill arbitrary processes.
Common Weakness Enumeration (CWE): CWE-276: Incorrect Default Permissions
CWE Description: During installation, installed file permissions are set to allow anyone to modify those files.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-6136 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2012-6136
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-6136
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-4967: tog-Pegasus has a package hash collision DoS vulnerability
Published: 2019-11-19T16:15:00 Last Modified: 2019-11-22T17:27:00
Summary
tog-Pegasus has a package hash collision DoS vulnerability
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-4967 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4967
- http://bugzilla.openpegasus.org/show_bug.cgi?id=9182
- https://access.redhat.com/security/cve/cve-2011-4967
- http://www.openwall.com/lists/oss-security/2012/12/14/2
- https://www.securityfocus.com/bid/56941
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-5118: Trusted Boot (tboot) before 1.8.2 has a ’loader.c’ Security Bypass Vulnerability
Published: 2019-11-18T23:15:00 Last Modified: 2020-01-10T14:15:00
Summary
Trusted Boot (tboot) before 1.8.2 has a ’loader.c’ Security Bypass Vulnerability
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-5118 vulnerability.
References
- http://www.securityfocus.com/bid/68960
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136778.html
- http://www.openwall.com/lists/oss-security/2014/07/30/4
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95063
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136768.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19081: A memory leak in the nfp_flower_spawn_vnic_reprs() function in…
Published: 2019-11-18T06:15:00 Last Modified: 2020-08-24T17:37:00
Summary
A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.
Common Weakness Enumeration (CWE): CWE-401: Missing Release of Memory after Effective Lifetime
CWE Description: The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-19081 vulnerability.
References
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4
- https://github.com/torvalds/linux/commit/8ce39eb5a67aee25d9f05b40b673c95b23502e3e
- https://security.netapp.com/advisory/ntap-20191205-0001/
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux…
Published: 2019-11-18T06:15:00 Last Modified: 2021-06-14T18:15:00
Summary
A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.
Common Weakness Enumeration (CWE): CWE-401: Missing Release of Memory after Effective Lifetime
CWE Description: The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-19066 vulnerability.
References
- https://github.com/torvalds/linux/commit/0e62395da2bd5166d7c9e14cbc7503b256a34cb0
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://usn.ubuntu.com/4286-2/
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- https://usn.ubuntu.com/4286-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
- https://usn.ubuntu.com/4300-1/
- https://usn.ubuntu.com/4301-1/
- https://usn.ubuntu.com/4302-1/
- https://www.oracle.com/security-alerts/cpuApr2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19072: A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the…
Published: 2019-11-18T06:15:00 Last Modified: 2020-08-24T17:37:00
Summary
A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
Common Weakness Enumeration (CWE): CWE-401: Missing Release of Memory after Effective Lifetime
CWE Description: The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-19072 vulnerability.
References
- https://github.com/torvalds/linux/commit/96c5c6e6a5b6db592acae039fed54b5c8844cd35
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://usn.ubuntu.com/4225-1/
- https://usn.ubuntu.com/4226-1/
- https://usn.ubuntu.com/4225-2/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19076: ** DISPUTED ** A memory leak in the nfp_abm_u32_knode_replace() function in…
Published: 2019-11-18T06:15:00 Last Modified: 2020-08-24T17:37:00
Summary
** DISPUTED ** A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 was reverted.
Common Weakness Enumeration (CWE): CWE-401: Missing Release of Memory after Effective Lifetime
CWE Description: The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-19076 vulnerability.
References
- https://github.com/torvalds/linux/commit/78beef629fd95be4ed853b2d37b832f766bd96ca
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6
- https://usn.ubuntu.com/4209-1/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://lore.kernel.org/lkml/20191204103955.63c4d9af@cakuba.netronome.com/
- https://git.kernel.org/linus/1d1997db870f4058676439ef7014390ba9e24eb2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel…
Published: 2019-11-18T06:15:00 Last Modified: 2020-08-24T17:37:00
Summary
A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.
Common Weakness Enumeration (CWE): CWE-401: Missing Release of Memory after Effective Lifetime
CWE Description: The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-19062 vulnerability.
References
- https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
- https://seclists.org/bugtraq/2020/Jan/10
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://usn.ubuntu.com/4254-1/
- https://usn.ubuntu.com/4254-2/
- https://usn.ubuntu.com/4258-1/
- https://usn.ubuntu.com/4287-1/
- https://usn.ubuntu.com/4287-2/
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- https://usn.ubuntu.com/4284-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in…
Published: 2019-11-18T06:15:00 Last Modified: 2020-08-24T17:37:00
Summary
A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.
Common Weakness Enumeration (CWE): CWE-401: Missing Release of Memory after Effective Lifetime
CWE Description: The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-19068 vulnerability.
References
- https://github.com/torvalds/linux/commit/a2cdd07488e666aa93a49a3fc9c9b1299e27ef3c
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
- https://usn.ubuntu.com/4286-2/
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- https://usn.ubuntu.com/4286-1/
- https://usn.ubuntu.com/4300-1/
- https://usn.ubuntu.com/4301-1/
- https://usn.ubuntu.com/4302-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-19012: An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before…
Published: 2019-11-17T18:15:00 Last Modified: 2020-08-24T17:37:00
Summary
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosure, or possibly have unspecified other impact, via a crafted regular expression.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-19012 vulnerability.
References
- https://github.com/kkos/oniguruma/releases/tag/v6.9.4_rc2
- https://github.com/kkos/oniguruma/issues/164
- https://github.com/tarantula-team/CVE-2019-19012
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NO267PLHGYZSWX3XTRPKYBKD4J3YOU5V/
- https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3MBNW6Z4DOXSCNWGBLQ7OA3OGUJ44WL/
- https://usn.ubuntu.com/4460-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2726: An access bypass issue was found in Drupal 7.x before version 7.5. If a Drupal site has the…
Published: 2019-11-15T17:15:00 Last Modified: 2019-12-03T19:49:00
Summary
An access bypass issue was found in Drupal 7.x before version 7.5. If a Drupal site has the ability to attach File upload fields to any entity type in the system or has the ability to point individual File upload fields to the private file directory in comments, and the parent node is denied access, non-privileged users can still download the file attached to the comment if they know or guess its direct URL.
Common Weakness Enumeration (CWE): CWE-863: Incorrect Authorization
CWE Description: The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-2726 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2011-2726
- https://access.redhat.com/security/cve/cve-2011-2726
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2726
- http://www.openwall.com/lists/oss-security/2012/03/19/10
- https://www.drupal.org/node/1231510
- http://www.openwall.com/lists/oss-security/2012/03/20/14
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5285: A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a…
Published: 2019-11-15T16:15:00 Last Modified: 2020-01-09T20:15:00
Summary
A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5285 vulnerability.
References
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html
- http://rhn.redhat.com/errata/RHSA-2016-2779.html
- http://www.ubuntu.com/usn/USN-3163-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1306103
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00037.html
- https://bto.bluecoat.com/security-advisory/sa137
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00011.html
- https://security.gentoo.org/glsa/201701-46
- http://www.securityfocus.com/bid/94349
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12207: Improper invalidation for page table updates by a virtual guest operating system for multiple…
Published: 2019-11-14T20:15:00 Last Modified: 2020-07-15T03:15:00
Summary
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-12207 vulnerability.
References
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/
- https://access.redhat.com/errata/RHSA-2019:3916
- https://access.redhat.com/errata/RHSA-2019:3936
- https://access.redhat.com/errata/RHSA-2019:3941
- https://usn.ubuntu.com/4186-2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/
- https://support.f5.com/csp/article/K17269881?utm_source=f5support&utm_medium=RSS
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html
- https://access.redhat.com/errata/RHSA-2020:0028
- https://access.redhat.com/errata/RHSA-2020:0026
- https://www.debian.org/security/2020/dsa-4602
- https://seclists.org/bugtraq/2020/Jan/21
- https://access.redhat.com/errata/RHSA-2020:0204
- https://security.gentoo.org/glsa/202003-56
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-0155: Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and…
Published: 2019-11-14T19:15:00 Last Modified: 2021-07-21T11:39:00
Summary
Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-0155 vulnerability.
References
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html
- https://access.redhat.com/errata/RHSA-2019:3887
- https://access.redhat.com/errata/RHSA-2019:3889
- https://access.redhat.com/errata/RHSA-2019:3841
- https://seclists.org/bugtraq/2019/Nov/26
- http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://access.redhat.com/errata/RHSA-2019:3908
- https://support.f5.com/csp/article/K73659122?utm_source=f5support&utm_medium=RSS
- https://usn.ubuntu.com/4186-2/
- https://access.redhat.com/errata/RHSA-2020:0204
- https://security.netapp.com/advisory/ntap-20200320-0005/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14818: A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before…
Published: 2019-11-14T17:15:00 Last Modified: 2021-11-02T18:28:00
Summary
A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before 18.11.4 and 19.x.x before 19.08.1 where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.
Common Weakness Enumeration (CWE): CWE-401: Missing Release of Memory after Effective Lifetime
CWE Description: The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-14818 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14818
- https://bugs.dpdk.org/show_bug.cgi?id=363
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULJ3C7OVBOEVDGSHYC3VCLSUHANGTFFP/
- https://access.redhat.com/errata/RHSA-2020:0165
- https://access.redhat.com/errata/RHSA-2020:0166
- https://access.redhat.com/errata/RHSA-2020:0168
- https://access.redhat.com/errata/RHSA-2020:0171
- https://access.redhat.com/errata/RHSA-2020:0172
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1156: Moodle before 2.2.2 has users’ private files included in course backups
Published: 2019-11-14T16:15:00 Last Modified: 2019-11-22T18:41:00
Summary
Moodle before 2.2.2 has users’ private files included in course backups
Common Weakness Enumeration (CWE): CWE-532: Insertion of Sensitive Information into Log File
CWE Description: This entry has been deprecated because its abstraction was too low-level. See CWE-532.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1156 vulnerability.
References
- https://access.redhat.com/security/cve/cve-2012-1156
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1156
- https://moodle.org/mod/forum/discuss.php?d=198623
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077635.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078210.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080712.html
- https://security-tracker.debian.org/tracker/CVE-2012-1156
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081047.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078209.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1168: Moodle before 2.2.2 has a password and web services issue where when the user profile is updated…
Published: 2019-11-14T16:15:00 Last Modified: 2019-11-22T18:32:00
Summary
Moodle before 2.2.2 has a password and web services issue where when the user profile is updated the user password is reset if not specified.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1168 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2012-1168
- https://access.redhat.com/security/cve/cve-2012-1168
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077635.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1168
- https://moodle.org/mod/forum/discuss.php?d=198622
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078210.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080712.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081047.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078209.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1155: Moodle has a database activity export permission issue where the export function of the database…
Published: 2019-11-14T16:15:00 Last Modified: 2019-11-22T18:44:00
Summary
Moodle has a database activity export permission issue where the export function of the database activity module exports all entries even those from groups the user does not belong to
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1155 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2012-1155
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077635.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078210.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080712.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081047.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078209.html
- https://moodle.org/mod/forum/discuss.php?d=198621
- https://access.redhat.com/security/cve/cve-2012-1155
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1155
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1145: The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow…
Published: 2019-11-14T02:15:00 Last Modified: 2019-11-19T21:02:00
Summary
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-1145 vulnerability.
References
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2011-1145
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1145
- https://security-tracker.debian.org/tracker/CVE-2011-1145
- https://access.redhat.com/security/cve/cve-2011-1145
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-4664: In ConsoleKit before 0.4.2, an intended security policy restriction bypass was found. This flaw…
Published: 2019-11-13T22:15:00 Last Modified: 2019-11-18T14:44:00
Summary
In ConsoleKit before 0.4.2, an intended security policy restriction bypass was found. This flaw allows an authenticated system user to escalate their privileges by initiating a remote VNC session.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-4664 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2010-4664
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4664
- https://access.redhat.com/security/cve/cve-2010-4664
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-4657: PHP5 before 5.4.4 allows passing invalid utf-8 strings via the xmlTextWriterWriteAttribute, which…
Published: 2019-11-13T21:15:00 Last Modified: 2019-11-20T13:45:00
Summary
PHP5 before 5.4.4 allows passing invalid utf-8 strings via the xmlTextWriterWriteAttribute, which are then misparsed by libxml2. This results in memory leak into the resulting output.
Common Weakness Enumeration (CWE): CWE-772: Missing Release of Resource after Effective Lifetime
CWE Description: The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-4657 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2010-4657
- https://access.redhat.com/security/cve/cve-2010-4657
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4657
- https://bugs.launchpad.net/php/%2Bbug/655442
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-4661: udisks before 1.0.3 allows a local user to load arbitrary Linux kernel modules.
Published: 2019-11-13T21:15:00 Last Modified: 2019-11-18T19:30:00
Summary
udisks before 1.0.3 allows a local user to load arbitrary Linux kernel modules.
Common Weakness Enumeration (CWE): CWE-434: Unrestricted Upload of File with Dangerous Type
CWE Description: This can be resultant from client-side enforcement (CWE-602); some products will include web script in web clients to check the filename, without verifying on the server side.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2010-4661 vulnerability.
References
- http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4661
- https://access.redhat.com/security/cve/cve-2010-4661
- https://security-tracker.debian.org/tracker/CVE-2010-4661
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2897: gdk-pixbuf through 2.31.1 has GIF loader buffer overflow when initializing decompression tables…
Published: 2019-11-12T14:15:00 Last Modified: 2019-11-14T15:28:00
Summary
gdk-pixbuf through 2.31.1 has GIF loader buffer overflow when initializing decompression tables due to an input validation flaw
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-2897 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2011-2897
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2897
- https://access.redhat.com/security/cve/cve-2011-2897
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14824: A flaw was found in the ‘deref’ plugin of 389-ds-base where it could use the ‘search’ permission…
Published: 2019-11-08T15:15:00 Last Modified: 2020-12-04T18:15:00
Summary
A flaw was found in the ‘deref’ plugin of 389-ds-base where it could use the ‘search’ permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-14824 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14824
- https://access.redhat.com/errata/RHSA-2019:3981
- https://lists.debian.org/debian-lts-announce/2019/11/msg00036.html
- https://access.redhat.com/errata/RHSA-2020:0464
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-18811: A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux…
Published: 2019-11-07T16:15:00 Last Modified: 2020-08-24T17:37:00
Summary
A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1.
Common Weakness Enumeration (CWE): CWE-401: Missing Release of Memory after Effective Lifetime
CWE Description: The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-18811 vulnerability.
References
- https://github.com/torvalds/linux/commit/45c1380358b12bf2d1db20a5874e9544f56b34ab
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/
- https://usn.ubuntu.com/4284-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is…
Published: 2019-11-07T14:15:00 Last Modified: 2021-06-22T14:47:00
Summary
An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-18805 vulnerability.
References
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=19fad20d15a6494f47f85d869f00b11343ee5c78
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://access.redhat.com/errata/RHSA-2020:0740
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1000037: Pagure: XSS possible in file attachment endpoint
Published: 2019-11-06T19:15:00 Last Modified: 2019-11-08T17:43:00
Summary
Pagure: XSS possible in file attachment endpoint
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1000037 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2016-1000037
- https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000037.json
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7EHB2WQ46M737B2STHQTOPTBSSQJDSS/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000037
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8181: The kernel in Red Hat Enterprise Linux 7 and MRG-2 does not clear garbage data for SG_IO buffer,…
Published: 2019-11-06T15:15:00 Last Modified: 2021-07-15T19:16:00
Summary
The kernel in Red Hat Enterprise Linux 7 and MRG-2 does not clear garbage data for SG_IO buffer, which may leaking sensitive information to userspace.
Common Weakness Enumeration (CWE): CWE-665: Improper Initialization
CWE Description: The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-8181 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4983: A postinstall script in the dovecot rpm allows local users to read the contents of newly created…
Published: 2019-11-05T22:15:00 Last Modified: 2019-11-08T16:20:00
Summary
A postinstall script in the dovecot rpm allows local users to read the contents of newly created SSL/TLS key files.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-4983 vulnerability.
References
- http://lists.opensuse.org/opensuse-updates/2016-11/msg00096.html
- https://bugzilla.suse.com/show_bug.cgi?id=984639
- https://bugzilla.redhat.com/show_bug.cgi?id=1346055
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-5661: Cache Poisoning issue exists in DNS Response Rate Limiting.
Published: 2019-11-05T19:15:00 Last Modified: 2019-11-08T19:04:00
Summary
Cache Poisoning issue exists in DNS Response Rate Limiting.
Common Weakness Enumeration (CWE): CWE-290: Authentication Bypass by Spoofing
CWE Description: This attack-focused weakness is caused by improperly implemented authentication schemes that are subject to spoofing attacks.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-5661 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5661
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-5661
- https://security-tracker.debian.org/tracker/CVE-2013-5661
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1000002: gdm3 3.14.2 and possibly later has an information leak before screen lock
Published: 2019-11-05T14:15:00 Last Modified: 2020-08-18T15:05:00
Summary
gdm3 3.14.2 and possibly later has an information leak before screen lock
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-1000002 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2016-1000002
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000002
- https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000002.json
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000002
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4409: An eval() vulnerability exists in Python Software Foundation Djblets 0.7.21 and Beanbag Review…
Published: 2019-11-04T21:15:00 Last Modified: 2019-11-08T21:34:00
Summary
An eval() vulnerability exists in Python Software Foundation Djblets 0.7.21 and Beanbag Review Board before 1.7.15 when parsing JSON requests.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4409 vulnerability.
References
- https://access.redhat.com/security/cve/cve-2013-4409
- http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119820.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119819.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4409
- http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119831.html
- https://security-tracker.debian.org/tracker/CVE-2013-4409
- http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120619.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119830.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88059
- http://www.securityfocus.com/bid/63029
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-8980: The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote…
Published: 2019-11-04T21:15:00 Last Modified: 2019-11-06T14:30:00
Summary
The plural form formula in ngettext family of calls in php-gettext before 1.0.12 allows remote attackers to execute arbitrary code.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-8980 vulnerability.
References
- http://www.securityfocus.com/bid/95754
- https://launchpad.net/php-gettext/trunk/1.0.12
- https://bugzilla.redhat.com/show_bug.cgi?id=1367462
- https://lwn.net/Alerts/708838/
- http://seclists.org/fulldisclosure/2016/Aug/76
- http://www.openwall.com/lists/oss-security/2017/01/18/4
- http://lists.opensuse.org/opensuse-updates/2017-02/msg00015.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5333: Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in…
Published: 2019-11-04T21:15:00 Last Modified: 2019-11-07T19:59:00
Summary
Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5333 vulnerability.
References
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00026.html
- https://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1a108713ac26215c7568353f6e02e727e6d4b24a
- http://www.openwall.com/lists/oss-security/2017/01/11/3
- https://bugzilla.redhat.com/show_bug.cgi?id=1412259
- http://www.debian.org/security/2017/dsa-3765
- http://www.ubuntu.com/usn/USN-3178-1
- http://rhn.redhat.com/errata/RHSA-2017-0837.html
- http://www.securityfocus.com/bid/95678
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00024.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5332: The extract_group_icon_cursor_resource in wrestool/extract.c in icoutils before 0.31.1 can access…
Published: 2019-11-04T21:15:00 Last Modified: 2019-11-06T19:01:00
Summary
The extract_group_icon_cursor_resource in wrestool/extract.c in icoutils before 0.31.1 can access unallocated memory, which allows local users to cause a denial of service (process crash) and execute arbitrary code via a crafted executable.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5332 vulnerability.
References
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00026.html
- https://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1aa9f28f7bcbdfff6a84a15ac8d9a87559b1596a
- https://bugzilla.redhat.com/show_bug.cgi?id=1412263
- http://www.openwall.com/lists/oss-security/2017/01/11/3
- http://www.debian.org/security/2017/dsa-3765
- http://www.securityfocus.com/bid/95380
- http://www.ubuntu.com/usn/USN-3178-1
- http://rhn.redhat.com/errata/RHSA-2017-0837.html
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00024.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4251: The scipy.weave component in SciPy before 0.12.1 creates insecure temporary directories.
Published: 2019-11-04T20:15:00 Last Modified: 2019-11-08T18:51:00
Summary
The scipy.weave component in SciPy before 0.12.1 creates insecure temporary directories.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-4251 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2013-4251
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4251
- https://access.redhat.com/security/cve/cve-2013-4251
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4251
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88052
- https://github.com/scipy/scipy/commit/bd296e0336420b840fcd2faabb97084fd252a973
- http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119759.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119771.html
- http://www.securityfocus.com/bid/63008
- http://lists.fedoraproject.org/pipermail/package-announce/2013-November/120696.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-4890: There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via “su -…
Published: 2019-11-04T19:15:00 Last Modified: 2020-08-18T15:05:00
Summary
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via “su - user -c program”. The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-4890 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2005-4890
- https://access.redhat.com/security/cve/cve-2005-4890
- http://www.openwall.com/lists/oss-security/2013/05/20/3
- http://www.openwall.com/lists/oss-security/2014/10/20/9
- http://www.openwall.com/lists/oss-security/2013/11/29/5
- http://www.openwall.com/lists/oss-security/2013/11/28/10
- http://www.openwall.com/lists/oss-security/2016/02/25/6
- http://www.openwall.com/lists/oss-security/2014/12/15/5
- http://www.openwall.com/lists/oss-security/2014/10/21/1
- https://security-tracker.debian.org/tracker/CVE-2005-4890
- http://www.openwall.com/lists/oss-security/2012/11/06/8
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-6470: There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd…
Published: 2019-11-01T23:15:00 Last Modified: 2019-11-06T21:52:00
Summary
There had existed in one of the ISC BIND libraries a bug in a function that was used by dhcpd when operating in DHCPv6 mode. There was also a bug in dhcpd relating to the use of this function per its documentation, but the bug in the library function prevented this from causing any harm. All releases of dhcpd from ISC contain copies of this, and other, BIND libraries in combinations that have been tested prior to release and are known to not present issues like this. Some third-party packagers of ISC software have modified the dhcpd source, BIND source, or version matchup in ways that create the crash potential. Based on reports available to ISC, the crash probability is large and no analysis has been done on how, or even if, the probability can be manipulated by an attacker. Affects: Builds of dhcpd versions prior to version 4.4.1 when using BIND versions 9.11.2 or later, or BIND versions with specific bug fixes backported to them. ISC does not have access to comprehensive version lists for all repackagings of dhcpd that are vulnerable. In particular, builds from other vendors may also be affected. Operators are advised to consult their vendor documentation.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-6470 vulnerability.
References
- https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00049.html
- https://access.redhat.com/errata/RHSA-2019:2060
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896122
- https://lists.opensuse.org/opensuse-security-announce/2019-10/msg00048.html
- https://access.redhat.com/errata/RHSA-2019:3525
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3718: evince is missing a check on number of pages which can lead to a segmentation fault
Published: 2019-11-01T13:15:00 Last Modified: 2019-11-05T20:17:00
Summary
evince is missing a check on number of pages which can lead to a segmentation fault
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3718 vulnerability.
References
- https://security-tracker.debian.org/tracker/CVE-2013-3718
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-3718
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-3718
- http://bugzilla.gnome.org/show_bug.cgi?id=701302
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4751: php-symfony2-Validator has loss of information during serialization
Published: 2019-11-01T13:15:00 Last Modified: 2019-11-06T15:53:00
Summary
php-symfony2-Validator has loss of information during serialization
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 6.8
- CVSS: 4.9
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4751 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4751
- http://symfony.com/blog/security-releases-symfony-2-0-24-2-1-12-2-2-5-and-2-3-3-released
- http://www.securityfocus.com/bid/61709
- http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114380.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114436.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/86364
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-17596: Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic…
Published: 2019-10-24T22:15:00 Last Modified: 2021-11-30T19:42:00
Summary
Go before 1.12.11 and 1.3.x before 1.13.2 can panic upon an attempt to process network traffic containing an invalid DSA public key. There are several attack scenarios, such as traffic from a client to a server that verifies client certificates.
Common Weakness Enumeration (CWE): CWE-436: Interpretation Conflict
CWE Description: Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B’s state.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-17596 vulnerability.
References
- https://github.com/golang/go/issues/34960
- https://groups.google.com/d/msg/golang-announce/lVEm7llp0w0/VbafyRkgCgAJ
- https://www.debian.org/security/2019/dsa-4551
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VS3HPSE25ZSGS4RSOTADC67YNOHIGVV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WVOWGM7IQGRO7DS2MCUMYZRQ4TYOZNAS/
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
- https://security.netapp.com/advisory/ntap-20191122-0005/
- https://access.redhat.com/errata/RHSA-2020:0101
- https://access.redhat.com/errata/RHSA-2020:0329
- https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
- https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/10134-security-advisory-46
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-17631: From Eclipse OpenJ9 0.15 to 0.16, access to diagnostic operations such as causing a GC or…
Published: 2019-10-17T18:15:00 Last Modified: 2020-10-16T14:20:00
Summary
From Eclipse OpenJ9 0.15 to 0.16, access to diagnostic operations such as causing a GC or creating a diagnostic file are permitted without any privilege checks.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-17631 vulnerability.
References
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=552129
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2975: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting)….
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T12:29:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2975 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
- https://kc.mcafee.com/corporate/index?page=content&id=SB10315
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2987: Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that…
Published: 2019-10-16T18:15:00 Last Modified: 2020-08-18T15:05:00
Summary
Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2987 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://access.redhat.com/errata/RHSA-2019:3157
- https://access.redhat.com/errata/RHSA-2019:3158
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2978: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking)….
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2978 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://access.redhat.com/errata/RHSA-2019:3157
- https://access.redhat.com/errata/RHSA-2019:3158
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://access.redhat.com/errata/RHSA-2019:4109
- https://access.redhat.com/errata/RHSA-2019:4110
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2983: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component:…
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2983 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://access.redhat.com/errata/RHSA-2019:3157
- https://access.redhat.com/errata/RHSA-2019:3158
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://access.redhat.com/errata/RHSA-2019:4109
- https://access.redhat.com/errata/RHSA-2019:4110
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2973: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP)….
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2973 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://access.redhat.com/errata/RHSA-2019:3157
- https://access.redhat.com/errata/RHSA-2019:3158
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://access.redhat.com/errata/RHSA-2019:4109
- https://access.redhat.com/errata/RHSA-2019:4110
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2981: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP)….
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2981 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://access.redhat.com/errata/RHSA-2019:3157
- https://access.redhat.com/errata/RHSA-2019:3158
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://access.redhat.com/errata/RHSA-2019:4109
- https://access.redhat.com/errata/RHSA-2019:4110
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2992: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D)….
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2992 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://access.redhat.com/errata/RHSA-2019:3157
- https://access.redhat.com/errata/RHSA-2019:3158
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://access.redhat.com/errata/RHSA-2019:4109
- https://access.redhat.com/errata/RHSA-2019:4110
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2945: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking)….
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2945 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://access.redhat.com/errata/RHSA-2019:3157
- https://access.redhat.com/errata/RHSA-2019:3158
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://access.redhat.com/errata/RHSA-2019:4109
- https://access.redhat.com/errata/RHSA-2019:4110
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2962: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D)….
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2962 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://access.redhat.com/errata/RHSA-2019:3157
- https://access.redhat.com/errata/RHSA-2019:3158
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://access.redhat.com/errata/RHSA-2019:4109
- https://access.redhat.com/errata/RHSA-2019:4110
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2989: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking)….
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2989 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://access.redhat.com/errata/RHSA-2019:3157
- https://access.redhat.com/errata/RHSA-2019:3158
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://access.redhat.com/errata/RHSA-2019:4109
- https://access.redhat.com/errata/RHSA-2019:4110
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
- https://kc.mcafee.com/corporate/index?page=content&id=SB10315
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2949: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos)….
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2949 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://support.f5.com/csp/article/K54213762?utm_source=f5support&utm_medium=RSS
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://kc.mcafee.com/corporate/index?page=content&id=SB10315
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2964: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component:…
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2964 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://access.redhat.com/errata/RHSA-2019:3157
- https://access.redhat.com/errata/RHSA-2019:3158
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://access.redhat.com/errata/RHSA-2019:4109
- https://access.redhat.com/errata/RHSA-2019:4110
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2988: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D)….
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2988 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://access.redhat.com/errata/RHSA-2019:3157
- https://access.redhat.com/errata/RHSA-2019:3158
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://access.redhat.com/errata/RHSA-2019:4109
- https://access.redhat.com/errata/RHSA-2019:4110
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2999: Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions…
Published: 2019-10-16T18:15:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
Scores
- Impact Score: 4.9
- Exploitability Score: 4.9
- CVSS: 4.0
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2999 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3134
- https://access.redhat.com/errata/RHSA-2019:3135
- https://security.netapp.com/advisory/ntap-20191017-0001/
- https://access.redhat.com/errata/RHSA-2019:3136
- https://www.debian.org/security/2019/dsa-4546
- https://seclists.org/bugtraq/2019/Oct/27
- https://seclists.org/bugtraq/2019/Oct/31
- https://www.debian.org/security/2019/dsa-4548
- https://access.redhat.com/errata/RHSA-2019:3157
- https://access.redhat.com/errata/RHSA-2019:3158
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
- https://access.redhat.com/errata/RHSA-2019:4109
- https://access.redhat.com/errata/RHSA-2019:4110
- https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:4113
- https://access.redhat.com/errata/RHSA-2019:4115
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
- https://usn.ubuntu.com/4223-1/
- https://access.redhat.com/errata/RHSA-2020:0006
- https://access.redhat.com/errata/RHSA-2020:0046
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14823: A flaw was found in the “Leaf and Chain” OCSP policy implementation in JSS’ CryptoManager…
Published: 2019-10-14T20:15:00 Last Modified: 2019-10-25T19:15:00
Summary
A flaw was found in the “Leaf and Chain” OCSP policy implementation in JSS’ CryptoManager versions after 4.4.6, 4.5.3, 4.6.0, where it implicitly trusted the root certificate of a certificate chain. Applications using this policy may not properly verify the chain and could be vulnerable to attacks such as Man in the Middle.
Common Weakness Enumeration (CWE): CWE-295: Improper Certificate Validation
CWE Description: The software does not validate, or incorrectly validates, a certificate.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-14823 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14823
- https://access.redhat.com/errata/RHSA-2019:3067
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O53NXVKMF7PJCPMCJQHLMSYCUGDHGBVE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZZWZLNALV6AOIBIHB3ZMNA5AGZMZAIY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEN4DQBE6WOGEP5BQ5X62WZM7ZQEEBG/
- https://access.redhat.com/errata/RHSA-2019:3225
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-6465: Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if…
Published: 2019-10-09T16:15:00 Last Modified: 2019-12-16T16:57:00
Summary
Controls for zone transfers may not be properly applied to Dynamically Loadable Zones (DLZs) if the zones are writable Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P2, 9.12.0 -> 9.12.3-P2, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2019-6465.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-6465 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-15166: lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.
Published: 2019-10-03T17:15:00 Last Modified: 2021-09-23T20:15:00
Summary
lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-15166 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14462: The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14462 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14463: The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print().
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14463 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14469: The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14469 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14461: The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14461 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14467: The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-…
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14467 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14465: The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14465 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14468: The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14468 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.f5.com/csp/article/K04367730?utm_source=f5support&utm_medium=RSS
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14882: The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14882 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/d7505276842e85bfd067fa21cdb32b8a2dc3c5e4
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14881: The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-…
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14881 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/86326e880d31b328a151d45348c35220baa9a1ff
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14470: The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14470 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14464: The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-…
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14464 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/d97e94223720684c6aa740ff219e0d19426c2220
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14466: The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and…
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14466 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14879: The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in…
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14879 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.f5.com/csp/article/K51512510?utm_source=f5support&utm_medium=RSS
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14880: The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-…
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14880 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://support.f5.com/csp/article/K56551263?utm_source=f5support&utm_medium=RSS
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16227: The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the…
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16227 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16229: The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16229 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16451: The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for…
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16451 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16228: The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16228 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16230: The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print()…
Published: 2019-10-03T16:15:00 Last Modified: 2020-01-20T13:15:00
Summary
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16230 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/13d52e9c0e7caf7e6325b0051bc90a49968be67f
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- https://seclists.org/bugtraq/2019/Oct/28
- https://www.debian.org/security/2019/dsa-4547
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://support.apple.com/kb/HT210788
- https://seclists.org/bugtraq/2019/Dec/23
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://usn.ubuntu.com/4252-2/
- https://usn.ubuntu.com/4252-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-16276: Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
Published: 2019-09-30T19:15:00 Last Modified: 2021-03-22T13:19:00
Summary
Go before 1.12.10 and 1.13.x before 1.13.1 allow HTTP Request Smuggling.
Common Weakness Enumeration (CWE): CWE-444: Inconsistent Interpretation of HTTP Requests (‘HTTP Request Smuggling’)
CWE Description: When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to “smuggle” a request to one device without the other device being aware of it.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-16276 vulnerability.
References
- https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
- https://github.com/golang/go/issues/34540
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
- https://security.netapp.com/advisory/ntap-20191122-0004/
- https://access.redhat.com/errata/RHSA-2020:0101
- https://access.redhat.com/errata/RHSA-2020:0329
- https://access.redhat.com/errata/RHSA-2020:0652
- https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
- https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-16994: In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when…
Published: 2019-09-30T13:15:00 Last Modified: 2021-07-21T11:39:00
Summary
In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn->fb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.
Common Weakness Enumeration (CWE): CWE-401: Missing Release of Memory after Effective Lifetime
CWE Description: The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-16994 vulnerability.
References
- https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07f12b26e21ab359261bf75cfcb424fdc7daeb6d
- https://security.netapp.com/advisory/ntap-20191031-0005/
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-16680: An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path…
Published: 2019-09-21T21:15:00 Last Modified: 2019-12-20T17:23:00
Summary
An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-16680 vulnerability.
References
- https://gitlab.gnome.org/GNOME/file-roller/commit/57268e51e59b61c9e3125eb0f65551c7084297e2
- https://bugzilla.gnome.org/show_bug.cgi?id=794337
- https://gitlab.gnome.org/GNOME/file-roller/commit/e8fb3e24dae711e4fb0d6777e0016cdda8787bc1
- https://usn.ubuntu.com/4139-1/
- https://www.debian.org/security/2019/dsa-4537
- https://seclists.org/bugtraq/2019/Sep/57
- https://lists.debian.org/debian-lts-announce/2019/09/msg00032.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1767594
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14814: There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the…
Published: 2019-09-20T19:15:00 Last Modified: 2021-11-02T18:28:00
Summary
There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-14814 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814
- https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a
- https://access.redhat.com/security/cve/cve-2019-14814
- https://www.openwall.com/lists/oss-security/2019/08/28/1
- http://www.openwall.com/lists/oss-security/2019/08/28/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
- https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
- https://usn.ubuntu.com/4157-1/
- https://usn.ubuntu.com/4157-2/
- https://usn.ubuntu.com/4162-1/
- https://usn.ubuntu.com/4163-1/
- https://usn.ubuntu.com/4163-2/
- https://usn.ubuntu.com/4162-2/
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- https://security.netapp.com/advisory/ntap-20191031-0005/
- https://seclists.org/bugtraq/2019/Nov/11
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://access.redhat.com/errata/RHSA-2020:0174
- https://access.redhat.com/errata/RHSA-2020:0328
- https://access.redhat.com/errata/RHSA-2020:0339
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14816: There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell…
Published: 2019-09-20T19:15:00 Last Modified: 2021-11-02T18:28:00
Summary
There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-14816 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2019/08/28/1
- https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3
- http://www.openwall.com/lists/oss-security/2019/08/28/1
- https://access.redhat.com/security/cve/cve-2019-14816
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14816
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
- https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
- https://usn.ubuntu.com/4157-1/
- https://usn.ubuntu.com/4157-2/
- https://usn.ubuntu.com/4162-1/
- https://usn.ubuntu.com/4163-1/
- https://usn.ubuntu.com/4163-2/
- https://usn.ubuntu.com/4162-2/
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- https://security.netapp.com/advisory/ntap-20191031-0005/
- https://seclists.org/bugtraq/2019/Nov/11
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://access.redhat.com/errata/RHSA-2020:0174
- https://access.redhat.com/errata/RHSA-2020:0204
- https://access.redhat.com/errata/RHSA-2020:0328
- https://access.redhat.com/errata/RHSA-2020:0339
- https://access.redhat.com/errata/RHSA-2020:0375
- https://access.redhat.com/errata/RHSA-2020:0374
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- https://access.redhat.com/errata/RHSA-2020:0653
- https://access.redhat.com/errata/RHSA-2020:0661
- https://access.redhat.com/errata/RHSA-2020:0664
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14821: An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way…
Published: 2019-09-19T18:15:00 Last Modified: 2021-06-02T15:22:00
Summary
An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel’s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer ‘struct kvm_coalesced_mmio’ object, wherein write indices ‘ring->first’ and ‘ring->last’ value could be supplied by a host user-space process. An unprivileged host user or process with access to ‘/dev/kvm’ device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-14821 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14821
- http://www.openwall.com/lists/oss-security/2019/09/20/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/
- https://www.debian.org/security/2019/dsa-4531
- https://seclists.org/bugtraq/2019/Sep/41
- https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/
- https://security.netapp.com/advisory/ntap-20191004-0001/
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
- https://usn.ubuntu.com/4157-1/
- https://usn.ubuntu.com/4157-2/
- https://usn.ubuntu.com/4162-1/
- https://usn.ubuntu.com/4163-1/
- https://usn.ubuntu.com/4163-2/
- https://usn.ubuntu.com/4162-2/
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- https://access.redhat.com/errata/RHSA-2019:3517
- https://access.redhat.com/errata/RHSA-2019:3309
- https://seclists.org/bugtraq/2019/Nov/11
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://access.redhat.com/errata/RHSA-2019:3978
- https://access.redhat.com/errata/RHSA-2019:3979
- https://access.redhat.com/errata/RHSA-2019:4154
- https://access.redhat.com/errata/RHSA-2019:4256
- https://access.redhat.com/errata/RHSA-2020:0027
- https://access.redhat.com/errata/RHSA-2020:0204
- https://www.oracle.com/security-alerts/cpuapr2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14826: A flaw was found in FreeIPA versions 4.5.0 and later. Session cookies were retained in the cache…
Published: 2019-09-17T16:15:00 Last Modified: 2019-10-09T23:46:00
Summary
A flaw was found in FreeIPA versions 4.5.0 and later. Session cookies were retained in the cache after logout. An attacker could abuse this flaw if they obtain previously valid session cookies and can use this to gain access to the session.
Common Weakness Enumeration (CWE): CWE-613: Insufficient Session Expiration
CWE Description: According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-14826 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14835: A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel’s…
Published: 2019-09-17T16:15:00 Last Modified: 2021-06-02T15:44:00
Summary
A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel’s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-14835 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835
- https://www.openwall.com/lists/oss-security/2019/09/17/1
- https://usn.ubuntu.com/4135-2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/
- https://access.redhat.com/errata/RHSA-2019:2828
- https://access.redhat.com/errata/RHSA-2019:2827
- https://access.redhat.com/errata/RHSA-2019:2830
- https://access.redhat.com/errata/RHSA-2019:2829
- https://access.redhat.com/errata/RHSA-2019:2854
- https://access.redhat.com/errata/RHSA-2019:2863
- https://access.redhat.com/errata/RHSA-2019:2862
- https://access.redhat.com/errata/RHSA-2019:2865
- https://access.redhat.com/errata/RHSA-2019:2864
- https://access.redhat.com/errata/RHSA-2019:2866
- https://access.redhat.com/errata/RHSA-2019:2867
- https://access.redhat.com/errata/RHSA-2019:2869
- http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html
- http://www.openwall.com/lists/oss-security/2019/09/24/1
- https://access.redhat.com/errata/RHSA-2019:2889
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
- https://seclists.org/bugtraq/2019/Sep/41
- https://www.debian.org/security/2019/dsa-4531
- https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
- https://access.redhat.com/errata/RHSA-2019:2900
- https://access.redhat.com/errata/RHSA-2019:2901
- https://access.redhat.com/errata/RHSA-2019:2899
- https://access.redhat.com/errata/RHSA-2019:2924
- https://usn.ubuntu.com/4135-1/
- https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/
- http://www.openwall.com/lists/oss-security/2019/10/03/1
- http://www.openwall.com/lists/oss-security/2019/10/09/3
- http://www.openwall.com/lists/oss-security/2019/10/09/7
- https://access.redhat.com/errata/RHBA-2019:2824
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- https://security.netapp.com/advisory/ntap-20191031-0005/
- https://seclists.org/bugtraq/2019/Nov/11
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-15030: In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector…
Published: 2019-09-13T13:15:00 Last Modified: 2020-08-24T17:37:00
Summary
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users’ processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.
Common Weakness Enumeration (CWE): CWE-862: Missing Authorization
CWE Description: The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-15030 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60
- http://www.openwall.com/lists/oss-security/2019/09/10/3
- https://usn.ubuntu.com/4135-2/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
- https://usn.ubuntu.com/4135-1/
- https://security.netapp.com/advisory/ntap-20191004-0001/
- https://access.redhat.com/errata/RHSA-2020:0740
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-15031: In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector…
Published: 2019-09-13T13:15:00 Last Modified: 2021-07-21T11:39:00
Summary
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users’ processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.
Common Weakness Enumeration (CWE): CWE-662: Improper Synchronization
CWE Description: The software utilizes multiple threads or processes to allow temporary access to a shared resource that can only be exclusive to one process at a time, but it does not properly synchronize these actions, which might cause simultaneous accesses of this resource by multiple threads or processes.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-15031 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a8318c13e79badb92bc6640704a64cc022a6eb97
- http://www.openwall.com/lists/oss-security/2019/09/10/4
- https://usn.ubuntu.com/4135-2/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
- https://usn.ubuntu.com/4135-1/
- https://security.netapp.com/advisory/ntap-20191004-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return…
Published: 2019-09-11T16:15:00 Last Modified: 2020-05-04T20:22:00
Summary
drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-16231 vulnerability.
References
- https://lkml.org/lkml/2019/9/9/487
- https://security.netapp.com/advisory/ntap-20191004-0001/
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html
- https://usn.ubuntu.com/4227-1/
- https://usn.ubuntu.com/4225-1/
- https://usn.ubuntu.com/4226-1/
- https://usn.ubuntu.com/4227-2/
- https://usn.ubuntu.com/4225-2/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue…
Published: 2019-09-11T16:15:00 Last Modified: 2020-05-06T15:15:00
Summary
drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-16233 vulnerability.
References
- https://lkml.org/lkml/2019/9/9/487
- https://security.netapp.com/advisory/ntap-20191004-0001/
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html
- https://usn.ubuntu.com/4227-1/
- https://usn.ubuntu.com/4226-1/
- https://usn.ubuntu.com/4227-2/
- https://usn.ubuntu.com/4346-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-16229: ** DISPUTED ** drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in the Linux kernel 5.2.14 does not…
Published: 2019-09-11T16:15:00 Last Modified: 2020-05-04T17:41:00
Summary
** DISPUTED ** drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: The security community disputes this issues as not being serious enough to be deserving a CVE id.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-16229 vulnerability.
References
- https://lkml.org/lkml/2019/9/9/487
- https://security.netapp.com/advisory/ntap-20191004-0001/
- https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
- https://usn.ubuntu.com/4285-1/
- https://usn.ubuntu.com/4287-1/
- https://usn.ubuntu.com/4287-2/
- https://usn.ubuntu.com/4284-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-9854: LibreOffice has a feature where documents can specify that pre-installed macros can be executed…
Published: 2019-09-06T19:15:00 Last Modified: 2020-08-24T17:37:00
Summary
LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2019-9852, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed by employing a URL encoding attack to defeat the path verification step. However this protection could be bypassed by taking advantage of a flaw in how LibreOffice assembled the final script URL location directly from components of the passed in path as opposed to solely from the sanitized output of the path verification step. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-9854 vulnerability.
References
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/
- https://www.debian.org/security/2019/dsa-4519
- https://seclists.org/bugtraq/2019/Sep/17
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQKKOIY2DMZCXJINOLIQXD2NWISDKK3N/
- https://usn.ubuntu.com/4138-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html
- https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1769907
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-14813: A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where…
Published: 2019-09-06T14:15:00 Last Modified: 2020-10-16T13:20:00
Summary
A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass -dSAFER
restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
Common Weakness Enumeration (CWE): CWE-863: Incorrect Authorization
CWE Description: The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-14813 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813
- http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=885444fcbe10dc42787ecb76686c8ee4dd33bf33
- https://www.debian.org/security/2019/dsa-4518
- https://lists.debian.org/debian-lts-announce/2019/09/msg00007.html
- https://seclists.org/bugtraq/2019/Sep/15
- https://access.redhat.com/errata/RHSA-2019:2594
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
- https://access.redhat.com/errata/RHBA-2019:2824
- https://security.gentoo.org/glsa/202004-03
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-1125: An information disclosure vulnerability exists when certain central processing units (CPU)…
Published: 2019-09-03T18:15:00 Last Modified: 2020-08-24T17:37:00
Summary
An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory, aka ‘Windows Kernel Information Disclosure Vulnerability’. This CVE ID is unique from CVE-2019-1071, CVE-2019-1073.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2019-1125 vulnerability.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1125
- https://access.redhat.com/errata/RHSA-2019:2600
- https://access.redhat.com/errata/RHSA-2019:2609
- https://access.redhat.com/errata/RHSA-2019:2695
- https://access.redhat.com/errata/RHSA-2019:2696
- https://access.redhat.com/errata/RHSA-2019:2730
- https://kc.mcafee.com/corporate/index?page=content&id=SB10297
- https://access.redhat.com/errata/RHSA-2019:2899
- https://access.redhat.com/errata/RHSA-2019:2900
- https://access.redhat.com/errata/RHSA-2019:2975
- https://access.redhat.com/errata/RHSA-2019:3011
- https://access.redhat.com/errata/RHBA-2019:2824
- https://access.redhat.com/errata/RHSA-2019:3220
- https://access.redhat.com/errata/RHBA-2019:3248
- https://www.synology.com/security/advisory/Synology_SA_19_32
- http://packetstormsecurity.com/files/156337/SWAPGS-Attack-Proof-Of-Concept.html
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200408-01-swapgs-en
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-15807: In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c…
Published: 2019-08-29T18:15:00 Last Modified: 2020-08-24T17:37:00
Summary
In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.
Common Weakness Enumeration (CWE): CWE-401: Missing Release of Memory after Effective Lifetime
CWE Description: The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-15807 vulnerability.
References
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0541791453fbe7f42867e310e0c9eb6295364d
- https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
- https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
- https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
- https://security.netapp.com/advisory/ntap-20191004-0001/
- https://support.f5.com/csp/article/K52136304?utm_source=f5support&utm_medium=RSS
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10086: In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows…
Published: 2019-08-20T21:15:00 Last Modified: 2022-02-07T16:15:00
Summary
In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
Common Weakness Enumeration (CWE): CWE-502: Deserialization of Untrusted Data
CWE Description: The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10086 vulnerability.
References
- http://mail-archives.apache.org/mod_mbox/www-announce/201908.mbox/%3cC628798F-315D-4428-8CB1-4ED1ECC958E4@apache.org%3e
- https://lists.debian.org/debian-lts-announce/2019/08/msg00030.html
- https://lists.apache.org/thread.html/3d1ed1a1596c08c4d5fea97b36c651ce167b773f1afc75251ce7a125@%3Ccommits.tinkerpop.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00007.html
- https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3Cissues.commons.apache.org%3E
- https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3Cissues.commons.apache.org%3E
- https://lists.apache.org/thread.html/02094ad226dbc17a2368beaf27e61d8b1432f5baf77d0ca995bb78bc@%3Cissues.commons.apache.org%3E
- https://lists.apache.org/thread.html/2fd61dc89df9aeab738d2b49f48d42c76f7d53b980ba04e1d48bce48@%3Cdev.shiro.apache.org%3E
- https://lists.apache.org/thread.html/d6ca9439c53374b597f33b7ec180001625597db48ea30356af01145f@%3Cdev.shiro.apache.org%3E
- https://lists.apache.org/thread.html/c94bc9649d5109a663b2129371dc45753fbdeacd340105548bbe93c3@%3Cdev.shiro.apache.org%3E
- https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
- https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
- https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
- https://lists.apache.org/thread.html/5261066cd7adee081ee05c8bf0e96cf0b2eeaced391e19117ae4daa6@%3Cdev.shiro.apache.org%3E
- https://lists.apache.org/thread.html/a684107d3a78e431cf0fbb90629e8559a36ff8fe94c3a76e620b39fa@%3Cdev.shiro.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIUYSL2RSIWZVNSUIXJTIFPIPIF6OAIO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4APPGLBWMFAS4WHNLR4LIJ65DJGPV7TF/
- https://access.redhat.com/errata/RHSA-2019:4317
- https://access.redhat.com/errata/RHSA-2020:0057
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://access.redhat.com/errata/RHSA-2020:0194
- https://access.redhat.com/errata/RHSA-2020:0811
- https://access.redhat.com/errata/RHSA-2020:0804
- https://access.redhat.com/errata/RHSA-2020:0805
- https://access.redhat.com/errata/RHSA-2020:0806
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://lists.apache.org/thread.html/rae81e0c8ebdf47ffaa85a01240836bfece8a990c48f55c7933162b5c@%3Cdev.atlas.apache.org%3E
- https://lists.apache.org/thread.html/reee57101464cf7622d640ae013b2162eb864f603ec4093de8240bb8f@%3Cdev.atlas.apache.org%3E
- https://lists.apache.org/thread.html/r18d8b4f9263e5cad3bbaef0cdba0e2ccdf9201316ac4b85e23eb7ee4@%3Cdev.atlas.apache.org%3E
- https://lists.apache.org/thread.html/ra87ac17410a62e813cba901fdd4e9a674dd53daaf714870f28e905f1@%3Cdev.atlas.apache.org%3E
- https://lists.apache.org/thread.html/rb8dac04cb7e9cc5dedee8dabaa1c92614f590642e5ebf02a145915ba@%3Ccommits.atlas.apache.org%3E
- https://lists.apache.org/thread.html/r6194ced4828deb32023cd314e31f41c61d388b58935d102c7de91f58@%3Cdev.atlas.apache.org%3E
- https://lists.apache.org/thread.html/r306c0322aa5c0da731e03f3ce9f07f4745c052c6b73f4e78faf232ca@%3Cdev.atlas.apache.org%3E
- https://lists.apache.org/thread.html/racd3e7b2149fa2f255f016bd6bffab0fea77b6fb81c50db9a17f78e6@%3Cdev.atlas.apache.org%3E
- https://lists.apache.org/thread.html/r43de02fd4a4f52c4bdeff8c02f09625d83cd047498009c1cdab857db@%3Cdev.rocketmq.apache.org%3E
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c@%3Ccommits.dolphinscheduler.apache.org%3E
- https://lists.apache.org/thread.html/r513a7a21c422170318115463b399dd58ab447fe0990b13e5884f0825@%3Ccommits.dolphinscheduler.apache.org%3E
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://lists.apache.org/thread.html/rcc029be4edaaf5b8bb85818aab494e16f312fced07a0f4a202771ba2@%3Cissues.nifi.apache.org%3E
- https://lists.apache.org/thread.html/r46e536fc98942dce99fadd2e313aeefe90c1a769c5cd85d98df9d098@%3Cissues.nifi.apache.org%3E
- https://lists.apache.org/thread.html/rec74f3a94dd850259c730b4ba6f7b6211222b58900ec088754aa0534@%3Cissues.nifi.apache.org%3E
- https://lists.apache.org/thread.html/r2d5f1d88c39bd615271abda63964a0bee9b2b57fef1f84cb4c43032e@%3Cissues.nifi.apache.org%3E
- https://lists.apache.org/thread.html/re2028d4d76ba1db3e3c3a722d6c6034e801cc3b309f69cc166eaa32b@%3Ccommits.nifi.apache.org%3E
- https://lists.apache.org/thread.html/re3cd7cb641d7fc6684e4fc3c336a8bad4a01434bb5625a06e3600fd1@%3Cissues.nifi.apache.org%3E
- https://lists.apache.org/thread.html/ra41fd0ad4b7e1d675c03a5081a16a6603085a4e37d30b866067566fe@%3Cissues.nifi.apache.org%3E
- https://lists.apache.org/thread.html/rd2d2493f4f1af6980d265b8d84c857e2b7ab80a46e1423710c448957@%3Cissues.nifi.apache.org%3E
- https://lists.apache.org/thread.html/rb1f76c2c0a4d6efb8a3523974f9d085d5838b73e7bffdf9a8f212997@%3Cissues.nifi.apache.org%3E
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10140: A vulnerability was found in Linux kernel’s, versions up to 3.10, implementation of overlayfs. An…
Published: 2019-08-15T17:15:00 Last Modified: 2019-09-06T00:15:00
Summary
A vulnerability was found in Linux kernel’s, versions up to 3.10, implementation of overlayfs. An attacker with local access can create a denial of service situation via NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c. This can allow attackers with ability to create directories on overlayfs to crash the kernel creating a denial of service (DOS).
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-10140 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10140
- https://security.netapp.com/advisory/ntap-20190905-0002/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-9506: The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low…
Published: 2019-08-14T17:15:00 Last Modified: 2021-11-04T15:58:00
Summary
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka “KNOB”) that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
Common Weakness Enumeration (CWE): CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CWE Description: The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
Scores
- Impact Score: 4.9
- Exploitability Score: 6.5
- CVSS: 4.8
- CVSS Vector: AV:A/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2019-9506 vulnerability.
References
- https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/
- https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli
- http://www.cs.ox.ac.uk/publications/publication12404-abstract.html
- https://www.kb.cert.org/vuls/id/918987/
- http://seclists.org/fulldisclosure/2019/Aug/13
- http://seclists.org/fulldisclosure/2019/Aug/14
- http://seclists.org/fulldisclosure/2019/Aug/11
- http://seclists.org/fulldisclosure/2019/Aug/15
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en
- https://usn.ubuntu.com/4115-1/
- https://usn.ubuntu.com/4118-1/
- https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
- https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
- https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
- https://usn.ubuntu.com/4147-1/
- https://access.redhat.com/errata/RHSA-2019:2975
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:3055
- https://access.redhat.com/errata/RHSA-2019:3076
- https://access.redhat.com/errata/RHSA-2019:3089
- https://access.redhat.com/errata/RHSA-2019:3187
- https://access.redhat.com/errata/RHSA-2019:3217
- https://access.redhat.com/errata/RHSA-2019:3218
- https://access.redhat.com/errata/RHSA-2019:3165
- https://access.redhat.com/errata/RHSA-2019:3220
- https://access.redhat.com/errata/RHSA-2019:3231
- https://access.redhat.com/errata/RHSA-2019:3309
- https://access.redhat.com/errata/RHSA-2019:3517
- https://access.redhat.com/errata/RHSA-2020:0204
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-9513: Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of…
Published: 2019-08-13T21:15:00 Last Modified: 2021-01-30T02:36:00
Summary
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-9513 vulnerability.
References
- https://kb.cert.org/vuls/id/605641/
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- https://usn.ubuntu.com/4099-1/
- https://www.synology.com/security/advisory/Synology_SA_19_33
- https://support.f5.com/csp/article/K02591030
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/
- https://seclists.org/bugtraq/2019/Aug/40
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/
- https://www.debian.org/security/2019/dsa-4505
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0002/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/
- https://seclists.org/bugtraq/2019/Sep/1
- https://www.debian.org/security/2019/dsa-4511
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/
- https://access.redhat.com/errata/RHSA-2019:2692
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- https://access.redhat.com/errata/RHSA-2019:2746
- https://access.redhat.com/errata/RHSA-2019:2745
- https://access.redhat.com/errata/RHSA-2019:2775
- https://access.redhat.com/errata/RHSA-2019:2799
- https://access.redhat.com/errata/RHSA-2019:2925
- https://access.redhat.com/errata/RHSA-2019:2939
- https://access.redhat.com/errata/RHSA-2019:2949
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:2955
- https://access.redhat.com/errata/RHSA-2019:2966
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html
- https://support.f5.com/csp/article/K02591030?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/errata/RHSA-2019:3041
- https://access.redhat.com/errata/RHSA-2019:3935
- https://access.redhat.com/errata/RHSA-2019:3933
- https://access.redhat.com/errata/RHSA-2019:3932
- https://www.debian.org/security/2020/dsa-4669
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-9515: Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial…
Published: 2019-08-13T21:15:00 Last Modified: 2020-10-22T17:22:00
Summary
Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-9515 vulnerability.
References
- https://kb.cert.org/vuls/id/605641/
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
- https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
- https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
- https://seclists.org/bugtraq/2019/Aug/24
- http://seclists.org/fulldisclosure/2019/Aug/16
- https://www.synology.com/security/advisory/Synology_SA_19_33
- https://support.f5.com/csp/article/K50233772
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
- https://seclists.org/bugtraq/2019/Aug/43
- https://www.debian.org/security/2019/dsa-4508
- https://www.debian.org/security/2019/dsa-4520
- https://seclists.org/bugtraq/2019/Sep/18
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- https://access.redhat.com/errata/RHSA-2019:2766
- https://access.redhat.com/errata/RHSA-2019:2796
- https://access.redhat.com/errata/RHSA-2019:2861
- https://access.redhat.com/errata/RHSA-2019:2925
- https://access.redhat.com/errata/RHSA-2019:2939
- https://access.redhat.com/errata/RHSA-2019:2955
- https://support.f5.com/csp/article/K50233772?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/errata/RHSA-2019:3892
- https://access.redhat.com/errata/RHSA-2019:4018
- https://access.redhat.com/errata/RHSA-2019:4019
- https://access.redhat.com/errata/RHSA-2019:4021
- https://access.redhat.com/errata/RHSA-2019:4020
- https://access.redhat.com/errata/RHSA-2019:4041
- https://access.redhat.com/errata/RHSA-2019:4040
- https://access.redhat.com/errata/RHSA-2019:4042
- https://access.redhat.com/errata/RHSA-2019:4045
- https://access.redhat.com/errata/RHSA-2019:4352
- https://access.redhat.com/errata/RHSA-2020:0727
- https://usn.ubuntu.com/4308-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-9516: Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of…
Published: 2019-08-13T21:15:00 Last Modified: 2021-01-30T02:36:00
Summary
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.0
- CVSS: 6.8
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-9516 vulnerability.
References
- https://kb.cert.org/vuls/id/605641/
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- https://seclists.org/bugtraq/2019/Aug/24
- https://usn.ubuntu.com/4099-1/
- http://seclists.org/fulldisclosure/2019/Aug/16
- https://www.synology.com/security/advisory/Synology_SA_19_33
- https://support.f5.com/csp/article/K02591030
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/
- https://seclists.org/bugtraq/2019/Aug/40
- https://www.debian.org/security/2019/dsa-4505
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0002/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- https://access.redhat.com/errata/RHSA-2019:2746
- https://access.redhat.com/errata/RHSA-2019:2745
- https://access.redhat.com/errata/RHSA-2019:2775
- https://access.redhat.com/errata/RHSA-2019:2799
- https://access.redhat.com/errata/RHSA-2019:2925
- https://access.redhat.com/errata/RHSA-2019:2939
- https://access.redhat.com/errata/RHSA-2019:2946
- https://access.redhat.com/errata/RHSA-2019:2950
- https://access.redhat.com/errata/RHSA-2019:2955
- https://access.redhat.com/errata/RHSA-2019:2966
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html
- https://support.f5.com/csp/article/K02591030?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/errata/RHSA-2019:3935
- https://access.redhat.com/errata/RHSA-2019:3933
- https://access.redhat.com/errata/RHSA-2019:3932
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H472D5HPXN6RRXCNFML3BK5OYC52CXF2/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-9511: Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization…
Published: 2019-08-13T21:15:00 Last Modified: 2021-01-30T02:36:00
Summary
Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-9511 vulnerability.
References
- https://kb.cert.org/vuls/id/605641/
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- https://usn.ubuntu.com/4099-1/
- https://www.synology.com/security/advisory/Synology_SA_19_33
- https://support.f5.com/csp/article/K02591030
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TAZZEVTCN2B4WT6AIBJ7XGYJMBTORJU5/
- https://seclists.org/bugtraq/2019/Aug/40
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZLUYPYY3RX4ZJDWZRJIKSULYRJ4PXW7/
- https://www.debian.org/security/2019/dsa-4505
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0002/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUBYAF6ED3O4XCHQ5C2HYENJLXYXZC4M/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/
- https://seclists.org/bugtraq/2019/Sep/1
- https://www.debian.org/security/2019/dsa-4511
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPAEC4FWL4UU4LDEGPY5NPALU24FFQD/
- https://access.redhat.com/errata/RHSA-2019:2692
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- https://access.redhat.com/errata/RHSA-2019:2746
- https://access.redhat.com/errata/RHSA-2019:2745
- https://access.redhat.com/errata/RHSA-2019:2775
- https://access.redhat.com/errata/RHSA-2019:2799
- https://access.redhat.com/errata/RHSA-2019:2925
- https://access.redhat.com/errata/RHSA-2019:2939
- https://access.redhat.com/errata/RHSA-2019:2949
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00005.html
- https://access.redhat.com/errata/RHSA-2019:2955
- https://access.redhat.com/errata/RHSA-2019:2966
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00014.html
- https://support.f5.com/csp/article/K02591030?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/errata/RHSA-2019:3041
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3935
- https://access.redhat.com/errata/RHSA-2019:3933
- https://access.redhat.com/errata/RHSA-2019:3932
- https://access.redhat.com/errata/RHSA-2019:4018
- https://access.redhat.com/errata/RHSA-2019:4019
- https://access.redhat.com/errata/RHSA-2019:4021
- https://access.redhat.com/errata/RHSA-2019:4020
- https://www.debian.org/security/2020/dsa-4669
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-9514: Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of…
Published: 2019-08-13T21:15:00 Last Modified: 2020-12-09T00:15:00
Summary
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-9514 vulnerability.
References
- https://kb.cert.org/vuls/id/605641/
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- https://lists.apache.org/thread.html/ad3d01e767199c1aed8033bb6b3f5bf98c011c7c536f07a5d34b3c19@%3Cannounce.trafficserver.apache.org%3E
- https://lists.apache.org/thread.html/392108390cef48af647a2e47b7fd5380e050e35ae8d1aa2030254c04@%3Cusers.trafficserver.apache.org%3E
- https://lists.apache.org/thread.html/bde52309316ae798186d783a5e29f4ad1527f61c9219a289d0eee0a7@%3Cdev.trafficserver.apache.org%3E
- https://seclists.org/bugtraq/2019/Aug/24
- http://seclists.org/fulldisclosure/2019/Aug/16
- https://www.synology.com/security/advisory/Synology_SA_19_33
- https://seclists.org/bugtraq/2019/Aug/31
- https://www.debian.org/security/2019/dsa-4503
- https://support.f5.com/csp/article/K01988340
- http://www.openwall.com/lists/oss-security/2019/08/20/1
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0001/
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00076.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
- https://seclists.org/bugtraq/2019/Aug/43
- https://www.debian.org/security/2019/dsa-4508
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BBP27PZGSY6OP6D26E5FW4GZKBFHNU7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYO6E3H34C346D2E443GLXK7OK6KIYIQ/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00021.html
- https://access.redhat.com/errata/RHSA-2019:2682
- https://www.debian.org/security/2019/dsa-4520
- https://access.redhat.com/errata/RHSA-2019:2726
- https://seclists.org/bugtraq/2019/Sep/18
- https://access.redhat.com/errata/RHSA-2019:2594
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
- https://access.redhat.com/errata/RHSA-2019:2661
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- https://access.redhat.com/errata/RHSA-2019:2690
- https://access.redhat.com/errata/RHSA-2019:2766
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00038.html
- https://access.redhat.com/errata/RHSA-2019:2796
- https://access.redhat.com/errata/RHSA-2019:2861
- https://access.redhat.com/errata/RHSA-2019:2925
- https://access.redhat.com/errata/RHSA-2019:2939
- https://access.redhat.com/errata/RHSA-2019:2955
- https://access.redhat.com/errata/RHSA-2019:2966
- https://support.f5.com/csp/article/K01988340?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/errata/RHSA-2019:3131
- https://access.redhat.com/errata/RHSA-2019:2769
- https://access.redhat.com/errata/RHSA-2019:3245
- https://access.redhat.com/errata/RHSA-2019:3265
- https://access.redhat.com/errata/RHSA-2019:3892
- https://access.redhat.com/errata/RHSA-2019:3906
- https://access.redhat.com/errata/RHSA-2019:4018
- https://access.redhat.com/errata/RHSA-2019:4020
- https://access.redhat.com/errata/RHSA-2019:4019
- https://access.redhat.com/errata/RHSA-2019:4021
- https://access.redhat.com/errata/RHSA-2019:4040
- https://access.redhat.com/errata/RHSA-2019:4042
- https://access.redhat.com/errata/RHSA-2019:4041
- https://access.redhat.com/errata/RHSA-2019:4045
- https://access.redhat.com/errata/RHSA-2019:4269
- https://access.redhat.com/errata/RHSA-2019:4273
- https://access.redhat.com/errata/RHSA-2019:4352
- https://access.redhat.com/errata/RHSA-2020:0406
- https://access.redhat.com/errata/RHSA-2020:0727
- https://usn.ubuntu.com/4308-1/
- https://www.debian.org/security/2020/dsa-4669
- https://lists.debian.org/debian-lts-announce/2020/12/msg00011.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-9517: Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially…
Published: 2019-08-13T21:15:00 Last Modified: 2021-06-06T11:15:00
Summary
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-9517 vulnerability.
References
- https://kb.cert.org/vuls/id/605641/
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- https://lists.apache.org/thread.html/4610762456644181b267c846423b3a990bd4aaea1886ecc7d51febdb@%3Cannounce.httpd.apache.org%3E
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
- http://www.openwall.com/lists/oss-security/2019/08/15/7
- https://lists.apache.org/thread.html/d89f999e26dfb1d50f247ead1fe8538014eb412b2dbe5be4b1a9ef50@%3Cdev.httpd.apache.org%3E
- https://lists.apache.org/thread.html/ec97fdfc1a859266e56fef084353a34e0a0b08901b3c1aa317a43c8c@%3Cdev.httpd.apache.org%3E
- https://www.synology.com/security/advisory/Synology_SA_19_33
- https://support.f5.com/csp/article/K02591030
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0003/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
- https://www.debian.org/security/2019/dsa-4509
- https://seclists.org/bugtraq/2019/Aug/47
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BP556LEG3WENHZI5TAQ6ZEBFTJB4E2IS/
- https://usn.ubuntu.com/4113-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XHTKU7YQ5EEP2XNSAV4M4VJ7QCBOJMOD/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html
- https://security.netapp.com/advisory/ntap-20190905-0003/
- https://security.gentoo.org/glsa/201909-04
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- https://access.redhat.com/errata/RHSA-2019:2893
- https://access.redhat.com/errata/RHSA-2019:2925
- https://access.redhat.com/errata/RHSA-2019:2939
- https://access.redhat.com/errata/RHSA-2019:2946
- https://access.redhat.com/errata/RHSA-2019:2950
- https://access.redhat.com/errata/RHSA-2019:2949
- https://access.redhat.com/errata/RHSA-2019:2955
- https://support.f5.com/csp/article/K02591030?utm_source=f5support&utm_medium=RSS
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3935
- https://access.redhat.com/errata/RHSA-2019:3933
- https://access.redhat.com/errata/RHSA-2019:3932
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-9518: Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a…
Published: 2019-08-13T21:15:00 Last Modified: 2021-05-27T16:21:00
Summary
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-9518 vulnerability.
References
- https://kb.cert.org/vuls/id/605641/
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- https://seclists.org/bugtraq/2019/Aug/24
- http://seclists.org/fulldisclosure/2019/Aug/16
- https://www.synology.com/security/advisory/Synology_SA_19_33
- https://support.f5.com/csp/article/K46011592
- https://lists.apache.org/thread.html/091b518265bce56a16af87b77c8cfacda902a02079e866f9fdf13b61@%3Cusers.trafficserver.apache.org%3E
- https://lists.apache.org/thread.html/2653c56545573b528f3f6352a29eccaf498bd6fb2a6a59568d81a61d@%3Cannounce.trafficserver.apache.org%3E
- https://lists.apache.org/thread.html/ff5b0821a6985159a832ff6d1a4bd311ac07ecc7db1e2d8bab619107@%3Cdev.trafficserver.apache.org%3E
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CMNFX5MNYRWWIMO4BTKYQCGUDMHO3AXP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4ZQGHE3WTYLYAYJEIDJVF2FIGQTAYPMC/
- https://www.debian.org/security/2019/dsa-4520
- https://seclists.org/bugtraq/2019/Sep/18
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00031.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- https://access.redhat.com/errata/RHSA-2019:2925
- https://access.redhat.com/errata/RHSA-2019:2939
- https://access.redhat.com/errata/RHSA-2019:2955
- https://support.f5.com/csp/article/K46011592?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/errata/RHSA-2019:3892
- https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
- https://access.redhat.com/errata/RHSA-2019:4352
- https://access.redhat.com/errata/RHSA-2020:0727
- https://lists.apache.org/thread.html/r99a625fb17032646d96cd23dec49603ff630e9318e44a686d63046bc@%3Ccommits.cassandra.apache.org%3E
- https://lists.apache.org/thread.html/rd31230d01fa6aad18bdadc0720acd1747e53690bd35f73a48e7a9b75@%3Ccommits.cassandra.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10171: It was found that the fix for CVE-2018-14648 in 389-ds-base, versions 1.4.0.x before 1.4.0.17,…
Published: 2019-08-02T14:15:00 Last Modified: 2020-12-04T18:15:00
Summary
It was found that the fix for CVE-2018-14648 in 389-ds-base, versions 1.4.0.x before 1.4.0.17, was incorrectly applied in RHEL 7.5. An attacker would still be able to provoke excessive CPU consumption leading to a denial of service.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10171 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10166: It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would…
Published: 2019-08-02T13:15:00 Last Modified: 2020-10-15T13:28:00
Summary
It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-10166 vulnerability.
References
- https://access.redhat.com/libvirt-privesc-vulnerabilities
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10166
- https://security.gentoo.org/glsa/202003-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10167: The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before…
Published: 2019-08-02T13:15:00 Last Modified: 2020-10-15T13:28:00
Summary
The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an “emulatorbin” argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain’s capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
Common Weakness Enumeration (CWE): CWE-862: Missing Authorization
CWE Description: The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-10167 vulnerability.
References
- https://access.redhat.com/libvirt-privesc-vulnerabilities
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10167
- https://security.gentoo.org/glsa/202003-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10168: The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x…
Published: 2019-08-02T13:15:00 Last Modified: 2020-10-15T13:28:00
Summary
The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an “emulator” argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain’s capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-10168 vulnerability.
References
- https://access.redhat.com/libvirt-privesc-vulnerabilities
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10168
- https://security.gentoo.org/glsa/202003-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3890: It was discovered evolution-ews before 3.31.3 does not check the validity of SSL certificates. An…
Published: 2019-08-01T14:15:00 Last Modified: 2019-10-09T23:49:00
Summary
It was discovered evolution-ews before 3.31.3 does not check the validity of SSL certificates. An attacker could abuse this flaw to get confidential information by tricking the user into connecting to a fake server without the user noticing the difference.
Common Weakness Enumeration (CWE): CWE-295: Improper Certificate Validation
CWE Description: The software does not validate, or incorrectly validates, a certificate.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3890 vulnerability.
References
- https://gitlab.gnome.org/GNOME/evolution-ews/issues/27
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3890
- https://access.redhat.com/errata/RHSA-2019:3699
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10182: It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly sanitize paths from …
Published: 2019-07-31T22:15:00 Last Modified: 2019-08-15T15:15:00
Summary
It was found that icedtea-web though 1.7.2 and 1.8.2 did not properly sanitize paths from
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10182 vulnerability.
References
- https://github.com/AdoptOpenJDK/IcedTea-Web/issues/327
- https://github.com/AdoptOpenJDK/IcedTea-Web/pull/344
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10182
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00045.html
- https://lists.debian.org/debian-lts-announce/2019/09/msg00008.html
- https://seclists.org/bugtraq/2019/Oct/5
- http://packetstormsecurity.com/files/154748/IcedTeaWeb-Validation-Bypass-Directory-Traversal-Code-Execution.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10161: It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients…
Published: 2019-07-30T23:15:00 Last Modified: 2021-03-25T14:09:00
Summary
It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.
Common Weakness Enumeration (CWE): CWE-862: Missing Authorization
CWE Description: The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-10161 vulnerability.
References
- https://access.redhat.com/libvirt-privesc-vulnerabilities
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10161
- https://libvirt.org/git/?p=libvirt.git;a=commit;h=aed6a032cead4386472afb24b16196579e239580
- https://usn.ubuntu.com/4047-2/
- https://security.gentoo.org/glsa/202003-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10153: A flaw was discovered in fence-agents, prior to version 4.3.4, where using non-ASCII characters…
Published: 2019-07-30T23:15:00 Last Modified: 2019-10-09T23:44:00
Summary
A flaw was discovered in fence-agents, prior to version 4.3.4, where using non-ASCII characters in a guest VM’s comment or other fields would cause fence_rhevm to exit with an exception. In cluster environments, this could lead to preventing automated recovery or otherwise denying service to clusters of which that VM is a member.
Common Weakness Enumeration (CWE): CWE-172: Encoding Error
CWE Description: The software does not properly encode or decode the data, resulting in unexpected values.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10153 vulnerability.
References
- https://github.com/ClusterLabs/fence-agents/pull/255
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10153
- https://github.com/ClusterLabs/fence-agents/pull/272
- https://access.redhat.com/errata/RHSA-2019:2037
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16871: A flaw was found in the Linux kernel’s NFS implementation, all versions 3.x and all versions 4.x…
Published: 2019-07-30T17:15:00 Last Modified: 2021-10-04T19:15:00
Summary
A flaw was found in the Linux kernel’s NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16871 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16871
- https://access.redhat.com/errata/RHSA-2019:2696
- https://access.redhat.com/errata/RHSA-2019:2730
- https://support.f5.com/csp/article/K18657134
- https://support.f5.com/csp/article/K18657134?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/errata/RHSA-2020:0740
- https://security.netapp.com/advisory/ntap-20211004-0002/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-11775: All builds of Eclipse OpenJ9 prior to 0.15 contain a bug where the loop versioner may fail to…
Published: 2019-07-30T14:15:00 Last Modified: 2020-10-08T14:46:00
Summary
All builds of Eclipse OpenJ9 prior to 0.15 contain a bug where the loop versioner may fail to privatize a value that is pulled out of the loop by versioning - for example if there is a condition that is moved out of the loop that reads a field we may not privatize the value of that field in the modified copy of the loop allowing the test to see one value of the field and subsequently the loop to see a modified field value without retesting the condition moved out of the loop. This can lead to a variety of different issues but read out of array bounds is one major consequence of these problems.
Common Weakness Enumeration (CWE): CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
CWE Description: The software checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check. This can cause the software to perform invalid actions when the resource is in an unexpected state.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-11775 vulnerability.
References
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=549601
- https://access.redhat.com/errata/RHSA-2019:2494
- https://access.redhat.com/errata/RHSA-2019:2495
- https://access.redhat.com/errata/RHSA-2019:2585
- https://access.redhat.com/errata/RHSA-2019:2590
- https://access.redhat.com/errata/RHSA-2019:2592
- https://access.redhat.com/errata/RHSA-2019:2737
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-13272: In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the…
Published: 2019-07-17T13:15:00 Last Modified: 2021-11-28T23:34:00
Summary
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit’s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 4)
Code designed for conducting penetration testing on CVE-2019-13272 vulnerability.
- Linux Kernel 5.1.x - 'PTRACE_TRACEME' pkexec Local Privilege Escalation (2) by Ujas Dhami at 2021-11-23
- Linux Polkit - pkexec helper PTRACE_TRACEME local root (Metasploit) by Metasploit at 2019-10-24
- Linux Kernel 4.10 < 5.1.17 - 'PTRACE_TRACEME' pkexec Local Privilege Escalation by bcoles at 2019-07-24
- Linux - Broken Permission and Object Lifetime Handling for PTRACE_TRACEME by Google Security Research at 2019-07-17
References
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
- http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17
- https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee
- https://bugzilla.suse.com/show_bug.cgi?id=1140671
- https://bugzilla.redhat.com/show_bug.cgi?id=1730895
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGRK5LYWBJ4E4SRI4DKX367NHYSI3VOH/
- https://www.debian.org/security/2019/dsa-4484
- https://seclists.org/bugtraq/2019/Jul/30
- https://seclists.org/bugtraq/2019/Jul/33
- https://lists.debian.org/debian-lts-announce/2019/07/msg00023.html
- https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html
- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://security.netapp.com/advisory/ntap-20190806-0001/
- https://access.redhat.com/errata/RHSA-2019:2405
- https://access.redhat.com/errata/RHSA-2019:2411
- https://usn.ubuntu.com/4095-1/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4093-1/
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- https://support.f5.com/csp/article/K91025336
- https://usn.ubuntu.com/4117-1/
- https://usn.ubuntu.com/4118-1/
- https://access.redhat.com/errata/RHSA-2019:2809
- https://support.f5.com/csp/article/K91025336?utm_source=f5support&utm_medium=RSS
- http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html
- http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html
- http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-13616: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-…
Published: 2019-07-16T17:15:00 Last Modified: 2021-11-30T18:51:00
Summary
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit in video/SDL_blit.c.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-13616 vulnerability.
References
- https://bugzilla.libsdl.org/show_bug.cgi?id=4538
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HEH5RO7XZA5DDCO2XOP4QHDEELQQTYV2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UITVW4WTOOCECLLWPQCV7VWMU66DN255/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00093.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00094.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDNX3RVXTWELBXQDNERNVVKDGKDF2MPB/
- https://usn.ubuntu.com/4156-1/
- https://usn.ubuntu.com/4156-2/
- https://access.redhat.com/errata/RHSA-2019:3951
- https://access.redhat.com/errata/RHSA-2019:3950
- https://usn.ubuntu.com/4238-1/
- https://access.redhat.com/errata/RHSA-2020:0293
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6FDFPYUJ7YPY3XB5U75VJHBSVRVIKO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZO47LLKKRXKMUGSRCFNHSTHG5OEBYCG/
- https://lists.debian.org/debian-lts-announce/2021/01/msg00024.html
- https://lists.debian.org/debian-lts-announce/2021/10/msg00032.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10192: A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions…
Published: 2019-07-11T19:15:00 Last Modified: 2021-10-28T12:14:00
Summary
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10192 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192
- https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES
- https://www.debian.org/security/2019/dsa-4480
- https://seclists.org/bugtraq/2019/Jul/19
- https://usn.ubuntu.com/4061-1/
- http://www.securityfocus.com/bid/109290
- https://access.redhat.com/errata/RHSA-2019:1819
- https://access.redhat.com/errata/RHSA-2019:1860
- https://access.redhat.com/errata/RHSA-2019:2002
- https://security.gentoo.org/glsa/201908-04
- https://access.redhat.com/errata/RHSA-2019:2508
- https://access.redhat.com/errata/RHSA-2019:2506
- https://access.redhat.com/errata/RHSA-2019:2621
- https://access.redhat.com/errata/RHSA-2019:2630
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10193: A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions…
Published: 2019-07-11T19:15:00 Last Modified: 2021-10-28T12:14:00
Summary
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10193 vulnerability.
References
- https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10193
- https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES
- https://www.debian.org/security/2019/dsa-4480
- https://seclists.org/bugtraq/2019/Jul/19
- https://usn.ubuntu.com/4061-1/
- http://www.securityfocus.com/bid/109290
- https://access.redhat.com/errata/RHSA-2019:1819
- https://access.redhat.com/errata/RHSA-2019:2002
- https://security.gentoo.org/glsa/201908-04
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10183: Virt-install(1) utility used to provision new virtual machines has introduced an option ‘–…
Published: 2019-07-03T14:15:00 Last Modified: 2019-10-09T23:44:00
Summary
Virt-install(1) utility used to provision new virtual machines has introduced an option ‘–unattended’ to create VMs without user interaction. This option accepts guest VM password as command line arguments, thus leaking them to others users on the system via process listing. It was introduced recently in the virt-manager v2.2.0 release.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-10183 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10183
- http://www.securityfocus.com/bid/109027
- https://access.redhat.com/errata/RHSA-2019:3464
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10164: PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-…
Published: 2019-06-26T16:15:00 Last Modified: 2020-10-02T14:34:00
Summary
PostgreSQL versions 10.x before 10.9 and versions 11.x before 11.4 are vulnerable to a stack-based buffer overflow. Any authenticated user can overflow a stack-based buffer by changing the user’s own password to a purpose-crafted value. This often suffices to execute arbitrary code as the PostgreSQL operating system account.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.0
- CVSS: 9.0
- CVSS Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10164 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10164
- https://www.postgresql.org/about/news/1949/
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00035.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAGE6H4FWLKFLHLWVYNPYGQRPIXTUWGB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TTKEHXGDXYYD6WYDIIQJP4GDQJSENDJK/
- https://security.gentoo.org/glsa/202003-03
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-12384: FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts…
Published: 2019-06-24T16:15:00 Last Modified: 2020-10-20T22:15:00
Summary
FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.
Common Weakness Enumeration (CWE): CWE-502: Deserialization of Untrusted Data
CWE Description: The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-12384 vulnerability.
References
- https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html
- https://doyensec.com/research.html
- https://github.com/FasterXML/jackson-databind/compare/74b90a4...a977aad
- https://security.netapp.com/advisory/ntap-20190703-0002/
- https://access.redhat.com/errata/RHSA-2019:1820
- https://blog.doyensec.com/2019/07/22/jackson-gadgets.html
- https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E
- https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E
- https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E
- https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E
- https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E
- https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E
- https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E
- https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E
- https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E
- https://access.redhat.com/errata/RHSA-2019:2720
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/
- https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/
- https://access.redhat.com/errata/RHSA-2019:2858
- https://access.redhat.com/errata/RHSA-2019:2937
- https://access.redhat.com/errata/RHSA-2019:2936
- https://access.redhat.com/errata/RHSA-2019:2935
- https://access.redhat.com/errata/RHSA-2019:2938
- https://www.debian.org/security/2019/dsa-4542
- https://seclists.org/bugtraq/2019/Oct/6
- https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E
- https://access.redhat.com/errata/RHSA-2019:2998
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E
- https://access.redhat.com/errata/RHSA-2019:3149
- https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E
- https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E
- https://access.redhat.com/errata/RHSA-2019:3292
- https://access.redhat.com/errata/RHSA-2019:3297
- https://access.redhat.com/errata/RHSA-2019:3200
- https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E
- https://access.redhat.com/errata/RHSA-2019:3901
- https://access.redhat.com/errata/RHSA-2019:4352
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-11038: When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as…
Published: 2019-06-19T00:15:00 Last Modified: 2020-10-16T12:58:00
Summary
When using the gdImageCreateFromXbm() function in the GD Graphics Library (aka LibGD) 2.2.5, as used in the PHP GD extension in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6, it is possible to supply data that will cause the function to use the value of uninitialized variable. This may lead to disclosing contents of the stack that has been left there by previous code.
Common Weakness Enumeration (CWE): CWE-908: Use of Uninitialized Resource
CWE Description: The software uses or accesses a resource that has not been initialized.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-11038 vulnerability.
References
- https://bugs.php.net/bug.php?id=77973
- https://lists.debian.org/debian-lts-announce/2019/06/msg00003.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1724149
- https://bugzilla.suse.com/show_bug.cgi?id=1140120
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929821
- https://github.com/libgd/libgd/issues/501
- https://bugzilla.redhat.com/show_bug.cgi?id=1724432
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKSSWFR2WPMUOIB5EN5ZM252NNEPYUTG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAZBVK6XNYEIN7RDQXESSD63QHXPLKWL/
- https://bugzilla.suse.com/show_bug.cgi?id=1140118
- https://access.redhat.com/errata/RHSA-2019:2519
- https://seclists.org/bugtraq/2019/Sep/38
- https://www.debian.org/security/2019/dsa-4529
- https://access.redhat.com/errata/RHSA-2019:3299
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00020.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/
- https://usn.ubuntu.com/4316-2/
- https://usn.ubuntu.com/4316-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-11478: Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in…
Published: 2019-06-19T00:15:00 Last Modified: 2021-07-15T19:16:00
Summary
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-11478 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
- https://access.redhat.com/security/vulnerabilities/tcpsack
- https://support.f5.com/csp/article/K26618426
- http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
- https://www.kb.cert.org/vuls/id/905115
- https://www.synology.com/security/advisory/Synology_SA_19_28
- https://security.netapp.com/advisory/ntap-20190625-0001/
- https://access.redhat.com/errata/RHSA-2019:1594
- https://access.redhat.com/errata/RHSA-2019:1602
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0007
- https://kc.mcafee.com/corporate/index?page=content&id=SB10287
- http://www.openwall.com/lists/oss-security/2019/06/28/2
- http://www.vmware.com/security/advisories/VMSA-2019-0010.html
- http://www.openwall.com/lists/oss-security/2019/07/06/3
- http://www.openwall.com/lists/oss-security/2019/07/06/4
- https://access.redhat.com/errata/RHSA-2019:1699
- https://seclists.org/bugtraq/2019/Jul/30
- http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
- https://www.us-cert.gov/ics/advisories/icsa-19-253-03
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- http://www.openwall.com/lists/oss-security/2019/10/24/1
- http://www.openwall.com/lists/oss-security/2019/10/29/3
- https://www.oracle.com/security-alerts/cpujan2020.html
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt
- https://www.oracle.com/security-alerts/cpuoct2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-11477: Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer…
Published: 2019-06-19T00:15:00 Last Modified: 2021-07-15T19:16:00
Summary
Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-11477 vulnerability.
References
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
- https://access.redhat.com/security/vulnerabilities/tcpsack
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=3b4929f65b0d8249f19a50245cd88ed1a2f78cff
- https://support.f5.com/csp/article/K78234183
- http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
- https://www.kb.cert.org/vuls/id/905115
- http://www.openwall.com/lists/oss-security/2019/06/20/3
- https://www.synology.com/security/advisory/Synology_SA_19_28
- https://security.netapp.com/advisory/ntap-20190625-0001/
- https://access.redhat.com/errata/RHSA-2019:1594
- https://access.redhat.com/errata/RHSA-2019:1602
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0006
- https://kc.mcafee.com/corporate/index?page=content&id=SB10287
- http://www.openwall.com/lists/oss-security/2019/06/28/2
- http://www.vmware.com/security/advisories/VMSA-2019-0010.html
- http://www.openwall.com/lists/oss-security/2019/07/06/3
- http://www.openwall.com/lists/oss-security/2019/07/06/4
- https://access.redhat.com/errata/RHSA-2019:1699
- https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
- https://www.us-cert.gov/ics/advisories/icsa-19-253-03
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- http://www.openwall.com/lists/oss-security/2019/10/24/1
- http://www.openwall.com/lists/oss-security/2019/10/29/3
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191225-01-kernel-en
- https://www.oracle.com/security-alerts/cpujan2020.html
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt
- https://www.oracle.com/security-alerts/cpuoct2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-11479: Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This…
Published: 2019-06-19T00:15:00 Last Modified: 2020-10-20T22:15:00
Summary
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-11479 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=5f3e2bf008c2221478101ee72f5cb4654b9fc363
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6
- https://access.redhat.com/security/vulnerabilities/tcpsack
- https://support.f5.com/csp/article/K35421172
- http://www.securityfocus.com/bid/108818
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
- https://www.kb.cert.org/vuls/id/905115
- https://www.synology.com/security/advisory/Synology_SA_19_28
- https://security.netapp.com/advisory/ntap-20190625-0001/
- https://access.redhat.com/errata/RHSA-2019:1594
- https://access.redhat.com/errata/RHSA-2019:1602
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0008
- https://kc.mcafee.com/corporate/index?page=content&id=SB10287
- http://www.openwall.com/lists/oss-security/2019/06/28/2
- https://usn.ubuntu.com/4041-2/
- http://www.openwall.com/lists/oss-security/2019/07/06/3
- http://www.openwall.com/lists/oss-security/2019/07/06/4
- https://access.redhat.com/errata/RHSA-2019:1699
- https://usn.ubuntu.com/4041-1/
- https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
- https://www.us-cert.gov/ics/advisories/icsa-19-253-03
- https://support.f5.com/csp/article/K35421172?utm_source=f5support&utm_medium=RSS
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.us-cert.gov/ics/advisories/icsma-20-170-06
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt
- https://www.oracle.com/security-alerts/cpuoct2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3896: A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An…
Published: 2019-06-19T00:15:00 Last Modified: 2019-07-01T20:15:00
Summary
A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-3896 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3896
- http://www.securityfocus.com/bid/108814
- https://support.f5.com/csp/article/K04327111
- https://security.netapp.com/advisory/ntap-20190710-0002/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6711: A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by…
Published: 2019-06-18T18:15:00 Last Modified: 2019-06-20T09:15:00
Summary
A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the “echo -e” built-in function, may use this flaw to crash a script or execute code with the privileges of the bash process. This occurs because ansicstr() in lib/sh/strtrans.c mishandles u32cconv().
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-6711 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1721071
- http://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=863d31ae775d56b785dc5b0105b6d251515d81d5
- http://www.securityfocus.com/bid/108824
- https://support.f5.com/csp/article/K05122252
- https://support.f5.com/csp/article/K05122252?utm_source=f5support&utm_medium=RSS
- https://usn.ubuntu.com/4180-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8324: An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line…
Published: 2019-06-17T19:15:00 Last Modified: 2020-08-24T17:37:00
Summary
An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-8324 vulnerability.
References
- https://hackerone.com/reports/328571
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:1972
- https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10126: A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies…
Published: 2019-06-14T14:29:00 Last Modified: 2021-10-28T12:20:00
Summary
A flaw was found in the Linux kernel. A heap based buffer overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c might lead to memory corruption and possibly other consequences.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10126 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10126
- https://www.debian.org/security/2019/dsa-4465
- https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
- https://seclists.org/bugtraq/2019/Jun/26
- http://www.securityfocus.com/bid/108817
- https://support.f5.com/csp/article/K95593121
- https://security.netapp.com/advisory/ntap-20190710-0002/
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
- https://seclists.org/bugtraq/2019/Jul/33
- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://usn.ubuntu.com/4095-2/
- https://usn.ubuntu.com/4095-1/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4093-1/
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- https://usn.ubuntu.com/4117-1/
- https://usn.ubuntu.com/4118-1/
- https://access.redhat.com/errata/RHSA-2019:3055
- https://access.redhat.com/errata/RHSA-2019:3076
- https://access.redhat.com/errata/RHSA-2019:3089
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- https://access.redhat.com/errata/RHSA-2019:3309
- https://access.redhat.com/errata/RHSA-2019:3517
- https://access.redhat.com/errata/RHSA-2020:0174
- https://access.redhat.com/errata/RHSA-2020:0204
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10155: The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange…
Published: 2019-06-12T14:29:00 Last Modified: 2020-09-30T14:20:00
Summary
The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29.
Common Weakness Enumeration (CWE): CWE-354: Improper Validation of Integrity Check Value
CWE Description: The software does not validate or incorrectly validates the integrity check values or “checksums” of a message. This may prevent it from detecting if the data has been modified or corrupted in transmission.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10155 vulnerability.
References
- https://libreswan.org/security/CVE-2019-10155/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10155
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LFGPGLLKAXSLWFI62A6BZHTZSCHRCBXS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EUEXFCN7FAYBKJBQJLYCEUQUCHDEJRZW/
- https://access.redhat.com/errata/RHSA-2019:3391
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10160: A security regression of CVE-2019-9636 was discovered in python since commit…
Published: 2019-06-07T18:29:00 Last Modified: 2021-01-06T16:11:00
Summary
A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
Common Weakness Enumeration (CWE): CWE-255: Credentials Management Errors
CWE Description: Weaknesses in this category are related to the management of credentials.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10160 vulnerability.
References
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html
- https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160
- https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468
- https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de
- https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09
- https://security.netapp.com/advisory/ntap-20190617-0003/
- https://access.redhat.com/errata/RHSA-2019:1587
- https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
- https://access.redhat.com/errata/RHSA-2019:1700
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/
- https://access.redhat.com/errata/RHSA-2019:2437
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html
- https://usn.ubuntu.com/4127-2/
- https://usn.ubuntu.com/4127-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in…
Published: 2019-06-03T22:29:00 Last Modified: 2020-02-25T19:04:00
Summary
An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop->name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-12614 vulnerability.
References
- https://lkml.org/lkml/2019/6/3/526
- https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=efa9ace68e487ddd29c2b4d6dd23242158f1f607
- http://www.securityfocus.com/bid/108550
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
- https://security.netapp.com/advisory/ntap-20190710-0002/
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4095-2/
- https://usn.ubuntu.com/4095-1/
- https://usn.ubuntu.com/4093-1/
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- https://support.f5.com/csp/article/K54337315
- https://support.f5.com/csp/article/K54337315?utm_source=f5support&utm_medium=RSS
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- https://seclists.org/bugtraq/2020/Jan/10
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in…
Published: 2019-06-03T19:29:00 Last Modified: 2020-10-15T14:37:00
Summary
A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 6.5
- CVSS: 8.3
- CVSS Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2019-3846 vulnerability.
References
- https://seclists.org/oss-sec/2019/q2/133
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3846
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
- https://www.debian.org/security/2019/dsa-4465
- https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
- https://seclists.org/bugtraq/2019/Jun/26
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
- https://security.netapp.com/advisory/ntap-20190710-0002/
- https://seclists.org/bugtraq/2019/Jul/33
- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://usn.ubuntu.com/4095-2/
- https://usn.ubuntu.com/4095-1/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4093-1/
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- https://usn.ubuntu.com/4117-1/
- https://usn.ubuntu.com/4118-1/
- https://access.redhat.com/errata/RHSA-2019:2703
- https://access.redhat.com/errata/RHSA-2019:2741
- https://access.redhat.com/errata/RHSA-2019:3055
- https://access.redhat.com/errata/RHSA-2019:3076
- https://access.redhat.com/errata/RHSA-2019:3089
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- https://access.redhat.com/errata/RHSA-2020:0174
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10143: ** DISPUTED ** It was discovered freeradius up to and including version 3.0.19 does not correctly…
Published: 2019-05-24T17:29:00 Last Modified: 2020-09-30T14:22:00
Summary
** DISPUTED ** It was discovered freeradius up to and including version 3.0.19 does not correctly configure logrotate, allowing a local attacker who already has control of the radiusd user to escalate his privileges to root, by tricking logrotate into writing a radiusd-writable file to a directory normally inaccessible by the radiusd user. NOTE: the upstream software maintainer has stated “there is simply no way for anyone to gain privileges through this alleged issue.”
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-10143 vulnerability.
References
- https://github.com/FreeRADIUS/freeradius-server/pull/2666
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10143
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TKODLHHUOVAYENTBP4D3N25ST3Q6LJBP/
- https://freeradius.org/security/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6VKBZAZKJP5QKXDXRKCM2ZPZND3TFAX/
- https://access.redhat.com/errata/RHSA-2019:3353
- http://packetstormsecurity.com/files/155361/FreeRadius-3.0.19-Logrotate-Privilege-Escalation.html
- http://seclists.org/fulldisclosure/2019/Nov/14
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-7837: Adobe Flash Player versions 32.0.0.171 and earlier, 32.0.0.171 and earlier, and 32.0.0.171 and…
Published: 2019-05-22T19:29:00 Last Modified: 2019-05-23T13:48:00
Summary
Adobe Flash Player versions 32.0.0.171 and earlier, 32.0.0.171 and earlier, and 32.0.0.171 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-7837 vulnerability.
References
- https://www.zerodayinitiative.com/advisories/ZDI-19-498/
- https://helpx.adobe.com/security/products/flash-player/apsb19-26.html
- https://access.redhat.com/errata/RHSA-2019:1234
- http://www.securityfocus.com/bid/108312
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3839: It was found that in ghostscript some privileged operators remained accessible from various…
Published: 2019-05-16T19:29:00 Last Modified: 2020-10-15T14:31:00
Summary
It was found that in ghostscript some privileged operators remained accessible from various places after the CVE-2019-6116 fix. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER. Ghostscript versions before 9.27 are vulnerable.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3839 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3839
- http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=4ec9ca74bed49f2a82acb4bf430eae0d8b3b75c9
- https://lists.debian.org/debian-lts-announce/2019/05/msg00023.html
- https://www.debian.org/security/2019/dsa-4442
- https://usn.ubuntu.com/3970-1/
- https://seclists.org/bugtraq/2019/May/23
- https://access.redhat.com/errata/RHSA-2019:1017
- https://access.redhat.com/errata/RHSA-2019:0971
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-11811: An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon…
Published: 2019-05-07T14:29:00 Last Modified: 2020-05-06T15:14:00
Summary
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-11811 vulnerability.
References
- https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=401e7e88d4ef80188ffa07095ac00456f901b8c4
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.4
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html
- https://support.f5.com/csp/article/K01512680
- https://security.netapp.com/advisory/ntap-20190719-0003/
- http://www.securityfocus.com/bid/108410
- https://access.redhat.com/errata/RHSA-2019:1873
- https://access.redhat.com/errata/RHSA-2019:1891
- https://access.redhat.com/errata/RHSA-2019:1959
- https://access.redhat.com/errata/RHSA-2019:1971
- https://access.redhat.com/errata/RHSA-2019:4058
- https://access.redhat.com/errata/RHSA-2019:4057
- https://access.redhat.com/errata/RHSA-2020:0036
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10131: An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the…
Published: 2019-04-30T19:29:00 Last Modified: 2021-10-28T12:20:00
Summary
An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.
Common Weakness Enumeration (CWE): CWE-193: Off-by-one Error
CWE Description: A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-10131 vulnerability.
References
- https://github.com/ImageMagick/ImageMagick/commit/cb1214c124e1bd61f7dd551b94a794864861592e
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10131
- http://www.securityfocus.com/bid/108117
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00051.html
- https://usn.ubuntu.com/4034-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00001.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3900: An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and…
Published: 2019-04-25T15:29:00 Last Modified: 2021-12-15T15:41:00
Summary
An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.0
- CVSS: 6.8
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3900 vulnerability.
References
- https://www.spinics.net/lists/kernel/msg3111012.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3900
- http://www.securityfocus.com/bid/108076
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOFNJA5NNVXQ6AV6KGZB677JIVXAMJHT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYTZH6QCNITK7353S6RCRT2PQHZSDPXD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3WXXM5URTZSR3RVEKO6MDXDFIKTZ5R/
- https://security.netapp.com/advisory/ntap-20190517-0005/
- https://access.redhat.com/errata/RHSA-2019:1973
- https://access.redhat.com/errata/RHSA-2019:2043
- https://access.redhat.com/errata/RHSA-2019:2029
- https://www.debian.org/security/2019/dsa-4497
- https://seclists.org/bugtraq/2019/Aug/18
- https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
- https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
- https://usn.ubuntu.com/4114-1/
- https://usn.ubuntu.com/4117-1/
- https://usn.ubuntu.com/4116-1/
- https://usn.ubuntu.com/4115-1/
- https://usn.ubuntu.com/4118-1/
- https://access.redhat.com/errata/RHSA-2019:3220
- https://access.redhat.com/errata/RHSA-2019:3517
- https://access.redhat.com/errata/RHSA-2019:3309
- https://seclists.org/bugtraq/2019/Nov/11
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://access.redhat.com/errata/RHSA-2019:3836
- https://access.redhat.com/errata/RHSA-2019:3967
- https://access.redhat.com/errata/RHSA-2019:4058
- https://access.redhat.com/errata/RHSA-2020:0204
- https://www.oracle.com/security-alerts/cpuApr2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3902: A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subrepositories to…
Published: 2019-04-22T16:29:00 Last Modified: 2020-07-31T13:15:00
Summary
A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subrepositories to defeat Mercurial’s path-checking logic and write files outside a repository.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3902 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3902
- https://lists.debian.org/debian-lts-announce/2019/04/msg00024.html
- https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.9_.282019-02-01.29
- https://usn.ubuntu.com/4086-1/
- https://lists.debian.org/debian-lts-announce/2020/07/msg00032.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-11235: FreeRADIUS before 3.0.19 mishandles the “each participant verifies that the received scalar is…
Published: 2019-04-22T11:29:00 Last Modified: 2019-05-13T18:29:00
Summary
FreeRADIUS before 3.0.19 mishandles the “each participant verifies that the received scalar is within a range, and that the received group element is a valid point on the curve being used” protection mechanism, aka a “Dragonblood” issue, a similar issue to CVE-2019-9498 and CVE-2019-9499.
Common Weakness Enumeration (CWE): CWE-345: Insufficient Verification of Data Authenticity
CWE Description: The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-11235 vulnerability.
References
- https://www.kb.cert.org/vuls/id/871675/
- https://papers.mathyvanhoef.com/dragonblood.pdf
- https://freeradius.org/security/
- https://freeradius.org/release_notes/?br=3.0.x&re=3.0.19
- https://bugzilla.redhat.com/show_bug.cgi?id=1695748
- https://usn.ubuntu.com/3954-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00014.html
- https://access.redhat.com/errata/RHSA-2019:1131
- https://access.redhat.com/errata/RHSA-2019:1142
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00033.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-11234: FreeRADIUS before 3.0.19 does not prevent use of reflection for authentication spoofing, aka a…
Published: 2019-04-22T11:29:00 Last Modified: 2019-05-13T18:29:00
Summary
FreeRADIUS before 3.0.19 does not prevent use of reflection for authentication spoofing, aka a “Dragonblood” issue, a similar issue to CVE-2019-9497.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-11234 vulnerability.
References
- https://www.kb.cert.org/vuls/id/871675/
- https://papers.mathyvanhoef.com/dragonblood.pdf
- https://freeradius.org/security/
- https://freeradius.org/release_notes/?br=3.0.x&re=3.0.19
- https://bugzilla.redhat.com/show_bug.cgi?id=1695783
- https://usn.ubuntu.com/3954-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00014.html
- https://access.redhat.com/errata/RHSA-2019:1131
- https://access.redhat.com/errata/RHSA-2019:1142
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00033.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-10245: In Eclipse OpenJ9 prior to the 0.14.0 release, the Java bytecode verifier incorrectly allows a…
Published: 2019-04-19T14:29:00 Last Modified: 2021-10-28T13:40:00
Summary
In Eclipse OpenJ9 prior to the 0.14.0 release, the Java bytecode verifier incorrectly allows a method to execute past the end of bytecode array causing crashes. Eclipse OpenJ9 v0.14.0 correctly detects this case and rejects the attempted class load.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-10245 vulnerability.
References
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=545588
- http://www.securityfocus.com/bid/108094
- https://access.redhat.com/errata/RHSA-2019:1166
- https://access.redhat.com/errata/RHSA-2019:1165
- https://access.redhat.com/errata/RHSA-2019:1164
- https://access.redhat.com/errata/RHSA-2019:1163
- https://access.redhat.com/errata/RHSA-2019:1238
- https://access.redhat.com/errata/RHSA-2019:1325
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3883: In 389-ds-base up to version 1.4.1.2, requests are handled by workers threads. Each sockets will…
Published: 2019-04-17T14:29:00 Last Modified: 2020-11-13T16:15:00
Summary
In 389-ds-base up to version 1.4.1.2, requests are handled by workers threads. Each sockets will be waited by the worker for at most ‘ioblocktimeout’ seconds. However this timeout applies only for un-encrypted requests. Connections using SSL/TLS are not taking this timeout into account during reads, and may hang longer.An unauthenticated attacker could repeatedly create hanging LDAP requests to hang all the workers, resulting in a Denial of Service.
Common Weakness Enumeration (CWE): CWE-772: Missing Release of Resource after Effective Lifetime
CWE Description: The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3883 vulnerability.
References
- https://pagure.io/389-ds-base/pull-request/50331
- https://pagure.io/389-ds-base/issue/50329
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3883
- https://lists.debian.org/debian-lts-announce/2019/05/msg00008.html
- https://access.redhat.com/errata/RHSA-2019:1896
- https://access.redhat.com/errata/RHSA-2019:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel…
Published: 2019-04-11T16:29:00 Last Modified: 2021-07-21T11:39:00
Summary
A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.5
- CVSS: 3.3
- CVSS Vector: AV:A/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2019-3459 vulnerability.
References
- https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html
- https://marc.info/?l=oss-security&m=154721580222522&w=2
- https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047@kroah.com/
- https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69
- https://bugzilla.redhat.com/show_bug.cgi?id=1663176
- https://bugzilla.novell.com/show_bug.cgi?id=1120758
- https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
- https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
- https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
- http://www.openwall.com/lists/oss-security/2019/06/27/2
- http://www.openwall.com/lists/oss-security/2019/06/27/7
- http://www.openwall.com/lists/oss-security/2019/06/28/1
- http://www.openwall.com/lists/oss-security/2019/06/28/2
- https://access.redhat.com/errata/RHSA-2019:2043
- https://access.redhat.com/errata/RHSA-2019:2029
- http://www.openwall.com/lists/oss-security/2019/08/12/1
- https://access.redhat.com/errata/RHSA-2019:3517
- https://access.redhat.com/errata/RHSA-2019:3309
- https://access.redhat.com/errata/RHSA-2020:0740
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3837: It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is…
Published: 2019-04-11T15:29:00 Last Modified: 2020-12-04T18:15:00
Summary
It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-3837 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3842: In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the…
Published: 2019-04-09T21:29:00 Last Modified: 2022-01-31T18:51:00
Summary
In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the “allow_active” element rather than “allow_any”.
Common Weakness Enumeration (CWE): CWE-863: Incorrect Authorization
CWE Description: The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2019-3842 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
- https://www.exploit-db.com/exploits/46743/
- http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3139: A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker…
Published: 2019-04-09T18:29:00 Last Modified: 2021-05-14T20:35:00
Summary
A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response.
Common Weakness Enumeration (CWE): CWE-617: Reachable Assertion
CWE Description: The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3139 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1447743
- https://access.redhat.com/security/cve/cve-2017-3139
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3880: A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry…
Published: 2019-04-09T16:29:00 Last Modified: 2019-05-27T08:29:00
Summary
A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.0
- CVSS: 5.5
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3880 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2019-3880.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880
- https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00050.html
- https://access.redhat.com/security/cve/cve-2019-3880
- https://security.netapp.com/advisory/ntap-20190411-0004/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTJVFA3RZ6G2IZDTVKLHRMX6QBYA4GPA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6354GALK73CZWQKFUG7AWB6EIEGFMF62/
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00106.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSRLRO7BPRFETVFZ4TVJL2VFZEPHKJY4/
- https://www.synology.com/security/advisory/Synology_SA_19_15
- https://support.f5.com/csp/article/K20804356
- https://access.redhat.com/errata/RHSA-2019:1966
- https://access.redhat.com/errata/RHSA-2019:1967
- https://access.redhat.com/errata/RHSA-2019:2099
- https://access.redhat.com/errata/RHSA-2019:3582
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3887: A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access…
Published: 2019-04-09T16:29:00 Last Modified: 2021-11-02T20:18:00
Summary
A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0’s APIC register values via L2 guest, when ‘virtualize x2APIC mode’ is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.
Common Weakness Enumeration (CWE): CWE-863: Incorrect Authorization
CWE Description: The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-3887 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3887
- http://www.securityfocus.com/bid/107850
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWPOIII2L73HV5PGXSGMRMKQIK47UIYE/
- https://usn.ubuntu.com/3980-1/
- https://usn.ubuntu.com/3979-1/
- https://usn.ubuntu.com/3980-2/
- https://access.redhat.com/errata/RHSA-2019:2703
- https://access.redhat.com/errata/RHSA-2019:2741
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-0217: In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when…
Published: 2019-04-08T21:29:00 Last Modified: 2021-06-06T11:15:00
Summary
In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.4
- Exploitability Score: 6.8
- CVSS: 6.0
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-0217 vulnerability.
References
- https://www.debian.org/security/2019/dsa-4422
- https://usn.ubuntu.com/3937-1/
- https://seclists.org/bugtraq/2019/Apr/5
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/
- https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html
- https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808@%3Cdev.httpd.apache.org%3E
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1695020
- http://www.securityfocus.com/bid/107668
- http://www.openwall.com/lists/oss-security/2019/04/02/5
- https://usn.ubuntu.com/3937-2/
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
- https://security.netapp.com/advisory/ntap-20190423-0001/
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://access.redhat.com/errata/RHSA-2019:2343
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3436
- https://access.redhat.com/errata/RHSA-2019:3935
- https://access.redhat.com/errata/RHSA-2019:3933
- https://access.redhat.com/errata/RHSA-2019:3932
- https://access.redhat.com/errata/RHSA-2019:4126
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3877: A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL…
Published: 2019-03-27T13:29:00 Last Modified: 2019-04-16T18:29:00
Summary
A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an attacker to bypass the redirect URL validation logic in apr_uri_parse function.
Common Weakness Enumeration (CWE): CWE-601: URL Redirection to Untrusted Site (‘Open Redirect’)
CWE Description: A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3877 vulnerability.
References
- https://github.com/Uninett/mod_auth_mellon/issues/35
- https://github.com/Uninett/mod_auth_mellon/commit/62041428a32de402e0be6ba45fe12df6a83bedb8
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3877
- https://usn.ubuntu.com/3924-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNW5YMC5TLWVWNJEY6AIWNSNPRAMWPQJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7NLAU7KROWNTHAYSA2S67X347F42L2I/
- https://access.redhat.com/errata/RHSA-2019:0766
- https://access.redhat.com/errata/RHSA-2019:3421
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3878: A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse…
Published: 2019-03-26T18:29:00 Last Modified: 2019-05-07T09:29:00
Summary
A vulnerability was found in mod_auth_mellon before v0.14.2. If Apache is configured as a reverse proxy and mod_auth_mellon is configured to only let through authenticated users (with the require valid-user directive), adding special HTTP headers that are normally used to start the special SAML ECP (non-browser based) can be used to bypass authentication.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3878 vulnerability.
References
- https://github.com/Uninett/mod_auth_mellon/pull/196
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3878
- https://usn.ubuntu.com/3924-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNW5YMC5TLWVWNJEY6AIWNSNPRAMWPQJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7NLAU7KROWNTHAYSA2S67X347F42L2I/
- https://access.redhat.com/errata/RHSA-2019:0746
- https://access.redhat.com/errata/RHSA-2019:0766
- https://access.redhat.com/errata/RHSA-2019:0985
- https://access.redhat.com/errata/RHBA-2019:0959
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3838: It was found that the forceput operator could be extracted from the DefineResource method in…
Published: 2019-03-25T19:29:00 Last Modified: 2020-10-15T14:05:00
Summary
It was found that the forceput operator could be extracted from the DefineResource method in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3838 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3838
- https://bugs.ghostscript.com/show_bug.cgi?id=700576
- https://access.redhat.com/errata/RHSA-2019:0652
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVERLGEU3OV6RNZ2SIBXREWD3BF5H23N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANBSCZABXQUEQWIKNWJ35IYX24M227EI/
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00011.html
- https://seclists.org/bugtraq/2019/Apr/4
- http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A43SRQAEHQCKSEMIBINHUNIGHTDCZD7F/
- https://www.debian.org/security/2019/dsa-4432
- https://seclists.org/bugtraq/2019/Apr/28
- https://lists.debian.org/debian-lts-announce/2019/04/msg00021.html
- https://access.redhat.com/errata/RHSA-2019:0971
- https://security.gentoo.org/glsa/202004-03
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3874: The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem….
Published: 2019-03-25T19:29:00 Last Modified: 2021-06-14T18:15:00
Summary
The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.5
- CVSS: 3.3
- CVSS Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2019-3874 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874
- https://security.netapp.com/advisory/ntap-20190411-0003/
- https://usn.ubuntu.com/3981-1/
- https://usn.ubuntu.com/3980-1/
- https://usn.ubuntu.com/3979-1/
- https://usn.ubuntu.com/3982-2/
- https://usn.ubuntu.com/3982-1/
- https://usn.ubuntu.com/3980-2/
- https://usn.ubuntu.com/3981-2/
- https://access.redhat.com/errata/RHSA-2019:3517
- https://access.redhat.com/errata/RHSA-2019:3309
- https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3856: An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2…
Published: 2019-03-25T19:29:00 Last Modified: 2020-10-15T13:43:00
Summary
An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3856 vulnerability.
References
- https://www.libssh2.org/CVE-2019-3856.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3856
- https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
- https://security.netapp.com/advisory/ntap-20190327-0005/
- https://access.redhat.com/errata/RHSA-2019:0679
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
- https://www.debian.org/security/2019/dsa-4431
- https://seclists.org/bugtraq/2019/Apr/25
- https://access.redhat.com/errata/RHSA-2019:1175
- https://access.redhat.com/errata/RHSA-2019:1652
- https://access.redhat.com/errata/RHSA-2019:1791
- https://access.redhat.com/errata/RHSA-2019:1943
- https://access.redhat.com/errata/RHSA-2019:2399
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3857: An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2…
Published: 2019-03-25T19:29:00 Last Modified: 2020-10-15T13:43:00
Summary
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3857 vulnerability.
References
- https://www.libssh2.org/CVE-2019-3857.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3857
- https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
- https://security.netapp.com/advisory/ntap-20190327-0005/
- https://access.redhat.com/errata/RHSA-2019:0679
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
- https://www.debian.org/security/2019/dsa-4431
- https://seclists.org/bugtraq/2019/Apr/25
- https://access.redhat.com/errata/RHSA-2019:1175
- https://access.redhat.com/errata/RHSA-2019:1652
- https://access.redhat.com/errata/RHSA-2019:1791
- https://access.redhat.com/errata/RHSA-2019:1943
- https://access.redhat.com/errata/RHSA-2019:2399
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3835: It was found that the superexec operator was available in the internal dictionary in ghostscript…
Published: 2019-03-25T19:29:00 Last Modified: 2020-10-15T13:50:00
Summary
It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.
Common Weakness Enumeration (CWE): CWE-862: Missing Authorization
CWE Description: The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3835 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3835
- https://bugs.ghostscript.com/show_bug.cgi?id=700585
- https://access.redhat.com/errata/RHSA-2019:0652
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVERLGEU3OV6RNZ2SIBXREWD3BF5H23N/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ANBSCZABXQUEQWIKNWJ35IYX24M227EI/
- https://seclists.org/bugtraq/2019/Apr/4
- http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A43SRQAEHQCKSEMIBINHUNIGHTDCZD7F/
- https://www.debian.org/security/2019/dsa-4432
- https://seclists.org/bugtraq/2019/Apr/28
- http://www.securityfocus.com/bid/107855
- https://lists.debian.org/debian-lts-announce/2019/04/msg00021.html
- https://access.redhat.com/errata/RHSA-2019:0971
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00090.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00088.html
- https://security.gentoo.org/glsa/202004-03
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16838: A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by…
Published: 2019-03-25T18:29:00 Last Modified: 2020-10-15T13:28:00
Summary
A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.0
- CVSS: 5.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16838 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16838
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00051.html
- https://access.redhat.com/errata/RHSA-2019:2177
- https://access.redhat.com/errata/RHSA-2019:2437
- https://access.redhat.com/errata/RHSA-2019:3651
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3863: A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive…
Published: 2019-03-25T18:29:00 Last Modified: 2019-05-14T21:29:00
Summary
A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3863 vulnerability.
References
- https://www.libssh2.org/CVE-2019-3863.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3863
- https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
- https://security.netapp.com/advisory/ntap-20190327-0005/
- https://access.redhat.com/errata/RHSA-2019:0679
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
- https://www.debian.org/security/2019/dsa-4431
- https://seclists.org/bugtraq/2019/Apr/25
- https://access.redhat.com/errata/RHSA-2019:1175
- https://access.redhat.com/errata/RHSA-2019:1652
- https://access.redhat.com/errata/RHSA-2019:1791
- https://access.redhat.com/errata/RHSA-2019:1943
- https://access.redhat.com/errata/RHSA-2019:2399
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3855: An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2…
Published: 2019-03-21T21:29:00 Last Modified: 2020-10-15T13:42:00
Summary
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3855 vulnerability.
References
- https://www.libssh2.org/CVE-2019-3855.html
- https://seclists.org/bugtraq/2019/Mar/25
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3855
- http://www.securityfocus.com/bid/107485
- http://www.openwall.com/lists/oss-security/2019/03/18/3
- http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767
- https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
- https://security.netapp.com/advisory/ntap-20190327-0005/
- https://access.redhat.com/errata/RHSA-2019:0679
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
- https://www.debian.org/security/2019/dsa-4431
- https://seclists.org/bugtraq/2019/Apr/25
- https://access.redhat.com/errata/RHSA-2019:1175
- https://access.redhat.com/errata/RHSA-2019:1652
- https://access.redhat.com/errata/RHSA-2019:1791
- https://access.redhat.com/errata/RHSA-2019:1943
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
- https://access.redhat.com/errata/RHSA-2019:2399
- https://support.apple.com/kb/HT210609
- https://seclists.org/bugtraq/2019/Sep/49
- http://seclists.org/fulldisclosure/2019/Sep/42
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-7221: The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.
Published: 2019-03-21T16:01:00 Last Modified: 2020-10-15T13:28:00
Summary
The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-7221 vulnerability.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y2HMABEMJDPA6LPCBE5WIEZXUKY7DLTN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KDOXCX3QFVWYXH5CQMGDDE7H6MUG5XGG/
- https://github.com/torvalds/linux/commits/master/arch/x86/kvm
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecec76885bcfe3294685dc363fd1273df0d5d65f
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1760
- http://www.openwall.com/lists/oss-security/2019/02/18/2
- http://packetstormsecurity.com/files/151713/KVM-VMX-Preemption-Timer-Use-After-Free.html
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.html
- https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3931-2/
- https://usn.ubuntu.com/3931-1/
- https://usn.ubuntu.com/3930-2/
- https://usn.ubuntu.com/3930-1/
- https://security.netapp.com/advisory/ntap-20190404-0002/
- https://access.redhat.com/errata/RHSA-2019:0833
- https://access.redhat.com/errata/RHSA-2019:0818
- https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
- https://access.redhat.com/errata/RHBA-2019:0959
- https://support.f5.com/csp/article/K08413011
- https://access.redhat.com/errata/RHSA-2019:3967
- https://access.redhat.com/errata/RHSA-2019:4058
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-6116: In Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system…
Published: 2019-03-21T16:01:00 Last Modified: 2020-08-24T17:37:00
Summary
In Artifex Ghostscript through 9.26, ephemeral or transient procedures can allow access to system operators, leading to remote code execution.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2019-6116 vulnerability.
References
- https://www.exploit-db.com/exploits/46242/
- https://www.debian.org/security/2019/dsa-4372
- https://usn.ubuntu.com/3866-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWVAVCDXBLPLJMVGNSKGGDTBEOHCJBKK/
- https://lists.debian.org/debian-lts-announce/2019/02/msg00016.html
- https://bugs.ghostscript.com/show_bug.cgi?id=700317
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1729
- https://access.redhat.com/errata/RHSA-2019:0229
- http://www.securityfocus.com/bid/106700
- http://www.openwall.com/lists/oss-security/2019/01/23/5
- http://packetstormsecurity.com/files/151307/Ghostscript-Pseudo-Operator-Remote-Code-Execution.html
- http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00047.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7N6T5L3SSJX2AVUPHP7GCPATFWUPKZT2/
- http://www.openwall.com/lists/oss-security/2019/03/21/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVWXVKG72IGEJYHLWE6H3CGALHGFSGGY/
- https://seclists.org/bugtraq/2019/Apr/4
- http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html
- https://access.redhat.com/errata/RHBA-2019:0327
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZP34D27RKYV2POJ3NJLSVCHUA5V5C45A/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6AATIHU32MYKUOXQDJQU4X4DDVL7NAY3/
- https://security.gentoo.org/glsa/202004-03
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-6454: An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-…
Published: 2019-03-21T16:01:00 Last Modified: 2022-01-28T19:12:00
Summary
An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-6454 vulnerability.
References
- https://www.debian.org/security/2019/dsa-4393
- https://usn.ubuntu.com/3891-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N67IOBOTDOMVNQJ5QRU2MXLEECXPGNVJ/
- https://lists.debian.org/debian-lts-announce/2019/02/msg00031.html
- https://github.com/systemd/systemd/commits/master/src/libsystemd/sd-bus/bus-objects.c
- https://access.redhat.com/errata/RHSA-2019:0368
- http://www.securityfocus.com/bid/107081
- http://www.openwall.com/lists/oss-security/2019/02/19/1
- http://www.openwall.com/lists/oss-security/2019/02/18/3
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00070.html
- https://security.netapp.com/advisory/ntap-20190327-0004/
- https://kc.mcafee.com/corporate/index?page=content&id=SB10278
- https://access.redhat.com/errata/RHSA-2019:0990
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
- https://access.redhat.com/errata/RHSA-2019:1322
- https://access.redhat.com/errata/RHSA-2019:1502
- https://access.redhat.com/errata/RHSA-2019:2805
- http://www.openwall.com/lists/oss-security/2021/07/20/2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-20615: An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and…
Published: 2019-03-21T16:00:00 Last Modified: 2019-04-25T12:57:00
Summary
An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they were present in the frame.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-20615 vulnerability.
References
- https://www.mail-archive.com/haproxy@formilux.org/msg32304.html
- https://usn.ubuntu.com/3858-1/
- https://access.redhat.com/errata/RHSA-2019:0275
- http://www.securityfocus.com/bid/106645
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00018.html
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3816: Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure…
Published: 2019-03-14T22:29:00 Last Modified: 2021-11-02T20:17:00
Summary
Openwsman, versions up to and including 2.6.9, are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3816 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3816
- http://bugzilla.suse.com/show_bug.cgi?id=1122623
- http://www.securityfocus.com/bid/107368
- http://www.securityfocus.com/bid/107409
- https://access.redhat.com/errata/RHSA-2019:0638
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2V5HJ355RSKMFQ7GRJAHRZNDVXASF7TA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B2HEZ7D7GF3HDF36JLGYXIK5URR66DS4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CXQP7UDPRZIZ4LM7FEJCTC2EDUYVOR2J/
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00065.html
- https://access.redhat.com/errata/RHSA-2019:0972
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-9741: An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker…
Published: 2019-03-13T08:29:00 Last Modified: 2021-03-22T13:05:00
Summary
An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.
Common Weakness Enumeration (CWE): CWE-93: Improper Neutralization of CRLF Sequences (‘CRLF Injection’)
CWE Description: The software uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-9741 vulnerability.
References
- https://github.com/golang/go/issues/30794
- http://www.securityfocus.com/bid/107432
- https://lists.debian.org/debian-lts-announce/2019/04/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOOVCEPQM7TZA6VEZEEB7QZABXNHQEHH/
- https://access.redhat.com/errata/RHSA-2019:1300
- https://access.redhat.com/errata/RHSA-2019:1519
- https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
- https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-9636: Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode…
Published: 2019-03-08T21:29:00 Last Modified: 2020-10-29T14:15:00
Summary
Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-9636 vulnerability.
References
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization.html
- https://github.com/python/cpython/pull/12201
- https://bugs.python.org/issue36216
- http://www.securityfocus.com/bid/107400
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L25RTMKCF62DLC2XVSNXGX7C7HXISLVM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D3LXPABKVLFYUHRYJPM3CSS5MS6FXKS7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICBEGRHIPHWPG2VGYS6R4EVKVUUF4AQW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TR6GCO3WTV4D5L23WTCBF275VE6BVNI3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFBAAGM27H73OLYBUA2IAZFSUN6KGLME/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFAXBEY2TGOBDRKTR556JBXBVFSAKD6I/
- https://access.redhat.com/errata/RHSA-2019:0710
- https://access.redhat.com/errata/RHSA-2019:0765
- https://access.redhat.com/errata/RHSA-2019:0806
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00092.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00097.html
- https://access.redhat.com/errata/RHSA-2019:0902
- https://access.redhat.com/errata/RHSA-2019:0997
- https://access.redhat.com/errata/RHSA-2019:0981
- https://access.redhat.com/errata/RHBA-2019:0959
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00024.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXASHCDD4PQFKTMKQN4YOP5ZH366ABN4/
- https://security.netapp.com/advisory/ntap-20190517-0001/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMWSKTNOHSUOT3L25QFJAVCFYZX46FYK/
- https://access.redhat.com/errata/RHSA-2019:1467
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00050.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
- https://access.redhat.com/errata/RHBA-2019:0763
- https://access.redhat.com/errata/RHBA-2019:0764
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00042.html
- https://usn.ubuntu.com/4127-2/
- https://usn.ubuntu.com/4127-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/
- https://access.redhat.com/errata/RHSA-2019:2980
- https://access.redhat.com/errata/RHSA-2019:3170
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
- https://www.oracle.com/security-alerts/cpujan2020.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- https://security.gentoo.org/glsa/202003-26
- https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-9213: In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap…
Published: 2019-03-05T22:29:00 Last Modified: 2019-06-17T21:15:00
Summary
In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2019-9213 vulnerability.
- Reliable Datagram Sockets (RDS) - rds_atomic_free_op NULL pointer dereference Privilege Escalation (Metasploit) by Metasploit at 2020-01-23
- Linux < 4.20.14 - Virtual Address 0 is Mappable via Privileged write() to /proc/*/mem by Google Security Research at 2019-03-06
References
- https://github.com/torvalds/linux/commit/0a1d52994d440e21def1c2174932410b4f2a98a1
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.162
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.14
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.27
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.105
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1792
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a1d52994d440e21def1c2174932410b4f2a98a1
- https://www.exploit-db.com/exploits/46502/
- http://www.securityfocus.com/bid/107296
- https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00045.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
- https://usn.ubuntu.com/3933-2/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3931-2/
- https://usn.ubuntu.com/3931-1/
- https://usn.ubuntu.com/3930-2/
- https://usn.ubuntu.com/3930-1/
- https://usn.ubuntu.com/3933-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html
- https://access.redhat.com/errata/RHSA-2019:0831
- https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
- https://access.redhat.com/errata/RHSA-2019:1479
- https://access.redhat.com/errata/RHSA-2019:1480
- http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12395: By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain…
Published: 2019-02-28T18:29:00 Last Modified: 2019-10-03T00:03:00
Summary
By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12395 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1467523
- https://www.debian.org/security/2018/dsa-4324
- https://usn.ubuntu.com/3801-1/
- https://security.gentoo.org/glsa/201811-04
- https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
- https://access.redhat.com/errata/RHSA-2018:3006
- https://access.redhat.com/errata/RHSA-2018:3005
- http://www.securitytracker.com/id/1041944
- http://www.securityfocus.com/bid/105718
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12389: Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2….
Published: 2019-02-28T18:29:00 Last Modified: 2019-03-01T18:51:00
Summary
Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.3 and Thunderbird < 60.3.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12389 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1498460%2C1499198
- https://www.debian.org/security/2018/dsa-4337
- https://www.debian.org/security/2018/dsa-4324
- https://usn.ubuntu.com/3868-1/
- https://security.gentoo.org/glsa/201811-13
- https://security.gentoo.org/glsa/201811-04
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
- https://access.redhat.com/errata/RHSA-2018:3532
- https://access.redhat.com/errata/RHSA-2018:3531
- https://access.redhat.com/errata/RHSA-2018:3006
- https://access.redhat.com/errata/RHSA-2018:3005
- http://www.securitytracker.com/id/1041944
- http://www.securityfocus.com/bid/105769
- http://www.securityfocus.com/bid/105723
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12390: Mozilla developers and community members reported memory safety bugs present in Firefox 62 and…
Published: 2019-02-28T18:29:00 Last Modified: 2019-03-01T19:03:00
Summary
Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12390 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1487098%2C1487660%2C1490234%2C1496159%2C1443748%2C1496340%2C1483905%2C1493347%2C1488803%2C1498701%2C1498482%2C1442010%2C1495245%2C1483699%2C1469486%2C1484905%2C1490561%2C1492524%2C1481844
- https://www.debian.org/security/2018/dsa-4337
- https://www.debian.org/security/2018/dsa-4324
- https://usn.ubuntu.com/3868-1/
- https://usn.ubuntu.com/3801-1/
- https://security.gentoo.org/glsa/201811-13
- https://security.gentoo.org/glsa/201811-04
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
- https://access.redhat.com/errata/RHSA-2018:3532
- https://access.redhat.com/errata/RHSA-2018:3531
- https://access.redhat.com/errata/RHSA-2018:3006
- https://access.redhat.com/errata/RHSA-2018:3005
- http://www.securitytracker.com/id/1041944
- http://www.securityfocus.com/bid/105769
- http://www.securityfocus.com/bid/105718
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12396: A vulnerability where a WebExtension can run content scripts in disallowed contexts following…
Published: 2019-02-28T18:29:00 Last Modified: 2019-10-03T00:03:00
Summary
A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12396 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1483602
- https://www.debian.org/security/2018/dsa-4324
- https://usn.ubuntu.com/3801-1/
- https://security.gentoo.org/glsa/201811-04
- https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
- https://access.redhat.com/errata/RHSA-2018:3006
- https://access.redhat.com/errata/RHSA-2018:3005
- http://www.securitytracker.com/id/1041944
- http://www.securityfocus.com/bid/105718
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12405: Mozilla developers and community members reported memory safety bugs present in Firefox 63 and…
Published: 2019-02-28T18:29:00 Last Modified: 2019-03-12T12:55:00
Summary
Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12405 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1494752%2C1498765%2C1503326%2C1505181%2C1500759%2C1504365%2C1506640%2C1503082%2C1502013%2C1510471
- https://www.debian.org/security/2019/dsa-4362
- https://www.debian.org/security/2018/dsa-4354
- https://usn.ubuntu.com/3868-1/
- https://usn.ubuntu.com/3844-1/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00002.html
- https://access.redhat.com/errata/RHSA-2019:0160
- https://access.redhat.com/errata/RHSA-2019:0159
- https://access.redhat.com/errata/RHSA-2018:3833
- https://access.redhat.com/errata/RHSA-2018:3831
- http://www.securityfocus.com/bid/106168
- https://security.gentoo.org/glsa/201903-04
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12392: When manipulating user events in nested loops while opening a document through script, it is…
Published: 2019-02-28T18:29:00 Last Modified: 2019-10-03T00:03:00
Summary
When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12392 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1492823
- https://www.debian.org/security/2018/dsa-4337
- https://www.debian.org/security/2018/dsa-4324
- https://usn.ubuntu.com/3868-1/
- https://usn.ubuntu.com/3801-1/
- https://security.gentoo.org/glsa/201811-13
- https://security.gentoo.org/glsa/201811-04
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
- https://access.redhat.com/errata/RHSA-2018:3532
- https://access.redhat.com/errata/RHSA-2018:3531
- https://access.redhat.com/errata/RHSA-2018:3006
- https://access.redhat.com/errata/RHSA-2018:3005
- http://www.securitytracker.com/id/1041944
- http://www.securityfocus.com/bid/105769
- http://www.securityfocus.com/bid/105718
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12393: A potential vulnerability was found in 32-bit builds where an integer overflow during the…
Published: 2019-02-28T18:29:00 Last Modified: 2020-08-24T17:37:00
Summary
A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. Note: 64-bit builds are not vulnerable to this issue.. This vulnerability affects Firefox < 63, Firefox ESR < 60.3, and Thunderbird < 60.3.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12393 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-28/
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1495011
- https://www.debian.org/security/2018/dsa-4337
- https://www.debian.org/security/2018/dsa-4324
- https://usn.ubuntu.com/3868-1/
- https://usn.ubuntu.com/3801-1/
- https://security.gentoo.org/glsa/201811-13
- https://security.gentoo.org/glsa/201811-04
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
- https://access.redhat.com/errata/RHSA-2018:3532
- https://access.redhat.com/errata/RHSA-2018:3531
- https://access.redhat.com/errata/RHSA-2018:3006
- https://access.redhat.com/errata/RHSA-2018:3005
- http://www.securitytracker.com/id/1041944
- http://www.securityfocus.com/bid/105769
- http://www.securityfocus.com/bid/105718
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12397: A WebExtension can request access to local files without the warning prompt stating that the…
Published: 2019-02-28T18:29:00 Last Modified: 2019-03-01T15:00:00
Summary
A WebExtension can request access to local files without the warning prompt stating that the extension will “Access your data for all websites” being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR < 60.3 and Firefox < 63.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-12397 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-27/
- https://www.mozilla.org/security/advisories/mfsa2018-26/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487478
- https://www.debian.org/security/2018/dsa-4324
- https://usn.ubuntu.com/3801-1/
- https://security.gentoo.org/glsa/201811-04
- https://lists.debian.org/debian-lts-announce/2018/11/msg00008.html
- https://access.redhat.com/errata/RHSA-2018:3006
- https://access.redhat.com/errata/RHSA-2018:3005
- http://www.securitytracker.com/id/1041944
- http://www.securityfocus.com/bid/105718
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18492: A use-after-free vulnerability can occur after deleting a selection element due to a weak…
Published: 2019-02-28T18:29:00 Last Modified: 2019-03-11T15:00:00
Summary
A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18492 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1499861
- https://www.debian.org/security/2019/dsa-4362
- https://www.debian.org/security/2018/dsa-4354
- https://usn.ubuntu.com/3868-1/
- https://usn.ubuntu.com/3844-1/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00002.html
- https://access.redhat.com/errata/RHSA-2019:0160
- https://access.redhat.com/errata/RHSA-2019:0159
- https://access.redhat.com/errata/RHSA-2018:3833
- https://access.redhat.com/errata/RHSA-2018:3831
- http://www.securityfocus.com/bid/106168
- https://security.gentoo.org/glsa/201903-04
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18494: A same-origin policy violation allowing the theft of cross-origin URL entries when using the…
Published: 2019-02-28T18:29:00 Last Modified: 2019-03-11T15:09:00
Summary
A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
Common Weakness Enumeration (CWE): CWE-346: Origin Validation Error
CWE Description: The software does not properly verify that the source of data or communication is valid.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18494 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1487964
- https://www.debian.org/security/2019/dsa-4362
- https://www.debian.org/security/2018/dsa-4354
- https://usn.ubuntu.com/3868-1/
- https://usn.ubuntu.com/3844-1/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00002.html
- https://access.redhat.com/errata/RHSA-2019:0160
- https://access.redhat.com/errata/RHSA-2019:0159
- https://access.redhat.com/errata/RHSA-2018:3833
- https://access.redhat.com/errata/RHSA-2018:3831
- http://www.securityfocus.com/bid/106168
- https://security.gentoo.org/glsa/201903-04
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18493: A buffer overflow can occur in the Skia library during buffer offset calculations with hardware…
Published: 2019-02-28T18:29:00 Last Modified: 2019-03-11T15:38:00
Summary
A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18493 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1504452
- https://www.debian.org/security/2019/dsa-4362
- https://www.debian.org/security/2018/dsa-4354
- https://usn.ubuntu.com/3868-1/
- https://usn.ubuntu.com/3844-1/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00002.html
- https://access.redhat.com/errata/RHSA-2019:0160
- https://access.redhat.com/errata/RHSA-2019:0159
- https://access.redhat.com/errata/RHSA-2018:3833
- https://access.redhat.com/errata/RHSA-2018:3831
- http://www.securityfocus.com/bid/106168
- https://security.gentoo.org/glsa/201903-04
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18498: A potential vulnerability leading to an integer overflow can occur during buffer size…
Published: 2019-02-28T18:29:00 Last Modified: 2020-08-24T17:37:00
Summary
A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird < 60.4, Firefox ESR < 60.4, and Firefox < 64.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18498 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-31/
- https://www.mozilla.org/security/advisories/mfsa2018-30/
- https://www.mozilla.org/security/advisories/mfsa2018-29/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1500011
- https://www.debian.org/security/2019/dsa-4362
- https://www.debian.org/security/2018/dsa-4354
- https://usn.ubuntu.com/3868-1/
- https://usn.ubuntu.com/3844-1/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00002.html
- https://access.redhat.com/errata/RHSA-2019:0160
- https://access.redhat.com/errata/RHSA-2019:0159
- https://access.redhat.com/errata/RHSA-2018:3833
- https://access.redhat.com/errata/RHSA-2018:3831
- http://www.securityfocus.com/bid/106168
- https://security.gentoo.org/glsa/201903-04
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-20784: In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq’s, which allows…
Published: 2019-02-22T15:29:00 Last Modified: 2021-06-02T15:28:00
Summary
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq’s, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-20784 vulnerability.
References
- https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0
- https://access.redhat.com/errata/RHSA-2019:1959
- https://access.redhat.com/errata/RHSA-2019:1971
- https://usn.ubuntu.com/4115-1/
- https://usn.ubuntu.com/4118-1/
- https://usn.ubuntu.com/4211-2/
- https://usn.ubuntu.com/4211-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-7164: SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.
Published: 2019-02-20T00:29:00 Last Modified: 2021-12-03T20:09:00
Summary
SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.
Common Weakness Enumeration (CWE): CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
CWE Description: The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-7164 vulnerability.
References
- https://github.com/sqlalchemy/sqlalchemy/issues/4481
- https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html
- https://access.redhat.com/errata/RHSA-2019:0984
- https://access.redhat.com/errata/RHSA-2019:0981
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5760: Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed…
Published: 2019-02-19T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5760 vulnerability.
References
- https://crbug.com/912074
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5762: Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81…
Published: 2019-02-19T17:29:00 Last Modified: 2019-04-18T14:53:00
Summary
Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5762 vulnerability.
References
- https://crbug.com/900552
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5759: Incorrect lifetime handling in HTML select elements in Google Chrome on Android and Mac prior to…
Published: 2019-02-19T17:29:00 Last Modified: 2021-09-08T17:21:00
Summary
Incorrect lifetime handling in HTML select elements in Google Chrome on Android and Mac prior to 72.0.3626.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5759 vulnerability.
References
- https://crbug.com/912211
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5763: Failure to check error conditions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote…
Published: 2019-02-19T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Failure to check error conditions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-754: Improper Check for Unusual or Exceptional Conditions
CWE Description: The software does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the software.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5763 vulnerability.
References
- https://crbug.com/914731
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5769: Incorrect handling of invalid end character position when front rendering in Blink in Google…
Published: 2019-02-19T17:29:00 Last Modified: 2019-04-18T16:25:00
Summary
Incorrect handling of invalid end character position when front rendering in Blink in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5769 vulnerability.
References
- https://crbug.com/913975
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5756: Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81…
Published: 2019-02-19T17:29:00 Last Modified: 2019-04-17T17:20:00
Summary
Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5756 vulnerability.
References
- https://crbug.com/895152
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5764: Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote…
Published: 2019-02-19T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5764 vulnerability.
References
- https://crbug.com/913246
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5757: An incorrect object type assumption in SVG in Google Chrome prior to 72.0.3626.81 allowed a…
Published: 2019-02-19T17:29:00 Last Modified: 2019-04-18T15:06:00
Summary
An incorrect object type assumption in SVG in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5757 vulnerability.
References
- https://crbug.com/915469
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5768: DevTools API not correctly gating on extension capability in DevTools in Google Chrome prior to…
Published: 2019-02-19T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
DevTools API not correctly gating on extension capability in DevTools in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to read local files via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5768 vulnerability.
References
- https://crbug.com/805557
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5755: Incorrect handling of negative zero in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote…
Published: 2019-02-19T17:29:00 Last Modified: 2019-04-17T15:03:00
Summary
Incorrect handling of negative zero in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5755 vulnerability.
References
- https://crbug.com/913296
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5754: Implementation error in QUIC Networking in Google Chrome prior to 72.0.3626.81 allowed an…
Published: 2019-02-19T17:29:00 Last Modified: 2021-07-21T11:39:00
Summary
Implementation error in QUIC Networking in Google Chrome prior to 72.0.3626.81 allowed an attacker running or able to cause use of a proxy server to obtain cleartext of transport encryption via malicious network proxy.
Common Weakness Enumeration (CWE): CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CWE Description: The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5754 vulnerability.
References
- https://crbug.com/914497
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5773: Insufficient origin validation in IndexedDB in Google Chrome prior to 72.0.3626.81 allowed a…
Published: 2019-02-19T17:29:00 Last Modified: 2021-07-21T11:39:00
Summary
Insufficient origin validation in IndexedDB in Google Chrome prior to 72.0.3626.81 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-346: Origin Validation Error
CWE Description: The software does not properly verify that the source of data or communication is valid.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5773 vulnerability.
References
- https://crbug.com/917668
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5774: Omission of the .desktop filetype from the Safe Browsing checklist in SafeBrowsing in Google…
Published: 2019-02-19T17:29:00 Last Modified: 2021-07-21T11:39:00
Summary
Omission of the .desktop filetype from the Safe Browsing checklist in SafeBrowsing in Google Chrome on Linux prior to 72.0.3626.81 allowed an attacker who convinced a user to download a .desktop file to execute arbitrary code via a downloaded .desktop file.
Common Weakness Enumeration (CWE): CWE-862: Missing Authorization
CWE Description: The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5774 vulnerability.
References
- https://crbug.com/904182
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5775: Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81…
Published: 2019-02-19T17:29:00 Last Modified: 2021-07-21T11:39:00
Summary
Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5775 vulnerability.
References
- https://crbug.com/896722
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5765: An exposed debugging endpoint in the browser in Google Chrome on Android prior to 72.0.3626.81…
Published: 2019-02-19T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
An exposed debugging endpoint in the browser in Google Chrome on Android prior to 72.0.3626.81 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted Intent.
Common Weakness Enumeration (CWE): CWE-312: Cleartext Storage of Sensitive Information
CWE Description: The application stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5765 vulnerability.
References
- https://crbug.com/922627
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5772: Sharing of objects over calls into JavaScript runtime in PDFium in Google Chrome prior to…
Published: 2019-02-19T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Sharing of objects over calls into JavaScript runtime in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5772 vulnerability.
References
- https://crbug.com/908292
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5782: Incorrect optimization assumptions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote…
Published: 2019-02-19T17:29:00 Last Modified: 2021-07-21T11:39:00
Summary
Incorrect optimization assumptions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5782 vulnerability.
References
- https://crbug.com/906043
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5778: A missing case for handling special schemes in permission request checks in Extensions in Google…
Published: 2019-02-19T17:29:00 Last Modified: 2019-04-18T14:58:00
Summary
A missing case for handling special schemes in permission request checks in Extensions in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to bypass extension permission checks for privileged pages via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5778 vulnerability.
References
- https://crbug.com/918470
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5758: Incorrect object lifecycle management in Blink in Google Chrome prior to 72.0.3626.81 allowed a…
Published: 2019-02-19T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Incorrect object lifecycle management in Blink in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5758 vulnerability.
References
- https://crbug.com/913970
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5767: Insufficient protection of permission UI in WebAPKs in Google Chrome on Android prior to…
Published: 2019-02-19T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Insufficient protection of permission UI in WebAPKs in Google Chrome on Android prior to 72.0.3626.81 allowed an attacker who convinced the user to install a malicious application to access privacy/security sensitive web APIs via a crafted APK.
Common Weakness Enumeration (CWE): CWE-1021: Improper Restriction of Rendered UI Layers or Frames
CWE Description: The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5767 vulnerability.
References
- https://crbug.com/902427
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5761: Incorrect object lifecycle management in SwiftShader in Google Chrome prior to 72.0.3626.81…
Published: 2019-02-19T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Incorrect object lifecycle management in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5761 vulnerability.
References
- https://crbug.com/904714
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5770: Insufficient input validation in WebGL in Google Chrome prior to 72.0.3626.81 allowed a remote…
Published: 2019-02-19T17:29:00 Last Modified: 2019-04-18T15:57:00
Summary
Insufficient input validation in WebGL in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5770 vulnerability.
References
- https://crbug.com/908749
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5777: Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81…
Published: 2019-02-19T17:29:00 Last Modified: 2021-07-21T11:39:00
Summary
Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5777 vulnerability.
References
- https://crbug.com/849421
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5781: Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81…
Published: 2019-02-19T17:29:00 Last Modified: 2021-07-21T11:39:00
Summary
Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5781 vulnerability.
References
- https://crbug.com/896725
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5780: Insufficient restrictions on what can be done with Apple Events in Google Chrome on macOS prior…
Published: 2019-02-19T17:29:00 Last Modified: 2021-09-08T17:21:00
Summary
Insufficient restrictions on what can be done with Apple Events in Google Chrome on macOS prior to 72.0.3626.81 allowed a local attacker to execute JavaScript via Apple Events.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-5780 vulnerability.
References
- https://crbug.com/891697
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5771: An incorrect JIT of GLSL shaders in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a…
Published: 2019-02-19T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
An incorrect JIT of GLSL shaders in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code via a crafted HTML page.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5771 vulnerability.
References
- https://crbug.com/904265
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5766: Incorrect handling of origin taint checking in Canvas in Google Chrome prior to 72.0.3626.81…
Published: 2019-02-19T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Incorrect handling of origin taint checking in Canvas in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5766 vulnerability.
References
- https://crbug.com/907047
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5776: Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81…
Published: 2019-02-19T17:29:00 Last Modified: 2021-07-21T11:39:00
Summary
Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5776 vulnerability.
References
- https://crbug.com/863663
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5779: Insufficient policy validation in ServiceWorker in Google Chrome prior to 72.0.3626.81 allowed a…
Published: 2019-02-19T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Insufficient policy validation in ServiceWorker in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-862: Missing Authorization
CWE Description: The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-5779 vulnerability.
References
- https://crbug.com/904219
- https://chromereleases.googleblog.com/2019/01/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2019/dsa-4395
- https://access.redhat.com/errata/RHSA-2019:0309
- http://www.securityfocus.com/bid/106767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQOP53LXXPRGD4N5OBKGQTSMFXT32LF6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVFHYCJGMZQUKYSIE2BXE4NLEGFGUXU5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8912: In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL…
Published: 2019-02-18T18:29:00 Last Modified: 2021-06-02T15:36:00
Summary
In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-8912 vulnerability.
References
- https://usn.ubuntu.com/3931-2/
- https://usn.ubuntu.com/3931-1/
- https://usn.ubuntu.com/3930-2/
- https://usn.ubuntu.com/3930-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html
- https://access.redhat.com/errata/RHSA-2020:0174
- http://patchwork.ozlabs.org/patch/1042902/
- http://www.securityfocus.com/bid/107063
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-8912
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-6974: In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles…
Published: 2019-02-15T15:29:00 Last Modified: 2021-07-21T11:39:00
Summary
In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2019-6974 vulnerability.
References
- https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.156
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.99
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1765
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9
- https://www.exploit-db.com/exploits/46388/
- http://www.securityfocus.com/bid/107127
- https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
- https://usn.ubuntu.com/3933-2/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3931-2/
- https://usn.ubuntu.com/3931-1/
- https://usn.ubuntu.com/3930-2/
- https://usn.ubuntu.com/3930-1/
- https://usn.ubuntu.com/3933-1/
- https://support.f5.com/csp/article/K11186236
- https://access.redhat.com/errata/RHSA-2019:0833
- https://access.redhat.com/errata/RHSA-2019:0818
- https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
- https://access.redhat.com/errata/RHBA-2019:0959
- https://access.redhat.com/errata/RHSA-2019:2809
- https://support.f5.com/csp/article/K11186236?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/errata/RHSA-2019:3967
- https://access.redhat.com/errata/RHSA-2020:0103
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-8308: Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script…
Published: 2019-02-12T23:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Flatpak before 1.0.7, and 1.1.x and 1.2.x before 1.2.3, exposes /proc in the apply_extra script sandbox, which allows attackers to modify a host-side executable file.
Common Weakness Enumeration (CWE): CWE-668: Exposure of Resource to Wrong Sphere
CWE Description: The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-8308 vulnerability.
References
- https://github.com/flatpak/flatpak/releases/tag/1.2.3
- https://github.com/flatpak/flatpak/releases/tag/1.0.7
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=922059
- https://access.redhat.com/errata/RHSA-2019:0375
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00088.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-5736: runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to…
Published: 2019-02-11T19:29:00 Last Modified: 2021-12-16T18:38:00
Summary
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
Common Weakness Enumeration (CWE): CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
CWE Description: The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2019-5736 vulnerability.
- runc < 1.0-rc6 (Docker < 18.09.2) - Container Breakout (2) by embargo at 2019-02-13
- runc < 1.0-rc6 (Docker < 18.09.2) - Container Breakout (1) by feexd at 2019-02-12
References
- https://www.openwall.com/lists/oss-security/2019/02/11/2
- https://github.com/opencontainers/runc/commit/6635b4f0c6af3810594d2770f662f34ddc15b40d
- https://github.com/opencontainers/runc/commit/0a8e4117e7f715d5fbeef398405813ce8e88558b
- https://github.com/docker/docker-ce/releases/tag/v18.09.2
- https://access.redhat.com/security/vulnerabilities/runcescape
- https://access.redhat.com/security/cve/cve-2019-5736
- https://www.twistlock.com/2019/02/11/how-to-mitigate-cve-2019-5736-in-runc-and-docker/
- https://github.com/rancher/runc-cve
- https://cloud.google.com/kubernetes-engine/docs/security-bulletins#february-11-2019-runc
- https://brauner.github.io/2019/02/12/privileged-containers.html
- https://aws.amazon.com/security/security-bulletins/AWS-2019-002/
- https://access.redhat.com/errata/RHSA-2019:0304
- https://access.redhat.com/errata/RHSA-2019:0303
- https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/
- https://www.exploit-db.com/exploits/46359/
- http://www.securityfocus.com/bid/106976
- https://www.exploit-db.com/exploits/46369/
- https://github.com/q3k/cve-2019-5736-poc
- https://github.com/Frichetten/CVE-2019-5736-PoC
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190215-runc
- https://www.synology.com/security/advisory/Synology_SA_19_06
- https://access.redhat.com/errata/RHSA-2019:0401
- https://access.redhat.com/errata/RHSA-2019:0408
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03913en_us
- https://security.netapp.com/advisory/ntap-20190307-0008/
- https://lists.apache.org/thread.html/b162dd624dc088cd634292f0402282a1d1d0ce853baeae8205bc033c@%3Cdev.mesos.apache.org%3E
- https://lists.apache.org/thread.html/a258757af84c5074dc7bf932622020fd4f60cef65a84290380386706@%3Cuser.mesos.apache.org%3E
- http://www.openwall.com/lists/oss-security/2019/03/23/1
- https://bugzilla.suse.com/show_bug.cgi?id=1121967
- https://blog.dragonsector.pl/2019/02/cve-2019-5736-escape-from-docker-and.html
- https://support.mesosphere.com/s/article/Known-Issue-Container-Runtime-Vulnerability-MSPH-2019-0003
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00074.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00091.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6A4OSFM5GGOWW4ECELV5OHX2XRAUSPH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWFJGIPYAAAMVSWWI3QWYXGA3ZBU2H4W/
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03410944
- https://access.redhat.com/errata/RHSA-2019:0975
- https://azure.microsoft.com/en-us/updates/iot-edge-fix-cve-2019-5736/
- https://azure.microsoft.com/en-us/updates/cve-2019-5736-and-runc-vulnerability/
- https://lists.apache.org/thread.html/acacf018c12636e41667e94ac0a1e9244e887eef2debdd474640aa6e@%3Cdev.dlab.apache.org%3E
- https://lists.apache.org/thread.html/a585f64d14c31ab393b90c5f17e41d9765a1a17eec63856ce750af46@%3Cdev.dlab.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00060.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00015.html
- http://www.openwall.com/lists/oss-security/2019/06/28/2
- http://www.openwall.com/lists/oss-security/2019/07/06/4
- http://www.openwall.com/lists/oss-security/2019/07/06/3
- https://usn.ubuntu.com/4048-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLC52IOJN6IQJWJ6CUI6AIUP6GVVG2QP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EGZKRCKI3Y7FMADO2MENMT4TU24QGHFR/
- https://lists.apache.org/thread.html/24e54e3c6b2259e3903b6b8fe26896ac649c481ea99c5739468c92a3@%3Cdev.dlab.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00029.html
- http://www.openwall.com/lists/oss-security/2019/10/24/1
- http://www.openwall.com/lists/oss-security/2019/10/29/3
- https://security.gentoo.org/glsa/202003-21
- https://lists.apache.org/thread.html/rc494623986d76593873ce5a40dd69cb3629400d10750d5d7e96b8587@%3Cdev.dlab.apache.org%3E
- https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E
- http://packetstormsecurity.com/files/163339/Docker-Container-Escape.html
- http://packetstormsecurity.com/files/165197/Docker-runc-Command-Execution-Proof-Of-Concept.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12547: In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native…
Published: 2019-02-11T15:29:00 Last Modified: 2019-05-16T16:29:00
Summary
In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12547 vulnerability.
References
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=543659
- https://access.redhat.com/errata/RHSA-2019:0469
- https://access.redhat.com/errata/RHSA-2019:0474
- https://access.redhat.com/errata/RHSA-2019:0473
- https://access.redhat.com/errata/RHSA-2019:0472
- https://access.redhat.com/errata/RHSA-2019:0640
- https://access.redhat.com/errata/RHSA-2019:1238
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12549: In Eclipse OpenJ9 version 0.11.0, the OpenJ9 JIT compiler may incorrectly omit a null check on…
Published: 2019-02-11T15:29:00 Last Modified: 2019-05-16T16:29:00
Summary
In Eclipse OpenJ9 version 0.11.0, the OpenJ9 JIT compiler may incorrectly omit a null check on the receiver object of an Unsafe call when accelerating it.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12549 vulnerability.
References
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=544019
- https://access.redhat.com/errata/RHSA-2019:0469
- https://access.redhat.com/errata/RHSA-2019:0472
- https://access.redhat.com/errata/RHSA-2019:0640
- https://access.redhat.com/errata/RHSA-2019:1238
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-7665: In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in…
Published: 2019-02-09T16:29:00 Last Modified: 2021-11-30T19:53:00
Summary
In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-7665 vulnerability.
References
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=24089
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- https://usn.ubuntu.com/4012-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://access.redhat.com/errata/RHSA-2019:2197
- https://access.redhat.com/errata/RHSA-2019:3575
- https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-7548: SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled.
Published: 2019-02-06T21:29:00 Last Modified: 2021-11-30T19:52:00
Summary
SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled.
Common Weakness Enumeration (CWE): CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
CWE Description: The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-7548 vulnerability.
References
- https://github.com/no-security/sqlalchemy_test
- https://github.com/sqlalchemy/sqlalchemy/issues/4481#issuecomment-461204518
- https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html
- https://access.redhat.com/errata/RHSA-2019:0984
- https://access.redhat.com/errata/RHSA-2019:0981
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16890: libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read….
Published: 2019-02-06T20:29:00 Last Modified: 2020-09-18T16:33:00
Summary
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (lib/vauth/ntlm.c:ntlm_decode_type2_target
) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16890 vulnerability.
References
- https://curl.haxx.se/docs/CVE-2018-16890.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890
- https://www.debian.org/security/2019/dsa-4386
- https://usn.ubuntu.com/3882-1/
- http://www.securityfocus.com/bid/106947
- https://security.netapp.com/advisory/ntap-20190315-0001/
- https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
- https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://support.f5.com/csp/article/K03314397?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/errata/RHSA-2019:3701
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3822: libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow….
Published: 2019-02-06T20:29:00 Last Modified: 2021-06-15T16:45:00
Summary
libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()
), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large ’nt response’ data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a ’large value’ needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-3822 vulnerability.
References
- https://curl.haxx.se/docs/CVE-2019-3822.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822
- https://www.debian.org/security/2019/dsa-4386
- https://usn.ubuntu.com/3882-1/
- http://www.securityfocus.com/bid/106950
- https://security.gentoo.org/glsa/201903-03
- https://security.netapp.com/advisory/ntap-20190315-0001/
- https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
- https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://security.netapp.com/advisory/ntap-20190719-0004/
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://support.f5.com/csp/article/K84141449
- https://support.f5.com/csp/article/K84141449?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/errata/RHSA-2019:3701
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3825: A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in…
Published: 2019-02-06T20:29:00 Last Modified: 2019-10-09T23:49:00
Summary
A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user’s session.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-3825 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18505: An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added…
Published: 2019-02-05T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created after the IPC process is started, leading to the authentication not being correctly applied to later channels. This could allow for a sandbox escape through IPC channels due to lack of message validation in the listener process. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18505 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1087565
- https://www.debian.org/security/2019/dsa-4376
- https://usn.ubuntu.com/3874-1/
- https://lists.debian.org/debian-lts-announce/2019/01/msg00025.html
- https://access.redhat.com/errata/RHSA-2019:0270
- https://access.redhat.com/errata/RHSA-2019:0269
- https://access.redhat.com/errata/RHSA-2019:0219
- https://access.redhat.com/errata/RHSA-2019:0218
- http://www.securityfocus.com/bid/106781
- https://www.debian.org/security/2019/dsa-4392
- https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html
- https://usn.ubuntu.com/3897-1/
- https://security.gentoo.org/glsa/201903-04
- https://security.gentoo.org/glsa/201904-07
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18506: When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC)…
Published: 2019-02-05T21:29:00 Last Modified: 2020-08-24T17:37:00
Summary
When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox < 65.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18506 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://usn.ubuntu.com/3874-1/
- http://www.securityfocus.com/bid/106773
- https://www.debian.org/security/2019/dsa-4411
- https://seclists.org/bugtraq/2019/Mar/28
- https://lists.debian.org/debian-lts-announce/2019/03/msg00024.html
- https://access.redhat.com/errata/RHSA-2019:0623
- https://access.redhat.com/errata/RHSA-2019:0622
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.html
- https://access.redhat.com/errata/RHSA-2019:0681
- https://access.redhat.com/errata/RHSA-2019:0680
- https://usn.ubuntu.com/3927-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.html
- https://www.debian.org/security/2019/dsa-4420
- https://seclists.org/bugtraq/2019/Apr/0
- https://lists.debian.org/debian-lts-announce/2019/04/msg00000.html
- https://security.gentoo.org/glsa/201904-07
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html
- https://access.redhat.com/errata/RHSA-2019:0966
- https://access.redhat.com/errata/RHSA-2019:1144
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18501: Mozilla developers and community members reported memory safety bugs present in Firefox 64 and…
Published: 2019-02-05T21:29:00 Last Modified: 2019-04-02T07:29:00
Summary
Mozilla developers and community members reported memory safety bugs present in Firefox 64 and Firefox ESR 60.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18501 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.debian.org/security/2019/dsa-4376
- https://usn.ubuntu.com/3874-1/
- https://lists.debian.org/debian-lts-announce/2019/01/msg00025.html
- https://access.redhat.com/errata/RHSA-2019:0270
- https://access.redhat.com/errata/RHSA-2019:0269
- https://access.redhat.com/errata/RHSA-2019:0219
- https://access.redhat.com/errata/RHSA-2019:0218
- http://www.securityfocus.com/bid/106781
- https://www.debian.org/security/2019/dsa-4392
- https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html
- https://usn.ubuntu.com/3897-1/
- https://security.gentoo.org/glsa/201903-04
- https://security.gentoo.org/glsa/201904-07
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18500: A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom…
Published: 2019-02-05T21:29:00 Last Modified: 2019-04-02T07:29:00
Summary
A use-after-free vulnerability can occur while parsing an HTML5 stream in concert with custom HTML elements. This results in the stream parser object being freed while still in use, leading to a potentially exploitable crash. This vulnerability affects Thunderbird < 60.5, Firefox ESR < 60.5, and Firefox < 65.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18500 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2019-03/
- https://www.mozilla.org/security/advisories/mfsa2019-02/
- https://www.mozilla.org/security/advisories/mfsa2019-01/
- https://www.debian.org/security/2019/dsa-4376
- https://usn.ubuntu.com/3874-1/
- https://lists.debian.org/debian-lts-announce/2019/01/msg00025.html
- https://access.redhat.com/errata/RHSA-2019:0270
- https://access.redhat.com/errata/RHSA-2019:0269
- https://access.redhat.com/errata/RHSA-2019:0219
- https://access.redhat.com/errata/RHSA-2019:0218
- http://www.securityfocus.com/bid/106781
- https://www.debian.org/security/2019/dsa-4392
- https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html
- https://usn.ubuntu.com/3897-1/
- https://security.gentoo.org/glsa/201903-04
- https://security.gentoo.org/glsa/201904-07
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-1000020: libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0…
Published: 2019-02-04T21:29:00 Last Modified: 2020-08-24T17:37:00
Summary
libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’) vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that can result in DoS by infinite loop. This attack appears to be exploitable via the victim opening a specially crafted ISO9660 file.
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-1000020 vulnerability.
References
- https://github.com/libarchive/libarchive/pull/1120/commits/8312eaa576014cd9b965012af51bc1f967b12423
- https://github.com/libarchive/libarchive/pull/1120
- https://usn.ubuntu.com/3884-1/
- https://lists.debian.org/debian-lts-announce/2019/02/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVXA7PHINVT6DFF6PRLTDTVTXKDLVHNF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBOCC2M6YGPZA6US43YK4INPSJZZHRTG/
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html
- https://access.redhat.com/errata/RHSA-2019:2298
- https://access.redhat.com/errata/RHSA-2019:3698
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-1000019: libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2…
Published: 2019-02-04T21:29:00 Last Modified: 2019-11-06T01:15:00
Summary
libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a crash (denial of service). This attack appears to be exploitable via the victim opening a specially crafted 7zip file.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-1000019 vulnerability.
References
- https://github.com/libarchive/libarchive/pull/1120/commits/65a23f5dbee4497064e9bb467f81138a62b0dae1
- https://github.com/libarchive/libarchive/pull/1120
- https://usn.ubuntu.com/3884-1/
- https://lists.debian.org/debian-lts-announce/2019/02/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVXA7PHINVT6DFF6PRLTDTVTXKDLVHNF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBOCC2M6YGPZA6US43YK4INPSJZZHRTG/
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html
- https://access.redhat.com/errata/RHSA-2019:2298
- https://access.redhat.com/errata/RHSA-2019:3698
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3813: Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-…
Published: 2019-02-04T18:29:00 Last Modified: 2021-07-21T11:39:00
Summary
Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers.
Common Weakness Enumeration (CWE): CWE-193: Off-by-one Error
CWE Description: A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Scores
- Impact Score: 6.4
- Exploitability Score: 5.5
- CVSS: 5.4
- CVSS Vector: AV:A/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2019-3813 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1665371
- https://www.debian.org/security/2019/dsa-4375
- https://usn.ubuntu.com/3870-1/
- https://lists.debian.org/debian-lts-announce/2019/01/msg00026.html
- https://access.redhat.com/errata/RHSA-2019:0232
- https://access.redhat.com/errata/RHSA-2019:0231
- http://www.securityfocus.com/bid/106801
- https://access.redhat.com/errata/RHSA-2019:0457
- https://security.gentoo.org/glsa/202007-30
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-6111: An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983…
Published: 2019-01-31T18:29:00 Last Modified: 2020-08-24T17:37:00
Summary
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2019-6111 vulnerability.
- SCP Client - Multiple Vulnerabilities (SSHtranger Things) by Mark E. Haase at 2019-01-18
- OpenSSH SCP Client - Write Arbitrary Files by Harry Sintonen at 2019-01-11
References
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
- https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c
- https://www.exploit-db.com/exploits/46193/
- http://www.securityfocus.com/bid/106741
- https://usn.ubuntu.com/3885-1/
- https://www.debian.org/security/2019/dsa-4387
- https://security.netapp.com/advisory/ntap-20190213-0001/
- https://bugzilla.redhat.com/show_bug.cgi?id=1677794
- https://usn.ubuntu.com/3885-2/
- https://security.gentoo.org/glsa/201903-16
- https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
- http://www.openwall.com/lists/oss-security/2019/04/18/1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/
- https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E
- https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E
- https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html
- https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc
- https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3702
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-7150: An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function…
Published: 2019-01-29T00:29:00 Last Modified: 2021-11-30T19:52:00
Summary
An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-7150 vulnerability.
References
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=24103
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- https://usn.ubuntu.com/4012-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://access.redhat.com/errata/RHSA-2019:2197
- https://access.redhat.com/errata/RHSA-2019:3575
- https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3815: A memory leak was discovered in the backport of fixes for CVE-2018-16864 in Red Hat Enterprise…
Published: 2019-01-28T15:29:00 Last Modified: 2020-11-13T16:15:00
Summary
A memory leak was discovered in the backport of fixes for CVE-2018-16864 in Red Hat Enterprise Linux. Function dispatch_message_real() in journald-server.c does not free the memory allocated by set_iovec_field_free() to store the _CMDLINE=
entry. A local attacker may use this flaw to make systemd-journald crash. This issue only affects versions shipped with Red Hat Enterprise since v219-62.2.
Common Weakness Enumeration (CWE): CWE-401: Missing Release of Memory after Effective Lifetime
CWE Description: The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-3815 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3815
- http://www.securityfocus.com/bid/106632
- https://access.redhat.com/errata/RHSA-2019:0201
- https://lists.debian.org/debian-lts-announce/2019/03/msg00013.html
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16881: A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could…
Published: 2019-01-25T18:29:00 Last Modified: 2020-12-04T18:15:00
Summary
A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16881 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881
- https://access.redhat.com/errata/RHSA-2019:2110
- https://access.redhat.com/errata/RHSA-2019:2439
- https://access.redhat.com/errata/RHSA-2019:2437
- https://access.redhat.com/errata/RHBA-2019:2501
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-15982: Flash Player versions 31.0.0.153 and earlier, and 31.0.0.108 and earlier have a use after free…
Published: 2019-01-18T17:29:00 Last Modified: 2019-01-29T19:24:00
Summary
Flash Player versions 31.0.0.153 and earlier, and 31.0.0.108 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-15982 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-42.html
- https://www.exploit-db.com/exploits/46051/
- https://access.redhat.com/errata/RHSA-2018:3795
- http://www.securityfocus.com/bid/106116
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3136: A query with a specific set of characteristics could cause a server using DNS64 to encounter an…
Published: 2019-01-16T20:29:00 Last Modified: 2020-10-20T12:15:00
Summary
A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8.
Common Weakness Enumeration (CWE): CWE-617: Reachable Assertion
CWE Description: The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3136 vulnerability.
References
- https://kb.isc.org/docs/aa-01465
- https://www.debian.org/security/2017/dsa-3854
- https://security.netapp.com/advisory/ntap-20180802-0002/
- https://security.gentoo.org/glsa/201708-01
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://access.redhat.com/errata/RHSA-2017:1105
- https://access.redhat.com/errata/RHSA-2017:1095
- http://www.securitytracker.com/id/1038259
- http://www.securityfocus.com/bid/97653
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3144: A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to…
Published: 2019-01-16T20:29:00 Last Modified: 2020-01-09T21:07:00
Summary
A vulnerability stemming from failure to properly clean up closed OMAPI connections can lead to exhaustion of the pool of socket descriptors available to the DHCP server. Affects ISC DHCP 4.1.0 to 4.1-ESV-R15, 4.2.0 to 4.2.8, 4.3.0 to 4.3.6. Older versions may also be affected but are well beyond their end-of-life (EOL). Releases prior to 4.1.0 have not been tested.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3144 vulnerability.
References
- https://kb.isc.org/docs/aa-01541
- https://www.debian.org/security/2018/dsa-4133
- https://usn.ubuntu.com/3586-1/
- https://access.redhat.com/errata/RHSA-2018:0158
- http://www.securitytracker.com/id/1040194
- http://www.securityfocus.com/bid/102726
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3135: Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing…
Published: 2019-01-16T20:29:00 Last Modified: 2019-10-09T23:27:00
Summary
Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3135 vulnerability.
References
- https://kb.isc.org/docs/aa-01453
- https://www.debian.org/security/2017/dsa-3795
- https://security.netapp.com/advisory/ntap-20180926-0005/
- https://security.gentoo.org/glsa/201708-01
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- http://www.securitytracker.com/id/1037801
- http://www.securityfocus.com/bid/96150
- http://rhn.redhat.com/errata/RHSA-2017-0276.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3142: An attacker who is able to send and receive messages to an authoritative DNS server and who has…
Published: 2019-01-16T20:29:00 Last Modified: 2019-08-30T17:15:00
Summary
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3142 vulnerability.
References
- https://kb.isc.org/docs/aa-01504
- https://www.debian.org/security/2017/dsa-3904
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
- https://access.redhat.com/errata/RHSA-2017:1680
- https://access.redhat.com/errata/RHSA-2017:1679
- http://www.securitytracker.com/id/1038809
- http://www.securityfocus.com/bid/99339
- https://security.netapp.com/advisory/ntap-20190830-0003/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3143: An attacker who is able to send and receive messages to an authoritative DNS server and who has…
Published: 2019-01-16T20:29:00 Last Modified: 2019-10-03T00:03:00
Summary
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3143 vulnerability.
References
- https://kb.isc.org/docs/aa-01503
- https://www.debian.org/security/2017/dsa-3904
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
- https://access.redhat.com/errata/RHSA-2017:1680
- https://access.redhat.com/errata/RHSA-2017:1679
- http://www.securitytracker.com/id/1038809
- http://www.securityfocus.com/bid/99337
- https://security.netapp.com/advisory/ntap-20190830-0003/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3145: BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading…
Published: 2019-01-16T20:29:00 Last Modified: 2019-10-09T23:27:00
Summary
BIND was improperly sequencing cleanup operations on upstream recursion fetch contexts, leading in some cases to a use-after-free error that can trigger an assertion failure and crash in named. Affects BIND 9.0.0 to 9.8.x, 9.9.0 to 9.9.11, 9.10.0 to 9.10.6, 9.11.0 to 9.11.2, 9.9.3-S1 to 9.9.11-S1, 9.10.5-S1 to 9.10.6-S1, 9.12.0a1 to 9.12.0rc1.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3145 vulnerability.
References
- https://kb.isc.org/docs/aa-01542
- https://www.debian.org/security/2018/dsa-4089
- https://security.netapp.com/advisory/ntap-20180117-0003/
- https://lists.debian.org/debian-lts-announce/2018/01/msg00029.html
- https://access.redhat.com/errata/RHSA-2018:0488
- https://access.redhat.com/errata/RHSA-2018:0487
- https://access.redhat.com/errata/RHSA-2018:0102
- https://access.redhat.com/errata/RHSA-2018:0101
- http://www.securitytracker.com/id/1040195
- http://www.securityfocus.com/bid/102716
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3137: Mistaken assumptions about the ordering of records in the answer section of a response containing…
Published: 2019-01-16T20:29:00 Last Modified: 2019-10-09T23:27:00
Summary
Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which records occurred in an unusual order. Affects BIND 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0-P3, 9.11.1b1->9.11.1rc1, and 9.9.9-S8.
Common Weakness Enumeration (CWE): CWE-617: Reachable Assertion
CWE Description: The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3137 vulnerability.
References
- https://kb.isc.org/docs/aa-01466
- https://www.debian.org/security/2017/dsa-3854
- https://security.netapp.com/advisory/ntap-20180802-0002/
- https://security.gentoo.org/glsa/201708-01
- https://access.redhat.com/errata/RHSA-2017:1583
- https://access.redhat.com/errata/RHSA-2017:1582
- https://access.redhat.com/errata/RHSA-2017:1105
- https://access.redhat.com/errata/RHSA-2017:1095
- http://www.securitytracker.com/id/1040195
- http://www.securitytracker.com/id/1038258
- http://www.securityfocus.com/bid/97651
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5733: A malicious client which is allowed to send very large amounts of traffic (billions of packets)…
Published: 2019-01-16T20:29:00 Last Modified: 2020-01-09T21:08:00
Summary
A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash. Affects ISC DHCP 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5733 vulnerability.
References
- https://kb.isc.org/docs/aa-01567
- https://www.debian.org/security/2018/dsa-4133
- https://usn.ubuntu.com/3586-2/
- https://usn.ubuntu.com/3586-1/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00015.html
- https://access.redhat.com/errata/RHSA-2018:0483
- https://access.redhat.com/errata/RHSA-2018:0469
- http://www.securitytracker.com/id/1040437
- http://www.securityfocus.com/bid/103188
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5740: “deny-answer-aliases” is a little-used feature intended to help recursive server operators…
Published: 2019-01-16T20:29:00 Last Modified: 2021-11-17T22:16:00
Summary
“deny-answer-aliases” is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feature makes it easy, when the feature is in use, to experience an assertion failure in name.c. Affects BIND 9.7.0->9.8.8, 9.9.0->9.9.13, 9.10.0->9.10.8, 9.11.0->9.11.4, 9.12.0->9.12.2, 9.13.0->9.13.2.
Common Weakness Enumeration (CWE): CWE-617: Reachable Assertion
CWE Description: The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5740 vulnerability.
References
- https://kb.isc.org/docs/aa-01639
- https://usn.ubuntu.com/3769-2/
- https://usn.ubuntu.com/3769-1/
- https://security.netapp.com/advisory/ntap-20180926-0003/
- https://lists.debian.org/debian-lts-announce/2018/08/msg00033.html
- https://access.redhat.com/errata/RHSA-2018:2571
- https://access.redhat.com/errata/RHSA-2018:2570
- http://www.securitytracker.com/id/1041436
- http://www.securityfocus.com/bid/105055
- https://security.gentoo.org/glsa/201903-13
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00026.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03927en_us
- https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2422: Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported…
Published: 2019-01-16T19:30:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2422 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- http://www.securityfocus.com/bid/106596
- https://security.netapp.com/advisory/ntap-20190118-0001/
- https://usn.ubuntu.com/3875-1/
- https://access.redhat.com/errata/RHSA-2019:0416
- https://access.redhat.com/errata/RHSA-2019:0436
- https://access.redhat.com/errata/RHSA-2019:0435
- https://access.redhat.com/errata/RHSA-2019:0464
- https://access.redhat.com/errata/RHSA-2019:0462
- https://access.redhat.com/errata/RHSA-2019:0469
- https://access.redhat.com/errata/RHSA-2019:0474
- https://access.redhat.com/errata/RHSA-2019:0473
- https://access.redhat.com/errata/RHSA-2019:0472
- https://security.gentoo.org/glsa/201903-14
- https://www.debian.org/security/2019/dsa-4410
- https://seclists.org/bugtraq/2019/Mar/27
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html
- https://access.redhat.com/errata/RHSA-2019:0640
- https://lists.debian.org/debian-lts-announce/2019/03/msg00033.html
- https://usn.ubuntu.com/3942-1/
- https://usn.ubuntu.com/3949-1/
- https://access.redhat.com/errata/RHSA-2019:1238
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-2449: Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The…
Published: 2019-01-16T19:30:00 Last Modified: 2020-09-08T12:29:00
Summary
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The supported version that is affected is Java SE: 8u192. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2019-2449 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- http://www.securityfocus.com/bid/106597
- https://security.netapp.com/advisory/ntap-20190118-0001/
- https://access.redhat.com/errata/RHSA-2019:0469
- https://access.redhat.com/errata/RHSA-2019:0472
- https://access.redhat.com/errata/RHSA-2019:0640
- https://access.redhat.com/errata/RHSA-2019:1238
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16846: It was found in Ceph versions before 13.2.4 that authenticated ceph RGW users can cause a denial…
Published: 2019-01-15T18:29:00 Last Modified: 2021-08-11T11:15:00
Summary
It was found in Ceph versions before 13.2.4 that authenticated ceph RGW users can cause a denial of service against OMAPs holding bucket indices.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16846 vulnerability.
References
- https://ceph.com/releases/13-2-4-mimic-released/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16846
- https://lists.debian.org/debian-lts-announce/2019/03/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
- https://usn.ubuntu.com/4035-1/
- https://access.redhat.com/errata/RHSA-2019:2541
- https://access.redhat.com/errata/RHSA-2019:2538
- https://lists.debian.org/debian-lts-announce/2021/08/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-3811: A vulnerability was found in sssd. If a user was configured with no home directory set, sssd…
Published: 2019-01-15T15:29:00 Last Modified: 2021-11-02T20:07:00
Summary
A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return ‘/’ (the root directory) instead of ’’ (the empty string / no home directory). This could impact services that restrict the user’s filesystem access to within their home directory through chroot() etc. All versions before 2.1 are vulnerable.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.1
- CVSS: 2.7
- CVSS Vector: AV:A/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2019-3811 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3811
- https://lists.debian.org/debian-lts-announce/2019/01/msg00011.html
- http://www.securityfocus.com/bid/106644
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00045.html
- https://access.redhat.com/errata/RHSA-2019:2177
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16888: It was discovered systemd does not correctly check the content of PIDFile files before using it…
Published: 2019-01-14T22:29:00 Last Modified: 2022-01-31T18:37:00
Summary
It was discovered systemd does not correctly check the content of PIDFile files before using it to kill processes. When a service is run from an unprivileged user (e.g. User field set in the service file), a local attacker who is able to write to the PIDFile of the mentioned service may use this flaw to trick systemd into killing other services and/or privileged processes. Versions before v237 are vulnerable.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-16888 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16888
- https://security.netapp.com/advisory/ntap-20190307-0007/
- https://access.redhat.com/errata/RHSA-2019:2091
- https://lists.apache.org/thread.html/5960a34a524848cd722fd7ab7e2227eac10107b0f90d9d1e9c3caa74@%3Cuser.cassandra.apache.org%3E
- https://usn.ubuntu.com/4269-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16886: etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper…
Published: 2019-01-14T19:29:00 Last Modified: 2019-10-24T12:24:00
Summary
etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a REST API request to the gRPC-gateway.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16886 vulnerability.
References
- https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.3.md#security-authentication
- https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.2.md#security-authentication
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16886
- http://www.securityfocus.com/bid/106540
- https://access.redhat.com/errata/RHSA-2019:0237
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/
- https://access.redhat.com/errata/RHSA-2019:1352
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-20699: Docker Engine before 18.09 allows attackers to cause a denial of service (dockerd memory…
Published: 2019-01-12T02:29:00 Last Modified: 2019-03-14T18:13:00
Summary
Docker Engine before 18.09 allows attackers to cause a denial of service (dockerd memory consumption) via a large integer in a –cpuset-mems or –cpuset-cpus value, related to daemon/daemon_unix.go, pkg/parsers/parsers.go, and pkg/sysinfo/sysinfo.go.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-20699 vulnerability.
References
- https://github.com/moby/moby/pull/37967
- https://github.com/docker/engine/pull/70
- https://access.redhat.com/errata/RHSA-2019:0487
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16865: An allocation of memory without limits, that could result in the stack clashing with another…
Published: 2019-01-11T21:29:00 Last Modified: 2022-01-31T18:34:00
Summary
An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-16865 vulnerability.
References
- https://www.qualys.com/2019/01/09/system-down/system-down.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16865
- https://usn.ubuntu.com/3855-1/
- http://www.securityfocus.com/bid/106525
- https://www.debian.org/security/2019/dsa-4367
- https://access.redhat.com/errata/RHSA-2019:0049
- https://security.netapp.com/advisory/ntap-20190117-0001/
- https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html
- https://access.redhat.com/errata/RHSA-2019:0204
- https://access.redhat.com/errata/RHSA-2019:0271
- https://access.redhat.com/errata/RHSA-2019:0342
- https://access.redhat.com/errata/RHSA-2019:0361
- https://security.gentoo.org/glsa/201903-07
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://access.redhat.com/errata/RHBA-2019:0327
- http://www.openwall.com/lists/oss-security/2019/05/10/4
- https://seclists.org/bugtraq/2019/May/25
- http://packetstormsecurity.com/files/152841/System-Down-A-systemd-journald-Exploit.html
- http://seclists.org/fulldisclosure/2019/May/21
- https://access.redhat.com/errata/RHSA-2019:2402
- http://www.openwall.com/lists/oss-security/2021/07/20/2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16864: An allocation of memory without limits, that could result in the stack clashing with another…
Published: 2019-01-11T20:29:00 Last Modified: 2022-01-31T18:31:00
Summary
An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-16864 vulnerability.
References
- https://www.qualys.com/2019/01/09/system-down/system-down.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16864
- https://usn.ubuntu.com/3855-1/
- http://www.securityfocus.com/bid/106523
- https://www.debian.org/security/2019/dsa-4367
- https://access.redhat.com/errata/RHSA-2019:0049
- https://security.netapp.com/advisory/ntap-20190117-0001/
- https://lists.debian.org/debian-lts-announce/2019/01/msg00016.html
- https://access.redhat.com/errata/RHSA-2019:0204
- https://access.redhat.com/errata/RHSA-2019:0271
- https://access.redhat.com/errata/RHSA-2019:0342
- https://access.redhat.com/errata/RHSA-2019:0361
- https://security.gentoo.org/glsa/201903-07
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:2402
- http://www.openwall.com/lists/oss-security/2021/07/20/2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2019-6133: In PolicyKit (aka polkit) 0.115, the “start time” protection mechanism can be bypassed because…
Published: 2019-01-11T14:29:00 Last Modified: 2020-08-24T17:37:00
Summary
In PolicyKit (aka polkit) 0.115, the “start time” protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2019-6133 vulnerability.
References
- https://gitlab.freedesktop.org/polkit/polkit/merge_requests/19
- https://gitlab.freedesktop.org/polkit/polkit/commit/c898fdf4b1aafaa04f8ada9d73d77c8bb76e2f81
- https://git.kernel.org/linus/7b55851367136b1efd84d98fea81ba57a98304cf
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1692
- http://www.securityfocus.com/bid/106537
- https://lists.debian.org/debian-lts-announce/2019/01/msg00021.html
- https://access.redhat.com/errata/RHSA-2019:0230
- https://access.redhat.com/errata/RHSA-2019:0420
- https://usn.ubuntu.com/3901-2/
- https://usn.ubuntu.com/3901-1/
- https://usn.ubuntu.com/3903-2/
- https://usn.ubuntu.com/3903-1/
- https://usn.ubuntu.com/3908-1/
- https://usn.ubuntu.com/3908-2/
- https://usn.ubuntu.com/3910-2/
- https://usn.ubuntu.com/3910-1/
- https://support.f5.com/csp/article/K22715344
- https://usn.ubuntu.com/3934-1/
- https://access.redhat.com/errata/RHSA-2019:0832
- https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
- https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00049.html
- https://usn.ubuntu.com/3934-2/
- https://access.redhat.com/errata/RHSA-2019:2699
- https://access.redhat.com/errata/RHSA-2019:2978
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-20685: In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access…
Published: 2019-01-10T21:29:00 Last Modified: 2020-08-24T17:37:00
Summary
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
Common Weakness Enumeration (CWE): CWE-863: Incorrect Authorization
CWE Description: The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-20685 vulnerability.
References
- https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
- https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
- http://www.securityfocus.com/bid/106531
- https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
- https://usn.ubuntu.com/3885-1/
- https://www.debian.org/security/2019/dsa-4387
- https://security.netapp.com/advisory/ntap-20190215-0001/
- https://security.gentoo.org/glsa/201903-16
- https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2019:3702
- https://security.gentoo.org/glsa/202007-53
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9651: A missing check for whether a property of a JS object is private in V8 in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-16T13:43:00
Summary
A missing check for whether a property of a JS object is private in V8 in Google Chrome prior to 55.0.2883.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-9651 vulnerability.
References
- https://crbug.com/664411
- https://chromereleases.googleblog.com/2016/12/stable-channel-update-for-desktop.html
- https://www.exploit-db.com/exploits/42175/
- https://security.gentoo.org/glsa/201612-11
- http://www.securityfocus.com/bid/94633
- http://rhn.redhat.com/errata/RHSA-2016-2919.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16083: An out of bounds read in forward error correction code in WebRTC in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-25T19:56:00
Summary
An out of bounds read in forward error correction code in WebRTC in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-16083 vulnerability.
References
- https://crbug.com/856823
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://www.exploit-db.com/exploits/45444/
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
- http://www.securityfocus.com/bid/105215
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16065: A Javascript reentrancy issues that caused a use-after-free in V8 in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-16T14:00:00
Summary
A Javascript reentrancy issues that caused a use-after-free in V8 in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16065 vulnerability.
References
- https://crbug.com/867776
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4289
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
- http://www.securityfocus.com/bid/105215
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16068: Missing validation in Mojo in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-15T14:35:00
Summary
Missing validation in Mojo in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16068 vulnerability.
References
- https://crbug.com/877182
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4289
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
- http://www.securityfocus.com/bid/105215
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16076: Missing bounds check in PDFium in Google Chrome prior to 69.0.3497.81 allowed a remote attacker…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-15T12:48:00
Summary
Missing bounds check in PDFium in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16076 vulnerability.
References
- https://crbug.com/867501
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
- http://www.securityfocus.com/bid/105215
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16081: Allowing the chrome.debugger API to run on file:// URLs in DevTools in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Allowing the chrome.debugger API to run on file:// URLs in DevTools in Google Chrome prior to 69.0.3497.81 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system without file access permission via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-862: Missing Authorization
CWE Description: The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16081 vulnerability.
References
- https://crbug.com/666299
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
- http://www.securityfocus.com/bid/105215
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16082: An out of bounds read in Swiftshader in Google Chrome prior to 69.0.3497.81 allowed a remote…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-15T17:58:00
Summary
An out of bounds read in Swiftshader in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16082 vulnerability.
References
- https://crbug.com/851398
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
- http://www.securityfocus.com/bid/105215
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16084: The default selected dialog button in CustomHandlers in Google Chrome prior to 69.0.3497.81…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-29T18:44:00
Summary
The default selected dialog button in CustomHandlers in Google Chrome prior to 69.0.3497.81 allowed a remote attacker who convinced the user to perform certain operations to open external programs via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16084 vulnerability.
References
- https://crbug.com/865202
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
- http://www.securityfocus.com/bid/105215
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16067: A use after free in WebAudio in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to…
Published: 2019-01-09T19:29:00 Last Modified: 2020-08-24T17:37:00
Summary
A use after free in WebAudio in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16067 vulnerability.
References
- https://crbug.com/860522
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4289
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
- http://www.securityfocus.com/bid/105215
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16071: A use after free in WebRTC in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to…
Published: 2019-01-09T19:29:00 Last Modified: 2020-08-24T17:37:00
Summary
A use after free in WebRTC in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted video file.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-16071 vulnerability.
References
- https://crbug.com/855211
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://www.exploit-db.com/exploits/45443/
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
- http://www.securityfocus.com/bid/105215
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17461: An out of bounds read in PDFium in Google Chrome prior to 68.0.3440.75 allowed a remote attacker…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-14T19:07:00
Summary
An out of bounds read in PDFium in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17461 vulnerability.
References
- https://crbug.com/874359
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16066: A use after free in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to…
Published: 2019-01-09T19:29:00 Last Modified: 2020-08-24T17:37:00
Summary
A use after free in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16066 vulnerability.
References
- https://crbug.com/847570
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4289
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
- http://www.securityfocus.com/bid/105215
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16079: A race condition between permission prompts and navigations in Prompts in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-15T18:01:00
Summary
A race condition between permission prompts and navigations in Prompts in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16079 vulnerability.
References
- https://crbug.com/723503
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
- http://www.securityfocus.com/bid/105215
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16078: Unsafe handling of credit card details in Autofill in Google Chrome prior to 69.0.3497.81 allowed…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-29T19:21:00
Summary
Unsafe handling of credit card details in Autofill in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16078 vulnerability.
References
- https://crbug.com/858820
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
- http://www.securityfocus.com/bid/105215
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16088: A missing check for JS-simulated input events in Blink in Google Chrome prior to 69.0.3497.81…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-29T20:20:00
Summary
A missing check for JS-simulated input events in Blink in Google Chrome prior to 69.0.3497.81 allowed a remote attacker to download arbitrary files with no user input via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16088 vulnerability.
References
- https://crbug.com/848531
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop.html
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:2666
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17458: An improper update of the WebAssembly dispatch table in WebAssembly in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2020-08-24T17:37:00
Summary
An improper update of the WebAssembly dispatch table in WebAssembly in Google Chrome prior to 69.0.3497.92 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-129: Improper Validation of Array Index
CWE Description: The most common condition situation leading to an out-of-bounds array index is the use of loop index variables as buffer indexes. If the end condition for the loop is subject to a flaw, the index can grow or shrink unbounded, therefore causing a buffer overflow or underflow. Another common situation leading to this condition is the use of a function’s return value, or the resulting value of a calculation directly as an index in to a buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17458 vulnerability.
References
- https://crbug.com/875322
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop_11.html
- https://access.redhat.com/errata/RHSA-2018:2818
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17459: Incorrect handling of clicks in the omnibox in Navigation in Google Chrome prior to 69.0.3497.92…
Published: 2019-01-09T19:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Incorrect handling of clicks in the omnibox in Navigation in Google Chrome prior to 69.0.3497.92 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17459 vulnerability.
References
- https://crbug.com/880759
- https://chromereleases.googleblog.com/2018/09/stable-channel-update-for-desktop_11.html
- https://access.redhat.com/errata/RHSA-2018:2818
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17470: A heap buffer overflow in GPU in Google Chrome prior to 70.0.3538.67 allowed a remote attacker…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-15T17:46:00
Summary
A heap buffer overflow in GPU in Google Chrome prior to 70.0.3538.67 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17470 vulnerability.
References
- https://crbug.com/877874
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4330
- https://security.gentoo.org/glsa/201811-10
- https://access.redhat.com/errata/RHSA-2018:3004
- http://www.securityfocus.com/bid/105666
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6140: Allowing the chrome.debugger API to attach to Web UI pages in DevTools in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-16T14:39:00
Summary
Allowing the chrome.debugger API to attach to Web UI pages in DevTools in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6140 vulnerability.
References
- https://crbug.com/798222
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.debian.org/security/2018/dsa-4237
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6144: Off-by-one error in PDFium in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-14T19:03:00
Summary
Off-by-one error in PDFium in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6144 vulnerability.
References
- https://crbug.com/828049
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.debian.org/security/2018/dsa-4237
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6153: A precision error in Skia in Google Chrome prior to 68.0.3440.75 allowed a remote attacker who…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-14T18:23:00
Summary
A precision error in Skia in Google Chrome prior to 68.0.3440.75 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6153 vulnerability.
References
- https://crbug.com/850350
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6170: A bad cast in PDFium in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to…
Published: 2019-01-09T19:29:00 Last Modified: 2020-08-24T17:37:00
Summary
A bad cast in PDFium in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6170 vulnerability.
References
- https://crbug.com/862059
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6173: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6173 vulnerability.
References
- https://crbug.com/836885
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6084: Insufficiently sanitized distributed objects in Updater in Google Chrome on macOS prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2021-09-08T17:21:00
Summary
Insufficiently sanitized distributed objects in Updater in Google Chrome on macOS prior to 66.0.3359.117 allowed a local attacker to execute arbitrary code via an executable file.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-6084 vulnerability.
References
- https://crbug.com/822424
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.exploit-db.com/exploits/44307/
- http://www.securityfocus.com/bid/103917
- http://www.securityfocus.com/bid/103468
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6093: Insufficient origin checks in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-29T20:01:00
Summary
Insufficient origin checks in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6093 vulnerability.
References
- https://crbug.com/780435
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6110: Parsing documents as HTML in Downloads in Google Chrome prior to 66.0.3359.117 allowed a remote…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-30T16:47:00
Summary
Parsing documents as HTML in Downloads in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to cause Chrome to execute scripts via a local non-HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6110 vulnerability.
References
- https://crbug.com/777737
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6056: Type confusion could lead to a heap out-of-bounds write in V8 in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-29T19:41:00
Summary
Type confusion could lead to a heap out-of-bounds write in V8 in Google Chrome prior to 64.0.3282.168 allowing a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6056 vulnerability.
References
- https://crbug.com/806388
- https://chromereleases.googleblog.com/2018/02/stable-channel-update-for-desktop_13.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0334
- http://www.securityfocus.com/bid/103003
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6113: Improper handling of pending navigation entries in Navigation in Google Chrome on iOS prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2021-09-08T17:21:00
Summary
Improper handling of pending navigation entries in Navigation in Google Chrome on iOS prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6113 vulnerability.
References
- https://crbug.com/805900
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6096: A JavaScript focused window could overlap the fullscreen notification in Fullscreen in Google…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-30T18:16:00
Summary
A JavaScript focused window could overlap the fullscreen notification in Fullscreen in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6096 vulnerability.
References
- https://crbug.com/776418
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6133: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-30T16:55:00
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
Common Weakness Enumeration (CWE): CWE-19: Data Processing Errors
CWE Description: Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6133 vulnerability.
References
- https://crbug.com/817247
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.debian.org/security/2018/dsa-4237
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6127: Early free of object in use in IndexDB in Google Chrome prior to 67.0.3396.62 allowed a remote…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-30T16:02:00
Summary
Early free of object in use in IndexDB in Google Chrome prior to 67.0.3396.62 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6127 vulnerability.
References
- https://crbug.com/842990
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.debian.org/security/2018/dsa-4237
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6117: Confusing settings in Autofill in Google Chrome prior to 66.0.3359.117 allowed a remote attacker…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-15T20:57:00
Summary
Confusing settings in Autofill in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6117 vulnerability.
References
- https://crbug.com/822465
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6135: Lack of clearing the previous site before loading alerts from a new one in Blink in Google Chrome…
Published: 2019-01-09T19:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Lack of clearing the previous site before loading alerts from a new one in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6135 vulnerability.
References
- https://crbug.com/823353
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.debian.org/security/2018/dsa-4237
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6100: Incorrect handling of confusable characters in URL Formatter in Google Chrome on macOS prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-30T18:01:00
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome on macOS prior to 66.0.3359.117 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
Common Weakness Enumeration (CWE): CWE-19: Data Processing Errors
CWE Description: Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6100 vulnerability.
References
- https://crbug.com/811117
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6123: A use after free in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to…
Published: 2019-01-09T19:29:00 Last Modified: 2020-08-24T17:37:00
Summary
A use after free in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6123 vulnerability.
References
- https://crbug.com/835639
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.debian.org/security/2018/dsa-4237
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6163: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6163 vulnerability.
References
- https://crbug.com/849398
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6106: An asynchronous generator may return an incorrect state in V8 in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-30T17:12:00
Summary
An asynchronous generator may return an incorrect state in V8 in Google Chrome prior to 66.0.3359.117 allowing a remote attacker to potentially exploit object corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-19: Data Processing Errors
CWE Description: Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6106 vulnerability.
References
- https://crbug.com/805729
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6097: Incorrect handling of asynchronous methods in Fullscreen in Google Chrome on macOS prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2021-09-08T17:21:00
Summary
Incorrect handling of asynchronous methods in Fullscreen in Google Chrome on macOS prior to 66.0.3359.117 allowed a remote attacker to enter full screen without showing a warning via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-19: Data Processing Errors
CWE Description: Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6097 vulnerability.
References
- https://crbug.com/806162
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6175: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6175 vulnerability.
References
- https://crbug.com/826019
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6165: Incorrect handling of reloads in Navigation in Google Chrome prior to 68.0.3440.75 allowed a…
Published: 2019-01-09T19:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect handling of reloads in Navigation in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6165 vulnerability.
References
- https://crbug.com/847718
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6111: An object lifetime issue in the developer tools network handler in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-16T16:41:00
Summary
An object lifetime issue in the developer tools network handler in Google Chrome prior to 66.0.3359.117 allowed a local attacker to execute arbitrary code via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6111 vulnerability.
References
- https://crbug.com/780694
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6091: Service Workers can intercept any request made by an
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-30T18:27:00
Summary
Service Workers can intercept any request made by an
Common Weakness Enumeration (CWE): CWE-19: Data Processing Errors
CWE Description: Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6091 vulnerability.
References
- https://crbug.com/771933
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6143: Insufficient validation in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-15T12:23:00
Summary
Insufficient validation in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6143 vulnerability.
References
- https://crbug.com/843022
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.debian.org/security/2018/dsa-4237
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6109: readAsText() can indefinitely read the file picked by the user, rather than only once at the time…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-30T17:02:00
Summary
readAsText() can indefinitely read the file picked by the user, rather than only once at the time the file is picked in File API in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to access data on the user file system without explicit consent via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6109 vulnerability.
References
- https://crbug.com/710190
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6174: Integer overflows in Swiftshader in Google Chrome prior to 68.0.3440.75 potentially allowed a…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-14T16:21:00
Summary
Integer overflows in Swiftshader in Google Chrome prior to 68.0.3440.75 potentially allowed a remote attacker to execute arbitrary code via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6174 vulnerability.
References
- https://crbug.com/835299
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6114: Incorrect enforcement of CSP for
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-16T15:22:00
Summary
Incorrect enforcement of CSP for
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6114 vulnerability.
References
- https://crbug.com/811691
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6112: Making URLs clickable and allowing them to be styled in DevTools in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Making URLs clickable and allowing them to be styled in DevTools in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-706: Use of Incorrectly-Resolved Name or Reference
CWE Description: The software uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6112 vulnerability.
References
- https://crbug.com/798096
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://security.gentoo.org/glsa/201804-22
- https://access.redhat.com/errata/RHSA-2018:1195
- http://www.securityfocus.com/bid/103917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6141: Insufficient validation of an image filter in Skia in Google Chrome prior to 67.0.3396.62 allowed…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-14T19:05:00
Summary
Insufficient validation of an image filter in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6141 vulnerability.
References
- https://crbug.com/796107
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.debian.org/security/2018/dsa-4237
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6164: Insufficient origin checks for CSS content in Blink in Google Chrome prior to 68.0.3440.75…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-14T17:45:00
Summary
Insufficient origin checks for CSS content in Blink in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6164 vulnerability.
References
- https://crbug.com/848786
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6120: An integer overflow that could lead to an attacker-controlled heap out-of-bounds write in PDFium…
Published: 2019-01-09T19:29:00 Last Modified: 2020-08-24T17:37:00
Summary
An integer overflow that could lead to an attacker-controlled heap out-of-bounds write in PDFium in Google Chrome prior to 66.0.3359.170 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6120 vulnerability.
References
- https://crbug.com/833721
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4237
- https://security.gentoo.org/glsa/201805-06
- https://access.redhat.com/errata/RHSA-2018:1446
- http://www.securityfocus.com/bid/104143
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6158: A race condition in Oilpan in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-14T17:46:00
Summary
A race condition in Oilpan in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6158 vulnerability.
References
- https://crbug.com/841280
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6179: Insufficient enforcement of file access permission in the activeTab case in Extensions in Google…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-16T15:10:00
Summary
Insufficient enforcement of file access permission in the activeTab case in Extensions in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6179 vulnerability.
References
- https://crbug.com/816685
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6137: CSS Paint API in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to leak…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-14T19:14:00
Summary
CSS Paint API in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6137 vulnerability.
References
- https://crbug.com/835589
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.debian.org/security/2018/dsa-4237
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6124: Type confusion in ReadableStreams in Blink in Google Chrome prior to 67.0.3396.62 allowed a…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-30T15:33:00
Summary
Type confusion in ReadableStreams in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6124 vulnerability.
References
- https://crbug.com/840320
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.debian.org/security/2018/dsa-4237
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6166: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6166 vulnerability.
References
- https://crbug.com/835554
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6126: A precision error in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-15T21:50:00
Summary
A precision error in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-6126 vulnerability.
References
- https://crbug.com/844457
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.exploit-db.com/exploits/45098/
- https://www.debian.org/security/2018/dsa-4237
- https://www.debian.org/security/2018/dsa-4220
- https://security.gentoo.org/glsa/201810-01
- https://access.redhat.com/errata/RHSA-2018:2113
- https://access.redhat.com/errata/RHSA-2018:2112
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041046
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104411
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6178: Eliding from the wrong side in an infobar in DevTools in Google Chrome prior to 68.0.3440.75…
Published: 2019-01-09T19:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Eliding from the wrong side in an infobar in DevTools in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to Hide Chrome Security UI via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-1021: Improper Restriction of Rendered UI Layers or Frames
CWE Description: The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6178 vulnerability.
References
- https://crbug.com/823194
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6139: Insufficient target checks on the chrome.debugger API in DevTools in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-16T15:02:00
Summary
Insufficient target checks on the chrome.debugger API in DevTools in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6139 vulnerability.
References
- https://crbug.com/805224
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.debian.org/security/2018/dsa-4237
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6147: Lack of secure text entry mode in Browser UI in Google Chrome on Mac prior to 67.0.3396.62…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-29T19:03:00
Summary
Lack of secure text entry mode in Browser UI in Google Chrome on Mac prior to 67.0.3396.62 allowed a local attacker to obtain potentially sensitive information from process memory via a local process.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-6147 vulnerability.
References
- https://crbug.com/818133
- https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html
- https://www.debian.org/security/2018/dsa-4237
- https://access.redhat.com/errata/RHSA-2018:1815
- http://www.securitytracker.com/id/1041014
- http://www.securityfocus.com/bid/104309
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6151: Bad cast in DevTools in Google Chrome on Win, Linux, Mac, Chrome OS prior to 66.0.3359.117…
Published: 2019-01-09T19:29:00 Last Modified: 2021-09-08T17:21:00
Summary
Bad cast in DevTools in Google Chrome on Win, Linux, Mac, Chrome OS prior to 66.0.3359.117 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6151 vulnerability.
References
- https://crbug.com/805905
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6169: Lack of timeout on extension install prompt in Extensions in Google Chrome prior to 68.0.3440.75…
Published: 2019-01-09T19:29:00 Last Modified: 2019-01-15T17:36:00
Summary
Lack of timeout on extension install prompt in Extensions in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to trigger installation of an unwanted extension via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6169 vulnerability.
References
- https://crbug.com/394518
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6162: Improper deserialization in WebGL in Google Chrome on Mac prior to 68.0.3440.75 allowed a remote…
Published: 2019-01-09T19:29:00 Last Modified: 2021-09-08T17:21:00
Summary
Improper deserialization in WebGL in Google Chrome on Mac prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-502: Deserialization of Untrusted Data
CWE Description: The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6162 vulnerability.
References
- https://crbug.com/804123
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6167: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6167 vulnerability.
References
- https://crbug.com/833143
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6172: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to…
Published: 2019-01-09T19:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6172 vulnerability.
References
- https://crbug.com/847242
- https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16885: A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and…
Published: 2019-01-03T16:29:00 Last Modified: 2019-08-06T17:15:00
Summary
A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing invalid memory address. This issue only affects kernel version 3.10.x as shipped with Red Hat Enterprise Linux 7.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-16885 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16885
- http://www.securityfocus.com/bid/106296
- https://access.redhat.com/errata/RHSA-2019:2043
- https://access.redhat.com/errata/RHSA-2019:2029
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16876: ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in…
Published: 2019-01-03T15:29:00 Last Modified: 2021-08-04T17:15:00
Summary
ansible before versions 2.5.14, 2.6.11, 2.7.5 is vulnerable to a information disclosure flaw in vvv+ mode with no_log on that can lead to leakage of sensible data.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16876 vulnerability.
References
- https://github.com/ansible/ansible/pull/49569
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16876
- https://access.redhat.com/errata/RHSA-2018:3838
- https://access.redhat.com/errata/RHSA-2018:3837
- https://access.redhat.com/errata/RHSA-2018:3836
- https://access.redhat.com/errata/RHSA-2018:3835
- http://www.securityfocus.com/bid/106225
- https://www.debian.org/security/2019/dsa-4396
- https://access.redhat.com/errata/RHSA-2019:0564
- https://access.redhat.com/errata/RHSA-2019:0590
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00077.html
- https://usn.ubuntu.com/4072-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-19134: In Artifex Ghostscript through 9.25, the setpattern operator did not properly validate certain…
Published: 2018-12-20T23:29:00 Last Modified: 2019-01-11T15:54:00
Summary
In Artifex Ghostscript through 9.25, the setpattern operator did not properly validate certain types. A specially crafted PostScript document could exploit this to crash Ghostscript or, possibly, execute arbitrary code in the context of the Ghostscript process. This is a type confusion issue because of failure to check whether the Implementation of a pattern dictionary was a structure type.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-19134 vulnerability.
References
- https://www.ghostscript.com/doc/9.26/News.htm
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://bugs.ghostscript.com/show_bug.cgi?id=700141
- https://access.redhat.com/errata/RHSA-2018:3834
- http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=693baf02152119af6e6afd30bb8ec76d14f84bbf
- http://www.securityfocus.com/bid/106278
- https://lists.debian.org/debian-lts-announce/2018/12/msg00019.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000877: libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0…
Published: 2018-12-20T17:29:00 Last Modified: 2019-11-06T01:15:00
Summary
libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar->lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000877 vulnerability.
References
- https://github.com/libarchive/libarchive/pull/1105/commits/021efa522ad729ff0f5806c4ce53e4a6cc1daa31
- https://github.com/libarchive/libarchive/pull/1105
- https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1794909
- https://lists.debian.org/debian-lts-announce/2018/12/msg00011.html
- https://www.debian.org/security/2018/dsa-4360
- http://www.securityfocus.com/bid/106324
- https://usn.ubuntu.com/3859-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVXA7PHINVT6DFF6PRLTDTVTXKDLVHNF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W645KCLWFDBDGFJHG57WOVXGE62QSIJI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBOCC2M6YGPZA6US43YK4INPSJZZHRTG/
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html
- https://access.redhat.com/errata/RHSA-2019:2298
- https://access.redhat.com/errata/RHSA-2019:3698
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000878: libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0…
Published: 2018-12-20T17:29:00 Last Modified: 2019-11-06T01:15:00
Summary
libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-416: Use After Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c that can result in Crash/DoS - it is unknown if RCE is possible. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000878 vulnerability.
References
- https://github.com/libarchive/libarchive/pull/1105/commits/bfcfe6f04ed20db2504db8a254d1f40a1d84eb28
- https://github.com/libarchive/libarchive/pull/1105
- https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1794909
- https://lists.debian.org/debian-lts-announce/2018/12/msg00011.html
- https://www.debian.org/security/2018/dsa-4360
- http://www.securityfocus.com/bid/106324
- https://usn.ubuntu.com/3859-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVXA7PHINVT6DFF6PRLTDTVTXKDLVHNF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W645KCLWFDBDGFJHG57WOVXGE62QSIJI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBOCC2M6YGPZA6US43YK4INPSJZZHRTG/
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00055.html
- https://access.redhat.com/errata/RHSA-2019:2298
- https://access.redhat.com/errata/RHSA-2019:3698
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00015.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-15127: LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write…
Published: 2018-12-19T16:29:00 Last Modified: 2020-10-23T13:15:00
Summary
LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-15127 vulnerability.
References
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00017.html
- https://access.redhat.com/errata/RHSA-2019:0059
- https://usn.ubuntu.com/3877-1/
- https://www.debian.org/security/2019/dsa-4383
- https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
- https://usn.ubuntu.com/4547-1/
- https://usn.ubuntu.com/4587-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16884: A flaw was found in the Linux kernel’s NFS41+ subsystem. NFS41+ shares mounted in different…
Published: 2018-12-18T22:29:00 Last Modified: 2021-07-15T19:16:00
Summary
A flaw was found in the Linux kernel’s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 8.5
- Exploitability Score: 5.1
- CVSS: 6.7
- CVSS Vector: AV:A/AC:L/Au:S/C:P/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2018-16884 vulnerability.
References
- https://patchwork.kernel.org/patch/10733769/
- https://patchwork.kernel.org/cover/10733767/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16884
- http://www.securityfocus.com/bid/106253
- https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/3932-1/
- https://support.f5.com/csp/article/K21430012
- https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
- https://usn.ubuntu.com/3981-1/
- https://usn.ubuntu.com/3980-1/
- https://usn.ubuntu.com/3980-2/
- https://usn.ubuntu.com/3981-2/
- https://access.redhat.com/errata/RHSA-2019:1891
- https://access.redhat.com/errata/RHSA-2019:1873
- https://access.redhat.com/errata/RHSA-2019:2696
- https://access.redhat.com/errata/RHSA-2019:2730
- https://access.redhat.com/errata/RHSA-2019:3517
- https://access.redhat.com/errata/RHSA-2019:3309
- https://access.redhat.com/errata/RHSA-2020:0204
- https://www.oracle.com/security-alerts/cpuApr2021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-19039: Grafana before 4.6.5 and 5.x before 5.3.3 allows remote authenticated users to read arbitrary…
Published: 2018-12-13T19:29:00 Last Modified: 2020-10-04T18:15:00
Summary
Grafana before 4.6.5 and 5.x before 5.3.3 allows remote authenticated users to read arbitrary files by leveraging Editor or Admin permissions.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-19039 vulnerability.
References
- https://www.percona.com/blog/2018/11/20/how-cve-2018-19039-affects-percona-monitoring-and-management/
- https://community.grafana.com/t/grafana-5-3-3-and-4-6-5-security-update/11961
- http://www.securityfocus.com/bid/105994
- https://access.redhat.com/errata/RHSA-2019:0747
- https://security.netapp.com/advisory/ntap-20190416-0004/
- https://access.redhat.com/errata/RHSA-2019:0911
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00009.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18397: The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for…
Published: 2018-12-12T10:29:00 Last Modified: 2020-08-24T17:37:00
Summary
The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.
Common Weakness Enumeration (CWE): CWE-863: Incorrect Authorization
CWE Description: The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-18397 vulnerability.
References
- https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1700
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1
- https://access.redhat.com/errata/RHSA-2019:0202
- https://access.redhat.com/errata/RHSA-2019:0163
- https://access.redhat.com/errata/RHSA-2019:0324
- https://usn.ubuntu.com/3901-2/
- https://usn.ubuntu.com/3901-1/
- https://usn.ubuntu.com/3903-2/
- https://usn.ubuntu.com/3903-1/
- https://access.redhat.com/errata/RHSA-2019:0831
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18342: Execution of user supplied Javascript during object deserialization can update object length…
Published: 2018-12-11T16:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Execution of user supplied Javascript during object deserialization can update object length leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18342 vulnerability.
References
- https://crbug.com/906313
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18349: Remote frame navigations was incorrectly permitted to local resources in Blink in Google Chrome…
Published: 2018-12-11T16:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Remote frame navigations was incorrectly permitted to local resources in Blink in Google Chrome prior to 71.0.3578.80 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18349 vulnerability.
References
- https://crbug.com/894399
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18352: Service works could inappropriately gain access to cross origin audio in Media in Google Chrome…
Published: 2018-12-11T16:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Service works could inappropriately gain access to cross origin audio in Media in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass same origin policy for audio content via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18352 vulnerability.
References
- https://crbug.com/849942
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17480: Execution of user supplied Javascript during array deserialization leading to an out of bounds…
Published: 2018-12-11T16:29:00 Last Modified: 2019-08-17T21:15:00
Summary
Execution of user supplied Javascript during array deserialization leading to an out of bounds write in V8 in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17480 vulnerability.
References
- https://crbug.com/905940
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18356: An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to…
Published: 2018-12-11T16:29:00 Last Modified: 2020-08-24T17:37:00
Summary
An integer overflow in path handling lead to a use after free in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18356 vulnerability.
References
- https://crbug.com/883666
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://www.debian.org/security/2019/dsa-4391
- https://lists.debian.org/debian-lts-announce/2019/02/msg00023.html
- https://www.debian.org/security/2019/dsa-4392
- https://lists.debian.org/debian-lts-announce/2019/02/msg00024.html
- https://access.redhat.com/errata/RHSA-2019:0374
- https://access.redhat.com/errata/RHSA-2019:0373
- https://usn.ubuntu.com/3897-1/
- https://usn.ubuntu.com/3896-1/
- https://security.gentoo.org/glsa/201903-04
- https://security.gentoo.org/glsa/201904-07
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html
- https://access.redhat.com/errata/RHSA-2019:1144
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18345: Incorrect handling of blob URLS in Site Isolation in Google Chrome prior to 71.0.3578.80 allowed…
Published: 2018-12-11T16:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect handling of blob URLS in Site Isolation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker who had compromised the renderer process to bypass site isolation protections via a crafted HTML page.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18345 vulnerability.
References
- https://crbug.com/886976
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18335: Heap buffer overflow in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to…
Published: 2018-12-11T16:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Heap buffer overflow in Skia in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18335 vulnerability.
References
- https://crbug.com/895362
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201904-07
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.html
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18358: Lack of special casing of localhost in WPAD files in Google Chrome prior to 71.0.3578.80 allowed…
Published: 2018-12-11T16:29:00 Last Modified: 2019-08-17T21:15:00
Summary
Lack of special casing of localhost in WPAD files in Google Chrome prior to 71.0.3578.80 allowed an attacker on the local network segment to proxy resources on localhost via a crafted WPAD file.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.9
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2018-18358 vulnerability.
References
- https://crbug.com/899126
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18350: Incorrect handling of CSP enforcement during navigations in Blink in Google Chrome prior to…
Published: 2018-12-11T16:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect handling of CSP enforcement during navigations in Blink in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass content security policy via a crafted HTML page.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18350 vulnerability.
References
- https://crbug.com/799747
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18344: Inappropriate allowance of the setDownloadBehavior devtools protocol feature in Extensions in…
Published: 2018-12-11T16:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Inappropriate allowance of the setDownloadBehavior devtools protocol feature in Extensions in Google Chrome prior to 71.0.3578.80 allowed a remote attacker with control of an installed extension to access files on the local file system via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18344 vulnerability.
References
- https://crbug.com/866426
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18353: Failure to dismiss http auth dialogs on navigation in Network Authentication in Google Chrome on…
Published: 2018-12-11T16:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Failure to dismiss http auth dialogs on navigation in Network Authentication in Google Chrome on Android prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of an auto dialog via a crafted HTML page.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18353 vulnerability.
References
- https://crbug.com/884179
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18351: Lack of proper validation of ancestor frames site when sending lax cookies in Navigation in…
Published: 2018-12-11T16:29:00 Last Modified: 2019-08-17T21:15:00
Summary
Lack of proper validation of ancestor frames site when sending lax cookies in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to bypass SameSite cookie policy via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18351 vulnerability.
References
- https://crbug.com/833847
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18354: Insufficient validate of external protocols in Shell Integration in Google Chrome on Windows…
Published: 2018-12-11T16:29:00 Last Modified: 2019-08-17T21:15:00
Summary
Insufficient validate of external protocols in Shell Integration in Google Chrome on Windows prior to 71.0.3578.80 allowed a remote attacker to launch external programs via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18354 vulnerability.
References
- https://crbug.com/889459
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18357: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to…
Published: 2018-12-11T16:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18357 vulnerability.
References
- https://crbug.com/895207
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18355: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to…
Published: 2018-12-11T16:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18355 vulnerability.
References
- https://crbug.com/896717
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18348: Incorrect handling of bidirectional domain names with RTL characters in Omnibox in Google Chrome…
Published: 2018-12-11T16:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Incorrect handling of bidirectional domain names with RTL characters in Omnibox in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18348 vulnerability.
References
- https://crbug.com/881659
- https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4352
- https://access.redhat.com/errata/RHSA-2018:3803
- http://www.securityfocus.com/bid/106084
- https://security.gentoo.org/glsa/201908-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5801: An error within the “LibRaw::unpack()” function (src/libraw_cxx.cpp) in LibRaw versions prior to…
Published: 2018-12-07T22:29:00 Last Modified: 2019-03-29T14:21:00
Summary
An error within the “LibRaw::unpack()” function (src/libraw_cxx.cpp) in LibRaw versions prior to 0.18.7 can be exploited to trigger a NULL pointer dereference.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5801 vulnerability.
References
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/
- https://secuniaresearch.flexerasoftware.com/advisories/79000/
- https://github.com/LibRaw/LibRaw/commit/0df5490b985c419de008d32168650bff17128914
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://usn.ubuntu.com/3615-1/
- https://access.redhat.com/errata/RHSA-2018:3065
- https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5805: A boundary error within the “quicktake_100_load_raw()” function (internal/dcraw_common.cpp) in…
Published: 2018-12-07T22:29:00 Last Modified: 2020-08-24T17:37:00
Summary
A boundary error within the “quicktake_100_load_raw()” function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to cause a stack-based buffer overflow and subsequently cause a crash.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5805 vulnerability.
References
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/
- https://secuniaresearch.flexerasoftware.com/advisories/81000/
- https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://access.redhat.com/errata/RHSA-2018:3065
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5806: An error within the “leaf_hdr_load_raw()” function (internal/dcraw_common.cpp) in LibRaw versions…
Published: 2018-12-07T22:29:00 Last Modified: 2018-12-28T21:29:00
Summary
An error within the “leaf_hdr_load_raw()” function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.8 can be exploited to trigger a NULL pointer dereference.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5806 vulnerability.
References
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-3/
- https://secuniaresearch.flexerasoftware.com/advisories/81000/
- https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://access.redhat.com/errata/RHSA-2018:3065
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5802: An error within the “kodak_radc_load_raw()” function (internal/dcraw_common.cpp) related to the…
Published: 2018-12-07T22:29:00 Last Modified: 2020-11-10T19:31:00
Summary
An error within the “kodak_radc_load_raw()” function (internal/dcraw_common.cpp) related to the “buf” variable in LibRaw versions prior to 0.18.7 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5802 vulnerability.
References
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/
- https://secuniaresearch.flexerasoftware.com/advisories/79000/
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://usn.ubuntu.com/3615-1/
- https://access.redhat.com/errata/RHSA-2018:3065
- https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html
- https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5800: An off-by-one error within the “LibRaw::kodak_ycbcr_load_raw()” function…
Published: 2018-12-07T22:29:00 Last Modified: 2020-11-20T15:48:00
Summary
An off-by-one error within the “LibRaw::kodak_ycbcr_load_raw()” function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.7 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.
Common Weakness Enumeration (CWE): CWE-193: Off-by-one Error
CWE Description: A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5800 vulnerability.
References
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-1/
- https://secuniaresearch.flexerasoftware.com/advisories/79000/
- https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt
- https://usn.ubuntu.com/3615-1/
- https://access.redhat.com/errata/RHSA-2018:3065
- http://www.securityfocus.com/bid/104663
- https://lists.debian.org/debian-lts-announce/2019/03/msg00036.html
- https://github.com/LibRaw/LibRaw/commit/8682ad204392b914ab1cc6ebcca9c27c19c1a4b4
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18313: Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers…
Published: 2018-12-07T21:29:00 Last Modified: 2020-07-15T03:15:00
Summary
Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18313 vulnerability.
References
- https://www.debian.org/security/2018/dsa-4347
- https://usn.ubuntu.com/3834-2/
- https://rt.perl.org/Ticket/Display.html?id=133192
- https://metacpan.org/changes/release/SHAY/perl-5.26.3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
- https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62
- https://bugzilla.redhat.com/show_bug.cgi?id=1646738
- http://www.securitytracker.com/id/1042181
- https://usn.ubuntu.com/3834-1/
- https://access.redhat.com/errata/RHSA-2019:0010
- https://access.redhat.com/errata/RHSA-2019:0001
- https://security.netapp.com/advisory/ntap-20190221-0003/
- https://support.apple.com/kb/HT209600
- https://seclists.org/bugtraq/2019/Mar/42
- http://seclists.org/fulldisclosure/2019/Mar/49
- https://security.gentoo.org/glsa/201909-01
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18314: Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid…
Published: 2018-12-07T21:29:00 Last Modified: 2020-07-15T03:15:00
Summary
Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18314 vulnerability.
References
- https://www.debian.org/security/2018/dsa-4347
- https://rt.perl.org/Ticket/Display.html?id=131649
- https://metacpan.org/changes/release/SHAY/perl-5.26.3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
- https://github.com/Perl/perl5/commit/19a498a461d7c81ae3507c450953d1148efecf4f
- https://bugzilla.redhat.com/show_bug.cgi?id=1646751
- http://www.securitytracker.com/id/1042181
- https://usn.ubuntu.com/3834-1/
- http://www.securityfocus.com/bid/106145
- https://access.redhat.com/errata/RHSA-2019:0010
- https://access.redhat.com/errata/RHSA-2019:0001
- https://security.netapp.com/advisory/ntap-20190221-0003/
- https://security.gentoo.org/glsa/201909-01
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18311: Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular…
Published: 2018-12-07T21:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18311 vulnerability.
References
- https://www.debian.org/security/2018/dsa-4347
- https://usn.ubuntu.com/3834-2/
- https://rt.perl.org/Ticket/Display.html?id=133204
- https://metacpan.org/changes/release/SHAY/perl-5.28.1
- https://metacpan.org/changes/release/SHAY/perl-5.26.3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html
- https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be
- https://bugzilla.redhat.com/show_bug.cgi?id=1646730
- http://www.securitytracker.com/id/1042181
- https://usn.ubuntu.com/3834-1/
- http://www.securityfocus.com/bid/106145
- https://access.redhat.com/errata/RHSA-2019:0010
- https://access.redhat.com/errata/RHSA-2019:0001
- https://access.redhat.com/errata/RHSA-2019:0109
- https://security.netapp.com/advisory/ntap-20190221-0003/
- https://support.apple.com/kb/HT209600
- https://seclists.org/bugtraq/2019/Mar/42
- http://seclists.org/fulldisclosure/2019/Mar/49
- https://kc.mcafee.com/corporate/index?page=content&id=SB10278
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:1790
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://access.redhat.com/errata/RHSA-2019:1942
- https://access.redhat.com/errata/RHSA-2019:2400
- https://security.gentoo.org/glsa/201909-01
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This…
Published: 2018-12-06T14:29:00 Last Modified: 2020-10-15T13:28:00
Summary
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-9568 vulnerability.
References
- https://source.android.com/security/bulletin/2018-12-01
- https://usn.ubuntu.com/3880-2/
- https://usn.ubuntu.com/3880-1/
- https://access.redhat.com/errata/RHSA-2019:0514
- https://access.redhat.com/errata/RHSA-2019:0512
- https://access.redhat.com/errata/RHSA-2019:2696
- https://access.redhat.com/errata/RHSA-2019:2730
- https://access.redhat.com/errata/RHSA-2019:2736
- https://access.redhat.com/errata/RHSA-2019:3967
- https://access.redhat.com/errata/RHSA-2019:4056
- https://access.redhat.com/errata/RHSA-2019:4159
- https://access.redhat.com/errata/RHSA-2019:4164
- https://access.redhat.com/errata/RHSA-2019:4255
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18312: Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular…
Published: 2018-12-05T22:29:00 Last Modified: 2020-07-15T03:15:00
Summary
Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18312 vulnerability.
References
- https://www.debian.org/security/2018/dsa-4347
- https://rt.perl.org/Public/Bug/Display.html?id=133423
- https://metacpan.org/changes/release/SHAY/perl-5.28.1
- https://metacpan.org/changes/release/SHAY/perl-5.26.3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/
- https://bugzilla.redhat.com/show_bug.cgi?id=1646734
- http://www.securitytracker.com/id/1042181
- https://usn.ubuntu.com/3834-1/
- http://www.securityfocus.com/bid/106179
- https://access.redhat.com/errata/RHSA-2019:0010
- https://access.redhat.com/errata/RHSA-2019:0001
- https://security.netapp.com/advisory/ntap-20190221-0003/
- https://security.gentoo.org/glsa/201909-01
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6152: The implementation of the Page.downloadBehavior backend unconditionally marked downloaded files…
Published: 2018-12-04T17:29:00 Last Modified: 2019-02-05T20:39:00
Summary
The implementation of the Page.downloadBehavior backend unconditionally marked downloaded files as safe, regardless of file type in Google Chrome prior to 66.0.3359.117 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page and user interaction.
Common Weakness Enumeration (CWE): CWE-434: Unrestricted Upload of File with Dangerous Type
CWE Description: This can be resultant from client-side enforcement (CWE-602); some products will include web script in web clients to check the filename, without verifying on the server side.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6152 vulnerability.
References
- https://crbug.com/805445
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4256
- https://security.gentoo.org/glsa/201808-01
- https://access.redhat.com/errata/RHSA-2018:2282
- http://www.securityfocus.com/bid/104887
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16863: It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly…
Published: 2018-12-03T17:29:00 Last Modified: 2019-10-09T23:36:00
Summary
It was found that RHSA-2018:2918 did not fully fix CVE-2018-16509. An attacker could possibly exploit another variant of the flaw and bypass the -dSAFER protection to, for example, execute arbitrary shell commands via a specially crafted PostScript document. This only affects ghostscript 9.07 as shipped with Red Hat Enterprise Linux 7.
Common Weakness Enumeration (CWE): CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
CWE Description: The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16863 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16863
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=78911a01b67d
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5516c614dc33
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=520bb0ea7519
- https://access.redhat.com/errata/RHSA-2018:3761
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-15978: Flash Player versions 31.0.0.122 and earlier have an out-of-bounds read vulnerability. Successful…
Published: 2018-11-29T20:29:00 Last Modified: 2018-12-28T20:01:00
Summary
Flash Player versions 31.0.0.122 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-15978 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-39.html
- https://access.redhat.com/errata/RHSA-2018:3618
- http://www.securitytracker.com/id/1042098
- http://www.securityfocus.com/bid/105909
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-15981: Flash Player versions 31.0.0.148 and earlier have a type confusion vulnerability. Successful…
Published: 2018-11-29T20:29:00 Last Modified: 2018-12-28T20:00:00
Summary
Flash Player versions 31.0.0.148 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-15981 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-44.html
- https://access.redhat.com/errata/RHSA-2018:3644
- http://www.securitytracker.com/id/1042151
- http://www.securityfocus.com/bid/105964
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-8786: FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based…
Published: 2018-11-29T18:29:00 Last Modified: 2020-09-29T02:09:00
Summary
FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution.
Common Weakness Enumeration (CWE): CWE-681: Incorrect Conversion between Numeric Types
CWE Description: When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-8786 vulnerability.
References
- https://github.com/FreeRDP/FreeRDP/commit/445a5a42c500ceb80f8fa7f2c11f3682538033f3
- https://usn.ubuntu.com/3845-1/
- http://www.securityfocus.com/bid/106938
- https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://access.redhat.com/errata/RHSA-2019:0697
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YVJKO2DR5EY4C4QZOP7SNNBEW2JW6FHX/
- https://usn.ubuntu.com/3845-2/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-8787: FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer…
Published: 2018-11-29T18:29:00 Last Modified: 2020-09-29T02:01:00
Summary
FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-8787 vulnerability.
References
- https://github.com/FreeRDP/FreeRDP/commit/09b9d4f1994a674c4ec85b4947aa656eda1aed8a
- https://usn.ubuntu.com/3845-1/
- http://www.securityfocus.com/bid/106938
- https://lists.debian.org/debian-lts-announce/2019/02/msg00015.html
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://access.redhat.com/errata/RHSA-2019:0697
- https://usn.ubuntu.com/3845-2/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16862: A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an…
Published: 2018-11-26T19:29:00 Last Modified: 2019-04-01T21:29:00
Summary
A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-16862 vulnerability.
References
- https://seclists.org/oss-sec/2018/q4/169
- https://lore.kernel.org/patchwork/patch/1011367/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16862
- http://www.securityfocus.com/bid/106009
- https://usn.ubuntu.com/3879-2/
- https://usn.ubuntu.com/3879-1/
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14646: The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in…
Published: 2018-11-26T19:29:00 Last Modified: 2019-10-09T23:35:00
Summary
The Linux kernel before 4.15-rc8 was found to be vulnerable to a NULL pointer dereference bug in the __netlink_ns_capable() function in the net/netlink/af_netlink.c file. A local attacker could exploit this when a net namespace with a netnsid is assigned to cause a kernel panic and a denial of service.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-14646 vulnerability.
References
- https://marc.info/?l=linux-netdev&m=151500466401174&w=2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f428fe4a04cc339166c8bbd489789760de3a0cee
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14646
- https://access.redhat.com/errata/RHSA-2018:3666
- https://access.redhat.com/errata/RHSA-2018:3651
- https://access.redhat.com/errata/RHSA-2018:3843
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-19476: psi/zicc.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access…
Published: 2018-11-23T05:29:00 Last Modified: 2019-04-25T13:07:00
Summary
psi/zicc.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a setcolorspace type confusion.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-19476 vulnerability.
References
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
- https://bugs.ghostscript.com/show_bug.cgi?id=700169
- http://git.ghostscript.com/?p=ghostpdl.git;h=434753adbe8be5534bfb9b7d91746023e8073d16
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=67d760ab775dae4efe803b5944b0439aa3c0b04a
- https://www.debian.org/security/2018/dsa-4346
- https://lists.debian.org/debian-lts-announce/2018/11/msg00036.html
- https://usn.ubuntu.com/3831-1/
- http://www.securityfocus.com/bid/106154
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://access.redhat.com/errata/RHSA-2019:0229
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-19477: psi/zfjbig2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended…
Published: 2018-11-23T05:29:00 Last Modified: 2019-04-25T13:07:00
Summary
psi/zfjbig2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a JBIG2Decode type confusion.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-19477 vulnerability.
References
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
- https://bugs.ghostscript.com/show_bug.cgi?id=700168
- http://git.ghostscript.com/?p=ghostpdl.git;h=606a22e77e7f081781e99e44644cd0119f559e03
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ef252e7dc214bcbd9a2539216aab9202848602bb
- https://www.debian.org/security/2018/dsa-4346
- https://lists.debian.org/debian-lts-announce/2018/11/msg00036.html
- https://usn.ubuntu.com/3831-1/
- http://www.securityfocus.com/bid/106154
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://access.redhat.com/errata/RHSA-2019:0229
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-19475: psi/zdevice2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended…
Published: 2018-11-23T05:29:00 Last Modified: 2019-10-03T00:03:00
Summary
psi/zdevice2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because available stack space is not checked when the device remains the same.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-19475 vulnerability.
References
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
- https://bugs.ghostscript.com/show_bug.cgi?id=700153
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=aeea342904978c9fe17d85f4906a0f6fcce2d315
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3005fcb9bb160af199e761e03bc70a9f249a987e
- https://www.debian.org/security/2018/dsa-4346
- https://lists.debian.org/debian-lts-announce/2018/11/msg00036.html
- https://usn.ubuntu.com/3831-1/
- http://www.securityfocus.com/bid/106154
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://access.redhat.com/errata/RHSA-2019:0229
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-19409: An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked…
Published: 2018-11-21T16:29:00 Last Modified: 2019-10-03T00:03:00
Summary
An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-19409 vulnerability.
References
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
- https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=661e8d8fb8248c38d67958beda32f3a5876d0c3f
- https://bugs.ghostscript.com/show_bug.cgi?id=700176
- http://www.securityfocus.com/bid/105990
- https://security.gentoo.org/glsa/201811-12
- https://www.debian.org/security/2018/dsa-4346
- https://lists.debian.org/debian-lts-announce/2018/11/msg00036.html
- https://usn.ubuntu.com/3831-1/
- https://access.redhat.com/errata/RHSA-2018:3834
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16395: An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x…
Published: 2018-11-16T18:29:00 Last Modified: 2019-10-03T00:03:00
Summary
An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16395 vulnerability.
References
- https://www.ruby-lang.org/en/news/2018/11/06/ruby-2-6-0-preview3-released/
- https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-5-2-released/
- https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-4-5-released/
- https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-3-8-released/
- https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/
- https://lists.debian.org/debian-lts-announce/2018/10/msg00020.html
- https://hackerone.com/reports/387250
- https://www.debian.org/security/2018/dsa-4332
- https://usn.ubuntu.com/3808-1/
- http://www.securitytracker.com/id/1042105
- https://access.redhat.com/errata/RHSA-2018:3738
- https://access.redhat.com/errata/RHSA-2018:3731
- https://access.redhat.com/errata/RHSA-2018:3730
- https://access.redhat.com/errata/RHSA-2018:3729
- https://security.netapp.com/advisory/ntap-20190221-0002/
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:1948
- https://access.redhat.com/errata/RHSA-2019:2565
- https://www.oracle.com/security-alerts/cpujan2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16396: An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x…
Published: 2018-11-16T18:29:00 Last Modified: 2019-10-03T00:03:00
Summary
An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16396 vulnerability.
References
- https://www.ruby-lang.org/en/news/2018/11/06/ruby-2-6-0-preview3-released/
- https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-5-2-released/
- https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-4-5-released/
- https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-3-8-released/
- https://www.ruby-lang.org/en/news/2018/10/17/not-propagated-taint-flag-in-some-formats-of-pack-cve-2018-16396/
- https://lists.debian.org/debian-lts-announce/2018/10/msg00020.html
- https://hackerone.com/reports/385070
- https://www.debian.org/security/2018/dsa-4332
- https://usn.ubuntu.com/3808-1/
- http://www.securitytracker.com/id/1042106
- https://access.redhat.com/errata/RHSA-2018:3731
- https://access.redhat.com/errata/RHSA-2018:3730
- https://access.redhat.com/errata/RHSA-2018:3729
- https://security.netapp.com/advisory/ntap-20190221-0002/
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:2028
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5407: Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software…
Published: 2018-11-15T21:29:00 Last Modified: 2020-09-18T16:58:00
Summary
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on ‘port contention’.
Common Weakness Enumeration (CWE): CWE-203: Observable Discrepancy
CWE Description: The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-5407 vulnerability.
References
- https://github.com/bbbrumley/portsmash
- https://eprint.iacr.org/2018/1060.pdf
- https://www.exploit-db.com/exploits/45785/
- http://www.securityfocus.com/bid/105897
- https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html
- https://security.netapp.com/advisory/ntap-20181126-0001/
- https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
- https://www.debian.org/security/2018/dsa-4348
- https://usn.ubuntu.com/3840-1/
- https://www.debian.org/security/2018/dsa-4355
- https://www.tenable.com/security/tns-2018-17
- https://www.tenable.com/security/tns-2018-16
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://security.gentoo.org/glsa/201903-10
- https://access.redhat.com/errata/RHSA-2019:0483
- https://access.redhat.com/errata/RHSA-2019:0652
- https://access.redhat.com/errata/RHSA-2019:0651
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://access.redhat.com/errata/RHSA-2019:2125
- https://support.f5.com/csp/article/K49711130?utm_source=f5support&utm_medium=RSS
- https://access.redhat.com/errata/RHSA-2019:3929
- https://access.redhat.com/errata/RHSA-2019:3935
- https://access.redhat.com/errata/RHSA-2019:3933
- https://access.redhat.com/errata/RHSA-2019:3931
- https://access.redhat.com/errata/RHSA-2019:3932
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17465: Incorrect implementation of object trimming in V8 in Google Chrome prior to 70.0.3538.67 allowed…
Published: 2018-11-14T15:29:00 Last Modified: 2018-12-19T20:34:00
Summary
Incorrect implementation of object trimming in V8 in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17465 vulnerability.
References
- https://crbug.com/870226
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4330
- https://access.redhat.com/errata/RHSA-2018:3004
- http://www.securityfocus.com/bid/105666
- https://security.gentoo.org/glsa/201811-10
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17475: Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed…
Published: 2018-11-14T15:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17475 vulnerability.
References
- https://crbug.com/852634
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4330
- https://access.redhat.com/errata/RHSA-2018:3004
- http://www.securityfocus.com/bid/105666
- https://security.gentoo.org/glsa/201811-10
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17467: Insufficiently quick clearing of stale rendered content in Navigation in Google Chrome prior to…
Published: 2018-11-14T15:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Insufficiently quick clearing of stale rendered content in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-459: Incomplete Cleanup
CWE Description: The software does not properly “clean up” and remove temporary or supporting resources after they have been used.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17467 vulnerability.
References
- https://crbug.com/844881
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4330
- https://access.redhat.com/errata/RHSA-2018:3004
- http://www.securityfocus.com/bid/105666
- https://security.gentoo.org/glsa/201811-10
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17471: Incorrect dialog placement in WebContents in Google Chrome prior to 70.0.3538.67 allowed a remote…
Published: 2018-11-14T15:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Incorrect dialog placement in WebContents in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17471 vulnerability.
References
- https://crbug.com/873080
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4330
- https://access.redhat.com/errata/RHSA-2018:3004
- http://www.securityfocus.com/bid/105666
- https://security.gentoo.org/glsa/201811-10
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17466: Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote…
Published: 2018-11-14T15:29:00 Last Modified: 2019-03-05T15:57:00
Summary
Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17466 vulnerability.
References
- https://crbug.com/880906
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4330
- https://access.redhat.com/errata/RHSA-2018:3004
- http://www.securityfocus.com/bid/105666
- https://security.gentoo.org/glsa/201811-10
- https://usn.ubuntu.com/3844-1/
- http://www.securityfocus.com/bid/106168
- https://www.debian.org/security/2018/dsa-4354
- https://lists.debian.org/debian-lts-announce/2018/12/msg00002.html
- https://access.redhat.com/errata/RHSA-2018:3833
- https://access.redhat.com/errata/RHSA-2018:3831
- https://www.debian.org/security/2019/dsa-4362
- https://usn.ubuntu.com/3868-1/
- https://access.redhat.com/errata/RHSA-2019:0160
- https://access.redhat.com/errata/RHSA-2019:0159
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17477: Incorrect dialog placement in Extensions in Google Chrome prior to 70.0.3538.67 allowed a remote…
Published: 2018-11-14T15:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Incorrect dialog placement in Extensions in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of extension popups via a crafted HTML page.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17477 vulnerability.
References
- https://crbug.com/863703
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4330
- https://access.redhat.com/errata/RHSA-2018:3004
- http://www.securityfocus.com/bid/105666
- https://security.gentoo.org/glsa/201811-10
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17468: Incorrect handling of timer information during navigation in Blink in Google Chrome prior to…
Published: 2018-11-14T15:29:00 Last Modified: 2018-12-19T20:59:00
Summary
Incorrect handling of timer information during navigation in Blink in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obtain cross origin URLs via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17468 vulnerability.
References
- https://crbug.com/876822
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4330
- https://access.redhat.com/errata/RHSA-2018:3004
- http://www.securityfocus.com/bid/105666
- https://security.gentoo.org/glsa/201811-10
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17476: Incorrect dialog placement in Cast UI in Google Chrome prior to 70.0.3538.67 allowed a remote…
Published: 2018-11-14T15:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Incorrect dialog placement in Cast UI in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17476 vulnerability.
References
- https://crbug.com/812769
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4330
- https://access.redhat.com/errata/RHSA-2018:3004
- http://www.securityfocus.com/bid/105666
- https://security.gentoo.org/glsa/201811-10
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17472: Incorrect handling of googlechrome:// URL scheme on iOS in Intents in Google Chrome prior to…
Published: 2018-11-14T15:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect handling of googlechrome:// URL scheme on iOS in Intents in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to escape the
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17472 vulnerability.
References
- https://crbug.com/822518
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- http://www.securityfocus.com/bid/105666
- https://security.gentoo.org/glsa/201811-10
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17474: Use after free in HTMLImportsController in Blink in Google Chrome prior to 70.0.3538.67 allowed a…
Published: 2018-11-14T15:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Use after free in HTMLImportsController in Blink in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17474 vulnerability.
References
- https://crbug.com/843151
- https://chromereleases.googleblog.com/2018/10/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4330
- https://access.redhat.com/errata/RHSA-2018:3004
- http://www.securityfocus.com/bid/105666
- https://security.gentoo.org/glsa/201811-10
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6078: Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 65.0.3325.146…
Published: 2018-11-14T15:29:00 Last Modified: 2018-12-26T14:23:00
Summary
Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6078 vulnerability.
References
- https://crbug.com/793628
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6060: Use after free in WebAudio in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to…
Published: 2018-11-14T15:29:00 Last Modified: 2018-12-21T20:54:00
Summary
Use after free in WebAudio in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6060 vulnerability.
References
- https://crbug.com/780919
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6064: Type Confusion in the implementation of defineGetter in V8 in Google Chrome prior to…
Published: 2018-11-14T15:29:00 Last Modified: 2019-05-02T15:50:00
Summary
Type Confusion in the implementation of defineGetter in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-6064 vulnerability.
References
- https://crbug.com/798644
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.exploit-db.com/exploits/44394/
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
- https://www.zerodayinitiative.com/advisories/ZDI-19-368/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6077: Displacement map filters being applied to cross-origin images in Blink SVG rendering in Google…
Published: 2018-11-14T15:29:00 Last Modified: 2018-12-21T20:42:00
Summary
Displacement map filters being applied to cross-origin images in Blink SVG rendering in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6077 vulnerability.
References
- https://crbug.com/778506
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6062: Heap overflow write in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to…
Published: 2018-11-14T15:29:00 Last Modified: 2018-12-21T20:35:00
Summary
Heap overflow write in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6062 vulnerability.
References
- https://crbug.com/780104
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6063: Incorrect use of mojo::WrapSharedMemoryHandle in Mojo in Google Chrome prior to 65.0.3325.146…
Published: 2018-11-14T15:29:00 Last Modified: 2018-12-26T14:12:00
Summary
Incorrect use of mojo::WrapSharedMemoryHandle in Mojo in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6063 vulnerability.
References
- https://crbug.com/792900
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6065: Integer overflow in computing the required allocation size when instantiating a new javascript…
Published: 2018-11-14T15:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Integer overflow in computing the required allocation size when instantiating a new javascript object in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-6065 vulnerability.
- Google Chrome V8 - Object Allocation Size Integer Overflow by Google Security Research at 2018-05-04
References
- https://crbug.com/808192
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.exploit-db.com/exploits/44584/
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
- https://www.zerodayinitiative.com/advisories/ZDI-19-367/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6061: A race in the handling of SharedArrayBuffers in WebAssembly in Google Chrome prior to…
Published: 2018-11-14T15:29:00 Last Modified: 2018-12-19T20:26:00
Summary
A race in the handling of SharedArrayBuffers in WebAssembly in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6061 vulnerability.
References
- https://crbug.com/794091
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6057: Lack of special casing of Android ashmem in Google Chrome prior to 65.0.3325.146 allowed a remote…
Published: 2018-11-14T15:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Lack of special casing of Android ashmem in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to bypass inter-process read only guarantees via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6057 vulnerability.
References
- https://crbug.com/789959
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6080: Lack of access control checks in Instrumentation in Google Chrome prior to 65.0.3325.146 allowed…
Published: 2018-11-14T15:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Lack of access control checks in Instrumentation in Google Chrome prior to 65.0.3325.146 allowed a remote attacker who had compromised the renderer process to obtain memory metadata from privileged processes .
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6080 vulnerability.
References
- https://crbug.com/792028
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6067: Incorrect IPC serialization in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote…
Published: 2018-11-14T15:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect IPC serialization in Skia in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6067 vulnerability.
References
- https://crbug.com/779428
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6079: Inappropriate sharing of TEXTURE_2D_ARRAY/TEXTURE_3D data between tabs in WebGL in Google Chrome…
Published: 2018-11-14T15:29:00 Last Modified: 2018-12-26T14:37:00
Summary
Inappropriate sharing of TEXTURE_2D_ARRAY/TEXTURE_3D data between tabs in WebGL in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6079 vulnerability.
References
- https://crbug.com/788448
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6083: Failure to disallow PWA installation from CSP sandboxed pages in AppManifest in Google Chrome…
Published: 2018-11-14T15:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Failure to disallow PWA installation from CSP sandboxed pages in AppManifest in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to access privileged APIs via a crafted HTML page.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6083 vulnerability.
References
- https://crbug.com/771709
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6070: Lack of CSP enforcement on WebUI pages in Bink in Google Chrome prior to 65.0.3325.146 allowed an…
Published: 2018-11-14T15:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Lack of CSP enforcement on WebUI pages in Bink in Google Chrome prior to 65.0.3325.146 allowed an attacker who convinced a user to install a malicious extension to bypass content security policy via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6070 vulnerability.
References
- https://crbug.com/668645
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6082: Including port 22 in the list of allowed FTP ports in Networking in Google Chrome prior to…
Published: 2018-11-14T15:29:00 Last Modified: 2018-12-27T18:39:00
Summary
Including port 22 in the list of allowed FTP ports in Networking in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially enumerate internal host services via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6082 vulnerability.
References
- https://crbug.com/767354
- https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4182
- https://access.redhat.com/errata/RHSA-2018:0484
- http://www.securityfocus.com/bid/103297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16850: postgresql before versions 11.1, 10.6 is vulnerable to a to SQL injection in pg_upgrade and…
Published: 2018-11-13T15:29:00 Last Modified: 2019-10-09T23:36:00
Summary
postgresql before versions 11.1, 10.6 is vulnerable to a to SQL injection in pg_upgrade and pg_dump via CREATE TRIGGER … REFERENCING. Using a purpose-crafted trigger definition, an attacker can cause arbitrary SQL statements to run, with superuser privileges.
Common Weakness Enumeration (CWE): CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
CWE Description: The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16850 vulnerability.
References
- https://www.postgresql.org/about/news/1905/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16850
- https://usn.ubuntu.com/3818-1/
- http://www.securitytracker.com/id/1042144
- http://www.securityfocus.com/bid/105923
- https://security.gentoo.org/glsa/201811-24
- https://access.redhat.com/errata/RHSA-2018:3757
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-19208: In libwpd 0.10.2, there is a NULL pointer dereference in the function…
Published: 2018-11-12T19:29:00 Last Modified: 2020-04-14T15:27:00
Summary
In libwpd 0.10.2, there is a NULL pointer dereference in the function WP6ContentListener::defineTable in WP6ContentListener.cpp that will lead to a denial of service attack. This is related to WPXTable.h.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-19208 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-19214: Netwide Assembler (NASM) 2.14rc15 has a heap-based buffer over-read in expand_mmac_params in…
Published: 2018-11-12T19:29:00 Last Modified: 2020-07-13T21:15:00
Summary
Netwide Assembler (NASM) 2.14rc15 has a heap-based buffer over-read in expand_mmac_params in asm/preproc.c for insufficient input.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-19214 vulnerability.
References
- https://repo.or.cz/nasm.git/commit/661f723d39e03ca6eb05d7376a43ca33db478354
- https://bugzilla.nasm.us/show_bug.cgi?id=3392521
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-19215: Netwide Assembler (NASM) 2.14rc16 has a heap-based buffer over-read in expand_mmac_params in…
Published: 2018-11-12T19:29:00 Last Modified: 2020-07-13T21:15:00
Summary
Netwide Assembler (NASM) 2.14rc16 has a heap-based buffer over-read in expand_mmac_params in asm/preproc.c for the special cases of the % and $ and ! characters.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-19215 vulnerability.
References
- https://repo.or.cz/nasm.git/commit/4b5b737d4991578b1918303dc0fd9c9ab5c7ce4f
- https://bugzilla.nasm.us/show_bug.cgi?id=3392525
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-19115: keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting…
Published: 2018-11-08T20:29:00 Last Modified: 2020-08-24T17:37:00
Summary
keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-19115 vulnerability.
References
- https://github.com/acassen/keepalived/pull/961/commits/f28015671a4b04785859d1b4b1327b367b6a10e9
- https://github.com/acassen/keepalived/pull/961
- https://bugzilla.suse.com/show_bug.cgi?id=1015141
- https://lists.debian.org/debian-lts-announce/2018/11/msg00034.html
- https://access.redhat.com/errata/RHSA-2019:0022
- https://security.gentoo.org/glsa/201903-01
- https://usn.ubuntu.com/3995-1/
- https://usn.ubuntu.com/3995-2/
- https://access.redhat.com/errata/RHSA-2019:1792
- https://access.redhat.com/errata/RHSA-2019:1945
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14667: The RichFaces Framework 3.X through 3.3.4 is vulnerable to Expression Language (EL) injection via…
Published: 2018-11-06T22:29:00 Last Modified: 2020-08-28T17:59:00
Summary
The RichFaces Framework 3.X through 3.3.4 is vulnerable to Expression Language (EL) injection via the UserResource resource. A remote, unauthenticated attacker could exploit this to execute arbitrary code using a chain of java serialized objects via org.ajax4jsf.resource.UserResource$UriData.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14667 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14667
- https://access.redhat.com/errata/RHSA-2018:3519
- https://access.redhat.com/errata/RHSA-2018:3518
- https://access.redhat.com/errata/RHSA-2018:3517
- http://www.securitytracker.com/id/1042037
- https://access.redhat.com/errata/RHSA-2018:3581
- http://packetstormsecurity.com/files/156663/Richsploit-RichFaces-Exploitation-Toolkit.html
- http://seclists.org/fulldisclosure/2020/Mar/21
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14660: A flaw was found in glusterfs server through versions 4.1.4 and 3.1.2 which allowed repeated…
Published: 2018-11-01T14:29:00 Last Modified: 2021-11-30T22:00:00
Summary
A flaw was found in glusterfs server through versions 4.1.4 and 3.1.2 which allowed repeated usage of GF_META_LOCK_KEY xattr. A remote, authenticated attacker could use this flaw to create multiple locks for single inode by using setxattr repetitively resulting in memory exhaustion of glusterfs server node.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14660 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14660
- https://access.redhat.com/errata/RHSA-2018:3432
- https://access.redhat.com/errata/RHSA-2018:3431
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14651: It was found that the fix for CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, and…
Published: 2018-10-31T22:29:00 Last Modified: 2019-04-02T07:29:00
Summary
It was found that the fix for CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete. A remote, authenticated attacker could use one of these flaws to execute arbitrary code, create arbitrary files, or cause denial of service on glusterfs server nodes via symlinks to relative paths.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14651 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14651
- https://access.redhat.com/errata/RHSA-2018:3432
- https://access.redhat.com/errata/RHSA-2018:3431
- https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html
- https://security.gentoo.org/glsa/201904-06
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2125: It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets…
Published: 2018-10-31T20:29:00 Last Modified: 2019-10-09T23:17:00
Summary
It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.5
- CVSS: 3.3
- CVSS Vector: AV:A/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2016-2125 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2016-2125.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2125
- https://access.redhat.com/errata/RHSA-2017:1265
- http://www.securitytracker.com/id/1037494
- http://www.securityfocus.com/bid/94988
- http://rhn.redhat.com/errata/RHSA-2017-0744.html
- http://rhn.redhat.com/errata/RHSA-2017-0662.html
- http://rhn.redhat.com/errata/RHSA-2017-0495.html
- http://rhn.redhat.com/errata/RHSA-2017-0494.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14661: It was found that usage of snprintf function in feature/locks translator of glusterfs server…
Published: 2018-10-31T20:29:00 Last Modified: 2021-11-30T22:05:00
Summary
It was found that usage of snprintf function in feature/locks translator of glusterfs server 3.8.4, as shipped with Red Hat Gluster Storage, was vulnerable to a format string attack. A remote, authenticated attacker could use this flaw to cause remote denial of service.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14661 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14661
- https://access.redhat.com/errata/RHSA-2018:3432
- https://access.redhat.com/errata/RHSA-2018:3431
- https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14653: The Gluster file system through versions 4.1.4 and 3.12 is vulnerable to a heap-based buffer…
Published: 2018-10-31T19:29:00 Last Modified: 2021-12-16T18:50:00
Summary
The Gluster file system through versions 4.1.4 and 3.12 is vulnerable to a heap-based buffer overflow in the ‘__server_getspec’ function via the ‘gf_getspec_req’ RPC message. A remote authenticated attacker could exploit this to cause a denial of service or other potential unspecified impact.
Common Weakness Enumeration (CWE): CWE-122: Heap-based Buffer Overflow
CWE Description: A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14653 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14653
- https://access.redhat.com/errata/RHSA-2018:3432
- https://access.redhat.com/errata/RHSA-2018:3431
- https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14652: The Gluster file system through versions 3.12 and 4.1.4 is vulnerable to a buffer overflow in the…
Published: 2018-10-31T19:29:00 Last Modified: 2021-11-17T22:16:00
Summary
The Gluster file system through versions 3.12 and 4.1.4 is vulnerable to a buffer overflow in the ‘features/index’ translator via the code handling the ‘GF_XATTR_CLRLK_CMD’ xattr in the ‘pl_getxattr’ function. A remote authenticated attacker could exploit this on a mounted volume to cause a denial of service.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14652 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14652
- https://access.redhat.com/errata/RHSA-2018:3432
- https://access.redhat.com/errata/RHSA-2018:3431
- https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14654: The Gluster file system through version 4.1.4 is vulnerable to abuse of the ‘features/index’…
Published: 2018-10-31T19:29:00 Last Modified: 2021-11-30T22:13:00
Summary
The Gluster file system through version 4.1.4 is vulnerable to abuse of the ‘features/index’ translator. A remote attacker with access to mount volumes could exploit this via the ‘GF_XATTROP_ENTRY_IN_KEY’ xattrop to create arbitrary, empty files on the target server.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 9.2
- Exploitability Score: 8.0
- CVSS: 8.5
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14654 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14654
- https://access.redhat.com/errata/RHSA-2018:3432
- https://access.redhat.com/errata/RHSA-2018:3431
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14659: The Gluster file system through versions 4.1.4 and 3.1.2 is vulnerable to a denial of service…
Published: 2018-10-31T19:29:00 Last Modified: 2021-11-30T22:14:00
Summary
The Gluster file system through versions 4.1.4 and 3.1.2 is vulnerable to a denial of service attack via use of the ‘GF_XATTR_IOSTATS_DUMP_KEY’ xattr. A remote, authenticated attacker could exploit this by mounting a Gluster volume and repeatedly calling ‘setxattr(2)’ to trigger a state dump and create an arbitrary number of files in the server’s runtime directory.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14659 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14659
- https://access.redhat.com/errata/RHSA-2018:3432
- https://access.redhat.com/errata/RHSA-2018:3431
- https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18751: An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in…
Published: 2018-10-29T12:29:00 Last Modified: 2020-09-08T18:15:00
Summary
An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msgfmt.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18751 vulnerability.
References
- https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/heapcorruption
- https://github.com/CCCCCrash/POCs/tree/master/Bin/Tools-gettext-0.19.8.1/doublefree
- https://usn.ubuntu.com/3815-2/
- https://usn.ubuntu.com/3815-1/
- https://access.redhat.com/errata/RHSA-2019:3643
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00061.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00065.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00025.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to…
Published: 2018-10-26T14:29:00 Last Modified: 2022-01-31T18:30:00
Summary
A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 6.5
- CVSS: 5.8
- CVSS Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2018-15688 vulnerability.
References
- https://github.com/systemd/systemd/pull/10518
- http://www.securityfocus.com/bid/105745
- https://security.gentoo.org/glsa/201810-10
- https://usn.ubuntu.com/3807-1/
- https://usn.ubuntu.com/3806-1/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
- https://access.redhat.com/errata/RHSA-2018:3665
- https://access.redhat.com/errata/RHSA-2019:0049
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14665: A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath…
Published: 2018-10-25T20:29:00 Last Modified: 2019-10-22T23:15:00
Summary
A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges.
Common Weakness Enumeration (CWE): CWE-863: Incorrect Authorization
CWE Description: The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 8)
Code designed for conducting penetration testing on CVE-2018-14665 vulnerability.
- Xorg X11 Server - Local Privilege Escalation (Metasploit) by Metasploit at 2019-11-20
- xorg-x11-server < 1.20.3 (Solaris 11) - 'inittab Local Privilege Escalation by Marco Ivaldi at 2019-01-14
- Xorg X11 Server (AIX) - Local Privilege Escalation by 0xdono at 2018-12-04
- xorg-x11-server < 1.20.3 - 'modulepath' Local Privilege Escalation by Marco Ivaldi at 2018-11-30
- Xorg X11 Server - SUID privilege escalation (Metasploit) by Metasploit at 2018-11-26
- xorg-x11-server < 1.20.1 - Local Privilege Escalation by bolonobolo at 2018-11-13
- xorg-x11-server 1.20.3 - Privilege Escalation by Marco Ivaldi at 2018-10-30
- xorg-x11-server < 1.20.3 - Local Privilege Escalation by Hacker Fantastic at 2018-10-25
References
- https://lists.x.org/archives/xorg-announce/2018-October/002927.html
- https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665
- https://www.debian.org/security/2018/dsa-4328
- http://www.securitytracker.com/id/1041948
- https://www.exploit-db.com/exploits/45697/
- https://usn.ubuntu.com/3802-1/
- http://www.securityfocus.com/bid/105741
- https://security.gentoo.org/glsa/201810-09
- https://access.redhat.com/errata/RHSA-2018:3410
- https://www.exploit-db.com/exploits/45742/
- https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html
- https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e
- https://www.exploit-db.com/exploits/45832/
- https://www.exploit-db.com/exploits/45922/
- https://www.exploit-db.com/exploits/45908/
- https://www.exploit-db.com/exploits/45938/
- https://www.exploit-db.com/exploits/46142/
- http://packetstormsecurity.com/files/154942/Xorg-X11-Server-SUID-modulepath-Privilege-Escalation.html
- http://packetstormsecurity.com/files/155276/Xorg-X11-Server-Local-Privilege-Escalation.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-10730: An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a…
Published: 2018-10-24T21:29:00 Last Modified: 2019-01-09T19:56:00
Summary
An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. Amstar is an Amanda Application API script. It should not be run by users directly. It uses star to backup and restore data. It runs binaries with root permissions when parsing the command line argument –star-path.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-10730 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-10729: An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a…
Published: 2018-10-24T21:29:00 Last Modified: 2019-01-09T19:54:00
Summary
An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The “runtar” setuid root binary does not check for additional arguments supplied after –create, allowing users to manipulate commands and perform command injection as root.
Common Weakness Enumeration (CWE): CWE-77: Improper Neutralization of Special Elements used in a Command (‘Command Injection’)
CWE Description: The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-10729 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18584: In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input…
Published: 2018-10-23T02:29:00 Last Modified: 2021-05-12T20:52:00
Summary
In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18584 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2018/10/22/1
- https://www.cabextract.org.uk/#changes
- https://github.com/kyz/libmspack/commit/40ef1b4093d77ad3a5cfcee1f5cb6108b3a3bcc2
- https://bugs.debian.org/911640
- https://lists.debian.org/debian-lts-announce/2018/10/msg00017.html
- https://usn.ubuntu.com/3814-2/
- https://usn.ubuntu.com/3814-1/
- https://usn.ubuntu.com/3814-3/
- https://www.suse.com/security/cve/CVE-2018-18584/
- https://packetstormsecurity.com/files/150310/Ubuntu-Security-Notice-USN-3814-3.html
- https://access.redhat.com/security/cve/cve-2018-18584
- https://security.gentoo.org/glsa/201903-20
- https://access.redhat.com/errata/RHSA-2019:2049
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18585: chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts a filename that has ‘\0’…
Published: 2018-10-23T02:29:00 Last Modified: 2019-08-06T17:15:00
Summary
chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts a filename that has ‘\0’ as its first or second character (such as the “/\0” name).
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18585 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2018/10/22/1
- https://github.com/kyz/libmspack/commit/8759da8db6ec9e866cb8eb143313f397f925bb4f
- https://bugs.debian.org/911637
- https://lists.debian.org/debian-lts-announce/2018/10/msg00017.html
- https://usn.ubuntu.com/3814-2/
- https://usn.ubuntu.com/3814-1/
- https://usn.ubuntu.com/3814-3/
- https://tools.cisco.com/security/center/viewAlert.x?alertId=59134
- https://www.suse.com/security/cve/CVE-2018-18585/
- https://access.redhat.com/security/cve/cve-2018-18585
- https://security.gentoo.org/glsa/201903-20
- https://access.redhat.com/errata/RHSA-2019:2049
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18559: In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between…
Published: 2018-10-22T16:29:00 Last Modified: 2019-05-14T23:29:00
Summary
In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18559 vulnerability.
References
- https://blogs.securiteam.com/index.php/archives/3731
- https://access.redhat.com/errata/RHSA-2019:0188
- https://access.redhat.com/errata/RHSA-2019:0163
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:1170
- https://access.redhat.com/errata/RHSA-2019:1190
- https://access.redhat.com/errata/RHSA-2019:3967
- https://access.redhat.com/errata/RHSA-2019:4159
- https://access.redhat.com/errata/RHSA-2020:0174
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18438: Qemu has integer overflows because IOReadHandler and its associated functions use a signed…
Published: 2018-10-19T22:29:00 Last Modified: 2021-08-04T17:15:00
Summary
Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-18438 vulnerability.
References
- https://lists.gnu.org/archive/html/qemu-devel/2018-10/msg02402.html
- https://lists.gnu.org/archive/html/qemu-devel/2018-10/msg02396.html
- http://www.openwall.com/lists/oss-security/2018/10/17/3
- http://www.securityfocus.com/bid/105953
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18284: Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism…
Published: 2018-10-19T22:29:00 Last Modified: 2019-11-05T21:15:00
Summary
Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18284 vulnerability.
References
- https://bugs.ghostscript.com/show_bug.cgi?id=699963
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1696
- http://www.openwall.com/lists/oss-security/2018/10/16/2
- http://git.ghostscript.com/?p=ghostpdl.git;h=8d19fdf63f91f50466b08f23e2d93d37a4c5ea0b
- https://lists.debian.org/debian-lts-announce/2018/10/msg00013.html
- https://usn.ubuntu.com/3803-1/
- https://www.debian.org/security/2018/dsa-4336
- https://security.gentoo.org/glsa/201811-12
- https://access.redhat.com/errata/RHSA-2018:3834
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- http://www.securityfocus.com/bid/107451
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&utm_medium=RSS
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18520: An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils…
Published: 2018-10-19T17:29:00 Last Modified: 2021-11-30T21:59:00
Summary
An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18520 vulnerability.
References
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00057.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=23787
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- https://usn.ubuntu.com/4012-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://access.redhat.com/errata/RHSA-2019:2197
- https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18521: Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174…
Published: 2018-10-19T17:29:00 Last Modified: 2021-11-30T21:59:00
Summary
Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.
Common Weakness Enumeration (CWE): CWE-369: Divide By Zero
CWE Description: The product divides a value by zero.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18521 vulnerability.
References
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00055.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=23786
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- https://usn.ubuntu.com/4012-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://access.redhat.com/errata/RHSA-2019:2197
- https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12372: Decrypted S/MIME parts, when included in HTML crafted for an attack, can leak plaintext when…
Published: 2018-10-18T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Decrypted S/MIME parts, when included in HTML crafted for an attack, can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird < 52.9.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12372 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1419417
- https://www.debian.org/security/2018/dsa-4244
- https://usn.ubuntu.com/3714-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
- https://access.redhat.com/errata/RHSA-2018:2252
- https://access.redhat.com/errata/RHSA-2018:2251
- http://www.securityfocus.com/bid/104613
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12374: Plaintext of decrypted emails can leak through by user submitting an embedded form by pressing…
Published: 2018-10-18T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Plaintext of decrypted emails can leak through by user submitting an embedded form by pressing enter key within a text input field. This vulnerability affects Thunderbird < 52.9.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12374 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1462910
- https://www.debian.org/security/2018/dsa-4244
- https://usn.ubuntu.com/3714-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
- https://access.redhat.com/errata/RHSA-2018:2252
- https://access.redhat.com/errata/RHSA-2018:2251
- http://www.securityfocus.com/bid/104613
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12373: dDecrypted S/MIME parts hidden with CSS or the plaintext HTML tag can leak plaintext when…
Published: 2018-10-18T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
dDecrypted S/MIME parts hidden with CSS or the plaintext HTML tag can leak plaintext when included in a HTML reply/forward. This vulnerability affects Thunderbird < 52.9.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12373 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464667
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464056
- https://www.debian.org/security/2018/dsa-4244
- https://usn.ubuntu.com/3714-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
- https://access.redhat.com/errata/RHSA-2018:2252
- https://access.redhat.com/errata/RHSA-2018:2251
- http://www.securityfocus.com/bid/104613
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12386: A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-06T18:31:00
Summary
A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12386 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-24/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493900
- https://www.debian.org/security/2018/dsa-4310
- https://usn.ubuntu.com/3778-1/
- https://access.redhat.com/errata/RHSA-2018:2884
- https://access.redhat.com/errata/RHSA-2018:2881
- http://www.securitytracker.com/id/1041770
- http://www.securityfocus.com/bid/105460
- https://security.gentoo.org/glsa/201810-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12376: Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-06T15:50:00
Summary
Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12376 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1469309%2C1469914%2C1450989%2C1480092%2C1480517%2C1481093%2C1478575%2C1471953%2C1473161%2C1466991%2C1468738%2C1483120%2C1467363%2C1472925%2C1466577%2C1467889%2C1480521%2C1478849
- https://www.debian.org/security/2018/dsa-4287
- https://usn.ubuntu.com/3793-1/
- https://usn.ubuntu.com/3761-1/
- https://access.redhat.com/errata/RHSA-2018:2693
- https://access.redhat.com/errata/RHSA-2018:2692
- http://www.securitytracker.com/id/1041610
- http://www.securityfocus.com/bid/105280
- https://security.gentoo.org/glsa/201810-01
- https://www.debian.org/security/2018/dsa-4327
- https://access.redhat.com/errata/RHSA-2018:3403
- https://access.redhat.com/errata/RHSA-2018:3458
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12359: A buffer overflow can occur when rendering canvas content while adjusting the height and width of…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-06T14:50:00
Summary
A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12359 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459162
- https://www.debian.org/security/2018/dsa-4244
- https://www.debian.org/security/2018/dsa-4235
- https://usn.ubuntu.com/3714-1/
- https://usn.ubuntu.com/3705-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html
- https://access.redhat.com/errata/RHSA-2018:2252
- https://access.redhat.com/errata/RHSA-2018:2251
- https://access.redhat.com/errata/RHSA-2018:2113
- https://access.redhat.com/errata/RHSA-2018:2112
- http://www.securitytracker.com/id/1041193
- http://www.securityfocus.com/bid/104555
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12379: When the Mozilla Updater opens a MAR format file which contains a very long item filename, an…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-06T18:10:00
Summary
When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-of-bounds write can be triggered, leading to a potentially exploitable crash. This requires running the Mozilla Updater manually on the local system with the malicious MAR file in order to occur. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-12379 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1473113
- https://access.redhat.com/errata/RHSA-2018:2693
- https://access.redhat.com/errata/RHSA-2018:2692
- http://www.securitytracker.com/id/1041610
- http://www.securityfocus.com/bid/105280
- https://security.gentoo.org/glsa/201810-01
- https://www.debian.org/security/2018/dsa-4327
- https://access.redhat.com/errata/RHSA-2018:3403
- https://access.redhat.com/errata/RHSA-2018:3458
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12383: If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted…
Published: 2018-10-18T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox < 62, Firefox ESR < 60.2.1, and Thunderbird < 60.2.1.
Common Weakness Enumeration (CWE): CWE-522: Insufficiently Protected Credentials
CWE Description: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-12383 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1475775
- https://www.debian.org/security/2018/dsa-4304
- https://usn.ubuntu.com/3793-1/
- https://usn.ubuntu.com/3761-1/
- https://access.redhat.com/errata/RHSA-2018:2835
- https://access.redhat.com/errata/RHSA-2018:2834
- http://www.securitytracker.com/id/1041701
- http://www.securitytracker.com/id/1041610
- http://www.securityfocus.com/bid/105276
- https://security.gentoo.org/glsa/201810-01
- https://www.debian.org/security/2018/dsa-4327
- https://access.redhat.com/errata/RHSA-2018:3403
- https://access.redhat.com/errata/RHSA-2018:3458
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12385: A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-06T19:03:00
Summary
A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird < 60.2.1, Firefox ESR < 60.2.1, and Firefox < 62.0.2.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-12385 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-23/
- https://www.mozilla.org/security/advisories/mfsa2018-22/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1490585
- https://www.debian.org/security/2018/dsa-4304
- https://usn.ubuntu.com/3793-1/
- https://usn.ubuntu.com/3778-1/
- https://access.redhat.com/errata/RHSA-2018:2835
- https://access.redhat.com/errata/RHSA-2018:2834
- http://www.securitytracker.com/id/1041701
- http://www.securitytracker.com/id/1041700
- http://www.securityfocus.com/bid/105380
- https://security.gentoo.org/glsa/201810-01
- https://www.debian.org/security/2018/dsa-4327
- https://access.redhat.com/errata/RHSA-2018:3403
- https://access.redhat.com/errata/RHSA-2018:3458
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12362: An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-03T20:11:00
Summary
An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12362 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452375
- https://www.debian.org/security/2018/dsa-4244
- https://www.debian.org/security/2018/dsa-4235
- https://usn.ubuntu.com/3714-1/
- https://usn.ubuntu.com/3705-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html
- https://access.redhat.com/errata/RHSA-2018:2252
- https://access.redhat.com/errata/RHSA-2018:2251
- https://access.redhat.com/errata/RHSA-2018:2113
- https://access.redhat.com/errata/RHSA-2018:2112
- http://www.securitytracker.com/id/1041193
- http://www.securityfocus.com/bid/104560
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12363: A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-03T20:10:00
Summary
A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12363 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464784
- https://www.debian.org/security/2018/dsa-4244
- https://www.debian.org/security/2018/dsa-4235
- https://usn.ubuntu.com/3714-1/
- https://usn.ubuntu.com/3705-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html
- https://access.redhat.com/errata/RHSA-2018:2252
- https://access.redhat.com/errata/RHSA-2018:2251
- https://access.redhat.com/errata/RHSA-2018:2113
- https://access.redhat.com/errata/RHSA-2018:2112
- http://www.securitytracker.com/id/1041193
- http://www.securityfocus.com/bid/104560
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12365: A compromised IPC child process can escape the content sandbox and list the names of arbitrary…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-03T20:09:00
Summary
A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12365 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459206
- https://www.debian.org/security/2018/dsa-4244
- https://www.debian.org/security/2018/dsa-4235
- https://usn.ubuntu.com/3714-1/
- https://usn.ubuntu.com/3705-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html
- https://access.redhat.com/errata/RHSA-2018:2252
- https://access.redhat.com/errata/RHSA-2018:2251
- https://access.redhat.com/errata/RHSA-2018:2113
- https://access.redhat.com/errata/RHSA-2018:2112
- http://www.securitytracker.com/id/1041193
- http://www.securityfocus.com/bid/104560
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12387: A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-06T18:38:00
Summary
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12387 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-24/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493903
- https://www.debian.org/security/2018/dsa-4310
- https://usn.ubuntu.com/3778-1/
- https://access.redhat.com/errata/RHSA-2018:2884
- https://access.redhat.com/errata/RHSA-2018:2881
- http://www.securitytracker.com/id/1041770
- http://www.securityfocus.com/bid/105460
- https://security.gentoo.org/glsa/201810-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12360: A use-after-free vulnerability can occur when deleting an input element during a mutation event…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-03T20:08:00
Summary
A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12360 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459693
- https://www.debian.org/security/2018/dsa-4244
- https://www.debian.org/security/2018/dsa-4235
- https://usn.ubuntu.com/3714-1/
- https://usn.ubuntu.com/3705-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html
- https://access.redhat.com/errata/RHSA-2018:2252
- https://access.redhat.com/errata/RHSA-2018:2251
- https://access.redhat.com/errata/RHSA-2018:2113
- https://access.redhat.com/errata/RHSA-2018:2112
- http://www.securitytracker.com/id/1041193
- http://www.securityfocus.com/bid/104555
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12364: NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-03T20:10:00
Summary
NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
Common Weakness Enumeration (CWE): CWE-352: Cross-Site Request Forgery (CSRF)
CWE Description: The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12364 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1436241
- https://www.debian.org/security/2018/dsa-4244
- https://www.debian.org/security/2018/dsa-4235
- https://usn.ubuntu.com/3714-1/
- https://usn.ubuntu.com/3705-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html
- https://access.redhat.com/errata/RHSA-2018:2252
- https://access.redhat.com/errata/RHSA-2018:2251
- https://access.redhat.com/errata/RHSA-2018:2113
- https://access.redhat.com/errata/RHSA-2018:2112
- http://www.securitytracker.com/id/1041193
- http://www.securityfocus.com/bid/104560
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12366: An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-03T20:09:00
Summary
An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12366 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1464039
- https://www.debian.org/security/2018/dsa-4244
- https://www.debian.org/security/2018/dsa-4235
- https://usn.ubuntu.com/3714-1/
- https://usn.ubuntu.com/3705-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html
- https://access.redhat.com/errata/RHSA-2018:2252
- https://access.redhat.com/errata/RHSA-2018:2251
- https://access.redhat.com/errata/RHSA-2018:2113
- https://access.redhat.com/errata/RHSA-2018:2112
- http://www.securitytracker.com/id/1041193
- http://www.securityfocus.com/bid/104560
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12377: A use-after-free vulnerability can occur when refresh driver timers are refreshed in some…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-06T15:50:00
Summary
A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12377 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1470260
- https://www.debian.org/security/2018/dsa-4287
- https://usn.ubuntu.com/3793-1/
- https://usn.ubuntu.com/3761-1/
- https://access.redhat.com/errata/RHSA-2018:2693
- https://access.redhat.com/errata/RHSA-2018:2692
- http://www.securitytracker.com/id/1041610
- http://www.securityfocus.com/bid/105280
- https://security.gentoo.org/glsa/201810-01
- https://www.debian.org/security/2018/dsa-4327
- https://access.redhat.com/errata/RHSA-2018:3403
- https://access.redhat.com/errata/RHSA-2018:3458
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12378: A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-06T15:51:00
Summary
A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox < 62, Firefox ESR < 60.2, and Thunderbird < 60.2.1.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12378 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-25/
- https://www.mozilla.org/security/advisories/mfsa2018-21/
- https://www.mozilla.org/security/advisories/mfsa2018-20/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1459383
- https://www.debian.org/security/2018/dsa-4287
- https://usn.ubuntu.com/3793-1/
- https://usn.ubuntu.com/3761-1/
- https://access.redhat.com/errata/RHSA-2018:2693
- https://access.redhat.com/errata/RHSA-2018:2692
- http://www.securitytracker.com/id/1041610
- http://www.securityfocus.com/bid/105280
- https://security.gentoo.org/glsa/201810-01
- https://www.debian.org/security/2018/dsa-4327
- https://access.redhat.com/errata/RHSA-2018:3403
- https://access.redhat.com/errata/RHSA-2018:3458
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5156: A vulnerability can occur when capturing a media stream when the media source type is changed as…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-06T18:39:00
Summary
A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5156 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1453127
- https://www.debian.org/security/2018/dsa-4295
- https://www.debian.org/security/2018/dsa-4235
- https://usn.ubuntu.com/3705-1/
- https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html
- https://access.redhat.com/errata/RHSA-2018:2113
- https://access.redhat.com/errata/RHSA-2018:2112
- http://www.securitytracker.com/id/1041193
- http://www.securityfocus.com/bid/104560
- https://security.gentoo.org/glsa/201810-01
- https://lists.debian.org/debian-lts-announce/2018/11/msg00011.html
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5188: Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these…
Published: 2018-10-18T13:29:00 Last Modified: 2018-12-06T18:44:00
Summary
Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5188 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-19/
- https://www.mozilla.org/security/advisories/mfsa2018-18/
- https://www.mozilla.org/security/advisories/mfsa2018-17/
- https://www.mozilla.org/security/advisories/mfsa2018-16/
- https://www.mozilla.org/security/advisories/mfsa2018-15/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456189%2C1456975%2C1465898%2C1392739%2C1451297%2C1464063%2C1437842%2C1442722%2C1452576%2C1450688%2C1458264%2C1458270%2C1465108%2C1464829%2C1464079%2C1463494%2C1458048
- https://www.debian.org/security/2018/dsa-4244
- https://usn.ubuntu.com/3749-1/
- https://usn.ubuntu.com/3714-1/
- https://usn.ubuntu.com/3705-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/06/msg00014.html
- https://access.redhat.com/errata/RHSA-2018:2252
- https://access.redhat.com/errata/RHSA-2018:2251
- https://access.redhat.com/errata/RHSA-2018:2113
- https://access.redhat.com/errata/RHSA-2018:2112
- http://www.securityfocus.com/bid/104555
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18445: In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation…
Published: 2018-10-17T19:29:00 Last Modified: 2020-10-15T13:28:00
Summary
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-18445 vulnerability.
References
- https://github.com/torvalds/linux/commit/b799207e1e1816b09e7a5920fbb2d5fcf6edd681
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.13
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.75
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1686
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b799207e1e1816b09e7a5920fbb2d5fcf6edd681
- https://usn.ubuntu.com/3832-1/
- https://usn.ubuntu.com/3835-1/
- https://usn.ubuntu.com/3847-3/
- https://usn.ubuntu.com/3847-2/
- https://usn.ubuntu.com/3847-1/
- https://access.redhat.com/errata/RHSA-2019:0514
- https://access.redhat.com/errata/RHSA-2019:0512
- https://support.f5.com/csp/article/K38456756
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10933: A vulnerability was found in libssh’s server-side state machine before versions 0.7.6 and 0.8.4….
Published: 2018-10-17T12:29:00 Last Modified: 2019-10-09T23:33:00
Summary
A vulnerability was found in libssh’s server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2018-10933 vulnerability.
- LibSSH 0.7.6 / 0.8.4 - Unauthorized Access by jas502n at 2018-10-20
- libSSH - Authentication Bypass by Dayanç Soyadlı at 2018-10-18
References
- https://www.libssh.org/security/advisories/CVE-2018-10933.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10933
- https://www.debian.org/security/2018/dsa-4322
- https://usn.ubuntu.com/3795-1/
- https://lists.debian.org/debian-lts-announce/2018/10/msg00010.html
- https://www.exploit-db.com/exploits/45638/
- http://www.securityfocus.com/bid/105677
- https://usn.ubuntu.com/3795-2/
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0016
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://security.netapp.com/advisory/ntap-20190118-0002/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-3136: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent:…
Published: 2018-10-17T01:31:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-3136 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securitytracker.com/id/1041889
- http://www.securityfocus.com/bid/105601
- https://access.redhat.com/errata/RHSA-2018:2943
- https://access.redhat.com/errata/RHSA-2018:2942
- https://security.netapp.com/advisory/ntap-20181018-0001/
- https://access.redhat.com/errata/RHSA-2018:3008
- https://access.redhat.com/errata/RHSA-2018:3007
- https://access.redhat.com/errata/RHSA-2018:3003
- https://access.redhat.com/errata/RHSA-2018:3002
- https://access.redhat.com/errata/RHSA-2018:3001
- https://access.redhat.com/errata/RHSA-2018:3000
- https://www.debian.org/security/2018/dsa-4326
- https://usn.ubuntu.com/3804-1/
- https://access.redhat.com/errata/RHSA-2018:3409
- https://access.redhat.com/errata/RHSA-2018:3350
- https://access.redhat.com/errata/RHSA-2018:3521
- https://access.redhat.com/errata/RHSA-2018:3534
- https://access.redhat.com/errata/RHSA-2018:3533
- https://usn.ubuntu.com/3824-1/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
- https://access.redhat.com/errata/RHSA-2018:3672
- https://access.redhat.com/errata/RHSA-2018:3671
- https://access.redhat.com/errata/RHSA-2018:3779
- https://access.redhat.com/errata/RHSA-2018:3852
- https://security.gentoo.org/glsa/201908-10
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-3149: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-10-17T01:31:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-3149 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securitytracker.com/id/1041889
- http://www.securityfocus.com/bid/105608
- https://access.redhat.com/errata/RHSA-2018:2943
- https://access.redhat.com/errata/RHSA-2018:2942
- https://security.netapp.com/advisory/ntap-20181018-0001/
- https://access.redhat.com/errata/RHSA-2018:3008
- https://access.redhat.com/errata/RHSA-2018:3007
- https://access.redhat.com/errata/RHSA-2018:3003
- https://access.redhat.com/errata/RHSA-2018:3002
- https://access.redhat.com/errata/RHSA-2018:3001
- https://access.redhat.com/errata/RHSA-2018:3000
- https://www.debian.org/security/2018/dsa-4326
- https://usn.ubuntu.com/3804-1/
- https://access.redhat.com/errata/RHSA-2018:3409
- https://access.redhat.com/errata/RHSA-2018:3350
- https://access.redhat.com/errata/RHSA-2018:3521
- https://access.redhat.com/errata/RHSA-2018:3534
- https://access.redhat.com/errata/RHSA-2018:3533
- https://usn.ubuntu.com/3824-1/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
- https://access.redhat.com/errata/RHSA-2018:3672
- https://access.redhat.com/errata/RHSA-2018:3671
- https://access.redhat.com/errata/RHSA-2018:3779
- https://access.redhat.com/errata/RHSA-2018:3852
- https://security.gentoo.org/glsa/201908-10
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-3180: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-10-17T01:31:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-3180 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securitytracker.com/id/1041889
- http://www.securityfocus.com/bid/105617
- https://access.redhat.com/errata/RHSA-2018:2943
- https://access.redhat.com/errata/RHSA-2018:2942
- https://security.netapp.com/advisory/ntap-20181018-0001/
- https://access.redhat.com/errata/RHSA-2018:3008
- https://access.redhat.com/errata/RHSA-2018:3007
- https://access.redhat.com/errata/RHSA-2018:3003
- https://access.redhat.com/errata/RHSA-2018:3002
- https://access.redhat.com/errata/RHSA-2018:3001
- https://access.redhat.com/errata/RHSA-2018:3000
- https://www.debian.org/security/2018/dsa-4326
- https://usn.ubuntu.com/3804-1/
- https://access.redhat.com/errata/RHSA-2018:3409
- https://access.redhat.com/errata/RHSA-2018:3350
- https://access.redhat.com/errata/RHSA-2018:3521
- https://access.redhat.com/errata/RHSA-2018:3534
- https://access.redhat.com/errata/RHSA-2018:3533
- https://usn.ubuntu.com/3824-1/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
- https://access.redhat.com/errata/RHSA-2018:3672
- https://access.redhat.com/errata/RHSA-2018:3671
- https://access.redhat.com/errata/RHSA-2018:3779
- https://access.redhat.com/errata/RHSA-2018:3852
- https://security.gentoo.org/glsa/201908-10
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-3214: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-10-17T01:31:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-3214 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securitytracker.com/id/1041889
- http://www.securityfocus.com/bid/105615
- https://access.redhat.com/errata/RHSA-2018:2943
- https://access.redhat.com/errata/RHSA-2018:2942
- https://security.netapp.com/advisory/ntap-20181018-0001/
- https://access.redhat.com/errata/RHSA-2018:3008
- https://access.redhat.com/errata/RHSA-2018:3007
- https://access.redhat.com/errata/RHSA-2018:3003
- https://access.redhat.com/errata/RHSA-2018:3002
- https://access.redhat.com/errata/RHSA-2018:3001
- https://access.redhat.com/errata/RHSA-2018:3000
- https://www.debian.org/security/2018/dsa-4326
- https://usn.ubuntu.com/3804-1/
- https://access.redhat.com/errata/RHSA-2018:3409
- https://access.redhat.com/errata/RHSA-2018:3350
- https://access.redhat.com/errata/RHSA-2018:3534
- https://access.redhat.com/errata/RHSA-2018:3533
- https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
- https://access.redhat.com/errata/RHSA-2018:3672
- https://access.redhat.com/errata/RHSA-2018:3671
- https://access.redhat.com/errata/RHSA-2018:3779
- https://access.redhat.com/errata/RHSA-2018:3852
- https://security.gentoo.org/glsa/201908-10
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-3139: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent:…
Published: 2018-10-17T01:31:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-3139 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securitytracker.com/id/1041889
- http://www.securityfocus.com/bid/105602
- https://access.redhat.com/errata/RHSA-2018:2943
- https://access.redhat.com/errata/RHSA-2018:2942
- https://security.netapp.com/advisory/ntap-20181018-0001/
- https://access.redhat.com/errata/RHSA-2018:3008
- https://access.redhat.com/errata/RHSA-2018:3007
- https://access.redhat.com/errata/RHSA-2018:3003
- https://access.redhat.com/errata/RHSA-2018:3002
- https://access.redhat.com/errata/RHSA-2018:3001
- https://access.redhat.com/errata/RHSA-2018:3000
- https://www.debian.org/security/2018/dsa-4326
- https://usn.ubuntu.com/3804-1/
- https://access.redhat.com/errata/RHSA-2018:3409
- https://access.redhat.com/errata/RHSA-2018:3350
- https://access.redhat.com/errata/RHSA-2018:3521
- https://access.redhat.com/errata/RHSA-2018:3534
- https://access.redhat.com/errata/RHSA-2018:3533
- https://usn.ubuntu.com/3824-1/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
- https://access.redhat.com/errata/RHSA-2018:3672
- https://access.redhat.com/errata/RHSA-2018:3671
- https://access.redhat.com/errata/RHSA-2018:3779
- https://access.redhat.com/errata/RHSA-2018:3852
- https://security.gentoo.org/glsa/201908-10
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-3183: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-10-17T01:31:00 Last Modified: 2020-09-08T12:29:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-3183 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securitytracker.com/id/1041889
- http://www.securityfocus.com/bid/105622
- https://access.redhat.com/errata/RHSA-2018:2943
- https://access.redhat.com/errata/RHSA-2018:2942
- https://security.netapp.com/advisory/ntap-20181018-0001/
- https://access.redhat.com/errata/RHSA-2018:3003
- https://access.redhat.com/errata/RHSA-2018:3002
- https://www.debian.org/security/2018/dsa-4326
- https://usn.ubuntu.com/3804-1/
- https://access.redhat.com/errata/RHSA-2018:3521
- https://access.redhat.com/errata/RHSA-2018:3534
- https://access.redhat.com/errata/RHSA-2018:3533
- https://access.redhat.com/errata/RHSA-2018:3852
- https://security.gentoo.org/glsa/201908-10
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-3169: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent:…
Published: 2018-10-17T01:31:00 Last Modified: 2020-09-08T13:00:00
Summary
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-3169 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securitytracker.com/id/1041889
- http://www.securityfocus.com/bid/105587
- https://access.redhat.com/errata/RHSA-2018:2943
- https://access.redhat.com/errata/RHSA-2018:2942
- https://security.netapp.com/advisory/ntap-20181018-0001/
- https://access.redhat.com/errata/RHSA-2018:3003
- https://access.redhat.com/errata/RHSA-2018:3002
- https://access.redhat.com/errata/RHSA-2018:3001
- https://access.redhat.com/errata/RHSA-2018:3000
- https://www.debian.org/security/2018/dsa-4326
- https://usn.ubuntu.com/3804-1/
- https://access.redhat.com/errata/RHSA-2018:3409
- https://access.redhat.com/errata/RHSA-2018:3350
- https://access.redhat.com/errata/RHSA-2018:3521
- https://access.redhat.com/errata/RHSA-2018:3534
- https://access.redhat.com/errata/RHSA-2018:3533
- https://usn.ubuntu.com/3824-1/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
- https://access.redhat.com/errata/RHSA-2018:3672
- https://access.redhat.com/errata/RHSA-2018:3671
- https://access.redhat.com/errata/RHSA-2018:3779
- https://access.redhat.com/errata/RHSA-2018:3852
- https://security.gentoo.org/glsa/201908-10
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18073: Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging…
Published: 2018-10-15T16:29:00 Last Modified: 2020-10-22T16:19:00
Summary
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18073 vulnerability.
References
- https://bugs.ghostscript.com/show_bug.cgi?id=699927
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1690
- http://www.openwall.com/lists/oss-security/2018/10/10/12
- http://packetstormsecurity.com/files/149758/Ghostscript-Exposed-System-Operators.html
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=34cc326eb2c5695833361887fe0b32e8d987741c
- https://lists.debian.org/debian-lts-announce/2018/10/msg00013.html
- https://usn.ubuntu.com/3803-1/
- https://www.debian.org/security/2018/dsa-4336
- https://access.redhat.com/errata/RHSA-2018:3834
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17961: Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism…
Published: 2018-10-15T16:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving errorhandler setup. NOTE: this issue exists because of an incomplete fix for CVE-2018-17183.
Common Weakness Enumeration (CWE): CWE-209: Generation of Error Message Containing Sensitive Information
CWE Description: The software generates an error message that includes sensitive information about its environment, users, or associated data.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-17961 vulnerability.
References
- https://www.exploit-db.com/exploits/45573/
- https://bugs.ghostscript.com/show_bug.cgi?id=699816
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1682&desc=2
- http://www.openwall.com/lists/oss-security/2018/10/09/4
- http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a6807394bd94
- http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a5a9bf8c6a63
- http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a54c9e61e7d0
- https://lists.debian.org/debian-lts-announce/2018/10/msg00013.html
- https://usn.ubuntu.com/3803-1/
- https://www.debian.org/security/2018/dsa-4336
- https://access.redhat.com/errata/RHSA-2018:3834
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18310: An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl…
Published: 2018-10-15T02:29:00 Last Modified: 2021-11-30T21:59:00
Summary
An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18310 vulnerability.
References
- https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=23752
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- https://usn.ubuntu.com/4012-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://access.redhat.com/errata/RHSA-2019:2197
- https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14649: It was found that ceph-isci-cli package as shipped by Red Hat Ceph Storage 2 and 3 is using…
Published: 2018-10-09T17:29:00 Last Modified: 2019-10-09T23:35:00
Summary
It was found that ceph-isci-cli package as shipped by Red Hat Ceph Storage 2 and 3 is using python-werkzeug in debug shell mode. This is done by setting debug=True in file /usr/bin/rbd-target-api provided by ceph-isci-cli package. This allows unauthenticated attackers to access this debug shell and escalate privileges. Once an attacker has successfully connected to this debug shell they will be able to execute arbitrary commands remotely. These commands will run with the same privileges as of user executing the application which is using python-werkzeug with debug shell mode enabled. In - Red Hat Ceph Storage 2 and 3, ceph-isci-cli package runs python-werkzeug library with root level permissions.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14649 vulnerability.
References
- https://github.com/ceph/ceph-iscsi-cli/pull/121/commits/c3812075e30c76a800a961e7291087d357403f6b
- https://github.com/ceph/ceph-iscsi-cli/issues/120
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14649
- https://access.redhat.com/articles/3623521
- https://access.redhat.com/errata/RHSA-2018:2838
- https://access.redhat.com/errata/RHSA-2018:2837
- http://www.securityfocus.com/bid/105434
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-18074: The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI…
Published: 2018-10-09T17:29:00 Last Modified: 2021-04-14T20:30:00
Summary
The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
Common Weakness Enumeration (CWE): CWE-522: Insufficiently Protected Credentials
CWE Description: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-18074 vulnerability.
References
- https://github.com/requests/requests/pull/4718
- https://github.com/requests/requests/issues/4716
- https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff
- https://bugs.debian.org/910766
- https://usn.ubuntu.com/3790-1/
- http://docs.python-requests.org/en/master/community/updates/#release-and-version-history
- https://usn.ubuntu.com/3790-2/
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html
- https://access.redhat.com/errata/RHSA-2019:2035
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000808: Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to…
Published: 2018-10-08T15:29:00 Last Modified: 2021-08-04T17:14:00
Summary
Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection. Anything that would cause the calling application to reload certificates from a PKCS #12 store.. This vulnerability appears to have been fixed in 17.5.0.
Common Weakness Enumeration (CWE): CWE-404: Improper Resource Shutdown or Release
CWE Description: Improper release or shutdown of resources can be resultant from improper error handling or insufficient resource tracking.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000808 vulnerability.
References
- https://github.com/pyca/pyopenssl/pull/723
- https://usn.ubuntu.com/3813-1/
- https://access.redhat.com/errata/RHSA-2019:0085
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000805: Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access…
Published: 2018-10-08T15:29:00 Last Modified: 2021-12-28T13:15:00
Summary
Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect Access Control vulnerability in SSH server that can result in RCE. This attack appear to be exploitable via network connectivity.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000805 vulnerability.
References
- https://github.com/paramiko/paramiko/issues/1283
- https://usn.ubuntu.com/3796-2/
- https://usn.ubuntu.com/3796-1/
- https://usn.ubuntu.com/3796-3/
- https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html
- https://access.redhat.com/errata/RHSA-2018:3406
- https://access.redhat.com/errata/RHSA-2018:3347
- https://access.redhat.com/errata/RHSA-2018:3505
- https://access.redhat.com/errata/RHBA-2018:3497
- https://herolab.usd.de/wp-content/uploads/sites/4/usd20180023.txt
- https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000807: Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use…
Published: 2018-10-08T15:29:00 Last Modified: 2021-08-04T17:14:00
Summary
Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This attack appear to be exploitable via Depends on the calling application and if it retains a reference to the memory.. This vulnerability appears to have been fixed in 17.5.0.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000807 vulnerability.
References
- https://github.com/pyca/pyopenssl/pull/723
- https://usn.ubuntu.com/3813-1/
- https://access.redhat.com/errata/RHSA-2019:0085
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00014.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17456: Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x…
Published: 2018-10-06T14:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive “git clone” of a superproject if a .gitmodules file has a URL field beginning with a ‘-’ character.
Common Weakness Enumeration (CWE): CWE-88: Improper Neutralization of Argument Delimiters in a Command (‘Argument Injection’)
CWE Description: The software constructs a string for a command to executed by a separate componentin another control sphere, but it does not properly delimit theintended arguments, options, or switches within that command string.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2018-17456 vulnerability.
- Git Submodule - Arbitrary Code Execution by joernchen at 2018-10-16
- Git Submodule - Arbitrary Code Execution (PoC) by Junio C Hamano at 2018-10-05
References
- https://www.openwall.com/lists/oss-security/2018/10/06/3
- https://marc.info/?l=git&m=153875888916397&w=2
- https://github.com/git/git/commit/a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46
- https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404
- https://www.debian.org/security/2018/dsa-4311
- https://www.exploit-db.com/exploits/45548/
- http://www.securitytracker.com/id/1041811
- http://www.securityfocus.com/bid/105523
- https://usn.ubuntu.com/3791-1/
- https://www.exploit-db.com/exploits/45631/
- https://access.redhat.com/errata/RHSA-2018:3408
- https://access.redhat.com/errata/RHSA-2018:3505
- https://access.redhat.com/errata/RHSA-2018:3541
- https://seclists.org/bugtraq/2019/Mar/30
- http://www.securityfocus.com/bid/107511
- http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html
- https://access.redhat.com/errata/RHSA-2020:0316
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-11784: When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23…
Published: 2018-10-04T13:29:00 Last Modified: 2021-07-13T17:15:00
Summary
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to ‘/foo/’ when the user requested ‘/foo’) a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
Common Weakness Enumeration (CWE): CWE-601: URL Redirection to Untrusted Site (‘Open Redirect’)
CWE Description: A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-11784 vulnerability.
References
- https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E
- http://www.securityfocus.com/bid/105524
- https://usn.ubuntu.com/3787-1/
- https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html
- https://security.netapp.com/advisory/ntap-20181014-0002/
- https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://access.redhat.com/errata/RHSA-2019:0131
- https://access.redhat.com/errata/RHSA-2019:0130
- https://access.redhat.com/errata/RHSA-2019:0485
- https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/
- https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
- https://access.redhat.com/errata/RHSA-2019:1529
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.debian.org/security/2019/dsa-4596
- https://seclists.org/bugtraq/2019/Dec/43
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17972: An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel…
Published: 2018-10-03T22:29:00 Last Modified: 2020-10-15T13:28:00
Summary
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: COMPLETE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-17972 vulnerability.
References
- https://marc.info/?l=linux-fsdevel&m=153806242024956&w=2
- http://www.securityfocus.com/bid/105525
- https://usn.ubuntu.com/3821-2/
- https://usn.ubuntu.com/3821-1/
- https://usn.ubuntu.com/3832-1/
- https://usn.ubuntu.com/3835-1/
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3880-2/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3880-1/
- https://usn.ubuntu.com/3871-5/
- https://access.redhat.com/errata/RHSA-2019:0514
- https://access.redhat.com/errata/RHSA-2019:0512
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
- https://access.redhat.com/errata/RHSA-2019:0831
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
- https://access.redhat.com/errata/RHSA-2019:2473
- https://support.f5.com/csp/article/K27673650?utm_source=f5support&utm_medium=RSS
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14648: A flaw was found in 389 Directory Server. A specially crafted search query could lead to…
Published: 2018-09-28T13:29:00 Last Modified: 2019-10-09T23:35:00
Summary
A flaw was found in 389 Directory Server. A specially crafted search query could lead to excessive CPU consumption in the do_search() function. An unauthenticated attacker could use this flaw to provoke a denial of service.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14648 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14648
- https://lists.debian.org/debian-lts-announce/2018/10/msg00015.html
- https://access.redhat.com/errata/RHSA-2018:3127
- https://access.redhat.com/errata/RHSA-2018:3507
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14650: It was discovered that sos-collector does not properly set the default permissions of newly…
Published: 2018-09-27T20:29:00 Last Modified: 2019-10-09T23:35:00
Summary
It was discovered that sos-collector does not properly set the default permissions of newly created files, making all files created by the tool readable by any local user. A local attacker may use this flaw by waiting for a legit user to run sos-collector and steal the collected data in the /var/tmp directory.
Common Weakness Enumeration (CWE): CWE-276: Incorrect Default Permissions
CWE Description: During installation, installed file permissions are set to allow anyone to modify those files.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-14650 vulnerability.
References
- https://github.com/sosreport/sos-collector/commit/72058f9253e7ed8c7243e2ff76a16d97b03d65ed
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14650
- https://access.redhat.com/errata/RHSA-2018:3663
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-11763: In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can…
Published: 2018-09-25T21:29:00 Last Modified: 2021-06-06T11:15:00
Summary
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-11763 vulnerability.
References
- https://httpd.apache.org/security/vulnerabilities_24.html
- http://www.securitytracker.com/id/1041713
- http://www.securityfocus.com/bid/105414
- https://usn.ubuntu.com/3783-1/
- https://access.redhat.com/errata/RHSA-2018:3558
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://security.netapp.com/advisory/ntap-20190204-0004/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
- https://access.redhat.com/errata/RHSA-2019:0367
- https://access.redhat.com/errata/RHSA-2019:0366
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
- https://www.tenable.com/security/tns-2019-09
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14634: An integer overflow flaw was found in the Linux kernel’s create_elf_tables() function. An…
Published: 2018-09-25T21:29:00 Last Modified: 2021-07-20T15:15:00
Summary
An integer overflow flaw was found in the Linux kernel’s create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-14634 vulnerability.
References
- https://www.openwall.com/lists/oss-security/2018/09/25/4
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14634
- https://access.redhat.com/errata/RHSA-2018:2763
- https://access.redhat.com/errata/RHSA-2018:2748
- http://www.securityfocus.com/bid/105407
- https://www.exploit-db.com/exploits/45516/
- https://usn.ubuntu.com/3775-2/
- https://usn.ubuntu.com/3779-1/
- https://usn.ubuntu.com/3775-1/
- https://access.redhat.com/errata/RHSA-2018:2846
- https://access.redhat.com/errata/RHSA-2018:2933
- https://access.redhat.com/errata/RHSA-2018:2925
- https://access.redhat.com/errata/RHSA-2018:2924
- https://access.redhat.com/errata/RHSA-2018:3591
- https://access.redhat.com/errata/RHSA-2018:3590
- https://access.redhat.com/errata/RHSA-2018:3586
- https://access.redhat.com/errata/RHSA-2018:3540
- https://access.redhat.com/errata/RHSA-2018:3643
- https://security.netapp.com/advisory/ntap-20190204-0002/
- https://support.f5.com/csp/article/K20934447?utm_source=f5support&utm_medium=RSS
- https://security.paloaltonetworks.com/CVE-2018-14634
- http://www.openwall.com/lists/oss-security/2021/07/20/2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6032: Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-13T15:00:00
Summary
Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user cross-origin data via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6032 vulnerability.
References
- https://crbug.com/787103
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6042: Incorrect security UI in Omnibox in Google Chrome prior to 64.0.3282.119 allowed a remote…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-15T18:38:00
Summary
Incorrect security UI in Omnibox in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6042 vulnerability.
References
- https://crbug.com/773930
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6046: Insufficient data validation in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-15T15:39:00
Summary
Insufficient data validation in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user cross-origin data via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6046 vulnerability.
References
- https://crbug.com/798163
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6041: Incorrect security UI in navigation in Google Chrome prior to 64.0.3282.119 allowed a remote…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-15T18:40:00
Summary
Incorrect security UI in navigation in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6041 vulnerability.
References
- https://crbug.com/760342
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6033: Insufficient data validation in Downloads in Google Chrome prior to 64.0.3282.119 allowed a…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-20T18:11:00
Summary
Insufficient data validation in Downloads in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially run arbitrary code outside sandbox via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6033 vulnerability.
References
- https://crbug.com/793620
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6052: Lack of support for a non standard no-referrer policy value in Blink in Google Chrome prior to…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-20T17:45:00
Summary
Lack of support for a non standard no-referrer policy value in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to obtain referrer details from a web page that had thought it had opted out of sending referrer data.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6052 vulnerability.
References
- https://crbug.com/615608
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6049: Incorrect security UI in permissions prompt in Google Chrome prior to 64.0.3282.119 allowed a…
Published: 2018-09-25T14:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect security UI in permissions prompt in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the origin to which permission is granted via a crafted HTML page.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6049 vulnerability.
References
- https://crbug.com/774438
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6040: Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote…
Published: 2018-09-25T14:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially bypass content security policy via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6040 vulnerability.
References
- https://crbug.com/778658
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6054: Use after free in WebUI in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-20T17:02:00
Summary
Use after free in WebUI in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6054 vulnerability.
References
- https://crbug.com/797511
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6051: XSS Auditor in Google Chrome prior to 64.0.3282.119, did not ensure the reporting URL was in the…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-15T18:31:00
Summary
XSS Auditor in Google Chrome prior to 64.0.3282.119, did not ensure the reporting URL was in the same origin as the page it was on, which allowed a remote attacker to obtain referrer details via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6051 vulnerability.
References
- https://crbug.com/441275
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6031: Use after free in PDFium in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-20T17:34:00
Summary
Use after free in PDFium in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6031 vulnerability.
References
- https://crbug.com/780450
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6039: Insufficient data validation in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-15T15:41:00
Summary
Insufficient data validation in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user cross-origin data via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6039 vulnerability.
References
- https://crbug.com/775527
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6037: Inappropriate implementation in autofill in Google Chrome prior to 64.0.3282.119 allowed a remote…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-15T14:18:00
Summary
Inappropriate implementation in autofill in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to obtain autofill data with insufficient user gestures via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6037 vulnerability.
References
- https://crbug.com/753645
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6034: Insufficient data validation in WebGL in Google Chrome prior to 64.0.3282.119 allowed a remote…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-13T16:38:00
Summary
Insufficient data validation in WebGL in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6034 vulnerability.
References
- https://crbug.com/784183
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6048: Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-20T18:10:00
Summary
Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak referrer information via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6048 vulnerability.
References
- https://crbug.com/763194
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6038: Heap buffer overflow in WebGL in Google Chrome prior to 64.0.3282.119 allowed a remote attacker…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-15T19:22:00
Summary
Heap buffer overflow in WebGL in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6038 vulnerability.
References
- https://crbug.com/774174
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6036: Insufficient data validation in V8 in Google Chrome prior to 64.0.3282.119 allowed a remote…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-15T19:16:00
Summary
Insufficient data validation in V8 in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user data via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6036 vulnerability.
References
- https://crbug.com/789952
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6047: Insufficient policy enforcement in WebGL in Google Chrome prior to 64.0.3282.119 allowed a remote…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-20T18:03:00
Summary
Insufficient policy enforcement in WebGL in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user redirect URL via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6047 vulnerability.
References
- https://crbug.com/799847
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6043: Insufficient data validation in External Protocol Handler in Google Chrome prior to 64.0.3282.119…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-15T18:13:00
Summary
Insufficient data validation in External Protocol Handler in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially execute arbitrary programs on user machine via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6043 vulnerability.
References
- https://crbug.com/785809
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6053: Inappropriate implementation in New Tab Page in Google Chrome prior to 64.0.3282.119 allowed a…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-20T17:36:00
Summary
Inappropriate implementation in New Tab Page in Google Chrome prior to 64.0.3282.119 allowed a local attacker to view website thumbnail images after clearing browser data via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6053 vulnerability.
References
- https://crbug.com/758169
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6035: Insufficient policy enforcement in DevTools in Google Chrome prior to 64.0.3282.119 allowed a…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-15T14:22:00
Summary
Insufficient policy enforcement in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user local file data via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6035 vulnerability.
References
- https://crbug.com/797500
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6045: Insufficient policy enforcement in DevTools in Google Chrome prior to 64.0.3282.119 allowed a…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-15T14:12:00
Summary
Insufficient policy enforcement in DevTools in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user local file data via a crafted Chrome Extension.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6045 vulnerability.
References
- https://crbug.com/797497
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6050: Incorrect security UI in Omnibox in Google Chrome prior to 64.0.3282.119 allowed a remote…
Published: 2018-09-25T14:29:00 Last Modified: 2018-11-20T17:46:00
Summary
Incorrect security UI in Omnibox in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6050 vulnerability.
References
- https://crbug.com/774842
- https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html
- https://www.debian.org/security/2018/dsa-4103
- https://access.redhat.com/errata/RHSA-2018:0265
- http://www.securitytracker.com/id/1040282
- http://www.securityfocus.com/bid/102797
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-15967: Adobe Flash Player versions 30.0.0.154 and earlier have a privilege escalation vulnerability….
Published: 2018-09-25T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Adobe Flash Player versions 30.0.0.154 and earlier have a privilege escalation vulnerability. Successful exploitation could lead to information disclosure.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-15967 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-31.html
- https://access.redhat.com/errata/RHSA-2018:2707
- http://www.securitytracker.com/id/1041620
- http://www.securityfocus.com/bid/105315
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14647: Python’s elementtree C accelerator failed to initialise Expat’s hash salt during initialization….
Published: 2018-09-25T00:29:00 Last Modified: 2020-07-29T12:15:00
Summary
Python’s elementtree C accelerator failed to initialise Expat’s hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat’s internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.
Common Weakness Enumeration (CWE): CWE-909: Missing Initialization of Resource
CWE Description: The software does not initialize a critical resource.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14647 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14647
- https://bugs.python.org/issue34623
- http://www.securityfocus.com/bid/105396
- https://www.debian.org/security/2018/dsa-4306
- https://www.debian.org/security/2018/dsa-4307
- http://www.securitytracker.com/id/1041740
- https://usn.ubuntu.com/3817-1/
- https://usn.ubuntu.com/3817-2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBJCB2HWOJLP3L7CUQHJHNBHLSVOXJE5/
- https://access.redhat.com/errata/RHSA-2019:1260
- https://lists.debian.org/debian-lts-announce/2019/06/msg00023.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00022.html
- https://access.redhat.com/errata/RHSA-2019:2030
- https://access.redhat.com/errata/RHSA-2019:3725
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in…
Published: 2018-09-25T00:29:00 Last Modified: 2020-10-15T13:28:00
Summary
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target’s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 8.5
- Exploitability Score: 8.6
- CVSS: 8.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14633 vulnerability.
References
- https://seclists.org/oss-sec/2018/q3/270
- https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=8c39e2699f8acb2e29782a834e56306da24937fe
- https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=1816494330a83f2a064499d8ed2797045641f92c
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14633
- http://www.securityfocus.com/bid/105388
- https://www.debian.org/security/2018/dsa-4308
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3776-2/
- https://usn.ubuntu.com/3776-1/
- https://usn.ubuntu.com/3775-2/
- https://usn.ubuntu.com/3779-1/
- https://usn.ubuntu.com/3775-1/
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://usn.ubuntu.com/3777-3/
- https://access.redhat.com/errata/RHSA-2018:3666
- https://access.redhat.com/errata/RHSA-2018:3651
- https://access.redhat.com/errata/RHSA-2019:1946
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14645: A flaw was discovered in the HPACK decoder of HAProxy, before 1.8.14, that is used for HTTP/2. An…
Published: 2018-09-21T13:29:00 Last Modified: 2019-07-23T08:15:00
Summary
A flaw was discovered in the HPACK decoder of HAProxy, before 1.8.14, that is used for HTTP/2. An out-of-bounds read access in hpack_valid_idx() resulted in a remote crash and denial of service.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14645 vulnerability.
References
- https://www.mail-archive.com/haproxy@formilux.org/msg31253.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14645
- https://usn.ubuntu.com/3780-1/
- https://access.redhat.com/errata/RHSA-2018:2882
- https://access.redhat.com/errata/RHBA-2019:0028
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-17183: Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be…
Published: 2018-09-19T15:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Artifex Ghostscript before 9.25 allowed a user-writable error exception table, which could be used by remote attackers able to supply crafted PostScript to potentially overwrite or replace error handlers to inject code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-17183 vulnerability.
References
- https://bugs.ghostscript.com/show_bug.cgi?id=699708
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=fb713b3818b52d8a6cf62c951eba2e1795ff9624
- https://lists.debian.org/debian-lts-announce/2018/09/msg00038.html
- https://usn.ubuntu.com/3773-1/
- https://access.redhat.com/errata/RHSA-2018:3834
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15705: A denial of service vulnerability was identified that exists in Apache SpamAssassin before 3.4.2….
Published: 2018-09-17T14:29:00 Last Modified: 2018-12-16T11:29:00
Summary
A denial of service vulnerability was identified that exists in Apache SpamAssassin before 3.4.2. The vulnerability arises with certain unclosed tags in emails that cause markup to be handled incorrectly leading to scan timeouts. In Apache SpamAssassin, using HTML::Parser, we setup an object and hook into the begin and end tag event handlers In both cases, the “open” event is immediately followed by a “close” event - even if the tag does not close in the HTML being parsed. Because of this, we are missing the “text” event to deal with the object normally. This can cause carefully crafted emails that might take more scan time than expected leading to a Denial of Service. The issue is possibly a bug or design decision in HTML::Parser that specifically impacts the way Apache SpamAssassin uses the module with poorly formed html. The exploit has been seen in the wild but not believed to have been purposefully part of a Denial of Service attempt. We are concerned that there may be attempts to abuse the vulnerability in the future.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15705 vulnerability.
References
- https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E
- http://www.securityfocus.com/bid/105347
- https://access.redhat.com/errata/RHSA-2018:2916
- https://usn.ubuntu.com/3811-1/
- https://usn.ubuntu.com/3811-2/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
- https://security.gentoo.org/glsa/201812-07
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-11781: Apache SpamAssassin 3.4.2 fixes a local user code injection in the meta rule syntax.
Published: 2018-09-17T14:29:00 Last Modified: 2019-08-06T21:15:00
Summary
Apache SpamAssassin 3.4.2 fixes a local user code injection in the meta rule syntax.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-11781 vulnerability.
References
- https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:2916
- https://usn.ubuntu.com/3811-1/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
- https://usn.ubuntu.com/3811-3/
- https://security.gentoo.org/glsa/201812-07
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14638: A flaw was found in 389-ds-base before version 1.3.8.4-13. The process ns-slapd crashes in…
Published: 2018-09-14T19:29:00 Last Modified: 2019-10-09T23:35:00
Summary
A flaw was found in 389-ds-base before version 1.3.8.4-13. The process ns-slapd crashes in delete_passwdPolicy function when persistent search connections are terminated unexpectedly leading to remote denial of service.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14638 vulnerability.
References
- https://pagure.io/389-ds-base/c/78fc627accacfa4061ce48977e22301f81ea8d73
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14638
- https://access.redhat.com/errata/RHSA-2018:2757
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7056: A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user…
Published: 2018-09-10T16:29:00 Last Modified: 2019-10-09T23:19:00
Summary
A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
Common Weakness Enumeration (CWE): CWE-320: Key Management Errors
CWE Description: Weaknesses in this category are related to errors in the management of cryptographic keys.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-7056 vulnerability.
References
- https://seclists.org/oss-sec/2017/q1/52
- https://git.openssl.org/?p=openssl.git;a=commit;h=8aed2a7548362e88e84a7feb795a3a97e8395008
- https://eprint.iacr.org/2016/1195
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7056
- https://www.debian.org/security/2017/dsa-3773
- https://access.redhat.com/errata/RHSA-2017:1802
- https://access.redhat.com/errata/RHSA-2017:1801
- https://access.redhat.com/errata/RHSA-2017:1414
- https://access.redhat.com/errata/RHSA-2017:1413
- http://www.securitytracker.com/id/1037575
- http://www.securityfocus.com/bid/95375
- http://rhn.redhat.com/errata/RHSA-2017-1415.html
- https://security-tracker.debian.org/tracker/CVE-2016-7056
- https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7056.html
- https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/016_libcrypto.patch.sig
- https://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/033_libcrypto.patch.sig
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16802: An issue was discovered in Artifex Ghostscript before 9.25. Incorrect “restoration of privilege”…
Published: 2018-09-10T16:29:00 Last Modified: 2019-10-03T00:03:00
Summary
An issue was discovered in Artifex Ghostscript before 9.25. Incorrect “restoration of privilege” checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the “pipe” instruction. This is due to an incomplete fix for CVE-2018-16509.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16802 vulnerability.
References
- https://seclists.org/oss-sec/2018/q3/229
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=643b24dbd002fb9c131313253c307cf3951b3d47
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3e5d316b72e3965b7968bb1d96baa137cd063ac6
- https://seclists.org/oss-sec/2018/q3/228
- https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5812b1b78fc4d36fdc293b7859de69241140d590
- https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- https://www.debian.org/security/2018/dsa-4294
- https://usn.ubuntu.com/3768-1/
- https://security.gentoo.org/glsa/201811-12
- https://access.redhat.com/errata/RHSA-2018:3834
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7035: An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its…
Published: 2018-09-10T16:29:00 Last Modified: 2019-10-09T23:19:00
Summary
An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.
Common Weakness Enumeration (CWE): CWE-285: Improper Authorization
CWE Description: The software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-7035 vulnerability.
References
- https://lists.clusterlabs.org/pipermail/users/2016-November/004432.html
- https://github.com/ClusterLabs/pacemaker/commit/5d71e65049
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7035
- http://www.openwall.com/lists/oss-security/2016/11/03/5
- https://security.gentoo.org/glsa/201710-08
- http://www.securityfocus.com/bid/94214
- http://rhn.redhat.com/errata/RHSA-2016-2675.html
- http://rhn.redhat.com/errata/RHSA-2016-2614.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5391: The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of…
Published: 2018-09-06T21:29:00 Last Modified: 2019-03-21T16:00:00
Summary
The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5391 vulnerability.
References
- https://www.kb.cert.org/vuls/id/641765
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=c30f1fc041b74ecdb072dd44f858750414b8b19f
- https://www.debian.org/security/2018/dsa-4272
- https://usn.ubuntu.com/3742-2/
- https://usn.ubuntu.com/3742-1/
- https://usn.ubuntu.com/3741-2/
- https://usn.ubuntu.com/3741-1/
- https://usn.ubuntu.com/3740-2/
- https://usn.ubuntu.com/3740-1/
- https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
- http://www.securitytracker.com/id/1041476
- http://www.securityfocus.com/bid/105108
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
- http://www.securitytracker.com/id/1041637
- https://access.redhat.com/errata/RHSA-2018:2791
- https://access.redhat.com/errata/RHSA-2018:2785
- https://security.netapp.com/advisory/ntap-20181003-0002/
- https://access.redhat.com/errata/RHSA-2018:2846
- https://access.redhat.com/errata/RHSA-2018:2933
- https://access.redhat.com/errata/RHSA-2018:2925
- https://access.redhat.com/errata/RHSA-2018:2924
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2018:3459
- https://access.redhat.com/errata/RHSA-2018:3590
- https://access.redhat.com/errata/RHSA-2018:3586
- https://access.redhat.com/errata/RHSA-2018:3540
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- http://www.openwall.com/lists/oss-security/2019/06/28/2
- http://www.openwall.com/lists/oss-security/2019/07/06/3
- http://www.openwall.com/lists/oss-security/2019/07/06/4
- https://support.f5.com/csp/article/K74374841?utm_source=f5support&utm_medium=RSS
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-linux-en
- https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14624: A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16….
Published: 2018-09-06T14:29:00 Last Modified: 2019-05-15T21:29:00
Summary
A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modifications to a very large DN, which would cause slapd to crash.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14624 vulnerability.
References
- https://pagure.io/389-ds-base/issue/49937
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14624
- https://access.redhat.com/errata/RHSA-2018:2757
- https://lists.debian.org/debian-lts-announce/2018/09/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00033.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14618: curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The…
Published: 2018-09-05T19:29:00 Last Modified: 2019-04-22T17:48:00
Summary
curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14618 vulnerability.
References
- https://curl.haxx.se/docs/CVE-2018-14618.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618
- https://www.debian.org/security/2018/dsa-4286
- http://www.securitytracker.com/id/1041605
- https://usn.ubuntu.com/3765-1/
- https://usn.ubuntu.com/3765-2/
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014
- https://access.redhat.com/errata/RHSA-2018:3558
- https://security.gentoo.org/glsa/201903-03
- https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
- https://access.redhat.com/errata/RHSA-2019:1880
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16542: In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use…
Published: 2018-09-05T18:29:00 Last Modified: 2020-08-24T17:37:00
Summary
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16542 vulnerability.
References
- https://bugs.ghostscript.com/show_bug.cgi?id=699668
- http://seclists.org/oss-sec/2018/q3/182
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b575e1ec42cc86f6a58c603f2a88fcc2af699cc8
- https://www.debian.org/security/2018/dsa-4288
- https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- http://www.securityfocus.com/bid/105337
- https://usn.ubuntu.com/3768-1/
- https://access.redhat.com/errata/RHSA-2018:2918
- https://security.gentoo.org/glsa/201811-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16540: In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the…
Published: 2018-09-05T18:29:00 Last Modified: 2019-04-25T14:28:00
Summary
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16540 vulnerability.
References
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://bugs.ghostscript.com/show_bug.cgi?id=699661
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c432131c3fdb2143e148e8ba88555f7f7a63b25e
- https://www.debian.org/security/2018/dsa-4288
- https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- https://usn.ubuntu.com/3768-1/
- https://security.gentoo.org/glsa/201811-12
- https://access.redhat.com/errata/RHSA-2019:0229
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16539: In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use…
Published: 2018-09-05T18:29:00 Last Modified: 2019-03-07T15:57:00
Summary
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16539 vulnerability.
References
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://bugs.ghostscript.com/show_bug.cgi?id=699658
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=a054156d425b4dbdaaa9fda4b5f1182b27598c2b
- https://www.debian.org/security/2018/dsa-4288
- https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- https://usn.ubuntu.com/3768-1/
- https://security.gentoo.org/glsa/201811-12
- https://access.redhat.com/errata/RHSA-2018:3650
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16541: In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use…
Published: 2018-09-05T18:29:00 Last Modified: 2019-03-07T16:06:00
Summary
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16541 vulnerability.
References
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://bugs.ghostscript.com/show_bug.cgi?id=699664
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d
- https://www.debian.org/security/2018/dsa-4288
- https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- https://usn.ubuntu.com/3768-1/
- https://security.gentoo.org/glsa/201811-12
- https://access.redhat.com/errata/RHSA-2018:3834
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16509: An issue was discovered in Artifex Ghostscript before 9.24. Incorrect “restoration of privilege”…
Published: 2018-09-05T06:29:00 Last Modified: 2019-10-03T00:03:00
Summary
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect “restoration of privilege” checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the “pipe” instruction.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-16509 vulnerability.
References
- https://www.artifex.com/news/ghostscript-security-resolved/
- http://seclists.org/oss-sec/2018/q3/142
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486a6595c43f1de1cd7ade696020a31
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=78911a01b67d590b4a91afac2e8417360b934156
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5516c614dc33662a2afdc377159f70218e67bde5
- https://bugs.ghostscript.com/show_bug.cgi?id=699654
- http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=520bb0ea7519aa3e79db78aaf0589dae02103764
- https://www.exploit-db.com/exploits/45369/
- https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- https://www.debian.org/security/2018/dsa-4294
- https://usn.ubuntu.com/3768-1/
- https://access.redhat.com/errata/RHSA-2018:2918
- http://www.securityfocus.com/bid/105122
- https://security.gentoo.org/glsa/201811-12
- https://access.redhat.com/errata/RHSA-2018:3760
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16511: An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in “ztype” could be…
Published: 2018-09-05T06:29:00 Last Modified: 2019-03-11T16:59:00
Summary
An issue was discovered in Artifex Ghostscript before 9.24. A type confusion in “ztype” could be used by remote attackers able to supply crafted PostScript to crash the interpreter or possibly have unspecified other impact.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16511 vulnerability.
References
- https://www.artifex.com/news/ghostscript-security-resolved/
- http://seclists.org/oss-sec/2018/q3/182
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0edd3d6c634a577db261615a9dc2719bca7f6e01
- https://bugs.ghostscript.com/show_bug.cgi?id=699659
- https://www.debian.org/security/2018/dsa-4288
- https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- https://usn.ubuntu.com/3768-1/
- https://security.gentoo.org/glsa/201811-12
- https://access.redhat.com/errata/RHSA-2018:3650
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10930: A flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated…
Published: 2018-09-04T16:29:00 Last Modified: 2021-12-10T19:41:00
Summary
A flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated attacker could use this flaw to write to a destination outside the gluster volume.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10930 vulnerability.
References
- https://review.gluster.org/#/c/glusterfs/+/21068/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10930
- https://access.redhat.com/errata/RHSA-2018:2608
- https://access.redhat.com/errata/RHSA-2018:2607
- https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10929: A flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated…
Published: 2018-09-04T16:29:00 Last Modified: 2021-11-17T22:16:00
Summary
A flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated attacker could use this flaw to create arbitrary files and execute arbitrary code on glusterfs server nodes.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10929 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10929
- https://access.redhat.com/errata/RHSA-2018:2608
- https://access.redhat.com/errata/RHSA-2018:2607
- https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:3470
- http://www.securityfocus.com/bid/107577
- https://security.gentoo.org/glsa/201904-06
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10928: A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink…
Published: 2018-09-04T15:29:00 Last Modified: 2021-11-17T22:16:00
Summary
A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10928 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10928
- https://access.redhat.com/errata/RHSA-2018:2608
- https://access.redhat.com/errata/RHSA-2018:2607
- https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10926: A flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An…
Published: 2018-09-04T15:29:00 Last Modified: 2021-11-17T22:16:00
Summary
A flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10926 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10926
- https://access.redhat.com/errata/RHSA-2018:2608
- https://access.redhat.com/errata/RHSA-2018:2607
- https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10927: A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated…
Published: 2018-09-04T15:29:00 Last Modified: 2021-11-17T22:16:00
Summary
A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.0
- CVSS: 5.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10927 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10927
- https://access.redhat.com/errata/RHSA-2018:2608
- https://access.redhat.com/errata/RHSA-2018:2607
- https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10911: A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key…
Published: 2018-09-04T14:29:00 Last Modified: 2021-11-17T22:16:00
Summary
A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.
Common Weakness Enumeration (CWE): CWE-502: Deserialization of Untrusted Data
CWE Description: The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10911 vulnerability.
References
- https://review.gluster.org/#/c/glusterfs/+/21067/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10911
- https://access.redhat.com/errata/RHSA-2018:2608
- https://access.redhat.com/errata/RHSA-2018:2607
- https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:2892
- https://access.redhat.com/errata/RHSA-2018:3242
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10914: It was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster…
Published: 2018-09-04T14:29:00 Last Modified: 2021-11-17T22:16:00
Summary
It was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks and gluster volumes.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10914 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10914
- https://access.redhat.com/errata/RHSA-2018:2608
- https://access.redhat.com/errata/RHSA-2018:2607
- https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10923: It was found that the “mknod” call derived from mknod(2) can create files pointing to devices on…
Published: 2018-09-04T14:29:00 Last Modified: 2021-11-17T22:16:00
Summary
It was found that the “mknod” call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.0
- CVSS: 5.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10923 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10923
- https://access.redhat.com/errata/RHSA-2018:2608
- https://access.redhat.com/errata/RHSA-2018:2607
- https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10913: An information disclosure vulnerability was discovered in glusterfs server. An attacker could…
Published: 2018-09-04T14:29:00 Last Modified: 2021-11-17T22:16:00
Summary
An information disclosure vulnerability was discovered in glusterfs server. An attacker could issue a xattr request via glusterfs FUSE to determine the existence of any file.
Common Weakness Enumeration (CWE): CWE-209: Generation of Error Message Containing Sensitive Information
CWE Description: The software generates an error message that includes sensitive information about its environment, users, or associated data.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10913 vulnerability.
References
- https://review.gluster.org/#/c/glusterfs/+/21071/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10913
- https://access.redhat.com/errata/RHSA-2018:2608
- https://access.redhat.com/errata/RHSA-2018:2607
- https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10907: It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to…
Published: 2018-09-04T13:29:00 Last Modified: 2021-12-16T18:49:00
Summary
It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using ‘alloca(3)’. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
Common Weakness Enumeration (CWE): CWE-121: Stack-based Buffer Overflow
CWE Description: A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10907 vulnerability.
References
- https://review.gluster.org/#/c/glusterfs/+/21070/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10907
- https://access.redhat.com/errata/RHSA-2018:2608
- https://access.redhat.com/errata/RHSA-2018:2607
- https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10904: It was found that glusterfs server does not properly sanitize file paths in the “trusted.io-…
Published: 2018-09-04T13:29:00 Last Modified: 2021-11-17T22:16:00
Summary
It was found that glusterfs server does not properly sanitize file paths in the “trusted.io-stats-dump” extended attribute which is used by the “debug/io-stats” translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
Common Weakness Enumeration (CWE): CWE-426: Untrusted Search Path
CWE Description: The application searches for critical resources using an externally-supplied search path that can point to resources that are not under the application’s direct control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10904 vulnerability.
References
- https://review.gluster.org/#/c/glusterfs/+/21072/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10904
- https://access.redhat.com/errata/RHSA-2018:2608
- https://access.redhat.com/errata/RHSA-2018:2607
- https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:3470
- https://security.gentoo.org/glsa/201904-06
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16435: Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the…
Published: 2018-09-04T00:29:00 Last Modified: 2021-05-26T11:15:00
Summary
Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16435 vulnerability.
References
- https://github.com/mm2/Little-CMS/issues/171
- https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8
- https://www.debian.org/security/2018/dsa-4284
- https://lists.debian.org/debian-lts-announce/2018/09/msg00005.html
- https://usn.ubuntu.com/3770-2/
- https://usn.ubuntu.com/3770-1/
- https://access.redhat.com/errata/RHSA-2018:3004
- https://security.gentoo.org/glsa/202105-18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16402: libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double…
Published: 2018-09-03T19:29:00 Last Modified: 2021-11-30T22:13:00
Summary
libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16402 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=23528
- https://usn.ubuntu.com/4012-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://access.redhat.com/errata/RHSA-2019:2197
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10936: A weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL…
Published: 2018-08-30T13:29:00 Last Modified: 2020-10-15T13:28:00
Summary
A weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver. This could lead to a condition where a man-in-the-middle attacker could masquerade as a trusted server by providing a certificate for the wrong host, as long as it was signed by a trusted CA.
Common Weakness Enumeration (CWE): CWE-297: Improper Validation of Certificate with Host Mismatch
CWE Description: The software communicates with a host that provides a certificate, but the software does not properly ensure that the certificate is actually associated with that host.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10936 vulnerability.
References
- https://www.postgresql.org/about/news/1883/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10936
- http://www.securityfocus.com/bid/105220
- https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14622: A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The…
Published: 2018-08-30T13:29:00 Last Modified: 2020-12-04T18:15:00
Summary
A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file descriptors. A remote attacker could cause an rpc-based application to crash by flooding it with new connections.
Common Weakness Enumeration (CWE): CWE-252: Unchecked Return Value
CWE Description: The software does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14622 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14622
- https://bugzilla.novell.com/show_bug.cgi?id=968175
- http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1c77f7a869bdea2a34799d774460d1f9983d45f0
- https://access.redhat.com/errata/RHBA-2017:1991
- https://lists.debian.org/debian-lts-announce/2018/08/msg00034.html
- https://usn.ubuntu.com/3759-2/
- https://usn.ubuntu.com/3759-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12824: Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful…
Published: 2018-08-29T13:29:00 Last Modified: 2018-10-29T20:23:00
Summary
Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12824 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-25.html
- https://access.redhat.com/errata/RHSA-2018:2435
- http://www.securitytracker.com/id/1041448
- http://www.securityfocus.com/bid/105066
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12825: Adobe Flash Player 30.0.0.134 and earlier have a security bypass vulnerability. Successful…
Published: 2018-08-29T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Adobe Flash Player 30.0.0.134 and earlier have a security bypass vulnerability. Successful exploitation could lead to security mitigation bypass.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12825 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-25.html
- https://access.redhat.com/errata/RHSA-2018:2435
- http://www.securitytracker.com/id/1041448
- http://www.securityfocus.com/bid/105070
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12826: Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful…
Published: 2018-08-29T13:29:00 Last Modified: 2018-10-30T14:59:00
Summary
Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12826 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-25.html
- https://access.redhat.com/errata/RHSA-2018:2435
- http://www.securitytracker.com/id/1041448
- http://www.securityfocus.com/bid/105066
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12827: Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful…
Published: 2018-08-29T13:29:00 Last Modified: 2018-10-30T14:54:00
Summary
Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-12827 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-25.html
- https://www.exploit-db.com/exploits/45268/
- https://access.redhat.com/errata/RHSA-2018:2435
- http://www.securitytracker.com/id/1041448
- http://www.securityfocus.com/bid/105066
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12828: Adobe Flash Player 30.0.0.134 and earlier have a “use of a component with a known vulnerability”…
Published: 2018-08-29T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Adobe Flash Player 30.0.0.134 and earlier have a “use of a component with a known vulnerability” vulnerability. Successful exploitation could lead to privilege escalation.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12828 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-25.html
- https://access.redhat.com/errata/RHSA-2018:2435
- http://www.securitytracker.com/id/1041448
- http://www.securityfocus.com/bid/105071
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-16062: dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote…
Published: 2018-08-29T03:29:00 Last Modified: 2021-11-30T21:58:00
Summary
dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-16062 vulnerability.
References
- https://sourceware.org/git/?p=elfutils.git;a=commit;h=29e31978ba51c1051743a503ee325b5ebc03d7e9
- https://sourceware.org/bugzilla/show_bug.cgi?id=23541
- https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
- https://usn.ubuntu.com/4012-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
- https://access.redhat.com/errata/RHSA-2019:2197
- https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15398: A stack buffer overflow in the QUIC networking stack in Google Chrome prior to 62.0.3202.89…
Published: 2018-08-28T20:29:00 Last Modified: 2018-11-07T18:32:00
Summary
A stack buffer overflow in the QUIC networking stack in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to gain code execution via a malicious server.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15398 vulnerability.
References
- https://crbug.com/777728
- https://chromereleases.googleblog.com/2017/11/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4024
- https://security.gentoo.org/glsa/201711-02
- https://access.redhat.com/errata/RHSA-2017:3151
- http://www.securityfocus.com/bid/101692
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15396: A stack buffer overflow in NumberingSystem in International Components for Unicode (ICU) for…
Published: 2018-08-28T20:29:00 Last Modified: 2018-11-07T19:33:00
Summary
A stack buffer overflow in NumberingSystem in International Components for Unicode (ICU) for C/C++ before 60.2, as used in V8 in Google Chrome prior to 62.0.3202.75 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15396 vulnerability.
References
- https://crbug.com/770452
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop_26.html
- http://bugs.icu-project.org/trac/changeset/40494
- https://www.debian.org/security/2017/dsa-4020
- https://security.gentoo.org/glsa/201711-02
- https://access.redhat.com/errata/RHSA-2017:3082
- http://www.securityfocus.com/bid/101597
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15399: A use after free in V8 in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to…
Published: 2018-08-28T20:29:00 Last Modified: 2018-11-07T19:22:00
Summary
A use after free in V8 in Google Chrome prior to 62.0.3202.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15399 vulnerability.
References
- https://crbug.com/776677
- https://chromereleases.googleblog.com/2017/11/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4024
- https://security.gentoo.org/glsa/201711-02
- https://access.redhat.com/errata/RHSA-2017:3151
- http://www.securityfocus.com/bid/101692
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15429: Inappropriate implementation in V8 WebAssembly JS bindings in Google Chrome prior to…
Published: 2018-08-28T20:29:00 Last Modified: 2018-11-07T19:02:00
Summary
Inappropriate implementation in V8 WebAssembly JS bindings in Google Chrome prior to 63.0.3239.108 allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15429 vulnerability.
References
- https://crbug.com/788453
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop_14.html
- https://www.debian.org/security/2018/dsa-4103
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3479
- http://www.securityfocus.com/bid/102196
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15407: Out-of-bounds Write in the QUIC networking stack in Google Chrome prior to 63.0.3239.84 allowed a…
Published: 2018-08-28T19:29:00 Last Modified: 2018-11-20T18:13:00
Summary
Out-of-bounds Write in the QUIC networking stack in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to gain code execution via a malicious server.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15407 vulnerability.
References
- https://crbug.com/778505
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15413: Type confusion in WebAssembly in V8 in Google Chrome prior to 63.0.3239.84 allowed a remote…
Published: 2018-08-28T19:29:00 Last Modified: 2018-10-25T01:59:00
Summary
Type confusion in WebAssembly in V8 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15413 vulnerability.
References
- https://crbug.com/766666
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15410: Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to…
Published: 2018-08-28T19:29:00 Last Modified: 2018-10-30T16:48:00
Summary
Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15410 vulnerability.
References
- https://crbug.com/765921
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15417: Inappropriate implementation in Skia canvas composite operations in Google Chrome prior to…
Published: 2018-08-28T19:29:00 Last Modified: 2018-11-07T18:01:00
Summary
Inappropriate implementation in Skia canvas composite operations in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15417 vulnerability.
References
- https://crbug.com/699028
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15415: Incorrect serialization in IPC in Google Chrome prior to 63.0.3239.84 allowed a remote attacker…
Published: 2018-08-28T19:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Incorrect serialization in IPC in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the value of a pointer via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15415 vulnerability.
References
- https://crbug.com/765512
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15420: Incorrect handling of back navigations in error pages in Navigation in Google Chrome prior to…
Published: 2018-08-28T19:29:00 Last Modified: 2019-01-09T19:29:00
Summary
Incorrect handling of back navigations in error pages in Navigation in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15420 vulnerability.
References
- https://crbug.com/777419
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4103
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
- http://www.securitytracker.com/id/1040282
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15411: Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to…
Published: 2018-08-28T19:29:00 Last Modified: 2018-10-30T16:48:00
Summary
Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15411 vulnerability.
References
- https://crbug.com/770148
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15424: Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a…
Published: 2018-08-28T19:29:00 Last Modified: 2018-10-30T16:47:00
Summary
Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15424 vulnerability.
References
- https://crbug.com/756226
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15427: Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a…
Published: 2018-08-28T19:29:00 Last Modified: 2018-11-02T17:34:00
Summary
Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15427 vulnerability.
References
- https://crbug.com/768910
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15409: Heap buffer overflow in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to…
Published: 2018-08-28T19:29:00 Last Modified: 2018-10-31T15:59:00
Summary
Heap buffer overflow in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15409 vulnerability.
References
- https://crbug.com/763972
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15408: Heap buffer overflow in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker…
Published: 2018-08-28T19:29:00 Last Modified: 2018-10-31T16:00:00
Summary
Heap buffer overflow in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file that is mishandled by PDFium.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15408 vulnerability.
References
- https://crbug.com/762374
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15416: Heap buffer overflow in Blob API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker…
Published: 2018-08-28T19:29:00 Last Modified: 2018-11-07T17:51:00
Summary
Heap buffer overflow in Blob API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, aka a Blink out-of-bounds read.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15416 vulnerability.
References
- https://crbug.com/779314
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15423: Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a…
Published: 2018-08-28T19:29:00 Last Modified: 2018-11-02T17:37:00
Summary
Inappropriate implementation in BoringSSL SPAKE2 in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to leak the low-order bits of SHA512(password) by inspecting protocol traffic.
Common Weakness Enumeration (CWE): CWE-310: Cryptographic Issues
CWE Description: Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15423 vulnerability.
References
- https://crbug.com/778101
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15425: Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a…
Published: 2018-08-28T19:29:00 Last Modified: 2018-10-30T16:47:00
Summary
Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15425 vulnerability.
References
- https://crbug.com/756456
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15418: Use of uninitialized memory in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote…
Published: 2018-08-28T19:29:00 Last Modified: 2018-10-24T14:30:00
Summary
Use of uninitialized memory in Skia in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15418 vulnerability.
References
- https://crbug.com/765858
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15426: Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a…
Published: 2018-08-28T19:29:00 Last Modified: 2018-10-30T16:47:00
Summary
Insufficient policy enforcement in Omnibox in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15426 vulnerability.
References
- https://crbug.com/756735
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15419: Insufficient policy enforcement in Resource Timing API in Google Chrome prior to 63.0.3239.84…
Published: 2018-08-28T19:29:00 Last Modified: 2018-11-07T14:55:00
Summary
Insufficient policy enforcement in Resource Timing API in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to infer browsing history by triggering a leaked cross-origin URL via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-601: URL Redirection to Untrusted Site (‘Open Redirect’)
CWE Description: A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15419 vulnerability.
References
- https://crbug.com/780312
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2017/dsa-4064
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15412: Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other…
Published: 2018-08-28T19:29:00 Last Modified: 2018-10-25T11:35:00
Summary
Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15412 vulnerability.
References
- https://crbug.com/727039
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://bugzilla.gnome.org/show_bug.cgi?id=783160
- https://www.debian.org/security/2018/dsa-4086
- https://security.gentoo.org/glsa/201801-03
- https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html
- https://access.redhat.com/errata/RHSA-2018:0287
- https://access.redhat.com/errata/RHSA-2017:3401
- http://www.securitytracker.com/id/1040348
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15422: Integer overflow in international date handling in International Components for Unicode (ICU) for…
Published: 2018-08-28T19:29:00 Last Modified: 2018-11-07T17:54:00
Summary
Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15422 vulnerability.
References
- https://crbug.com/774382
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://www.debian.org/security/2018/dsa-4150
- https://usn.ubuntu.com/3610-1/
- https://security.gentoo.org/glsa/201801-03
- https://access.redhat.com/errata/RHSA-2017:3401
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-15911: In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could…
Published: 2018-08-28T04:29:00 Last Modified: 2020-08-24T17:37:00
Summary
In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.
Common Weakness Enumeration (CWE): CWE-908: Use of Uninitialized Resource
CWE Description: The software uses or accesses a resource that has not been initialized.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-15911 vulnerability.
References
- https://www.kb.cert.org/vuls/id/332928
- https://bugs.ghostscript.com/show_bug.cgi?id=699665
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=8e9ce5016db968b40e4ec255a3005f2786cce45f
- https://www.debian.org/security/2018/dsa-4288
- https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- https://usn.ubuntu.com/3768-1/
- http://www.securityfocus.com/bid/105122
- https://security.gentoo.org/glsa/201811-12
- https://access.redhat.com/errata/RHSA-2018:3834
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&utm_medium=RSS
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-15908: In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript…
Published: 2018-08-27T17:29:00 Last Modified: 2019-10-03T00:03:00
Summary
In Artifex Ghostscript 9.23 before 2018-08-23, attackers are able to supply malicious PostScript files to bypass .tempfile restrictions and write files.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-15908 vulnerability.
References
- https://www.kb.cert.org/vuls/id/332928
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3
- https://www.debian.org/security/2018/dsa-4288
- https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- https://usn.ubuntu.com/3768-1/
- https://security.gentoo.org/glsa/201811-12
- https://access.redhat.com/errata/RHSA-2018:3650
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-15909: In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could…
Published: 2018-08-27T17:29:00 Last Modified: 2019-10-16T23:15:00
Summary
In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-15909 vulnerability.
References
- https://www.kb.cert.org/vuls/id/332928
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=e01e77a36cbb2e0277bc3a63852244bec41be0f6
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0b6cd1918e1ec4ffd087400a754a845180a4522b
- http://www.securityfocus.com/bid/105178
- https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- https://usn.ubuntu.com/3768-1/
- https://security.gentoo.org/glsa/201811-12
- https://access.redhat.com/errata/RHSA-2018:3650
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://support.f5.com/csp/article/K24803507?utm_source=f5support&utm_medium=RSS
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-15910: In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a…
Published: 2018-08-27T17:29:00 Last Modified: 2019-11-05T21:15:00
Summary
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-15910 vulnerability.
References
- https://www.kb.cert.org/vuls/id/332928
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c3476dde7743761a4e1d39a631716199b696b880
- https://bugs.ghostscript.com/show_bug.cgi?id=699656
- https://www.debian.org/security/2018/dsa-4288
- https://lists.debian.org/debian-lts-announce/2018/09/msg00015.html
- https://usn.ubuntu.com/3768-1/
- https://access.redhat.com/errata/RHSA-2018:2918
- http://www.securityfocus.com/bid/105122
- https://security.gentoo.org/glsa/201811-12
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&utm_medium=RSS
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2767: mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a…
Published: 2018-08-26T16:29:00 Last Modified: 2019-09-24T18:15:00
Summary
mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator’s control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-2767 vulnerability.
References
- https://mail-archives.apache.org/mod_mbox/perl-modperl/201110.mbox/raw/%3C20111004084343.GA21290%40ktnx.net%3E
- https://bugs.debian.org/644169
- https://lists.debian.org/debian-lts-announce/2018/09/msg00018.html
- https://access.redhat.com/errata/RHSA-2018:2737
- https://access.redhat.com/errata/RHSA-2018:2826
- https://access.redhat.com/errata/RHSA-2018:2825
- http://www.securityfocus.com/bid/105195
- https://usn.ubuntu.com/3825-1/
- https://usn.ubuntu.com/3825-2/
- https://lists.apache.org/thread.html/c8ebe8aad147a3ad2e7b0e8b2da45263171ab5d0fc7f8c100feaa94d@%3Cmodperl-cvs.perl.apache.org%3E
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00063.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00065.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10858: A heap-buffer overflow was found in the way samba clients processed extra long filename in a…
Published: 2018-08-22T17:29:00 Last Modified: 2019-06-26T08:15:00
Summary
A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10858 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2018-10858.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858
- https://www.debian.org/security/2018/dsa-4271
- https://usn.ubuntu.com/3738-1/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- http://www.securityfocus.com/bid/105085
- https://access.redhat.com/errata/RHSA-2018:2613
- https://access.redhat.com/errata/RHSA-2018:2612
- https://access.redhat.com/errata/RHSA-2018:3056
- https://access.redhat.com/errata/RHSA-2018:3470
- http://www.securitytracker.com/id/1042002
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- https://security.gentoo.org/glsa/202003-52
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1139: A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1…
Published: 2018-08-22T14:29:00 Last Modified: 2019-10-09T23:38:00
Summary
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
Common Weakness Enumeration (CWE): CWE-522: Insufficiently Protected Credentials
CWE Description: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1139 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2018-1139.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139
- https://usn.ubuntu.com/3738-1/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- http://www.securityfocus.com/bid/105084
- https://access.redhat.com/errata/RHSA-2018:2613
- https://access.redhat.com/errata/RHSA-2018:2612
- https://access.redhat.com/errata/RHSA-2018:3056
- https://security.gentoo.org/glsa/202003-52
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10845: It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen…
Published: 2018-08-22T13:29:00 Last Modified: 2020-10-22T13:18:00
Summary
It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
Common Weakness Enumeration (CWE): CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CWE Description: The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10845 vulnerability.
References
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- https://eprint.iacr.org/2018/747
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10845
- http://www.securityfocus.com/bid/105138
- https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html
- https://access.redhat.com/errata/RHSA-2018:3050
- https://access.redhat.com/errata/RHSA-2018:3505
- https://usn.ubuntu.com/3999-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10846: A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM…
Published: 2018-08-22T13:29:00 Last Modified: 2020-10-22T13:19:00
Summary
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of “Just in Time” Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
Common Weakness Enumeration (CWE): CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CWE Description: The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-10846 vulnerability.
References
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- https://eprint.iacr.org/2018/747
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10846
- http://www.securityfocus.com/bid/105138
- https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html
- https://access.redhat.com/errata/RHSA-2018:3050
- https://access.redhat.com/errata/RHSA-2018:3505
- https://usn.ubuntu.com/3999-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10844: It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen…
Published: 2018-08-22T13:29:00 Last Modified: 2020-10-22T13:11:00
Summary
It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
Common Weakness Enumeration (CWE): CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CWE Description: The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10844 vulnerability.
References
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- https://eprint.iacr.org/2018/747
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10844
- http://www.securityfocus.com/bid/105138
- https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html
- https://access.redhat.com/errata/RHSA-2018:3050
- https://access.redhat.com/errata/RHSA-2018:3505
- https://usn.ubuntu.com/3999-1/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10902: It was found that the raw midi kernel driver does not protect against concurrent access which…
Published: 2018-08-21T19:29:00 Last Modified: 2019-10-09T23:33:00
Summary
It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-10902 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39675f7a7c7e7702f7d5341f1e0d01db746543a0
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10902
- http://www.securitytracker.com/id/1041529
- http://www.securityfocus.com/bid/105119
- https://www.debian.org/security/2018/dsa-4308
- https://usn.ubuntu.com/3776-2/
- https://usn.ubuntu.com/3776-1/
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://usn.ubuntu.com/3849-2/
- https://usn.ubuntu.com/3847-3/
- https://usn.ubuntu.com/3847-2/
- https://usn.ubuntu.com/3847-1/
- https://usn.ubuntu.com/3849-1/
- https://access.redhat.com/errata/RHSA-2019:0415
- https://access.redhat.com/errata/RHSA-2019:0641
- https://access.redhat.com/errata/RHSA-2019:3217
- https://access.redhat.com/errata/RHSA-2019:3967
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5160: libvirt before 2.2 includes Ceph credentials on the qemu command line when using RADOS Block…
Published: 2018-08-20T21:29:00 Last Modified: 2020-10-15T13:28:00
Summary
libvirt before 2.2 includes Ceph credentials on the qemu command line when using RADOS Block Device (aka RBD), which allows local users to obtain sensitive information via a process listing.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-5160 vulnerability.
References
- https://wiki.openstack.org/wiki/OSSN/OSSN-0079
- https://bugzilla.redhat.com/show_bug.cgi?id=1245647
- https://bugs.launchpad.net/ossn/+bug/1686743
- http://www.openwall.com/lists/oss-security/2017/07/21/3
- http://rhn.redhat.com/errata/RHSA-2016-2577.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1517: A flaw in the java.math component in IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0 may allow…
Published: 2018-08-20T21:29:00 Last Modified: 2019-10-09T23:38:00
Summary
A flaw in the java.math component in IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0 may allow an attacker to inflict a denial-of-service attack with specially crafted String data. IBM X-Force ID: 141681.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1517 vulnerability.
References
- https://exchange.xforce.ibmcloud.com/vulnerabilities/141681
- http://www.ibm.com/support/docview.wss?uid=ibm10719653
- http://www.securityfocus.com/bid/105117
- https://access.redhat.com/errata/RHSA-2018:2569
- https://access.redhat.com/errata/RHSA-2018:2568
- https://access.redhat.com/errata/RHSA-2018:2576
- https://access.redhat.com/errata/RHSA-2018:2575
- https://access.redhat.com/errata/RHSA-2018:2713
- https://access.redhat.com/errata/RHSA-2018:2712
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1656: The IBM Java Runtime Environment’s Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java…
Published: 2018-08-20T21:29:00 Last Modified: 2019-10-09T23:38:00
Summary
The IBM Java Runtime Environment’s Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1656 vulnerability.
References
- https://exchange.xforce.ibmcloud.com/vulnerabilities/144882
- http://www.ibm.com/support/docview.wss?uid=ibm10719653
- http://www.securityfocus.com/bid/105118
- https://access.redhat.com/errata/RHSA-2018:2569
- https://access.redhat.com/errata/RHSA-2018:2568
- https://access.redhat.com/errata/RHSA-2018:2576
- https://access.redhat.com/errata/RHSA-2018:2575
- https://access.redhat.com/errata/RHSA-2018:2713
- https://access.redhat.com/errata/RHSA-2018:2712
- http://www.securitytracker.com/id/1041765
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-15473: OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for…
Published: 2018-08-17T19:29:00 Last Modified: 2020-08-24T17:37:00
Summary
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 3)
Code designed for conducting penetration testing on CVE-2018-15473 vulnerability.
- OpenSSH < 7.7 - User Enumeration (2) by Leap Security at 2018-12-04
- OpenSSH 2.3 < 7.7 - Username Enumeration by Justin Gardner at 2018-08-21
- OpenSSH 2.3 < 7.7 - Username Enumeration (PoC) by Matthew Daley at 2018-08-16
References
- https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0
- https://bugs.debian.org/906236
- http://www.openwall.com/lists/oss-security/2018/08/15/5
- http://www.securitytracker.com/id/1041487
- https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html
- https://www.exploit-db.com/exploits/45233/
- https://www.exploit-db.com/exploits/45210/
- https://www.debian.org/security/2018/dsa-4280
- http://www.securityfocus.com/bid/105140
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011
- https://security.gentoo.org/glsa/201810-03
- https://security.netapp.com/advisory/ntap-20181101-0001/
- https://usn.ubuntu.com/3809-1/
- https://www.exploit-db.com/exploits/45939/
- https://access.redhat.com/errata/RHSA-2019:0711
- https://access.redhat.com/errata/RHSA-2019:2143
- https://www.oracle.com/security-alerts/cpujan2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10873: A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for…
Published: 2018-08-17T12:29:00 Last Modified: 2019-10-09T23:33:00
Summary
A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10873 vulnerability.
References
- https://gitlab.freedesktop.org/spice/spice-common/commit/bb15d4815ab586b4c4a20f4a565970a44824c42c
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10873
- https://usn.ubuntu.com/3751-1/
- http://www.securityfocus.com/bid/105152
- https://lists.debian.org/debian-lts-announce/2018/08/msg00038.html
- https://lists.debian.org/debian-lts-announce/2018/08/msg00037.html
- https://lists.debian.org/debian-lts-announce/2018/08/msg00035.html
- https://access.redhat.com/errata/RHSA-2018:2732
- https://access.redhat.com/errata/RHSA-2018:2731
- https://www.debian.org/security/2018/dsa-4319
- https://access.redhat.com/errata/RHSA-2018:3470
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10915: A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to…
Published: 2018-08-09T20:29:00 Last Modified: 2021-08-04T17:14:00
Summary
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with “host” or “hostaddr” connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
Common Weakness Enumeration (CWE): CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
CWE Description: The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
Scores
- Impact Score: 6.4
- Exploitability Score: 6.8
- CVSS: 6.0
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10915 vulnerability.
References
- https://www.postgresql.org/about/news/1878/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10915
- https://www.debian.org/security/2018/dsa-4269
- http://www.securityfocus.com/bid/105054
- https://lists.debian.org/debian-lts-announce/2018/08/msg00012.html
- http://www.securitytracker.com/id/1041446
- https://usn.ubuntu.com/3744-1/
- https://access.redhat.com/errata/RHSA-2018:2511
- https://access.redhat.com/errata/RHSA-2018:2557
- https://access.redhat.com/errata/RHSA-2018:2566
- https://access.redhat.com/errata/RHSA-2018:2565
- https://access.redhat.com/errata/RHSA-2018:2643
- https://access.redhat.com/errata/RHSA-2018:2721
- https://access.redhat.com/errata/RHSA-2018:2729
- https://security.gentoo.org/glsa/201810-08
- https://access.redhat.com/errata/RHSA-2018:3816
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue()…
Published: 2018-08-06T20:29:00 Last Modified: 2020-09-18T16:14:00
Summary
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5390 vulnerability.
References
- https://www.kb.cert.org/vuls/id/962459
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e
- https://www.synology.com/support/security/Synology_SA_18_41
- https://www.debian.org/security/2018/dsa-4266
- https://usn.ubuntu.com/3732-2/
- https://usn.ubuntu.com/3732-1/
- http://www.securitytracker.com/id/1041424
- http://www.securityfocus.com/bid/104976
- http://www.securitytracker.com/id/1041434
- https://usn.ubuntu.com/3742-2/
- https://usn.ubuntu.com/3742-1/
- https://usn.ubuntu.com/3741-1/
- https://access.redhat.com/errata/RHSA-2018:2395
- https://access.redhat.com/errata/RHSA-2018:2384
- https://security.netapp.com/advisory/ntap-20180815-0003/
- https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
- https://access.redhat.com/errata/RHSA-2018:2403
- https://access.redhat.com/errata/RHSA-2018:2402
- https://usn.ubuntu.com/3741-2/
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
- https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp
- https://support.f5.com/csp/article/K95343321
- https://access.redhat.com/errata/RHSA-2018:2645
- https://usn.ubuntu.com/3763-1/
- https://access.redhat.com/errata/RHSA-2018:2791
- https://access.redhat.com/errata/RHSA-2018:2790
- https://access.redhat.com/errata/RHSA-2018:2789
- https://access.redhat.com/errata/RHSA-2018:2785
- https://access.redhat.com/errata/RHSA-2018:2776
- https://access.redhat.com/errata/RHSA-2018:2933
- https://access.redhat.com/errata/RHSA-2018:2924
- https://access.redhat.com/errata/RHSA-2018:2948
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- http://www.openwall.com/lists/oss-security/2019/06/28/2
- http://www.openwall.com/lists/oss-security/2019/07/06/3
- http://www.openwall.com/lists/oss-security/2019/07/06/4
- https://support.f5.com/csp/article/K95343321?utm_source=f5support&utm_medium=RSS
- https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1336: An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an…
Published: 2018-08-02T14:29:00 Last Modified: 2020-04-15T21:15:00
Summary
An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86.
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1336 vulnerability.
References
- http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090435.GA60759%40minotaur.apache.org%3E
- https://usn.ubuntu.com/3723-1/
- http://www.securitytracker.com/id/1041375
- http://www.securityfocus.com/bid/104898
- https://access.redhat.com/errata/RHEA-2018:2189
- https://access.redhat.com/errata/RHEA-2018:2188
- https://security.netapp.com/advisory/ntap-20180817-0001/
- https://www.debian.org/security/2018/dsa-4281
- https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html
- https://access.redhat.com/errata/RHSA-2018:2701
- https://access.redhat.com/errata/RHSA-2018:2700
- https://access.redhat.com/errata/RHSA-2018:2743
- https://access.redhat.com/errata/RHSA-2018:2742
- https://access.redhat.com/errata/RHSA-2018:2741
- https://access.redhat.com/errata/RHSA-2018:2740
- https://access.redhat.com/errata/RHSA-2018:2930
- https://access.redhat.com/errata/RHSA-2018:2921
- https://access.redhat.com/errata/RHSA-2018:2945
- https://access.redhat.com/errata/RHSA-2018:2939
- https://access.redhat.com/errata/RHSA-2018:3768
- https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
- https://support.f5.com/csp/article/K73008537?utm_source=f5support&utm_medium=RSS
- https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
- https://www.oracle.com/security-alerts/cpuapr2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-9262: _XcursorThemeInherits in library.c in libXcursor before 1.1.15 allows remote attackers to cause…
Published: 2018-08-01T23:29:00 Last Modified: 2019-04-16T19:08:00
Summary
_XcursorThemeInherits in library.c in libXcursor before 1.1.15 allows remote attackers to cause denial of service or potentially code execution via a one-byte heap overflow.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-9262 vulnerability.
References
- https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=897213f36baf6926daf6d192c709cf627aa5fd05
- https://bugs.freedesktop.org/show_bug.cgi?id=90857
- https://usn.ubuntu.com/3729-1/
- https://lists.debian.org/debian-lts-announce/2018/08/msg00016.html
- https://access.redhat.com/errata/RHSA-2018:3059
- https://access.redhat.com/errata/RHSA-2018:3505
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10897: A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to…
Published: 2018-08-01T17:29:00 Last Modified: 2021-09-09T12:42:00
Summary
A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files. Version 1.1.31 and older are believed to be affected.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10897 vulnerability.
References
- https://github.com/rpm-software-management/yum-utils/pull/43
- https://github.com/rpm-software-management/yum-utils/commit/7554c0133eb830a71dc01846037cc047d0acbc2c
- https://github.com/rpm-software-management/yum-utils/commit/6a8de061f8fdc885e74ebe8c94625bf53643b71c
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10897
- https://access.redhat.com/errata/RHSA-2018:2285
- https://access.redhat.com/errata/RHSA-2018:2284
- https://access.redhat.com/errata/RHSA-2018:2626
- http://www.securitytracker.com/id/1041594
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9583: An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper…
Published: 2018-08-01T17:29:00 Last Modified: 2019-10-09T23:20:00
Summary
An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9583 vulnerability.
References
- https://github.com/mdadams/jasper/commit/f25486c3d4aa472fec79150f2c41ed4333395d3d
- https://github.com/mdadams/jasper/commit/aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9583
- https://access.redhat.com/errata/RHSA-2017:1208
- http://www.securityfocus.com/bid/94925
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-8654: A heap-buffer overflow vulnerability was found in QMFB code in JPC codec caused by buffer being…
Published: 2018-08-01T16:29:00 Last Modified: 2019-10-09T23:20:00
Summary
A heap-buffer overflow vulnerability was found in QMFB code in JPC codec caused by buffer being allocated with too small size. jasper versions before 2.0.0 are affected.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-8654 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8654
- https://github.com/mdadams/jasper/issues/94
- https://github.com/mdadams/jasper/issues/93
- https://github.com/mdadams/jasper/commit/4a59cfaf9ab3d48fca4a15c0d2674bf7138e3d1a
- https://www.debian.org/security/2017/dsa-3785
- https://access.redhat.com/errata/RHSA-2017:1208
- http://www.securityfocus.com/bid/94583
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9579: A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the…
Published: 2018-08-01T16:29:00 Last Modified: 2019-10-09T23:20:00
Summary
A flaw was found in the way Ceph Object Gateway would process cross-origin HTTP requests if the CORS policy was set to allow origin on a bucket. A remote unauthenticated attacker could use this flaw to cause denial of service by sending a specially-crafted cross-origin HTTP request. Ceph branches 1.3.x and 2.x are affected.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9579 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9579
- http://tracker.ceph.com/issues/18187
- http://www.securityfocus.com/bid/94936
- http://rhn.redhat.com/errata/RHSA-2016-2995.html
- http://rhn.redhat.com/errata/RHSA-2016-2994.html
- http://rhn.redhat.com/errata/RHSA-2016-2956.html
- http://rhn.redhat.com/errata/RHSA-2016-2954.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-8635: It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to…
Published: 2018-08-01T13:29:00 Last Modified: 2019-10-09T23:20:00
Summary
It was found that Diffie Hellman Client key exchange handling in NSS 3.21.x was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group.
Common Weakness Enumeration (CWE): CWE-320: Key Management Errors
CWE Description: Weaknesses in this category are related to errors in the management of cryptographic keys.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-8635 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8635
- https://security.gentoo.org/glsa/201701-46
- http://www.securityfocus.com/bid/94346
- http://rhn.redhat.com/errata/RHSA-2016-2779.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9573: An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool….
Published: 2018-08-01T06:29:00 Last Modified: 2020-09-09T19:57:00
Summary
An out-of-bounds read vulnerability was found in OpenJPEG 2.1.2, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9573 vulnerability.
References
- https://github.com/uclouvain/openjpeg/issues/862
- https://github.com/szukw000/openjpeg/commit/7b28bd2b723df6be09fe7791eba33147c1c47d0d
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9573
- https://www.debian.org/security/2017/dsa-3768
- https://security.gentoo.org/glsa/201710-26
- http://www.securityfocus.com/bid/97073
- http://rhn.redhat.com/errata/RHSA-2017-0838.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-8626: A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object…
Published: 2018-07-31T19:29:00 Last Modified: 2019-10-09T23:20:00
Summary
A flaw was found in Red Hat Ceph before 0.94.9-8. The way Ceph Object Gateway handles POST object requests permits an authenticated attacker to launch a denial of service attack by sending null or specially crafted POST object requests.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.0
- CVSS: 6.8
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-8626 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8626
- http://tracker.ceph.com/issues/17635
- http://www.securityfocus.com/bid/94488
- http://rhn.redhat.com/errata/RHSA-2016-2848.html
- http://rhn.redhat.com/errata/RHSA-2016-2847.html
- http://rhn.redhat.com/errata/RHSA-2016-2816.html
- http://rhn.redhat.com/errata/RHSA-2016-2815.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10883: A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause an out-of-bounds…
Published: 2018-07-30T16:29:00 Last Modified: 2019-10-09T23:33:00
Summary
A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause an out-of-bounds write in jbd2_journal_dirty_metadata(), a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-10883 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e09463f220ca9a1a1ecfda84fcda658f99a1f12a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8bc1379b82b8e809eef77a9fedbb75c6c297be19
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10883
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3879-2/
- https://usn.ubuntu.com/3879-1/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-5/
- https://support.f5.com/csp/article/K94735334?utm_source=f5support&utm_medium=RSS
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7518: A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the…
Published: 2018-07-30T15:29:00 Last Modified: 2019-10-09T23:29:00
Summary
A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
Common Weakness Enumeration (CWE): CWE-755: Improper Handling of Exceptional Conditions
CWE Description: The software does not handle or incorrectly handles an exceptional condition.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-7518 vulnerability.
References
- https://www.spinics.net/lists/kvm/msg151817.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7518
- https://access.redhat.com/articles/3290921
- http://www.openwall.com/lists/oss-security/2017/06/23/5
- https://www.debian.org/security/2017/dsa-3981
- https://usn.ubuntu.com/3619-2/
- https://usn.ubuntu.com/3619-1/
- https://access.redhat.com/errata/RHSA-2018:0412
- https://access.redhat.com/errata/RHSA-2018:0395
- http://www.securitytracker.com/id/1038782
- http://www.securityfocus.com/bid/99263
- https://usn.ubuntu.com/3754-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14680: An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank…
Published: 2018-07-28T23:29:00 Last Modified: 2021-04-26T11:45:00
Summary
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14680 vulnerability.
References
- https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a
- https://bugs.debian.org/904801
- http://www.openwall.com/lists/oss-security/2018/07/26/1
- https://usn.ubuntu.com/3728-1/
- https://www.debian.org/security/2018/dsa-4260
- https://usn.ubuntu.com/3728-3/
- http://www.securitytracker.com/id/1041410
- https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html
- https://usn.ubuntu.com/3728-2/
- https://usn.ubuntu.com/3789-2/
- https://access.redhat.com/errata/RHSA-2018:3327
- https://access.redhat.com/errata/RHSA-2018:3505
- https://security.gentoo.org/glsa/201903-20
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14681: An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad…
Published: 2018-07-28T23:29:00 Last Modified: 2021-04-26T11:45:00
Summary
An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14681 vulnerability.
References
- https://github.com/kyz/libmspack/commit/0b0ef9344255ff5acfac6b7af09198ac9c9756c8
- https://bugs.debian.org/904799
- http://www.openwall.com/lists/oss-security/2018/07/26/1
- https://usn.ubuntu.com/3728-1/
- https://www.debian.org/security/2018/dsa-4260
- https://usn.ubuntu.com/3728-3/
- http://www.securitytracker.com/id/1041410
- https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html
- https://usn.ubuntu.com/3728-2/
- https://usn.ubuntu.com/3789-2/
- https://access.redhat.com/errata/RHSA-2018:3327
- https://access.redhat.com/errata/RHSA-2018:3505
- https://security.gentoo.org/glsa/201903-20
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14682: An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one…
Published: 2018-07-28T23:29:00 Last Modified: 2021-04-26T11:45:00
Summary
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.
Common Weakness Enumeration (CWE): CWE-193: Off-by-one Error
CWE Description: A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14682 vulnerability.
References
- https://github.com/kyz/libmspack/commit/4fd9ccaa54e1aebde1e4b95fb0163b699fd7bcc8
- https://bugs.debian.org/904800
- http://www.openwall.com/lists/oss-security/2018/07/26/1
- https://usn.ubuntu.com/3728-1/
- https://www.debian.org/security/2018/dsa-4260
- https://usn.ubuntu.com/3728-3/
- http://www.securitytracker.com/id/1041410
- https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html
- https://usn.ubuntu.com/3728-2/
- https://usn.ubuntu.com/3789-2/
- https://access.redhat.com/errata/RHSA-2018:3327
- https://access.redhat.com/errata/RHSA-2018:3505
- https://security.gentoo.org/glsa/201903-20
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14679: An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one…
Published: 2018-07-28T23:29:00 Last Modified: 2021-04-26T11:45:00
Summary
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).
Common Weakness Enumeration (CWE): CWE-193: Off-by-one Error
CWE Description: A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14679 vulnerability.
References
- https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a
- https://bugs.debian.org/904802
- http://www.openwall.com/lists/oss-security/2018/07/26/1
- https://usn.ubuntu.com/3728-1/
- https://www.debian.org/security/2018/dsa-4260
- https://usn.ubuntu.com/3728-3/
- http://www.securitytracker.com/id/1041410
- https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html
- https://usn.ubuntu.com/3728-2/
- https://usn.ubuntu.com/3789-2/
- https://access.redhat.com/errata/RHSA-2018:3327
- https://access.redhat.com/errata/RHSA-2018:3505
- https://security.gentoo.org/glsa/201903-20
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15118: A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before…
Published: 2018-07-27T21:29:00 Last Modified: 2019-10-09T23:24:00
Summary
A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-15118 vulnerability.
References
- https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg05045.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15118
- http://www.openwall.com/lists/oss-security/2017/11/28/8
- https://www.exploit-db.com/exploits/43194/
- https://usn.ubuntu.com/3575-1/
- https://access.redhat.com/errata/RHSA-2018:1104
- http://www.securityfocus.com/bid/101975
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9578: A vulnerability was discovered in SPICE before 0.13.90 in the server’s protocol handling. An…
Published: 2018-07-27T21:29:00 Last Modified: 2019-10-09T23:20:00
Summary
A vulnerability was discovered in SPICE before 0.13.90 in the server’s protocol handling. An attacker able to connect to the SPICE server could send crafted messages which would cause the process to crash.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9578 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9578
- https://www.debian.org/security/2017/dsa-3790
- https://access.redhat.com/errata/RHSA-2017:0552
- https://access.redhat.com/errata/RHSA-2017:0254
- http://www.securityfocus.com/bid/96118
- http://rhn.redhat.com/errata/RHSA-2017-0549.html
- http://rhn.redhat.com/errata/RHSA-2017-0253.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9603: A heap buffer overflow flaw was found in QEMU’s Cirrus CLGD 54xx VGA emulator’s VNC display…
Published: 2018-07-27T21:29:00 Last Modified: 2021-08-04T17:15:00
Summary
A heap buffer overflow flaw was found in QEMU’s Cirrus CLGD 54xx VGA emulator’s VNC display driver support before 2.9; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.0
- CVSS: 9.0
- CVSS Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9603 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9603
- https://support.citrix.com/article/CTX221578
- https://security.gentoo.org/glsa/201706-03
- https://lists.debian.org/debian-lts-announce/2018/02/msg00005.html
- https://access.redhat.com/errata/RHSA-2017:1441
- https://access.redhat.com/errata/RHSA-2017:1206
- https://access.redhat.com/errata/RHSA-2017:1205
- https://access.redhat.com/errata/RHSA-2017:0988
- https://access.redhat.com/errata/RHSA-2017:0987
- https://access.redhat.com/errata/RHSA-2017:0985
- https://access.redhat.com/errata/RHSA-2017:0984
- https://access.redhat.com/errata/RHSA-2017:0983
- https://access.redhat.com/errata/RHSA-2017:0982
- https://access.redhat.com/errata/RHSA-2017:0981
- https://access.redhat.com/errata/RHSA-2017:0980
- http://www.securitytracker.com/id/1038023
- http://www.securityfocus.com/bid/96893
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15101: A missing patch for a stack-based buffer overflow in findTable() was found in Red Hat version of…
Published: 2018-07-27T20:29:00 Last Modified: 2019-10-09T23:24:00
Summary
A missing patch for a stack-based buffer overflow in findTable() was found in Red Hat version of liblouis before 2.5.4. An attacker could cause a denial of service condition or potentially even arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15101 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15101
- https://access.redhat.com/errata/RHSA-2017:3384
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15097: Privilege escalation flaws were found in the Red Hat initialization scripts of PostgreSQL. An…
Published: 2018-07-27T20:29:00 Last Modified: 2019-10-09T23:24:00
Summary
Privilege escalation flaws were found in the Red Hat initialization scripts of PostgreSQL. An attacker with access to the postgres user account could use these flaws to obtain root access on the server machine.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-15097 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15097
- https://access.redhat.com/errata/RHSA-2017:3405
- https://access.redhat.com/errata/RHSA-2017:3404
- https://access.redhat.com/errata/RHSA-2017:3403
- https://access.redhat.com/errata/RHSA-2017:3402
- http://www.securitytracker.com/id/1039983
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9577: A vulnerability was discovered in SPICE before 0.13.90 in the server’s protocol handling. An…
Published: 2018-07-27T20:29:00 Last Modified: 2019-10-09T23:20:00
Summary
A vulnerability was discovered in SPICE before 0.13.90 in the server’s protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9577 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9577
- https://www.debian.org/security/2017/dsa-3790
- https://access.redhat.com/errata/RHSA-2017:0552
- https://access.redhat.com/errata/RHSA-2017:0254
- http://www.securityfocus.com/bid/96040
- http://rhn.redhat.com/errata/RHSA-2017-0549.html
- http://rhn.redhat.com/errata/RHSA-2017-0253.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2618: A flaw was found in the Linux kernel’s handling of clearing SELinux attributes on /proc/pid/attr…
Published: 2018-07-27T19:29:00 Last Modified: 2019-10-09T23:26:00
Summary
A flaw was found in the Linux kernel’s handling of clearing SELinux attributes on /proc/pid/attr files before 4.9.10. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory.
Common Weakness Enumeration (CWE): CWE-682: Incorrect Calculation
CWE Description: The software performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-2618 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0c461cb727d146c9ef2d3e86214f498b78b7d125
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2618
- https://marc.info/?l=selinux&m=148588165923772&w=2
- https://www.debian.org/security/2017/dsa-3791
- https://access.redhat.com/errata/RHSA-2017:0933
- https://access.redhat.com/errata/RHSA-2017:0932
- https://access.redhat.com/errata/RHSA-2017:0931
- http://www.securityfocus.com/bid/96272
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2626: It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local…
Published: 2018-07-27T19:29:00 Last Modified: 2019-07-14T21:15:00
Summary
It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
Common Weakness Enumeration (CWE): CWE-331: Insufficient Entropy
CWE Description: The software uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-2626 vulnerability.
References
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
- https://cgit.freedesktop.org/xorg/lib/libICE/commit/?id=ff5e59f32255913bb1cdf51441b98c9107ae165b
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2626
- https://security.gentoo.org/glsa/201704-03
- https://access.redhat.com/errata/RHSA-2017:1865
- http://www.securitytracker.com/id/1037919
- http://www.securityfocus.com/bid/96480
- http://www.openwall.com/lists/oss-security/2019/07/14/3
- https://lists.debian.org/debian-lts-announce/2019/11/msg00022.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2634: It was found that the Linux kernel’s Datagram Congestion Control Protocol (DCCP) implementation…
Published: 2018-07-27T19:29:00 Last Modified: 2019-10-09T23:26:00
Summary
It was found that the Linux kernel’s Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-2634 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f53dc67c5e7babafe239b93a11678b0e05bead51
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2634
- http://www.securitytracker.com/id/1037909
- http://www.securityfocus.com/bid/96529
- http://rhn.redhat.com/errata/RHSA-2017-0347.html
- http://rhn.redhat.com/errata/RHSA-2017-0346.html
- http://rhn.redhat.com/errata/RHSA-2017-0323.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2620: Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is…
Published: 2018-07-27T19:29:00 Last Modified: 2021-08-04T17:15:00
Summary
Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.0
- CVSS: 9.0
- CVSS Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-2620 vulnerability.
References
- https://xenbits.xen.org/xsa/advisory-209.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg04700.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2620
- http://www.openwall.com/lists/oss-security/2017/02/21/1
- https://support.citrix.com/article/CTX220771
- https://security.gentoo.org/glsa/201704-01
- https://security.gentoo.org/glsa/201703-07
- https://lists.debian.org/debian-lts-announce/2018/02/msg00005.html
- http://www.securitytracker.com/id/1037870
- http://www.securityfocus.com/bid/96378
- http://rhn.redhat.com/errata/RHSA-2017-0454.html
- http://rhn.redhat.com/errata/RHSA-2017-0396.html
- http://rhn.redhat.com/errata/RHSA-2017-0352.html
- http://rhn.redhat.com/errata/RHSA-2017-0351.html
- http://rhn.redhat.com/errata/RHSA-2017-0350.html
- http://rhn.redhat.com/errata/RHSA-2017-0334.html
- http://rhn.redhat.com/errata/RHSA-2017-0333.html
- http://rhn.redhat.com/errata/RHSA-2017-0332.html
- http://rhn.redhat.com/errata/RHSA-2017-0331.html
- http://rhn.redhat.com/errata/RHSA-2017-0330.html
- http://rhn.redhat.com/errata/RHSA-2017-0329.html
- http://rhn.redhat.com/errata/RHSA-2017-0328.html
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2633: An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC…
Published: 2018-07-27T19:29:00 Last Modified: 2019-10-09T23:26:00
Summary
An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the ‘vnc_refresh_server_surface’. A user inside a guest could use this flaw to crash the QEMU process.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-2633 vulnerability.
References
- https://git.qemu.org/?p=qemu.git;a=commitdiff;h=bea60dd7679364493a0d7f5b54316c767cf894ef
- https://git.qemu.org/?p=qemu.git;a=commitdiff;h=9f64916da20eea67121d544698676295bbb105a7
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2633
- http://www.openwall.com/lists/oss-security/2017/02/23/1
- https://access.redhat.com/errata/RHSA-2017:1856
- https://access.redhat.com/errata/RHSA-2017:1441
- https://access.redhat.com/errata/RHSA-2017:1206
- https://access.redhat.com/errata/RHSA-2017:1205
- http://www.securityfocus.com/bid/96417
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2616: A race condition was found in util-linux before 2.32.1 in the way su handled the management of…
Published: 2018-07-27T19:29:00 Last Modified: 2019-10-09T23:26:00
Summary
A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-2616 vulnerability.
References
- https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616
- https://www.debian.org/security/2017/dsa-3793
- https://security.gentoo.org/glsa/201706-02
- https://access.redhat.com/errata/RHSA-2017:0907
- http://www.securitytracker.com/id/1038271
- http://www.securityfocus.com/bid/96404
- http://rhn.redhat.com/errata/RHSA-2017-0654.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10882: A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause an out-of-bound…
Published: 2018-07-27T18:29:00 Last Modified: 2019-10-09T23:33:00
Summary
A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-10882 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c37e9e013469521d9adb932d17a1795c139b36db
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10882
- https://bugzilla.kernel.org/show_bug.cgi?id=200069
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3753-1/
- https://access.redhat.com/errata/RHSA-2018:2948
- http://www.securityfocus.com/bid/106503
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2590: A vulnerability was found in ipa before 4.4. IdM’s ca-del, ca-disable, and ca-enable commands did…
Published: 2018-07-27T18:29:00 Last Modified: 2019-10-09T23:26:00
Summary
A vulnerability was found in ipa before 4.4. IdM’s ca-del, ca-disable, and ca-enable commands did not properly check the user’s permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys.
Common Weakness Enumeration (CWE): CWE-275: Permission Issues
CWE Description: This category has been deprecated. It was originally intended as a “catch-all” for environment issues for technologies that did not have their own CWE, but it introduced unnecessary depth and complexity to the Development View (CWE-699).
Scores
- Impact Score: 4.9
- Exploitability Score: 8.0
- CVSS: 5.5
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-2590 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2590
- http://www.securityfocus.com/bid/96557
- http://rhn.redhat.com/errata/RHSA-2017-0388.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2623: It was discovered that rpm-ostree and rpm-ostree-client before 2017.3 fail to properly check GPG…
Published: 2018-07-27T18:29:00 Last Modified: 2019-10-09T23:26:00
Summary
It was discovered that rpm-ostree and rpm-ostree-client before 2017.3 fail to properly check GPG signatures on packages when doing layering. Packages with unsigned or badly signed content could fail to be rejected as expected. This issue is partially mitigated on RHEL Atomic Host, where certificate pinning is used by default.
Common Weakness Enumeration (CWE): CWE-295: Improper Certificate Validation
CWE Description: The software does not validate, or incorrectly validates, a certificate.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-2623 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2623
- https://access.redhat.com/errata/RHSA-2017:0444
- http://www.securityfocus.com/bid/96558
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2625: It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session…
Published: 2018-07-27T18:29:00 Last Modified: 2019-10-09T23:26:00
Summary
It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users’ sessions.
Common Weakness Enumeration (CWE): CWE-320: Key Management Errors
CWE Description: Weaknesses in this category are related to errors in the management of cryptographic keys.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-2625 vulnerability.
References
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2625
- https://security.gentoo.org/glsa/201704-03
- https://access.redhat.com/errata/RHSA-2017:1865
- http://www.securitytracker.com/id/1037919
- http://www.securityfocus.com/bid/96480
- https://cgit.freedesktop.org/xorg/lib/libXdmcp/commit/?id=0554324ec6bbc2071f5d1f8ad211a1643e29eb1f
- https://lists.debian.org/debian-lts-announce/2019/11/msg00024.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2640: An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A…
Published: 2018-07-27T18:29:00 Last Modified: 2019-10-09T23:27:00
Summary
An out-of-bounds write flaw was found in the way Pidgin before 2.12.0 processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-2640 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2640
- https://www.debian.org/security/2017/dsa-3806
- https://security.gentoo.org/glsa/201706-10
- https://access.redhat.com/errata/RHSA-2017:1854
- http://www.securityfocus.com/bid/96775
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-12173: It was found that sssd’s sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize…
Published: 2018-07-27T16:29:00 Last Modified: 2019-10-09T23:22:00
Summary
It was found that sssd’s sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-12173 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12173
- https://access.redhat.com/errata/RHSA-2018:1877
- https://access.redhat.com/errata/RHSA-2017:3379
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-12151: A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used…
Published: 2018-07-27T12:29:00 Last Modified: 2019-10-09T23:22:00
Summary
A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack.
Common Weakness Enumeration (CWE): CWE-310: Cryptographic Issues
CWE Description: Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-12151 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2017-12151.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12151
- https://www.debian.org/security/2017/dsa-3983
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us
- https://security.netapp.com/advisory/ntap-20170921-0001/
- https://access.redhat.com/errata/RHSA-2017:2858
- https://access.redhat.com/errata/RHSA-2017:2790
- http://www.securitytracker.com/id/1039401
- http://www.securityfocus.com/bid/100917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before…
Published: 2018-07-26T19:29:00 Last Modified: 2020-10-15T13:28:00
Summary
The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn’t properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-18344 vulnerability.
References
- https://github.com/torvalds/linux/commit/cef31d9af908243421258f1df35a4a644604efbe
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- http://www.securityfocus.com/bid/104909
- http://www.securitytracker.com/id/1041414
- https://www.exploit-db.com/exploits/45175/
- https://usn.ubuntu.com/3742-2/
- https://usn.ubuntu.com/3742-1/
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2018:3459
- https://access.redhat.com/errata/RHSA-2018:3591
- https://access.redhat.com/errata/RHSA-2018:3590
- https://access.redhat.com/errata/RHSA-2018:3586
- https://access.redhat.com/errata/RHSA-2018:3540
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10879: A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause a use-after-free…
Published: 2018-07-26T18:29:00 Last Modified: 2019-10-09T23:33:00
Summary
A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 8.5
- Exploitability Score: 3.9
- CVSS: 6.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-10879 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
- https://bugzilla.kernel.org/show_bug.cgi?id=200001
- http://patchwork.ozlabs.org/patch/928667/
- http://patchwork.ozlabs.org/patch/928666/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- http://www.securityfocus.com/bid/104902
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3753-1/
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-12150: It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not…
Published: 2018-07-26T18:29:00 Last Modified: 2019-10-09T23:22:00
Summary
It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not enforce “SMB signing” when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-12150 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2017-12150.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12150
- https://www.debian.org/security/2017/dsa-3983
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us
- https://security.netapp.com/advisory/ntap-20170921-0001/
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03775en_us
- https://access.redhat.com/errata/RHSA-2017:2858
- https://access.redhat.com/errata/RHSA-2017:2791
- https://access.redhat.com/errata/RHSA-2017:2790
- https://access.redhat.com/errata/RHSA-2017:2789
- http://www.securitytracker.com/id/1039401
- http://www.securityfocus.com/bid/100918
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10881: A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause an out-of-bound…
Published: 2018-07-26T18:29:00 Last Modified: 2019-10-09T23:33:00
Summary
A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause an out-of-bound access in ext4_get_group_info function, a denial of service, and a system crash by mounting and operating on a crafted ext4 filesystem image.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-10881 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6e8ab72a812396996035a37e5ca4b3b99b5d214b
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10881
- https://bugzilla.kernel.org/show_bug.cgi?id=200015
- http://patchwork.ozlabs.org/patch/929792/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- http://www.securityfocus.com/bid/104901
- https://usn.ubuntu.com/3754-1/
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3753-1/
- https://usn.ubuntu.com/3752-2/
- https://usn.ubuntu.com/3752-1/
- https://usn.ubuntu.com/3752-3/
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10878: A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause an out-of-bounds…
Published: 2018-07-26T18:29:00 Last Modified: 2019-10-09T23:33:00
Summary
A flaw was found in the Linux kernel’s ext4 filesystem. A local user can cause an out-of-bounds write and a denial of service or unspecified other impact is possible by mounting and operating a crafted ext4 filesystem image.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 8.5
- Exploitability Score: 3.9
- CVSS: 6.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-10878 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=819b23f1c501b17b9694325471789e6b5cc2d0d2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77260807d1170a8cf35dbb06e07461a655f67eee
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10878
- https://bugzilla.kernel.org/show_bug.cgi?id=199865
- http://patchwork.ozlabs.org/patch/929238/
- http://patchwork.ozlabs.org/patch/929237/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3753-1/
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-5/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-12171: A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing…
Published: 2018-07-26T17:29:00 Last Modified: 2019-10-09T23:22:00
Summary
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the “Allow” and “Deny” configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-12171 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12171
- https://access.redhat.com/errata/RHSA-2017:2972
- http://www.securitytracker.com/id/1039633
- http://www.securityfocus.com/bid/101516
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10901: A flaw was found in Linux kernel’s KVM virtualization subsystem. The VMX code does not restore…
Published: 2018-07-26T17:29:00 Last Modified: 2020-07-15T03:15:00
Summary
A flaw was found in Linux kernel’s KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host’s userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-10901 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3444d7da1839b851eefedd372978d8a982316c36
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10901
- http://www.securityfocus.com/bid/104905
- https://access.redhat.com/errata/RHSA-2018:2394
- https://access.redhat.com/errata/RHSA-2018:2393
- https://access.redhat.com/errata/RHSA-2018:2392
- https://access.redhat.com/errata/RHSA-2018:2391
- https://access.redhat.com/errata/RHSA-2018:2390
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-12163: An information leak flaw was found in the way SMB1 protocol was implemented by Samba before…
Published: 2018-07-26T16:29:00 Last Modified: 2019-10-09T23:22:00
Summary
An information leak flaw was found in the way SMB1 protocol was implemented by Samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 4.9
- Exploitability Score: 6.5
- CVSS: 4.8
- CVSS Vector: AV:A/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2017-12163 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2017-12163.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12163
- https://www.synology.com/support/security/Synology_SA_17_57_Samba
- https://www.debian.org/security/2017/dsa-3983
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us
- https://security.netapp.com/advisory/ntap-20170921-0001/
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03775en_us
- https://access.redhat.com/errata/RHSA-2017:2858
- https://access.redhat.com/errata/RHSA-2017:2791
- https://access.redhat.com/errata/RHSA-2017:2790
- https://access.redhat.com/errata/RHSA-2017:2789
- http://www.securitytracker.com/id/1039401
- http://www.securityfocus.com/bid/100925
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7562: An authentication bypass flaw was found in the way krb5’s certauth interface before 1.16.1…
Published: 2018-07-26T15:29:00 Last Modified: 2020-01-21T16:48:00
Summary
An authentication bypass flaw was found in the way krb5’s certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary principals under rare and erroneous circumstances.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7562 vulnerability.
References
- https://github.com/krb5/krb5/pull/694/commits/b7af544e50a4d8291524f590e20dd44430bf627d
- https://github.com/krb5/krb5/pull/694/commits/50fe4074f188c2d4da0c421e96553acea8378db2
- https://github.com/krb5/krb5/pull/694/commits/1de6ca2f2eb1fdbab51f1549a25a6903aefcc196
- https://github.com/krb5/krb5/pull/694
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7562
- https://access.redhat.com/errata/RHSA-2018:0666
- http://www.securityfocus.com/bid/100511
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7537: It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally…
Published: 2018-07-26T13:29:00 Last Modified: 2019-10-09T23:29:00
Summary
It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates.
Common Weakness Enumeration (CWE): CWE-798: Use of Hard-coded Credentials
CWE Description: The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7537 vulnerability.
References
- https://github.com/dogtagpki/pki/commit/876d13c6d20e7e1235b9
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7537
- https://access.redhat.com/errata/RHSA-2017:2335
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-13988: Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory…
Published: 2018-07-25T23:29:00 Last Modified: 2019-04-25T14:16:00
Summary
Poppler through 0.62 contains an out of bounds read vulnerability due to an incorrect memory access that is not mapped in its memory space, as demonstrated by pdfunite. This can result in memory corruption and denial of service. This may be exploitable when a victim opens a specially crafted PDF file.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-13988 vulnerability.
References
- http://packetstormsecurity.com/files/148661/PDFunite-0.62.0-Buffer-Overflow.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1602838
- https://bugzilla.novell.com/show_bug.cgi?id=CVE-2018-13988
- https://cgit.freedesktop.org/poppler/poppler/commit/?id=004e3c10df0abda214f0c293f9e269fdd979c5ee
- https://usn.ubuntu.com/3757-1/
- https://access.redhat.com/errata/RHSA-2018:3140
- https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html
- https://access.redhat.com/errata/RHSA-2018:3505
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1002200: plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to…
Published: 2018-07-25T17:29:00 Last Modified: 2019-10-09T23:32:00
Summary
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as ‘Zip-Slip’.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1002200 vulnerability.
References
- https://snyk.io/vuln/SNYK-JAVA-ORGCODEHAUSPLEXUS-31680
- https://snyk.io/research/zip-slip-vulnerability
- https://github.com/snyk/zip-slip-vulnerability
- https://github.com/codehaus-plexus/plexus-archiver/pull/87
- https://github.com/codehaus-plexus/plexus-archiver/commit/f8f4233508193b70df33759ae9dc6154d69c2ea8
- https://www.debian.org/security/2018/dsa-4227
- https://access.redhat.com/errata/RHSA-2018:1837
- https://access.redhat.com/errata/RHSA-2018:1836
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10880: Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when…
Published: 2018-07-25T13:29:00 Last Modified: 2019-04-01T20:29:00
Summary
Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10880 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10880
- https://bugzilla.kernel.org/show_bug.cgi?id=200005
- http://patchwork.ozlabs.org/patch/930639/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://access.redhat.com/errata/RHSA-2018:2948
- https://usn.ubuntu.com/3821-2/
- https://usn.ubuntu.com/3821-1/
- http://www.securityfocus.com/bid/106503
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-5/
- http://www.securityfocus.com/bid/104907
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10906: In fuse before versions 2.9.8 and 3.x before 3.2.5, fusermount is vulnerable to a restriction…
Published: 2018-07-24T20:29:00 Last Modified: 2019-10-03T00:03:00
Summary
In fuse before versions 2.9.8 and 3.x before 3.2.5, fusermount is vulnerable to a restriction bypass when SELinux is active. This allows non-root users to mount a FUSE file system with the ‘allow_other’ mount option regardless of whether ‘user_allow_other’ is set in the fuse configuration. An attacker may use this flaw to mount a FUSE file system, accessible by other users, and trick them into accessing files on that file system, possibly causing Denial of Service or other unspecified effects.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-10906 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10906
- https://www.debian.org/security/2018/dsa-4257
- https://www.exploit-db.com/exploits/45106/
- https://lists.debian.org/debian-lts-announce/2018/08/msg00015.html
- https://access.redhat.com/errata/RHSA-2018:3324
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BREAIWIK64DRJWHIGR47L2D5YICY4HQ3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5XYA6PXT5PPWVK7CM7K4YRCYWA37DODB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A253TZWZK6R7PT2S5JIEAQJR2TYKX7V2/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5007: Adobe Flash Player 30.0.0.113 and earlier versions have a Type Confusion vulnerability….
Published: 2018-07-20T19:29:00 Last Modified: 2018-09-17T17:52:00
Summary
Adobe Flash Player 30.0.0.113 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5007 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-24.html
- https://access.redhat.com/errata/RHSA-2018:2175
- http://www.securitytracker.com/id/1041248
- http://www.securityfocus.com/bid/104698
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5008: Adobe Flash Player 30.0.0.113 and earlier versions have an Out-of-bounds read vulnerability….
Published: 2018-07-20T19:29:00 Last Modified: 2018-09-17T17:23:00
Summary
Adobe Flash Player 30.0.0.113 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5008 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-24.html
- https://access.redhat.com/errata/RHSA-2018:2175
- http://www.securitytracker.com/id/1041248
- http://www.securityfocus.com/bid/104698
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10869: redhat-certification does not properly restrict files that can be download through the /download…
Published: 2018-07-19T22:29:00 Last Modified: 2019-10-09T23:33:00
Summary
redhat-certification does not properly restrict files that can be download through the /download page. A remote attacker may download any file accessible by the user running httpd.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10869 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10869
- https://access.redhat.com/errata/RHSA-2018:2373
- http://www.securityfocus.com/bid/105061
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10877: Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs()…
Published: 2018-07-18T15:29:00 Last Modified: 2019-04-01T19:29:00
Summary
Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10877 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10877
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3754-1/
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3753-1/
- https://access.redhat.com/errata/RHSA-2018:2948
- http://www.securityfocus.com/bid/106503
- https://usn.ubuntu.com/3871-1/
- https://usn.ubuntu.com/3871-4/
- https://usn.ubuntu.com/3871-3/
- https://usn.ubuntu.com/3871-5/
- http://www.securityfocus.com/bid/104878
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14357: An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote…
Published: 2018-07-17T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with an automatic subscription.
Common Weakness Enumeration (CWE): CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
CWE Description: The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14357 vulnerability.
References
- https://neomutt.org/2018/07/16/release
- https://gitlab.com/muttmua/mutt/commit/185152818541f5cdc059cbff3f3e8b654fc27c1d
- https://github.com/neomutt/neomutt/commit/e52393740334443ae0206cab2d7caef381646725
- http://www.mutt.org/news.html
- https://usn.ubuntu.com/3719-1/
- https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html
- https://www.debian.org/security/2018/dsa-4277
- https://access.redhat.com/errata/RHSA-2018:2526
- https://usn.ubuntu.com/3719-3/
- https://security.gentoo.org/glsa/201810-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14354: An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote…
Published: 2018-07-17T17:29:00 Last Modified: 2020-08-24T17:37:00
Summary
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription.
Common Weakness Enumeration (CWE): CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
CWE Description: The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14354 vulnerability.
References
- https://neomutt.org/2018/07/16/release
- https://gitlab.com/muttmua/mutt/commit/185152818541f5cdc059cbff3f3e8b654fc27c1d
- https://github.com/neomutt/neomutt/commit/95e80bf9ff10f68cb6443f760b85df4117cb15eb
- http://www.mutt.org/news.html
- https://usn.ubuntu.com/3719-2/
- https://usn.ubuntu.com/3719-1/
- http://www.securityfocus.com/bid/104925
- https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html
- https://www.debian.org/security/2018/dsa-4277
- https://access.redhat.com/errata/RHSA-2018:2526
- https://usn.ubuntu.com/3719-3/
- https://security.gentoo.org/glsa/201810-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-14362: An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not…
Published: 2018-07-17T17:29:00 Last Modified: 2020-05-19T17:19:00
Summary
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c does not forbid characters that may have unsafe interaction with message-cache pathnames, as demonstrated by a ‘/’ character.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-14362 vulnerability.
References
- https://neomutt.org/2018/07/16/release
- https://gitlab.com/muttmua/mutt/commit/6aed28b40a0410ec47d40c8c7296d8d10bae7576
- https://github.com/neomutt/neomutt/commit/9bfab35522301794483f8f9ed60820bdec9be59e
- http://www.mutt.org/news.html
- https://lists.debian.org/debian-lts-announce/2018/08/msg00001.html
- https://www.debian.org/security/2018/dsa-4277
- https://access.redhat.com/errata/RHSA-2018:2526
- https://usn.ubuntu.com/3719-3/
- https://security.gentoo.org/glsa/201810-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10840: Linux kernel is vulnerable to a heap-based buffer overflow in the…
Published: 2018-07-16T20:29:00 Last Modified: 2020-08-28T15:04:00
Summary
Linux kernel is vulnerable to a heap-based buffer overflow in the fs/ext4/xattr.c:ext4_xattr_set_entry() function. An attacker could exploit this by operating on a mounted crafted ext4 image.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-10840 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10840
- https://usn.ubuntu.com/3752-2/
- https://usn.ubuntu.com/3752-1/
- https://usn.ubuntu.com/3752-3/
- http://www.securityfocus.com/bid/104858
- https://access.redhat.com/errata/RHSA-2019:0162
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-3693: Systems with microprocessors utilizing speculative execution and branch prediction may allow…
Published: 2018-07-10T21:29:00 Last Modified: 2021-11-19T18:15:00
Summary
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: COMPLETE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-3693 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2018:2395
- https://access.redhat.com/errata/RHSA-2018:2390
- https://access.redhat.com/errata/RHSA-2018:2384
- https://security.netapp.com/advisory/ntap-20180823-0001/
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://access.redhat.com/errata/RHSA-2019:1946
- https://access.redhat.com/errata/RHSA-2020:0174
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://cdrdv2.intel.com/v1/dl/getContent/685359
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10872: A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch…
Published: 2018-07-10T19:29:00 Last Modified: 2020-07-15T03:15:00
Summary
A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897 in Red Hat Enterprise Linux 6.10 GA kernel. No other versions are affected by this CVE.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-10872 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10872
- https://access.redhat.com/errata/RHSA-2018:2164
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1128: It was found that cephx authentication protocol did not verify ceph clients correctly and was…
Published: 2018-07-10T14:29:00 Last Modified: 2020-11-17T19:15:00
Summary
It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 6.4
- Exploitability Score: 5.5
- CVSS: 5.4
- CVSS Vector: AV:A/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2018-1128 vulnerability.
References
- https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468
- https://bugzilla.redhat.com/show_bug.cgi?id=1575866
- http://tracker.ceph.com/issues/24836
- https://access.redhat.com/errata/RHSA-2018:2179
- https://access.redhat.com/errata/RHSA-2018:2177
- https://access.redhat.com/errata/RHSA-2018:2274
- https://access.redhat.com/errata/RHSA-2018:2261
- https://www.debian.org/security/2018/dsa-4339
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
- http://www.openwall.com/lists/oss-security/2020/11/17/3
- http://www.openwall.com/lists/oss-security/2020/11/17/4
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1129: A flaw was found in the way signature calculation was handled by cephx authentication protocol….
Published: 2018-07-10T14:29:00 Last Modified: 2019-08-29T03:15:00
Summary
A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.5
- CVSS: 3.3
- CVSS Vector: AV:A/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2018-1129 vulnerability.
References
- https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587
- https://bugzilla.redhat.com/show_bug.cgi?id=1576057
- http://tracker.ceph.com/issues/24837
- https://access.redhat.com/errata/RHSA-2018:2179
- https://access.redhat.com/errata/RHSA-2018:2177
- https://access.redhat.com/errata/RHSA-2018:2274
- https://access.redhat.com/errata/RHSA-2018:2261
- https://www.debian.org/security/2018/dsa-4339
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10861: A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having…
Published: 2018-07-10T14:29:00 Last Modified: 2019-10-09T23:33:00
Summary
A flaw was found in the way ceph mon handles user requests. Any authenticated ceph user having read access to ceph can delete, create ceph storage pools and corrupt snapshot images. Ceph branches master, mimic, luminous and jewel are believed to be affected.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.0
- CVSS: 5.5
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10861 vulnerability.
References
- https://github.com/ceph/ceph/commit/975528f632f73fbffa3f1fee304e3bbe3296cffc
- https://bugzilla.redhat.com/show_bug.cgi?id=1593308
- http://tracker.ceph.com/issues/24838
- https://access.redhat.com/errata/RHSA-2018:2179
- https://access.redhat.com/errata/RHSA-2018:2177
- http://www.securityfocus.com/bid/104742
- https://access.redhat.com/errata/RHSA-2018:2274
- https://access.redhat.com/errata/RHSA-2018:2261
- https://www.debian.org/security/2018/dsa-4339
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00100.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5002: Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow…
Published: 2018-07-09T19:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5002 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
- https://access.redhat.com/errata/RHSA-2018:1827
- http://www.securitytracker.com/id/1041058
- http://www.securityfocus.com/bid/104412
- https://security.gentoo.org/glsa/201806-02
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-4945: Adobe Flash Player versions 29.0.0.171 and earlier have a Type Confusion vulnerability….
Published: 2018-07-09T19:29:00 Last Modified: 2019-03-07T20:16:00
Summary
Adobe Flash Player versions 29.0.0.171 and earlier have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-4945 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
- https://access.redhat.com/errata/RHSA-2018:1827
- http://www.securitytracker.com/id/1041058
- http://www.securityfocus.com/bid/104413
- https://security.gentoo.org/glsa/201806-02
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5000: Adobe Flash Player versions 29.0.0.171 and earlier have an Integer Overflow vulnerability….
Published: 2018-07-09T19:29:00 Last Modified: 2019-03-07T20:16:00
Summary
Adobe Flash Player versions 29.0.0.171 and earlier have an Integer Overflow vulnerability. Successful exploitation could lead to information disclosure.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5000 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
- https://access.redhat.com/errata/RHSA-2018:1827
- http://www.securitytracker.com/id/1041058
- http://www.securityfocus.com/bid/104413
- https://security.gentoo.org/glsa/201806-02
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5001: Adobe Flash Player versions 29.0.0.171 and earlier have an Out-of-bounds read vulnerability….
Published: 2018-07-09T19:29:00 Last Modified: 2019-03-07T20:16:00
Summary
Adobe Flash Player versions 29.0.0.171 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5001 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
- https://access.redhat.com/errata/RHSA-2018:1827
- http://www.securitytracker.com/id/1041058
- http://www.securityfocus.com/bid/104413
- https://security.gentoo.org/glsa/201806-02
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-13785: In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function…
Published: 2018-07-09T13:29:00 Last Modified: 2020-09-08T13:00:00
Summary
In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-13785 vulnerability.
References
- https://sourceforge.net/p/libpng/bugs/278/
- https://github.com/glennrp/libpng/commit/8a05766cb74af05c04c53e6c9d60c13fc4d59bf2
- https://usn.ubuntu.com/3712-1/
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securitytracker.com/id/1041889
- http://www.securityfocus.com/bid/105599
- https://security.netapp.com/advisory/ntap-20181018-0001/
- https://access.redhat.com/errata/RHSA-2018:3008
- https://access.redhat.com/errata/RHSA-2018:3007
- https://access.redhat.com/errata/RHSA-2018:3003
- https://access.redhat.com/errata/RHSA-2018:3002
- https://access.redhat.com/errata/RHSA-2018:3001
- https://access.redhat.com/errata/RHSA-2018:3000
- https://access.redhat.com/errata/RHSA-2018:3534
- https://access.redhat.com/errata/RHSA-2018:3533
- https://access.redhat.com/errata/RHSA-2018:3672
- https://access.redhat.com/errata/RHSA-2018:3671
- https://access.redhat.com/errata/RHSA-2018:3779
- https://access.redhat.com/errata/RHSA-2018:3852
- https://security.gentoo.org/glsa/201908-10
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10892: The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does…
Published: 2018-07-06T16:29:00 Last Modified: 2020-08-31T15:49:00
Summary
The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host’s hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10892 vulnerability.
References
- https://github.com/moby/moby/pull/37404
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10892
- https://access.redhat.com/errata/RHSA-2018:2482
- https://access.redhat.com/errata/RHSA-2018:2729
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html
- https://access.redhat.com/errata/RHBA-2018:2796
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12910: The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have…
Published: 2018-07-05T18:29:00 Last Modified: 2019-05-08T18:21:00
Summary
The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12910 vulnerability.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SBREWZ3EEDYWG6PCLWL2EJ24ME5ZFAX6/
- https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f
- https://www.debian.org/security/2018/dsa-4241
- https://usn.ubuntu.com/3701-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00007.html
- https://gitlab.gnome.org/GNOME/libsoup/issues/3
- https://gitlab.gnome.org/GNOME/gnome-sdk-images/commit/4215b8a21b3b3055e947312a8920df94f93ba047
- https://access.redhat.com/errata/RHSA-2018:3140
- https://access.redhat.com/errata/RHSA-2018:3505
- https://access.redhat.com/errata/RHBA-2019:0327
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00003.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1113: setup before version 2.11.4-1.fc28 in Fedora and Red Hat Enterprise Linux added /sbin/nologin and…
Published: 2018-07-03T01:29:00 Last Modified: 2019-10-09T23:38:00
Summary
setup before version 2.11.4-1.fc28 in Fedora and Red Hat Enterprise Linux added /sbin/nologin and /usr/sbin/nologin to /etc/shells. This violates security assumptions made by pam_shells and some daemons which allow access based on a user’s shell being listed in /etc/shells. Under some circumstances, users which had their shell changed to /sbin/nologin could still access the system.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-1113 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1113
- https://access.redhat.com/errata/RHSA-2018:3249
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2615: Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an…
Published: 2018-07-03T01:29:00 Last Modified: 2021-08-04T17:15:00
Summary
Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.0
- CVSS: 9.0
- CVSS Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-2615 vulnerability.
References
- https://lists.gnu.org/archive/html/qemu-devel/2017-02/msg00015.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2615
- http://www.openwall.com/lists/oss-security/2017/02/01/6
- https://support.citrix.com/article/CTX220771
- https://security.gentoo.org/glsa/201702-28
- https://security.gentoo.org/glsa/201702-27
- http://www.securitytracker.com/id/1037804
- http://www.securityfocus.com/bid/95990
- http://rhn.redhat.com/errata/RHSA-2017-0454.html
- http://rhn.redhat.com/errata/RHSA-2017-0396.html
- http://rhn.redhat.com/errata/RHSA-2017-0350.html
- http://rhn.redhat.com/errata/RHSA-2017-0344.html
- http://rhn.redhat.com/errata/RHSA-2017-0334.html
- http://rhn.redhat.com/errata/RHSA-2017-0333.html
- http://rhn.redhat.com/errata/RHSA-2017-0332.html
- http://rhn.redhat.com/errata/RHSA-2017-0331.html
- http://rhn.redhat.com/errata/RHSA-2017-0330.html
- http://rhn.redhat.com/errata/RHSA-2017-0329.html
- http://rhn.redhat.com/errata/RHSA-2017-0328.html
- http://rhn.redhat.com/errata/RHSA-2017-0309.html
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-13033: The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30,…
Published: 2018-07-01T16:29:00 Last Modified: 2019-10-03T00:03:00
Summary
The Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted ELF file, as demonstrated by _bfd_elf_parse_attributes in elf-attrs.c and bfd_malloc in libbfd.c. This can occur during execution of nm.
Common Weakness Enumeration (CWE): CWE-770: Allocation of Resources Without Limits or Throttling
CWE Description: The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-13033 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=23361
- http://www.securityfocus.com/bid/104584
- https://access.redhat.com/errata/RHSA-2018:3032
- https://access.redhat.com/errata/RHBA-2019:0327
- https://security.gentoo.org/glsa/201908-01
- https://usn.ubuntu.com/4336-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-3760: There is an information leak vulnerability in Sprockets. Versions Affected: 4.0.0.beta7 and…
Published: 2018-06-26T19:29:00 Last Modified: 2019-10-09T23:40:00
Summary
There is an information leak vulnerability in Sprockets. Versions Affected: 4.0.0.beta7 and lower, 3.7.1 and lower, 2.12.4 and lower. Specially crafted requests can be used to access files that exists on the filesystem that is outside an application’s root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-3760 vulnerability.
References
- https://groups.google.com/d/msg/rubyonrails-security/ft_J--l55fM/7roDfQ50BwAJ
- https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5fhttps://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5
- https://www.debian.org/security/2018/dsa-4242
- https://access.redhat.com/errata/RHSA-2018:2245
- https://access.redhat.com/errata/RHSA-2018:2244
- https://access.redhat.com/errata/RHSA-2018:2561
- https://access.redhat.com/errata/RHSA-2018:2745
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10852: The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too…
Published: 2018-06-26T14:29:00 Last Modified: 2019-10-09T23:33:00
Summary
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10852 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10852
- http://www.securityfocus.com/bid/104547
- https://lists.debian.org/debian-lts-announce/2018/07/msg00019.html
- https://access.redhat.com/errata/RHSA-2018:3158
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2668: 389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference…
Published: 2018-06-22T13:29:00 Last Modified: 2019-10-09T23:27:00
Summary
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-2668 vulnerability.
References
- https://pagure.io/389-ds-base/issue/49220
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668
- https://access.redhat.com/errata/RHSA-2017:0920
- https://access.redhat.com/errata/RHSA-2017:0893
- http://www.securityfocus.com/bid/97524
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-3665: System software utilizing Lazy FP state restore technique on systems using Intel Core-based…
Published: 2018-06-21T20:29:00 Last Modified: 2021-06-09T16:24:00
Summary
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: COMPLETE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-3665 vulnerability.
References
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html
- https://www.synology.com/support/security/Synology_SA_18_31
- https://www.debian.org/security/2018/dsa-4232
- https://support.citrix.com/article/CTX235745
- https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc
- https://access.redhat.com/errata/RHSA-2018:1944
- https://access.redhat.com/errata/RHSA-2018:1852
- http://www.securitytracker.com/id/1041125
- http://www.securitytracker.com/id/1041124
- http://www.securityfocus.com/bid/104460
- https://usn.ubuntu.com/3698-2/
- https://usn.ubuntu.com/3696-2/
- https://usn.ubuntu.com/3696-1/
- https://access.redhat.com/errata/RHSA-2018:2165
- https://access.redhat.com/errata/RHSA-2018:2164
- https://usn.ubuntu.com/3698-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
- https://security.netapp.com/advisory/ntap-20181016-0001/
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://nvidia.custhelp.com/app/answers/detail/a_id/4787
- https://access.redhat.com/errata/RHSA-2019:1170
- https://access.redhat.com/errata/RHSA-2019:1190
- https://security.paloaltonetworks.com/CVE-2018-3665
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1120: A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file…
Published: 2018-06-20T13:29:00 Last Modified: 2019-10-09T23:38:00
Summary
A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process’s memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-1120 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7f7ccc2ccc2e70c6054685f5e3522efa81556830
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1120
- http://seclists.org/oss-sec/2018/q2/122
- https://www.exploit-db.com/exploits/44806/
- http://www.securityfocus.com/bid/104229
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3752-2/
- https://usn.ubuntu.com/3752-1/
- https://usn.ubuntu.com/3752-3/
- https://security.gentoo.org/glsa/201805-14
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
- https://usn.ubuntu.com/3910-2/
- https://usn.ubuntu.com/3910-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1061: python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic…
Published: 2018-06-19T12:29:00 Last Modified: 2019-10-03T00:03:00
Summary
python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1061 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061
- https://bugs.python.org/issue32981
- https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
- https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
- https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
- https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
- https://www.debian.org/security/2018/dsa-4306
- https://www.debian.org/security/2018/dsa-4307
- https://access.redhat.com/errata/RHSA-2018:3041
- https://access.redhat.com/errata/RHSA-2018:3505
- https://usn.ubuntu.com/3817-1/
- http://www.securitytracker.com/id/1042001
- https://usn.ubuntu.com/3817-2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:1260
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
- https://access.redhat.com/errata/RHSA-2019:3725
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1060: python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic…
Published: 2018-06-18T14:29:00 Last Modified: 2020-01-15T20:15:00
Summary
python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib’s apop() method. An attacker could use this flaw to cause denial of service.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1060 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1060
- https://bugs.python.org/issue32981
- https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1
- https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1
- https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
- https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
- https://www.debian.org/security/2018/dsa-4306
- https://www.debian.org/security/2018/dsa-4307
- https://access.redhat.com/errata/RHSA-2018:3041
- https://access.redhat.com/errata/RHSA-2018:3505
- https://usn.ubuntu.com/3817-1/
- http://www.securitytracker.com/id/1042001
- https://usn.ubuntu.com/3817-2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JSKPGPZQNTAULHW4UH63KGOOUIDE4RRB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEZ5IQT7OF7Q2NCGIVABOWYGKO7YU3NJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46PVWY5LFP4BRPG3BVQ5QEEFYBVEXHCK/
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:1260
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03951en_us
- https://access.redhat.com/errata/RHSA-2019:3725
- https://www.oracle.com/security-alerts/cpujan2020.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-0495: Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA…
Published: 2018-06-13T23:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
Common Weakness Enumeration (CWE): CWE-203: Observable Discrepancy
CWE Description: The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-0495 vulnerability.
References
- https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
- https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965
- https://dev.gnupg.org/T4011
- https://www.debian.org/security/2018/dsa-4231
- https://usn.ubuntu.com/3689-2/
- https://usn.ubuntu.com/3689-1/
- http://www.securitytracker.com/id/1041147
- http://www.securitytracker.com/id/1041144
- https://usn.ubuntu.com/3692-2/
- https://usn.ubuntu.com/3692-1/
- https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html
- https://access.redhat.com/errata/RHSA-2018:3221
- https://access.redhat.com/errata/RHSA-2018:3505
- https://usn.ubuntu.com/3850-1/
- https://usn.ubuntu.com/3850-2/
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://access.redhat.com/errata/RHSA-2019:1297
- https://access.redhat.com/errata/RHSA-2019:1296
- https://access.redhat.com/errata/RHSA-2019:1543
- https://access.redhat.com/errata/RHSA-2019:2237
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10850: 389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way…
Published: 2018-06-13T20:29:00 Last Modified: 2019-05-15T21:29:00
Summary
389-ds-base before versions 1.4.0.10, 1.3.8.3 is vulnerable to a race condition in the way 389-ds-base handles persistent search, resulting in a crash if the server is under load. An anonymous attacker could use this flaw to trigger a denial of service.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10850 vulnerability.
References
- https://pagure.io/389-ds-base/issue/49768
- https://pagure.io/389-ds-base/c/8f04487f99a
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10850
- https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html
- https://access.redhat.com/errata/RHSA-2018:2757
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00033.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-11806: m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
Published: 2018-06-13T16:29:00 Last Modified: 2021-08-04T17:15:00
Summary
m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-11806 vulnerability.
References
- https://www.zerodayinitiative.com/advisories/ZDI-18-567/
- https://lists.gnu.org/archive/html/qemu-devel/2018-06/msg01012.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1586245
- http://www.securityfocus.com/bid/104400
- http://www.openwall.com/lists/oss-security/2018/06/07/1
- https://access.redhat.com/errata/RHSA-2018:2462
- https://access.redhat.com/errata/RHSA-2018:2762
- https://access.redhat.com/errata/RHSA-2018:2822
- https://access.redhat.com/errata/RHSA-2018:2887
- https://usn.ubuntu.com/3826-1/
- https://lists.debian.org/debian-lts-announce/2019/05/msg00010.html
- https://www.debian.org/security/2019/dsa-4454
- https://seclists.org/bugtraq/2019/May/76
- https://access.redhat.com/errata/RHSA-2019:2892
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5848: In the function wmi_set_ie(), the length validation code does not handle unsigned integer…
Published: 2018-06-12T20:29:00 Last Modified: 2019-05-02T15:54:00
Summary
In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the ‘ie_len’ argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-5848 vulnerability.
References
- https://www.codeaurora.org/security-bulletin/2018/05/11/may-2018-code-aurora-security-bulletin-2
- https://source.android.com/security/bulletin/pixel/2018-05-01
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5803: In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an…
Published: 2018-06-12T16:29:00 Last Modified: 2019-03-27T16:17:00
Summary
In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the “_sctp_make_chunk()” function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-5803 vulnerability.
References
- https://www.spinics.net/lists/netdev/msg482523.html
- https://www.spinics.net/lists/linux-sctp/msg07036.html
- https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/
- https://secuniaresearch.flexerasoftware.com/advisories/81331/
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51
- https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102
- https://www.debian.org/security/2018/dsa-4188
- https://www.debian.org/security/2018/dsa-4187
- https://usn.ubuntu.com/3656-1/
- https://usn.ubuntu.com/3654-2/
- https://usn.ubuntu.com/3654-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://access.redhat.com/errata/RHSA-2018:1854
- https://usn.ubuntu.com/3698-2/
- https://usn.ubuntu.com/3697-2/
- https://usn.ubuntu.com/3697-1/
- https://usn.ubuntu.com/3698-1/
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2019:0641
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9079: A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T15:12:00
Summary
A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox < 50.0.2, Firefox ESR < 45.5.1, and Thunderbird < 45.5.1.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2016-9079 vulnerability.
- Firefox 50.0.1 - ASM.JS JIT-Spray Remote Code Execution by Rh0 at 2017-07-14
- Mozilla Firefox < 50.0.2 - 'nsSMILTimeContainer::NotifyTimeChange()' Remote Code Execution (Metasploit) by Metasploit at 2017-01-24
References
- https://www.mozilla.org/security/advisories/mfsa2016-92/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1321066
- https://www.exploit-db.com/exploits/42327/
- https://www.exploit-db.com/exploits/41151/
- https://www.debian.org/security/2016/dsa-3730
- https://security.gentoo.org/glsa/201701-35
- https://security.gentoo.org/glsa/201701-15
- http://www.securitytracker.com/id/1037370
- http://www.securityfocus.com/bid/94591
- http://rhn.redhat.com/errata/RHSA-2016-2850.html
- http://rhn.redhat.com/errata/RHSA-2016-2843.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9899: Use-after-free while manipulating DOM events and removing audio elements due to errors in the…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T17:55:00
Summary
Use-after-free while manipulating DOM events and removing audio elements due to errors in the handling of node adoption. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-9899 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1317409
- https://www.exploit-db.com/exploits/41042/
- https://www.debian.org/security/2017/dsa-3757
- https://security.gentoo.org/glsa/201701-15
- http://www.securitytracker.com/id/1037461
- http://www.securityfocus.com/bid/94885
- http://rhn.redhat.com/errata/RHSA-2016-2973.html
- http://rhn.redhat.com/errata/RHSA-2016-2946.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9900: External resources that should be blocked when loaded by SVG images can bypass security…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T17:56:00
Summary
External resources that should be blocked when loaded by SVG images can bypass security restrictions through the use of “data:” URLs. This could allow for cross-domain data leakage. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
Common Weakness Enumeration (CWE): CWE-254: 7PK - Security Features
CWE Description: Software security is not security software. Here we’re concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9900 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1319122
- https://www.debian.org/security/2017/dsa-3757
- https://security.gentoo.org/glsa/201701-15
- http://www.securitytracker.com/id/1037461
- http://www.securityfocus.com/bid/94885
- http://rhn.redhat.com/errata/RHSA-2016-2973.html
- http://rhn.redhat.com/errata/RHSA-2016-2946.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9895: Event handlers on “marquee” elements were executed despite a strict Content Security Policy (CSP)…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T17:22:00
Summary
Event handlers on “marquee” elements were executed despite a strict Content Security Policy (CSP) that disallowed inline JavaScript. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
Common Weakness Enumeration (CWE): CWE-254: 7PK - Security Features
CWE Description: Software security is not security software. Here we’re concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9895 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1312272
- https://www.debian.org/security/2017/dsa-3757
- https://security.gentoo.org/glsa/201701-15
- http://www.securitytracker.com/id/1037461
- http://www.securityfocus.com/bid/94885
- http://rhn.redhat.com/errata/RHSA-2016-2973.html
- http://rhn.redhat.com/errata/RHSA-2016-2946.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9898: Use-after-free resulting in potentially exploitable crash when manipulating DOM subtrees in the…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T17:24:00
Summary
Use-after-free resulting in potentially exploitable crash when manipulating DOM subtrees in the Editor. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9898 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1314442
- https://www.debian.org/security/2017/dsa-3757
- https://security.gentoo.org/glsa/201701-15
- http://www.securitytracker.com/id/1037461
- http://www.securityfocus.com/bid/94885
- http://rhn.redhat.com/errata/RHSA-2016-2946.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9893: Memory safety bugs were reported in Thunderbird 45.5. Some of these bugs showed evidence of…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T17:19:00
Summary
Memory safety bugs were reported in Thunderbird 45.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9893 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1319524%2C1298773%2C1299098%2C1309834%2C1312609%2C1313212%2C1317805%2C1312548%2C1315631%2C1287912
- https://www.debian.org/security/2017/dsa-3757
- https://security.gentoo.org/glsa/201701-15
- http://www.securitytracker.com/id/1037461
- http://www.securityfocus.com/bid/94885
- http://rhn.redhat.com/errata/RHSA-2016-2973.html
- http://rhn.redhat.com/errata/RHSA-2016-2946.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5402: A use-after-free can occur when events are fired for a “FontFace” object after the object has…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T13:01:00
Summary
A use-after-free can occur when events are fired for a “FontFace” object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5402 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334876
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3805
- https://security.gentoo.org/glsa/201705-07
- https://security.gentoo.org/glsa/201705-06
- http://www.securitytracker.com/id/1037966
- http://www.securityfocus.com/bid/96664
- http://rhn.redhat.com/errata/RHSA-2017-0498.html
- http://rhn.redhat.com/errata/RHSA-2017-0461.html
- http://rhn.redhat.com/errata/RHSA-2017-0459.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5408: Video files loaded video captions cross-origin without checking for the presence of CORS headers…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T13:07:00
Summary
Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5408 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1313711
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3805
- https://security.gentoo.org/glsa/201705-07
- https://security.gentoo.org/glsa/201705-06
- http://www.securitytracker.com/id/1037966
- http://www.securityfocus.com/bid/96693
- http://rhn.redhat.com/errata/RHSA-2017-0498.html
- http://rhn.redhat.com/errata/RHSA-2017-0461.html
- http://rhn.redhat.com/errata/RHSA-2017-0459.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5380: A potential use-after-free found through fuzzing during DOM manipulation of SVG content. This…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-02T19:44:00
Summary
A potential use-after-free found through fuzzing during DOM manipulation of SVG content. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5380 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1322107
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3771
- https://security.gentoo.org/glsa/201702-22
- https://security.gentoo.org/glsa/201702-13
- http://www.securitytracker.com/id/1037693
- http://www.securityfocus.com/bid/95769
- http://rhn.redhat.com/errata/RHSA-2017-0238.html
- http://rhn.redhat.com/errata/RHSA-2017-0190.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5386: WebExtension scripts can use the “data:” protocol to affect pages loaded by other web extensions…
Published: 2018-06-11T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
WebExtension scripts can use the “data:” protocol to affect pages loaded by other web extensions using this protocol, leading to potential data disclosure or privilege escalation in affected extensions. This vulnerability affects Firefox ESR < 45.7 and Firefox < 51.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5386 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1319070
- https://www.debian.org/security/2017/dsa-3771
- https://security.gentoo.org/glsa/201702-22
- http://www.securitytracker.com/id/1037693
- http://www.securityfocus.com/bid/95769
- http://rhn.redhat.com/errata/RHSA-2017-0190.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5439: A use-after-free vulnerability during XSLT processing due to poor handling of template…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:03:00
Summary
A use-after-free vulnerability during XSLT processing due to poor handling of template parameters. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5439 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336830
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
- http://www.securityfocus.com/bid/103053
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5404: A use-after-free error can occur when manipulating ranges in selections with one node inside a…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T13:02:00
Summary
A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-5404 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1340138
- https://www.exploit-db.com/exploits/41660/
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3805
- https://security.gentoo.org/glsa/201705-07
- https://security.gentoo.org/glsa/201705-06
- http://www.securitytracker.com/id/1037966
- http://www.securityfocus.com/bid/96664
- http://rhn.redhat.com/errata/RHSA-2017-0498.html
- http://rhn.redhat.com/errata/RHSA-2017-0461.html
- http://rhn.redhat.com/errata/RHSA-2017-0459.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5376: Use-after-free while manipulating XSL in XSLT documents. This vulnerability affects Thunderbird <…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-02T19:37:00
Summary
Use-after-free while manipulating XSL in XSLT documents. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5376 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1311687
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3771
- https://security.gentoo.org/glsa/201702-22
- https://security.gentoo.org/glsa/201702-13
- http://www.securitytracker.com/id/1037693
- http://www.securityfocus.com/bid/95758
- http://rhn.redhat.com/errata/RHSA-2017-0238.html
- http://rhn.redhat.com/errata/RHSA-2017-0190.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5390: The JSON viewer in the Developer Tools uses insecure methods to create a communication channel…
Published: 2018-06-11T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
The JSON viewer in the Developer Tools uses insecure methods to create a communication channel for copying and viewing JSON or HTTP headers data, allowing for potential privilege escalation. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5390 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1297361
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3771
- https://security.gentoo.org/glsa/201702-22
- https://security.gentoo.org/glsa/201702-13
- http://www.securitytracker.com/id/1037693
- http://www.securityfocus.com/bid/95769
- http://rhn.redhat.com/errata/RHSA-2017-0238.html
- http://rhn.redhat.com/errata/RHSA-2017-0190.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5407: Using SVG filters that don’t use the fixed point math implementation on a target iframe, a…
Published: 2018-06-11T21:29:00 Last Modified: 2018-07-31T19:03:00
Summary
Using SVG filters that don’t use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5407 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336622
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3805
- https://security.gentoo.org/glsa/201705-07
- https://security.gentoo.org/glsa/201705-06
- http://www.securitytracker.com/id/1037966
- http://www.securityfocus.com/bid/96693
- http://rhn.redhat.com/errata/RHSA-2017-0498.html
- http://rhn.redhat.com/errata/RHSA-2017-0461.html
- http://rhn.redhat.com/errata/RHSA-2017-0459.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5428: An integer overflow in “createImageBitmap()” was reported through the Pwn2Own contest. The fix…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T15:27:00
Summary
An integer overflow in “createImageBitmap()” was reported through the Pwn2Own contest. The fix for this vulnerability disables the experimental extensions to the “createImageBitmap” API. This function runs in the content sandbox, requiring a second vulnerability to compromise a user’s computer. This vulnerability affects Firefox ESR < 52.0.1 and Firefox < 52.0.1.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5428 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-08/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1348168
- http://www.securitytracker.com/id/1038060
- http://www.securityfocus.com/bid/96959
- http://rhn.redhat.com/errata/RHSA-2017-0558.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5441: A use-after-free vulnerability when holding a selection during scroll events. This results in a…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:05:00
Summary
A use-after-free vulnerability when holding a selection during scroll events. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5441 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343795
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5451: A mechanism to spoof the addressbar through the user interaction on the addressbar and the…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T15:34:00
Summary
A mechanism to spoof the addressbar through the user interaction on the addressbar and the “onblur” event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5451 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1273537
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5433: A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T17:58:00
Summary
A use-after-free vulnerability in SMIL animation functions occurs when pointers to animation elements in an array are dropped from the animation controller while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5433 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347168
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5448: An out-of-bounds write in “ClearKeyDecryptor” while decrypting some Clearkey-encrypted media…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T15:30:00
Summary
An out-of-bounds write in “ClearKeyDecryptor” while decrypting some Clearkey-encrypted media content. The “ClearKeyDecryptor” code runs within the Gecko Media Plugin (GMP) sandbox. If a second mechanism is found to escape the sandbox, this vulnerability allows for the writing of arbitrary data within memory, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5448 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1346648
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5435: A use-after-free vulnerability occurs during transaction processing in the editor during design…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:01:00
Summary
A use-after-free vulnerability occurs during transaction processing in the editor during design mode interactions. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5435 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1350683
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5465: An out-of-bounds read while processing SVG content in “ConvolvePixel”. This results in a crash…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:44:00
Summary
An out-of-bounds read while processing SVG content in “ConvolvePixel”. This results in a crash and also allows for otherwise inaccessible memory being copied into SVG graphic content, which could then displayed. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-5465 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347617
- https://www.exploit-db.com/exploits/42072/
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5472: A use-after-free vulnerability with the frameloader during tree reconstruction while regenerating…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T14:24:00
Summary
A use-after-free vulnerability with the frameloader during tree reconstruction while regenerating CSS layout when attempting to use a node in the tree that no longer exists. This results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5472 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365602
- https://www.debian.org/security/2017/dsa-3918
- https://www.debian.org/security/2017/dsa-3881
- https://access.redhat.com/errata/RHSA-2017:1561
- https://access.redhat.com/errata/RHSA-2017:1440
- http://www.securitytracker.com/id/1038689
- http://www.securityfocus.com/bid/99040
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5464: During DOM manipulations of the accessibility tree through script, the DOM tree can become out of…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:43:00
Summary
During DOM manipulations of the accessibility tree through script, the DOM tree can become out of sync with the accessibility tree, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5464 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347075
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5396: A use-after-free vulnerability in the Media Decoder when working with media files when some…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-02T19:54:00
Summary
A use-after-free vulnerability in the Media Decoder when working with media files when some events are fired after the media elements are freed from memory. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5396 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1329403
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3771
- https://security.gentoo.org/glsa/201702-22
- https://security.gentoo.org/glsa/201702-13
- http://www.securitytracker.com/id/1037693
- http://www.securityfocus.com/bid/95769
- http://rhn.redhat.com/errata/RHSA-2017-0238.html
- http://rhn.redhat.com/errata/RHSA-2017-0190.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5438: A use-after-free vulnerability during XSLT processing due to the result handler being held by a…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:02:00
Summary
A use-after-free vulnerability during XSLT processing due to the result handler being held by a freed handler during handling. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5438 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336828
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5440: A use-after-free vulnerability during XSLT processing due to a failure to propagate error…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:04:00
Summary
A use-after-free vulnerability during XSLT processing due to a failure to propagate error conditions during matching while evaluating context, leading to objects being used when they no longer exist. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5440 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336832
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5444: A buffer overflow vulnerability while parsing “application/http-index-format” format content when…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:17:00
Summary
A buffer overflow vulnerability while parsing “application/http-index-format” format content when the header contains improperly formatted data. This allows for an out-of-bounds read of data from memory. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5444 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344461
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5445: A vulnerability while parsing “application/http-index-format” format content where uninitialized…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:18:00
Summary
A vulnerability while parsing “application/http-index-format” format content where uninitialized values are used to create an array. This could allow the reading of uninitialized memory into the arrays affected. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-129: Improper Validation of Array Index
CWE Description: The most common condition situation leading to an out-of-bounds array index is the use of loop index variables as buffer indexes. If the end condition for the loop is subject to a flaw, the index can grow or shrink unbounded, therefore causing a buffer overflow or underflow. Another common situation leading to this condition is the use of a function’s return value, or the resulting value of a calculation directly as an index in to a buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5445 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344467
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5449: A possibly exploitable crash triggered during layout and manipulation of bidirectional unicode…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T15:33:00
Summary
A possibly exploitable crash triggered during layout and manipulation of bidirectional unicode text in concert with CSS animations. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5449 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1340127
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5442: A use-after-free vulnerability during changes in style when manipulating DOM elements. This…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:16:00
Summary
A use-after-free vulnerability during changes in style when manipulating DOM elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5442 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347979
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5383: URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-02T19:44:00
Summary
URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display, allowing for domain name spoofing attacks in the location bar. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5383 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1324716
- https://bugzilla.mozilla.org/show_bug.cgi?id=1323338
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3771
- https://security.gentoo.org/glsa/201702-22
- https://security.gentoo.org/glsa/201702-13
- http://www.securitytracker.com/id/1037693
- http://www.securityfocus.com/bid/95769
- http://rhn.redhat.com/errata/RHSA-2017-0238.html
- http://rhn.redhat.com/errata/RHSA-2017-0190.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5454: A mechanism to bypass file system access protections in the sandbox to use the file picker to…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T15:34:00
Summary
A mechanism to bypass file system access protections in the sandbox to use the file picker to access different files than those selected in the file picker through the use of relative paths. This allows for read only access to the local file system. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5454 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349276
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5410: Memory corruption resulting in a potentially exploitable crash during garbage collection of…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T13:20:00
Summary
Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5410 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1330687
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3805
- https://security.gentoo.org/glsa/201705-07
- https://security.gentoo.org/glsa/201705-06
- http://www.securitytracker.com/id/1037966
- http://www.securityfocus.com/bid/96693
- http://rhn.redhat.com/errata/RHSA-2017-0498.html
- http://rhn.redhat.com/errata/RHSA-2017-0461.html
- http://rhn.redhat.com/errata/RHSA-2017-0459.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5470: Memory safety bugs were reported in Firefox 53 and Firefox ESR 52.1. Some of these bugs showed…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T14:16:00
Summary
Memory safety bugs were reported in Firefox 53 and Firefox ESR 52.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5470 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1359639%2C1349595%2C1352295%2C1352556%2C1342552%2C1342567%2C1346012%2C1366140%2C1368732%2C1297111%2C1362590%2C1357462%2C1363280%2C1349266%2C1352093%2C1348424%2C1347748%2C1356025%2C1325513%2C1367692
- https://www.debian.org/security/2017/dsa-3918
- https://www.debian.org/security/2017/dsa-3881
- https://access.redhat.com/errata/RHSA-2017:1561
- https://access.redhat.com/errata/RHSA-2017:1440
- http://www.securitytracker.com/id/1038689
- http://www.securityfocus.com/bid/99041
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5469: Fixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex….
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:44:00
Summary
Fixed potential buffer overflows in generated Firefox code due to CVE-2016-6354 issue in Flex. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5469 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1292534
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5432: A use-after-free vulnerability occurs during certain text input selection resulting in a…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T17:56:00
Summary
A use-after-free vulnerability occurs during certain text input selection resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5432 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1346654
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5456: A mechanism to bypass file system access protections in the sandbox using the file system request…
Published: 2018-06-11T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5456 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344415
- https://access.redhat.com/errata/RHSA-2017:1106
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5378: Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-02T19:43:00
Summary
Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object’s address can be discovered through hash codes, and also allows for data leakage of an object’s content using these hash codes. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5378 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1330769
- https://bugzilla.mozilla.org/show_bug.cgi?id=1312001
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3771
- https://security.gentoo.org/glsa/201702-22
- https://security.gentoo.org/glsa/201702-13
- http://www.securitytracker.com/id/1037693
- http://www.securityfocus.com/bid/95769
- http://rhn.redhat.com/errata/RHSA-2017-0238.html
- http://rhn.redhat.com/errata/RHSA-2017-0190.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5405: Certain response codes in FTP connections can result in the use of uninitialized values for ports…
Published: 2018-06-11T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
Common Weakness Enumeration (CWE): CWE-1187:
CWE Description:
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5405 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336699
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3805
- https://security.gentoo.org/glsa/201705-07
- https://security.gentoo.org/glsa/201705-06
- http://www.securitytracker.com/id/1037966
- http://www.securityfocus.com/bid/96693
- http://rhn.redhat.com/errata/RHSA-2017-0498.html
- http://rhn.redhat.com/errata/RHSA-2017-0461.html
- http://rhn.redhat.com/errata/RHSA-2017-0459.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5401: A crash triggerable by web content in which an “ErrorResult” references unassigned memory due to…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T13:00:00
Summary
A crash triggerable by web content in which an “ErrorResult” references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
Common Weakness Enumeration (CWE): CWE-388: 7PK - Errors
CWE Description: This category represents one of the phyla in the Seven Pernicious Kingdoms vulnerability classification. It includes weaknesses that occur when an application does not properly handle errors that occur during processing. According to the authors of the Seven Pernicious Kingdoms, “Errors and error handling represent a class of API. Errors related to error handling are so common that they deserve a special kingdom of their own. As with ‘API Abuse,’ there are two ways to introduce an error-related security vulnerability: the most common one is handling errors poorly (or not at all). The second is producing errors that either give out too much information (to possible attackers) or are difficult to handle.”
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5401 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1328861
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3805
- https://security.gentoo.org/glsa/201705-07
- https://security.gentoo.org/glsa/201705-06
- http://www.securitytracker.com/id/1037966
- http://www.securityfocus.com/bid/96677
- http://rhn.redhat.com/errata/RHSA-2017-0498.html
- http://rhn.redhat.com/errata/RHSA-2017-0461.html
- http://rhn.redhat.com/errata/RHSA-2017-0459.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5436: An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:01:00
Summary
An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5436 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1345461
- https://www.debian.org/security/2017/dsa-3831
- https://security.gentoo.org/glsa/201706-25
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5443: An out-of-bounds write vulnerability while decoding improperly formed BinHex format archives….
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:17:00
Summary
An out-of-bounds write vulnerability while decoding improperly formed BinHex format archives. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5443 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1342661
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5447: An out-of-bounds read during the processing of glyph widths during text layout. This results in a…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:19:00
Summary
An out-of-bounds read during the processing of glyph widths during text layout. This results in a potentially exploitable crash and could allow an attacker to read otherwise inaccessible memory. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-5447 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343552
- https://www.exploit-db.com/exploits/42071/
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5466: If a page is loaded from an original site through a hyperlink and contains a redirect to a…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T15:51:00
Summary
If a page is loaded from an original site through a hyperlink and contains a redirect to a “data:text/html” URL, triggering a reload will run the reloaded “data:text/html” page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5466 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1353975
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5446: An out-of-bounds read when an HTTP/2 connection to a servers sends “DATA” frames with incorrect…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:19:00
Summary
An out-of-bounds read when an HTTP/2 connection to a servers sends “DATA” frames with incorrect data content. This leads to a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5446 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343505
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5455: The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and…
Published: 2018-06-11T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
The internal feed reader APIs that crossed the sandbox barrier allowed for a sandbox escape and escalation of privilege if combined with another vulnerability that resulted in remote code execution inside the sandboxed process. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5455 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1341191
- https://access.redhat.com/errata/RHSA-2017:1106
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5460: A use-after-free vulnerability in frame selection triggered by a combination of malicious script…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:21:00
Summary
A use-after-free vulnerability in frame selection triggered by a combination of malicious script content and key presses by a user. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5460 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1343642
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7749: A use-after-free vulnerability when using an incorrect URL during the reloading of a docshell….
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T14:18:00
Summary
A use-after-free vulnerability when using an incorrect URL during the reloading of a docshell. This results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7749 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355039
- https://www.debian.org/security/2017/dsa-3918
- https://www.debian.org/security/2017/dsa-3881
- https://access.redhat.com/errata/RHSA-2017:1561
- https://access.redhat.com/errata/RHSA-2017:1440
- http://www.securitytracker.com/id/1038689
- http://www.securityfocus.com/bid/99057
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7753: An out-of-bounds read occurs when applying style rules to pseudo-elements, such as ::first-line,…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T14:54:00
Summary
An out-of-bounds read occurs when applying style rules to pseudo-elements, such as ::first-line, using cached style data. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7753 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1353312
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100315
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7784: A use-after-free vulnerability can occur when reading an image observer during frame…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T15:07:00
Summary
A use-after-free vulnerability can occur when reading an image observer during frame reconstruction after the observer has been freed. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7784 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376087
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100202
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7786: A buffer overflow can occur when the image renderer attempts to paint non-displayable SVG…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T15:09:00
Summary
A buffer overflow can occur when the image renderer attempts to paint non-displayable SVG elements. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7786 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365189
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100206
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7793: A use-after-free vulnerability can occur in the Fetch API when the worker or the associated…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T16:14:00
Summary
A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7793 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1371889
- https://www.debian.org/security/2017/dsa-4014
- https://www.debian.org/security/2017/dsa-3987
- https://security.gentoo.org/glsa/201803-14
- https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
- https://access.redhat.com/errata/RHSA-2017:2885
- https://access.redhat.com/errata/RHSA-2017:2831
- http://www.securitytracker.com/id/1039465
- http://www.securityfocus.com/bid/101055
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7802: A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T15:14:00
Summary
A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. If these elements have been freed due to a lack of strong references, a potentially exploitable crash may occur when the freed elements are accessed. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7802 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1378147
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100202
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7750: A use-after-free vulnerability during video control operations when a “
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T14:22:00
Summary
A use-after-free vulnerability during video control operations when a “
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7750 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356558
- https://www.debian.org/security/2017/dsa-3918
- https://www.debian.org/security/2017/dsa-3881
- https://access.redhat.com/errata/RHSA-2017:1561
- https://access.redhat.com/errata/RHSA-2017:1440
- http://www.securitytracker.com/id/1038689
- http://www.securityfocus.com/bid/99057
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7751: A use-after-free vulnerability with content viewer listeners that results in a potentially…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T14:28:00
Summary
A use-after-free vulnerability with content viewer listeners that results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7751 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1363396
- https://www.debian.org/security/2017/dsa-3918
- https://www.debian.org/security/2017/dsa-3881
- https://access.redhat.com/errata/RHSA-2017:1561
- https://access.redhat.com/errata/RHSA-2017:1440
- http://www.securitytracker.com/id/1038689
- http://www.securityfocus.com/bid/99057
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7752: A use-after-free vulnerability during specific user interactions with the input method editor…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T14:31:00
Summary
A use-after-free vulnerability during specific user interactions with the input method editor (IME) in some languages due to how events are handled. This results in a potentially exploitable crash but would require specific user interaction to trigger. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7752 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1359547
- https://www.debian.org/security/2017/dsa-3918
- https://www.debian.org/security/2017/dsa-3881
- https://access.redhat.com/errata/RHSA-2017:1561
- https://access.redhat.com/errata/RHSA-2017:1440
- http://www.securitytracker.com/id/1038689
- http://www.securityfocus.com/bid/99057
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7807: A mechanism that uses AppCache to hijack a URL in a domain using fallback by serving the files…
Published: 2018-06-11T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
A mechanism that uses AppCache to hijack a URL in a domain using fallback by serving the files from a sub-path on the domain. This has been addressed by requiring fallback files be inside the manifest directory. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7807 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376459
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100242
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7809: A use-after-free vulnerability can occur when an editor DOM node is deleted prematurely during…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T15:26:00
Summary
A use-after-free vulnerability can occur when an editor DOM node is deleted prematurely during tree traversal while still bound to the document. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7809 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1380284
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100203
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7754: An out-of-bounds read in WebGL with a maliciously crafted “ImageInfo” object during WebGL…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T14:31:00
Summary
An out-of-bounds read in WebGL with a maliciously crafted “ImageInfo” object during WebGL operations. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7754 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1357090
- https://www.debian.org/security/2017/dsa-3918
- https://www.debian.org/security/2017/dsa-3881
- https://access.redhat.com/errata/RHSA-2017:1561
- https://access.redhat.com/errata/RHSA-2017:1440
- http://www.securitytracker.com/id/1038689
- http://www.securityfocus.com/bid/99057
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7785: A buffer overflow can occur when manipulating Accessible Rich Internet Applications (ARIA)…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T15:09:00
Summary
A buffer overflow can occur when manipulating Accessible Rich Internet Applications (ARIA) attributes within the DOM. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7785 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356985
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100206
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7787: Same-origin policy protections can be bypassed on pages with embedded iframes during page…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T15:10:00
Summary
Same-origin policy protections can be bypassed on pages with embedded iframes during page reloads, allowing the iframes to access content on the top level page, leading to information disclosure. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7787 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1322896
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100234
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7791: On pages containing an iframe, the “data:” protocol can be used to create a modal alert that will…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T15:11:00
Summary
On pages containing an iframe, the “data:” protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7791 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1365875
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100240
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7792: A buffer overflow will occur when viewing a certificate in the certificate manager if the…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T15:12:00
Summary
A buffer overflow will occur when viewing a certificate in the certificate manager if the certificate has an extremely long object identifier (OID). This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7792 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1368652
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100206
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7798: The Developer Tools feature suffers from a XUL injection vulnerability due to improper…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T16:16:00
Summary
The Developer Tools feature suffers from a XUL injection vulnerability due to improper sanitization of the web page source code. In the worst case, this could allow arbitrary code execution when opening a malicious page with the style editor tool. This vulnerability affects Firefox ESR < 52.3 and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7798 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1371586%2C1372112
- https://www.debian.org/security/2017/dsa-3928
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100198
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7800: A use-after-free vulnerability can occur in WebSockets when the object holding the connection is…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T15:13:00
Summary
A use-after-free vulnerability can occur in WebSockets when the object holding the connection is freed before the disconnection operation is finished. This results in an exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7800 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1374047
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100196
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7801: A use-after-free vulnerability can occur while re-computing layout for a “marquee” element during…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T15:14:00
Summary
A use-after-free vulnerability can occur while re-computing layout for a “marquee” element during window resizing where the updated style object is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7801 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1371259
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100197
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7848: RSS fields can inject new lines into the created email structure, modifying the message body….
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T13:41:00
Summary
RSS fields can inject new lines into the created email structure, modifying the message body. This vulnerability affects Thunderbird < 52.5.2.
Common Weakness Enumeration (CWE): CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)
CWE Description: The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7848 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411699
- https://www.debian.org/security/2017/dsa-4075
- https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- https://access.redhat.com/errata/RHSA-2018:0061
- http://www.securitytracker.com/id/1040123
- http://www.securityfocus.com/bid/102258
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5095: An integer overflow vulnerability in the Skia library when allocating memory for edge builders on…
Published: 2018-06-11T21:29:00 Last Modified: 2020-08-24T17:37:00
Summary
An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Common Weakness Enumeration (CWE): CWE-908: Use of Uninitialized Resource
CWE Description: The software uses or accesses a resource that has not been initialized.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5095 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418447
- https://www.debian.org/security/2018/dsa-4102
- https://www.debian.org/security/2018/dsa-4096
- https://usn.ubuntu.com/3544-1/
- https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://access.redhat.com/errata/RHSA-2018:0262
- https://access.redhat.com/errata/RHSA-2018:0122
- http://www.securitytracker.com/id/1040270
- http://www.securityfocus.com/bid/102783
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5091: A use-after-free vulnerability can occur during WebRTC connections when interacting with the DTMF…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T16:29:00
Summary
A use-after-free vulnerability can occur during WebRTC connections when interacting with the DTMF timers. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Firefox < 58.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5091 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423086
- https://www.debian.org/security/2018/dsa-4102
- https://www.debian.org/security/2018/dsa-4096
- https://usn.ubuntu.com/3544-1/
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://access.redhat.com/errata/RHSA-2018:0122
- http://www.securitytracker.com/id/1040270
- http://www.securityfocus.com/bid/102783
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5096: A use-after-free vulnerability can occur while editing events in form elements on a page,…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T12:46:00
Summary
A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Thunderbird < 52.6.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5096 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418922
- https://www.debian.org/security/2018/dsa-4102
- https://www.debian.org/security/2018/dsa-4096
- https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://access.redhat.com/errata/RHSA-2018:0262
- https://access.redhat.com/errata/RHSA-2018:0122
- http://www.securityfocus.com/bid/102771
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5117: If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in…
Published: 2018-06-11T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can mislead users to believe they are on a different site than the one loaded. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5117 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1395508
- https://www.debian.org/security/2018/dsa-4102
- https://www.debian.org/security/2018/dsa-4096
- https://usn.ubuntu.com/3544-1/
- https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://access.redhat.com/errata/RHSA-2018:0262
- https://access.redhat.com/errata/RHSA-2018:0122
- http://www.securitytracker.com/id/1040270
- http://www.securityfocus.com/bid/102783
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5184: Using remote content in encrypted messages can lead to the disclosure of plaintext. This…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-13T14:23:00
Summary
Using remote content in encrypted messages can lead to the disclosure of plaintext. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
Common Weakness Enumeration (CWE): CWE-326: Inadequate Encryption Strength
CWE Description: The software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5184 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411592
- https://www.debian.org/security/2018/dsa-4209
- https://usn.ubuntu.com/3660-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- https://access.redhat.com/errata/RHSA-2018:1726
- https://access.redhat.com/errata/RHSA-2018:1725
- http://www.securitytracker.com/id/1040946
- http://www.securityfocus.com/bid/104240
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9901: HTML tags received from the Pocket server will be processed without sanitization and any…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-01T13:43:00
Summary
HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the “about:pocket-saved” (unprivileged) page, giving it access to Pocket’s messaging API through HTML injection. This vulnerability affects Firefox ESR < 45.6 and Firefox < 50.1.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9901 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1320057
- https://security.gentoo.org/glsa/201701-15
- http://www.securitytracker.com/id/1037461
- http://www.securityfocus.com/bid/94885
- http://rhn.redhat.com/errata/RHSA-2016-2973.html
- http://rhn.redhat.com/errata/RHSA-2016-2946.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7824: A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library,…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T16:25:00
Summary
A buffer overflow occurs when drawing and validating elements with the ANGLE graphics library, used for WebGL content. This is due to an incorrect value being passed within the library during checks and results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7824 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1398381
- https://www.debian.org/security/2017/dsa-4014
- https://www.debian.org/security/2017/dsa-3987
- https://security.gentoo.org/glsa/201803-14
- https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
- https://access.redhat.com/errata/RHSA-2017:2885
- https://access.redhat.com/errata/RHSA-2017:2831
- http://www.securitytracker.com/id/1039465
- http://www.securityfocus.com/bid/101053
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7829: It is possible to spoof the sender’s email address and display an arbitrary sender address to the…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T12:28:00
Summary
It is possible to spoof the sender’s email address and display an arbitrary sender address to the email recipient. The real sender’s address is not displayed if preceded by a null character in the display string. This vulnerability affects Thunderbird < 52.5.2.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7829 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423432
- https://www.debian.org/security/2017/dsa-4075
- https://usn.ubuntu.com/3529-1/
- https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- https://access.redhat.com/errata/RHSA-2018:0061
- http://www.securitytracker.com/id/1040123
- http://www.securityfocus.com/bid/102258
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7847: Crafted CSS in an RSS feed can leak and reveal local path strings, which may contain user name….
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T12:32:00
Summary
Crafted CSS in an RSS feed can leak and reveal local path strings, which may contain user name. This vulnerability affects Thunderbird < 52.5.2.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7847 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411708
- https://www.debian.org/security/2017/dsa-4075
- https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- https://access.redhat.com/errata/RHSA-2018:0061
- http://www.securitytracker.com/id/1040123
- http://www.securityfocus.com/bid/102258
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9905: A potentially exploitable crash in “EnumerateSubDocuments” while adding or removing sub-…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T15:14:00
Summary
A potentially exploitable crash in “EnumerateSubDocuments” while adding or removing sub-documents. This vulnerability affects Firefox ESR < 45.6 and Thunderbird < 45.6.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9905 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1293985
- https://www.debian.org/security/2017/dsa-3757
- https://security.gentoo.org/glsa/201701-15
- http://www.securitytracker.com/id/1037462
- http://www.securityfocus.com/bid/94884
- http://rhn.redhat.com/errata/RHSA-2016-2973.html
- http://rhn.redhat.com/errata/RHSA-2016-2946.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9904: An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-01T13:37:00
Summary
An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9904 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1317936
- https://www.debian.org/security/2017/dsa-3757
- https://security.gentoo.org/glsa/201701-15
- http://www.securitytracker.com/id/1037461
- http://www.securityfocus.com/bid/94885
- http://rhn.redhat.com/errata/RHSA-2016-2946.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9902: The Pocket toolbar button, once activated, listens for events fired from it’s own pages but does…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T16:39:00
Summary
The Pocket toolbar button, once activated, listens for events fired from it’s own pages but does not verify the origin of incoming events. This allows content from other origins to fire events and inject content and commands into the Pocket context. Note: this issue does not affect users with e10s enabled. This vulnerability affects Firefox ESR < 45.6 and Firefox < 50.1.
Common Weakness Enumeration (CWE): CWE-346: Origin Validation Error
CWE Description: The software does not properly verify that the source of data or communication is valid.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9902 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1320039
- https://security.gentoo.org/glsa/201701-15
- http://www.securitytracker.com/id/1037461
- http://www.securityfocus.com/bid/94885
- http://rhn.redhat.com/errata/RHSA-2016-2973.html
- http://rhn.redhat.com/errata/RHSA-2016-2946.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5434: A use-after-free vulnerability occurs when redirecting focus handling which results in a…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:00:00
Summary
A use-after-free vulnerability occurs when redirecting focus handling which results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5434 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349946
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5459: A buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T18:20:00
Summary
A buffer overflow in WebGL triggerable by web content, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5459 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1333858
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5373: Memory safety bugs were reported in Firefox 50.1 and Firefox ESR 45.6. Some of these bugs showed…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-02T19:34:00
Summary
Memory safety bugs were reported in Firefox 50.1 and Firefox ESR 45.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5373 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1322315%2C1328834%2C1322420%2C1285833%2C1285960%2C1328251%2C1331058%2C1325938%2C1325877
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3771
- https://security.gentoo.org/glsa/201702-22
- https://security.gentoo.org/glsa/201702-13
- http://www.securitytracker.com/id/1037693
- http://www.securityfocus.com/bid/95762
- http://rhn.redhat.com/errata/RHSA-2017-0238.html
- http://rhn.redhat.com/errata/RHSA-2017-0190.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5400: JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T12:56:00
Summary
JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5400 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334933
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3805
- https://security.gentoo.org/glsa/201705-07
- https://security.gentoo.org/glsa/201705-06
- http://www.securitytracker.com/id/1037966
- http://www.securityfocus.com/bid/96654
- http://rhn.redhat.com/errata/RHSA-2017-0498.html
- http://rhn.redhat.com/errata/RHSA-2017-0461.html
- http://rhn.redhat.com/errata/RHSA-2017-0459.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5375: JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-02T19:35:00
Summary
JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Thunderbird < 45.7, Firefox ESR < 45.7, and Firefox < 51.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 3)
Code designed for conducting penetration testing on CVE-2017-5375 vulnerability.
- Firefox 46.0.1 - ASM.JS JIT-Spray Remote Code Execution by Rh0 at 2018-03-16
- Firefox 44.0.2 - ASM.JS JIT-Spray Remote Code Execution by Rh0 at 2018-03-16
- Firefox 50.0.1 - ASM.JS JIT-Spray Remote Code Execution by Rh0 at 2017-07-14
References
- https://www.mozilla.org/security/advisories/mfsa2017-03/
- https://www.mozilla.org/security/advisories/mfsa2017-02/
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1325200
- https://www.exploit-db.com/exploits/44294/
- https://www.exploit-db.com/exploits/44293/
- https://www.exploit-db.com/exploits/42327/
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3771
- https://security.gentoo.org/glsa/201702-22
- https://security.gentoo.org/glsa/201702-13
- http://www.securitytracker.com/id/1037693
- http://www.securityfocus.com/bid/95757
- http://rhn.redhat.com/errata/RHSA-2017-0238.html
- http://rhn.redhat.com/errata/RHSA-2017-0190.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5467: A potential memory corruption and crash when using Skia content when drawing content outside of…
Published: 2018-06-11T21:29:00 Last Modified: 2018-07-30T15:00:00
Summary
A potential memory corruption and crash when using Skia content when drawing content outside of the bounds of a clipping region. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5467 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1347262
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5429: Memory safety bugs were reported in Firefox 52, Firefox ESR 45.8, Firefox ESR 52, and Thunderbird…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T17:53:00
Summary
Memory safety bugs were reported in Firefox 52, Firefox ESR 45.8, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 45.9, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5429 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-11/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1343261%2C1350844%2C1341096%2C1342823%2C1348894%2C1348941%2C1349340%2C1352926%2C1353088%2C
- https://www.debian.org/security/2017/dsa-3831
- https://access.redhat.com/errata/RHSA-2017:1201
- https://access.redhat.com/errata/RHSA-2017:1106
- https://access.redhat.com/errata/RHSA-2017:1104
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5430: Memory safety bugs were reported in Firefox 52, Firefox ESR 52, and Thunderbird 52. Some of these…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T15:28:00
Summary
Memory safety bugs were reported in Firefox 52, Firefox ESR 52, and Thunderbird 52. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5430 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-13/
- https://www.mozilla.org/security/advisories/mfsa2017-12/
- https://www.mozilla.org/security/advisories/mfsa2017-10/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1342101%2C1340482%2C1344686%2C1329796%2C1346419%2C1349621%2C1344081%2C1344305%2C1348143%2C1349719%2C1353476%2C1337418%2C1346140%2C1339722
- https://access.redhat.com/errata/RHSA-2017:1106
- http://www.securitytracker.com/id/1038320
- http://www.securityfocus.com/bid/97940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5398: Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-01T12:05:00
Summary
Memory safety bugs were reported in Thunderbird 45.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5398 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1332550%2C1332597%2C1338383%2C1321612%2C1322971%2C1333568%2C1333887%2C1335450%2C1325052%2C1324379%2C1336510
- https://www.debian.org/security/2017/dsa-3832
- https://www.debian.org/security/2017/dsa-3805
- https://security.gentoo.org/glsa/201705-07
- https://security.gentoo.org/glsa/201705-06
- http://www.securitytracker.com/id/1037966
- http://www.securityfocus.com/bid/96651
- http://rhn.redhat.com/errata/RHSA-2017-0498.html
- http://rhn.redhat.com/errata/RHSA-2017-0461.html
- http://rhn.redhat.com/errata/RHSA-2017-0459.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7762: When entered directly, Reader Mode did not strip the username and password section of URLs…
Published: 2018-06-11T21:29:00 Last Modified: 2018-07-30T15:23:00
Summary
When entered directly, Reader Mode did not strip the username and password section of URLs displayed in the addressbar. This can be used for spoofing the domain of the current page. This vulnerability affects Firefox < 54.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7762 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1358248
- http://www.securitytracker.com/id/1038689
- http://www.securityfocus.com/bid/99047
- https://access.redhat.com/errata/RHSA-2018:2113
- https://access.redhat.com/errata/RHSA-2018:2112
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7779: Memory safety bugs were reported in Firefox 54, Firefox ESR 52.2, and Thunderbird 52.2. Some of…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-01T12:04:00
Summary
Memory safety bugs were reported in Firefox 54, Firefox ESR 52.2, and Thunderbird 52.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7779 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1354443%2C1368576%2C1366903%2C1369913%2C1371424%2C1346590%2C1371890%2C1372985%2C1362924%2C1368105%2C1369994%2C1371283%2C1368362%2C1378826%2C1380426%2C1368030%2C1373220%2C1321384%2C1383002
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100201
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7758: An out-of-bounds read vulnerability with the Opus encoder when the number of channels in an audio…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T14:39:00
Summary
An out-of-bounds read vulnerability with the Opus encoder when the number of channels in an audio stream changes while the encoder is in use. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7758 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1368490
- https://www.debian.org/security/2017/dsa-3918
- https://www.debian.org/security/2017/dsa-3881
- https://access.redhat.com/errata/RHSA-2017:1561
- https://access.redhat.com/errata/RHSA-2017:1440
- http://www.securitytracker.com/id/1038689
- http://www.securityfocus.com/bid/99057
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7810: Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-01T12:05:00
Summary
Memory safety bugs were reported in Firefox 55 and Firefox ESR 52.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7810 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1386787%2C1389974%2C1371657%2C1360334%2C1390550%2C1380824%2C1387918%2C1395598
- https://www.debian.org/security/2017/dsa-4014
- https://www.debian.org/security/2017/dsa-3987
- https://security.gentoo.org/glsa/201803-14
- https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
- https://access.redhat.com/errata/RHSA-2017:2885
- https://access.redhat.com/errata/RHSA-2017:2831
- http://www.securitytracker.com/id/1039465
- http://www.securityfocus.com/bid/101054
- https://usn.ubuntu.com/3688-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7826: Memory safety bugs were reported in Firefox 56 and Firefox ESR 52.4. Some of these bugs showed…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-01T12:06:00
Summary
Memory safety bugs were reported in Firefox 56 and Firefox ESR 52.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 57, Firefox ESR < 52.5, and Thunderbird < 52.5.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7826 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-26/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1394530%2C1369561%2C1411458%2C1400003%2C1395138%2C1408412%2C1393840%2C1400763%2C1339259%2C1394265%2C1407740%2C1407751%2C1408005%2C1406398%2C1387799%2C1261175%2C1400554%2C1375146%2C1397811%2C1404636%2C1401804
- https://www.debian.org/security/2017/dsa-4075
- https://www.debian.org/security/2017/dsa-4061
- https://www.debian.org/security/2017/dsa-4035
- https://lists.debian.org/debian-lts-announce/2017/12/msg00001.html
- https://lists.debian.org/debian-lts-announce/2017/11/msg00018.html
- https://access.redhat.com/errata/RHSA-2017:3372
- https://access.redhat.com/errata/RHSA-2017:3247
- http://www.securitytracker.com/id/1039803
- http://www.securityfocus.com/bid/101832
- https://usn.ubuntu.com/3688-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7830: The Resource Timing API incorrectly revealed navigations in cross-origin iframes. This is a same-…
Published: 2018-06-11T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
The Resource Timing API incorrectly revealed navigations in cross-origin iframes. This is a same-origin policy violation and could allow for data theft of URLs loaded by users. This vulnerability affects Firefox < 57, Firefox ESR < 52.5, and Thunderbird < 52.5.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7830 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-26/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1408990
- https://www.debian.org/security/2017/dsa-4075
- https://www.debian.org/security/2017/dsa-4061
- https://www.debian.org/security/2017/dsa-4035
- https://lists.debian.org/debian-lts-announce/2017/12/msg00001.html
- https://lists.debian.org/debian-lts-announce/2017/11/msg00018.html
- https://access.redhat.com/errata/RHSA-2017:3372
- https://access.redhat.com/errata/RHSA-2017:3247
- http://www.securitytracker.com/id/1039803
- http://www.securityfocus.com/bid/101832
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7846: It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website,…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-07T12:35:00
Summary
It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via “View -> Feed article -> Website” or in the standard format of “View -> Feed article -> default format”. This vulnerability affects Thunderbird < 52.5.2.
Common Weakness Enumeration (CWE): CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)
CWE Description: The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7846 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411716
- https://www.debian.org/security/2017/dsa-4075
- https://lists.debian.org/debian-lts-announce/2017/12/msg00026.html
- https://access.redhat.com/errata/RHSA-2018:0061
- http://www.securitytracker.com/id/1040123
- http://www.securityfocus.com/bid/102258
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7803: When a page’s content security policy (CSP) header contains a “sandbox” directive, other…
Published: 2018-06-11T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
When a page’s content security policy (CSP) header contains a “sandbox” directive, other directives are ignored. This results in the incorrect enforcement of CSP. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7803 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-20/
- https://www.mozilla.org/security/advisories/mfsa2017-19/
- https://www.mozilla.org/security/advisories/mfsa2017-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1377426
- https://www.debian.org/security/2017/dsa-3968
- https://www.debian.org/security/2017/dsa-3928
- https://security.gentoo.org/glsa/201803-14
- https://access.redhat.com/errata/RHSA-2017:2534
- https://access.redhat.com/errata/RHSA-2017:2456
- http://www.securitytracker.com/id/1039124
- http://www.securityfocus.com/bid/100234
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7819: A use-after-free vulnerability can occur in design mode when image objects are resized if objects…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T16:23:00
Summary
A use-after-free vulnerability can occur in design mode when image objects are resized if objects referenced during the resizing have been freed from memory. This results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7819 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1380292
- https://www.debian.org/security/2017/dsa-4014
- https://www.debian.org/security/2017/dsa-3987
- https://security.gentoo.org/glsa/201803-14
- https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
- https://access.redhat.com/errata/RHSA-2017:2885
- https://access.redhat.com/errata/RHSA-2017:2831
- http://www.securitytracker.com/id/1039465
- http://www.securityfocus.com/bid/101055
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7843: When Private Browsing mode is used, it is possible for a web worker to write persistent data to…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-06T16:35:00
Summary
When Private Browsing mode is used, it is possible for a web worker to write persistent data to IndexedDB and fingerprint a user uniquely. IndexedDB should not be available in Private Browsing mode and this stored data will persist across multiple private browsing mode sessions because it is not cleared when exiting. This vulnerability affects Firefox ESR < 52.5.2 and Firefox < 57.0.1.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7843 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-28/
- https://www.mozilla.org/security/advisories/mfsa2017-27/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1410106
- https://www.debian.org/security/2017/dsa-4062
- https://lists.debian.org/debian-lts-announce/2017/12/msg00003.html
- https://access.redhat.com/errata/RHSA-2017:3382
- http://www.securitytracker.com/id/1039954
- http://www.securityfocus.com/bid/102112
- http://www.securityfocus.com/bid/102039
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7814: File downloads encoded with “blob:” and “data:” URL elements bypassed normal file download checks…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-06T16:28:00
Summary
File downloads encoded with “blob:” and “data:” URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7814 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1376036
- https://www.debian.org/security/2017/dsa-4014
- https://www.debian.org/security/2017/dsa-3987
- https://security.gentoo.org/glsa/201803-14
- https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
- https://access.redhat.com/errata/RHSA-2017:2885
- https://access.redhat.com/errata/RHSA-2017:2831
- http://www.securitytracker.com/id/1039465
- http://www.securityfocus.com/bid/101059
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7818: A use-after-free vulnerability can occur when manipulating arrays of Accessible Rich Internet…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T16:17:00
Summary
A use-after-free vulnerability can occur when manipulating arrays of Accessible Rich Internet Applications (ARIA) elements within containers through the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7818 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1363723
- https://www.debian.org/security/2017/dsa-4014
- https://www.debian.org/security/2017/dsa-3987
- https://security.gentoo.org/glsa/201803-14
- https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
- https://access.redhat.com/errata/RHSA-2017:2885
- https://access.redhat.com/errata/RHSA-2017:2831
- http://www.securitytracker.com/id/1039465
- http://www.securityfocus.com/bid/101055
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7823: The content security policy (CSP) “sandbox” directive did not create a unique origin for the…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T16:24:00
Summary
The content security policy (CSP) “sandbox” directive did not create a unique origin for the document, causing it to behave as if the “allow-same-origin” keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7823 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1396320
- https://www.debian.org/security/2017/dsa-4014
- https://www.debian.org/security/2017/dsa-3987
- https://security.gentoo.org/glsa/201803-14
- https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html
- https://access.redhat.com/errata/RHSA-2017:2885
- https://access.redhat.com/errata/RHSA-2017:2831
- http://www.securitytracker.com/id/1039465
- http://www.securityfocus.com/bid/101059
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7828: A use-after-free vulnerability can occur when flushing and resizing layout because the…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-02T20:18:00
Summary
A use-after-free vulnerability can occur when flushing and resizing layout because the “PressShell” object has been freed while still in use. This results in a potentially exploitable crash during these operations. This vulnerability affects Firefox < 57, Firefox ESR < 52.5, and Thunderbird < 52.5.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7828 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2017-26/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1412252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1406750
- https://www.debian.org/security/2017/dsa-4075
- https://www.debian.org/security/2017/dsa-4061
- https://www.debian.org/security/2017/dsa-4035
- https://lists.debian.org/debian-lts-announce/2017/12/msg00001.html
- https://lists.debian.org/debian-lts-announce/2017/11/msg00018.html
- https://access.redhat.com/errata/RHSA-2017:3372
- https://access.redhat.com/errata/RHSA-2017:3247
- http://www.securitytracker.com/id/1039803
- http://www.securityfocus.com/bid/101832
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5098: A use-after-free vulnerability can occur when form input elements, focus, and selections are…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T16:55:00
Summary
A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5098 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1399400
- https://www.debian.org/security/2018/dsa-4102
- https://www.debian.org/security/2018/dsa-4096
- https://usn.ubuntu.com/3544-1/
- https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://access.redhat.com/errata/RHSA-2018:0262
- https://access.redhat.com/errata/RHSA-2018:0122
- http://www.securitytracker.com/id/1040270
- http://www.securityfocus.com/bid/102783
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5103: A use-after-free vulnerability can occur during mouse event handling due to issues with…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T16:56:00
Summary
A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5103 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423159
- https://www.debian.org/security/2018/dsa-4102
- https://www.debian.org/security/2018/dsa-4096
- https://usn.ubuntu.com/3544-1/
- https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://access.redhat.com/errata/RHSA-2018:0262
- https://access.redhat.com/errata/RHSA-2018:0122
- http://www.securitytracker.com/id/1040270
- http://www.securityfocus.com/bid/102783
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5130: When packets with a mismatched RTP payload type are sent in WebRTC connections, in some…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-08T14:21:00
Summary
When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5130 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-06/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1433005
- https://www.debian.org/security/2018/dsa-4139
- https://usn.ubuntu.com/3596-1/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html
- https://access.redhat.com/errata/RHSA-2018:0527
- https://access.redhat.com/errata/RHSA-2018:0526
- http://www.securitytracker.com/id/1040514
- http://www.securityfocus.com/bid/103388
- https://security.gentoo.org/glsa/201810-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5159: An integer overflow can occur in the Skia library due to 32-bit integer use in an array without…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-11T16:06:00
Summary
An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-5159 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1441941
- https://www.exploit-db.com/exploits/44759/
- https://www.debian.org/security/2018/dsa-4209
- https://www.debian.org/security/2018/dsa-4199
- https://usn.ubuntu.com/3660-1/
- https://usn.ubuntu.com/3645-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
- https://access.redhat.com/errata/RHSA-2018:1726
- https://access.redhat.com/errata/RHSA-2018:1725
- https://access.redhat.com/errata/RHSA-2018:1415
- https://access.redhat.com/errata/RHSA-2018:1414
- http://www.securitytracker.com/id/1040896
- http://www.securityfocus.com/bid/104136
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5178: A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-11T15:20:00
Summary
A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5178 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443891
- https://www.debian.org/security/2018/dsa-4209
- https://www.debian.org/security/2018/dsa-4199
- https://usn.ubuntu.com/3660-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
- https://access.redhat.com/errata/RHSA-2018:1726
- https://access.redhat.com/errata/RHSA-2018:1725
- https://access.redhat.com/errata/RHSA-2018:1415
- https://access.redhat.com/errata/RHSA-2018:1414
- http://www.securitytracker.com/id/1040898
- http://www.securityfocus.com/bid/104138
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5102: A use-after-free vulnerability can occur when manipulating HTML media elements with media…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T16:56:00
Summary
A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5102 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1419363
- https://www.debian.org/security/2018/dsa-4102
- https://www.debian.org/security/2018/dsa-4096
- https://usn.ubuntu.com/3544-1/
- https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://access.redhat.com/errata/RHSA-2018:0262
- https://access.redhat.com/errata/RHSA-2018:0122
- http://www.securitytracker.com/id/1040270
- http://www.securityfocus.com/bid/102783
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5170: It is possible to spoof the filename of an attachment and display an arbitrary attachment name….
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-13T13:43:00
Summary
It is possible to spoof the filename of an attachment and display an arbitrary attachment name. This could lead to a user opening a remote attachment which is a different file type than expected. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5170 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411732
- https://www.debian.org/security/2018/dsa-4209
- https://usn.ubuntu.com/3660-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- https://access.redhat.com/errata/RHSA-2018:1726
- https://access.redhat.com/errata/RHSA-2018:1725
- http://www.securitytracker.com/id/1040946
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5104: A use-after-free vulnerability can occur during font face manipulation when a font face is freed…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T16:57:00
Summary
A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5104 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1425000
- https://www.debian.org/security/2018/dsa-4102
- https://www.debian.org/security/2018/dsa-4096
- https://usn.ubuntu.com/3544-1/
- https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://access.redhat.com/errata/RHSA-2018:0262
- https://access.redhat.com/errata/RHSA-2018:0122
- http://www.securitytracker.com/id/1040270
- http://www.securityfocus.com/bid/102783
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5129: A lack of parameter validation on IPC messages results in a potential out-of-bounds write through…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-08T14:22:00
Summary
A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5129 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-09/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-06/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1428947
- https://www.debian.org/security/2018/dsa-4155
- https://www.debian.org/security/2018/dsa-4139
- https://usn.ubuntu.com/3596-1/
- https://usn.ubuntu.com/3545-1/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00029.html
- https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html
- https://access.redhat.com/errata/RHSA-2018:0648
- https://access.redhat.com/errata/RHSA-2018:0647
- https://access.redhat.com/errata/RHSA-2018:0527
- https://access.redhat.com/errata/RHSA-2018:0526
- http://www.securitytracker.com/id/1040514
- http://www.securityfocus.com/bid/103388
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5099: A use-after-free vulnerability can occur when the widget listener is holding strong references to…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T16:55:00
Summary
A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5099 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1416878
- https://www.debian.org/security/2018/dsa-4102
- https://www.debian.org/security/2018/dsa-4096
- https://usn.ubuntu.com/3544-1/
- https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://access.redhat.com/errata/RHSA-2018:0262
- https://access.redhat.com/errata/RHSA-2018:0122
- http://www.securitytracker.com/id/1040270
- http://www.securityfocus.com/bid/102783
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5125: Memory safety bugs were reported in Firefox 58 and Firefox ESR 52.6. Some of these bugs showed…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-08T14:22:00
Summary
Memory safety bugs were reported in Firefox 58 and Firefox ESR 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5125 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-09/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-06/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1416529%2C1434580%2C1434384%2C1437450%2C1437507%2C1426988%2C1438425%2C1324042%2C1437087%2C1443865%2C1425520
- https://www.debian.org/security/2018/dsa-4155
- https://www.debian.org/security/2018/dsa-4139
- https://usn.ubuntu.com/3596-1/
- https://usn.ubuntu.com/3545-1/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00029.html
- https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html
- https://access.redhat.com/errata/RHSA-2018:0648
- https://access.redhat.com/errata/RHSA-2018:0647
- https://access.redhat.com/errata/RHSA-2018:0527
- https://access.redhat.com/errata/RHSA-2018:0526
- http://www.securitytracker.com/id/1040514
- http://www.securityfocus.com/bid/103388
- https://usn.ubuntu.com/3688-1/
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5145: Memory safety bugs were reported in Firefox ESR 52.6. These bugs showed evidence of memory…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-13T13:44:00
Summary
Memory safety bugs were reported in Firefox ESR 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 52.7 and Thunderbird < 52.7.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5145 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-09/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1261175%2C1348955
- https://www.debian.org/security/2018/dsa-4155
- https://www.debian.org/security/2018/dsa-4139
- https://usn.ubuntu.com/3545-1/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00029.html
- https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html
- https://access.redhat.com/errata/RHSA-2018:0648
- https://access.redhat.com/errata/RHSA-2018:0647
- https://access.redhat.com/errata/RHSA-2018:0527
- https://access.redhat.com/errata/RHSA-2018:0526
- http://www.securitytracker.com/id/1040514
- http://www.securityfocus.com/bid/103384
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5155: A use-after-free vulnerability can occur while adjusting layout during SVG animations with text…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-11T16:44:00
Summary
A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5155 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1448774
- https://www.debian.org/security/2018/dsa-4209
- https://www.debian.org/security/2018/dsa-4199
- https://usn.ubuntu.com/3660-1/
- https://usn.ubuntu.com/3645-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
- https://access.redhat.com/errata/RHSA-2018:1726
- https://access.redhat.com/errata/RHSA-2018:1725
- https://access.redhat.com/errata/RHSA-2018:1415
- https://access.redhat.com/errata/RHSA-2018:1414
- http://www.securitytracker.com/id/1040896
- http://www.securityfocus.com/bid/104136
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5158: The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-13T13:44:00
Summary
The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR < 52.8 and Firefox < 60.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5158 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452075
- https://www.debian.org/security/2018/dsa-4199
- https://usn.ubuntu.com/3645-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
- https://access.redhat.com/errata/RHSA-2018:1415
- https://access.redhat.com/errata/RHSA-2018:1414
- http://www.securitytracker.com/id/1040896
- http://www.securityfocus.com/bid/104136
- https://security.gentoo.org/glsa/201810-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5097: A use-after-free vulnerability can occur during XSL transformations when the source document for…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T16:55:00
Summary
A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5097 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1387427
- https://www.debian.org/security/2018/dsa-4102
- https://www.debian.org/security/2018/dsa-4096
- https://usn.ubuntu.com/3544-1/
- https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://access.redhat.com/errata/RHSA-2018:0262
- https://access.redhat.com/errata/RHSA-2018:0122
- http://www.securitytracker.com/id/1040270
- http://www.securityfocus.com/bid/102783
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5162: Plaintext of decrypted emails can leak through the src attribute of remote images, or links. This…
Published: 2018-06-11T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Plaintext of decrypted emails can leak through the src attribute of remote images, or links. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
Common Weakness Enumeration (CWE): CWE-311: Missing Encryption of Sensitive Data
CWE Description: The software does not encrypt sensitive or critical information before storage or transmission.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5162 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1457721
- https://www.debian.org/security/2018/dsa-4209
- https://usn.ubuntu.com/3660-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- https://access.redhat.com/errata/RHSA-2018:1726
- https://access.redhat.com/errata/RHSA-2018:1725
- http://www.securitytracker.com/id/1040946
- http://www.securityfocus.com/bid/104240
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5183: Mozilla developers backported selected changes in the Skia library. These changes correct memory…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-13T13:24:00
Summary
Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5183 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454692
- https://www.debian.org/security/2018/dsa-4209
- https://www.debian.org/security/2018/dsa-4199
- https://usn.ubuntu.com/3660-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
- https://access.redhat.com/errata/RHSA-2018:1726
- https://access.redhat.com/errata/RHSA-2018:1725
- https://access.redhat.com/errata/RHSA-2018:1415
- https://access.redhat.com/errata/RHSA-2018:1414
- http://www.securitytracker.com/id/1040898
- http://www.securityfocus.com/bid/104138
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5154: A use-after-free vulnerability can occur while enumerating attributes during SVG animations with…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-11T16:51:00
Summary
A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5154 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443092
- https://www.debian.org/security/2018/dsa-4209
- https://www.debian.org/security/2018/dsa-4199
- https://usn.ubuntu.com/3660-1/
- https://usn.ubuntu.com/3645-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
- https://access.redhat.com/errata/RHSA-2018:1726
- https://access.redhat.com/errata/RHSA-2018:1725
- https://access.redhat.com/errata/RHSA-2018:1415
- https://access.redhat.com/errata/RHSA-2018:1414
- http://www.securitytracker.com/id/1040896
- http://www.securityfocus.com/bid/104136
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5089: Memory safety bugs were reported in Firefox 57 and Firefox ESR 52.5. Some of these bugs showed…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-03T16:53:00
Summary
Memory safety bugs were reported in Firefox 57 and Firefox ESR 52.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5089 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-02/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1412420%2C1426783%2C1422389%2C1415598%2C1410134%2C1408017%2C1224396%2C1382366%2C1415582%2C1417797%2C1409951%2C1414452%2C1428589%2C1425780%2C1399520%2C1418854%2C1408276%2C1412145%2C1331209%2C1425612
- https://www.debian.org/security/2018/dsa-4102
- https://www.debian.org/security/2018/dsa-4096
- https://usn.ubuntu.com/3544-1/
- https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://access.redhat.com/errata/RHSA-2018:0262
- https://access.redhat.com/errata/RHSA-2018:0122
- http://www.securitytracker.com/id/1040270
- http://www.securityfocus.com/bid/102783
- https://usn.ubuntu.com/3688-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5168: Sites can bypass security checks on permissions to install lightweight themes by manipulating the…
Published: 2018-06-11T21:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Sites can bypass security checks on permissions to install lightweight themes by manipulating the “baseURI” property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5168 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449548
- https://www.debian.org/security/2018/dsa-4209
- https://www.debian.org/security/2018/dsa-4199
- https://usn.ubuntu.com/3660-1/
- https://usn.ubuntu.com/3645-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
- https://access.redhat.com/errata/RHSA-2018:1726
- https://access.redhat.com/errata/RHSA-2018:1725
- https://access.redhat.com/errata/RHSA-2018:1415
- https://access.redhat.com/errata/RHSA-2018:1414
- http://www.securitytracker.com/id/1040896
- http://www.securityfocus.com/bid/104136
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5185: Plaintext of decrypted emails can leak through by user submitting an embedded form. This…
Published: 2018-06-11T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Plaintext of decrypted emails can leak through by user submitting an embedded form. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
Common Weakness Enumeration (CWE): CWE-311: Missing Encryption of Sensitive Data
CWE Description: The software does not encrypt sensitive or critical information before storage or transmission.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5185 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1450345
- https://www.debian.org/security/2018/dsa-4209
- https://usn.ubuntu.com/3660-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- https://access.redhat.com/errata/RHSA-2018:1726
- https://access.redhat.com/errata/RHSA-2018:1725
- http://www.securitytracker.com/id/1040946
- http://www.securityfocus.com/bid/104240
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5150: Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-13T13:44:00
Summary
Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5150 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1388020%2C1433609%2C1409440%2C1448705%2C1451376%2C1452202%2C1444668%2C1393367%2C1411415%2C1426129
- https://www.debian.org/security/2018/dsa-4209
- https://www.debian.org/security/2018/dsa-4199
- https://usn.ubuntu.com/3660-1/
- https://usn.ubuntu.com/3645-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
- https://access.redhat.com/errata/RHSA-2018:1726
- https://access.redhat.com/errata/RHSA-2018:1725
- https://access.redhat.com/errata/RHSA-2018:1415
- https://access.redhat.com/errata/RHSA-2018:1414
- http://www.securitytracker.com/id/1040896
- http://www.securityfocus.com/bid/104136
- https://usn.ubuntu.com/3688-1/
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5127: A buffer overflow can occur when manipulating the SVG “animatedPathSegList” through script. This…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-08T14:22:00
Summary
A buffer overflow can occur when manipulating the SVG “animatedPathSegList” through script. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.7, Firefox ESR < 52.7, and Firefox < 59.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5127 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-09/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-06/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1430557
- https://www.debian.org/security/2018/dsa-4155
- https://www.debian.org/security/2018/dsa-4139
- https://usn.ubuntu.com/3596-1/
- https://usn.ubuntu.com/3545-1/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00029.html
- https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html
- https://access.redhat.com/errata/RHSA-2018:0648
- https://access.redhat.com/errata/RHSA-2018:0647
- https://access.redhat.com/errata/RHSA-2018:0527
- https://access.redhat.com/errata/RHSA-2018:0526
- http://www.securitytracker.com/id/1040514
- http://www.securityfocus.com/bid/103388
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5131: Under certain circumstances the “fetch()” API can return transient local copies of resources that…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-08T14:21:00
Summary
Under certain circumstances the “fetch()” API can return transient local copies of resources that were sent with a “no-store” or “no-cache” cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR < 52.7 and Firefox < 59.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5131 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://www.mozilla.org/security/advisories/mfsa2018-06/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1440775
- https://www.debian.org/security/2018/dsa-4139
- https://usn.ubuntu.com/3596-1/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html
- https://access.redhat.com/errata/RHSA-2018:0527
- https://access.redhat.com/errata/RHSA-2018:0526
- http://www.securitytracker.com/id/1040514
- http://www.securityfocus.com/bid/103388
- https://security.gentoo.org/glsa/201810-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5144: An integer overflow can occur during conversion of text to some Unicode character sets due to an…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-08T14:21:00
Summary
An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter. This vulnerability affects Firefox ESR < 52.7 and Thunderbird < 52.7.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5144 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-09/
- https://www.mozilla.org/security/advisories/mfsa2018-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1440926
- https://www.debian.org/security/2018/dsa-4155
- https://www.debian.org/security/2018/dsa-4139
- https://usn.ubuntu.com/3545-1/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00029.html
- https://lists.debian.org/debian-lts-announce/2018/03/msg00010.html
- https://access.redhat.com/errata/RHSA-2018:0648
- https://access.redhat.com/errata/RHSA-2018:0647
- https://access.redhat.com/errata/RHSA-2018:0527
- https://access.redhat.com/errata/RHSA-2018:0526
- http://www.securitytracker.com/id/1040514
- http://www.securityfocus.com/bid/103384
- https://security.gentoo.org/glsa/201810-01
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5146: An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-11T19:33:00
Summary
An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest. This vulnerability affects Firefox < 59.0.1, Firefox ESR < 52.7.2, and Thunderbird < 52.7.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5146 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-09/
- https://www.mozilla.org/security/advisories/mfsa2018-08/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1446062
- https://www.debian.org/security/2018/dsa-4155
- https://www.debian.org/security/2018/dsa-4143
- https://www.debian.org/security/2018/dsa-4140
- https://usn.ubuntu.com/3604-1/
- https://usn.ubuntu.com/3599-1/
- https://usn.ubuntu.com/3545-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00033.html
- https://lists.debian.org/debian-lts-announce/2018/03/msg00029.html
- https://lists.debian.org/debian-lts-announce/2018/03/msg00022.html
- https://access.redhat.com/errata/RHSA-2018:1058
- https://access.redhat.com/errata/RHSA-2018:0649
- https://access.redhat.com/errata/RHSA-2018:0648
- https://access.redhat.com/errata/RHSA-2018:0647
- https://access.redhat.com/errata/RHSA-2018:0549
- http://www.securitytracker.com/id/1040544
- http://www.securityfocus.com/bid/103432
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5148: A use-after-free vulnerability can occur in the compositor during certain graphics operations…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-09T14:26:00
Summary
A use-after-free vulnerability can occur in the compositor during certain graphics operations when a raw pointer is used instead of a reference counted one. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.7.3 and Firefox < 59.0.2.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5148 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-10/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1440717
- https://www.debian.org/security/2018/dsa-4153
- https://usn.ubuntu.com/3609-1/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00023.html
- https://access.redhat.com/errata/RHSA-2018:1099
- https://access.redhat.com/errata/RHSA-2018:1098
- http://www.securitytracker.com/id/1040574
- http://www.securityfocus.com/bid/103506
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5157: Same-origin protections for the PDF viewer can be bypassed, allowing a malicious site to…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-13T13:44:00
Summary
Same-origin protections for the PDF viewer can be bypassed, allowing a malicious site to intercept messages meant for the viewer. This could allow the site to retrieve PDF files restricted to viewing by an authenticated user on a third-party website. This vulnerability affects Firefox ESR < 52.8 and Firefox < 60.
Common Weakness Enumeration (CWE): CWE-346: Origin Validation Error
CWE Description: The software does not properly verify that the source of data or communication is valid.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5157 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449898
- https://www.debian.org/security/2018/dsa-4199
- https://usn.ubuntu.com/3645-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
- https://access.redhat.com/errata/RHSA-2018:1415
- https://access.redhat.com/errata/RHSA-2018:1414
- http://www.securitytracker.com/id/1040896
- http://www.securityfocus.com/bid/104136
- https://security.gentoo.org/glsa/201810-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5161: Crafted message headers can cause a Thunderbird process to hang on receiving the message. This…
Published: 2018-06-11T21:29:00 Last Modified: 2019-03-13T13:43:00
Summary
Crafted message headers can cause a Thunderbird process to hang on receiving the message. This vulnerability affects Thunderbird ESR < 52.8 and Thunderbird < 52.8.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5161 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411720
- https://www.debian.org/security/2018/dsa-4209
- https://usn.ubuntu.com/3660-1/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
- https://access.redhat.com/errata/RHSA-2018:1726
- https://access.redhat.com/errata/RHSA-2018:1725
- http://www.securitytracker.com/id/1040946
- https://security.gentoo.org/glsa/201811-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9897: Memory corruption resulting in a potentially exploitable crash during WebGL functions using a…
Published: 2018-06-11T21:29:00 Last Modified: 2018-08-01T13:46:00
Summary
Memory corruption resulting in a potentially exploitable crash during WebGL functions using a vector constructor with a varying array within libGLES. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9897 vulnerability.
References
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1301381
- https://www.debian.org/security/2017/dsa-3757
- https://security.gentoo.org/glsa/201701-15
- http://www.securitytracker.com/id/1037461
- http://www.securityfocus.com/bid/94885
- http://rhn.redhat.com/errata/RHSA-2016-2946.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-12020: mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and…
Published: 2018-06-08T21:29:00 Last Modified: 2021-12-28T23:15:00
Summary
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the “–status-fd 2” option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
Common Weakness Enumeration (CWE): CWE-706: Use of Incorrectly-Resolved Name or Reference
CWE Description: The software uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-12020 vulnerability.
References
- https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
- https://dev.gnupg.org/T4012
- http://openwall.com/lists/oss-security/2018/06/08/2
- https://www.debian.org/security/2018/dsa-4224
- https://www.debian.org/security/2018/dsa-4223
- https://www.debian.org/security/2018/dsa-4222
- http://www.securitytracker.com/id/1041051
- https://usn.ubuntu.com/3675-1/
- http://www.securityfocus.com/bid/104450
- https://usn.ubuntu.com/3675-2/
- https://usn.ubuntu.com/3675-3/
- https://access.redhat.com/errata/RHSA-2018:2181
- https://access.redhat.com/errata/RHSA-2018:2180
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- http://www.openwall.com/lists/oss-security/2019/04/30/4
- http://seclists.org/fulldisclosure/2019/Apr/38
- http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
- https://usn.ubuntu.com/3964-1/
- https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
- https://github.com/RUB-NDS/Johnny-You-Are-Fired
- https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-11235: In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and…
Published: 2018-05-30T04:29:00 Last Modified: 2020-05-02T00:15:00
Summary
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs “git clone –recurse-submodules” because submodule “names” are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with “../” in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-11235 vulnerability.
References
- https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/
- https://www.debian.org/security/2018/dsa-4212
- https://marc.info/?l=git&m=152761328506724&w=2
- http://www.securitytracker.com/id/1040991
- http://www.securityfocus.com/bid/104345
- https://www.exploit-db.com/exploits/44822/
- https://usn.ubuntu.com/3671-1/
- https://access.redhat.com/errata/RHSA-2018:1957
- https://access.redhat.com/errata/RHSA-2018:2147
- https://security.gentoo.org/glsa/201805-13
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000199: The Linux Kernel version 3.18 contains a dangerous feature vulnerability in…
Published: 2018-05-24T13:29:00 Last Modified: 2020-08-24T17:37:00
Summary
The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-1000199 vulnerability.
References
- https://lkml.org/lkml/2018/4/6/813
- https://www.debian.org/security/2018/dsa-4188
- https://www.debian.org/security/2018/dsa-4187
- https://usn.ubuntu.com/3641-2/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://access.redhat.com/errata/RHSA-2018:1374
- https://access.redhat.com/errata/RHSA-2018:1355
- https://access.redhat.com/errata/RHSA-2018:1354
- https://access.redhat.com/errata/RHSA-2018:1348
- https://access.redhat.com/errata/RHSA-2018:1347
- https://access.redhat.com/errata/RHSA-2018:1345
- https://access.redhat.com/errata/RHSA-2018:1318
- http://www.securitytracker.com/id/1040806
- https://usn.ubuntu.com/3641-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000301: curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read…
Published: 2018-05-24T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl < 7.20.0 and curl >= 7.60.0.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000301 vulnerability.
References
- https://curl.haxx.se/docs/adv_2018-b138.html
- https://www.debian.org/security/2018/dsa-4202
- https://usn.ubuntu.com/3648-1/
- https://usn.ubuntu.com/3598-2/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html
- http://www.securitytracker.com/id/1040931
- http://www.securityfocus.com/bid/104225
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://security.gentoo.org/glsa/201806-05
- https://access.redhat.com/errata/RHSA-2018:3157
- https://access.redhat.com/errata/RHSA-2018:3558
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://access.redhat.com/errata/RHBA-2019:0327
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://access.redhat.com/errata/RHSA-2020:0544
- https://access.redhat.com/errata/RHSA-2020:0594
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1126: procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.*…
Published: 2018-05-23T13:29:00 Last Modified: 2019-07-30T13:15:00
Summary
procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1126 vulnerability.
References
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1126
- http://seclists.org/oss-sec/2018/q2/122
- https://www.debian.org/security/2018/dsa-4208
- https://usn.ubuntu.com/3658-1/
- https://access.redhat.com/errata/RHSA-2018:1700
- http://www.securityfocus.com/bid/104214
- https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:1777
- https://usn.ubuntu.com/3658-2/
- https://access.redhat.com/errata/RHSA-2018:1820
- http://www.securitytracker.com/id/1041057
- https://access.redhat.com/errata/RHSA-2018:2268
- https://access.redhat.com/errata/RHSA-2018:2267
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://access.redhat.com/errata/RHSA-2019:1944
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1124: procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap…
Published: 2018-05-23T13:29:00 Last Modified: 2020-09-09T14:58:00
Summary
procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-1124 vulnerability.
References
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1124
- http://seclists.org/oss-sec/2018/q2/122
- https://www.debian.org/security/2018/dsa-4208
- https://usn.ubuntu.com/3658-1/
- https://access.redhat.com/errata/RHSA-2018:1700
- http://www.securityfocus.com/bid/104214
- https://www.exploit-db.com/exploits/44806/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
- https://access.redhat.com/errata/RHSA-2018:1777
- https://usn.ubuntu.com/3658-2/
- https://access.redhat.com/errata/RHSA-2018:1820
- https://kc.mcafee.com/corporate/index?page=content&id=SB10241
- http://www.securitytracker.com/id/1041057
- https://access.redhat.com/errata/RHSA-2018:2268
- https://access.redhat.com/errata/RHSA-2018:2267
- https://security.gentoo.org/glsa/201805-14
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://access.redhat.com/errata/RHSA-2019:1944
- https://access.redhat.com/errata/RHSA-2019:2401
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-3639: Systems with microprocessors utilizing speculative execution and speculative execution of memory…
Published: 2018-05-22T12:29:00 Last Modified: 2021-08-13T15:26:00
Summary
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Common Weakness Enumeration (CWE): CWE-203: Observable Discrepancy
CWE Description: The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-3639 vulnerability.
References
- https://www.us-cert.gov/ncas/alerts/TA18-141A
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
- https://www.synology.com/support/security/Synology_SA_18_23
- https://www.kb.cert.org/vuls/id/180049
- https://usn.ubuntu.com/3655-2/
- https://usn.ubuntu.com/3654-2/
- https://usn.ubuntu.com/3654-1/
- https://usn.ubuntu.com/3653-2/
- https://usn.ubuntu.com/3653-1/
- https://usn.ubuntu.com/3652-1/
- https://usn.ubuntu.com/3651-1/
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel
- https://support.citrix.com/article/CTX235225
- https://security.netapp.com/advisory/ntap-20180521-0001/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012
- https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
- https://access.redhat.com/errata/RHSA-2018:1660
- https://access.redhat.com/errata/RHSA-2018:1655
- https://access.redhat.com/errata/RHSA-2018:1647
- https://access.redhat.com/errata/RHSA-2018:1630
- http://xenbits.xen.org/xsa/advisory-263.html
- http://www.securitytracker.com/id/1040949
- http://support.lenovo.com/us/en/solutions/LEN-22133
- https://access.redhat.com/errata/RHSA-2018:1690
- https://access.redhat.com/errata/RHSA-2018:1689
- https://access.redhat.com/errata/RHSA-2018:1688
- https://access.redhat.com/errata/RHSA-2018:1686
- https://access.redhat.com/errata/RHSA-2018:1676
- https://access.redhat.com/errata/RHSA-2018:1675
- https://access.redhat.com/errata/RHSA-2018:1674
- https://access.redhat.com/errata/RHSA-2018:1669
- https://access.redhat.com/errata/RHSA-2018:1668
- https://access.redhat.com/errata/RHSA-2018:1667
- https://access.redhat.com/errata/RHSA-2018:1666
- https://access.redhat.com/errata/RHSA-2018:1665
- https://access.redhat.com/errata/RHSA-2018:1664
- https://access.redhat.com/errata/RHSA-2018:1663
- https://access.redhat.com/errata/RHSA-2018:1662
- https://access.redhat.com/errata/RHSA-2018:1661
- https://access.redhat.com/errata/RHSA-2018:1659
- https://access.redhat.com/errata/RHSA-2018:1658
- https://access.redhat.com/errata/RHSA-2018:1657
- https://access.redhat.com/errata/RHSA-2018:1656
- https://access.redhat.com/errata/RHSA-2018:1654
- https://access.redhat.com/errata/RHSA-2018:1653
- https://access.redhat.com/errata/RHSA-2018:1652
- https://access.redhat.com/errata/RHSA-2018:1651
- https://access.redhat.com/errata/RHSA-2018:1650
- https://access.redhat.com/errata/RHSA-2018:1649
- https://access.redhat.com/errata/RHSA-2018:1648
- https://access.redhat.com/errata/RHSA-2018:1646
- https://access.redhat.com/errata/RHSA-2018:1645
- https://access.redhat.com/errata/RHSA-2018:1644
- https://access.redhat.com/errata/RHSA-2018:1643
- https://access.redhat.com/errata/RHSA-2018:1642
- https://access.redhat.com/errata/RHSA-2018:1636
- https://access.redhat.com/errata/RHSA-2018:1635
- https://access.redhat.com/errata/RHSA-2018:1633
- https://access.redhat.com/errata/RHSA-2018:1632
- https://access.redhat.com/errata/RHSA-2018:1629
- http://www.securityfocus.com/bid/104232
- https://www.exploit-db.com/exploits/44695/
- https://access.redhat.com/errata/RHSA-2018:1711
- https://access.redhat.com/errata/RHSA-2018:1710
- https://access.redhat.com/errata/RHSA-2018:1696
- https://www.debian.org/security/2018/dsa-4210
- https://usn.ubuntu.com/3655-1/
- https://access.redhat.com/errata/RHSA-2018:1738
- https://access.redhat.com/errata/RHSA-2018:1737
- https://access.redhat.com/errata/RHSA-2018:1641
- https://access.redhat.com/errata/RHSA-2018:1640
- https://access.redhat.com/errata/RHSA-2018:1639
- https://access.redhat.com/errata/RHSA-2018:1638
- https://access.redhat.com/errata/RHSA-2018:1637
- http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html
- https://usn.ubuntu.com/3680-1/
- https://usn.ubuntu.com/3679-1/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us
- https://access.redhat.com/errata/RHSA-2018:1826
- https://access.redhat.com/errata/RHSA-2018:1854
- https://access.redhat.com/errata/RHSA-2018:2006
- https://access.redhat.com/errata/RHSA-2018:2003
- https://access.redhat.com/errata/RHSA-2018:2001
- https://access.redhat.com/errata/RHSA-2018:1997
- https://access.redhat.com/errata/RHSA-2018:1967
- https://access.redhat.com/errata/RHSA-2018:1965
- https://access.redhat.com/errata/RHSA-2018:2060
- https://access.redhat.com/errata/RHSA-2018:2164
- https://access.redhat.com/errata/RHSA-2018:2162
- https://access.redhat.com/errata/RHSA-2018:2161
- https://access.redhat.com/errata/RHSA-2018:2172
- https://access.redhat.com/errata/RHSA-2018:2171
- https://access.redhat.com/errata/RHSA-2018:2216
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://access.redhat.com/errata/RHSA-2018:2228
- https://access.redhat.com/errata/RHSA-2018:2250
- https://access.redhat.com/errata/RHSA-2018:2246
- https://access.redhat.com/errata/RHSA-2018:2258
- https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html
- https://access.redhat.com/errata/RHSA-2018:2289
- https://access.redhat.com/errata/RHSA-2018:2328
- https://access.redhat.com/errata/RHSA-2018:2309
- https://access.redhat.com/errata/RHSA-2018:2364
- https://access.redhat.com/errata/RHSA-2018:2363
- https://access.redhat.com/errata/RHSA-2018:2396
- https://access.redhat.com/errata/RHSA-2018:2394
- https://access.redhat.com/errata/RHSA-2018:2387
- https://www.debian.org/security/2018/dsa-4273
- https://usn.ubuntu.com/3756-1/
- https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
- https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004
- https://usn.ubuntu.com/3777-3/
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006
- https://access.redhat.com/errata/RHSA-2018:3425
- https://access.redhat.com/errata/RHSA-2018:3424
- https://access.redhat.com/errata/RHSA-2018:3423
- https://access.redhat.com/errata/RHSA-2018:3407
- https://access.redhat.com/errata/RHSA-2018:3402
- https://access.redhat.com/errata/RHSA-2018:3401
- https://access.redhat.com/errata/RHSA-2018:3400
- https://access.redhat.com/errata/RHSA-2018:3399
- https://access.redhat.com/errata/RHSA-2018:3398
- https://access.redhat.com/errata/RHSA-2018:3397
- https://access.redhat.com/errata/RHSA-2018:3396
- https://access.redhat.com/errata/RHSA-2018:2948
- http://www.securitytracker.com/id/1042004
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://access.redhat.com/errata/RHSA-2019:0148
- https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
- https://nvidia.custhelp.com/app/answers/detail/a_id/4787
- https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html
- https://access.redhat.com/errata/RHSA-2019:1046
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
- https://seclists.org/bugtraq/2019/Jun/36
- https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
- http://www.openwall.com/lists/oss-security/2020/06/10/1
- http://www.openwall.com/lists/oss-security/2020/06/10/2
- http://www.openwall.com/lists/oss-security/2020/06/10/5
- https://www.oracle.com/security-alerts/cpujul2020.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-4944: Adobe Flash Player versions 29.0.0.140 and earlier have an exploitable type confusion…
Published: 2018-05-19T17:29:00 Last Modified: 2021-09-08T17:21:00
Summary
Adobe Flash Player versions 29.0.0.140 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-4944 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-16.html
- https://access.redhat.com/errata/RHSA-2018:1367
- http://www.securitytracker.com/id/1040840
- http://www.securityfocus.com/bid/104101
- https://security.gentoo.org/glsa/201806-02
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-11237: An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or…
Published: 2018-05-18T16:29:00 Last Modified: 2020-08-24T17:37:00
Summary
An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-11237 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=23196
- http://www.securityfocus.com/bid/104256
- https://www.exploit-db.com/exploits/44750/
- https://access.redhat.com/errata/RHSA-2018:3092
- https://security.netapp.com/advisory/ntap-20190401-0001/
- https://security.netapp.com/advisory/ntap-20190329-0001/
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://access.redhat.com/errata/RHBA-2019:0327
- https://usn.ubuntu.com/4416-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-11236: stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing…
Published: 2018-05-18T16:29:00 Last Modified: 2020-08-24T17:37:00
Summary
stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-11236 vulnerability.
References
- https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5460617d1567657621107d895ee2dd83bc1f88f2
- https://sourceware.org/bugzilla/show_bug.cgi?id=22786
- http://www.securityfocus.com/bid/104255
- https://access.redhat.com/errata/RHSA-2018:3092
- https://security.netapp.com/advisory/ntap-20190401-0001/
- https://security.netapp.com/advisory/ntap-20190329-0001/
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://access.redhat.com/errata/RHBA-2019:0327
- https://usn.ubuntu.com/4416-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1111: DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier are vulnerable to a…
Published: 2018-05-17T16:29:00 Last Modified: 2019-10-03T00:03:00
Summary
DHCP packages in Red Hat Enterprise Linux 6 and 7, Fedora 28, and earlier are vulnerable to a command injection flaw in the NetworkManager integration script included in the DHCP client. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.
Common Weakness Enumeration (CWE): CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
CWE Description: The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 5.5
- CVSS: 7.9
- CVSS Vector: AV:A/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2018-1111 vulnerability.
- DHCP Client - Command Injection 'DynoRoot' (Metasploit) by Metasploit at 2018-06-13
- DynoRoot DHCP Client - Command Injection by Kevin Kirsche at 2018-05-18
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMTTB54QNTPD2SK6UL32EVQHMZP6BUUD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDJA4QRR74TMXW34Q3DYYFPVBYRTJBI7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CDCLLCHYFFXW354HMB5QBXOQOY5BH2EJ/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1111
- https://access.redhat.com/security/vulnerabilities/3442151
- https://access.redhat.com/errata/RHSA-2018:1524
- https://access.redhat.com/errata/RHSA-2018:1461
- https://access.redhat.com/errata/RHSA-2018:1460
- https://access.redhat.com/errata/RHSA-2018:1459
- https://access.redhat.com/errata/RHSA-2018:1458
- https://access.redhat.com/errata/RHSA-2018:1457
- https://access.redhat.com/errata/RHSA-2018:1456
- https://access.redhat.com/errata/RHSA-2018:1455
- https://access.redhat.com/errata/RHSA-2018:1454
- https://access.redhat.com/errata/RHSA-2018:1453
- http://www.securitytracker.com/id/1040912
- https://www.exploit-db.com/exploits/44652/
- http://www.securityfocus.com/bid/104195
- https://www.exploit-db.com/exploits/44890/
- https://www.tenable.com/security/tns-2018-10
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-11212: An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows…
Published: 2018-05-16T17:29:00 Last Modified: 2021-01-07T20:15:00
Summary
An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.
Common Weakness Enumeration (CWE): CWE-369: Divide By Zero
CWE Description: The product divides a value by zero.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-11212 vulnerability.
References
- https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a
- https://usn.ubuntu.com/3706-1/
- https://usn.ubuntu.com/3706-2/
- http://www.securityfocus.com/bid/106583
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://security.netapp.com/advisory/ntap-20190118-0001/
- https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html
- https://access.redhat.com/errata/RHSA-2019:0469
- https://access.redhat.com/errata/RHSA-2019:0474
- https://access.redhat.com/errata/RHSA-2019:0473
- https://access.redhat.com/errata/RHSA-2019:0472
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html
- https://access.redhat.com/errata/RHSA-2019:0640
- https://access.redhat.com/errata/RHSA-2019:1238
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
- https://access.redhat.com/errata/RHSA-2019:2052
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us
- http://www.ijg.org/
- https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1087: kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and…
Published: 2018-05-15T16:29:00 Last Modified: 2019-10-09T23:38:00
Summary
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel’s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-1087 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087
- https://access.redhat.com/security/vulnerabilities/pop_ss
- http://www.openwall.com/lists/oss-security/2018/05/08/5
- https://www.debian.org/security/2018/dsa-4196
- https://usn.ubuntu.com/3641-2/
- https://access.redhat.com/errata/RHSA-2018:1524
- https://access.redhat.com/errata/RHSA-2018:1355
- https://access.redhat.com/errata/RHSA-2018:1348
- https://access.redhat.com/errata/RHSA-2018:1347
- https://access.redhat.com/errata/RHSA-2018:1345
- https://access.redhat.com/errata/RHSA-2018:1318
- http://www.securitytracker.com/id/1040862
- http://www.securityfocus.com/bid/104127
- https://usn.ubuntu.com/3641-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1118: Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed…
Published: 2018-05-10T22:29:00 Last Modified: 2019-10-09T23:38:00
Summary
Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-1118 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1118
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3762-2/
- https://usn.ubuntu.com/3762-1/
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-18267: The FoFiType1C::cvtGlyph function in fofi/FoFiType1C.cc in Poppler through 0.64.0 allows remote…
Published: 2018-05-10T15:29:00 Last Modified: 2020-07-23T12:15:00
Summary
The FoFiType1C::cvtGlyph function in fofi/FoFiType1C.cc in Poppler through 0.64.0 allows remote attackers to cause a denial of service (infinite recursion) via a crafted PDF file, as demonstrated by pdftops.
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-18267 vulnerability.
References
- https://bugzilla.freedesktop.org/show_bug.cgi?id=103238
- https://usn.ubuntu.com/3647-1/
- https://access.redhat.com/errata/RHSA-2018:3140
- https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html
- https://access.redhat.com/errata/RHSA-2018:3505
- https://access.redhat.com/errata/RHBA-2019:0327
- https://lists.debian.org/debian-lts-announce/2020/07/msg00018.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1130: Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in…
Published: 2018-05-10T13:29:00 Last Modified: 2019-10-09T23:38:00
Summary
Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-1130 vulnerability.
References
- https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130
- https://marc.info/?l=linux-netdev&m=152036596825220&w=2
- https://usn.ubuntu.com/3654-2/
- https://usn.ubuntu.com/3654-1/
- https://usn.ubuntu.com/3656-1/
- https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
- https://access.redhat.com/errata/RHSA-2018:1854
- https://usn.ubuntu.com/3698-2/
- https://usn.ubuntu.com/3697-2/
- https://usn.ubuntu.com/3697-1/
- https://usn.ubuntu.com/3698-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1089: 389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search…
Published: 2018-05-09T15:29:00 Last Modified: 2019-10-09T23:38:00
Summary
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1089 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089
- https://access.redhat.com/errata/RHSA-2018:1364
- http://www.securityfocus.com/bid/104137
- https://access.redhat.com/errata/RHSA-2018:1380
- https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10184: An issue was discovered in HAProxy before 1.8.8. The incoming H2 frame length was checked against…
Published: 2018-05-09T07:29:00 Last Modified: 2018-06-18T17:18:00
Summary
An issue was discovered in HAProxy before 1.8.8. The incoming H2 frame length was checked against the max_frame_size setting instead of being checked against the bufsize. The max_frame_size only applies to outgoing traffic and not to incoming, so if a large enough frame size is advertised in the SETTINGS frame, a wrapped frame will be defragmented into a temporary allocated buffer where the second fragment may overflow the heap by up to 16 kB. It is very unlikely that this can be exploited for code execution given that buffers are very short lived and their addresses not realistically predictable in production, but the likelihood of an immediate crash is absolutely certain.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10184 vulnerability.
References
- http://git.haproxy.org/?p=haproxy-1.8.git;a=commit;h=cd117685f0cff4f2f5577ef6a21eaae96ebd9f28
- http://git.haproxy.org/?p=haproxy.git;a=commit;h=3f0e1ec70173593f4c2b3681b26c04a4ed5fc588
- https://access.redhat.com/errata/RHSA-2018:1372
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-8897: A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software…
Published: 2018-05-08T18:29:00 Last Modified: 2019-10-03T00:03:00
Summary
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer’s Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2018-8897 vulnerability.
- Microsoft Windows - POP/MOV SS Local Privilege Elevation (Metasploit) by Metasploit at 2018-07-13
- Microsoft Windows - 'POP/MOV SS' Privilege Escalation by Can Bölük at 2018-05-22
References
- https://xenbits.xen.org/xsa/advisory-260.html
- https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc
- https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9
- https://bugzilla.redhat.com/show_bug.cgi?id=1567074
- http://openwall.com/lists/oss-security/2018/05/08/1
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9
- https://svnweb.freebsd.org/base?view=revision&revision=333368
- https://support.apple.com/HT208742
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897
- http://openwall.com/lists/oss-security/2018/05/08/4
- https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html
- https://www.synology.com/support/security/Synology_SA_18_21
- https://usn.ubuntu.com/3641-2/
- https://support.citrix.com/article/CTX234679
- https://patchwork.kernel.org/patch/10386677/
- https://access.redhat.com/errata/RHSA-2018:1355
- https://access.redhat.com/errata/RHSA-2018:1354
- https://access.redhat.com/errata/RHSA-2018:1353
- https://access.redhat.com/errata/RHSA-2018:1352
- https://access.redhat.com/errata/RHSA-2018:1351
- https://access.redhat.com/errata/RHSA-2018:1350
- https://access.redhat.com/errata/RHSA-2018:1349
- https://access.redhat.com/errata/RHSA-2018:1348
- https://access.redhat.com/errata/RHSA-2018:1347
- https://access.redhat.com/errata/RHSA-2018:1346
- https://access.redhat.com/errata/RHSA-2018:1345
- https://access.redhat.com/errata/RHSA-2018:1319
- https://access.redhat.com/errata/RHSA-2018:1318
- http://www.securitytracker.com/id/1040849
- http://www.securityfocus.com/bid/104071
- https://www.debian.org/security/2018/dsa-4196
- http://www.securitytracker.com/id/1040882
- http://www.securitytracker.com/id/1040866
- http://www.securitytracker.com/id/1040861
- http://www.securitytracker.com/id/1040744
- https://access.redhat.com/errata/RHSA-2018:1524
- https://www.debian.org/security/2018/dsa-4201
- https://github.com/can1357/CVE-2018-8897/
- https://www.exploit-db.com/exploits/44697/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html
- https://usn.ubuntu.com/3641-1/
- https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
- https://www.exploit-db.com/exploits/45024/
- https://security.netapp.com/advisory/ntap-20180927-0002/
- https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://www.kb.cert.org/vuls/id/631579
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10768: There is a NULL pointer dereference in the AnnotPath::getCoordsLength function in Annot.h in an…
Published: 2018-05-06T23:29:00 Last Modified: 2019-04-25T18:38:00
Summary
There is a NULL pointer dereference in the AnnotPath::getCoordsLength function in Annot.h in an Ubuntu package for Poppler 0.24.5. A crafted input will lead to a remote denial of service attack. Later Ubuntu packages such as for Poppler 0.41.0 are not affected.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10768 vulnerability.
References
- https://bugs.freedesktop.org/show_bug.cgi?id=106408
- https://usn.ubuntu.com/3647-1/
- https://access.redhat.com/errata/RHSA-2018:3140
- https://lists.debian.org/debian-lts-announce/2018/10/msg00024.html
- https://access.redhat.com/errata/RHSA-2018:3505
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10767: There is a stack-based buffer over-read in calling GLib in the function…
Published: 2018-05-06T23:29:00 Last Modified: 2019-10-03T00:03:00
Summary
There is a stack-based buffer over-read in calling GLib in the function gxps_images_guess_content_type of gxps-images.c in libgxps through 0.3.0 because it does not reject negative return values from a g_input_stream_read call. A crafted input will lead to a remote denial of service attack.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10767 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1575188
- https://access.redhat.com/errata/RHSA-2018:3140
- https://access.redhat.com/errata/RHSA-2018:3505
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-0494: GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in…
Published: 2018-05-06T22:29:00 Last Modified: 2019-03-15T01:22:00
Summary
GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-0494 vulnerability.
References
- https://savannah.gnu.org/bugs/?53763
- https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html
- https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
- https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt
- http://www.securitytracker.com/id/1040838
- https://www.exploit-db.com/exploits/44601/
- https://www.debian.org/security/2018/dsa-4195
- https://usn.ubuntu.com/3643-2/
- https://usn.ubuntu.com/3643-1/
- http://www.securityfocus.com/bid/104129
- https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html
- https://security.gentoo.org/glsa/201806-01
- https://access.redhat.com/errata/RHSA-2018:3052
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10733: There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c in…
Published: 2018-05-04T17:29:00 Last Modified: 2019-10-03T00:03:00
Summary
There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c in libgxps through 0.3.0. A crafted input will lead to a remote denial of service attack.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10733 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1574844
- https://access.redhat.com/errata/RHSA-2018:3140
- https://access.redhat.com/errata/RHSA-2018:3505
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00005.html
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10675: The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local…
Published: 2018-05-02T18:29:00 Last Modified: 2020-07-15T03:15:00
Summary
The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-10675 vulnerability.
References
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.9
- https://github.com/torvalds/linux/commit/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=73223e4e2e3867ebf033a5a8eb2e5df0158ccc99
- http://www.securityfocus.com/bid/104093
- https://access.redhat.com/errata/RHSA-2018:2164
- https://access.redhat.com/errata/RHSA-2018:2395
- https://access.redhat.com/errata/RHSA-2018:2384
- https://usn.ubuntu.com/3754-1/
- https://access.redhat.com/errata/RHSA-2018:2791
- https://access.redhat.com/errata/RHSA-2018:2785
- https://access.redhat.com/errata/RHSA-2018:2933
- https://access.redhat.com/errata/RHSA-2018:2925
- https://access.redhat.com/errata/RHSA-2018:2924
- https://access.redhat.com/errata/RHSA-2018:3590
- https://access.redhat.com/errata/RHSA-2018:3586
- https://access.redhat.com/errata/RHSA-2018:3540
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10583: An information disclosure vulnerability occurs when LibreOffice 6.0.3 and Apache OpenOffice…
Published: 2018-05-01T16:29:00 Last Modified: 2020-10-21T13:15:00
Summary
An information disclosure vulnerability occurs when LibreOffice 6.0.3 and Apache OpenOffice Writer 4.1.5 automatically process and initiate an SMB connection embedded in a malicious file, as demonstrated by xlink:href=file://192.168.0.2/test.jpg within an office:document-content element in a .odt XML document.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-10583 vulnerability.
References
- http://secureyourit.co.uk/wp/2018/05/01/creating-malicious-odt-files/
- https://security-tracker.debian.org/tracker/CVE-2018-10583
- https://www.exploit-db.com/exploits/44564/
- https://access.redhat.com/errata/RHSA-2018:3054
- https://usn.ubuntu.com/3883-1/
- https://lists.apache.org/thread.html/6c65f22306c36c95e75f8d2b7f49cfcbeb0a4614245c20934612a39d@%3Cdev.openoffice.apache.org%3E
- https://lists.apache.org/thread.html/0598708912978b27121b2e380b44a225c706aca882cd1da6a955a0af@%3Cdev.openoffice.apache.org%3E
- https://lists.apache.org/thread.html/c8fd59ac77b42aac90eb5c59b87f3ab59b5e0c3bfb4819aa649a2909@%3Cdev.openoffice.apache.org%3E
- http://seclists.org/fulldisclosure/2020/Oct/26
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2591: 389-ds-base before version 1.3.6 is vulnerable to an improperly NULL terminated array in the…
Published: 2018-04-30T12:29:00 Last Modified: 2019-10-09T23:26:00
Summary
389-ds-base before version 1.3.6 is vulnerable to an improperly NULL terminated array in the uniqueness_entry_to_config() function in the “attribute uniqueness” plugin of 389 Directory Server. An authenticated, or possibly unauthenticated, attacker could use this flaw to force an out-of-bound heap memory read, possibly triggering a crash of the LDAP service.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-2591 vulnerability.
References
- https://pagure.io/389-ds-base/issue/48986
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2591
- http://www.securityfocus.com/bid/95670
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10534: The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor…
Published: 2018-04-29T15:29:00 Last Modified: 2019-08-03T13:15:00
Summary
The _bfd_XX_bfd_copy_private_bfd_data_common function in peXXigen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, processes a negative Data Directory size with an unbounded loop that increases the value of (external_IMAGE_DEBUG_DIRECTORY) *edd so that the address exceeds its own memory region, resulting in an out-of-bounds memory write, as demonstrated by objcopy copying private info with _bfd_pex64_bfd_copy_private_bfd_data_common in pex64igen.c.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10534 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=23110
- http://www.securityfocus.com/bid/104025
- https://access.redhat.com/errata/RHSA-2018:3032
- https://access.redhat.com/errata/RHBA-2019:0327
- https://security.gentoo.org/glsa/201908-01
- https://usn.ubuntu.com/4336-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10535: The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka…
Published: 2018-04-29T15:29:00 Last Modified: 2019-08-03T13:15:00
Summary
The ignore_section_sym function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, does not validate the output_section pointer in the case of a symtab entry with a “SECTION” type that has a “0” value, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file, as demonstrated by objcopy.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10535 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=23113
- http://www.securityfocus.com/bid/104021
- https://access.redhat.com/errata/RHSA-2018:3032
- https://access.redhat.com/errata/RHBA-2019:0327
- https://security.gentoo.org/glsa/201908-01
- https://usn.ubuntu.com/4336-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10393: bark_noise_hybridmp in psy.c in Xiph.Org libvorbis 1.3.6 has a stack-based buffer over-read.
Published: 2018-04-26T05:29:00 Last Modified: 2021-11-30T21:59:00
Summary
bark_noise_hybridmp in psy.c in Xiph.Org libvorbis 1.3.6 has a stack-based buffer over-read.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10393 vulnerability.
References
- https://gitlab.xiph.org/xiph/vorbis/issues/2334
- https://access.redhat.com/errata/RHSA-2019:3703
- https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html
- https://security.gentoo.org/glsa/202003-36
- https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10392: mapping0_forward in mapping0.c in Xiph.Org libvorbis 1.3.6 does not validate the number of…
Published: 2018-04-26T05:29:00 Last Modified: 2021-11-30T22:13:00
Summary
mapping0_forward in mapping0.c in Xiph.Org libvorbis 1.3.6 does not validate the number of channels, which allows remote attackers to cause a denial of service (heap-based buffer overflow or over-read) or possibly have unspecified other impact via a crafted file.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10392 vulnerability.
References
- https://gitlab.xiph.org/xiph/vorbis/issues/2335
- https://access.redhat.com/errata/RHSA-2019:3703
- https://lists.debian.org/debian-lts-announce/2019/11/msg00031.html
- https://security.gentoo.org/glsa/202003-36
- https://lists.debian.org/debian-lts-announce/2021/11/msg00023.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10373: concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as…
Published: 2018-04-25T09:29:00 Last Modified: 2019-08-03T13:15:00
Summary
concat_filename in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted binary file, as demonstrated by nm-new.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10373 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=23065
- http://www.securityfocus.com/bid/104000
- https://access.redhat.com/errata/RHSA-2018:3032
- https://access.redhat.com/errata/RHBA-2019:0327
- https://security.gentoo.org/glsa/201908-01
- https://usn.ubuntu.com/4336-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10372: process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of…
Published: 2018-04-25T09:29:00 Last Modified: 2019-08-03T13:15:00
Summary
process_cu_tu_index in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted binary file, as demonstrated by readelf.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10372 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=23064
- http://www.securityfocus.com/bid/103976
- https://access.redhat.com/errata/RHSA-2018:3032
- https://access.redhat.com/errata/RHBA-2019:0327
- https://security.gentoo.org/glsa/201908-01
- https://usn.ubuntu.com/4336-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2885: An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A…
Published: 2018-04-24T19:29:00 Last Modified: 2020-12-07T17:15:00
Summary
An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-2885 vulnerability.
References
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0392
- https://www.debian.org/security/2017/dsa-3929
- https://access.redhat.com/errata/RHSA-2017:2459
- http://www.securityfocus.com/bid/100258
- http://seclists.org/fulldisclosure/2020/Dec/3
- http://packetstormsecurity.com/files/160388/ProCaster-LE-32F430-GStreamer-souphttpsrc-libsoup-2.51.3-Stack-Overflow.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1059: The DPDK vhost-user interface does not check to verify that all the requested guest physical…
Published: 2018-04-24T18:29:00 Last Modified: 2021-08-04T17:15:00
Summary
The DPDK vhost-user interface does not check to verify that all the requested guest physical range is mapped and contiguous when performing Guest Physical Addresses to Host Virtual Addresses translations. This may lead to a malicious guest exposing vhost-user backend process memory. All versions before 18.02.1 are vulnerable.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.9
- CVSS Vector: AV:A/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2018-1059 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1544298
- https://access.redhat.com/security/cve/cve-2018-1059
- https://access.redhat.com/errata/RHSA-2018:1267
- https://usn.ubuntu.com/3642-1/
- https://usn.ubuntu.com/3642-2/
- https://access.redhat.com/errata/RHSA-2018:2038
- https://access.redhat.com/errata/RHSA-2018:2102
- https://access.redhat.com/errata/RHSA-2018:2524
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10322: The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through…
Published: 2018-04-24T06:29:00 Last Modified: 2020-10-16T01:15:00
Summary
The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-10322 vulnerability.
References
- https://www.spinics.net/lists/linux-xfs/msg17215.html
- https://bugzilla.kernel.org/show_bug.cgi?id=199377
- http://www.securityfocus.com/bid/103960
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
- https://usn.ubuntu.com/4578-1/
- https://usn.ubuntu.com/4579-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1106: An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users…
Published: 2018-04-23T20:29:00 Last Modified: 2019-10-09T23:38:00
Summary
An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users without administrator privileges to install signed packages. A local attacker can use this vulnerability to install vulnerable packages to further compromise a system.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-1106 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2018/04/23/3
- https://usn.ubuntu.com/3634-1/
- https://access.redhat.com/errata/RHSA-2018:1224
- https://www.debian.org/security/2018/dsa-4207
- https://bugzilla.redhat.com/show_bug.cgi?id=1565992
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up…
Published: 2018-04-23T19:29:00 Last Modified: 2019-02-28T01:03:00
Summary
The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-8781 vulnerability.
References
- https://patchwork.freedesktop.org/patch/211845/
- https://www.debian.org/security/2018/dsa-4188
- https://www.debian.org/security/2018/dsa-4187
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://usn.ubuntu.com/3654-2/
- https://usn.ubuntu.com/3654-1/
- https://usn.ubuntu.com/3656-1/
- https://usn.ubuntu.com/3677-2/
- https://usn.ubuntu.com/3677-1/
- https://usn.ubuntu.com/3674-2/
- https://usn.ubuntu.com/3674-1/
- https://research.checkpoint.com/mmap-vulnerabilities-linux-kernel/
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-17833: OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue…
Published: 2018-04-23T18:29:00 Last Modified: 2020-05-15T00:15:00
Summary
OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue which may manifest itself as a denial-of-service or a remote code-execution vulnerability.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-17833 vulnerability.
References
- https://sourceforge.net/p/openslp/mercurial/ci/151f07745901cbdba6e00e4889561b4083250da1/
- http://support.lenovo.com/us/en/solutions/LEN-18247
- https://lists.debian.org/debian-lts-announce/2018/04/msg00029.html
- https://usn.ubuntu.com/3708-1/
- https://access.redhat.com/errata/RHSA-2018:2240
- https://access.redhat.com/errata/RHSA-2018:2308
- https://security.gentoo.org/glsa/202005-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2795: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-04-19T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2795 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040697
- http://www.securityfocus.com/bid/103847
- https://security.netapp.com/advisory/ntap-20180419-0001/
- https://access.redhat.com/errata/RHSA-2018:1191
- https://access.redhat.com/errata/RHSA-2018:1188
- https://access.redhat.com/errata/RHSA-2018:1206
- https://access.redhat.com/errata/RHSA-2018:1205
- https://access.redhat.com/errata/RHSA-2018:1204
- https://access.redhat.com/errata/RHSA-2018:1203
- https://access.redhat.com/errata/RHSA-2018:1202
- https://access.redhat.com/errata/RHSA-2018:1201
- https://www.debian.org/security/2018/dsa-4185
- https://access.redhat.com/errata/RHSA-2018:1270
- https://access.redhat.com/errata/RHSA-2018:1278
- https://usn.ubuntu.com/3644-1/
- https://access.redhat.com/errata/RHSA-2018:1724
- https://access.redhat.com/errata/RHSA-2018:1723
- https://access.redhat.com/errata/RHSA-2018:1722
- https://access.redhat.com/errata/RHSA-2018:1721
- https://www.debian.org/security/2018/dsa-4225
- https://usn.ubuntu.com/3691-1/
- https://access.redhat.com/errata/RHSA-2018:1975
- https://access.redhat.com/errata/RHSA-2018:1974
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://security.gentoo.org/glsa/201903-14
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2798: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-04-19T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2798 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040697
- http://www.securityfocus.com/bid/103841
- https://security.netapp.com/advisory/ntap-20180419-0001/
- https://access.redhat.com/errata/RHSA-2018:1191
- https://access.redhat.com/errata/RHSA-2018:1188
- https://access.redhat.com/errata/RHSA-2018:1206
- https://access.redhat.com/errata/RHSA-2018:1205
- https://access.redhat.com/errata/RHSA-2018:1204
- https://access.redhat.com/errata/RHSA-2018:1203
- https://access.redhat.com/errata/RHSA-2018:1202
- https://access.redhat.com/errata/RHSA-2018:1201
- https://www.debian.org/security/2018/dsa-4185
- https://access.redhat.com/errata/RHSA-2018:1270
- https://access.redhat.com/errata/RHSA-2018:1278
- https://usn.ubuntu.com/3644-1/
- https://access.redhat.com/errata/RHSA-2018:1724
- https://access.redhat.com/errata/RHSA-2018:1723
- https://access.redhat.com/errata/RHSA-2018:1722
- https://access.redhat.com/errata/RHSA-2018:1721
- https://www.debian.org/security/2018/dsa-4225
- https://usn.ubuntu.com/3691-1/
- https://access.redhat.com/errata/RHSA-2018:1975
- https://access.redhat.com/errata/RHSA-2018:1974
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://security.gentoo.org/glsa/201903-14
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2813: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL)….
Published: 2018-04-19T02:29:00 Last Modified: 2020-08-24T17:37:00
Summary
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2813 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040698
- http://www.securityfocus.com/bid/103830
- https://security.netapp.com/advisory/ntap-20180419-0002/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
- https://www.debian.org/security/2018/dsa-4176
- https://usn.ubuntu.com/3629-1/
- https://usn.ubuntu.com/3629-2/
- https://access.redhat.com/errata/RHSA-2018:1254
- https://usn.ubuntu.com/3629-3/
- https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
- https://access.redhat.com/errata/RHSA-2018:2439
- https://access.redhat.com/errata/RHSA-2018:2729
- https://www.debian.org/security/2018/dsa-4341
- https://access.redhat.com/errata/RHSA-2018:3655
- https://access.redhat.com/errata/RHSA-2019:1258
- https://security.gentoo.org/glsa/201908-24
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2815: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-04-19T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2815 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040697
- http://www.securityfocus.com/bid/103848
- https://security.netapp.com/advisory/ntap-20180419-0001/
- https://access.redhat.com/errata/RHSA-2018:1191
- https://access.redhat.com/errata/RHSA-2018:1188
- https://access.redhat.com/errata/RHSA-2018:1206
- https://access.redhat.com/errata/RHSA-2018:1205
- https://access.redhat.com/errata/RHSA-2018:1204
- https://access.redhat.com/errata/RHSA-2018:1203
- https://access.redhat.com/errata/RHSA-2018:1202
- https://access.redhat.com/errata/RHSA-2018:1201
- https://www.debian.org/security/2018/dsa-4185
- https://access.redhat.com/errata/RHSA-2018:1270
- https://access.redhat.com/errata/RHSA-2018:1278
- https://usn.ubuntu.com/3644-1/
- https://www.debian.org/security/2018/dsa-4225
- https://usn.ubuntu.com/3691-1/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://security.gentoo.org/glsa/201903-14
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2794: Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security)….
Published: 2018-04-19T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Scores
- Impact Score: 6.4
- Exploitability Score: 1.9
- CVSS: 3.7
- CVSS Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-2794 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040697
- http://www.securityfocus.com/bid/103817
- https://security.netapp.com/advisory/ntap-20180419-0001/
- https://access.redhat.com/errata/RHSA-2018:1191
- https://access.redhat.com/errata/RHSA-2018:1188
- https://access.redhat.com/errata/RHSA-2018:1206
- https://access.redhat.com/errata/RHSA-2018:1205
- https://access.redhat.com/errata/RHSA-2018:1204
- https://access.redhat.com/errata/RHSA-2018:1203
- https://access.redhat.com/errata/RHSA-2018:1202
- https://access.redhat.com/errata/RHSA-2018:1201
- https://www.debian.org/security/2018/dsa-4185
- https://access.redhat.com/errata/RHSA-2018:1270
- https://access.redhat.com/errata/RHSA-2018:1278
- https://usn.ubuntu.com/3644-1/
- https://access.redhat.com/errata/RHSA-2018:1724
- https://access.redhat.com/errata/RHSA-2018:1723
- https://access.redhat.com/errata/RHSA-2018:1722
- https://access.redhat.com/errata/RHSA-2018:1721
- https://www.debian.org/security/2018/dsa-4225
- https://usn.ubuntu.com/3691-1/
- https://access.redhat.com/errata/RHSA-2018:1975
- https://access.redhat.com/errata/RHSA-2018:1974
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://security.gentoo.org/glsa/201903-14
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2797: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-04-19T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2797 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040697
- http://www.securityfocus.com/bid/103846
- https://security.netapp.com/advisory/ntap-20180419-0001/
- https://access.redhat.com/errata/RHSA-2018:1191
- https://access.redhat.com/errata/RHSA-2018:1188
- https://access.redhat.com/errata/RHSA-2018:1206
- https://access.redhat.com/errata/RHSA-2018:1205
- https://access.redhat.com/errata/RHSA-2018:1204
- https://access.redhat.com/errata/RHSA-2018:1203
- https://access.redhat.com/errata/RHSA-2018:1202
- https://access.redhat.com/errata/RHSA-2018:1201
- https://www.debian.org/security/2018/dsa-4185
- https://access.redhat.com/errata/RHSA-2018:1270
- https://access.redhat.com/errata/RHSA-2018:1278
- https://usn.ubuntu.com/3644-1/
- https://access.redhat.com/errata/RHSA-2018:1724
- https://access.redhat.com/errata/RHSA-2018:1723
- https://access.redhat.com/errata/RHSA-2018:1722
- https://access.redhat.com/errata/RHSA-2018:1721
- https://www.debian.org/security/2018/dsa-4225
- https://usn.ubuntu.com/3691-1/
- https://access.redhat.com/errata/RHSA-2018:1975
- https://access.redhat.com/errata/RHSA-2018:1974
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://security.gentoo.org/glsa/201903-14
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2800: Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported…
Published: 2018-04-19T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, JRockit accessible data as well as unauthorized read access to a subset of Java SE, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).
Scores
- Impact Score: 4.9
- Exploitability Score: 4.9
- CVSS: 4.0
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2800 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040697
- http://www.securityfocus.com/bid/103849
- https://security.netapp.com/advisory/ntap-20180419-0001/
- https://access.redhat.com/errata/RHSA-2018:1191
- https://access.redhat.com/errata/RHSA-2018:1188
- https://access.redhat.com/errata/RHSA-2018:1206
- https://access.redhat.com/errata/RHSA-2018:1205
- https://access.redhat.com/errata/RHSA-2018:1204
- https://access.redhat.com/errata/RHSA-2018:1203
- https://access.redhat.com/errata/RHSA-2018:1202
- https://access.redhat.com/errata/RHSA-2018:1201
- https://www.debian.org/security/2018/dsa-4185
- https://access.redhat.com/errata/RHSA-2018:1270
- https://access.redhat.com/errata/RHSA-2018:1278
- https://usn.ubuntu.com/3644-1/
- https://access.redhat.com/errata/RHSA-2018:1724
- https://access.redhat.com/errata/RHSA-2018:1723
- https://access.redhat.com/errata/RHSA-2018:1722
- https://access.redhat.com/errata/RHSA-2018:1721
- https://www.debian.org/security/2018/dsa-4225
- https://usn.ubuntu.com/3691-1/
- https://access.redhat.com/errata/RHSA-2018:1975
- https://access.redhat.com/errata/RHSA-2018:1974
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://security.gentoo.org/glsa/201903-14
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2814: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent:…
Published: 2018-04-19T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2814 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040697
- http://www.securityfocus.com/bid/103798
- https://security.netapp.com/advisory/ntap-20180419-0001/
- https://access.redhat.com/errata/RHSA-2018:1191
- https://access.redhat.com/errata/RHSA-2018:1188
- https://access.redhat.com/errata/RHSA-2018:1206
- https://access.redhat.com/errata/RHSA-2018:1205
- https://access.redhat.com/errata/RHSA-2018:1204
- https://access.redhat.com/errata/RHSA-2018:1203
- https://access.redhat.com/errata/RHSA-2018:1202
- https://access.redhat.com/errata/RHSA-2018:1201
- https://www.debian.org/security/2018/dsa-4185
- https://access.redhat.com/errata/RHSA-2018:1270
- https://access.redhat.com/errata/RHSA-2018:1278
- https://usn.ubuntu.com/3644-1/
- https://www.debian.org/security/2018/dsa-4225
- https://usn.ubuntu.com/3691-1/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://security.gentoo.org/glsa/201903-14
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2817: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL)….
Published: 2018-04-19T02:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2817 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040698
- http://www.securityfocus.com/bid/103818
- https://security.netapp.com/advisory/ntap-20180419-0002/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html
- https://www.debian.org/security/2018/dsa-4176
- https://usn.ubuntu.com/3629-1/
- https://usn.ubuntu.com/3629-2/
- https://access.redhat.com/errata/RHSA-2018:1254
- https://usn.ubuntu.com/3629-3/
- https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html
- https://access.redhat.com/errata/RHSA-2018:2439
- https://access.redhat.com/errata/RHSA-2018:2729
- https://www.debian.org/security/2018/dsa-4341
- https://access.redhat.com/errata/RHSA-2018:3655
- https://access.redhat.com/errata/RHSA-2019:1258
- https://security.gentoo.org/glsa/201908-24
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2790: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent:…
Published: 2018-04-19T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2790 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040697
- http://www.securityfocus.com/bid/103877
- https://security.netapp.com/advisory/ntap-20180419-0001/
- https://access.redhat.com/errata/RHSA-2018:1191
- https://access.redhat.com/errata/RHSA-2018:1188
- https://access.redhat.com/errata/RHSA-2018:1206
- https://access.redhat.com/errata/RHSA-2018:1205
- https://access.redhat.com/errata/RHSA-2018:1204
- https://access.redhat.com/errata/RHSA-2018:1203
- https://access.redhat.com/errata/RHSA-2018:1202
- https://access.redhat.com/errata/RHSA-2018:1201
- https://www.debian.org/security/2018/dsa-4185
- https://access.redhat.com/errata/RHSA-2018:1270
- https://access.redhat.com/errata/RHSA-2018:1278
- https://usn.ubuntu.com/3644-1/
- https://access.redhat.com/errata/RHSA-2018:1724
- https://access.redhat.com/errata/RHSA-2018:1723
- https://access.redhat.com/errata/RHSA-2018:1722
- https://access.redhat.com/errata/RHSA-2018:1721
- https://www.debian.org/security/2018/dsa-4225
- https://usn.ubuntu.com/3691-1/
- https://access.redhat.com/errata/RHSA-2018:1975
- https://access.redhat.com/errata/RHSA-2018:1974
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://security.gentoo.org/glsa/201903-14
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2796: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-04-19T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2796 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040697
- http://www.securityfocus.com/bid/103868
- https://security.netapp.com/advisory/ntap-20180419-0001/
- https://access.redhat.com/errata/RHSA-2018:1191
- https://access.redhat.com/errata/RHSA-2018:1188
- https://access.redhat.com/errata/RHSA-2018:1206
- https://access.redhat.com/errata/RHSA-2018:1204
- https://access.redhat.com/errata/RHSA-2018:1202
- https://access.redhat.com/errata/RHSA-2018:1201
- https://www.debian.org/security/2018/dsa-4185
- https://access.redhat.com/errata/RHSA-2018:1270
- https://access.redhat.com/errata/RHSA-2018:1278
- https://usn.ubuntu.com/3644-1/
- https://access.redhat.com/errata/RHSA-2018:1724
- https://access.redhat.com/errata/RHSA-2018:1723
- https://access.redhat.com/errata/RHSA-2018:1722
- https://access.redhat.com/errata/RHSA-2018:1721
- https://www.debian.org/security/2018/dsa-4225
- https://usn.ubuntu.com/3691-1/
- https://access.redhat.com/errata/RHSA-2018:1975
- https://access.redhat.com/errata/RHSA-2018:1974
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://security.gentoo.org/glsa/201903-14
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2799: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-04-19T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2799 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040697
- http://www.securityfocus.com/bid/103872
- https://security.netapp.com/advisory/ntap-20180419-0001/
- https://access.redhat.com/errata/RHSA-2018:1191
- https://access.redhat.com/errata/RHSA-2018:1188
- https://access.redhat.com/errata/RHSA-2018:1206
- https://access.redhat.com/errata/RHSA-2018:1204
- https://access.redhat.com/errata/RHSA-2018:1202
- https://access.redhat.com/errata/RHSA-2018:1201
- https://www.debian.org/security/2018/dsa-4185
- https://access.redhat.com/errata/RHSA-2018:1270
- https://access.redhat.com/errata/RHSA-2018:1278
- https://usn.ubuntu.com/3644-1/
- https://access.redhat.com/errata/RHSA-2018:1724
- https://access.redhat.com/errata/RHSA-2018:1723
- https://access.redhat.com/errata/RHSA-2018:1722
- https://access.redhat.com/errata/RHSA-2018:1721
- https://www.debian.org/security/2018/dsa-4225
- https://usn.ubuntu.com/3691-1/
- https://access.redhat.com/errata/RHSA-2018:1975
- https://access.redhat.com/errata/RHSA-2018:1974
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E
- https://security.gentoo.org/glsa/201903-14
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
- https://lists.apache.org/thread.html/b53d4601ecd9ec63c799dbe1bc5b78e0d52f4cef429da2dfe63cf06d@%3Cfop-dev.xmlgraphics.apache.org%3E
- https://lists.apache.org/thread.html/r449b5d89c7b2ba3762584cf6c38e01867d4b24706e023cf2a9911307@%3Cuser.spark.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2783: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-04-19T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u161 and 8u152; Java SE Embedded: 8u152; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2783 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040697
- http://www.securityfocus.com/bid/103832
- https://security.netapp.com/advisory/ntap-20180419-0001/
- https://access.redhat.com/errata/RHSA-2018:1205
- https://access.redhat.com/errata/RHSA-2018:1203
- https://usn.ubuntu.com/3644-1/
- https://access.redhat.com/errata/RHSA-2018:1724
- https://access.redhat.com/errata/RHSA-2018:1723
- https://access.redhat.com/errata/RHSA-2018:1722
- https://access.redhat.com/errata/RHSA-2018:1721
- https://access.redhat.com/errata/RHSA-2018:1975
- https://access.redhat.com/errata/RHSA-2018:1974
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2811: Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Install). Supported…
Published: 2018-04-19T02:29:00 Last Modified: 2020-09-08T12:29:00
Summary
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Install). Supported versions that are affected are Java SE: 8u162 and 10. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to installation process on client deployment of Java. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Scores
- Impact Score: 6.4
- Exploitability Score: 1.9
- CVSS: 3.7
- CVSS Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-2811 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.securitytracker.com/id/1040697
- http://www.securityfocus.com/bid/103810
- https://security.netapp.com/advisory/ntap-20180419-0001/
- https://access.redhat.com/errata/RHSA-2018:1204
- https://access.redhat.com/errata/RHSA-2018:1202
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://security.gentoo.org/glsa/201903-14
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10194: The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex…
Published: 2018-04-18T21:29:00 Last Modified: 2019-07-24T16:21:00
Summary
The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10194 vulnerability.
References
- https://bugs.ghostscript.com/show_bug.cgi?id=699255
- http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=39b1e54b2968620723bf32e96764c88797714879
- http://www.securitytracker.com/id/1040729
- https://lists.debian.org/debian-lts-announce/2018/04/msg00028.html
- https://usn.ubuntu.com/3636-1/
- https://access.redhat.com/errata/RHSA-2018:2918
- https://security.gentoo.org/glsa/201811-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1088: A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client…
Published: 2018-04-18T16:29:00 Last Modified: 2021-11-30T22:00:00
Summary
A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
Common Weakness Enumeration (CWE): CWE-266: Incorrect Privilege Assignment
CWE Description: A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1088 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1558721
- https://access.redhat.com/errata/RHSA-2018:1137
- https://access.redhat.com/errata/RHSA-2018:1136
- https://access.redhat.com/errata/RHSA-2018:1275
- https://access.redhat.com/errata/RHSA-2018:1524
- https://security.gentoo.org/glsa/201904-06
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6798: An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular…
Published: 2018-04-17T20:29:00 Last Modified: 2020-07-15T03:15:00
Summary
An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6798 vulnerability.
References
- https://www.debian.org/security/2018/dsa-4172
- https://rt.perl.org/Public/Bug/Display.html?id=132063
- http://www.securitytracker.com/id/1040681
- https://access.redhat.com/errata/RHSA-2018:1192
- https://usn.ubuntu.com/3625-1/
- https://security.gentoo.org/glsa/201909-01
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6797: An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-…
Published: 2018-04-17T20:29:00 Last Modified: 2020-08-24T17:37:00
Summary
An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6797 vulnerability.
References
- https://www.debian.org/security/2018/dsa-4172
- https://rt.perl.org/Public/Bug/Display.html?id=132227
- http://www.securitytracker.com/id/1040681
- https://access.redhat.com/errata/RHSA-2018:1192
- https://usn.ubuntu.com/3625-1/
- http://www.securitytracker.com/id/1042004
- https://security.gentoo.org/glsa/201909-01
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10119: sot/source/sdstor/stgstrms.cxx in LibreOffice before 5.4.5.1 and 6.x before 6.0.1.1 uses an…
Published: 2018-04-16T09:58:00 Last Modified: 2019-03-05T21:21:00
Summary
sot/source/sdstor/stgstrms.cxx in LibreOffice before 5.4.5.1 and 6.x before 6.0.1.1 uses an incorrect integer data type in the StgSmallStrm class, which allows remote attackers to cause a denial of service (use-after-free with write access) or possibly have unspecified other impact via a crafted document that uses the structured storage ole2 wrapper file format.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10119 vulnerability.
References
- https://gerrit.libreoffice.org/gitweb?p=core.git;a=commit;h=fdd41c995d1f719e92c6f083e780226114762f05
- https://gerrit.libreoffice.org/#/c/48758/
- https://gerrit.libreoffice.org/#/c/48757/
- https://gerrit.libreoffice.org/#/c/48756/
- https://gerrit.libreoffice.org/#/c/48751/
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5747
- https://www.libreoffice.org/about-us/security/advisories/cve-2018-10119/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00021.html
- https://www.debian.org/security/2018/dsa-4178
- https://access.redhat.com/errata/RHSA-2018:3054
- https://usn.ubuntu.com/3883-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-10120: The SwCTBWrapper::Read function in sw/source/filter/ww8/ww8toolbar.cxx in LibreOffice before…
Published: 2018-04-16T09:58:00 Last Modified: 2020-08-24T17:37:00
Summary
The SwCTBWrapper::Read function in sw/source/filter/ww8/ww8toolbar.cxx in LibreOffice before 5.4.6.1 and 6.x before 6.0.2.1 does not validate a customizations index, which allows remote attackers to cause a denial of service (heap-based buffer overflow with write access) or possibly have unspecified other impact via a crafted document that contains a certain Microsoft Word record.
Common Weakness Enumeration (CWE): CWE-129: Improper Validation of Array Index
CWE Description: The most common condition situation leading to an out-of-bounds array index is the use of loop index variables as buffer indexes. If the end condition for the loop is subject to a flaw, the index can grow or shrink unbounded, therefore causing a buffer overflow or underflow. Another common situation leading to this condition is the use of a function’s return value, or the resulting value of a calculation directly as an index in to a buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-10120 vulnerability.
References
- https://gerrit.libreoffice.org/gitweb?p=core.git;a=commit;h=017fcc2fcd00af17a97bd5463d89662404f57667
- https://gerrit.libreoffice.org/#/c/49500/
- https://gerrit.libreoffice.org/#/c/49499/
- https://gerrit.libreoffice.org/#/c/49486/
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6173
- https://www.libreoffice.org/about-us/security/advisories/cve-2018-10120/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00021.html
- https://www.debian.org/security/2018/dsa-4178
- https://access.redhat.com/errata/RHSA-2018:3054
- https://usn.ubuntu.com/3883-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1079: pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user…
Published: 2018-04-12T17:29:00 Last Modified: 2019-10-09T23:38:00
Summary
pcs before version 0.9.164 and 0.10 is vulnerable to a privilege escalation via authorized user malicious REST call. The REST interface of the pcsd service did not properly sanitize the file name from the /remote/put_file query. If the /etc/booth directory exists, an authenticated attacker with write permissions could create or overwrite arbitrary files with arbitrary data outside of the /etc/booth directory, in the context of the pcsd process.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1079 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1079
- https://access.redhat.com/errata/RHSA-2018:1060
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1084: corosync before version 2.4.4 is vulnerable to an integer overflow in exec/totemcrypto.c.
Published: 2018-04-12T17:29:00 Last Modified: 2021-07-03T04:15:00
Summary
corosync before version 2.4.4 is vulnerable to an integer overflow in exec/totemcrypto.c.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1084 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1084
- http://www.securityfocus.com/bid/103758
- https://www.debian.org/security/2018/dsa-4174
- https://access.redhat.com/errata/RHSA-2018:1169
- https://usn.ubuntu.com/4000-1/
- https://security.gentoo.org/glsa/202107-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1086: pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST…
Published: 2018-04-12T16:29:00 Last Modified: 2019-10-09T23:38:00
Summary
pcs before versions 0.9.164 and 0.10 is vulnerable to a debug parameter removal bypass. REST interface of the pcsd service did not properly remove the pcs debug argument from the /run_pcs query, possibly disclosing sensitive information. A remote attacker with a valid token could use this flaw to elevate their privilege.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1086 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1086
- https://access.redhat.com/errata/RHSA-2018:1060
- https://www.debian.org/security/2018/dsa-4169
- https://access.redhat.com/errata/RHSA-2018:1927
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1100: zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the…
Published: 2018-04-11T19:29:00 Last Modified: 2020-12-01T07:15:00
Summary
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-1100 vulnerability.
References
- https://sourceforge.net/p/zsh/code/ci/31f72205630687c1cef89347863aab355296a27f/
- https://bugzilla.redhat.com/show_bug.cgi?id=1563395
- https://access.redhat.com/errata/RHSA-2018:1932
- https://usn.ubuntu.com/3764-1/
- https://security.gentoo.org/glsa/201805-10
- https://access.redhat.com/errata/RHSA-2018:3073
- https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000156: GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files,…
Published: 2018-04-06T13:29:00 Last Modified: 2019-07-30T10:15:00
Summary
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD’s CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000156 vulnerability.
References
- https://twitter.com/kurtseifried/status/982028968877436928
- https://savannah.gnu.org/bugs/index.php?53566
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19
- http://rachelbythebay.com/w/2018/04/05/bangpatch/
- https://usn.ubuntu.com/3624-1/
- https://usn.ubuntu.com/3624-2/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00013.html
- https://access.redhat.com/errata/RHSA-2018:1200
- https://access.redhat.com/errata/RHSA-2018:1199
- https://access.redhat.com/errata/RHSA-2018:2097
- https://access.redhat.com/errata/RHSA-2018:2096
- https://access.redhat.com/errata/RHSA-2018:2095
- https://access.redhat.com/errata/RHSA-2018:2094
- https://access.redhat.com/errata/RHSA-2018:2093
- https://access.redhat.com/errata/RHSA-2018:2092
- https://access.redhat.com/errata/RHSA-2018:2091
- https://security.gentoo.org/glsa/201904-17
- https://seclists.org/bugtraq/2019/Jul/54
- https://seclists.org/bugtraq/2019/Aug/29
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6914: Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before…
Published: 2018-04-03T22:29:00 Last Modified: 2019-07-21T12:15:00
Summary
Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6914 vulnerability.
References
- https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- http://www.securityfocus.com/bid/103686
- https://usn.ubuntu.com/3626-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html
- https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
- https://www.debian.org/security/2018/dsa-4259
- http://www.securitytracker.com/id/1042004
- https://access.redhat.com/errata/RHSA-2018:3731
- https://access.redhat.com/errata/RHSA-2018:3730
- https://access.redhat.com/errata/RHSA-2018:3729
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:2028
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-8777: In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and…
Published: 2018-04-03T22:29:00 Last Modified: 2019-07-21T12:15:00
Summary
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-8777 vulnerability.
References
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/
- http://www.securityfocus.com/bid/103683
- https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html
- https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html
- https://usn.ubuntu.com/3685-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
- https://www.debian.org/security/2018/dsa-4259
- http://www.securitytracker.com/id/1042004
- https://access.redhat.com/errata/RHSA-2018:3731
- https://access.redhat.com/errata/RHSA-2018:3730
- https://access.redhat.com/errata/RHSA-2018:3729
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:2028
- https://access.redhat.com/errata/RHSA-2020:0542
- https://access.redhat.com/errata/RHSA-2020:0591
- https://access.redhat.com/errata/RHSA-2020:0663
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-8778: In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and…
Published: 2018-04-03T22:29:00 Last Modified: 2019-10-03T00:03:00
Summary
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.
Common Weakness Enumeration (CWE): CWE-134: Use of Externally-Controlled Format String
CWE Description: The software uses a function that accepts a format string as an argument, but the format string originates from an external source.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-8778 vulnerability.
References
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/
- http://www.securityfocus.com/bid/103693
- https://usn.ubuntu.com/3626-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html
- https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
- https://www.debian.org/security/2018/dsa-4259
- http://www.securitytracker.com/id/1042004
- https://access.redhat.com/errata/RHSA-2018:3731
- https://access.redhat.com/errata/RHSA-2018:3730
- https://access.redhat.com/errata/RHSA-2018:3729
- http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
- https://access.redhat.com/errata/RHSA-2019:2028
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7000: An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before…
Published: 2018-04-03T06:29:00 Last Modified: 2018-04-27T18:00:00
Summary
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. The issue involves the “SQLite” component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7000 vulnerability.
References
- https://support.apple.com/HT207798
- https://support.apple.com/HT207797
- https://www.debian.org/security/2017/dsa-3926
- https://security.gentoo.org/glsa/201709-15
- https://access.redhat.com/errata/RHSA-2017:1833
- http://www.securityfocus.com/bid/99950
- http://www.securityfocus.com/bid/98767
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-4117: An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before…
Published: 2018-04-03T06:29:00 Last Modified: 2018-11-09T17:58:00
Summary
An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. watchOS before 4.3 is affected. The issue involves the fetch API in the “WebKit” component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-4117 vulnerability.
References
- https://support.apple.com/HT208697
- https://support.apple.com/HT208696
- https://support.apple.com/HT208695
- https://support.apple.com/HT208694
- https://support.apple.com/HT208693
- http://www.securitytracker.com/id/1040604
- https://usn.ubuntu.com/3635-1/
- https://www.debian.org/security/2018/dsa-4256
- http://www.securityfocus.com/bid/104887
- https://access.redhat.com/errata/RHSA-2018:2282
- https://security.gentoo.org/glsa/201808-04
- https://security.gentoo.org/glsa/201808-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1094: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not…
Published: 2018-04-02T03:29:00 Last Modified: 2020-11-09T21:46:00
Summary
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1094 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=a45403b51582a87872927a3e0fc0a389c26867f1
- https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=18db4b4e6fc31eda838dd1c1296d67dbcb3dc957
- https://bugzilla.redhat.com/show_bug.cgi?id=1560788
- https://bugzilla.kernel.org/show_bug.cgi?id=199183
- http://openwall.com/lists/oss-security/2018/03/29/1
- https://usn.ubuntu.com/3695-2/
- https://usn.ubuntu.com/3695-1/
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7566: The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write…
Published: 2018-03-30T21:29:00 Last Modified: 2020-08-24T17:37:00
Summary
The Linux kernel 4.15 has a Buffer Overflow via an SNDRV_SEQ_IOCTL_SET_CLIENT_POOL ioctl write operation to /dev/snd/seq by a local user.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-7566 vulnerability.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d15d662e89fc667b90cd294b0eb45694e33144da
- https://bugzilla.redhat.com/show_bug.cgi?id=1550142
- http://mailman.alsa-project.org/pipermail/alsa-devel/2018-February/132026.html
- http://lists.opensuse.org/opensuse-security-announce/2018-03/msg00067.html
- https://usn.ubuntu.com/3631-2/
- https://usn.ubuntu.com/3631-1/
- https://www.debian.org/security/2018/dsa-4188
- https://www.debian.org/security/2018/dsa-4187
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://access.redhat.com/errata/RHSA-2018:2395
- https://access.redhat.com/errata/RHSA-2018:2390
- https://access.redhat.com/errata/RHSA-2018:2384
- https://usn.ubuntu.com/3798-2/
- https://usn.ubuntu.com/3798-1/
- http://www.securityfocus.com/bid/103605
- https://access.redhat.com/errata/RHSA-2018:2948
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://access.redhat.com/errata/RHSA-2019:1483
- https://access.redhat.com/errata/RHSA-2019:1487
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1083: Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete…
Published: 2018-03-28T13:29:00 Last Modified: 2020-12-01T07:15:00
Summary
Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-1083 vulnerability.
References
- https://sourceforge.net/p/zsh/code/ci/259ac472eac291c8c103c7a0d8a4eaf3c2942ed7
- https://bugzilla.redhat.com/show_bug.cgi?id=1557382
- https://usn.ubuntu.com/3608-1/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00038.html
- http://www.securityfocus.com/bid/103572
- https://access.redhat.com/errata/RHSA-2018:1932
- https://security.gentoo.org/glsa/201805-10
- https://access.redhat.com/errata/RHSA-2018:3073
- https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15710: In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if…
Published: 2018-03-26T15:29:00 Last Modified: 2021-06-06T11:15:00
Summary
In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user’s credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, ’en-US’ is truncated to ’en’). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15710 vulnerability.
References
- https://httpd.apache.org/security/vulnerabilities_24.html
- http://www.openwall.com/lists/oss-security/2018/03/24/8
- http://www.securitytracker.com/id/1040569
- http://www.securityfocus.com/bid/103512
- https://www.debian.org/security/2018/dsa-4164
- https://usn.ubuntu.com/3627-1/
- https://usn.ubuntu.com/3627-2/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
- https://security.netapp.com/advisory/ntap-20180601-0004/
- https://access.redhat.com/errata/RHSA-2018:3558
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
- https://access.redhat.com/errata/RHSA-2019:0367
- https://access.redhat.com/errata/RHSA-2019:0366
- https://usn.ubuntu.com/3937-2/
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
- https://www.tenable.com/security/tns-2019-09
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15715: In Apache httpd 2.4.0 to 2.4.29, the expression specified in could match ‘$’ to a…
Published: 2018-03-26T15:29:00 Last Modified: 2021-06-06T11:15:00
Summary
In Apache httpd 2.4.0 to 2.4.29, the expression specified in
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15715 vulnerability.
References
- https://httpd.apache.org/security/vulnerabilities_24.html
- http://www.openwall.com/lists/oss-security/2018/03/24/6
- http://www.securitytracker.com/id/1040570
- http://www.securityfocus.com/bid/103525
- https://www.debian.org/security/2018/dsa-4164
- https://usn.ubuntu.com/3627-1/
- https://usn.ubuntu.com/3627-2/
- https://security.netapp.com/advisory/ntap-20180601-0004/
- https://access.redhat.com/errata/RHSA-2018:3558
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
- https://access.redhat.com/errata/RHSA-2019:0367
- https://access.redhat.com/errata/RHSA-2019:0366
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
- https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html
- https://www.tenable.com/security/tns-2019-09
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1283: In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to…
Published: 2018-03-26T15:29:00 Last Modified: 2021-06-06T11:15:00
Summary
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a “Session” header. This comes from the “HTTP_SESSION” variable name used by mod_session to forward its data to CGIs, since the prefix “HTTP_” is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1283 vulnerability.
References
- https://httpd.apache.org/security/vulnerabilities_24.html
- http://www.openwall.com/lists/oss-security/2018/03/24/4
- http://www.securitytracker.com/id/1040568
- http://www.securityfocus.com/bid/103520
- https://www.debian.org/security/2018/dsa-4164
- https://usn.ubuntu.com/3627-1/
- https://usn.ubuntu.com/3627-2/
- https://security.netapp.com/advisory/ntap-20180601-0004/
- https://access.redhat.com/errata/RHSA-2018:3558
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
- https://access.redhat.com/errata/RHSA-2019:0367
- https://access.redhat.com/errata/RHSA-2019:0366
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
- https://www.tenable.com/security/tns-2019-09
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1301: A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30,…
Published: 2018-03-26T15:29:00 Last Modified: 2021-06-06T11:15:00
Summary
A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1301 vulnerability.
References
- https://httpd.apache.org/security/vulnerabilities_24.html
- http://www.openwall.com/lists/oss-security/2018/03/24/2
- http://www.securitytracker.com/id/1040573
- http://www.securityfocus.com/bid/103515
- https://www.debian.org/security/2018/dsa-4164
- https://usn.ubuntu.com/3627-1/
- https://usn.ubuntu.com/3627-2/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
- https://security.netapp.com/advisory/ntap-20180601-0004/
- https://access.redhat.com/errata/RHSA-2018:3558
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
- https://access.redhat.com/errata/RHSA-2019:0367
- https://access.redhat.com/errata/RHSA-2019:0366
- https://usn.ubuntu.com/3937-2/
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
- https://www.tenable.com/security/tns-2019-09
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1312: In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the…
Published: 2018-03-26T15:29:00 Last Modified: 2021-06-06T11:15:00
Summary
In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1312 vulnerability.
References
- https://httpd.apache.org/security/vulnerabilities_24.html
- http://www.openwall.com/lists/oss-security/2018/03/24/7
- http://www.securitytracker.com/id/1040571
- http://www.securityfocus.com/bid/103524
- https://www.debian.org/security/2018/dsa-4164
- https://usn.ubuntu.com/3627-1/
- https://usn.ubuntu.com/3627-2/
- https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html
- https://security.netapp.com/advisory/ntap-20180601-0004/
- https://access.redhat.com/errata/RHSA-2018:3558
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
- https://access.redhat.com/errata/RHSA-2019:0367
- https://access.redhat.com/errata/RHSA-2019:0366
- https://usn.ubuntu.com/3937-2/
- https://access.redhat.com/errata/RHSA-2019:1898
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
- https://www.tenable.com/security/tns-2019-09
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000140: rsyslog librelp version 1.2.14 and earlier contains a Buffer Overflow vulnerability in the…
Published: 2018-03-23T21:29:00 Last Modified: 2020-08-24T17:37:00
Summary
rsyslog librelp version 1.2.14 and earlier contains a Buffer Overflow vulnerability in the checking of x509 certificates from a peer that can result in Remote code execution. This attack appear to be exploitable a remote attacker that can connect to rsyslog and trigger a stack buffer overflow by sending a specially crafted x509 certificate.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000140 vulnerability.
References
- https://lgtm.com/rules/1505913226124/
- https://github.com/rsyslog/librelp/blob/532aa362f0f7a8d037505b0a27a1df452f9bac9e/src/tcp.c#L1205
- https://www.debian.org/security/2018/dsa-4151
- https://usn.ubuntu.com/3612-1/
- https://access.redhat.com/errata/RHSA-2018:1225
- https://access.redhat.com/errata/RHSA-2018:1223
- https://access.redhat.com/errata/RHSA-2018:1707
- https://access.redhat.com/errata/RHSA-2018:1704
- https://access.redhat.com/errata/RHSA-2018:1703
- https://access.redhat.com/errata/RHSA-2018:1702
- https://access.redhat.com/errata/RHSA-2018:1701
- https://security.gentoo.org/glsa/201804-21
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-8945: The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka…
Published: 2018-03-22T21:29:00 Last Modified: 2019-10-31T01:15:00
Summary
The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-8945 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22809
- https://access.redhat.com/errata/RHSA-2018:3032
- https://security.gentoo.org/glsa/201811-17
- https://access.redhat.com/errata/RHBA-2019:0327
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
- https://usn.ubuntu.com/4336-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-8088: org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote…
Published: 2018-03-20T16:29:00 Last Modified: 2022-01-31T19:15:00
Summary
org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.7.26 later and in the 2.0.x series.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-8088 vulnerability.
References
- https://jira.qos.ch/browse/SLF4J-431
- https://jira.qos.ch/browse/SLF4J-430
- https://github.com/qos-ch/slf4j/commit/d2b27fba88e983f921558da27fc29b5f5d269405
- https://access.redhat.com/errata/RHSA-2018:0592
- https://access.redhat.com/errata/RHSA-2018:0582
- https://access.redhat.com/errata/RHSA-2018:0630
- https://access.redhat.com/errata/RHSA-2018:0629
- https://access.redhat.com/errata/RHSA-2018:0628
- https://access.redhat.com/errata/RHSA-2018:0627
- http://www.securitytracker.com/id/1040627
- https://access.redhat.com/errata/RHSA-2018:1251
- https://access.redhat.com/errata/RHSA-2018:1249
- https://access.redhat.com/errata/RHSA-2018:1248
- https://access.redhat.com/errata/RHSA-2018:1247
- http://www.securityfocus.com/bid/103737
- https://access.redhat.com/errata/RHSA-2018:1323
- https://access.redhat.com/errata/RHSA-2018:1525
- https://access.redhat.com/errata/RHSA-2018:1451
- https://access.redhat.com/errata/RHSA-2018:1450
- https://access.redhat.com/errata/RHSA-2018:1449
- https://access.redhat.com/errata/RHSA-2018:1448
- https://access.redhat.com/errata/RHSA-2018:1447
- https://access.redhat.com/errata/RHSA-2018:1575
- https://access.redhat.com/errata/RHSA-2018:2143
- https://access.redhat.com/errata/RHSA-2018:2420
- https://access.redhat.com/errata/RHSA-2018:2419
- https://access.redhat.com/errata/RHSA-2018:2669
- https://access.redhat.com/errata/RHSA-2018:2930
- https://lists.apache.org/thread.html/956ba8e76b6793a6670b2eb0129a5e3003ce2124ca3130fd57d48d0f@%3Cdevnull.infra.apache.org%3E
- https://lists.apache.org/thread.html/95ce76613c869dbccf1d3d29327099ccc71aeec156f76c30853044fa@%3Cdevnull.infra.apache.org%3E
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://access.redhat.com/errata/RHSA-2019:2413
- https://access.redhat.com/errata/RHSA-2019:3140
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://lists.apache.org/thread.html/r767861f053c15f9e9201b939a0d508dd58475a072e76135eaaca17f0@%3Ccommon-issues.hadoop.apache.org%3E
- https://lists.apache.org/thread.html/reb3eeb985afdead17fadb7c33d5d472c1015a85ea5c9b038ec77f378@%3Ccommon-dev.hadoop.apache.org%3E
- https://lists.apache.org/thread.html/raabf1a00b2652575fca9fcb44166a828a0cab97a7d1594001eabc991@%3Ccommon-issues.hadoop.apache.org%3E
- https://lists.apache.org/thread.html/rfe52b7cbba4dcba521e13130e5d28d5818b78d70db0af1b470fa0264@%3Ccommon-issues.hadoop.apache.org%3E
- https://lists.apache.org/thread.html/re6fb6b0de9d679310437ff87fc94e39da5a14dce9c73864a41837462@%3Ccommon-commits.hadoop.apache.org%3E
- https://lists.apache.org/thread.html/rd86db9679150e9297b5c0fcb6f0e80a8b81b54fcf423de5a914bca78@%3Ccommon-commits.hadoop.apache.org%3E
- https://lists.apache.org/thread.html/r1660c72a660f0522947ca6ce329dcc74e1ee20c58bbe208472754489@%3Ccommon-issues.hadoop.apache.org%3E
- https://lists.apache.org/thread.html/r81711cde77c2c5742b7b8533c978e79771b700af0ef4d3149d70df25@%3Cnotifications.logging.apache.org%3E
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
- https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E
- https://lists.apache.org/thread.html/r17e7e6abc53d29c0e269153517d36f4bec2755b95900596e6df15cbe@%3Cnotifications.iotdb.apache.org%3E
- https://lists.apache.org/thread.html/r37644f0a00aca9fbcbc21c0f9a91f927b63153ec3607be469cd515e5@%3Creviews.iotdb.apache.org%3E
- https://lists.apache.org/thread.html/r2d05924f903403927a2f4e78d9b1249a42f0bd09f69a7c1954d74a42@%3Creviews.iotdb.apache.org%3E
- https://lists.apache.org/thread.html/r48247c12cf652e95a01fc94ee5aa8641f3ec481235774790e53eb55e@%3Creviews.iotdb.apache.org%3E
- https://lists.apache.org/thread.html/rf58e1bee31d66665437dde9acd9abed53f8483034b69fa9ca7cde09c@%3Cdev.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/r0f376559fd39cf1a53ac3afbc1fc5d62649dcac9916d4697445a94fa@%3Cissues.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/r32be21da011479df41468a62bc09d12f0d3b4e3a71679d33cb0e8c56@%3Cissues.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/rc378b97d52856f9f3c5ced14771fed8357e4187a3a0f9a2f0515931a@%3Cissues.zookeeper.apache.org%3E
- https://lists.apache.org/thread.html/r9e25496608036573736cee484d8d03dae400f09e443b0000b6adc042@%3Ccommits.iotdb.apache.org%3E
- https://lists.apache.org/thread.html/rfb45527bad7220ada9e30957762e1da254ce405e67cc3ddf6f3558d9@%3Creviews.iotdb.apache.org%3E
- https://lists.apache.org/thread.html/r99a6552e45ca6ba1082031421f51799a4a665eda905ab2c2aa9d6ffa@%3Cdev.flink.apache.org%3E
- https://lists.apache.org/thread.html/r891761d5014f9ffd79d9737482de832462de538b6c4bdcef21aad729@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r573eb577a67503e72181eee637d9b0ac042197e632bcdfce76af06a3@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/rc7de83170d3402af15bfed3d59f80aea20f250535bdce30e4cad24db@%3Cissues.flink.apache.org%3E
- https://lists.apache.org/thread.html/r5cf87a035b297c19f4043a37b73c341576dd92f819bd3e4aa27de541@%3Cissues.flink.apache.org%3E
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.slf4j.org/news.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1068: A flaw was found in the Linux 4.x kernel’s implementation of 32-bit syscall interface for…
Published: 2018-03-16T16:29:00 Last Modified: 2019-05-14T23:29:00
Summary
A flaw was found in the Linux 4.x kernel’s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-1068 vulnerability.
References
- https://github.com/torvalds/linux/commit/b71812168571fa55e44cdd0254471331b9c4c4c6
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6
- https://bugzilla.redhat.com/show_bug.cgi?id=1552048
- https://marc.info/?l=linux-netdev&m=152025888924151&w=2
- https://marc.info/?l=linux-netdev&m=152023808817590&w=2
- http://www.securityfocus.com/bid/103459
- https://www.debian.org/security/2018/dsa-4188
- https://www.debian.org/security/2018/dsa-4187
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://access.redhat.com/errata/RHSA-2018:1355
- https://access.redhat.com/errata/RHSA-2018:1318
- https://usn.ubuntu.com/3654-2/
- https://usn.ubuntu.com/3654-1/
- https://usn.ubuntu.com/3656-1/
- https://usn.ubuntu.com/3677-2/
- https://usn.ubuntu.com/3677-1/
- https://usn.ubuntu.com/3674-2/
- https://usn.ubuntu.com/3674-1/
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2019:1170
- https://access.redhat.com/errata/RHSA-2019:1190
- https://access.redhat.com/errata/RHSA-2019:4159
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000120: A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that…
Published: 2018-03-14T18:29:00 Last Modified: 2019-06-18T22:15:00
Summary
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000120 vulnerability.
References
- https://curl.haxx.se/docs/adv_2018-9cd6.html
- https://www.debian.org/security/2018/dsa-4136
- http://www.securitytracker.com/id/1040531
- https://usn.ubuntu.com/3598-1/
- http://www.securityfocus.com/bid/103414
- https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
- https://usn.ubuntu.com/3598-2/
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/errata/RHSA-2018:3157
- https://access.redhat.com/errata/RHSA-2018:3558
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:1543
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2020:0544
- https://access.redhat.com/errata/RHSA-2020:0594
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000121: A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code…
Published: 2018-03-14T18:29:00 Last Modified: 2019-07-23T23:15:00
Summary
A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000121 vulnerability.
References
- https://curl.haxx.se/docs/adv_2018-97a2.html
- https://www.debian.org/security/2018/dsa-4136
- http://www.securitytracker.com/id/1040529
- https://usn.ubuntu.com/3598-1/
- http://www.securityfocus.com/bid/103415
- https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
- https://usn.ubuntu.com/3598-2/
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/errata/RHSA-2018:3157
- https://access.redhat.com/errata/RHSA-2018:3558
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://access.redhat.com/errata/RHBA-2019:0327
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://access.redhat.com/errata/RHSA-2020:0544
- https://access.redhat.com/errata/RHSA-2020:0594
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000122: A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling…
Published: 2018-03-14T18:29:00 Last Modified: 2019-10-03T00:03:00
Summary
A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000122 vulnerability.
References
- https://curl.haxx.se/docs/adv_2018-b047.html
- https://www.debian.org/security/2018/dsa-4136
- http://www.securitytracker.com/id/1040530
- https://usn.ubuntu.com/3598-1/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
- http://www.securityfocus.com/bid/103436
- https://usn.ubuntu.com/3598-2/
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://access.redhat.com/errata/RHSA-2018:3157
- https://access.redhat.com/errata/RHSA-2018:3558
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:1543
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://access.redhat.com/errata/RHSA-2020:0544
- https://access.redhat.com/errata/RHSA-2020:0594
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7750: transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5,…
Published: 2018-03-13T18:29:00 Last Modified: 2021-12-28T13:15:00
Summary
transport.py in the SSH server implementation of Paramiko before 1.17.6, 1.18.x before 1.18.5, 2.0.x before 2.0.8, 2.1.x before 2.1.5, 2.2.x before 2.2.3, 2.3.x before 2.3.2, and 2.4.x before 2.4.1 does not properly check whether authentication is completed before processing other requests, as demonstrated by channel-open. A customized SSH client can simply skip the authentication step.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-7750 vulnerability.
References
- https://github.com/paramiko/paramiko/commit/fa29bd8446c8eab237f5187d28787727b4610516
- https://github.com/paramiko/paramiko/blob/master/sites/www/changelog.rst
- https://github.com/paramiko/paramiko/issues/1175
- https://usn.ubuntu.com/3603-2/
- https://access.redhat.com/errata/RHSA-2018:0591
- https://usn.ubuntu.com/3603-1/
- https://access.redhat.com/errata/RHSA-2018:0646
- https://access.redhat.com/errata/RHSA-2018:1125
- https://access.redhat.com/errata/RHSA-2018:1124
- https://access.redhat.com/errata/RHSA-2018:1213
- http://www.securityfocus.com/bid/103713
- https://access.redhat.com/errata/RHSA-2018:1274
- https://access.redhat.com/errata/RHSA-2018:1328
- https://access.redhat.com/errata/RHSA-2018:1525
- https://access.redhat.com/errata/RHSA-2018:1972
- https://lists.debian.org/debian-lts-announce/2018/10/msg00018.html
- https://www.exploit-db.com/exploits/45712/
- https://lists.debian.org/debian-lts-announce/2021/12/msg00025.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1050: All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the…
Published: 2018-03-13T16:29:00 Last Modified: 2020-12-04T18:15:00
Summary
All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.5
- CVSS: 3.3
- CVSS Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2018-1050 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2018-1050.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1538771
- https://www.debian.org/security/2018/dsa-4135
- https://security.netapp.com/advisory/ntap-20180313-0001/
- http://www.securitytracker.com/id/1040493
- http://www.securityfocus.com/bid/103387
- https://usn.ubuntu.com/3595-1/
- https://usn.ubuntu.com/3595-2/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00024.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03834en_us
- https://access.redhat.com/errata/RHSA-2018:1883
- https://access.redhat.com/errata/RHSA-2018:1860
- https://access.redhat.com/errata/RHSA-2018:2613
- https://access.redhat.com/errata/RHSA-2018:2612
- https://security.gentoo.org/glsa/201805-07
- https://access.redhat.com/errata/RHSA-2018:3056
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7858: Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows…
Published: 2018-03-12T21:29:00 Last Modified: 2020-11-10T18:54:00
Summary
Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-7858 vulnerability.
References
- https://lists.nongnu.org/archive/html/qemu-devel/2018-03/msg02174.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1553402
- http://www.openwall.com/lists/oss-security/2018/03/09/1
- http://www.securityfocus.com/bid/103350
- https://access.redhat.com/errata/RHSA-2018:1369
- https://access.redhat.com/errata/RHSA-2018:1416
- https://usn.ubuntu.com/3649-1/
- https://access.redhat.com/errata/RHSA-2018:2162
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-2619: Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a…
Published: 2018-03-12T15:29:00 Last Modified: 2019-10-09T23:26:00
Summary
Samba before versions 4.6.1, 4.5.7 and 4.4.11 are vulnerable to a malicious client using a symlink race to allow access to areas of the server file system not exported under the share definition.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 6.4
- Exploitability Score: 6.8
- CVSS: 6.0
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-2619 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2017-2619.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1429472
- https://www.exploit-db.com/exploits/41740/
- https://www.debian.org/security/2017/dsa-3816
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us
- https://access.redhat.com/errata/RHSA-2017:2789
- https://access.redhat.com/errata/RHSA-2017:2778
- https://access.redhat.com/errata/RHSA-2017:2338
- https://access.redhat.com/errata/RHSA-2017:1265
- http://www.securitytracker.com/id/1038117
- http://www.securityfocus.com/bid/97033
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9600: JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded…
Published: 2018-03-12T15:29:00 Last Modified: 2019-10-09T23:20:00
Summary
JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9600 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1410026
- https://access.redhat.com/errata/RHSA-2017:1208
- https://usn.ubuntu.com/3693-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5314: Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier…
Published: 2018-03-12T02:29:00 Last Modified: 2018-04-05T16:56:00
Summary
Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5314 vulnerability.
References
- https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2
- https://bugzilla.redhat.com/show_bug.cgi?id=1346687
- http://www.securityfocus.com/bid/91195
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.openwall.com/lists/oss-security/2016/06/30/3
- http://www.openwall.com/lists/oss-security/2016/06/15/9
- http://www.openwall.com/lists/oss-security/2016/06/15/1
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00060.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00087.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00017.html
- http://bugzilla.maptools.org/show_bug.cgi?id=2554
- https://www.debian.org/security/2017/dsa-3762
- https://security.gentoo.org/glsa/201701-16
- http://www.securityfocus.com/bid/91245
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8130: The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows…
Published: 2018-03-12T02:29:00 Last Modified: 2018-04-05T21:07:00
Summary
The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.
Common Weakness Enumeration (CWE): CWE-369: Divide By Zero
CWE Description: The product divides a value by zero.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8130 vulnerability.
References
- https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
- https://bugzilla.redhat.com/show_bug.cgi?id=1185817
- http://www.conostix.com/pub/adv/CVE-2014-8130-LibTIFF-Division_By_Zero.txt
- http://support.apple.com/kb/HT204942
- http://support.apple.com/kb/HT204941
- http://openwall.com/lists/oss-security/2015/01/24/15
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
- http://bugzilla.maptools.org/show_bug.cgi?id=2483
- https://security.gentoo.org/glsa/201701-16
- http://www.securitytracker.com/id/1032760
- http://www.securityfocus.com/bid/72353
- http://rhn.redhat.com/errata/RHSA-2016-1547.html
- http://rhn.redhat.com/errata/RHSA-2016-1546.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8129: LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or…
Published: 2018-03-12T02:29:00 Last Modified: 2018-04-06T13:02:00
Summary
LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by failure of tif_next.c to verify that the BitsPerSample value is 2, and the t2p_sample_lab_signed_to_unsigned function in tiff2pdf.c.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8129 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1185815
- http://www.conostix.com/pub/adv/CVE-2014-8129-LibTIFF-Out-of-bounds_Reads_and_Writes.txt
- http://support.apple.com/kb/HT204942
- http://support.apple.com/kb/HT204941
- http://openwall.com/lists/oss-security/2015/01/24/15
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
- http://bugzilla.maptools.org/show_bug.cgi?id=2488
- http://bugzilla.maptools.org/show_bug.cgi?id=2487
- https://www.debian.org/security/2015/dsa-3273
- https://security.gentoo.org/glsa/201701-16
- http://www.securitytracker.com/id/1032760
- http://www.securityfocus.com/bid/72352
- http://rhn.redhat.com/errata/RHSA-2016-1547.html
- http://rhn.redhat.com/errata/RHSA-2016-1546.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-8612: Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input…
Published: 2018-03-09T20:29:00 Last Modified: 2019-10-09T23:20:00
Summary
Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.5
- CVSS: 3.3
- CVSS Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2016-8612 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1387605
- https://access.redhat.com/errata/RHSA-2017:0194
- https://access.redhat.com/errata/RHSA-2017:0193
- http://www.securityfocus.com/bid/94939
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- https://security.netapp.com/advisory/ntap-20180601-0005/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9591: JasPer before version 2.0.12 is vulnerable to a use-after-free in the way it decodes certain JPEG…
Published: 2018-03-09T20:29:00 Last Modified: 2019-10-09T23:20:00
Summary
JasPer before version 2.0.12 is vulnerable to a use-after-free in the way it decodes certain JPEG 2000 image files resulting in a crash on the application using JasPer.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9591 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1406405
- https://www.debian.org/security/2017/dsa-3827
- https://security.gentoo.org/glsa/201707-07
- https://access.redhat.com/errata/RHSA-2017:1208
- http://www.securityfocus.com/bid/94952
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1071: zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd()…
Published: 2018-03-09T15:29:00 Last Modified: 2020-12-01T07:15:00
Summary
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-1071 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1553531
- http://www.securityfocus.com/bid/103359
- https://usn.ubuntu.com/3608-1/
- https://lists.debian.org/debian-lts-announce/2018/03/msg00038.html
- https://security.gentoo.org/glsa/201805-10
- https://access.redhat.com/errata/RHSA-2018:3073
- https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1054: An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search…
Published: 2018-03-07T13:29:00 Last Modified: 2018-07-17T01:29:00
Summary
An out-of-bounds memory read flaw was found in the way 389-ds-base handled certain LDAP search filters, affecting all versions including 1.4.x. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1054 vulnerability.
References
- https://pagure.io/389-ds-base/issue/49545
- https://bugzilla.redhat.com/show_bug.cgi?id=1537314
- https://access.redhat.com/errata/RHSA-2018:0414
- http://www.securityfocus.com/bid/103228
- https://access.redhat.com/errata/RHSA-2018:0515
- https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7740: The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local…
Published: 2018-03-07T08:29:00 Last Modified: 2019-03-18T19:31:00
Summary
The resv_map_release function in mm/hugetlb.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (BUG) via a crafted application that makes mmap system calls and has a large pgoff argument to the remap_file_pages system call.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-7740 vulnerability.
References
- https://bugzilla.kernel.org/show_bug.cgi?id=199037
- http://www.securityfocus.com/bid/103316
- https://www.debian.org/security/2018/dsa-4188
- https://www.debian.org/security/2018/dsa-4187
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://usn.ubuntu.com/3910-2/
- https://usn.ubuntu.com/3910-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5730: MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP…
Published: 2018-03-06T20:29:00 Last Modified: 2021-09-30T22:15:00
Summary
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a “linkdn” and “containerdn” database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.
Common Weakness Enumeration (CWE): CWE-90: Improper Neutralization of Special Elements used in an LDAP Query (‘LDAP Injection’)
CWE Description: The software constructs all or part of an LDAP query using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended LDAP query when it is sent to a downstream component.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.0
- CVSS: 5.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5730 vulnerability.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
- https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
- https://bugzilla.redhat.com/show_bug.cgi?id=1551082
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
- https://access.redhat.com/errata/RHSA-2018:3071
- http://www.securitytracker.com/id/1042071
- https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
- https://access.redhat.com/errata/RHBA-2019:0327
- https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5729: MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP…
Published: 2018-03-06T20:29:00 Last Modified: 2021-10-18T12:11:00
Summary
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5729 vulnerability.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIFUL3CPM4S5TOXTTOCQ3CUZN6XCXUTR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GK5T6JPMBHBPKS7HNGHYUUF4KKRMNSNU/
- https://github.com/krb5/krb5/commit/e1caf6fb74981da62039846931ebdffed71309d1
- https://bugzilla.redhat.com/show_bug.cgi?id=1551083
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891869
- https://access.redhat.com/errata/RHSA-2018:3071
- http://www.securitytracker.com/id/1042071
- https://lists.debian.org/debian-lts-announce/2019/01/msg00020.html
- https://access.redhat.com/errata/RHBA-2019:0327
- https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7725: An issue was discovered in ZZIPlib 0.13.68. An invalid memory address dereference was discovered…
Published: 2018-03-06T17:29:00 Last Modified: 2020-06-28T15:15:00
Summary
An issue was discovered in ZZIPlib 0.13.68. An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c. The vulnerability causes an application crash, which leads to denial of service.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-7725 vulnerability.
References
- https://github.com/gdraheim/zziplib/issues/39
- https://usn.ubuntu.com/3699-1/
- https://access.redhat.com/errata/RHSA-2018:3229
- https://lists.debian.org/debian-lts-announce/2020/06/msg00029.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7727: An issue was discovered in ZZIPlib 0.13.68. There is a memory leak triggered in the function…
Published: 2018-03-06T17:29:00 Last Modified: 2019-10-03T00:03:00
Summary
An issue was discovered in ZZIPlib 0.13.68. There is a memory leak triggered in the function zzip_mem_disk_new in memdisk.c, which will lead to a denial of service attack.
Common Weakness Enumeration (CWE): CWE-772: Missing Release of Resource after Effective Lifetime
CWE Description: The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-7727 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7726: An issue was discovered in ZZIPlib 0.13.68. There is a bus error caused by the…
Published: 2018-03-06T17:29:00 Last Modified: 2020-06-28T15:15:00
Summary
An issue was discovered in ZZIPlib 0.13.68. There is a bus error caused by the __zzip_parse_root_directory function of zip.c. Attackers could leverage this vulnerability to cause a denial of service via a crafted zip file.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-7726 vulnerability.
References
- https://github.com/gdraheim/zziplib/issues/41
- https://usn.ubuntu.com/3699-1/
- https://access.redhat.com/errata/RHSA-2018:3229
- https://lists.debian.org/debian-lts-announce/2020/06/msg00029.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1063: Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local,…
Published: 2018-03-02T15:29:00 Last Modified: 2018-04-12T01:29:00
Summary
Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.4
- CVSS: 3.3
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-1063 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7642: The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka…
Published: 2018-03-02T15:29:00 Last Modified: 2019-10-31T01:15:00
Summary
The swap_std_reloc_in function in aoutx.h in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (aout_32_swap_std_reloc_out NULL pointer dereference and application crash) via a crafted ELF file, as demonstrated by objcopy.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-7642 vulnerability.
References
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=116acb2c268c89c89186673a7c92620d21825b25
- https://sourceware.org/bugzilla/show_bug.cgi?id=22887
- https://access.redhat.com/errata/RHSA-2018:3032
- https://security.gentoo.org/glsa/201811-17
- https://access.redhat.com/errata/RHBA-2019:0327
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7643: The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to…
Published: 2018-03-02T15:29:00 Last Modified: 2019-10-31T01:15:00
Summary
The display_debug_ranges function in dwarf.c in GNU Binutils 2.30 allows remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact via a crafted ELF file, as demonstrated by objdump.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-7643 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22905
- http://www.securityfocus.com/bid/103264
- https://access.redhat.com/errata/RHSA-2018:3032
- https://security.gentoo.org/glsa/201811-17
- https://access.redhat.com/errata/RHBA-2019:0327
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15134: A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x…
Published: 2018-03-01T22:29:00 Last Modified: 2019-05-15T21:29:00
Summary
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15134 vulnerability.
References
- https://pagure.io/389-ds-base/c/6aa2acdc3cad9
- https://bugzilla.redhat.com/show_bug.cgi?id=1531573
- https://access.redhat.com/errata/RHSA-2018:0163
- http://www.securityfocus.com/bid/102790
- https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00033.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7550: The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local…
Published: 2018-03-01T17:29:00 Last Modified: 2020-10-15T13:28:00
Summary
The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-7550 vulnerability.
References
- https://lists.gnu.org/archive/html/qemu-devel/2018-02/msg06890.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1549798
- http://www.securityfocus.com/bid/103181
- https://lists.debian.org/debian-lts-announce/2018/04/msg00016.html
- https://lists.debian.org/debian-lts-announce/2018/04/msg00015.html
- https://access.redhat.com/errata/RHSA-2018:1369
- https://usn.ubuntu.com/3649-1/
- https://www.debian.org/security/2018/dsa-4213
- https://access.redhat.com/errata/RHSA-2018:2462
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7568: The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as…
Published: 2018-02-28T21:29:00 Last Modified: 2019-10-31T01:15:00
Summary
The parse_die function in dwarf1.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer overflow and application crash) via an ELF file with corrupt dwarf1 debug information, as demonstrated by nm.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-7568 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22894
- https://access.redhat.com/errata/RHSA-2018:3032
- https://security.gentoo.org/glsa/201811-17
- https://access.redhat.com/errata/RHBA-2019:0327
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7569: dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils…
Published: 2018-02-28T21:29:00 Last Modified: 2019-10-31T01:15:00
Summary
dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (integer underflow or overflow, and application crash) via an ELF file with a corrupt DWARF FORM block, as demonstrated by nm.
Common Weakness Enumeration (CWE): CWE-191: Integer Underflow (Wrap or Wraparound)
CWE Description: The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-7569 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22895
- https://access.redhat.com/errata/RHSA-2018:3032
- https://security.gentoo.org/glsa/201811-17
- https://access.redhat.com/errata/RHBA-2019:0327
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7549: In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as…
Published: 2018-02-27T22:29:00 Last Modified: 2019-03-04T17:21:00
Summary
In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-7549 vulnerability.
References
- https://sourceforge.net/p/zsh/code/ci/c2cc8b0fbefc9868fa83537f5b6d90fc1ec438dd
- https://usn.ubuntu.com/3593-1/
- https://security.gentoo.org/glsa/201805-10
- https://access.redhat.com/errata/RHSA-2018:3073
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6764: util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which…
Published: 2018-02-23T17:29:00 Last Modified: 2019-10-03T00:03:00
Summary
util/virlog.c in libvirt does not properly determine the hostname on LXC container startup, which allows local guest OS users to bypass an intended container protection mechanism and execute arbitrary commands via a crafted NSS module.
Common Weakness Enumeration (CWE): CWE-346: Origin Validation Error
CWE Description: The software does not properly verify that the source of data or communication is valid.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-6764 vulnerability.
References
- https://www.redhat.com/archives/libvir-list/2018-February/msg00239.html
- http://www.ubuntu.com/usn/USN-3576-1
- https://www.debian.org/security/2018/dsa-4137
- https://access.redhat.com/errata/RHSA-2018:3113
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7225: An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in…
Published: 2018-02-19T15:29:00 Last Modified: 2020-10-23T13:15:00
Summary
An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-7225 vulnerability.
References
- https://github.com/LibVNC/libvncserver/issues/218
- http://www.openwall.com/lists/oss-security/2018/02/18/1
- http://www.securityfocus.com/bid/103107
- https://lists.debian.org/debian-lts-announce/2018/03/msg00035.html
- https://usn.ubuntu.com/3618-1/
- https://access.redhat.com/errata/RHSA-2018:1055
- https://www.debian.org/security/2018/dsa-4221
- https://security.gentoo.org/glsa/201908-05
- https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00032.html
- https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html
- https://usn.ubuntu.com/4547-1/
- https://usn.ubuntu.com/4573-1/
- https://usn.ubuntu.com/4587-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5379: The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing…
Published: 2018-02-19T13:29:00 Last Modified: 2019-10-09T23:41:00
Summary
The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an attacker to execute arbitrary code.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5379 vulnerability.
References
- https://gogs.quagga.net/Quagga/quagga/src/master/doc/security/Quagga-2018-1114.txt
- http://www.kb.cert.org/vuls/id/940439
- http://savannah.nongnu.org/forum/forum.php?forum_id=9095
- https://www.debian.org/security/2018/dsa-4115
- https://lists.debian.org/debian-lts-announce/2018/02/msg00021.html
- http://www.securityfocus.com/bid/103105
- https://access.redhat.com/errata/RHSA-2018:0377
- https://usn.ubuntu.com/3573-1/
- https://security.gentoo.org/glsa/201804-17
- https://cert-portal.siemens.com/productcert/pdf/ssa-451142.pdf
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-7208: In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka…
Published: 2018-02-18T04:29:00 Last Modified: 2019-10-31T01:15:00
Summary
In the coff_pointerize_aux function in coffgen.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, an index is not validated, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted file, as demonstrated by objcopy of a COFF object.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-7208 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22741
- http://www.securityfocus.com/bid/103077
- https://access.redhat.com/errata/RHSA-2018:3032
- https://security.gentoo.org/glsa/201811-17
- https://access.redhat.com/errata/RHBA-2019:0327
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1049: In systemd prior to 234 a race condition exists between .mount and .automount units such that…
Published: 2018-02-16T21:29:00 Last Modified: 2022-01-31T18:26:00
Summary
In systemd prior to 234 a race condition exists between .mount and .automount units such that automount requests from kernel may not be serviced by systemd resulting in kernel holding the mountpoint and any processes that try to use said mount will hang. A race condition like this may lead to denial of service, until mount points are unmounted.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1049 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1534701
- https://access.redhat.com/errata/RHSA-2018:0260
- https://usn.ubuntu.com/3558-1/
- http://www.securitytracker.com/id/1041520
- https://lists.debian.org/debian-lts-announce/2018/11/msg00017.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6927: The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow…
Published: 2018-02-12T19:29:00 Last Modified: 2019-03-06T21:38:00
Summary
The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-6927 vulnerability.
References
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15
- https://github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a
- http://www.securityfocus.com/bid/103023
- https://usn.ubuntu.com/3619-1/
- https://usn.ubuntu.com/3619-2/
- https://access.redhat.com/errata/RHSA-2018:0654
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:0676
- https://www.debian.org/security/2018/dsa-4187
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://usn.ubuntu.com/3698-2/
- https://usn.ubuntu.com/3697-2/
- https://usn.ubuntu.com/3697-1/
- https://usn.ubuntu.com/3698-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000026: Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient…
Published: 2018-02-09T23:29:00 Last Modified: 2020-10-15T13:28:00
Summary
Linux Linux kernel version at least v4.8 onwards, probably well before contains a Insufficient input validation vulnerability in bnx2x network card driver that can result in DoS: Network card firmware assertion takes card off-line. This attack appear to be exploitable via An attacker on a must pass a very large, specially crafted packet to the bnx2x card. This can be done from an untrusted guest VM..
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.0
- CVSS: 6.8
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000026 vulnerability.
References
- https://patchwork.ozlabs.org/patch/859410/
- http://lists.openwall.net/netdev/2018/01/18/96
- http://lists.openwall.net/netdev/2018/01/16/40
- https://usn.ubuntu.com/3617-2/
- https://usn.ubuntu.com/3617-1/
- https://usn.ubuntu.com/3620-2/
- https://usn.ubuntu.com/3620-1/
- https://usn.ubuntu.com/3619-1/
- https://usn.ubuntu.com/3617-3/
- https://usn.ubuntu.com/3619-2/
- https://usn.ubuntu.com/3632-1/
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
- https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8171: The memory resource controller (aka memcg) in the Linux kernel allows local users to cause a…
Published: 2018-02-09T22:29:00 Last Modified: 2021-07-15T19:16:00
Summary
The memory resource controller (aka memcg) in the Linux kernel allows local users to cause a denial of service (deadlock) by spawning new processes within a memory-constrained cgroup.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-8171 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1198109
- http://www.securityfocus.com/bid/74293
- http://rhn.redhat.com/errata/RHSA-2016-0068.html
- http://rhn.redhat.com/errata/RHSA-2015-2411.html
- http://rhn.redhat.com/errata/RHSA-2015-2152.html
- http://rhn.redhat.com/errata/RHSA-2015-0864.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6871: LibreOffice before 5.4.5 and 6.x before 6.0.1 allows remote attackers to read arbitrary files via…
Published: 2018-02-09T06:29:00 Last Modified: 2019-10-03T00:03:00
Summary
LibreOffice before 5.4.5 and 6.x before 6.0.1 allows remote attackers to read arbitrary files via =WEBSERVICE calls in a document, which use the COM.MICROSOFT.WEBSERVICE function.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2018-6871 vulnerability.
References
- https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure
- https://www.debian.org/security/2018/dsa-4111
- https://www.exploit-db.com/exploits/44022/
- https://www.libreoffice.org/about-us/security/advisories/cve-2018-1055/
- https://cgit.freedesktop.org/libreoffice/core/commit/?h=libreoffice-5-4-5&id=a916fc0c0e0e8b10cb4158fa0fa173fe205d434a
- https://access.redhat.com/errata/RHSA-2018:0418
- https://access.redhat.com/errata/RHSA-2018:0517
- https://usn.ubuntu.com/3579-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6574: Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow “go get”…
Published: 2018-02-07T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10rc2 allow “go get” remote command execution during source code build, by leveraging the gcc or clang plugin feature, because -fplugin= and -plugin= arguments were not blocked.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-6574 vulnerability.
References
- https://github.com/golang/go/issues/23672
- https://github.com/KINGSABRI/CVE-in-Ruby/tree/master/CVE-2018-6574
- https://access.redhat.com/errata/RHSA-2018:0878
- https://access.redhat.com/errata/RHSA-2018:1304
- https://groups.google.com/forum/#!topic/golang-nuts/sprOaQ5m3Dk
- https://groups.google.com/forum/#!topic/golang-nuts/Gbhh1NxAjMU
- https://www.debian.org/security/2019/dsa-4380
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-4878: A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This…
Published: 2018-02-06T21:29:00 Last Modified: 2021-09-08T17:21:00
Summary
A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 3)
Code designed for conducting penetration testing on CVE-2018-4878 vulnerability.
- Adobe Flash < 28.0.0.161 - Use-After-Free by SyFi at 2018-04-06
- Flash ActiveX 28.0.0.137 - Code Execution (1) by smgorelik at 2016-02-16
- Flash ActiveX 28.0.0.137 - Code Execution (2) by smgorelik at 2016-02-13
References
- https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/north-korean-hackers-allegedly-exploit-adobe-flash-player-vulnerability-cve-2018-4878-against-south-korean-targets
- https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html
- https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/
- https://helpx.adobe.com/security/products/flash-player/apsb18-03.html
- http://www.securitytracker.com/id/1040318
- http://www.securityfocus.com/bid/102893
- http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html
- https://access.redhat.com/errata/RHSA-2018:0285
- https://github.com/vysec/CVE-2018-4878
- https://github.com/InQuest/malware-samples/tree/master/CVE-2018-4878-Adobe-Flash-DRM-UAF-0day
- https://www.darkreading.com/threat-intelligence/adobe-flash-vulnerability-reappears-in-malicious-word-files/d/d-id/1331139
- https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign
- https://securingtomorrow.mcafee.com/mcafee-labs/hackers-bypassed-adobe-flash-protection-mechanism/
- https://www.exploit-db.com/exploits/44412/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-4877: A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This…
Published: 2018-02-06T21:29:00 Last Modified: 2021-09-08T17:21:00
Summary
A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player’s quality of service functionality. A successful attack can lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-4877 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-03.html
- http://www.securityfocus.com/bid/102930
- https://access.redhat.com/errata/RHSA-2018:0285
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6560: In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3,…
Published: 2018-02-02T14:29:00 Last Modified: 2019-10-03T00:03:00
Summary
In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.
Common Weakness Enumeration (CWE): CWE-436: Interpretation Conflict
CWE Description: Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B’s state.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-6560 vulnerability.
References
- https://github.com/flatpak/flatpak/releases/tag/0.8.9
- https://github.com/flatpak/flatpak/releases/tag/0.10.3
- https://github.com/flatpak/flatpak/commit/52346bf187b5a7f1c0fe9075b328b7ad6abe78f6
- https://access.redhat.com/errata/RHSA-2018:2766
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-6485: An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU…
Published: 2018-02-01T14:29:00 Last Modified: 2020-08-24T17:37:00
Summary
An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-6485 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=22343
- http://bugs.debian.org/878159
- http://www.securityfocus.com/bid/102912
- https://access.redhat.com/errata/RHSA-2018:3092
- https://security.netapp.com/advisory/ntap-20190404-0003/
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://access.redhat.com/errata/RHBA-2019:0327
- https://usn.ubuntu.com/4218-1/
- https://usn.ubuntu.com/4416-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000001: In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be…
Published: 2018-01-31T14:29:00 Last Modified: 2019-10-03T00:03:00
Summary
In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2018-1000001 vulnerability.
- glibc - 'realpath()' Privilege Escalation (Metasploit) by Metasploit at 2018-06-13
- glibc < 2.26 - 'getcwd()' Local Privilege Escalation by halfdog at 2018-01-16
References
- https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
- http://seclists.org/oss-sec/2018/q1/38
- https://www.exploit-db.com/exploits/43775/
- http://www.securitytracker.com/id/1040162
- http://www.securityfocus.com/bid/102525
- https://usn.ubuntu.com/3536-1/
- https://usn.ubuntu.com/3534-1/
- https://access.redhat.com/errata/RHSA-2018:0805
- https://www.exploit-db.com/exploits/44889/
- https://security.netapp.com/advisory/ntap-20190404-0003/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5750: The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows…
Published: 2018-01-26T19:29:00 Last Modified: 2019-03-07T20:46:00
Summary
The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-5750 vulnerability.
References
- https://patchwork.kernel.org/patch/10174835/
- http://www.securitytracker.com/id/1040319
- https://www.debian.org/security/2018/dsa-4120
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:0676
- https://usn.ubuntu.com/3631-2/
- https://usn.ubuntu.com/3631-1/
- https://www.debian.org/security/2018/dsa-4187
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://usn.ubuntu.com/3698-2/
- https://usn.ubuntu.com/3697-2/
- https://usn.ubuntu.com/3697-1/
- https://usn.ubuntu.com/3698-1/
- https://access.redhat.com/errata/RHSA-2018:2948
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5748: qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption)…
Published: 2018-01-25T16:29:00 Last Modified: 2020-10-15T13:28:00
Summary
qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5748 vulnerability.
References
- https://www.redhat.com/archives/libvir-list/2018-January/msg00527.html
- http://www.securityfocus.com/bid/102825
- https://www.debian.org/security/2018/dsa-4137
- https://lists.debian.org/debian-lts-announce/2018/03/msg00018.html
- https://access.redhat.com/errata/RHSA-2018:1396
- https://access.redhat.com/errata/RHSA-2018:1929
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-1000007: libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When…
Published: 2018-01-24T22:29:00 Last Modified: 2020-08-24T17:37:00
Summary
libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the Location:
response header value. Sending the same set of headers to subsequent hosts is in particular a problem for applications that pass on custom Authorization:
headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client’s request.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-1000007 vulnerability.
References
- https://curl.haxx.se/docs/adv_2018-b3bf.html
- http://www.securitytracker.com/id/1040274
- https://www.debian.org/security/2018/dsa-4098
- https://lists.debian.org/debian-lts-announce/2018/01/msg00038.html
- https://usn.ubuntu.com/3554-2/
- https://usn.ubuntu.com/3554-1/
- https://access.redhat.com/errata/RHSA-2018:3157
- https://access.redhat.com/errata/RHSA-2018:3558
- https://access.redhat.com/errata/RHBA-2019:0327
- https://access.redhat.com/errata/RHSA-2019:1543
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://access.redhat.com/errata/RHSA-2020:0544
- https://access.redhat.com/errata/RHSA-2020:0594
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5683: The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of…
Published: 2018-01-23T18:29:00 Last Modified: 2020-10-15T13:28:00
Summary
The vga_draw_text function in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging improper memory address validation.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-5683 vulnerability.
References
- https://lists.gnu.org/archive/html/qemu-devel/2018-01/msg02597.html
- http://www.securityfocus.com/bid/102518
- http://www.openwall.com/lists/oss-security/2018/01/15/2
- https://usn.ubuntu.com/3575-1/
- https://access.redhat.com/errata/RHSA-2018:1104
- https://access.redhat.com/errata/RHSA-2018:0816
- https://www.debian.org/security/2018/dsa-4213
- https://access.redhat.com/errata/RHSA-2018:2162
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5950: Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote…
Published: 2018-01-23T16:29:00 Last Modified: 2020-11-10T19:39:00
Summary
Cross-site scripting (XSS) vulnerability in the web UI in Mailman before 2.1.26 allows remote attackers to inject arbitrary web script or HTML via a user-options URL.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5950 vulnerability.
References
- https://www.mail-archive.com/mailman-users@python.org/msg70375.html
- https://bugs.launchpad.net/mailman/+bug/1747209
- https://lists.debian.org/debian-lts-announce/2018/02/msg00007.html
- https://www.debian.org/security/2018/dsa-4108
- https://access.redhat.com/errata/RHSA-2018:0505
- https://access.redhat.com/errata/RHSA-2018:0504
- https://usn.ubuntu.com/3563-1/
- http://www.securityfocus.com/bid/104594
- http://packetstormsecurity.com/files/159761/Mailman-2.1.23-Cross-Site-Scripting.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-12197: It was found that libpam4j up to and including 1.8 did not properly validate user accounts when…
Published: 2018-01-18T21:29:00 Last Modified: 2019-10-09T23:22:00
Summary
It was found that libpam4j up to and including 1.8 did not properly validate user accounts when authenticating. A user with a valid password for a disabled account would be able to bypass security restrictions and possibly access sensitive information.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-12197 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1503103
- https://www.debian.org/security/2017/dsa-4025
- https://access.redhat.com/errata/RHSA-2017:2906
- https://access.redhat.com/errata/RHSA-2017:2905
- https://access.redhat.com/errata/RHSA-2017:2904
- https://lists.debian.org/debian-lts-announce/2017/11/msg00008.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-6814: When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2.4.3, Apache…
Published: 2018-01-18T18:29:00 Last Modified: 2020-07-15T03:15:00
Summary
When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2.4.3, Apache Groovy 2.4.4 to 2.4.7 on classpath uses standard Java serialization mechanisms, e.g. to communicate between servers or to store local data, it was possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects were subject to this vulnerability.
Common Weakness Enumeration (CWE): CWE-502: Deserialization of Untrusted Data
CWE Description: The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-6814 vulnerability.
References
- http://mail-archives.apache.org/mod_mbox/www-announce/201701.mbox/%3CCADRx3PMZ2hBCGDTY35zYXFGaDnjAs0tc5-upaVs6QN2sYUejyA%40mail.gmail.com%3E
- https://access.redhat.com/errata/RHSA-2017:2596
- https://access.redhat.com/errata/RHSA-2017:2486
- https://access.redhat.com/errata/RHSA-2017:0868
- http://www.securitytracker.com/id/1039600
- http://www.securityfocus.com/bid/95429
- http://rhn.redhat.com/errata/RHSA-2017-0272.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://security.gentoo.org/glsa/202003-01
- https://www.oracle.com/security-alerts/cpujul2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2579: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2579 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102663
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2618: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2618 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102612
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2582: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent:…
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:29:00
Summary
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2582 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102597
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3613-1/
- https://access.redhat.com/errata/RHSA-2018:1463
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2629: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2629 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102615
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0349
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2637: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2637 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102576
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2588: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: LDAP). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2588 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102661
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2599: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2599 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102633
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2602: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n)….
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).
Scores
- Impact Score: 6.4
- Exploitability Score: 1.9
- CVSS: 3.7
- CVSS Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-2602 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102642
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2633: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2633 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- http://www.securityfocus.com/bid/102557
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2641: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT)….
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2641 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102605
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2677: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT)….
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2677 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102656
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2678: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2678 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102659
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2634: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS)….
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2634 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102592
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2603: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2603 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102625
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2657: Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization)….
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u171 and 7u161; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2657 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102629
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-2663: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2018-01-18T02:29:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-2663 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://security.netapp.com/advisory/ntap-20180117-0001/
- https://access.redhat.com/errata/RHSA-2018:0095
- http://www.securitytracker.com/id/1040203
- http://www.securityfocus.com/bid/102662
- https://access.redhat.com/errata/RHSA-2018:0100
- https://access.redhat.com/errata/RHSA-2018:0099
- https://access.redhat.com/errata/RHSA-2018:0115
- https://access.redhat.com/errata/RHSA-2018:0352
- https://access.redhat.com/errata/RHSA-2018:0351
- https://access.redhat.com/errata/RHSA-2018:0349
- https://access.redhat.com/errata/RHSA-2018:0458
- https://access.redhat.com/errata/RHSA-2018:0521
- https://www.debian.org/security/2018/dsa-4144
- https://usn.ubuntu.com/3614-1/
- https://usn.ubuntu.com/3613-1/
- https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
- https://www.debian.org/security/2018/dsa-4166
- https://access.redhat.com/errata/RHSA-2018:1463
- https://access.redhat.com/errata/RHSA-2018:1812
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15128: A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel…
Published: 2018-01-14T06:29:00 Last Modified: 2021-07-15T19:16:00
Summary
A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13.12. A lack of size check could cause a denial of service (BUG).
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-15128 vulnerability.
References
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.12
- https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df
- https://bugzilla.redhat.com/show_bug.cgi?id=1525222
- https://access.redhat.com/security/cve/CVE-2017-15128
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e3921471354244f70fe268586ff94a97a6dd4df
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15127: A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel…
Published: 2018-01-14T06:29:00 Last Modified: 2021-07-15T19:16:00
Summary
A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13. A superfluous implicit page unlock for VM_SHARED hugetlbfs mapping could trigger a local denial of service (BUG).
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-15127 vulnerability.
References
- https://github.com/torvalds/linux/commit/5af10dfd0afc559bb4b0f7e3e8227a1578333995
- https://bugzilla.redhat.com/show_bug.cgi?id=1525218
- https://access.redhat.com/security/cve/CVE-2017-15127
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5af10dfd0afc559bb4b0f7e3e8227a1578333995
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:0676
- http://www.securityfocus.com/bid/102517
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5344: In the Linux kernel through 4.14.13, drivers/block/loop.c mishandles lo_release serialization,…
Published: 2018-01-12T09:29:00 Last Modified: 2020-08-24T17:37:00
Summary
In the Linux kernel through 4.14.13, drivers/block/loop.c mishandles lo_release serialization, which allows attackers to cause a denial of service (__lock_acquire use-after-free) or possibly have unspecified other impact.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2018-5344 vulnerability.
References
- https://github.com/torvalds/linux/commit/ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5
- http://www.securityfocus.com/bid/102503
- https://usn.ubuntu.com/3583-2/
- https://usn.ubuntu.com/3583-1/
- https://usn.ubuntu.com/3617-2/
- https://usn.ubuntu.com/3617-1/
- https://usn.ubuntu.com/3619-1/
- https://usn.ubuntu.com/3617-3/
- https://usn.ubuntu.com/3619-2/
- https://usn.ubuntu.com/3632-1/
- https://access.redhat.com/errata/RHSA-2018:3096
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:2948
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-5345: A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious…
Published: 2018-01-12T00:29:00 Last Modified: 2020-08-24T17:37:00
Summary
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-5345 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1527296
- https://www.debian.org/security/2018/dsa-4095
- https://access.redhat.com/errata/RHSA-2018:0350
- https://usn.ubuntu.com/3546-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-12189: It was discovered that the jboss init script as used in Red Hat JBoss Enterprise Application…
Published: 2018-01-10T19:29:00 Last Modified: 2019-10-09T23:22:00
Summary
It was discovered that the jboss init script as used in Red Hat JBoss Enterprise Application Platform 7.0.7.GA performed unsafe file handling which could result in local privilege escalation. This issue is a result of an incomplete fix for CVE-2016-8656.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-12189 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12189
- https://access.redhat.com/errata/RHSA-2018:0005
- https://access.redhat.com/errata/RHSA-2018:0004
- https://access.redhat.com/errata/RHSA-2018:0003
- https://access.redhat.com/errata/RHSA-2018:0002
- http://www.securityfocus.com/bid/102407
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15131: It was found that system umask policy is not being honored when creating XDG user directories,…
Published: 2018-01-09T21:29:00 Last Modified: 2021-02-25T17:15:00
Summary
It was found that system umask policy is not being honored when creating XDG user directories, since Xsession sources xdg-user-dirs.sh before setting umask policy. This only affects xdg-user-dirs before 0.15.5 as shipped with Red Hat Enterprise Linux.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-15131 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1412762
- https://access.redhat.com/errata/RHSA-2018:0842
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2018-4871: An Out-of-bounds Read issue was discovered in Adobe Flash Player before 28.0.0.137. This…
Published: 2018-01-09T21:29:00 Last Modified: 2021-09-08T17:21:00
Summary
An Out-of-bounds Read issue was discovered in Adobe Flash Player before 28.0.0.137. This vulnerability occurs because of computation that reads data that is past the end of the target buffer. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2018-4871 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb18-01.html
- https://access.redhat.com/errata/RHSA-2018:0081
- http://www.securitytracker.com/id/1040155
- http://www.securityfocus.com/bid/102465
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1859: (1) core/tests/test_memmap.py, (2) core/tests/test_multiarray.py, (3) f2py/f2py2e.py, and (4)…
Published: 2018-01-08T19:29:00 Last Modified: 2019-04-22T17:48:00
Summary
(1) core/tests/test_memmap.py, (2) core/tests/test_multiarray.py, (3) f2py/f2py2e.py, and (4) lib/tests/test_io.py in NumPy before 1.8.1 allow local users to write to arbitrary files via a symlink attack on a temporary file.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-1859 vulnerability.
References
- https://github.com/numpy/numpy/pull/4262
- https://github.com/numpy/numpy/commit/0bb46c1448b0d3f5453d5182a17ea7ac5854ee15
- https://github.com/numpy/numpy/blob/maintenance/1.8.x/doc/release/1.8.1-notes.rst
- https://exchange.xforce.ibmcloud.com/vulnerabilities/91317
- https://bugzilla.redhat.com/show_bug.cgi?id=1062009
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737778
- http://www.securityfocus.com/bid/65440
- http://www.openwall.com/lists/oss-security/2014/02/08/3
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128781.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128358.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8119: The find_ifcfg_path function in netcf before 0.2.7 might allow attackers to cause a denial of…
Published: 2017-12-29T22:29:00 Last Modified: 2019-04-22T17:48:00
Summary
The find_ifcfg_path function in netcf before 0.2.7 might allow attackers to cause a denial of service (application crash) via vectors involving augeas path expressions.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8119 vulnerability.
References
- https://pagure.io/netcf/blob/050b05c880a6b343baf86780d94764b1aafece37/f/NEWS
- https://bugzilla.redhat.com/show_bug.cgi?id=1172176
- http://www.securityfocus.com/bid/78046
- http://rhn.redhat.com/errata/RHSA-2015-2248.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157713.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157508.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156571.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3695: The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users…
Published: 2017-12-29T15:29:00 Last Modified: 2018-01-10T16:44:00
Summary
The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.
Common Weakness Enumeration (CWE): CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)
CWE Description: The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-3695 vulnerability.
References
- https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
- https://bugzilla.redhat.com/show_bug.cgi?id=1322755
- http://www.securityfocus.com/bid/102327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15104: An access flaw was found in Heketi 5, where the heketi.json configuration file was world…
Published: 2017-12-18T19:29:00 Last Modified: 2020-03-12T17:32:00
Summary
An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-15104 vulnerability.
References
- https://github.com/heketi/heketi/releases/tag/v5.0.1
- https://bugzilla.redhat.com/show_bug.cgi?id=1510149
- https://access.redhat.com/security/cve/CVE-2017-15104
- https://access.redhat.com/errata/RHSA-2017:3481
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15103: A security-check flaw was found in the way the Heketi 5 server API handled user requests. An…
Published: 2017-12-18T19:29:00 Last Modified: 2019-10-09T23:24:00
Summary
A security-check flaw was found in the way the Heketi 5 server API handled user requests. An authenticated Heketi user could send specially crafted requests to the Heketi server, resulting in remote command execution as the user running Heketi server and possibly privilege escalation.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.0
- CVSS: 9.0
- CVSS Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15103 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1510147
- https://access.redhat.com/security/cve/CVE-2017-15103
- https://access.redhat.com/errata/RHSA-2017:3481
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-16997: elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and…
Published: 2017-12-18T01:29:00 Last Modified: 2020-10-15T13:28:00
Summary
elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the “./” directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
Common Weakness Enumeration (CWE): CWE-426: Untrusted Search Path
CWE Description: The application searches for critical resources using an externally-supplied search path that can point to resources that are not under the application’s direct control.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-16997 vulnerability.
References
- https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=22625
- https://bugs.debian.org/884615
- http://www.securityfocus.com/bid/102228
- https://access.redhat.com/errata/RHSA-2018:3092
- https://access.redhat.com/errata/RHBA-2019:0327
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-17405: Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile,…
Published: 2017-12-15T09:29:00 Last Modified: 2019-09-19T10:15:00
Summary
Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the “|” pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
Common Weakness Enumeration (CWE): CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
CWE Description: The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-17405 vulnerability.
References
- https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-4-3-released/
- https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/
- http://www.securityfocus.com/bid/102204
- https://www.exploit-db.com/exploits/43381/
- https://lists.debian.org/debian-lts-announce/2017/12/msg00025.html
- https://lists.debian.org/debian-lts-announce/2017/12/msg00024.html
- https://access.redhat.com/errata/RHSA-2018:0378
- https://access.redhat.com/errata/RHSA-2018:0585
- https://access.redhat.com/errata/RHSA-2018:0584
- https://access.redhat.com/errata/RHSA-2018:0583
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
- https://www.debian.org/security/2018/dsa-4259
- http://www.securitytracker.com/id/1042004
- https://access.redhat.com/errata/RHSA-2019:2806
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-1000407: The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic…
Published: 2017-12-11T21:29:00 Last Modified: 2019-05-14T22:29:00
Summary
The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.
Common Weakness Enumeration (CWE): CWE-754: Improper Check for Unusual or Exceptional Conditions
CWE Description: The software does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the software.
Scores
- Impact Score: 6.9
- Exploitability Score: 6.5
- CVSS: 6.1
- CVSS Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2017-1000407 vulnerability.
References
- https://www.spinics.net/lists/kvm/msg159809.html
- https://access.redhat.com/security/cve/cve-2017-1000407
- http://www.openwall.com/lists/oss-security/2017/12/04/2
- http://www.securityfocus.com/bid/102038
- https://www.debian.org/security/2017/dsa-4073
- https://www.debian.org/security/2018/dsa-4082
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3583-2/
- https://usn.ubuntu.com/3583-1/
- https://usn.ubuntu.com/3617-2/
- https://usn.ubuntu.com/3617-1/
- https://usn.ubuntu.com/3619-1/
- https://usn.ubuntu.com/3619-2/
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:0676
- https://usn.ubuntu.com/3632-1/
- https://access.redhat.com/errata/RHSA-2019:1170
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-11213: An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability…
Published: 2017-12-09T06:29:00 Last Modified: 2021-09-08T17:21:00
Summary
An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer due to an integer overflow; the computation is part of the abstraction that creates an arbitrarily sized transparent or opaque bitmap image. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-11213 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-33.html
- https://security.gentoo.org/glsa/201711-13
- https://access.redhat.com/errata/RHSA-2017:3222
- http://www.securitytracker.com/id/1039778
- http://www.securityfocus.com/bid/101837
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-11215: An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability…
Published: 2017-12-09T06:29:00 Last Modified: 2021-09-08T17:21:00
Summary
An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the Primetime SDK. The mismatch between an old and a new object can provide an attacker with unintended memory access – potentially leading to code corruption, control-flow hijack, or an information leak attack. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-11215 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-33.html
- https://security.gentoo.org/glsa/201711-13
- https://access.redhat.com/errata/RHSA-2017:3222
- http://www.securitytracker.com/id/1039778
- http://www.securityfocus.com/bid/101837
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-11225: An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability…
Published: 2017-12-09T06:29:00 Last Modified: 2021-09-08T17:21:00
Summary
An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the Primetime SDK metadata functionality. The mismatch between an old and a new object can provide an attacker with unintended memory access – potentially leading to code corruption, control-flow hijack, or an information leak attack. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-11225 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-33.html
- https://security.gentoo.org/glsa/201711-13
- https://access.redhat.com/errata/RHSA-2017:3222
- http://www.securitytracker.com/id/1039778
- http://www.securityfocus.com/bid/101837
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3112: An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability…
Published: 2017-12-09T06:29:00 Last Modified: 2021-09-08T17:21:00
Summary
An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of AdobePSDK metadata. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3112 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-33.html
- https://security.gentoo.org/glsa/201711-13
- https://access.redhat.com/errata/RHSA-2017:3222
- http://www.securitytracker.com/id/1039778
- http://www.securityfocus.com/bid/101837
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3114: An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability…
Published: 2017-12-09T06:29:00 Last Modified: 2021-09-08T17:21:00
Summary
An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of providing language- and region- or country- specific functionality. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3114 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-33.html
- https://security.gentoo.org/glsa/201711-13
- https://access.redhat.com/errata/RHSA-2017:3222
- http://www.securitytracker.com/id/1039778
- http://www.securityfocus.com/bid/101837
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-1000410: The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing…
Published: 2017-12-07T19:29:00 Last Modified: 2019-04-08T20:29:00
Summary
The Linux kernel version 3.3-rc1 and later is affected by a vulnerability lies in the processing of incoming L2CAP commands - ConfigRequest, and ConfigResponse messages. This info leak is a result of uninitialized stack variables that may be returned to an attacker in their uninitialized state. By manipulating the code flows that precede the handling of these configuration messages, an attacker can also gain some control over which data will be held in the uninitialized stack variables. This can allow him to bypass KASLR, and stack canaries protection - as both pointers and stack canaries may be leaked in this manner. Combining this vulnerability (for example) with the previously disclosed RCE vulnerability in L2CAP configuration parsing (CVE-2017-1000251) may allow an attacker to exploit the RCE against kernels which were built with the above mitigations. These are the specifics of this vulnerability: In the function l2cap_parse_conf_rsp and in the function l2cap_parse_conf_req the following variable is declared without initialization: struct l2cap_conf_efs efs; In addition, when parsing input configuration parameters in both of these functions, the switch case for handling EFS elements may skip the memcpy call that will write to the efs variable: … case L2CAP_CONF_EFS: if (olen == sizeof(efs)) memcpy(&efs, (void *)val, olen); … The olen in the above if is attacker controlled, and regardless of that if, in both of these functions the efs variable would eventually be added to the outgoing configuration request that is being built: l2cap_add_conf_opt(&ptr, L2CAP_CONF_EFS, sizeof(efs), (unsigned long) &efs); So by sending a configuration request, or response, that contains an L2CAP_CONF_EFS element, but with an element length that is not sizeof(efs) - the memcpy to the uninitialized efs variable can be avoided, and the uninitialized variable would be returned to the attacker (16 bytes).
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-1000410 vulnerability.
References
- http://seclists.org/oss-sec/2017/q4/357
- http://www.securityfocus.com/bid/102101
- https://www.debian.org/security/2017/dsa-4073
- https://www.debian.org/security/2018/dsa-4082
- https://access.redhat.com/errata/RHSA-2018:0654
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1170
- https://access.redhat.com/errata/RHSA-2018:1130
- https://access.redhat.com/errata/RHSA-2018:1319
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://usn.ubuntu.com/3933-2/
- https://usn.ubuntu.com/3933-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15121: A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an…
Published: 2017-12-07T02:29:00 Last Modified: 2020-10-15T13:28:00
Summary
A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-15121 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1520893
- http://www.securityfocus.com/bid/102128
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1854
- https://support.f5.com/csp/article/K42142782?utm_source=f5support&utm_medium=RSS
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-11281: Adobe Flash Player has an exploitable memory corruption vulnerability in the text handling…
Published: 2017-12-01T08:29:00 Last Modified: 2021-09-08T17:21:00
Summary
Adobe Flash Player has an exploitable memory corruption vulnerability in the text handling function. Successful exploitation could lead to arbitrary code execution. This affects 26.0.0.151 and earlier.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2017-11281 vulnerability.
- Adobe Flash - Out-of-Bounds Memory Read in MP4 Parsing by Google Security Research at 2017-09-25
- Adobe Flash - Out-of-Bounds Write in MP4 Edge Processing by Google Security Research at 2017-09-25
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-28.html
- https://www.exploit-db.com/exploits/42782/
- https://www.exploit-db.com/exploits/42781/
- https://security.gentoo.org/glsa/201709-16
- http://www.securitytracker.com/id/1039314
- http://www.securityfocus.com/bid/100710
- https://www.youtube.com/watch?v=CvmnUeza9zw
- https://access.redhat.com/errata/RHSA-2017:2702
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-11282: Adobe Flash Player has an exploitable memory corruption vulnerability in the MP4 atom parser….
Published: 2017-12-01T08:29:00 Last Modified: 2021-09-08T17:21:00
Summary
Adobe Flash Player has an exploitable memory corruption vulnerability in the MP4 atom parser. Successful exploitation could lead to arbitrary code execution. This affects 26.0.0.151 and earlier.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-11282 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-28.html
- https://www.exploit-db.com/exploits/42783/
- https://security.gentoo.org/glsa/201709-16
- http://www.securitytracker.com/id/1039314
- http://www.securityfocus.com/bid/100716
- https://www.youtube.com/watch?v=6iZnIQbRf5M
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1323
- http://packetstormsecurity.com/files/144332/Adobe-Flash-appleToRange-Out-Of-Bounds-Read.html
- https://access.redhat.com/errata/RHSA-2017:2702
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15116: The rngapi_reset function in crypto/rng.c in the Linux kernel before 4.2 allows attackers to…
Published: 2017-11-30T18:29:00 Last Modified: 2018-04-12T01:29:00
Summary
The rngapi_reset function in crypto/rng.c in the Linux kernel before 4.2 allows attackers to cause a denial of service (NULL pointer dereference).
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-15116 vulnerability.
References
- https://github.com/torvalds/linux/commit/94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
- https://bugzilla.redhat.com/show_bug.cgi?id=1514609
- https://bugzilla.redhat.com/show_bug.cgi?id=1485815
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:0676
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-14746: Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute…
Published: 2017-11-27T22:29:00 Last Modified: 2018-10-21T10:29:00
Summary
Use-after-free vulnerability in Samba 4.x before 4.7.3 allows remote attackers to execute arbitrary code via a crafted SMB1 request.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-14746 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2017-14746.html
- https://www.debian.org/security/2017/dsa-4043
- http://www.ubuntu.com/usn/USN-3486-1
- http://www.securityfocus.com/bid/101907
- http://www.securitytracker.com/id/1039856
- https://access.redhat.com/errata/RHSA-2017:3278
- https://access.redhat.com/errata/RHSA-2017:3261
- https://access.redhat.com/errata/RHSA-2017:3260
- https://www.synology.com/support/security/Synology_SA_17_72_Samba
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us
- https://security.gentoo.org/glsa/201805-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15275: Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging…
Published: 2017-11-27T22:29:00 Last Modified: 2018-10-21T10:29:00
Summary
Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15275 vulnerability.
References
- https://www.samba.org/samba/security/CVE-2017-15275.html
- https://www.debian.org/security/2017/dsa-4043
- http://www.ubuntu.com/usn/USN-3486-2
- http://www.ubuntu.com/usn/USN-3486-1
- http://www.securityfocus.com/bid/101908
- http://www.securitytracker.com/id/1039855
- https://access.redhat.com/errata/RHSA-2017:3278
- https://access.redhat.com/errata/RHSA-2017:3261
- https://access.redhat.com/errata/RHSA-2017:3260
- https://www.synology.com/support/security/Synology_SA_17_72_Samba
- https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us
- https://security.gentoo.org/glsa/201805-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7550: A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain…
Published: 2017-11-21T17:29:00 Last Modified: 2021-09-13T10:50:00
Summary
A flaw was found in the way Ansible (2.3.x before 2.3.3, and 2.4.x before 2.4.1) passed certain parameters to the jenkins_plugin module. Remote attackers could use this flaw to expose sensitive information from a remote host’s logs. This flaw was fixed by not allowing passwords to be specified in the “params” argument, and noting this in the module documentation.
Common Weakness Enumeration (CWE): CWE-532: Insertion of Sensitive Information into Log File
CWE Description: This entry has been deprecated because its abstraction was too low-level. See CWE-532.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-7550 vulnerability.
References
- https://github.com/ansible/ansible/issues/30874
- https://bugzilla.redhat.com/show_bug.cgi?id=1473645
- https://access.redhat.com/errata/RHSA-2017:2966
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3157: By exploiting the way Apache OpenOffice before 4.1.4 renders embedded objects, an attacker could…
Published: 2017-11-20T20:29:00 Last Modified: 2019-05-08T18:51:00
Summary
By exploiting the way Apache OpenOffice before 4.1.4 renders embedded objects, an attacker could craft a document that allows reading in a file from the user’s filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to send the document back to the attacker. The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3157 vulnerability.
References
- https://www.openoffice.org/security/cves/CVE-2017-3157.html
- https://www.debian.org/security/2017/dsa-3792
- http://www.securitytracker.com/id/1037893
- http://www.securityfocus.com/bid/96402
- https://access.redhat.com/errata/RHSA-2017:0979
- https://access.redhat.com/errata/RHSA-2017:0914
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15102: The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1…
Published: 2017-11-15T21:29:00 Last Modified: 2019-05-08T18:14:00
Summary
The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1 allows local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-15102 vulnerability.
References
- https://github.com/torvalds/linux/commit/2fae9e5a7babada041e2e161699ade2447a01989
- https://bugzilla.redhat.com/show_bug.cgi?id=1505905
- http://seclists.org/oss-sec/2017/q4/238
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2fae9e5a7babada041e2e161699ade2447a01989
- http://www.securityfocus.com/bid/101790
- https://usn.ubuntu.com/3583-2/
- https://usn.ubuntu.com/3583-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-8610: A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in…
Published: 2017-11-13T22:29:00 Last Modified: 2020-10-20T22:15:00
Summary
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-8610 vulnerability.
References
- https://security.360.cn/cve/CVE-2016-8610/
- https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610
- http://seclists.org/oss-sec/2016/q4/224
- https://www.debian.org/security/2017/dsa-3773
- http://www.securitytracker.com/id/1037084
- http://www.securityfocus.com/bid/93841
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc
- https://security.netapp.com/advisory/ntap-20171130-0001/
- https://access.redhat.com/errata/RHSA-2017:2494
- https://access.redhat.com/errata/RHSA-2017:2493
- https://access.redhat.com/errata/RHSA-2017:1802
- https://access.redhat.com/errata/RHSA-2017:1801
- https://access.redhat.com/errata/RHSA-2017:1658
- https://access.redhat.com/errata/RHSA-2017:1414
- https://access.redhat.com/errata/RHSA-2017:1413
- http://rhn.redhat.com/errata/RHSA-2017-1659.html
- http://rhn.redhat.com/errata/RHSA-2017-1415.html
- http://rhn.redhat.com/errata/RHSA-2017-0574.html
- http://rhn.redhat.com/errata/RHSA-2017-0286.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://security.paloaltonetworks.com/CVE-2016-8610
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7529: sosreport in SoS 3.x allows local users to obtain sensitive information from sosreport files or…
Published: 2017-11-06T17:29:00 Last Modified: 2019-09-27T15:52:00
Summary
sosreport in SoS 3.x allows local users to obtain sensitive information from sosreport files or gain privileges via a symlink attack on an archive file in a temporary directory, as demonstrated by sosreport-$hostname-$date.tar in /tmp/sosreport-$hostname-$date.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-7529 vulnerability.
References
- https://github.com/sosreport/sos/issues/696
- https://bugzilla.redhat.com/show_bug.cgi?id=1282542
- https://access.redhat.com/errata/RHSA-2016:0188
- https://access.redhat.com/errata/RHSA-2016:0152
- http://www.ubuntu.com/usn/USN-2845-1
- http://www.securityfocus.com/bid/83162
- http://rhn.redhat.com/errata/RHSA-2016-0188.html
- http://rhn.redhat.com/errata/RHSA-2016-0152.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5740: The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP…
Published: 2017-10-18T20:29:00 Last Modified: 2019-05-09T20:13:00
Summary
The net/http library in net/http/transfer.go in Go before 1.4.3 does not properly parse HTTP headers, which allows remote attackers to conduct HTTP request smuggling attacks via a request with two Content-length headers.
Common Weakness Enumeration (CWE): CWE-444: Inconsistent Interpretation of HTTP Requests (‘HTTP Request Smuggling’)
CWE Description: When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to “smuggle” a request to one device without the other device being aware of it.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5740 vulnerability.
References
- https://github.com/golang/go/commit/300d9a21583e7cf0149a778a0611e76ff7c6680f
- https://bugzilla.redhat.com/show_bug.cgi?id=1250352
- http://seclists.org/oss-sec/2015/q3/294
- http://seclists.org/oss-sec/2015/q3/292
- http://seclists.org/oss-sec/2015/q3/237
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168029.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167997.html
- http://rhn.redhat.com/errata/RHSA-2016-1538.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5739: The net/http library in net/textproto/reader.go in Go before 1.4.3 does not properly parse HTTP…
Published: 2017-10-18T20:29:00 Last Modified: 2019-05-10T16:45:00
Summary
The net/http library in net/textproto/reader.go in Go before 1.4.3 does not properly parse HTTP header keys, which allows remote attackers to conduct HTTP request smuggling attacks via a space instead of a hyphen, as demonstrated by “Content Length” instead of “Content-Length.”
Common Weakness Enumeration (CWE): CWE-444: Inconsistent Interpretation of HTTP Requests (‘HTTP Request Smuggling’)
CWE Description: When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to “smuggle” a request to one device without the other device being aware of it.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5739 vulnerability.
References
- https://github.com/golang/go/commit/117ddcb83d7f42d6aa72241240af99ded81118e9
- https://bugzilla.redhat.com/show_bug.cgi?id=1250352
- http://seclists.org/oss-sec/2015/q3/294
- http://seclists.org/oss-sec/2015/q3/292
- http://seclists.org/oss-sec/2015/q3/237
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168029.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/167997.html
- http://www.securityfocus.com/bid/76281
- http://rhn.redhat.com/errata/RHSA-2016-1538.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-13081: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the…
Published: 2017-10-17T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Common Weakness Enumeration (CWE): CWE-330: Use of Insufficiently Random Values
CWE Description: The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.9
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2017-13081 vulnerability.
References
- https://www.krackattacks.com/
- http://www.kb.cert.org/vuls/id/228519
- http://www.securitytracker.com/id/1039585
- http://www.securitytracker.com/id/1039581
- http://www.securitytracker.com/id/1039578
- http://www.securitytracker.com/id/1039577
- http://www.securitytracker.com/id/1039576
- http://www.securitytracker.com/id/1039573
- http://www.securityfocus.com/bid/101274
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
- https://access.redhat.com/security/vulnerabilities/kracks
- http://www.ubuntu.com/usn/USN-3455-1
- http://www.debian.org/security/2017/dsa-3999
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html
- https://security.gentoo.org/glsa/201711-03
- https://source.android.com/security/bulletin/2017-11-01
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
- https://cert.vde.com/en-us/advisories/vde-2017-005
- https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-13078: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK)…
Published: 2017-10-17T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
Common Weakness Enumeration (CWE): CWE-330: Use of Insufficiently Random Values
CWE Description: The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.9
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2017-13078 vulnerability.
References
- https://www.krackattacks.com/
- http://www.kb.cert.org/vuls/id/228519
- http://www.securitytracker.com/id/1039585
- http://www.securitytracker.com/id/1039581
- http://www.securitytracker.com/id/1039578
- http://www.securitytracker.com/id/1039577
- http://www.securitytracker.com/id/1039576
- http://www.securitytracker.com/id/1039573
- http://www.securityfocus.com/bid/101274
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
- https://access.redhat.com/security/vulnerabilities/kracks
- https://access.redhat.com/errata/RHSA-2017:2911
- https://access.redhat.com/errata/RHSA-2017:2907
- http://www.ubuntu.com/usn/USN-3455-1
- http://www.debian.org/security/2017/dsa-3999
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html
- https://security.gentoo.org/glsa/201711-03
- https://support.apple.com/HT208222
- https://support.apple.com/HT208221
- https://support.apple.com/HT208220
- https://support.apple.com/HT208219
- https://source.android.com/security/bulletin/2017-11-01
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
- https://cert.vde.com/en-us/advisories/vde-2017-005
- https://cert.vde.com/en-us/advisories/vde-2017-003
- https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-13079: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the…
Published: 2017-10-17T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Common Weakness Enumeration (CWE): CWE-330: Use of Insufficiently Random Values
CWE Description: The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.9
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2017-13079 vulnerability.
References
- https://www.krackattacks.com/
- http://www.kb.cert.org/vuls/id/228519
- http://www.securitytracker.com/id/1039585
- http://www.securitytracker.com/id/1039581
- http://www.securitytracker.com/id/1039578
- http://www.securitytracker.com/id/1039577
- http://www.securitytracker.com/id/1039576
- http://www.securitytracker.com/id/1039573
- http://www.securityfocus.com/bid/101274
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
- https://access.redhat.com/security/vulnerabilities/kracks
- http://www.ubuntu.com/usn/USN-3455-1
- http://www.debian.org/security/2017/dsa-3999
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html
- https://security.gentoo.org/glsa/201711-03
- https://source.android.com/security/bulletin/2017-11-01
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
- https://cert.vde.com/en-us/advisories/vde-2017-005
- https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK)…
Published: 2017-10-17T13:29:00 Last Modified: 2020-11-10T21:15:00
Summary
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
Common Weakness Enumeration (CWE): CWE-330: Use of Insufficiently Random Values
CWE Description: The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.9
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2017-13080 vulnerability.
References
- https://www.krackattacks.com/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080
- http://www.kb.cert.org/vuls/id/228519
- http://www.securitytracker.com/id/1039585
- http://www.securitytracker.com/id/1039581
- http://www.securitytracker.com/id/1039578
- http://www.securitytracker.com/id/1039577
- http://www.securitytracker.com/id/1039576
- http://www.securitytracker.com/id/1039573
- http://www.securitytracker.com/id/1039572
- http://www.securityfocus.com/bid/101274
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
- https://access.redhat.com/security/vulnerabilities/kracks
- https://access.redhat.com/errata/RHSA-2017:2911
- https://access.redhat.com/errata/RHSA-2017:2907
- http://www.ubuntu.com/usn/USN-3455-1
- http://www.debian.org/security/2017/dsa-3999
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html
- http://www.securitytracker.com/id/1039703
- https://security.gentoo.org/glsa/201711-03
- https://support.apple.com/HT208222
- https://support.apple.com/HT208221
- https://support.apple.com/HT208220
- https://support.apple.com/HT208219
- https://source.android.com/security/bulletin/2017-11-01
- https://support.apple.com/HT208334
- https://support.apple.com/HT208327
- https://support.apple.com/HT208325
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
- https://cert.vde.com/en-us/advisories/vde-2017-005
- https://cert.vde.com/en-us/advisories/vde-2017-003
- https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-13082: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the…
Published: 2017-10-17T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Common Weakness Enumeration (CWE): CWE-330: Use of Insufficiently Random Values
CWE Description: The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 6.5
- CVSS: 5.8
- CVSS Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2017-13082 vulnerability.
References
- https://www.krackattacks.com/
- http://www.kb.cert.org/vuls/id/228519
- http://www.securitytracker.com/id/1039581
- http://www.securitytracker.com/id/1039573
- http://www.securitytracker.com/id/1039571
- http://www.securitytracker.com/id/1039570
- http://www.securityfocus.com/bid/101274
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
- https://access.redhat.com/security/vulnerabilities/kracks
- https://access.redhat.com/errata/RHSA-2017:2907
- http://www.ubuntu.com/usn/USN-3455-1
- http://www.debian.org/security/2017/dsa-3999
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- https://github.com/vanhoefm/krackattacks-test-ap-ft
- https://security.gentoo.org/glsa/201711-03
- https://source.android.com/security/bulletin/2017-11-01
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
- https://cert.vde.com/en-us/advisories/vde-2017-005
- https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1066697
- https://ics-cert.us-cert.gov/advisories/ICSA-17-299-02
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-13086: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup…
Published: 2017-10-17T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Common Weakness Enumeration (CWE): CWE-330: Use of Insufficiently Random Values
CWE Description: The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 5.5
- CVSS: 5.4
- CVSS Vector: AV:A/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2017-13086 vulnerability.
References
- https://www.krackattacks.com/
- http://www.kb.cert.org/vuls/id/228519
- http://www.securitytracker.com/id/1039581
- http://www.securitytracker.com/id/1039578
- http://www.securitytracker.com/id/1039577
- http://www.securitytracker.com/id/1039576
- http://www.securitytracker.com/id/1039573
- http://www.securityfocus.com/bid/101274
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
- https://access.redhat.com/security/vulnerabilities/kracks
- https://access.redhat.com/errata/RHSA-2017:2907
- http://www.ubuntu.com/usn/USN-3455-1
- http://www.debian.org/security/2017/dsa-3999
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- https://security.gentoo.org/glsa/201711-03
- https://source.android.com/security/bulletin/2017-11-01
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
- https://cert.vde.com/en-us/advisories/vde-2017-005
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-13087: Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group…
Published: 2017-10-17T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
Common Weakness Enumeration (CWE): CWE-330: Use of Insufficiently Random Values
CWE Description: The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.9
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2017-13087 vulnerability.
References
- https://www.krackattacks.com/
- http://www.kb.cert.org/vuls/id/228519
- http://www.securitytracker.com/id/1039581
- http://www.securitytracker.com/id/1039578
- http://www.securitytracker.com/id/1039577
- http://www.securitytracker.com/id/1039576
- http://www.securitytracker.com/id/1039573
- http://www.securityfocus.com/bid/101274
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
- https://access.redhat.com/security/vulnerabilities/kracks
- https://access.redhat.com/errata/RHSA-2017:2911
- https://access.redhat.com/errata/RHSA-2017:2907
- http://www.ubuntu.com/usn/USN-3455-1
- http://www.debian.org/security/2017/dsa-3999
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html
- https://security.gentoo.org/glsa/201711-03
- https://source.android.com/security/bulletin/2017-11-01
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
- https://cert.vde.com/en-us/advisories/vde-2017-005
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-13088: Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity…
Published: 2017-10-17T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
Common Weakness Enumeration (CWE): CWE-330: Use of Insufficiently Random Values
CWE Description: The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.9
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2017-13088 vulnerability.
References
- https://www.krackattacks.com/
- http://www.kb.cert.org/vuls/id/228519
- http://www.securitytracker.com/id/1039581
- http://www.securitytracker.com/id/1039578
- http://www.securitytracker.com/id/1039577
- http://www.securitytracker.com/id/1039576
- http://www.securitytracker.com/id/1039573
- http://www.securityfocus.com/bid/101274
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
- https://access.redhat.com/security/vulnerabilities/kracks
- https://access.redhat.com/errata/RHSA-2017:2907
- http://www.ubuntu.com/usn/USN-3455-1
- http://www.debian.org/security/2017/dsa-3999
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00020.html
- https://security.gentoo.org/glsa/201711-03
- https://source.android.com/security/bulletin/2017-11-01
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
- https://cert.vde.com/en-us/advisories/vde-2017-005
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-13084: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL)…
Published: 2017-10-17T13:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Common Weakness Enumeration (CWE): CWE-330: Use of Insufficiently Random Values
CWE Description: The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 5.5
- CVSS: 5.4
- CVSS Vector: AV:A/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2017-13084 vulnerability.
References
- https://www.krackattacks.com/
- http://www.kb.cert.org/vuls/id/228519
- http://www.securitytracker.com/id/1039581
- http://www.securitytracker.com/id/1039577
- http://www.securitytracker.com/id/1039576
- http://www.securityfocus.com/bid/101274
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://access.redhat.com/security/vulnerabilities/kracks
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- https://security.gentoo.org/glsa/201711-03
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-13077: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK)…
Published: 2017-10-17T02:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Common Weakness Enumeration (CWE): CWE-330: Use of Insufficiently Random Values
CWE Description: The software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 5.5
- CVSS: 5.4
- CVSS Vector: AV:A/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2017-13077 vulnerability.
References
- https://www.krackattacks.com/
- http://www.kb.cert.org/vuls/id/228519
- http://www.securitytracker.com/id/1039585
- http://www.securitytracker.com/id/1039581
- http://www.securitytracker.com/id/1039578
- http://www.securitytracker.com/id/1039577
- http://www.securitytracker.com/id/1039576
- http://www.securitytracker.com/id/1039573
- http://www.securityfocus.com/bid/101274
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
- https://support.lenovo.com/us/en/product_security/LEN-17420
- https://security.FreeBSD.org/advisories/FreeBSD-SA-17:07.wpa.asc
- https://access.redhat.com/security/vulnerabilities/kracks
- https://access.redhat.com/errata/RHSA-2017:2911
- https://access.redhat.com/errata/RHSA-2017:2907
- http://www.ubuntu.com/usn/USN-3455-1
- http://www.debian.org/security/2017/dsa-3999
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
- https://security.gentoo.org/glsa/201711-03
- https://support.apple.com/HT208222
- https://support.apple.com/HT208221
- https://support.apple.com/HT208220
- https://support.apple.com/HT208219
- https://source.android.com/security/bulletin/2017-11-01
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://source.android.com/security/bulletin/2018-04-01
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us
- https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
- https://cert.vde.com/en-us/advisories/vde-2017-005
- https://cert.vde.com/en-us/advisories/vde-2017-003
- https://source.android.com/security/bulletin/2018-06-01
- http://www.securitytracker.com/id/1041432
- https://lists.debian.org/debian-lts-announce/2018/11/msg00015.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-0903: RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution…
Published: 2017-10-11T18:29:00 Last Modified: 2019-10-09T23:21:00
Summary
RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
Common Weakness Enumeration (CWE): CWE-502: Deserialization of Untrusted Data
CWE Description: The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-0903 vulnerability.
References
- https://hackerone.com/reports/274990
- https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49
- http://blog.rubygems.org/2017/10/09/unsafe-object-deserialization-vulnerability.html
- http://blog.rubygems.org/2017/10/09/2.6.14-released.html
- http://www.securityfocus.com/bid/101275
- https://www.debian.org/security/2017/dsa-4031
- https://access.redhat.com/errata/RHSA-2017:3485
- https://access.redhat.com/errata/RHSA-2018:0378
- https://usn.ubuntu.com/3553-1/
- https://access.redhat.com/errata/RHSA-2018:0585
- https://access.redhat.com/errata/RHSA-2018:0583
- https://usn.ubuntu.com/3685-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-15041: Go before 1.8.4 and 1.9.x before 1.9.1 allows “go get” remote command execution. Using custom…
Published: 2017-10-05T21:29:00 Last Modified: 2021-03-19T20:11:00
Summary
Go before 1.8.4 and 1.9.x before 1.9.1 allows “go get” remote command execution. Using custom domains, it is possible to arrange things so that example.com/pkg1 points to a Subversion repository but example.com/pkg1/pkg2 points to a Git repository. If the Subversion repository includes a Git checkout in its pkg2 directory and some other work is done to ensure the proper ordering of operations, “go get” can be tricked into reusing this Git checkout for the fetch of code from pkg2. If the Subversion repository’s Git checkout has malicious commands in .git/hooks/, they will execute on the system running “go get.”
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-15041 vulnerability.
References
- https://groups.google.com/d/msg/golang-dev/RinSE3EiJBI/kYL7zb07AgAJ
- https://golang.org/cl/68190
- https://golang.org/cl/68022
- https://github.com/golang/go/issues/22125
- http://www.securityfocus.com/bid/101196
- https://security.gentoo.org/glsa/201710-23
- https://access.redhat.com/errata/RHSA-2017:3463
- https://access.redhat.com/errata/RHSA-2018:0878
- https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
- https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-1000111: Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously…
Published: 2017-10-05T01:29:00 Last Modified: 2020-10-15T13:28:00
Summary
Linux kernel: heap out-of-bounds in AF_PACKET sockets. This new issue is analogous to previously disclosed CVE-2016-8655. In both cases, a socket option that changes socket state may race with safety checks in packet_set_ring. Previously with PACKET_VERSION. This time with PACKET_RESERVE. The solution is similar: lock the socket for the update. This issue may be exploitable, we did not investigate further. As this issue affects PF_PACKET sockets, it requires CAP_NET_RAW in the process namespace. But note that with user namespaces enabled, any process can create a namespace in which it has CAP_NET_RAW.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-1000111 vulnerability.
References
- https://access.redhat.com/security/cve/cve-2017-1000111
- http://www.securitytracker.com/id/1039132
- http://www.securityfocus.com/bid/100267
- http://www.debian.org/security/2017/dsa-3981
- https://access.redhat.com/errata/RHSA-2017:3200
- https://access.redhat.com/errata/RHSA-2017:2931
- https://access.redhat.com/errata/RHSA-2017:2930
- https://access.redhat.com/errata/RHSA-2017:2918
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-1000253: Linux distributions that have not patched their long-term kernels with…
Published: 2017-10-05T01:29:00 Last Modified: 2017-12-09T02:29:00
Summary
Linux distributions that have not patched their long-term kernels with https://git.kernel.org/linus/a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (committed on April 14, 2015). This kernel vulnerability was fixed in April 2015 by commit a87938b2e246b81b4fb713edb371a9fa3c5c3c86 (backported to Linux 3.10.77 in May 2015), but it was not recognized as a security threat. With CONFIG_ARCH_BINFMT_ELF_RANDOMIZE_PIE enabled, and a normal top-down address allocation strategy, load_elf_binary() will attempt to map a PIE binary into an address range immediately below mm->mmap_base. Unfortunately, load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary which means that, while the first PT_LOAD segment is mapped below mm->mmap_base, the subsequent PT_LOAD segment(s) end up being mapped above mm->mmap_base into the are that is supposed to be the “gap” between the stack and the binary.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-1000253 vulnerability.
References
- https://www.qualys.com/2017/09/26/cve-2017-1000253/cve-2017-1000253.txt
- http://www.securitytracker.com/id/1039434
- http://www.securityfocus.com/bid/101010
- https://access.redhat.com/errata/RHSA-2017:2802
- https://access.redhat.com/errata/RHSA-2017:2801
- https://access.redhat.com/errata/RHSA-2017:2800
- https://access.redhat.com/errata/RHSA-2017:2799
- https://access.redhat.com/errata/RHSA-2017:2798
- https://access.redhat.com/errata/RHSA-2017:2797
- https://access.redhat.com/errata/RHSA-2017:2796
- https://access.redhat.com/errata/RHSA-2017:2795
- https://access.redhat.com/errata/RHSA-2017:2794
- https://access.redhat.com/errata/RHSA-2017:2793
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-1000115: Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can malicious…
Published: 2017-10-05T01:29:00 Last Modified: 2019-05-10T14:58:00
Summary
Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can malicious repositories to modify files outside the repository
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-1000115 vulnerability.
References
- https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.3_.2F_4.3.1_.282017-08-10.29
- https://security.gentoo.org/glsa/201709-18
- http://www.securityfocus.com/bid/100290
- http://www.debian.org/security/2017/dsa-3963
- https://access.redhat.com/errata/RHSA-2017:2489
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-1000116: Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible…
Published: 2017-10-05T01:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks.
Common Weakness Enumeration (CWE): CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
CWE Description: The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-1000116 vulnerability.
References
- https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.3_.2F_4.3.1_.282017-08-10.29
- https://security.gentoo.org/glsa/201709-18
- http://www.securityfocus.com/bid/100290
- http://www.debian.org/security/2017/dsa-3963
- https://access.redhat.com/errata/RHSA-2017:2489
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-14491: Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of…
Published: 2017-10-04T01:29:00 Last Modified: 2021-11-17T22:16:00
Summary
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-14491 vulnerability.
References
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- http://www.securitytracker.com/id/1039474
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- https://www.exploit-db.com/exploits/42941/
- http://www.securityfocus.com/bid/101085
- https://www.kb.cert.org/vuls/id/973527
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/errata/RHSA-2017:2841
- https://access.redhat.com/errata/RHSA-2017:2840
- https://access.redhat.com/errata/RHSA-2017:2839
- https://access.redhat.com/errata/RHSA-2017:2838
- https://access.redhat.com/errata/RHSA-2017:2837
- https://access.redhat.com/errata/RHSA-2017:2836
- http://www.ubuntu.com/usn/USN-3430-2
- http://www.ubuntu.com/usn/USN-3430-1
- http://www.debian.org/security/2017/dsa-3989
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- https://security.gentoo.org/glsa/201710-27
- http://www.securityfocus.com/bid/101977
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
- http://nvidia.custhelp.com/app/answers/detail/a_id/4560
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/
- http://www.ubuntu.com/usn/USN-3430-3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YXRZ2W6TV6NLUJC5NOFBSG6PZSMDTYPV/
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html
- https://www.debian.org/security/2017/dsa-3989
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MMPCJOYPPL4B5RBY4U425PWG7EETDTD/
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449
- http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/527KNN34RN2SB6MBJG7CKSEBWYE3TJEB/
- https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-13704: In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size…
Published: 2017-10-03T01:29:00 Last Modified: 2018-05-11T01:29:00
Summary
In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero’s (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-13704 vulnerability.
References
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TK6DWC53WSU6633EVZL7H4PCWBYHMHK/
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=63437ffbb58837b214b4b92cb1c54bc5f3279928
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://www.securitytracker.com/id/1039474
- http://www.securityfocus.com/bid/101085
- https://access.redhat.com/security/vulnerabilities/3199382
- http://www.securityfocus.com/bid/101977
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-14492: Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of…
Published: 2017-10-03T01:29:00 Last Modified: 2018-03-04T02:29:00
Summary
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-14492 vulnerability.
References
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=24036ea507862c7b7898b68289c8130f85599c10
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://www.securitytracker.com/id/1039474
- https://www.exploit-db.com/exploits/42942/
- http://www.securityfocus.com/bid/101085
- https://www.kb.cert.org/vuls/id/973527
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/errata/RHSA-2017:2837
- https://access.redhat.com/errata/RHSA-2017:2836
- http://www.ubuntu.com/usn/USN-3430-2
- http://www.ubuntu.com/usn/USN-3430-1
- http://www.debian.org/security/2017/dsa-3989
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- https://security.gentoo.org/glsa/201710-27
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-14493: Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of…
Published: 2017-10-03T01:29:00 Last Modified: 2018-03-04T02:29:00
Summary
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-14493 vulnerability.
References
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://www.securitytracker.com/id/1039474
- https://www.exploit-db.com/exploits/42943/
- http://www.securityfocus.com/bid/101085
- https://www.kb.cert.org/vuls/id/973527
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/errata/RHSA-2017:2837
- https://access.redhat.com/errata/RHSA-2017:2836
- http://www.ubuntu.com/usn/USN-3430-2
- http://www.ubuntu.com/usn/USN-3430-1
- http://www.debian.org/security/2017/dsa-3989
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- https://security.gentoo.org/glsa/201710-27
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-14495: Memory leak in dnsmasq before 2.78, when the –add-mac, –add-cpe-id or –add-subnet option is…
Published: 2017-10-03T01:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Memory leak in dnsmasq before 2.78, when the –add-mac, –add-cpe-id or –add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.
Common Weakness Enumeration (CWE): CWE-772: Missing Release of Resource after Effective Lifetime
CWE Description: The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-14495 vulnerability.
References
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=51eadb692a5123b9838e5a68ecace3ac579a3a45
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://www.securitytracker.com/id/1039474
- https://www.exploit-db.com/exploits/42945/
- http://www.securityfocus.com/bid/101085
- https://www.kb.cert.org/vuls/id/973527
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/errata/RHSA-2017:2836
- http://www.ubuntu.com/usn/USN-3430-2
- http://www.ubuntu.com/usn/USN-3430-1
- http://www.debian.org/security/2017/dsa-3989
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- https://security.gentoo.org/glsa/201710-27
- http://www.securityfocus.com/bid/101977
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-14494: dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive…
Published: 2017-10-03T01:29:00 Last Modified: 2018-03-04T02:29:00
Summary
dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-14494 vulnerability.
References
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=33e3f1029c9ec6c63e430ff51063a6301d4b2262
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://www.securitytracker.com/id/1039474
- https://www.exploit-db.com/exploits/42944/
- http://www.securityfocus.com/bid/101085
- https://www.kb.cert.org/vuls/id/973527
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/errata/RHSA-2017:2837
- https://access.redhat.com/errata/RHSA-2017:2836
- http://www.ubuntu.com/usn/USN-3430-2
- http://www.ubuntu.com/usn/USN-3430-1
- http://www.debian.org/security/2017/dsa-3989
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- https://security.gentoo.org/glsa/201710-27
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-14496: Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the –add-mac,…
Published: 2017-10-03T01:29:00 Last Modified: 2018-05-11T01:29:00
Summary
Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the –add-mac, –add-cpe-id or –add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
Common Weakness Enumeration (CWE): CWE-191: Integer Underflow (Wrap or Wraparound)
CWE Description: The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-14496 vulnerability.
References
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html
- https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=897c113fda0886a28a986cc6ba17bb93bd6cb1c7
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- https://source.android.com/security/bulletin/2017-10-01
- http://www.securitytracker.com/id/1039474
- https://www.exploit-db.com/exploits/42946/
- http://www.securityfocus.com/bid/101085
- https://www.kb.cert.org/vuls/id/973527
- https://access.redhat.com/security/vulnerabilities/3199382
- https://access.redhat.com/errata/RHSA-2017:2836
- http://www.ubuntu.com/usn/USN-3430-2
- http://www.ubuntu.com/usn/USN-3430-1
- http://www.debian.org/security/2017/dsa-3989
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- https://security.gentoo.org/glsa/201710-27
- http://www.securityfocus.com/bid/101977
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7837: The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when…
Published: 2017-09-19T16:29:00 Last Modified: 2021-07-15T19:16:00
Summary
The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secure_boot flag across kexec reboot.
Common Weakness Enumeration (CWE): CWE-254: 7PK - Security Features
CWE Description: Software security is not security software. Here we’re concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-7837 vulnerability.
References
- https://github.com/mjg59/linux/commit/4b2b64d5a6ebc84214755ebccd599baef7c1b798
- https://bugzilla.redhat.com/show_bug.cgi?id=1272472
- http://www.openwall.com/lists/oss-security/2015/10/15/6
- http://rhn.redhat.com/errata/RHSA-2015-2411.html
- http://rhn.redhat.com/errata/RHSA-2015-2152.html
- http://www.securityfocus.com/bid/77097
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7553: Race condition in the kernel in Red Hat Enterprise Linux 7, kernel-rt and Red Hat Enterprise MRG…
Published: 2017-09-14T16:29:00 Last Modified: 2021-07-15T19:16:00
Summary
Race condition in the kernel in Red Hat Enterprise Linux 7, kernel-rt and Red Hat Enterprise MRG 2, when the nfnetlink_log module is loaded, allows local users to cause a denial of service (panic) by creating netlink sockets.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-7553 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-12896: The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-…
Published: 2017-09-14T06:29:00 Last Modified: 2020-10-23T18:17:00
Summary
The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:isakmp_rfc3948_print().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-12896 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/f76e7feb41a4327d2b0978449bbdafe98d4a3771
- https://github.com/the-tcpdump-group/tcpdump/commit/4e430c6b0d8b7e77c7abca7e7afb0c3e727502f2
- http://www.tcpdump.org/tcpdump-changes.txt
- http://www.securitytracker.com/id/1039307
- https://security.gentoo.org/glsa/201709-23
- http://www.debian.org/security/2017/dsa-3971
- https://support.apple.com/HT208221
- https://access.redhat.com/errata/RHEA-2018:0705
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-12899: The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print().
Published: 2017-09-14T06:29:00 Last Modified: 2020-10-23T18:17:00
Summary
The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-12899 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/f96003b21e2abfbba59b926b10a7f9bc7d11e36c
- https://github.com/the-tcpdump-group/tcpdump/commit/c6e0531b5def26ecf912e8de6ade86cbdaed3751
- http://www.tcpdump.org/tcpdump-changes.txt
- http://www.securitytracker.com/id/1039307
- https://security.gentoo.org/glsa/201709-23
- http://www.debian.org/security/2017/dsa-3971
- https://support.apple.com/HT208221
- https://access.redhat.com/errata/RHEA-2018:0705
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-12902: The Zephyr parser in tcpdump before 4.9.2 has a buffer over-read in print-zephyr.c, several…
Published: 2017-09-14T06:29:00 Last Modified: 2020-10-23T18:17:00
Summary
The Zephyr parser in tcpdump before 4.9.2 has a buffer over-read in print-zephyr.c, several functions.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-12902 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/d17507ffa3e9742199b02a66aa940e79ababfa30
- https://github.com/the-tcpdump-group/tcpdump/commit/6ec0c6fa63412c7a07a5bcb790a529c3563b4173
- http://www.tcpdump.org/tcpdump-changes.txt
- http://www.securitytracker.com/id/1039307
- https://security.gentoo.org/glsa/201709-23
- http://www.debian.org/security/2017/dsa-3971
- https://support.apple.com/HT208221
- https://access.redhat.com/errata/RHEA-2018:0705
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-12987: The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in…
Published: 2017-09-14T06:29:00 Last Modified: 2020-10-23T18:17:00
Summary
The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-12987 vulnerability.
References
- https://github.com/the-tcpdump-group/tcpdump/commit/99798bd9a41bd3d03fdc1e949810a38967f20ed3
- https://github.com/the-tcpdump-group/tcpdump/commit/2ecb9d2c67d9119250c54811a6ce4d0f2ddf44f1
- http://www.tcpdump.org/tcpdump-changes.txt
- http://www.securitytracker.com/id/1039307
- https://security.gentoo.org/glsa/201709-23
- http://www.debian.org/security/2017/dsa-3971
- https://support.apple.com/HT208221
- https://access.redhat.com/errata/RHEA-2018:0705
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-1000251: The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version…
Published: 2017-09-12T17:29:00 Last Modified: 2020-06-03T19:00:00
Summary
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 5.1
- CVSS: 7.7
- CVSS Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-1000251 vulnerability.
References
- https://www.armis.com/blueborne
- https://access.redhat.com/security/vulnerabilities/blueborne
- http://www.securityfocus.com/bid/100809
- https://www.kb.cert.org/vuls/id/240311
- http://www.securitytracker.com/id/1039373
- https://www.exploit-db.com/exploits/42762/
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://www.debian.org/security/2017/dsa-3981
- https://github.com/torvalds/linux/commit/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe
- https://access.redhat.com/errata/RHSA-2017:2732
- https://access.redhat.com/errata/RHSA-2017:2731
- https://access.redhat.com/errata/RHSA-2017:2707
- https://access.redhat.com/errata/RHSA-2017:2706
- https://access.redhat.com/errata/RHSA-2017:2705
- https://access.redhat.com/errata/RHSA-2017:2704
- https://access.redhat.com/errata/RHSA-2017:2683
- https://access.redhat.com/errata/RHSA-2017:2682
- https://access.redhat.com/errata/RHSA-2017:2681
- https://access.redhat.com/errata/RHSA-2017:2680
- https://access.redhat.com/errata/RHSA-2017:2679
- https://www.synology.com/support/security/Synology_SA_17_52_BlueBorne
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-1000083: backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1…
Published: 2017-09-05T06:29:00 Last Modified: 2019-10-03T00:03:00
Summary
backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a “–” command-line option substring, as demonstrated by a –checkpoint-action=exec=bash at the beginning of the filename.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2017-1000083 vulnerability.
- Evince - CBT File Command Injection (Metasploit) by Metasploit at 2019-02-11
- Evince 3.24.0 - Command Injection by Matlink at 2018-11-13
References
- https://github.com/GNOME/evince/commit/717df38fd8509bf883b70d680c9b1b3cf36732ee
- https://bugzilla.gnome.org/show_bug.cgi?id=784630
- http://seclists.org/oss-sec/2017/q3/128
- http://www.securityfocus.com/bid/99597
- http://www.debian.org/security/2017/dsa-3911
- https://access.redhat.com/errata/RHSA-2017:2388
- https://www.exploit-db.com/exploits/45824/
- https://www.exploit-db.com/exploits/46341/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-0902: RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a…
Published: 2017-08-31T20:29:00 Last Modified: 2019-10-09T23:21:00
Summary
RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.
Common Weakness Enumeration (CWE): CWE-346: Origin Validation Error
CWE Description: The software does not properly verify that the source of data or communication is valid.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-0902 vulnerability.
References
- https://hackerone.com/reports/218088
- https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- http://www.securitytracker.com/id/1039249
- http://www.securityfocus.com/bid/100586
- https://security.gentoo.org/glsa/201710-01
- https://www.debian.org/security/2017/dsa-3966
- https://access.redhat.com/errata/RHSA-2017:3485
- https://access.redhat.com/errata/RHSA-2018:0378
- https://usn.ubuntu.com/3553-1/
- https://access.redhat.com/errata/RHSA-2018:0585
- https://access.redhat.com/errata/RHSA-2018:0583
- https://usn.ubuntu.com/3685-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-0901: RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously…
Published: 2017-08-31T20:29:00 Last Modified: 2019-10-09T23:21:00
Summary
RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-0901 vulnerability.
References
- https://hackerone.com/reports/243156
- https://github.com/rubygems/rubygems/commit/ad5c0a53a86ca5b218c7976765c0365b91d22cb2
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- http://www.securitytracker.com/id/1039249
- http://www.securityfocus.com/bid/100580
- https://www.exploit-db.com/exploits/42611/
- https://security.gentoo.org/glsa/201710-01
- https://www.debian.org/security/2017/dsa-3966
- https://access.redhat.com/errata/RHSA-2017:3485
- https://access.redhat.com/errata/RHSA-2018:0378
- https://usn.ubuntu.com/3553-1/
- https://access.redhat.com/errata/RHSA-2018:0585
- https://access.redhat.com/errata/RHSA-2018:0583
- https://usn.ubuntu.com/3685-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-0900: RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications to…
Published: 2017-08-31T20:29:00 Last Modified: 2019-05-13T14:31:00
Summary
RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a query
command.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-0900 vulnerability.
References
- https://hackerone.com/reports/243003
- https://github.com/rubygems/rubygems/commit/8a38a4fc24c6591e6c8f43d1fadab6efeb4d6251
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- http://www.securitytracker.com/id/1039249
- http://www.securityfocus.com/bid/100579
- https://security.gentoo.org/glsa/201710-01
- https://www.debian.org/security/2017/dsa-3966
- https://access.redhat.com/errata/RHSA-2017:3485
- https://access.redhat.com/errata/RHSA-2018:0378
- https://access.redhat.com/errata/RHSA-2018:0585
- https://access.redhat.com/errata/RHSA-2018:0583
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-0899: RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that…
Published: 2017-08-31T20:29:00 Last Modified: 2019-10-09T23:21:00
Summary
RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-0899 vulnerability.
References
- https://hackerone.com/reports/226335
- https://github.com/rubygems/rubygems/commit/ef0aa611effb5f54d40c7fba6e8235eb43c5a491
- https://github.com/rubygems/rubygems/commit/1bcbc7fe637b03145401ec9c094066285934a7f1
- http://blog.rubygems.org/2017/08/27/2.6.13-released.html
- http://www.securitytracker.com/id/1039249
- http://www.securityfocus.com/bid/100576
- https://security.gentoo.org/glsa/201710-01
- https://www.debian.org/security/2017/dsa-3966
- https://access.redhat.com/errata/RHSA-2017:3485
- https://access.redhat.com/errata/RHSA-2018:0378
- https://access.redhat.com/errata/RHSA-2018:0585
- https://access.redhat.com/errata/RHSA-2018:0583
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-14064: Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory…
Published: 2017-08-31T17:29:00 Last Modified: 2019-05-13T18:48:00
Summary
Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a ‘\0’ byte, returning a pointer to a string of length zero, which is not the length stored in space_len.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-14064 vulnerability.
References
- https://hackerone.com/reports/209949
- https://github.com/flori/json/commit/8f782fd8e181d9cfe9387ded43a5ca9692266b85
- https://bugs.ruby-lang.org/issues/13853
- http://www.securitytracker.com/id/1039363
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/
- https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/
- http://www.securityfocus.com/bid/100890
- https://security.gentoo.org/glsa/201710-18
- https://www.debian.org/security/2017/dsa-3966
- https://access.redhat.com/errata/RHSA-2017:3485
- https://access.redhat.com/errata/RHSA-2018:0378
- https://access.redhat.com/errata/RHSA-2018:0585
- https://access.redhat.com/errata/RHSA-2018:0583
- https://usn.ubuntu.com/3685-1/
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
- http://www.securitytracker.com/id/1042004
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5208: Integer overflow in the wrestool program in icoutils before 0.31.1 allows remote attackers to…
Published: 2017-08-22T18:29:00 Last Modified: 2019-03-20T13:14:00
Summary
Integer overflow in the wrestool program in icoutils before 0.31.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted executable, which triggers a denial of service (application crash) or the possibility of execution of arbitrary code.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5208 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1411251
- http://www.securityfocus.com/bid/95315
- http://www.openwall.com/lists/oss-security/2017/01/08/5
- http://www.debian.org/security/2017/dsa-3756
- http://rhn.redhat.com/errata/RHSA-2017-0837.html
- https://security.gentoo.org/glsa/201801-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3106: Adobe Flash Player versions 26.0.0.137 and earlier have an exploitable type confusion…
Published: 2017-08-11T19:29:00 Last Modified: 2021-12-07T19:21:00
Summary
Adobe Flash Player versions 26.0.0.137 and earlier have an exploitable type confusion vulnerability when parsing SWF files. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-3106 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-23.html
- http://www.securitytracker.com/id/1039088
- http://www.securityfocus.com/bid/100190
- https://www.exploit-db.com/exploits/42480/
- https://security.gentoo.org/glsa/201709-16
- https://access.redhat.com/errata/RHSA-2017:2457
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3085: Adobe Flash Player versions 26.0.0.137 and earlier have a security bypass vulnerability that…
Published: 2017-08-11T19:29:00 Last Modified: 2021-12-01T01:30:00
Summary
Adobe Flash Player versions 26.0.0.137 and earlier have a security bypass vulnerability that leads to information disclosure when performing URL redirect.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3085 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-23.html
- http://www.securitytracker.com/id/1039088
- http://www.securityfocus.com/bid/100191
- https://blog.bjornweb.nl/2017/08/flash-remote-sandbox-escape-windows-user-credentials-leak/
- http://www.zerodayinitiative.com/advisories/ZDI-17-634/
- https://security.gentoo.org/glsa/201709-16
- https://access.redhat.com/errata/RHSA-2017:2457
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0143: Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users…
Published: 2017-08-10T15:29:00 Last Modified: 2019-04-22T17:48:00
Summary
Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-snapshot.c or (4) qcow2_grow_l1_table function in qcow2-cluster.c, (5) a large request in the bdrv_check_byte_request function in block.c and other block drivers, (6) crafted cluster indexes in the get_refcount function in qcow2-refcount.c, or (7) a large number of blocks in the cloop_open function in cloop.c, which trigger buffer overflows, memory corruption, large memory allocations and out-of-bounds read and writes.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-0143 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1079140
- http://rhn.redhat.com/errata/RHSA-2014-0421.html
- http://rhn.redhat.com/errata/RHSA-2014-0420.html
- http://git.qemu.org/?p=qemu.git;a=commit;h=e3737b820b45e54b059656dc3f914f895ac7a88b
- http://git.qemu.org/?p=qemu.git;a=commit;h=db8a31d11d6a60f48d6817530640d75aa72a9a2f
- http://git.qemu.org/?p=qemu.git;a=commit;h=cab60de930684c33f67d4e32c7509b567f8c445b
- http://git.qemu.org/?p=qemu.git;a=commit;h=afbcc40bee4ef51731102d7d4b499ee12fc182e1
- http://git.qemu.org/?p=qemu.git;a=commit;h=8f4754ede56e3f9ea3fd7207f4a7c4453e59285b
- http://git.qemu.org/?p=qemu.git;a=commit;h=6a83f8b5bec6f59e56cc49bd49e4c3f8f805d56f
- http://git.qemu.org/?p=qemu.git;a=commit;h=509a41bab5306181044b5fff02eadf96d9c8676a
- http://www.debian.org/security/2014/dsa-3044
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3405: ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys…
Published: 2017-08-09T16:29:00 Last Modified: 2020-05-28T14:08:00
Summary
ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys.
Common Weakness Enumeration (CWE): CWE-331: Insufficient Entropy
CWE Description: The software uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3405 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1210324
- https://bugs.ntp.org/show_bug.cgi?id=2797
- http://www.securityfocus.com/bid/74045
- http://www.openwall.com/lists/oss-security/2015/04/23/14
- http://www.debian.org/security/2015/dsa-3388
- http://www.debian.org/security/2015/dsa-3223
- http://rhn.redhat.com/errata/RHSA-2015-2231.html
- http://rhn.redhat.com/errata/RHSA-2015-1459.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156248.html
- http://bk1.ntp.org/ntp-stable/?PAGE=patch&REV=55199296N2gFqH1Hm5GOnhrk9Ypygg
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03886en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3641: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML)….
Published: 2017-08-08T15:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3641 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securitytracker.com/id/1038928
- http://www.securityfocus.com/bid/99767
- http://www.debian.org/security/2017/dsa-3944
- http://www.debian.org/security/2017/dsa-3922
- https://www.debian.org/security/2017/dsa-3955
- https://access.redhat.com/errata/RHSA-2017:2886
- https://access.redhat.com/errata/RHSA-2017:2787
- https://access.redhat.com/errata/RHSA-2018:0279
- https://access.redhat.com/errata/RHSA-2018:0574
- https://access.redhat.com/errata/RHSA-2018:2439
- https://access.redhat.com/errata/RHSA-2018:2729
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3636: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs)….
Published: 2017-08-08T15:29:00 Last Modified: 2019-10-03T00:03:00
Summary
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-3636 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securitytracker.com/id/1038928
- http://www.securityfocus.com/bid/99736
- http://www.debian.org/security/2017/dsa-3944
- http://www.debian.org/security/2017/dsa-3922
- https://www.debian.org/security/2017/dsa-3955
- https://access.redhat.com/errata/RHSA-2017:2787
- https://access.redhat.com/errata/RHSA-2018:0279
- https://access.redhat.com/errata/RHSA-2018:0574
- https://access.redhat.com/errata/RHSA-2018:2439
- https://access.redhat.com/errata/RHSA-2018:2729
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7701: Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before…
Published: 2017-08-07T20:29:00 Last Modified: 2020-06-18T16:58:00
Summary
Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
Common Weakness Enumeration (CWE): CWE-772: Missing Release of Resource after Effective Lifetime
CWE Description: The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7701 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1274255
- http://www.securityfocus.com/bid/77281
- http://support.ntp.org/bin/view/Main/NtpBug2909
- https://security.gentoo.org/glsa/201607-15
- http://www.securitytracker.com/id/1033951
- http://www.debian.org/security/2015/dsa-3388
- https://security.netapp.com/advisory/ntap-20171004-0001/
- http://rhn.redhat.com/errata/RHSA-2016-2583.html
- http://rhn.redhat.com/errata/RHSA-2016-0780.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7702: The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows…
Published: 2017-08-07T20:29:00 Last Modified: 2020-06-18T17:10:00
Summary
The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7702 vulnerability.
References
- http://www.securityfocus.com/bid/77286
- http://support.ntp.org/bin/view/Main/NtpBug2899
- https://security.gentoo.org/glsa/201607-15
- http://www.securitytracker.com/id/1033951
- http://www.debian.org/security/2015/dsa-3388
- https://security.netapp.com/advisory/ntap-20171004-0001/
- http://rhn.redhat.com/errata/RHSA-2016-2583.html
- http://rhn.redhat.com/errata/RHSA-2016-0780.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7704: The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to…
Published: 2017-08-07T20:29:00 Last Modified: 2021-11-17T22:15:00
Summary
The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted “KOD” messages.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7704 vulnerability.
References
- https://www.kb.cert.org/vuls/id/718152
- https://www.cs.bu.edu/~goldbe/NTPattack.html
- https://eprint.iacr.org/2015/1020.pdf
- https://bugzilla.redhat.com/show_bug.cgi?id=1271070
- http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit
- http://support.ntp.org/bin/view/Main/NtpBug2901
- http://bugs.ntp.org/show_bug.cgi?id=2901
- https://security.gentoo.org/glsa/201607-15
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839
- http://www.securityfocus.com/bid/77280
- http://www.securitytracker.com/id/1033951
- http://www.debian.org/security/2015/dsa-3388
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://security.netapp.com/advisory/ntap-20171004-0001/
- https://support.citrix.com/article/CTX220112
- http://rhn.redhat.com/errata/RHSA-2015-2520.html
- http://rhn.redhat.com/errata/RHSA-2015-1930.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7691: The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows…
Published: 2017-08-07T20:29:00 Last Modified: 2020-06-18T16:42:00
Summary
The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7691 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1274254
- http://www.securityfocus.com/bid/77274
- http://support.ntp.org/bin/view/Main/NtpBug2899
- https://security.gentoo.org/glsa/201607-15
- http://www.securitytracker.com/id/1033951
- http://www.debian.org/security/2015/dsa-3388
- https://security.netapp.com/advisory/ntap-20171004-0001/
- http://rhn.redhat.com/errata/RHSA-2016-2583.html
- http://rhn.redhat.com/errata/RHSA-2016-0780.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7692: The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows…
Published: 2017-08-07T20:29:00 Last Modified: 2020-06-18T16:51:00
Summary
The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7692 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1274254
- http://www.securityfocus.com/bid/77285
- http://support.ntp.org/bin/view/Main/NtpBug2899
- https://security.gentoo.org/glsa/201607-15
- http://www.securitytracker.com/id/1033951
- http://www.debian.org/security/2015/dsa-3388
- https://security.netapp.com/advisory/ntap-20171004-0001/
- http://rhn.redhat.com/errata/RHSA-2016-2583.html
- http://rhn.redhat.com/errata/RHSA-2016-0780.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7852: ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a…
Published: 2017-08-07T20:29:00 Last Modified: 2020-06-18T15:23:00
Summary
ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7852 vulnerability.
References
- http://www.securityfocus.com/bid/77288
- http://support.ntp.org/bin/view/Main/NtpBug2919
- https://security.gentoo.org/glsa/201607-15
- http://www.securitytracker.com/id/1033951
- http://www.debian.org/security/2015/dsa-3388
- https://security.netapp.com/advisory/ntap-20171004-0001/
- http://rhn.redhat.com/errata/RHSA-2016-2583.html
- http://rhn.redhat.com/errata/RHSA-2016-0780.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-10664: qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to…
Published: 2017-08-02T19:29:00 Last Modified: 2021-08-04T17:15:00
Summary
qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-10664 vulnerability.
References
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg02693.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1466190
- http://www.securityfocus.com/bid/99513
- http://www.openwall.com/lists/oss-security/2017/06/29/1
- http://www.debian.org/security/2017/dsa-3920
- https://access.redhat.com/errata/RHSA-2017:3474
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:2445
- https://access.redhat.com/errata/RHSA-2017:2390
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3149: The Hotspot component in OpenJDK8 as packaged in Red Hat Enterprise Linux 6 and 7 allows local…
Published: 2017-07-25T18:29:00 Last Modified: 2017-07-31T19:10:00
Summary
The Hotspot component in OpenJDK8 as packaged in Red Hat Enterprise Linux 6 and 7 allows local users to write to arbitrary files via a symlink attack.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-3149 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1213365
- http://www.securityfocus.com/bid/75933
- http://rhn.redhat.com/errata/RHSA-2015-1228.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-7980: Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and…
Published: 2017-07-25T14:29:00 Last Modified: 2021-08-04T17:15:00
Summary
Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-7980 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1430056
- http://www.openwall.com/lists/oss-security/2017/04/21/1
- http://ubuntu.com/usn/usn-3289-1
- https://security.gentoo.org/glsa/201706-03
- http://www.securityfocus.com/bid/97955
- https://support.citrix.com/article/CTX230138
- http://www.securityfocus.com/bid/102129
- https://access.redhat.com/errata/RHSA-2017:1441
- https://access.redhat.com/errata/RHSA-2017:1430
- https://access.redhat.com/errata/RHSA-2017:1206
- https://access.redhat.com/errata/RHSA-2017:1205
- https://access.redhat.com/errata/RHSA-2017:0988
- https://access.redhat.com/errata/RHSA-2017:0984
- https://access.redhat.com/errata/RHSA-2017:0983
- https://access.redhat.com/errata/RHSA-2017:0982
- https://access.redhat.com/errata/RHSA-2017:0981
- https://access.redhat.com/errata/RHSA-2017:0980
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7703: The “pidfile” or “driftfile” directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before…
Published: 2017-07-24T14:29:00 Last Modified: 2020-06-18T18:21:00
Summary
The “pidfile” or “driftfile” directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7703 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1254547
- http://www.securityfocus.com/bid/77278
- http://support.ntp.org/bin/view/Main/NtpBug2902
- https://security.gentoo.org/glsa/201607-15
- http://www.securitytracker.com/id/1033951
- http://www.debian.org/security/2015/dsa-3388
- https://security.netapp.com/advisory/ntap-20171004-0001/
- http://rhn.redhat.com/errata/RHSA-2016-2583.html
- http://rhn.redhat.com/errata/RHSA-2016-0780.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5219: The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions…
Published: 2017-07-21T14:29:00 Last Modified: 2021-04-19T15:13:00
Summary
The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5219 vulnerability.
References
- https://www-01.ibm.com/support/docview.wss?uid=swg21989542
- https://www-01.ibm.com/support/docview.wss?uid=swg21988706
- https://www-01.ibm.com/support/docview.wss?uid=swg21986956
- https://www-01.ibm.com/support/docview.wss?uid=swg21985122
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1024157
- https://www.ibm.com/support/home/docdisplay?lndocid=migr-5099409
- https://github.com/ntp-project/ntp/commit/5f295cd05c3c136d39f5b3e500a2d781bdbb59c8
- https://bugzilla.redhat.com/show_bug.cgi?id=1255118
- http://www.ubuntu.com/usn/USN-2783-1
- http://www.securityfocus.com/bid/76473
- http://www.openwall.com/lists/oss-security/2015/08/25/3
- http://www.debian.org/security/2015/dsa-3388
- http://rhn.redhat.com/errata/RHSA-2016-2583.html
- http://rhn.redhat.com/errata/RHSA-2016-0780.html
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00153.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166992.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html
- http://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc
- http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=51786731Gr4-NOrTBC_a_uXO4wuGhg
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5194: The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote…
Published: 2017-07-21T14:29:00 Last Modified: 2018-05-18T01:29:00
Summary
The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5194 vulnerability.
References
- https://www-01.ibm.com/support/docview.wss?uid=swg21989542
- https://www-01.ibm.com/support/docview.wss?uid=swg21988706
- https://www-01.ibm.com/support/docview.wss?uid=swg21986956
- https://www-01.ibm.com/support/docview.wss?uid=swg21985122
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1024157
- https://github.com/ntp-project/ntp/commit/553f2fa65865c31c5e3c48812cfd46176cffdd27
- https://bugzilla.redhat.com/show_bug.cgi?id=1254542
- http://www.ubuntu.com/usn/USN-2783-1
- http://www.securityfocus.com/bid/76475
- http://www.openwall.com/lists/oss-security/2015/08/25/3
- http://www.debian.org/security/2015/dsa-3388
- http://rhn.redhat.com/errata/RHSA-2016-2583.html
- http://rhn.redhat.com/errata/RHSA-2016-0780.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html
- http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=4c4fc141LwvcoGp-lLGhkAFp3ZvtrA
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5195: ntp_openssl.m4 in ntpd in NTP before 4.2.7p112 allows remote attackers to cause a denial of…
Published: 2017-07-21T14:29:00 Last Modified: 2018-05-18T01:29:00
Summary
ntp_openssl.m4 in ntpd in NTP before 4.2.7p112 allows remote attackers to cause a denial of service (segmentation fault) via a crafted statistics or filegen configuration command that is not enabled during compilation.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5195 vulnerability.
References
- https://www-01.ibm.com/support/docview.wss?uid=swg21989542
- https://www-01.ibm.com/support/docview.wss?uid=swg21988706
- https://www-01.ibm.com/support/docview.wss?uid=swg21986956
- https://www-01.ibm.com/support/docview.wss?uid=swg21985122
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1024157
- https://github.com/ntp-project/ntp/commit/52e977d79a0c4ace997e5c74af429844da2f27be
- https://bugzilla.redhat.com/show_bug.cgi?id=1254544
- http://www.ubuntu.com/usn/USN-2783-1
- http://www.securityfocus.com/bid/76474
- http://www.openwall.com/lists/oss-security/2015/08/25/3
- http://www.debian.org/security/2015/dsa-3388
- http://rhn.redhat.com/errata/RHSA-2016-2583.html
- http://rhn.redhat.com/errata/RHSA-2016-0780.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166992.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169167.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5300: The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the…
Published: 2017-07-21T14:29:00 Last Modified: 2018-10-30T16:27:00
Summary
The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
Common Weakness Enumeration (CWE): CWE-361: 7PK - Time and State
CWE Description: This category represents one of the phyla in the Seven Pernicious Kingdoms vulnerability classification. It includes weaknesses related to the improper management of time and state in an environment that supports simultaneous or near-simultaneous computation by multiple systems, processes, or threads. According to the authors of the Seven Pernicious Kingdoms, “Distributed computation is about time and state. That is, in order for more than one component to communicate, state must be shared, and all that takes time. Most programmers anthropomorphize their work. They think about one thread of control carrying out the entire program in the same way they would if they had to do the job themselves. Modern computers, however, switch between tasks very quickly, and in multi-core, multi-CPU, or distributed systems, two events may take place at exactly the same time. Defects rush to fill the gap between the programmer’s model of how a program executes and what happens in reality. These defects are related to unexpected interactions between threads, processes, time, and information. These interactions happen through shared state: semaphores, variables, the file system, and, basically, anything that can store information.”
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5300 vulnerability.
References
- https://www-01.ibm.com/support/docview.wss?uid=swg21983506
- https://www-01.ibm.com/support/docview.wss?uid=swg21983501
- https://www-01.ibm.com/support/docview.wss?uid=swg21980676
- https://www-01.ibm.com/support/docview.wss?uid=swg21979393
- https://www-01.ibm.com/support/docview.wss?uid=ssg1S1005821
- https://www-01.ibm.com/support/docview.wss?uid=nas8N1021264
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1024073
- https://www-01.ibm.com/support/docview.wss?uid=isg3T1023885
- https://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- https://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- https://www.ibm.com/support/home/docdisplay?lndocid=migr-5099428
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:02.ntp.asc
- https://www.cs.bu.edu/~goldbe/NTPattack.html
- https://support.citrix.com/article/CTX220112
- https://ics-cert.us-cert.gov/advisories/ICSA-15-356-01
- https://bugzilla.redhat.com/show_bug.cgi?id=1271076
- https://bto.bluecoat.com/security-advisory/sa113
- http://www.ubuntu.com/usn/USN-2783-1
- http://www.securitytracker.com/id/1034670
- http://www.securityfocus.com/bid/77312
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.debian.org/security/2015/dsa-3388
- http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p5_Securit
- http://support.ntp.org/bin/view/Main/NtpBug2956
- http://seclists.org/bugtraq/2016/Feb/164
- http://rhn.redhat.com/errata/RHSA-2015-1930.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170926.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170684.html
- http://aix.software.ibm.com/aix/efixes/security/ntp_advisory5.asc
- https://security.netapp.com/advisory/ntap-20171004-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-10978: An FR-GV-201 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows “Read / write…
Published: 2017-07-17T17:29:00 Last Modified: 2019-07-03T16:49:00
Summary
An FR-GV-201 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows “Read / write overflow in make_secret()” and a denial of service.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-10978 vulnerability.
References
- http://freeradius.org/security/fuzzer-2017.html
- http://www.securitytracker.com/id/1038914
- http://www.securityfocus.com/bid/99893
- http://www.debian.org/security/2017/dsa-3930
- https://access.redhat.com/errata/RHSA-2017:2389
- https://access.redhat.com/errata/RHSA-2017:1759
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-6312: The mod_dontdothat component of the mod_dav_svn Apache module in Subversion as packaged in Red…
Published: 2017-07-17T13:18:00 Last Modified: 2017-07-26T17:43:00
Summary
The mod_dontdothat component of the mod_dav_svn Apache module in Subversion as packaged in Red Hat Enterprise Linux 5.11 does not properly detect recursion during entity expansion, which allows remote authenticated users with access to the webdav repository to cause a denial of service (memory consumption and httpd crash). NOTE: Exists as a regression to CVE-2009-1955.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-6312 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3099: Adobe Flash Player versions 26.0.0.131 and earlier have an exploitable memory corruption…
Published: 2017-07-17T13:18:00 Last Modified: 2021-11-23T20:41:00
Summary
Adobe Flash Player versions 26.0.0.131 and earlier have an exploitable memory corruption vulnerability in the Action Script 3 raster data model. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3099 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-21.html
- http://www.securitytracker.com/id/1038845
- http://www.securityfocus.com/bid/99520
- https://security.gentoo.org/glsa/201707-15
- https://access.redhat.com/errata/RHSA-2017:1731
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3100: Adobe Flash Player versions 26.0.0.131 and earlier have an exploitable memory corruption…
Published: 2017-07-17T13:18:00 Last Modified: 2021-11-23T20:31:00
Summary
Adobe Flash Player versions 26.0.0.131 and earlier have an exploitable memory corruption vulnerability in the Action Script 2 BitmapData class. Successful exploitation could lead to memory address disclosure.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3100 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-21.html
- http://www.securitytracker.com/id/1038845
- http://www.securityfocus.com/bid/99523
- https://security.gentoo.org/glsa/201707-15
- https://access.redhat.com/errata/RHSA-2017:1731
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-1000050: JasPer 2.0.12 is vulnerable to a NULL pointer exception in the function jp2_encode which failed…
Published: 2017-07-17T13:18:00 Last Modified: 2021-02-22T14:20:00
Summary
JasPer 2.0.12 is vulnerable to a NULL pointer exception in the function jp2_encode which failed to check to see if the image contained at least one component resulting in a denial-of-service.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-1000050 vulnerability.
References
- http://www.securityfocus.com/bid/96595
- http://www.openwall.com/lists/oss-security/2017/03/06/1
- https://usn.ubuntu.com/3693-1/
- https://access.redhat.com/errata/RHSA-2018:3253
- https://access.redhat.com/errata/RHSA-2018:3505
- https://security.gentoo.org/glsa/201908-03
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3080: Adobe Flash Player versions 26.0.0.131 and earlier have a security bypass vulnerability related…
Published: 2017-07-17T13:18:00 Last Modified: 2021-11-26T19:08:00
Summary
Adobe Flash Player versions 26.0.0.131 and earlier have a security bypass vulnerability related to the Flash API used by Internet Explorer. Successful exploitation could lead to information disclosure.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3080 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-21.html
- http://www.securitytracker.com/id/1038845
- http://www.securityfocus.com/bid/99519
- https://security.gentoo.org/glsa/201707-15
- https://access.redhat.com/errata/RHSA-2017:1731
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-9788: In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in…
Published: 2017-07-13T16:29:00 Last Modified: 2021-06-06T11:15:00
Summary
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type ‘Digest’ was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no ‘=’ assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-9788 vulnerability.
References
- https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_22.html
- http://www.securitytracker.com/id/1038906
- http://www.securityfocus.com/bid/99569
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- https://security.gentoo.org/glsa/201710-32
- http://www.debian.org/security/2017/dsa-3913
- https://security.netapp.com/advisory/ntap-20170911-0002/
- https://support.apple.com/HT208221
- https://access.redhat.com/errata/RHSA-2017:3240
- https://access.redhat.com/errata/RHSA-2017:3239
- https://access.redhat.com/errata/RHSA-2017:3195
- https://access.redhat.com/errata/RHSA-2017:3194
- https://access.redhat.com/errata/RHSA-2017:3193
- https://access.redhat.com/errata/RHSA-2017:3114
- https://access.redhat.com/errata/RHSA-2017:3113
- https://access.redhat.com/errata/RHSA-2017:2710
- https://access.redhat.com/errata/RHSA-2017:2709
- https://access.redhat.com/errata/RHSA-2017:2708
- https://access.redhat.com/errata/RHSA-2017:2483
- https://access.redhat.com/errata/RHSA-2017:2479
- https://access.redhat.com/errata/RHSA-2017:2478
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
- https://www.tenable.com/security/tns-2019-09
- https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-9953: There is an invalid free in Image::printIFDStructure that leads to a Segmentation fault in Exiv2…
Published: 2017-06-26T23:29:00 Last Modified: 2017-06-30T16:11:00
Summary
There is an invalid free in Image::printIFDStructure that leads to a Segmentation fault in Exiv2 0.26. A crafted input will lead to a remote denial of service attack.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-9953 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-9775: Stack buffer overflow in GfxState.cc in pdftocairo in Poppler before 0.56 allows remote attackers…
Published: 2017-06-22T21:29:00 Last Modified: 2019-03-12T17:25:00
Summary
Stack buffer overflow in GfxState.cc in pdftocairo in Poppler before 0.56 allows remote attackers to cause a denial of service (application crash) via a crafted PDF document.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-9775 vulnerability.
References
- https://bugs.freedesktop.org/show_bug.cgi?id=101540
- http://www.securityfocus.com/bid/99241
- https://access.redhat.com/errata/RHSA-2017:2551
- https://www.debian.org/security/2018/dsa-4079
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-9776: Integer overflow leading to Heap buffer overflow in JBIG2Stream.cc in pdftocairo in Poppler…
Published: 2017-06-22T21:29:00 Last Modified: 2019-03-12T17:27:00
Summary
Integer overflow leading to Heap buffer overflow in JBIG2Stream.cc in pdftocairo in Poppler before 0.56 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-9776 vulnerability.
References
- https://bugs.freedesktop.org/show_bug.cgi?id=101541
- http://www.securityfocus.com/bid/99240
- https://access.redhat.com/errata/RHSA-2017:2551
- https://access.redhat.com/errata/RHSA-2017:2550
- https://www.debian.org/security/2018/dsa-4079
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3167: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by…
Published: 2017-06-20T01:29:00 Last Modified: 2021-06-06T11:15:00
Summary
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3167 vulnerability.
References
- https://lists.apache.org/thread.html/8409e41a8f7dd9ded37141c38df001be930115428c3d64f70bbdb8b4@%3Cdev.httpd.apache.org%3E
- http://www.securityfocus.com/bid/99135
- http://www.securitytracker.com/id/1038711
- https://www.nomachine.com/SU08O00185
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- https://security.gentoo.org/glsa/201710-32
- http://www.debian.org/security/2017/dsa-3896
- https://support.apple.com/HT208221
- https://access.redhat.com/errata/RHSA-2017:3195
- https://access.redhat.com/errata/RHSA-2017:3194
- https://access.redhat.com/errata/RHSA-2017:3193
- https://access.redhat.com/errata/RHSA-2017:3477
- https://access.redhat.com/errata/RHSA-2017:3476
- https://access.redhat.com/errata/RHSA-2017:3475
- https://access.redhat.com/errata/RHSA-2017:2483
- https://access.redhat.com/errata/RHSA-2017:2479
- https://access.redhat.com/errata/RHSA-2017:2478
- https://security.netapp.com/advisory/ntap-20180601-0002/
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
- https://www.tenable.com/security/tns-2019-09
- https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-1000366: glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate…
Published: 2017-06-19T16:29:00 Last Modified: 2020-10-15T13:28:00
Summary
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 3)
Code designed for conducting penetration testing on CVE-2017-1000366 vulnerability.
- Linux Kernel (Debian 7/8/9/10 / Fedora 23/24/25 / CentOS 5.3/5.11/6.0/6.8/7.2.1511) - 'ldso_hwcap Stack Clash' Local Privilege Escalation by Qualys Corporation at 2017-06-28
- Linux Kernel (Debian 7.7/8.5/9.0 / Ubuntu 14.04.2/16.04.2/17.04 / Fedora 22/25 / CentOS 7.3.1611) - 'ldso_hwcap_64 Stack Clash' Local Privilege Escalation by Qualys Corporation at 2017-06-28
- Linux Kernel (Debian 9/10 / Ubuntu 14.04.5/16.04.2/17.04 / Fedora 23/24/25) - 'ldso_dynamic Stack Clash' Local Privilege Escalation by Qualys Corporation at 2017-06-28
References
- https://www.suse.com/support/kb/doc/?id=7020973
- https://www.suse.com/security/cve/CVE-2017-1000366/
- https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
- https://access.redhat.com/security/cve/CVE-2017-1000366
- http://www.securityfocus.com/bid/99127
- https://security.gentoo.org/glsa/201706-19
- http://www.securitytracker.com/id/1038712
- https://www.exploit-db.com/exploits/42276/
- https://www.exploit-db.com/exploits/42275/
- https://www.exploit-db.com/exploits/42274/
- https://kc.mcafee.com/corporate/index?page=content&id=SB10205
- http://www.debian.org/security/2017/dsa-3887
- https://access.redhat.com/errata/RHSA-2017:1712
- https://access.redhat.com/errata/RHSA-2017:1567
- https://access.redhat.com/errata/RHSA-2017:1481
- https://access.redhat.com/errata/RHSA-2017:1480
- https://access.redhat.com/errata/RHSA-2017:1479
- http://seclists.org/fulldisclosure/2019/Sep/7
- https://seclists.org/bugtraq/2019/Sep/7
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-1000376: libffi requests an executable stack allowing attackers to more easily trigger arbitrary code…
Published: 2017-06-19T16:29:00 Last Modified: 2020-01-15T20:15:00
Summary
libffi requests an executable stack allowing attackers to more easily trigger arbitrary code execution by overwriting the stack. Please note that libffi is used by a number of other libraries. It was previously stated that this affects libffi version 3.2.1 but this appears to be incorrect. libffi prior to version 3.1 on 32 bit x86 systems was vulnerable, and upstream is believed to have fixed this issue in version 3.1.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2017-1000376 vulnerability.
References
- https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
- https://access.redhat.com/security/cve/CVE-2017-1000376
- http://www.debian.org/security/2017/dsa-3889
- https://www.oracle.com/security-alerts/cpujan2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3099: mod_ns in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat…
Published: 2017-06-08T19:29:00 Last Modified: 2017-06-16T14:23:00
Summary
mod_ns in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to force the use of ciphers that were not intended to be enabled.
Common Weakness Enumeration (CWE): CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CWE Description: The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-3099 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1319052
- http://rhn.redhat.com/errata/RHSA-2016-2602.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184345.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183129.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183102.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4992: 389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux…
Published: 2017-06-08T19:29:00 Last Modified: 2017-06-16T14:23:00
Summary
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to infer the existence of RDN component objects.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4992 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1347760
- http://rhn.redhat.com/errata/RHSA-2016-2765.html
- http://rhn.redhat.com/errata/RHSA-2016-2594.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5405: 389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux…
Published: 2017-06-08T19:29:00 Last Modified: 2017-06-16T14:27:00
Summary
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to obtain user passwords.
Common Weakness Enumeration (CWE): CWE-199: Information Management Errors
CWE Description: Weaknesses in this category are related to improper handling of sensitive information.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5405 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1358865
- http://www.securityfocus.com/bid/93884
- http://rhn.redhat.com/errata/RHSA-2016-2765.html
- http://rhn.redhat.com/errata/RHSA-2016-2594.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5416: 389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux…
Published: 2017-06-08T19:29:00 Last Modified: 2019-04-16T20:30:00
Summary
389 Directory Server in Red Hat Enterprise Linux Desktop 6 through 7, Red Hat Enterprise Linux HPC Node 6 through 7, Red Hat Enterprise Linux Server 6 through 7, and Red Hat Enterprise Linux Workstation 6 through 7 allows remote attackers to read the default Access Control Instructions.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5416 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1349540
- http://rhn.redhat.com/errata/RHSA-2016-2765.html
- http://rhn.redhat.com/errata/RHSA-2016-2594.html
- http://www.securityfocus.com/bid/99097
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7050: SerializableProvider in RESTEasy in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux…
Published: 2017-06-08T19:29:00 Last Modified: 2017-06-16T12:03:00
Summary
SerializableProvider in RESTEasy in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to execute arbitrary code.
Common Weakness Enumeration (CWE): CWE-502: Deserialization of Untrusted Data
CWE Description: The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7050 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-9461: smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability…
Published: 2017-06-06T21:29:00 Last Modified: 2019-10-03T00:03:00
Summary
smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.0
- CVSS: 6.8
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-9461 vulnerability.
References
- https://git.samba.org/?p=samba.git;a=commit;h=10c3e3923022485c720f322ca4f0aca5d7501310
- https://bugzilla.samba.org/show_bug.cgi?id=12572
- https://bugs.debian.org/864291
- http://www.securityfocus.com/bid/99455
- https://access.redhat.com/errata/RHSA-2017:2778
- https://access.redhat.com/errata/RHSA-2017:2338
- https://access.redhat.com/errata/RHSA-2017:1950
- https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-9462: In Mercurial before 4.1.3, “hg serve –stdio” allows remote authenticated users to launch the…
Published: 2017-06-06T21:29:00 Last Modified: 2020-02-05T18:32:00
Summary
In Mercurial before 4.1.3, “hg serve –stdio” allows remote authenticated users to launch the Python debugger, and consequently execute arbitrary code, by using –debugger as a repository name.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.0
- CVSS: 9.0
- CVSS Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-9462 vulnerability.
References
- https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.1.3_.282017-4-18.29
- https://www.mercurial-scm.org/repo/hg/rev/77eaf9539499
- https://bugs.debian.org/861243
- http://www.securityfocus.com/bid/99123
- https://security.gentoo.org/glsa/201709-18
- http://www.debian.org/security/2017/dsa-3963
- https://access.redhat.com/errata/RHSA-2017:1576
- https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5177: Use-after-free vulnerability in V8 in Google Chrome before 53.0.2785.143 allows remote attackers…
Published: 2017-05-23T04:29:00 Last Modified: 2018-10-30T16:27:00
Summary
Use-after-free vulnerability in V8 in Google Chrome before 53.0.2785.143 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via unknown vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5177 vulnerability.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UNUTOWCXLWVXOTGQUS53DSRVTO3J226Z/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6FWZVE5PX27FWPLGOPDA7ZC5MILOWN6K/
- https://chromereleases.googleblog.com/2016/09/stable-channel-update-for-desktop_29.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1380631
- http://www.securitytracker.com/id/1036970
- http://www.securityfocus.com/bid/93238
- http://www.debian.org/security/2016/dsa-3683
- http://rhn.redhat.com/errata/RHSA-2016-2007.html
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00000.html
- https://security.gentoo.org/glsa/201610-09
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5178: Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.143 allow remote attackers…
Published: 2017-05-23T04:29:00 Last Modified: 2018-10-30T16:27:00
Summary
Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.143 allow remote attackers to cause a denial of service or possibly have other impact via unknown vectors.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5178 vulnerability.
References
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UNUTOWCXLWVXOTGQUS53DSRVTO3J226Z/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6FWZVE5PX27FWPLGOPDA7ZC5MILOWN6K/
- https://chromereleases.googleblog.com/2016/09/stable-channel-update-for-desktop_29.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1380632
- https://bugs.chromium.org/p/chromium/issues/detail?id=651092
- https://bugs.chromium.org/p/chromium/issues/detail?id=645028
- http://www.securitytracker.com/id/1036970
- http://www.securityfocus.com/bid/93238
- http://www.debian.org/security/2016/dsa-3683
- http://rhn.redhat.com/errata/RHSA-2016-2007.html
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2016-10/msg00000.html
- https://security.gentoo.org/glsa/201610-09
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3068: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption…
Published: 2017-05-09T16:29:00 Last Modified: 2021-11-23T21:03:00
Summary
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the Advanced Video Coding engine. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2017-3068 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
- http://www.securityfocus.com/bid/98349
- https://security.gentoo.org/glsa/201705-12
- http://www.securitytracker.com/id/1038427
- https://www.exploit-db.com/exploits/42017/
- https://access.redhat.com/errata/RHSA-2017:1219
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3070: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption…
Published: 2017-05-09T16:29:00 Last Modified: 2021-11-26T19:05:00
Summary
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the ConvolutionFilter class. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3070 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
- http://www.securityfocus.com/bid/98349
- https://security.gentoo.org/glsa/201705-12
- http://www.securitytracker.com/id/1038427
- https://access.redhat.com/errata/RHSA-2017:1219
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3072: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption…
Published: 2017-05-09T16:29:00 Last Modified: 2021-11-26T19:10:00
Summary
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BitmapData class. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3072 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
- http://www.securityfocus.com/bid/98349
- https://security.gentoo.org/glsa/201705-12
- http://www.securitytracker.com/id/1038427
- https://access.redhat.com/errata/RHSA-2017:1219
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3073: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free…
Published: 2017-05-09T16:29:00 Last Modified: 2021-11-26T19:07:00
Summary
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when handling multiple mask properties of display objects, aka memory corruption. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3073 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
- http://www.securityfocus.com/bid/98349
- https://security.gentoo.org/glsa/201705-12
- http://www.securitytracker.com/id/1038427
- https://access.redhat.com/errata/RHSA-2017:1219
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3074: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption…
Published: 2017-05-09T16:29:00 Last Modified: 2021-11-26T19:07:00
Summary
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the Graphics class. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3074 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
- http://www.securityfocus.com/bid/98349
- https://security.gentoo.org/glsa/201705-12
- http://www.securitytracker.com/id/1038427
- https://access.redhat.com/errata/RHSA-2017:1219
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3071: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free…
Published: 2017-05-09T16:29:00 Last Modified: 2021-11-26T19:09:00
Summary
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when masking display objects. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3071 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
- http://www.securityfocus.com/bid/98347
- https://security.gentoo.org/glsa/201705-12
- http://www.securitytracker.com/id/1038427
- https://access.redhat.com/errata/RHSA-2017:1219
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3069: Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption…
Published: 2017-05-09T16:29:00 Last Modified: 2021-11-26T18:53:00
Summary
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BlendMode class. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3069 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
- http://www.securityfocus.com/bid/98349
- https://security.gentoo.org/glsa/201705-12
- http://www.securitytracker.com/id/1038427
- https://access.redhat.com/errata/RHSA-2017:1219
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3600: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump)….
Published: 2017-04-24T19:59:00 Last Modified: 2019-10-03T00:03:00
Summary
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).
Scores
- Impact Score: 6.4
- Exploitability Score: 6.8
- CVSS: 6.0
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3600 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.securityfocus.com/bid/97765
- http://www.securitytracker.com/id/1038287
- http://www.debian.org/security/2017/dsa-3834
- https://access.redhat.com/errata/RHSA-2017:2886
- https://access.redhat.com/errata/RHSA-2017:2787
- https://access.redhat.com/errata/RHSA-2017:2192
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3464: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL)….
Published: 2017-04-24T19:59:00 Last Modified: 2019-10-03T00:03:00
Summary
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily “exploitable” vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3464 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.securityfocus.com/bid/97818
- http://www.securitytracker.com/id/1038287
- http://www.debian.org/security/2017/dsa-3834
- http://www.debian.org/security/2017/dsa-3944
- https://access.redhat.com/errata/RHSA-2017:2886
- https://access.redhat.com/errata/RHSA-2017:2787
- https://access.redhat.com/errata/RHSA-2017:2192
- https://access.redhat.com/errata/RHSA-2018:0279
- https://access.redhat.com/errata/RHSA-2018:0574
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3533: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2017-04-24T19:59:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3533 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.securityfocus.com/bid/97740
- https://security.gentoo.org/glsa/201705-03
- https://security.gentoo.org/glsa/201707-01
- http://www.securitytracker.com/id/1038286
- http://www.debian.org/security/2017/dsa-3858
- https://access.redhat.com/errata/RHSA-2017:3453
- https://access.redhat.com/errata/RHSA-2017:1222
- https://access.redhat.com/errata/RHSA-2017:1221
- https://access.redhat.com/errata/RHSA-2017:1220
- https://access.redhat.com/errata/RHSA-2017:1204
- https://access.redhat.com/errata/RHSA-2017:1119
- https://access.redhat.com/errata/RHSA-2017:1118
- https://access.redhat.com/errata/RHSA-2017:1117
- https://access.redhat.com/errata/RHSA-2017:1109
- https://access.redhat.com/errata/RHSA-2017:1108
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3544: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE…
Published: 2017-04-24T19:59:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3544 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.securityfocus.com/bid/97745
- https://security.gentoo.org/glsa/201705-03
- https://security.gentoo.org/glsa/201707-01
- http://www.securitytracker.com/id/1038286
- https://source.android.com/security/bulletin/2017-07-01
- http://www.debian.org/security/2017/dsa-3858
- https://access.redhat.com/errata/RHSA-2017:3453
- https://access.redhat.com/errata/RHSA-2017:1222
- https://access.redhat.com/errata/RHSA-2017:1221
- https://access.redhat.com/errata/RHSA-2017:1220
- https://access.redhat.com/errata/RHSA-2017:1204
- https://access.redhat.com/errata/RHSA-2017:1119
- https://access.redhat.com/errata/RHSA-2017:1118
- https://access.redhat.com/errata/RHSA-2017:1117
- https://access.redhat.com/errata/RHSA-2017:1109
- https://access.redhat.com/errata/RHSA-2017:1108
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3539: Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent:…
Published: 2017-04-24T19:59:00 Last Modified: 2020-09-08T12:59:00
Summary
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:N/AC:H/Au:S/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3539 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.securityfocus.com/bid/97752
- https://security.gentoo.org/glsa/201705-03
- https://security.gentoo.org/glsa/201707-01
- http://www.securitytracker.com/id/1038286
- http://www.debian.org/security/2017/dsa-3858
- https://access.redhat.com/errata/RHSA-2017:3453
- https://access.redhat.com/errata/RHSA-2017:1222
- https://access.redhat.com/errata/RHSA-2017:1221
- https://access.redhat.com/errata/RHSA-2017:1220
- https://access.redhat.com/errata/RHSA-2017:1204
- https://access.redhat.com/errata/RHSA-2017:1119
- https://access.redhat.com/errata/RHSA-2017:1118
- https://access.redhat.com/errata/RHSA-2017:1117
- https://access.redhat.com/errata/RHSA-2017:1109
- https://access.redhat.com/errata/RHSA-2017:1108
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0720: Cross-site request forgery (CSRF) vulnerability in pcsd web UI in pcs before 0.9.149.
Published: 2017-04-21T15:59:00 Last Modified: 2017-04-27T13:26:00
Summary
Cross-site request forgery (CSRF) vulnerability in pcsd web UI in pcs before 0.9.149.
Common Weakness Enumeration (CWE): CWE-352: Cross-Site Request Forgery (CSRF)
CWE Description: The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0720 vulnerability.
References
- https://github.com/ClusterLabs/pcs/commit/b9e7f061788c3b86a0c67d2d4158f067ec5eb625
- https://bugzilla.redhat.com/show_bug.cgi?id=1299614
- http://rhn.redhat.com/errata/RHSA-2016-2596.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178384.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178261.html
- http://www.securityfocus.com/bid/97984
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0721: Session fixation vulnerability in pcsd in pcs before 0.9.157.
Published: 2017-04-21T15:59:00 Last Modified: 2017-04-27T16:15:00
Summary
Session fixation vulnerability in pcsd in pcs before 0.9.157.
Common Weakness Enumeration (CWE): CWE-384: Session Fixation
CWE Description: Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0721 vulnerability.
References
- https://github.com/ClusterLabs/pcs/commit/e9b28833d54a47ec441f6dbad0db96e1fc662a5b
- https://github.com/ClusterLabs/pcs/commit/bc6ad9086857559db57f4e3e6de66762291c0774
- https://github.com/ClusterLabs/pcs/commit/acdbbe8307e6f4a36b2c7754765e732e43fe8d17
- https://bugzilla.redhat.com/show_bug.cgi?id=1299615
- http://rhn.redhat.com/errata/RHSA-2016-2596.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178384.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178261.html
- http://www.securityfocus.com/bid/97977
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5410: firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify…
Published: 2017-04-19T14:59:00 Last Modified: 2017-04-25T14:59:00
Summary
firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-5410 vulnerability.
References
- https://security.gentoo.org/glsa/201701-70
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJMYLGRVKIPJEI3VZJ4WQZT7FBQ5BKO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPM3GUQRU2KPRXDEQLAMCDQEAIARJSBT/
- https://bugzilla.redhat.com/show_bug.cgi?id=1360135
- http://www.securityfocus.com/bid/92481
- http://www.openwall.com/lists/oss-security/2016/08/16/3
- http://www.firewalld.org/2016/08/firewalld-0-4-3-3-release
- http://rhn.redhat.com/errata/RHSA-2016-2597.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5645: In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to…
Published: 2017-04-17T21:59:00 Last Modified: 2022-02-07T16:15:00
Summary
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
Common Weakness Enumeration (CWE): CWE-502: Deserialization of Untrusted Data
CWE Description: The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5645 vulnerability.
References
- https://issues.apache.org/jira/browse/LOG4J2-1863
- http://www.securityfocus.com/bid/97702
- https://access.redhat.com/errata/RHSA-2017:3244
- https://access.redhat.com/errata/RHSA-2017:2889
- https://access.redhat.com/errata/RHSA-2017:2888
- https://access.redhat.com/errata/RHSA-2017:2811
- https://access.redhat.com/errata/RHSA-2017:2810
- https://access.redhat.com/errata/RHSA-2017:2809
- https://access.redhat.com/errata/RHSA-2017:2808
- https://access.redhat.com/errata/RHSA-2017:3400
- https://access.redhat.com/errata/RHSA-2017:3399
- https://access.redhat.com/errata/RHSA-2017:2638
- https://access.redhat.com/errata/RHSA-2017:2637
- https://access.redhat.com/errata/RHSA-2017:2636
- https://access.redhat.com/errata/RHSA-2017:2635
- https://access.redhat.com/errata/RHSA-2017:2633
- https://access.redhat.com/errata/RHSA-2017:2423
- https://access.redhat.com/errata/RHSA-2017:1802
- https://access.redhat.com/errata/RHSA-2017:1801
- https://access.redhat.com/errata/RHSA-2017:1417
- http://www.securitytracker.com/id/1040200
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- https://security.netapp.com/advisory/ntap-20180726-0002/
- http://www.securitytracker.com/id/1041294
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://security.netapp.com/advisory/ntap-20181107-0002/
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://access.redhat.com/errata/RHSA-2019:1545
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E
- https://lists.apache.org/thread.html/e8fb7d76a244ee997ba4b217d6171227f7c2521af8c7c5b16cba27bc@%3Cdev.logging.apache.org%3E
- https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125@%3Cdev.logging.apache.org%3E
- https://lists.apache.org/thread.html/84cc4266238e057b95eb95dfd8b29d46a2592e7672c12c92f68b2917@%3Cannounce.apache.org%3E
- http://www.openwall.com/lists/oss-security/2019/12/19/2
- https://lists.apache.org/thread.html/0dcca05274d20ef2d72584edcf8c917bbb13dbbd7eb35cae909d02e9@%3Cdev.logging.apache.org%3E
- https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c@%3Cdev.tika.apache.org%3E
- https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1@%3Cdev.tika.apache.org%3E
- https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6@%3Cdev.tika.apache.org%3E
- https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f@%3Cdev.tika.apache.org%3E
- https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8@%3Cdev.tika.apache.org%3E
- https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7@%3Cdev.tika.apache.org%3E
- https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1@%3Cdev.tika.apache.org%3E
- https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60@%3Cdev.tika.apache.org%3E
- https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26@%3Cdev.tika.apache.org%3E
- https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5@%3Cdev.tika.apache.org%3E
- https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2@%3Cdev.tika.apache.org%3E
- https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad@%3Cdev.tika.apache.org%3E
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf@%3Cissues.activemq.apache.org%3E
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://lists.apache.org/thread.html/ra9a682bc0a8dff1c5cefdef31c7c25f096d9121207cf2d74e2fc563d@%3Ccommits.logging.apache.org%3E
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://lists.apache.org/thread.html/rcbb79023a7c8494cb389cd3d95420fa9e0d531ece0b780b8c1f99422@%3Ccommits.doris.apache.org%3E
- https://lists.apache.org/thread.html/r0831e2e52a390758ce39a6193f82c11c295175adce6e6307de28c287@%3Cissues.beam.apache.org%3E
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://lists.apache.org/thread.html/rbfa7a0742be4981a3f9356a23d0e1a5f2e1eabde32a1a3d8e41420f8@%3Cgithub.beam.apache.org%3E
- https://lists.apache.org/thread.html/r23369fd603eb6d62d3b883a0a28d12052dcbd1d6d531137124cd7f83@%3Cgithub.beam.apache.org%3E
- https://lists.apache.org/thread.html/r9d5c1b558a15d374bd5abd2d3ae3ca7e50e796a0efdcf91e9c5b4cdd@%3Cgithub.beam.apache.org%3E
- https://lists.apache.org/thread.html/r94b5aae09c4bcff5d06cf641be17b00bd83ba7e10cad737bf16a1b8f@%3Cgithub.beam.apache.org%3E
- https://lists.apache.org/thread.html/rdbd579dc223f06af826d7de340218ee2f80d8b43fa7e4decb2a63f44@%3Cgithub.beam.apache.org%3E
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4455: The Subscription Manager package (aka subscription-manager) before 1.17.7-1 for Candlepin uses…
Published: 2017-04-14T18:59:00 Last Modified: 2020-09-02T19:10:00
Summary
The Subscription Manager package (aka subscription-manager) before 1.17.7-1 for Candlepin uses weak permissions (755) for subscription-manager cache directories, which allows local users to obtain sensitive information by reading files in the directories.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-4455 vulnerability.
References
- https://github.com/candlepin/subscription-manager/commit/9dec31
- https://github.com/candlepin/subscription-manager/blob/subscription-manager-1.17.7-1/subscription-manager.spec
- https://bugzilla.redhat.com/show_bug.cgi?id=1340525
- http://www.securitytracker.com/id/1038083
- http://www.securityfocus.com/bid/93926
- http://www.openwall.com/lists/oss-security/2016/10/26/5
- http://rhn.redhat.com/errata/RHSA-2017-0698.html
- http://rhn.redhat.com/errata/RHSA-2016-2592.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-6489: The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys…
Published: 2017-04-14T18:59:00 Last Modified: 2020-11-16T20:20:00
Summary
The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
Common Weakness Enumeration (CWE): CWE-203: Observable Discrepancy
CWE Description: The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-6489 vulnerability.
References
- https://git.lysator.liu.se/nettle/nettle/commit/3fe1d6549765ecfb24f0b80b2ed086fdc818bff3
- https://eprint.iacr.org/2016/596.pdf
- https://bugzilla.redhat.com/show_bug.cgi?id=1362016
- http://www.ubuntu.com/usn/USN-3193-1
- http://www.openwall.com/lists/oss-security/2016/07/29/7
- http://rhn.redhat.com/errata/RHSA-2016-2582.html
- https://security.gentoo.org/glsa/201706-21
- https://www.oracle.com/security-alerts/cpuapr2020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4459: Stack-based buffer overflow in native/mod_manager/node.c in mod_cluster 1.2.9.
Published: 2017-04-12T20:59:00 Last Modified: 2019-04-22T17:48:00
Summary
Stack-based buffer overflow in native/mod_manager/node.c in mod_cluster 1.2.9.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4459 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1341583
- https://access.redhat.com/errata/RHSA-2017:0194
- https://access.redhat.com/errata/RHSA-2017:0193
- http://www.securityfocus.com/bid/93555
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://rhn.redhat.com/errata/RHSA-2016-2055.html
- http://rhn.redhat.com/errata/RHSA-2016-2054.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4444: The allow_execmod plugin for setroubleshoot before 3.2.23 allows local users to execute arbitrary…
Published: 2017-04-11T18:59:00 Last Modified: 2017-04-17T12:47:00
Summary
The allow_execmod plugin for setroubleshoot before 3.2.23 allows local users to execute arbitrary commands by triggering an execmod SELinux denial with a crafted binary filename, related to the commands.getstatusoutput function.
Common Weakness Enumeration (CWE): CWE-77: Improper Neutralization of Special Elements used in a Command (‘Command Injection’)
CWE Description: The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-4444 vulnerability.
References
- https://rhn.redhat.com/errata/RHSA-2016-1267.html
- https://github.com/fedora-selinux/setroubleshoot/commit/5cd60033ea7f5bdf8c19c27b23ea2d773d9b09f5
- https://bugzilla.redhat.com/show_bug.cgi?id=1332644
- https://access.redhat.com/errata/RHSA-2016:1293
- http://www.securitytracker.com/id/1036144
- http://seclists.org/oss-sec/2016/q2/575
- http://www.securityfocus.com/bid/91476
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4446: The allow_execstack plugin for setroubleshoot allows local users to execute arbitrary commands by…
Published: 2017-04-11T18:59:00 Last Modified: 2017-04-17T13:29:00
Summary
The allow_execstack plugin for setroubleshoot allows local users to execute arbitrary commands by triggering an execstack SELinux denial with a crafted filename, related to the commands.getoutput function.
Common Weakness Enumeration (CWE): CWE-77: Improper Neutralization of Special Elements used in a Command (‘Command Injection’)
CWE Description: The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-4446 vulnerability.
References
- https://rhn.redhat.com/errata/RHSA-2016-1267.html
- https://github.com/fedora-selinux/setroubleshoot/commit/eaccf4c0d20a27d3df5ff6de8c9dcc80f6f40718
- https://bugzilla.redhat.com/show_bug.cgi?id=1339250
- https://access.redhat.com/errata/RHSA-2016:1293
- http://www.securitytracker.com/id/1036144
- http://seclists.org/oss-sec/2016/q2/575
- http://www.securityfocus.com/bid/91427
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4445: The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to…
Published: 2017-04-11T18:59:00 Last Modified: 2017-04-17T13:16:00
Summary
The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.
Common Weakness Enumeration (CWE): CWE-77: Improper Neutralization of Special Elements used in a Command (‘Command Injection’)
CWE Description: The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-4445 vulnerability.
References
- https://rhn.redhat.com/errata/RHSA-2016-1267.html
- https://github.com/fedora-selinux/setroubleshoot/commit/2d12677629ca319310f6263688bb1b7f676c01b7
- https://bugzilla.redhat.com/show_bug.cgi?id=1339183
- http://www.securitytracker.com/id/1036144
- http://seclists.org/oss-sec/2016/q2/575
- http://www.securityfocus.com/bid/91430
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4989: setroubleshoot allows local users to bypass an intended container protection mechanism and…
Published: 2017-04-11T18:59:00 Last Modified: 2017-04-17T16:36:00
Summary
setroubleshoot allows local users to bypass an intended container protection mechanism and execute arbitrary commands by (1) triggering an SELinux denial with a crafted file name, which is handled by the _set_tpath function in audit_data.py or via a crafted (2) local_id or (3) analysis_id field in a crafted XML document to the run_fix function in SetroubleshootFixit.py, related to the subprocess.check_output and commands.getstatusoutput functions, a different vulnerability than CVE-2016-4445.
Common Weakness Enumeration (CWE): CWE-77: Improper Neutralization of Special Elements used in a Command (‘Command Injection’)
CWE Description: The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-4989 vulnerability.
References
- https://rhn.redhat.com/errata/RHSA-2016-1267.html
- https://github.com/fedora-selinux/setroubleshoot/commit/e69378d7e82a503534d29c5939fa219341e8f2ad
- https://github.com/fedora-selinux/setroubleshoot/commit/dda55aa50db95a25f0d919c3a0d5871827cdc40f
- https://bugzilla.redhat.com/show_bug.cgi?id=1346461
- https://access.redhat.com/errata/RHSA-2016:1293
- http://securitytracker.com/id/1036144
- http://seclists.org/oss-sec/2016/q2/574
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5011: The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows…
Published: 2017-04-11T15:59:00 Last Modified: 2020-09-11T15:22:00
Summary
The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-5011 vulnerability.
References
- https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543
- http://www.securitytracker.com/id/1036272
- http://www.securityfocus.com/bid/91683
- http://www.openwall.com/lists/oss-security/2016/07/11/2
- http://rhn.redhat.com/errata/RHSA-2016-2605.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7797: Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a…
Published: 2017-03-24T15:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Pacemaker before 1.1.15, when using pacemaker remote, might allow remote attackers to cause a denial of service (node disconnection) via an unauthenticated connection.
Common Weakness Enumeration (CWE): CWE-254: 7PK - Security Features
CWE Description: Software security is not security software. Here we’re concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7797 vulnerability.
References
- https://github.com/ClusterLabs/pacemaker/commit/5ec24a2642bd0854b884d1a9b51d12371373b410
- http://www.securityfocus.com/bid/93261
- http://www.openwall.com/lists/oss-security/2016/10/01/1
- http://rhn.redhat.com/errata/RHSA-2016-2578.html
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00077.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00038.html
- http://bugs.clusterlabs.org/show_bug.cgi?id=5269
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-8896: Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers…
Published: 2017-03-15T19:59:00 Last Modified: 2021-04-28T19:58:00
Summary
Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-8896 vulnerability.
References
- https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734
- https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1448803
- http://www.openwall.com/lists/oss-security/2016/06/02/13
- http://www.openwall.com/lists/oss-security/2015/10/08/3
- http://www.openwall.com/lists/oss-security/2015/10/07/2
- http://www.securityfocus.com/bid/91027
- https://access.redhat.com/errata/RHSA-2016:1237
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-2877: ** DISPUTED ** Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not…
Published: 2017-03-03T11:59:00 Last Modified: 2020-06-04T19:29:00
Summary
** DISPUTED ** Kernel Samepage Merging (KSM) in the Linux kernel 2.6.32 through 4.x does not prevent use of a write-timing side channel, which allows guest OS users to defeat the ASLR protection mechanism on other guest OS instances via a Cross-VM ASL INtrospection (CAIN) attack. NOTE: the vendor states “Basically if you care about this attack vector, disable deduplication.” Share-until-written approaches for memory conservation among mutually untrusting tenants are inherently detectable for information disclosure, and can be classified as potentially misunderstood behaviors rather than vulnerabilities.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-2877 vulnerability.
References
- https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
- https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
- https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
- https://bugzilla.redhat.com/show_bug.cgi?id=1252096
- http://www.securityfocus.com/bid/76256
- http://www.kb.cert.org/vuls/id/935424
- http://www.antoniobarresi.com/files/cain_advisory.txt
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-6011: An issue was discovered in icoutils 0.31.1. An out-of-bounds read leading to a buffer overflow…
Published: 2017-02-16T11:59:00 Last Modified: 2019-03-12T19:43:00
Summary
An issue was discovered in icoutils 0.31.1. An out-of-bounds read leading to a buffer overflow was observed in the “simple_vec” function in the “extract.c” source file. This affects icotool.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-6011 vulnerability.
References
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854054
- http://www.securityfocus.com/bid/96267
- http://www.debian.org/security/2017/dsa-3807
- http://rhn.redhat.com/errata/RHSA-2017-0837.html
- https://security.gentoo.org/glsa/201801-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-6009: An issue was discovered in icoutils 0.31.1. A buffer overflow was observed in the…
Published: 2017-02-16T11:59:00 Last Modified: 2019-03-12T19:52:00
Summary
An issue was discovered in icoutils 0.31.1. A buffer overflow was observed in the “decode_ne_resource_id” function in the “restable.c” source file. This is happening because the “len” parameter for memcpy is not checked for size and thus becomes a negative integer in the process, resulting in a failed memcpy. This affects wrestool.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-6009 vulnerability.
References
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854050
- http://www.securityfocus.com/bid/96292
- http://www.debian.org/security/2017/dsa-3807
- http://rhn.redhat.com/errata/RHSA-2017-0837.html
- https://security.gentoo.org/glsa/201801-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-6010: An issue was discovered in icoutils 0.31.1. A buffer overflow was observed in the “extract_icons”…
Published: 2017-02-16T11:59:00 Last Modified: 2019-03-12T19:52:00
Summary
An issue was discovered in icoutils 0.31.1. A buffer overflow was observed in the “extract_icons” function in the “extract.c” source file. This issue can be triggered by processing a corrupted ico file and will result in an icotool crash.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-6010 vulnerability.
References
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854054
- http://www.securityfocus.com/bid/96288
- http://www.debian.org/security/2017/dsa-3807
- http://rhn.redhat.com/errata/RHSA-2017-0837.html
- https://security.gentoo.org/glsa/201801-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9560: Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before…
Published: 2017-02-15T19:59:00 Last Modified: 2021-03-15T22:08:00
Summary
Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9560 vulnerability.
References
- https://github.com/mdadams/jasper/commit/1abc2e5a401a4bf1d5ca4df91358ce5df111f495
- https://blogs.gentoo.org/ago/2016/11/20/jasper-stack-based-buffer-overflow-in-jpc_tsfb_getbands2-jpc_tsfb-c/
- http://www.securityfocus.com/bid/94428
- http://www.openwall.com/lists/oss-security/2016/11/23/5
- http://www.openwall.com/lists/oss-security/2016/11/20/1
- http://www.debian.org/security/2017/dsa-3785
- https://access.redhat.com/errata/RHSA-2017:1208
- https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2016-9560
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3616: The cjpeg utility in libjpeg allows remote attackers to cause a denial of service (NULL pointer…
Published: 2017-02-13T18:59:00 Last Modified: 2019-08-06T17:15:00
Summary
The cjpeg utility in libjpeg allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or execute arbitrary code via a crafted file.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-3616 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1319661
- https://bugzilla.redhat.com/show_bug.cgi?id=1318509
- https://usn.ubuntu.com/3706-1/
- https://usn.ubuntu.com/3706-2/
- https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html
- https://access.redhat.com/errata/RHSA-2019:2052
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3302: Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB…
Published: 2017-02-12T04:59:00 Last Modified: 2019-10-03T00:03:00
Summary
Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3302 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2017/02/11/11
- http://www.securityfocus.com/bid/96162
- http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
- http://www.securitytracker.com/id/1038287
- http://www.debian.org/security/2017/dsa-3834
- http://www.debian.org/security/2017/dsa-3809
- https://access.redhat.com/errata/RHSA-2017:2787
- https://access.redhat.com/errata/RHSA-2017:2192
- https://access.redhat.com/errata/RHSA-2018:0279
- https://access.redhat.com/errata/RHSA-2018:0574
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5848: The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in…
Published: 2017-02-09T15:59:00 Last Modified: 2020-11-20T18:59:00
Summary
The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in GStreamer allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors involving PSM parsing.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5848 vulnerability.
References
- https://bugzilla.gnome.org/show_bug.cgi?id=777957#c3
- http://www.securityfocus.com/bid/96001
- http://www.openwall.com/lists/oss-security/2017/02/02/9
- http://www.openwall.com/lists/oss-security/2017/02/01/7
- https://security.gentoo.org/glsa/201705-10
- http://www.debian.org/security/2017/dsa-3818
- https://access.redhat.com/errata/RHSA-2017:2060
- https://lists.debian.org/debian-lts-announce/2020/03/msg00038.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2518: The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote…
Published: 2017-01-30T21:59:00 Last Modified: 2021-06-10T13:15:00
Summary
The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-2518 vulnerability.
References
- https://www.kb.cert.org/vuls/id/718152
- http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security
- http://support.ntp.org/bin/view/Main/NtpBug3009
- http://www.securityfocus.com/bid/88226
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201607-15
- http://www.securitytracker.com/id/1035705
- http://www.debian.org/security/2016/dsa-3629
- https://security.netapp.com/advisory/ntap-20171004-0002/
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc
- https://access.redhat.com/errata/RHSA-2016:1141
- http://rhn.redhat.com/errata/RHSA-2016-1552.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html
- http://www.ubuntu.com/usn/USN-3096-1
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd
- http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html
- http://www.securityfocus.com/archive/1/538233/100/0/threaded
- http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11
- https://support.f5.com/csp/article/K20804323
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html
- https://www.debian.org/security/2016/dsa-3629
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5202: The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
Published: 2017-01-28T01:59:00 Last Modified: 2019-03-19T15:28:00
Summary
The ISO CLNS parser in tcpdump before 4.9.0 has a buffer overflow in print-isoclns.c:clnp_print().
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5202 vulnerability.
References
- https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html
- http://www.securityfocus.com/bid/95852
- https://security.gentoo.org/glsa/201702-30
- http://www.securitytracker.com/id/1037755
- http://www.debian.org/security/2017/dsa-3775
- https://access.redhat.com/errata/RHSA-2017:1871
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5204: The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print().
Published: 2017-01-28T01:59:00 Last Modified: 2019-03-19T18:46:00
Summary
The IPv6 parser in tcpdump before 4.9.0 has a buffer overflow in print-ip6.c:ip6_print().
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5204 vulnerability.
References
- https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html
- http://www.securityfocus.com/bid/95852
- https://security.gentoo.org/glsa/201702-30
- http://www.securitytracker.com/id/1037755
- http://www.debian.org/security/2017/dsa-3775
- https://access.redhat.com/errata/RHSA-2017:1871
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5205: The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in print-isakmp.c:ikev2_e_print().
Published: 2017-01-28T01:59:00 Last Modified: 2019-03-19T15:22:00
Summary
The ISAKMP parser in tcpdump before 4.9.0 has a buffer overflow in print-isakmp.c:ikev2_e_print().
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5205 vulnerability.
References
- https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html
- http://www.securityfocus.com/bid/95852
- https://security.gentoo.org/glsa/201702-30
- http://www.securitytracker.com/id/1037755
- http://www.debian.org/security/2017/dsa-3775
- https://access.redhat.com/errata/RHSA-2017:1871
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-5203: The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
Published: 2017-01-28T01:59:00 Last Modified: 2019-03-19T13:41:00
Summary
The BOOTP parser in tcpdump before 4.9.0 has a buffer overflow in print-bootp.c:bootp_print().
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-5203 vulnerability.
References
- https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1494526.html
- http://www.securityfocus.com/bid/95852
- https://security.gentoo.org/glsa/201702-30
- http://www.securitytracker.com/id/1037755
- http://www.debian.org/security/2017/dsa-3775
- https://access.redhat.com/errata/RHSA-2017:1871
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5824: libical 1.0 allows remote attackers to cause a denial of service (use-after-free) via a crafted…
Published: 2017-01-27T22:59:00 Last Modified: 2019-04-02T07:29:00
Summary
libical 1.0 allows remote attackers to cause a denial of service (use-after-free) via a crafted ics file.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5824 vulnerability.
References
- https://github.com/libical/libical/issues/286
- https://github.com/libical/libical/issues/251
- https://github.com/libical/libical/issues/235
- https://bugzilla.mozilla.org/show_bug.cgi?id=1275400
- http://www.openwall.com/lists/oss-security/2017/01/20/16
- http://www.openwall.com/lists/oss-security/2016/06/25/4
- http://www.securityfocus.com/bid/91459
- https://access.redhat.com/errata/RHSA-2019:0270
- https://access.redhat.com/errata/RHSA-2019:0269
- https://usn.ubuntu.com/3897-1/
- https://security.gentoo.org/glsa/201904-07
- https://security.gentoo.org/glsa/201904-02
See also: All popular products CVE Vulnerabilities of redhat
CVE-2017-3265: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging)….
Published: 2017-01-27T22:59:00 Last Modified: 2019-10-03T00:03:00
Summary
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).
Scores
- Impact Score: 4.9
- Exploitability Score: 6.8
- CVSS: 4.9
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2017-3265 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
- http://www.securityfocus.com/bid/95520
- https://security.gentoo.org/glsa/201702-18
- https://security.gentoo.org/glsa/201702-17
- http://www.securitytracker.com/id/1037640
- http://www.debian.org/security/2017/dsa-3770
- http://www.debian.org/security/2017/dsa-3767
- https://access.redhat.com/errata/RHSA-2017:2787
- https://access.redhat.com/errata/RHSA-2017:2192
- https://access.redhat.com/errata/RHSA-2018:0279
- https://access.redhat.com/errata/RHSA-2018:0574
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9634: Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the…
Published: 2017-01-27T22:59:00 Last Modified: 2018-01-05T02:31:00
Summary
Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via the start_line parameter.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9634 vulnerability.
References
- https://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html
- https://gstreamer.freedesktop.org/releases/1.10/#1.10.2
- https://bugzilla.gnome.org/show_bug.cgi?id=774834
- http://www.securityfocus.com/bid/94499
- http://www.openwall.com/lists/oss-security/2016/11/24/2
- http://www.debian.org/security/2016/dsa-3724
- http://www.debian.org/security/2016/dsa-3723
- http://rhn.redhat.com/errata/RHSA-2016-2975.html
- https://security.gentoo.org/glsa/201705-10
- http://rhn.redhat.com/errata/RHSA-2017-0020.html
- http://rhn.redhat.com/errata/RHSA-2017-0019.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9635: Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the…
Published: 2017-01-27T22:59:00 Last Modified: 2018-01-05T02:31:00
Summary
Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a ‘skip count’ that goes beyond initialized buffer.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9635 vulnerability.
References
- https://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html
- https://gstreamer.freedesktop.org/releases/1.10/#1.10.2
- https://bugzilla.gnome.org/show_bug.cgi?id=774834
- http://www.securityfocus.com/bid/94499
- http://www.openwall.com/lists/oss-security/2016/11/24/2
- http://www.debian.org/security/2016/dsa-3724
- http://www.debian.org/security/2016/dsa-3723
- http://rhn.redhat.com/errata/RHSA-2016-2975.html
- https://security.gentoo.org/glsa/201705-10
- http://rhn.redhat.com/errata/RHSA-2017-0020.html
- http://rhn.redhat.com/errata/RHSA-2017-0019.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9636: Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the…
Published: 2017-01-27T22:59:00 Last Modified: 2018-01-05T02:31:00
Summary
Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a ‘write count’ that goes beyond the initialized buffer.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9636 vulnerability.
References
- https://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html
- https://gstreamer.freedesktop.org/releases/1.10/#1.10.2
- https://bugzilla.gnome.org/show_bug.cgi?id=774834
- http://www.securityfocus.com/bid/94499
- http://www.openwall.com/lists/oss-security/2016/11/24/2
- http://www.debian.org/security/2016/dsa-3724
- http://www.debian.org/security/2016/dsa-3723
- http://rhn.redhat.com/errata/RHSA-2016-2975.html
- https://security.gentoo.org/glsa/201705-10
- http://rhn.redhat.com/errata/RHSA-2017-0020.html
- http://rhn.redhat.com/errata/RHSA-2017-0019.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9401: popd in bash might allow local users to bypass the restricted shell and cause a use-after-free…
Published: 2017-01-23T21:59:00 Last Modified: 2020-09-14T18:32:00
Summary
popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-9401 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2016/11/17/9
- http://www.openwall.com/lists/oss-security/2016/11/17/5
- http://www.securityfocus.com/bid/94398
- https://security.gentoo.org/glsa/201701-02
- https://access.redhat.com/errata/RHSA-2017:1931
- http://rhn.redhat.com/errata/RHSA-2017-0725.html
- https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9446: The vmnc decoder in the gstreamer does not initialize the render canvas, which allows remote…
Published: 2017-01-23T21:59:00 Last Modified: 2021-11-30T22:12:00
Summary
The vmnc decoder in the gstreamer does not initialize the render canvas, which allows remote attackers to obtain sensitive information as demonstrated by thumbnailing a simple 1 frame vmnc movie that does not draw to the allocated render canvas.
Common Weakness Enumeration (CWE): CWE-665: Improper Initialization
CWE Description: The software does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9446 vulnerability.
References
- https://scarybeastsecurity.blogspot.de/2016/11/0day-poc-risky-design-decisions-in.html
- https://cgit.freedesktop.org/gstreamer/gst-plugins-bad/commit/gst/vmnc/vmncdec.c?id=4cb1bcf1422bbcd79c0f683edb7ee85e3f7a31fe
- https://bugzilla.gnome.org/show_bug.cgi?id=774533
- http://www.openwall.com/lists/oss-security/2016/11/18/13
- http://www.openwall.com/lists/oss-security/2016/11/18/12
- http://www.securityfocus.com/bid/94423
- https://security.gentoo.org/glsa/201705-10
- https://access.redhat.com/errata/RHSA-2017:2060
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UM7IXFGHV66KNWGWG6ZBDNKXD2UJL2VQ/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7545: SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox…
Published: 2017-01-19T20:59:00 Last Modified: 2018-01-05T02:31:00
Summary
SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-7545 vulnerability.
References
- https://marc.info/?l=selinux&m=147465160112766&w=2
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPRNK3PWMAVNJZ53YW5GOEOGJSFNAQIF/
- https://github.com/SELinuxProject/selinux/commit/acca96a135a4d2a028ba9b636886af99c0915379
- http://www.securityfocus.com/bid/93156
- http://www.openwall.com/lists/oss-security/2016/09/25/1
- http://rhn.redhat.com/errata/RHSA-2016-2702.html
- http://www.securitytracker.com/id/1037283
- http://rhn.redhat.com/errata/RHSA-2017-0536.html
- http://rhn.redhat.com/errata/RHSA-2017-0535.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7426: NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting…
Published: 2017-01-13T16:59:00 Last Modified: 2020-06-18T18:14:00
Summary
NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7426 vulnerability.
References
- https://www.kb.cert.org/vuls/id/633847
- http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
- http://support.ntp.org/bin/view/Main/NtpBug3071
- http://nwtime.org/ntp428p9_release/
- http://www.securityfocus.com/bid/94451
- https://bto.bluecoat.com/security-advisory/sa139
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03706en_us
- http://www.securitytracker.com/id/1037354
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc
- http://rhn.redhat.com/errata/RHSA-2017-0252.html
- https://usn.ubuntu.com/3707-2/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9811: The windows_icon_typefind function in gst-plugins-base in GStreamer before 1.10.2, when G_SLICE…
Published: 2017-01-13T16:59:00 Last Modified: 2021-11-29T21:08:00
Summary
The windows_icon_typefind function in gst-plugins-base in GStreamer before 1.10.2, when G_SLICE is set to always-malloc, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted ico file.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9811 vulnerability.
References
- https://gstreamer.freedesktop.org/releases/1.10/#1.10.2
- https://bugzilla.gnome.org/show_bug.cgi?id=774902
- http://www.openwall.com/lists/oss-security/2016/12/05/8
- http://www.openwall.com/lists/oss-security/2016/12/01/2
- http://www.securityfocus.com/bid/95161
- https://security.gentoo.org/glsa/201705-10
- http://www.debian.org/security/2017/dsa-3819
- https://access.redhat.com/errata/RHSA-2017:2060
- https://lists.debian.org/debian-lts-announce/2020/02/msg00032.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UM7IXFGHV66KNWGWG6ZBDNKXD2UJL2VQ/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-9131: named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2…
Published: 2017-01-12T06:59:00 Last Modified: 2020-08-19T19:17:00
Summary
named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-9131 vulnerability.
References
- https://kb.isc.org/article/AA-01439/74/CVE-2016-9131
- http://www.securityfocus.com/bid/95386
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- http://www.securitytracker.com/id/1037582
- https://security.gentoo.org/glsa/201708-01
- http://www.debian.org/security/2017/dsa-3758
- https://access.redhat.com/errata/RHSA-2017:1583
- http://rhn.redhat.com/errata/RHSA-2017-0062.html
- https://security.netapp.com/advisory/ntap-20180926-0005/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7091: sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and…
Published: 2016-12-22T21:59:00 Last Modified: 2016-12-23T18:17:00
Summary
sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: COMPLETE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-7091 vulnerability.
References
- https://rhn.redhat.com/errata/RHSA-2016-2593.html
- https://lists.gnu.org/archive/html/bug-readline/2016-05/msg00009.html
- http://www.securityfocus.com/bid/92615
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8241: XRegion in TigerVNC allows remote VNC servers to cause a denial of service (NULL pointer…
Published: 2016-12-14T22:59:00 Last Modified: 2016-12-20T02:59:00
Summary
XRegion in TigerVNC allows remote VNC servers to cause a denial of service (NULL pointer dereference) by leveraging failure to check a malloc return value, a similar issue to CVE-2014-6052.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8241 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1151312
- http://seclists.org/oss-sec/2014/q4/300
- https://rhn.redhat.com/errata/RHSA-2015-2233.html
- http://seclists.org/oss-sec/2014/q4/278
- http://www.securityfocus.com/bid/70390
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5195: Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to…
Published: 2016-11-10T21:59:00 Last Modified: 2021-11-17T22:15:00
Summary
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka “Dirty COW.”
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 5)
Code designed for conducting penetration testing on CVE-2016-5195 vulnerability.
- Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' 'PTRACE_POKEDATA' Race Condition Privilege Escalation (/etc/passwd Method) by FireFart at 2016-11-28
- Linux Kernel 2.6.22 < 3.9 - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (/etc/passwd Method) by Gabriele Bonacini at 2016-11-27
- Linux Kernel 2.6.22 < 3.9 - 'Dirty COW PTRACE_POKEDATA' Race Condition (Write Access Method) by Phil Oester at 2016-10-26
- Linux Kernel 2.6.22 < 3.9 (x86/x64) - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (SUID Method) by Robin Verton at 2016-10-21
- Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' /proc/self/mem Race Condition (Write Access Method) by Phil Oester at 2016-10-19
References
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3
- https://dirtycow.ninja
- https://security-tracker.debian.org/tracker/CVE-2016-5195
- https://access.redhat.com/security/cve/cve-2016-5195
- https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
- https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html
- https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs
- https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619
- https://bugzilla.suse.com/show_bug.cgi?id=1004418
- https://bugzilla.redhat.com/show_bug.cgi?id=1384344
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619
- http://www.openwall.com/lists/oss-security/2016/10/26/7
- https://access.redhat.com/security/vulnerabilities/2706661
- https://www.kb.cert.org/vuls/id/243144
- http://www.securityfocus.com/bid/93793
- https://source.android.com/security/bulletin/2016-11-01.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241
- https://www.exploit-db.com/exploits/40847/
- https://www.exploit-db.com/exploits/40839/
- https://kc.mcafee.com/corporate/index?page=content&id=SB10176
- https://bto.bluecoat.com/security-advisory/sa134
- https://source.android.com/security/bulletin/2016-12-01.html
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us
- http://www.securitytracker.com/id/1037078
- https://www.exploit-db.com/exploits/40616/
- https://www.exploit-db.com/exploits/40611/
- https://security.netapp.com/advisory/ntap-20161025-0001/
- https://access.redhat.com/errata/RHSA-2017:0372
- http://rhn.redhat.com/errata/RHSA-2016-2133.html
- http://rhn.redhat.com/errata/RHSA-2016-2132.html
- http://rhn.redhat.com/errata/RHSA-2016-2128.html
- http://rhn.redhat.com/errata/RHSA-2016-2127.html
- http://rhn.redhat.com/errata/RHSA-2016-2126.html
- http://rhn.redhat.com/errata/RHSA-2016-2124.html
- http://rhn.redhat.com/errata/RHSA-2016-2120.html
- http://rhn.redhat.com/errata/RHSA-2016-2118.html
- http://rhn.redhat.com/errata/RHSA-2016-2110.html
- http://rhn.redhat.com/errata/RHSA-2016-2107.html
- http://rhn.redhat.com/errata/RHSA-2016-2106.html
- http://rhn.redhat.com/errata/RHSA-2016-2105.html
- http://rhn.redhat.com/errata/RHSA-2016-2098.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://security.paloaltonetworks.com/CVE-2016-5195
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html
- http://www.securityfocus.com/archive/1/540344/100/0/threaded
- http://www.debian.org/security/2016/dsa-3696
- http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html
- http://fortiguard.com/advisory/FG-IR-16-063
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html
- http://www.ubuntu.com/usn/USN-3104-2
- http://www.ubuntu.com/usn/USN-3104-1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10222
- http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux
- http://www.openwall.com/lists/oss-security/2016/10/21/1
- http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/
- http://www.securityfocus.com/archive/1/539611/100/0/threaded
- http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/
- http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10177
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd
- http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html
- http://www.ubuntu.com/usn/USN-3105-1
- http://www.ubuntu.com/usn/USN-3105-2
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html
- http://www.openwall.com/lists/oss-security/2016/11/03/7
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html
- http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html
- http://www.securityfocus.com/archive/1/540736/100/0/threaded
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html
- http://www.ubuntu.com/usn/USN-3106-4
- http://www.ubuntu.com/usn/USN-3106-3
- http://www.openwall.com/lists/oss-security/2016/10/30/1
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026
- http://www.ubuntu.com/usn/USN-3106-2
- http://www.ubuntu.com/usn/USN-3106-1
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html
- http://www.securityfocus.com/archive/1/540252/100/0/threaded
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html
- http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/
- http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770
- http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html
- http://www.ubuntu.com/usn/USN-3107-2
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html
- http://www.openwall.com/lists/oss-security/2016/10/27/13
- http://www.ubuntu.com/usn/USN-3107-1
- http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7860: Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable…
Published: 2016-11-08T17:59:00 Last Modified: 2019-05-15T18:03:00
Summary
Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7860 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb16-37.html
- http://www.securityfocus.com/bid/94151
- https://security.gentoo.org/glsa/201611-18
- http://www.zerodayinitiative.com/advisories/ZDI-16-601
- http://rhn.redhat.com/errata/RHSA-2016-2676.html
- http://www.securitytracker.com/id/1037240
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-141
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7863: Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable…
Published: 2016-11-08T17:59:00 Last Modified: 2019-05-16T01:19:00
Summary
Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7863 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb16-37.html
- http://www.securityfocus.com/bid/94153
- https://security.gentoo.org/glsa/201611-18
- http://www.zerodayinitiative.com/advisories/ZDI-16-599
- http://rhn.redhat.com/errata/RHSA-2016-2676.html
- http://www.securitytracker.com/id/1037240
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-141
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7858: Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable…
Published: 2016-11-08T17:59:00 Last Modified: 2019-05-16T01:16:00
Summary
Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7858 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb16-37.html
- http://www.securityfocus.com/bid/94153
- https://security.gentoo.org/glsa/201611-18
- http://www.zerodayinitiative.com/advisories/ZDI-16-595
- http://rhn.redhat.com/errata/RHSA-2016-2676.html
- http://www.securitytracker.com/id/1037240
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-141
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7861: Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable…
Published: 2016-11-08T17:59:00 Last Modified: 2019-05-15T17:59:00
Summary
Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7861 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb16-37.html
- http://www.securityfocus.com/bid/94151
- https://security.gentoo.org/glsa/201611-18
- http://www.zerodayinitiative.com/advisories/ZDI-16-600
- http://rhn.redhat.com/errata/RHSA-2016-2676.html
- http://www.securitytracker.com/id/1037240
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-141
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7859: Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable…
Published: 2016-11-08T17:59:00 Last Modified: 2019-05-16T17:08:00
Summary
Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7859 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb16-37.html
- http://www.securityfocus.com/bid/94153
- https://security.gentoo.org/glsa/201611-18
- http://www.zerodayinitiative.com/advisories/ZDI-16-602
- http://rhn.redhat.com/errata/RHSA-2016-2676.html
- http://www.securitytracker.com/id/1037240
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-141
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7862: Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable…
Published: 2016-11-08T17:59:00 Last Modified: 2019-05-15T17:58:00
Summary
Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7862 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb16-37.html
- http://www.securityfocus.com/bid/94153
- https://security.gentoo.org/glsa/201611-18
- http://www.zerodayinitiative.com/advisories/ZDI-16-603
- http://rhn.redhat.com/errata/RHSA-2016-2676.html
- http://www.securitytracker.com/id/1037240
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-141
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7865: Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable…
Published: 2016-11-08T17:59:00 Last Modified: 2019-05-16T01:22:00
Summary
Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-704: Incorrect Type Conversion or Cast
CWE Description: The software does not correctly convert an object, resource, or structure from one type to a different type.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7865 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb16-37.html
- http://www.securityfocus.com/bid/94151
- https://security.gentoo.org/glsa/201611-18
- http://www.zerodayinitiative.com/advisories/ZDI-16-598
- http://rhn.redhat.com/errata/RHSA-2016-2676.html
- http://www.securitytracker.com/id/1037240
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-141
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7857: Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable…
Published: 2016-11-08T17:59:00 Last Modified: 2019-05-16T17:12:00
Summary
Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7857 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb16-37.html
- http://www.securityfocus.com/bid/94153
- https://security.gentoo.org/glsa/201611-18
- http://www.zerodayinitiative.com/advisories/ZDI-16-596
- http://rhn.redhat.com/errata/RHSA-2016-2676.html
- http://www.securitytracker.com/id/1037240
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-141
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7864: Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable…
Published: 2016-11-08T17:59:00 Last Modified: 2019-05-15T17:45:00
Summary
Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7864 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb16-37.html
- http://www.securityfocus.com/bid/94153
- https://security.gentoo.org/glsa/201611-18
- http://www.zerodayinitiative.com/advisories/ZDI-16-597
- http://rhn.redhat.com/errata/RHSA-2016-2676.html
- http://www.securitytracker.com/id/1037240
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-141
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-8864: named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1…
Published: 2016-11-02T17:59:00 Last Modified: 2020-08-17T17:44:00
Summary
named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
Common Weakness Enumeration (CWE): CWE-617: Reachable Assertion
CWE Description: The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-8864 vulnerability.
References
- https://kb.isc.org/article/AA-01434
- http://www.securityfocus.com/bid/94067
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01437
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01435
- http://www.debian.org/security/2016/dsa-3703
- http://rhn.redhat.com/errata/RHSA-2016-2871.html
- http://rhn.redhat.com/errata/RHSA-2016-2615.html
- https://security.gentoo.org/glsa/201701-26
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- http://www.securitytracker.com/id/1037156
- https://security.FreeBSD.org/advisories/FreeBSD-SA-16:34.bind.asc
- https://access.redhat.com/errata/RHSA-2017:1583
- http://rhn.redhat.com/errata/RHSA-2016-2142.html
- http://rhn.redhat.com/errata/RHSA-2016-2141.html
- https://security.netapp.com/advisory/ntap-20180926-0005/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7855: Use-after-free vulnerability in Adobe Flash Player before 23.0.0.205 on Windows and OS X and…
Published: 2016-11-01T22:59:00 Last Modified: 2019-05-16T17:14:00
Summary
Use-after-free vulnerability in Adobe Flash Player before 23.0.0.205 on Windows and OS X and before 11.2.202.643 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in October 2016.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7855 vulnerability.
References
- https://security.googleblog.com/2016/10/disclosing-vulnerabilities-to-protect.html
- https://helpx.adobe.com/security/products/flash-player/apsb16-36.html
- http://www.securityfocus.com/bid/93861
- https://security.gentoo.org/glsa/201610-10
- http://www.securitytracker.com/id/1037111
- http://rhn.redhat.com/errata/RHSA-2016-2119.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-128
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5629: Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and…
Published: 2016-10-25T14:31:00 Last Modified: 2019-03-04T17:21:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5629 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93668
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://security.gentoo.org/glsa/201701-01
- http://www.securitytracker.com/id/1037050
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5626: Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and…
Published: 2016-10-25T14:31:00 Last Modified: 2019-03-04T17:11:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5626 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93638
- https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/
- https://security.gentoo.org/glsa/201701-01
- http://www.securitytracker.com/id/1037050
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5612: Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and…
Published: 2016-10-25T14:31:00 Last Modified: 2019-03-04T16:57:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5612 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/93630
- https://security.gentoo.org/glsa/201701-01
- http://www.securitytracker.com/id/1037050
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-1601.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1000033: Shotwell version 0.22.0 (and possibly other versions) is vulnerable to a TLS/SSL certification…
Published: 2016-10-25T14:29:00 Last Modified: 2020-02-24T20:50:00
Summary
Shotwell version 0.22.0 (and possibly other versions) is vulnerable to a TLS/SSL certification validation flaw resulting in a potential for man in the middle attacks.
Common Weakness Enumeration (CWE): CWE-295: Improper Certificate Validation
CWE Description: The software does not validate, or incorrectly validates, a certificate.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1000033 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4273: Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X…
Published: 2016-10-13T19:59:00 Last Modified: 2019-08-19T16:19:00
Summary
Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-4273 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb16-32.html
- http://www.securityfocus.com/bid/93490
- https://security.gentoo.org/glsa/201610-10
- http://www.securitytracker.com/id/1036985
- https://www.exploit-db.com/exploits/40510/
- http://rhn.redhat.com/errata/RHSA-2016-2057.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4286: Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X…
Published: 2016-10-13T19:59:00 Last Modified: 2019-05-16T17:17:00
Summary
Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to bypass intended access restrictions via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4286 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb16-32.html
- http://www.securityfocus.com/bid/93497
- https://security.gentoo.org/glsa/201610-10
- http://www.securitytracker.com/id/1036985
- http://rhn.redhat.com/errata/RHSA-2016-2057.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7796: The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of…
Published: 2016-10-13T14:59:00 Last Modified: 2017-07-28T01:29:00
Summary
The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-7796 vulnerability.
References
- https://github.com/systemd/systemd/issues/4234#issuecomment-250441246
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00015.html
- http://www.openwall.com/lists/oss-security/2016/09/30/1
- https://rhn.redhat.com/errata/RHBA-2015-2092.html
- http://www.securityfocus.com/bid/93250
- https://www.agwa.name/blog/post/how_to_crash_systemd_in_one_tweet
- https://bugzilla.redhat.com/show_bug.cgi?id=1381911
- http://rhn.redhat.com/errata/RHSA-2017-0003.html
- http://www.securitytracker.com/id/1037320
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4300: Integer overflow in the read_SubStreamsInfo function in archive_read_support_format_7zip.c in…
Published: 2016-09-21T14:25:00 Last Modified: 2017-11-04T01:29:00
Summary
Integer overflow in the read_SubStreamsInfo function in archive_read_support_format_7zip.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a 7zip file with a large number of substreams, which triggers a heap-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4300 vulnerability.
References
- https://github.com/libarchive/libarchive/commit/e79ef306afe332faf22e9b442a2c6b59cb175573
- http://rhn.redhat.com/errata/RHSA-2016-1844.html
- http://www.talosintel.com/reports/TALOS-2016-0152/
- http://blog.talosintel.com/2016/06/the-poisoned-archives.html
- https://github.com/libarchive/libarchive/issues/718
- http://www.securityfocus.com/bid/91326
- https://bugzilla.redhat.com/show_bug.cgi?id=1348439
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00062&languageid=en-fr
- https://security.gentoo.org/glsa/201701-03
- http://www.debian.org/security/2016/dsa-3657
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4302: Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in…
Published: 2016-09-21T14:25:00 Last Modified: 2017-11-04T01:29:00
Summary
Heap-based buffer overflow in the parse_codes function in archive_read_support_format_rar.c in libarchive before 3.2.1 allows remote attackers to execute arbitrary code via a RAR file with a zero-sized dictionary.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4302 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2016-1844.html
- https://github.com/libarchive/libarchive/issues/719
- http://www.talosintel.com/reports/TALOS-2016-0154/
- http://blog.talosintel.com/2016/06/the-poisoned-archives.html
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1348444
- http://www.securityfocus.com/bid/91331
- https://github.com/libarchive/libarchive/commit/05caadc7eedbef471ac9610809ba683f0c698700
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://security.gentoo.org/glsa/201701-03
- http://www.debian.org/security/2016/dsa-3657
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4809: The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in…
Published: 2016-09-21T14:25:00 Last Modified: 2019-12-27T16:08:00
Summary
The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4809 vulnerability.
References
- http://www.securityfocus.com/bid/91813
- https://github.com/libarchive/libarchive/commit/fd7e0c02
- http://rhn.redhat.com/errata/RHSA-2016-1850.html
- http://rhn.redhat.com/errata/RHSA-2016-1844.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1347084
- https://github.com/libarchive/libarchive/issues/705
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- https://security.gentoo.org/glsa/201701-03
- http://www.debian.org/security/2016/dsa-3657
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5418: The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-…
Published: 2016-09-21T14:25:00 Last Modified: 2019-12-27T16:08:00
Summary
The sandboxing code in libarchive 3.2.0 and earlier mishandles hardlink archive entries of non-zero data size, which might allow remote attackers to write to arbitrary files via a crafted archive file.
Common Weakness Enumeration (CWE): CWE-19: Data Processing Errors
CWE Description: Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5418 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2016-1850.html
- http://rhn.redhat.com/errata/RHSA-2016-1844.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1362601
- https://gist.github.com/anonymous/e48209b03f1dd9625a992717e7b89c4f
- https://github.com/libarchive/libarchive/issues/746
- https://access.redhat.com/errata/RHSA-2016:1853
- https://github.com/libarchive/libarchive/commit/dfd6b54ce33960e420fb206d8872fb759b577ad9
- http://www.openwall.com/lists/oss-security/2016/08/09/2
- https://access.redhat.com/errata/RHSA-2016:1852
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securityfocus.com/bid/93165
- https://security.gentoo.org/glsa/201701-03
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5844: Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a…
Published: 2016-09-21T14:25:00 Last Modified: 2019-12-27T16:08:00
Summary
Integer overflow in the ISO parser in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a crafted ISO file.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5844 vulnerability.
References
- https://blog.fuzzing-project.org/48-Out-of-bounds-read-and-signed-integer-overflow-in-libarchive.html
- http://rhn.redhat.com/errata/RHSA-2016-1850.html
- http://www.openwall.com/lists/oss-security/2016/06/23/6
- http://rhn.redhat.com/errata/RHSA-2016-1844.html
- http://www.openwall.com/lists/oss-security/2016/06/24/4
- http://www.securitytracker.com/id/1036173
- https://bugzilla.redhat.com/show_bug.cgi?id=1350280
- https://github.com/libarchive/libarchive/commit/3ad08e01b4d253c66ae56414886089684155af22
- https://github.com/libarchive/libarchive/issues/717
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/91808
- https://security.gentoo.org/glsa/201701-03
- http://www.debian.org/security/2016/dsa-3657
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-7166: libarchive before 3.2.0 does not limit the number of recursive decompressions, which allows…
Published: 2016-09-21T14:25:00 Last Modified: 2019-12-27T16:08:00
Summary
libarchive before 3.2.0 does not limit the number of recursive decompressions, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted gzip file.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-7166 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1347086
- http://rhn.redhat.com/errata/RHSA-2016-1850.html
- http://rhn.redhat.com/errata/RHSA-2016-1844.html
- https://github.com/libarchive/libarchive/issues/660
- https://github.com/libarchive/libarchive/commit/6e06b1c89dd0d16f74894eac4cfc1327a06ee4a0
- http://www.openwall.com/lists/oss-security/2016/09/08/15
- http://www.securityfocus.com/bid/92901
- http://www.openwall.com/lists/oss-security/2016/09/08/18
- https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207362
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- https://security.gentoo.org/glsa/201701-03
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-6662: Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before…
Published: 2016-09-20T18:59:00 Last Modified: 2021-08-04T17:15:00
Summary
Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle’s October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-6662 vulnerability.
References
- http://legalhackers.com/advisories/MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
- https://jira.mariadb.org/browse/MDEV-10465
- https://www.percona.com/blog/2016/09/12/percona-server-critical-update-cve-2016-6662/
- http://seclists.org/fulldisclosure/2016/Sep/23
- https://mariadb.com/kb/en/mariadb/mariadb-10117-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5551-release-notes/
- http://www.openwall.com/lists/oss-security/2016/09/12/3
- https://mariadb.com/kb/en/mariadb/mariadb-10027-release-notes/
- https://www.exploit-db.com/exploits/40360/
- http://www.securityfocus.com/bid/92912
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://security.gentoo.org/glsa/201701-01
- http://www.debian.org/security/2016/dsa-3666
- http://www.securitytracker.com/id/1036769
- http://rhn.redhat.com/errata/RHSA-2017-0184.html
- http://rhn.redhat.com/errata/RHSA-2016-2928.html
- http://rhn.redhat.com/errata/RHSA-2016-2927.html
- http://rhn.redhat.com/errata/RHSA-2016-2749.html
- http://rhn.redhat.com/errata/RHSA-2016-2595.html
- http://rhn.redhat.com/errata/RHSA-2016-2131.html
- http://rhn.redhat.com/errata/RHSA-2016-2130.html
- http://rhn.redhat.com/errata/RHSA-2016-2077.html
- http://rhn.redhat.com/errata/RHSA-2016-2062.html
- http://rhn.redhat.com/errata/RHSA-2016-2061.html
- http://rhn.redhat.com/errata/RHSA-2016-2060.html
- http://rhn.redhat.com/errata/RHSA-2016-2059.html
- http://rhn.redhat.com/errata/RHSA-2016-2058.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2183: The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols…
Published: 2016-09-01T00:59:00 Last Modified: 2021-11-17T22:15:00
Summary
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a “Sweet32” attack.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-2183 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1369383
- https://www.openssl.org/blog/blog/2016/08/24/sweet32/
- https://access.redhat.com/articles/2548661
- https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
- https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
- https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
- https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
- https://www.sigsac.org/ccs/CCS2016/accepted-papers/
- https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
- https://access.redhat.com/security/cve/cve-2016-2183
- https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
- https://sweet32.info/
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
- https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
- http://www.securityfocus.com/bid/92630
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- http://www.splunk.com/view/SP-CAAAPUE
- http://www.splunk.com/view/SP-CAAAPSV
- https://security.gentoo.org/glsa/201612-16
- https://kc.mcafee.com/corporate/index?page=content&id=SB10171
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://bto.bluecoat.com/security-advisory/sa133
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
- http://www.securityfocus.com/bid/95568
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
- https://www.tenable.com/security/tns-2016-16
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www-01.ibm.com/support/docview.wss?uid=swg21991482
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://security.gentoo.org/glsa/201701-65
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
- https://security.gentoo.org/glsa/201707-01
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
- http://www.securitytracker.com/id/1036696
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- https://www.tenable.com/security/tns-2017-09
- https://www.tenable.com/security/tns-2016-21
- https://www.tenable.com/security/tns-2016-20
- https://security.netapp.com/advisory/ntap-20170119-0001/
- https://security.netapp.com/advisory/ntap-20160915-0001/
- https://access.redhat.com/errata/RHSA-2017:3240
- https://access.redhat.com/errata/RHSA-2017:3239
- https://access.redhat.com/errata/RHSA-2017:3114
- https://access.redhat.com/errata/RHSA-2017:3113
- https://access.redhat.com/errata/RHSA-2017:2710
- https://access.redhat.com/errata/RHSA-2017:2709
- https://access.redhat.com/errata/RHSA-2017:2708
- https://access.redhat.com/errata/RHSA-2017:1216
- http://rhn.redhat.com/errata/RHSA-2017-0462.html
- http://rhn.redhat.com/errata/RHSA-2017-0338.html
- http://rhn.redhat.com/errata/RHSA-2017-0337.html
- http://rhn.redhat.com/errata/RHSA-2017-0336.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- https://access.redhat.com/errata/RHSA-2018:2123
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://access.redhat.com/errata/RHSA-2019:1245
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://access.redhat.com/errata/RHSA-2019:2859
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://access.redhat.com/errata/RHSA-2020:0451
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- http://www.ubuntu.com/usn/USN-3270-1
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
- http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
- https://seclists.org/bugtraq/2018/Nov/21
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- http://www.ubuntu.com/usn/USN-3372-1
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
- http://seclists.org/fulldisclosure/2017/May/105
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
- https://wiki.opendaylight.org/view/Security_Advisories
- http://www.ubuntu.com/usn/USN-3087-2
- http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
- http://www.ubuntu.com/usn/USN-3087-1
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
- http://www.ubuntu.com/usn/USN-3194-1
- http://www.ubuntu.com/usn/USN-3179-1
- http://www.ubuntu.com/usn/USN-3198-1
- http://seclists.org/fulldisclosure/2017/Jul/31
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
- http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- http://www.securityfocus.com/archive/1/539885/100/0/threaded
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
- http://www.securityfocus.com/archive/1/542005/100/0/threaded
- https://support.f5.com/csp/article/K13167034
- https://www.exploit-db.com/exploits/42091/
- http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
- http://www.debian.org/security/2016/dsa-3673
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
- http://www.securityfocus.com/archive/1/541104/100/0/threaded
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
- https://kc.mcafee.com/corporate/index?page=content&id=SB10186
- http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- https://kc.mcafee.com/corporate/index?page=content&id=SB10197
- http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
- http://www.securityfocus.com/archive/1/540341/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5408: Stack-based buffer overflow in the munge_other_line function in cachemgr.cgi in the squid package…
Published: 2016-08-10T14:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Stack-based buffer overflow in the munge_other_line function in cachemgr.cgi in the squid package before 3.1.23-16.el6_8.6 in Red Hat Enterprise Linux 6 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-4051.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5408 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2016-1573.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5766: Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd)…
Published: 2016-08-07T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5766 vulnerability.
References
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=72339
- http://www.openwall.com/lists/oss-security/2016/06/23/4
- http://github.com/php/php-src/commit/7722455726bec8c53458a32851d2a87982cf0eac?w=1
- http://www.debian.org/security/2016/dsa-3619
- https://libgd.github.io/release-2.2.3.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00025.html
- http://www.ubuntu.com/usn/USN-3030-1
- https://security.gentoo.org/glsa/201612-09
- http://rhn.redhat.com/errata/RHSA-2016-2750.html
- http://rhn.redhat.com/errata/RHSA-2016-2598.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5403: The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to…
Published: 2016-08-02T16:59:00 Last Modified: 2021-08-04T17:15:00
Summary
The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-5403 vulnerability.
References
- http://xenbits.xen.org/xsa/advisory-184.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1358359
- http://www.securityfocus.com/bid/92148
- http://www.securitytracker.com/id/1036476
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://rhn.redhat.com/errata/RHSA-2016-1654.html
- http://rhn.redhat.com/errata/RHSA-2016-1653.html
- http://rhn.redhat.com/errata/RHSA-2016-1655.html
- http://rhn.redhat.com/errata/RHSA-2016-1652.html
- http://rhn.redhat.com/errata/RHSA-2016-1763.html
- http://rhn.redhat.com/errata/RHSA-2016-1607.html
- http://rhn.redhat.com/errata/RHSA-2016-1606.html
- http://rhn.redhat.com/errata/RHSA-2016-1756.html
- http://rhn.redhat.com/errata/RHSA-2016-1586.html
- http://rhn.redhat.com/errata/RHSA-2016-1585.html
- http://rhn.redhat.com/errata/RHSA-2016-1943.html
- https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5131: Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before…
Published: 2016-07-23T19:59:00 Last Modified: 2019-03-26T17:14:00
Summary
Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5131 vulnerability.
References
- https://crbug.com/623378
- https://codereview.chromium.org/2127493002
- http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1358641
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
- https://support.apple.com/HT207170
- https://support.apple.com/HT207143
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
- https://support.apple.com/HT207141
- https://support.apple.com/HT207142
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
- http://www.securityfocus.com/bid/92053
- http://rhn.redhat.com/errata/RHSA-2016-1485.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
- http://www.ubuntu.com/usn/USN-3041-1
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
- http://www.debian.org/security/2016/dsa-3637
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
- https://source.android.com/security/bulletin/2017-05-01
- https://security.gentoo.org/glsa/201701-37
- https://security.gentoo.org/glsa/201610-09
- http://www.securitytracker.com/id/1038623
- http://www.securitytracker.com/id/1036428
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5444: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and…
Published: 2016-07-21T10:14:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows remote attackers to affect confidentiality via vectors related to Server: Connection.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5444 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
- http://www.securityfocus.com/bid/91787
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://www.securityfocus.com/bid/91987
- http://www.securitytracker.com/id/1036362
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5440: Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and…
Published: 2016-07-21T10:14:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote administrators to affect availability via vectors related to Server: RBR.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5440 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- https://mariadb.com/kb/en/mariadb/mariadb-5550-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10115-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10026-release-notes/
- http://www.securityfocus.com/bid/91787
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://rhn.redhat.com/errata/RHSA-2016-1601.html
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://www.ubuntu.com/usn/USN-3040-1
- http://www.securityfocus.com/bid/91953
- http://rhn.redhat.com/errata/RHSA-2016-1604.html
- http://rhn.redhat.com/errata/RHSA-2016-1603.html
- http://www.debian.org/security/2016/dsa-3632
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00042.html
- http://rhn.redhat.com/errata/RHSA-2016-1637.html
- http://www.debian.org/security/2016/dsa-3624
- http://www.securitytracker.com/id/1036362
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3471: Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local…
Published: 2016-07-21T10:12:00 Last Modified: 2019-04-22T17:48:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.1
- CVSS Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-3471 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.securityfocus.com/bid/91787
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/91913
- http://www.securitytracker.com/id/1036362
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3452: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.10 and…
Published: 2016-07-21T10:12:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows remote attackers to affect confidentiality via vectors related to Server: Security: Encryption.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-3452 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
- http://www.securityfocus.com/bid/91787
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://www.securityfocus.com/bid/91999
- http://www.securitytracker.com/id/1036362
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2775: ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or…
Published: 2016-07-19T22:59:00 Last Modified: 2020-08-25T20:18:00
Summary
ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-2775 vulnerability.
References
- https://kb.isc.org/article/AA-01393/74/CVE-2016-2775
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZUCSMEOZIZ2R2SKA4FPLTOVZHJBAOWC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7T2WJP5ELO4ZRSBXSETIZ3GAO6KOEFTA/
- http://www.securityfocus.com/bid/92037
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TT754KDUJTKOASJODJX7FKHCOQ6EC7UX/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ5STNEUHBNEPUHJT7CYEVSMATFYMIX7/
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01435
- https://security.gentoo.org/glsa/201610-07
- http://www.securitytracker.com/id/1036360
- https://security.netapp.com/advisory/ntap-20160722-0002/
- https://access.redhat.com/errata/RHSA-2017:2533
- https://access.redhat.com/errata/RHBA-2017:1767
- https://access.redhat.com/errata/RHBA-2017:0651
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5388: Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows…
Published: 2016-07-19T02:00:00 Last Modified: 2020-08-14T11:15:00
Summary
Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application’s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an “httpoxy” issue. NOTE: the vendor states “A mitigation is planned for future releases of Tomcat, tracked as CVE-2016-5388”; in other words, this is not a CVE ID for a vulnerability.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5388 vulnerability.
References
- http://www.kb.cert.org/vuls/id/797896
- https://httpoxy.org/
- https://www.apache.org/security/asf-httpoxy-response.txt
- http://www.securitytracker.com/id/1036331
- http://rhn.redhat.com/errata/RHSA-2016-2045.html
- http://rhn.redhat.com/errata/RHSA-2016-2046.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
- http://www.securityfocus.com/bid/91818
- https://access.redhat.com/errata/RHSA-2016:1635
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
- http://rhn.redhat.com/errata/RHSA-2016-1624.html
- https://access.redhat.com/errata/RHSA-2016:1636
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
- https://tomcat.apache.org/tomcat-7.0-doc/changelog.html
- https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
- https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d@%3Cissues.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102@%3Cusers.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd@%3Cusers.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39@%3Cusers.tomcat.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5385: PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and…
Published: 2016-07-19T02:00:00 Last Modified: 2021-09-29T16:17:00
Summary
PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application’s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv(‘HTTP_PROXY’) call or (2) a CGI configuration of PHP, aka an “httpoxy” issue.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5385 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1353794
- http://www.kb.cert.org/vuls/id/797896
- https://httpoxy.org/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RMYXAVNYL2MOBJTFATE73TOVOEZYC5R/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KZOIUYZDBWNDDHC6XTOLZYRMRXZWTJCP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXFEIMZPSVGZQQAYIQ7U7DFVX3IBSDLF/
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05333297
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00003.html
- http://www.securityfocus.com/bid/91821
- http://rhn.redhat.com/errata/RHSA-2016-1611.html
- http://rhn.redhat.com/errata/RHSA-2016-1612.html
- http://rhn.redhat.com/errata/RHSA-2016-1613.html
- http://rhn.redhat.com/errata/RHSA-2016-1610.html
- http://rhn.redhat.com/errata/RHSA-2016-1609.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://www.drupal.org/SA-CORE-2016-003
- https://github.com/guzzle/guzzle/releases/tag/6.2.1
- https://security.gentoo.org/glsa/201611-22
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
- http://www.securitytracker.com/id/1036335
- http://www.debian.org/security/2016/dsa-3631
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5386: The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18…
Published: 2016-07-19T02:00:00 Last Modified: 2019-12-27T16:08:00
Summary
The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application’s outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an “httpoxy” issue.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5386 vulnerability.
References
- http://www.kb.cert.org/vuls/id/797896
- https://httpoxy.org/
- https://bugzilla.redhat.com/show_bug.cgi?id=1353798
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OR52UXGM6RKSCWF3KQMVZGVZVJ3WEESJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WGHKKCFP4PLVSWQKCM3FJJPEWB5ZNTU/
- http://rhn.redhat.com/errata/RHSA-2016-1538.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5009: The handle_command function in mon/Monitor.cc in Ceph allows remote authenticated users to cause…
Published: 2016-07-12T19:59:00 Last Modified: 2017-01-18T02:59:00
Summary
The handle_command function in mon/Monitor.cc in Ceph allows remote authenticated users to cause a denial of service (segmentation fault and ceph monitor crash) via an (1) empty or (2) crafted prefix.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5009 vulnerability.
References
- https://github.com/ceph/ceph/commit/957ece7e95d8f8746191fd9629622d4457d690d6
- http://tracker.ceph.com/issues/16297
- https://access.redhat.com/errata/RHSA-2016:1384
- https://github.com/ceph/ceph/pull/9700
- https://access.redhat.com/errata/RHSA-2016:1385
- http://lists.opensuse.org/opensuse-updates/2016-12/msg00126.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-6170: ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary…
Published: 2016-07-06T14:59:00 Last Modified: 2020-08-25T20:19:00
Summary
ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-6170 vulnerability.
References
- https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015073.html
- http://www.openwall.com/lists/oss-security/2016/07/06/3
- https://github.com/sischkg/xfer-limit/blob/master/README.md
- https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html
- https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015075.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1353563
- https://kb.isc.org/article/AA-01390/169/CVE-2016-6170
- https://kb.isc.org/article/AA-01390
- http://www.securitytracker.com/id/1036241
- http://www.securityfocus.com/bid/91611
- https://security.gentoo.org/glsa/201610-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1704: Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.103 allow attackers to…
Published: 2016-07-03T21:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.103 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1704 vulnerability.
References
- http://googlechromereleases.blogspot.com/2016/06/stable-channel-update_16.html
- https://crbug.com/613915
- https://crbug.com/620742
- https://crbug.com/610799
- https://crbug.com/613698
- http://www.ubuntu.com/usn/USN-3015-1
- https://access.redhat.com/errata/RHSA-2016:1262
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00036.html
- http://www.debian.org/security/2016/dsa-3637
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does…
Published: 2016-06-27T10:59:00 Last Modified: 2021-07-15T19:16:00
Summary
The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-4470 vulnerability.
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=38327424b40bcebe2de92d07312c89360ac9229a
- https://bugzilla.redhat.com/show_bug.cgi?id=1341716
- https://github.com/torvalds/linux/commit/38327424b40bcebe2de92d07312c89360ac9229a
- http://www.openwall.com/lists/oss-security/2016/06/15/11
- http://rhn.redhat.com/errata/RHSA-2016-1532.html
- http://rhn.redhat.com/errata/RHSA-2016-1541.html
- http://rhn.redhat.com/errata/RHSA-2016-1539.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
- http://www.ubuntu.com/usn/USN-3052-1
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2016-1657.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00012.html
- http://www.ubuntu.com/usn/USN-3055-1
- http://www.debian.org/security/2016/dsa-3607
- http://www.ubuntu.com/usn/USN-3050-1
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
- http://www.ubuntu.com/usn/USN-3049-1
- http://www.ubuntu.com/usn/USN-3053-1
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
- http://www.ubuntu.com/usn/USN-3056-1
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html
- http://www.ubuntu.com/usn/USN-3057-1
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html
- http://www.ubuntu.com/usn/USN-3051-1
- http://www.ubuntu.com/usn/USN-3054-1
- http://www.securitytracker.com/id/1036763
- http://rhn.redhat.com/errata/RHSA-2016-2133.html
- http://rhn.redhat.com/errata/RHSA-2016-2128.html
- http://rhn.redhat.com/errata/RHSA-2016-2076.html
- http://rhn.redhat.com/errata/RHSA-2016-2074.html
- http://rhn.redhat.com/errata/RHSA-2016-2006.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not…
Published: 2016-06-27T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-5244 vulnerability.
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4116def2337991b39919f3b448326e21c40e0dbb
- https://patchwork.ozlabs.org/patch/629110/
- https://github.com/torvalds/linux/commit/4116def2337991b39919f3b448326e21c40e0dbb
- https://bugzilla.redhat.com/show_bug.cgi?id=1343337
- http://www.openwall.com/lists/oss-security/2016/06/03/5
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
- http://www.ubuntu.com/usn/USN-3072-2
- http://www.ubuntu.com/usn/USN-3071-1
- http://www.ubuntu.com/usn/USN-3072-1
- http://www.debian.org/security/2016/dsa-3607
- http://www.ubuntu.com/usn/USN-3070-3
- http://www.ubuntu.com/usn/USN-3070-4
- http://www.securityfocus.com/bid/91021
- http://www.ubuntu.com/usn/USN-3070-2
- http://www.ubuntu.com/usn/USN-3070-1
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
- http://www.ubuntu.com/usn/USN-3071-2
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securitytracker.com/id/1041895
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain…
Published: 2016-06-27T10:59:00 Last Modified: 2016-11-28T19:55:00
Summary
Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-0758 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1300257
- http://www.openwall.com/lists/oss-security/2016/05/12/9
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23c8a812dc3c621009e4f0e5342aa4e2ede1ceaa
- https://github.com/torvalds/linux/commit/23c8a812dc3c621009e4f0e5342aa4e2ede1ceaa
- http://rhn.redhat.com/errata/RHSA-2016-1033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
- http://rhn.redhat.com/errata/RHSA-2016-1051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
- https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158555
- http://rhn.redhat.com/errata/RHSA-2016-1055.html
- http://www.ubuntu.com/usn/USN-2979-4
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://source.android.com/security/bulletin/2016-10-01.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html
- http://www.securityfocus.com/bid/90626
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the…
Published: 2016-06-27T10:59:00 Last Modified: 2016-11-28T20:12:00
Summary
The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-3707 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2016/05/17/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1327484
- https://access.redhat.com/errata/RHSA-2016:1341
- https://access.redhat.com/errata/RHSA-2016:1301
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4129: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-24T16:30:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4129 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4123: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-24T16:37:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4123 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4122: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-09-22T14:22:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4122 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4130: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-26T14:45:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4130 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4128: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-24T16:33:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4128 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4132: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T10:48:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4132 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4133: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:06:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4133 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4138: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:23:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-4138 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://www.exploit-db.com/exploits/40090/
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4139: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:21:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4139 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4134: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:12:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4134 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4124: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-26T19:42:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4124 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4145: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:27:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4145 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4146: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T10:38:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4146 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4148: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:28:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4148 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4149: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-22T17:32:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4149 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4135: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:22:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-4135 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://www.exploit-db.com/exploits/40087/
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4137: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:25:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-4137 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://www.exploit-db.com/exploits/40089/
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4151: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T20:56:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4151 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4143: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:14:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4143 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4125: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-26T19:42:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4125 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4127: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-26T19:00:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4127 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4154: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T21:06:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4154 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4144: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:05:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4144 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4131: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T10:48:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4131 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4147: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:28:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4147 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4136: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:24:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-4136 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://www.exploit-db.com/exploits/40088/
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4140: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:17:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4140 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4141: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:17:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4141 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4155: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T21:08:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4155 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4142: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:16:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4142 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4171: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier allows remote attackers to…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-26T15:05:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in June 2016.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4171 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsa16-03.html
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://www.securityfocus.com/bid/91184
- https://security.gentoo.org/glsa/201606-08
- http://www.securitytracker.com/id/1036094
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- https://www.kb.cert.org/vuls/id/748992
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4150: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-22T17:32:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4150 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4152: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T21:00:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4152 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4153: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T21:05:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4153 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4156: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2021-11-19T11:29:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4156 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4166: Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe…
Published: 2016-06-16T14:59:00 Last Modified: 2018-10-12T22:13:00
Summary
Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4166 vulnerability.
References
- https://access.redhat.com/errata/RHSA-2016:1238
- https://helpx.adobe.com/security/products/flash-player/apsb16-18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00031.html
- http://www.securitytracker.com/id/1036117
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3698: libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor…
Published: 2016-06-13T19:59:00 Last Modified: 2016-10-04T02:08:00
Summary
libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-3698 vulnerability.
References
- https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839
- https://rhn.redhat.com/errata/RHSA-2016-1086.html
- http://www.openwall.com/lists/oss-security/2016/05/17/9
- http://www.debian.org/security/2016/dsa-3581
- https://github.com/jpirko/libndp/commit/a4892df306e0532487f1634ba6d4c6d4bb381c7f
- http://www.ubuntu.com/usn/USN-2980-1
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2818: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and…
Published: 2016-06-13T10:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-2818 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1261230
- https://bugzilla.mozilla.org/show_bug.cgi?id=1265577
- https://bugzilla.mozilla.org/show_bug.cgi?id=1267130
- https://bugzilla.mozilla.org/show_bug.cgi?id=1256968
- https://bugzilla.mozilla.org/show_bug.cgi?id=1256739
- https://bugzilla.mozilla.org/show_bug.cgi?id=1263384
- https://bugzilla.mozilla.org/show_bug.cgi?id=1273701
- https://bugzilla.mozilla.org/show_bug.cgi?id=1234147
- https://bugzilla.mozilla.org/show_bug.cgi?id=1273202
- https://bugzilla.mozilla.org/show_bug.cgi?id=1256493
- https://bugzilla.mozilla.org/show_bug.cgi?id=1261752
- https://bugzilla.mozilla.org/show_bug.cgi?id=1264575
- http://www.mozilla.org/security/announce/2016/mfsa2016-49.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1269729
- http://www.debian.org/security/2016/dsa-3600
- http://www.securitytracker.com/id/1036057
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00016.html
- http://www.ubuntu.com/usn/USN-2993-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00014.html
- https://access.redhat.com/errata/RHSA-2016:1217
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00007.html
- https://access.redhat.com/errata/RHSA-2016:1392
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00055.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.debian.org/security/2016/dsa-3647
- http://www.securityfocus.com/bid/91075
- http://www.ubuntu.com/usn/USN-3023-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0749: The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM…
Published: 2016-06-09T16:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0749 vulnerability.
References
- http://www.debian.org/security/2016/dsa-3596
- https://access.redhat.com/errata/RHSA-2016:1205
- https://access.redhat.com/errata/RHSA-2016:1204
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00004.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.ubuntu.com/usn/USN-3014-1
- https://security.gentoo.org/glsa/201606-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2150: SPICE allows local guest OS users to read from or write to arbitrary host memory locations via…
Published: 2016-06-09T16:59:00 Last Modified: 2019-04-22T17:48:00
Summary
SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-2150 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1313496
- http://www.debian.org/security/2016/dsa-3596
- https://access.redhat.com/errata/RHSA-2016:1205
- https://access.redhat.com/errata/RHSA-2016:1204
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00004.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.ubuntu.com/usn/USN-3014-1
- https://security.gentoo.org/glsa/201606-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4448: Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact…
Published: 2016-06-09T16:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.
Common Weakness Enumeration (CWE): CWE-134: Use of Externally-Controlled Format String
CWE Description: The software uses a function that accepts a format string as an argument, but the format string originates from an external source.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-4448 vulnerability.
References
- https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9
- https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b
- https://bugzilla.redhat.com/show_bug.cgi?id=1338700
- http://www.openwall.com/lists/oss-security/2016/05/25/2
- http://xmlsoft.org/news.html
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.404722
- https://access.redhat.com/errata/RHSA-2016:1292
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- https://support.apple.com/HT206904
- https://support.apple.com/HT206899
- https://support.apple.com/HT206902
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
- https://support.apple.com/HT206905
- https://support.apple.com/HT206903
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
- https://support.apple.com/HT206901
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05194709
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securityfocus.com/bid/90856
- https://kc.mcafee.com/corporate/index?page=content&id=SB10170
- https://www.tenable.com/security/tns-2016-18
- http://www.securitytracker.com/id/1036348
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5260: Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of…
Published: 2016-06-07T14:06:00 Last Modified: 2017-09-16T01:29:00
Summary
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-5260 vulnerability.
References
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.ubuntu.com/usn/USN-2766-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1260822
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77019
- https://security.gentoo.org/glsa/201606-05
- http://www.securitytracker.com/id/1033753
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5261: Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to…
Published: 2016-06-07T14:06:00 Last Modified: 2017-09-16T01:29:00
Summary
Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-5261 vulnerability.
References
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://rhn.redhat.com/errata/RHSA-2015-1890.html
- http://www.debian.org/security/2015/dsa-3371
- http://www.openwall.com/lists/oss-security/2015/10/06/4
- https://bugzilla.redhat.com/show_bug.cgi?id=1261889
- http://www.ubuntu.com/usn/USN-2766-1
- http://rhn.redhat.com/errata/RHSA-2015-1889.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- https://security.gentoo.org/glsa/201606-05
- http://www.securitytracker.com/id/1033753
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1677: uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging “type confusion.”
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1677 vulnerability.
References
- https://crbug.com/602970
- https://codereview.chromium.org/1936083002
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.ubuntu.com/usn/USN-2992-1
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1683: numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles namespace nodes, which allows remote attackers to cause a denial of service (out-of-bounds heap memory access) or possibly have unspecified other impact via a crafted document.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1683 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1340016
- https://crbug.com/583156
- https://git.gnome.org/browse/libxslt/commit/?id=d182d8f6ba3071503d96ce17395c9d55871f0242
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.ubuntu.com/usn/USN-2992-1
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- http://www.debian.org/security/2016/dsa-3605
- https://support.apple.com/HT206905
- https://support.apple.com/HT206904
- https://support.apple.com/HT206903
- https://support.apple.com/HT206902
- https://support.apple.com/HT206901
- https://support.apple.com/HT206899
- http://www.securityfocus.com/bid/91826
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- https://security.gentoo.org/glsa/201607-07
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1694: browser/browsing_data/browsing_data_remover.cc in Google Chrome before 51.0.2704.63 deletes HPKP…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
browser/browsing_data/browsing_data_remover.cc in Google Chrome before 51.0.2704.63 deletes HPKP pins during cache clearing, which makes it easier for remote attackers to spoof web sites via a valid certificate from an arbitrary recognized Certification Authority.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1694 vulnerability.
References
- https://crbug.com/603682
- https://codereview.chromium.org/1941073002
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1702: The SkRegion::readFromMemory function in core/SkRegion.cpp in Skia, as used in Google Chrome…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The SkRegion::readFromMemory function in core/SkRegion.cpp in Skia, as used in Google Chrome before 51.0.2704.79, does not validate the interval count, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted serialized data.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1702 vulnerability.
References
- http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html
- https://crbug.com/609260
- https://codereview.chromium.org/1961463003
- http://www.ubuntu.com/usn/USN-2992-1
- https://access.redhat.com/errata/RHSA-2016:1201
- http://www.securitytracker.com/id/1036026
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://www.debian.org/security/2016/dsa-3594
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1686: The CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, mishandles decoder-initialization failure, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1686 vulnerability.
References
- https://codereview.chromium.org/1892143003
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://crbug.com/603518
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1674: The extensions subsystem in Google Chrome before 51.0.2704.63 allows remote attackers to bypass…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The extensions subsystem in Google Chrome before 51.0.2704.63 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1674 vulnerability.
References
- https://crbug.com/598165
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1679: The ToV8Value function in content/child/v8_value_converter_impl.cc in the V8 bindings in Google…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The ToV8Value function in content/child/v8_value_converter_impl.cc in the V8 bindings in Google Chrome before 51.0.2704.63 does not properly restrict use of getters and setters, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1679 vulnerability.
References
- https://crbug.com/606390
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://codereview.chromium.org/1930953002
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.ubuntu.com/usn/USN-2992-1
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1672: The ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the extension bindings in Google Chrome before 51.0.2704.63 mishandles properties, which allows remote attackers to conduct bindings-interception attacks and bypass the Same Origin Policy via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1672 vulnerability.
References
- https://crbug.com/590118
- https://codereview.chromium.org/1748943002/
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1682: The ServiceWorkerContainer::registerServiceWorkerImpl function in…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The ServiceWorkerContainer::registerServiceWorkerImpl function in WebKit/Source/modules/serviceworkers/ServiceWorkerContainer.cpp in Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a ServiceWorker registration.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1682 vulnerability.
References
- https://crbug.com/579801
- https://codereview.chromium.org/1861253004
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.ubuntu.com/usn/USN-2992-1
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1685: core/fxge/ge/fx_ge_text.cpp in PDFium, as used in Google Chrome before 51.0.2704.63,…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
core/fxge/ge/fx_ge_text.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, miscalculates certain index values, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1685 vulnerability.
References
- https://codereview.chromium.org/1875673004
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://crbug.com/601362
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1675: Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy by leveraging the mishandling of Document reattachment during destruction, related to FrameLoader.cpp and LocalFrame.cpp.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1675 vulnerability.
References
- https://crbug.com/600182
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://codereview.chromium.org/1858833003
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.ubuntu.com/usn/USN-2992-1
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1688: The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1688 vulnerability.
References
- https://codereview.chromium.org/1927003003
- https://crbug.com/604897
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.ubuntu.com/usn/USN-2992-1
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1678: objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1678 vulnerability.
References
- https://codereview.chromium.org/1875053002
- https://crbug.com/595259
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.ubuntu.com/usn/USN-2992-1
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1680: Use-after-free vulnerability in ports/SkFontHost_FreeType.cpp in Skia, as used in Google Chrome…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Use-after-free vulnerability in ports/SkFontHost_FreeType.cpp in Skia, as used in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via unknown vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1680 vulnerability.
References
- https://crbug.com/589848
- https://codereview.chromium.org/1751883004
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.ubuntu.com/usn/USN-2992-1
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1690: The Autofill implementation in Google Chrome before 51.0.2704.63 mishandles the interaction…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The Autofill implementation in Google Chrome before 51.0.2704.63 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1701.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1690 vulnerability.
References
- https://codereview.chromium.org/1960023002
- https://crbug.com/608100
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1695: Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.63 allow attackers to…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1695 vulnerability.
References
- https://crbug.com/582698
- https://crbug.com/602185
- https://crbug.com/614767
- https://crbug.com/588548
- https://crbug.com/599627
- https://crbug.com/612364
- https://crbug.com/587897
- https://crbug.com/595262
- https://crbug.com/612132
- https://crbug.com/612613
- https://crbug.com/607483
- https://crbug.com/582714
- https://crbug.com/605474
- https://crbug.com/599081
- https://crbug.com/602046
- https://crbug.com/585658
- https://crbug.com/588178
- https://crbug.com/610646
- https://crbug.com/611887
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://crbug.com/609134
- http://www.ubuntu.com/usn/USN-2992-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://www.tenable.com/security/tns-2016-18
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1689: Heap-based buffer overflow in content/renderer/media/canvas_capture_handler.cc in Google Chrome…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Heap-based buffer overflow in content/renderer/media/canvas_capture_handler.cc in Google Chrome before 51.0.2704.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1689 vulnerability.
References
- https://crbug.com/606185
- https://codereview.chromium.org/1918073003
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.ubuntu.com/usn/USN-2992-1
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1687: The renderer implementation in Google Chrome before 51.0.2704.63 does not properly restrict…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The renderer implementation in Google Chrome before 51.0.2704.63 does not properly restrict public exposure of classes, which allows remote attackers to obtain sensitive information via vectors related to extensions.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1687 vulnerability.
References
- https://codereview.chromium.org/1939833003
- https://crbug.com/603748
- https://codereview.chromium.org/1938123002
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1673: Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1673 vulnerability.
References
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://crbug.com/597532
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.ubuntu.com/usn/USN-2992-1
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1699: WebKit/Source/devtools/front_end/devtools.js in the Developer Tools (aka DevTools) subsystem in…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
WebKit/Source/devtools/front_end/devtools.js in the Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 51.0.2704.79, does not ensure that the remoteFrontendUrl parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1699 vulnerability.
References
- http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html
- https://crbug.com/607939
- https://codereview.chromium.org/2010783002
- http://www.ubuntu.com/usn/USN-2992-1
- https://access.redhat.com/errata/RHSA-2016:1201
- http://www.securitytracker.com/id/1036026
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://www.debian.org/security/2016/dsa-3594
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1691: Skia, as used in Google Chrome before 51.0.2704.63, mishandles coincidence runs, which allows…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Skia, as used in Google Chrome before 51.0.2704.63, mishandles coincidence runs, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted curves, related to SkOpCoincidence.cpp and SkPathOpsCommon.cpp.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1691 vulnerability.
References
- https://crbug.com/597926
- https://codereview.chromium.org/1854333002/
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.ubuntu.com/usn/USN-2992-1
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1692: WebKit/Source/core/css/StyleSheetContents.cpp in Blink, as used in Google Chrome before…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
WebKit/Source/core/css/StyleSheetContents.cpp in Blink, as used in Google Chrome before 51.0.2704.63, permits cross-origin loading of CSS stylesheets by a ServiceWorker even when the stylesheet download has an incorrect MIME type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1692 vulnerability.
References
- https://codereview.chromium.org/1861243002
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://crbug.com/598077
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.ubuntu.com/usn/USN-2992-1
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1676: extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.63 does not properly use prototypes, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1676 vulnerability.
References
- https://crbug.com/604901
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://codereview.chromium.org/1903273003
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1698: The createCustomType function in extensions/renderer/resources/binding.js in the extension…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The createCustomType function in extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.79 does not validate module types, which might allow attackers to load arbitrary modules or obtain sensitive information by leveraging a poisoned definition.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1698 vulnerability.
References
- https://crbug.com/603725
- http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html
- https://codereview.chromium.org/1912783002
- https://access.redhat.com/errata/RHSA-2016:1201
- http://www.securitytracker.com/id/1036026
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://www.debian.org/security/2016/dsa-3594
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1697: The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1697 vulnerability.
References
- http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html
- https://codereview.chromium.org/2021373003
- https://crbug.com/613266
- http://www.ubuntu.com/usn/USN-2992-1
- https://access.redhat.com/errata/RHSA-2016:1201
- http://www.securitytracker.com/id/1036026
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://www.debian.org/security/2016/dsa-3594
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1703: Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.79 allow attackers to…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.79 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1703 vulnerability.
References
- https://crbug.com/608156
- http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html
- https://crbug.com/602276
- https://crbug.com/616539
- https://crbug.com/610400
- https://crbug.com/613917
- https://crbug.com/590621
- https://crbug.com/582702
- https://crbug.com/592361
- https://crbug.com/612049
- http://www.ubuntu.com/usn/USN-2992-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://www.debian.org/security/2016/dsa-3594
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html
- https://access.redhat.com/errata/RHSA-2016:1201
- http://www.securitytracker.com/id/1036026
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1700: extensions/renderer/runtime_custom_bindings.cc in Google Chrome before 51.0.2704.79 does not…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
extensions/renderer/runtime_custom_bindings.cc in Google Chrome before 51.0.2704.79 does not consider side effects during creation of an array of extension views, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to extensions.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1700 vulnerability.
References
- http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html
- https://codereview.chromium.org/1948773002
- https://crbug.com/608104
- https://access.redhat.com/errata/RHSA-2016:1201
- http://www.securitytracker.com/id/1036026
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://www.debian.org/security/2016/dsa-3594
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1681: Heap-based buffer overflow in the opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Heap-based buffer overflow in the opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1681 vulnerability.
References
- https://codereview.chromium.org/2001663002
- https://crbug.com/613160
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1693: browser/safe_browsing/srt_field_trial_win.cc in Google Chrome before 51.0.2704.63 does not use…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
browser/safe_browsing/srt_field_trial_win.cc in Google Chrome before 51.0.2704.63 does not use the HTTPS service on dl.google.com to obtain the Software Removal Tool, which allows remote attackers to spoof the chrome_cleanup_tool.exe (aka CCT) file via a man-in-the-middle attack on an HTTP session.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1693 vulnerability.
References
- https://codereview.chromium.org/1919043002
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- https://crbug.com/598752
- https://access.redhat.com/errata/RHSA-2016:1190
- http://www.securitytracker.com/id/1035981
- http://www.debian.org/security/2016/dsa-3590
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
- http://www.securityfocus.com/bid/90876
- https://security.gentoo.org/glsa/201607-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1696: The extensions subsystem in Google Chrome before 51.0.2704.79 does not properly restrict bindings…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The extensions subsystem in Google Chrome before 51.0.2704.79 does not properly restrict bindings access, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1696 vulnerability.
References
- http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html
- https://codereview.chromium.org/1866103002
- https://crbug.com/601073
- https://access.redhat.com/errata/RHSA-2016:1201
- http://www.securitytracker.com/id/1036026
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://www.debian.org/security/2016/dsa-3594
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1701: The Autofill implementation in Google Chrome before 51.0.2704.79 mishandles the interaction…
Published: 2016-06-05T23:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The Autofill implementation in Google Chrome before 51.0.2704.79 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1690.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1701 vulnerability.
References
- http://googlechromereleases.blogspot.com/2016/06/stable-channel-update.html
- https://codereview.chromium.org/1960023002
- https://crbug.com/608101
- https://access.redhat.com/errata/RHSA-2016:1201
- http://www.securitytracker.com/id/1036026
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
- http://www.debian.org/security/2016/dsa-3594
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00003.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0376: The com.ibm.rmi.io.SunSerializableFactory class in IBM SDK, Java Technology Edition 6 before SR16…
Published: 2016-06-03T14:59:00 Last Modified: 2019-06-24T16:48:00
Summary
The com.ibm.rmi.io.SunSerializableFactory class in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) does not properly deserialize classes in an AccessController doPrivileged block, which allows remote attackers to bypass a sandbox protection mechanism and execute arbitrary code as demonstrated by the readValue method of the com.ibm.rmi.io.ValueHandlerPool.ValueHandlerSingleton class, which implements the javax.rmi.CORBA.ValueHandler interface. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-5456.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0376 vulnerability.
References
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
- http://www-01.ibm.com/support/docview.wss?uid=swg1IX90171
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0702.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
- http://seclists.org/fulldisclosure/2016/Apr/43
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
- http://rhn.redhat.com/errata/RHSA-2016-0701.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
- http://www.security-explorations.com/materials/SE-2012-01-IBM-5.pdf
- http://www-01.ibm.com/support/docview.wss?uid=swg21980826
- http://rhn.redhat.com/errata/RHSA-2016-0708.html
- http://rhn.redhat.com/errata/RHSA-2016-0716.html
- https://access.redhat.com/errata/RHSA-2016:1430
- http://www.securityfocus.com/bid/89192
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
- http://www.securitytracker.com/id/1035953
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
- http://rhn.redhat.com/errata/RHSA-2016-1039.html
- https://access.redhat.com/errata/RHSA-2017:1216
- http://www.securityfocus.com/archive/1/538066/100/100/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0363: The com.ibm.CORBA.iiop.ClientDelegate class in IBM SDK, Java Technology Edition 6 before SR16…
Published: 2016-06-03T14:59:00 Last Modified: 2019-06-24T14:25:00
Summary
The com.ibm.CORBA.iiop.ClientDelegate class in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) uses the invoke method of the java.lang.reflect.Method class in an AccessController doPrivileged block, which allows remote attackers to call setSecurityManager and bypass a sandbox protection mechanism via vectors related to a Proxy object instance implementing the java.lang.reflect.InvocationHandler interface. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-3009.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0363 vulnerability.
References
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
- http://seclists.org/fulldisclosure/2016/Apr/3
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0702.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
- http://seclists.org/fulldisclosure/2016/Apr/20
- http://www-01.ibm.com/support/docview.wss?uid=swg1IX90172
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
- http://rhn.redhat.com/errata/RHSA-2016-0701.html
- http://www.security-explorations.com/materials/SE-2012-01-IBM-4.pdf
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21980826
- http://rhn.redhat.com/errata/RHSA-2016-0708.html
- http://rhn.redhat.com/errata/RHSA-2016-0716.html
- https://access.redhat.com/errata/RHSA-2016:1430
- http://www.securityfocus.com/bid/85895
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
- http://www.securitytracker.com/id/1035953
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
- http://rhn.redhat.com/errata/RHSA-2016-1039.html
- https://access.redhat.com/errata/RHSA-2017:1216
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-5126: Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local…
Published: 2016-06-01T22:59:00 Last Modified: 2021-08-04T17:15:00
Summary
Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-5126 vulnerability.
References
- https://lists.gnu.org/archive/html/qemu-block/2016-05/msg00779.html
- http://www.openwall.com/lists/oss-security/2016/05/30/6
- https://bugzilla.redhat.com/show_bug.cgi?id=1340924
- http://www.openwall.com/lists/oss-security/2016/05/30/7
- http://git.qemu.org/?p=qemu.git;a=commit;h=a6b3167fa0e825aebb5a7cd8b437b6d41584a196
- http://www.ubuntu.com/usn/USN-3047-1
- http://www.ubuntu.com/usn/USN-3047-2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://rhn.redhat.com/errata/RHSA-2016-1654.html
- http://rhn.redhat.com/errata/RHSA-2016-1653.html
- http://rhn.redhat.com/errata/RHSA-2016-1655.html
- http://rhn.redhat.com/errata/RHSA-2016-1763.html
- http://rhn.redhat.com/errata/RHSA-2016-1607.html
- http://rhn.redhat.com/errata/RHSA-2016-1606.html
- http://www.securityfocus.com/bid/90948
- http://rhn.redhat.com/errata/RHSA-2016-1756.html
- https://security.gentoo.org/glsa/201609-01
- https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4020: The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32…
Published: 2016-05-25T15:59:00 Last Modified: 2021-08-04T17:15:00
Summary
The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-4020 vulnerability.
References
- https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01118.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1313686
- http://git.qemu.org/?p=qemu.git;a=commit;h=691a02e2ce0c413236a78dee6f2651c937b09fb0
- https://lists.gnu.org/archive/html/qemu-devel/2016-04/msg01106.html
- http://www.ubuntu.com/usn/USN-2974-1
- http://www.securityfocus.com/bid/86067
- https://security.gentoo.org/glsa/201609-01
- https://access.redhat.com/errata/RHSA-2017:2408
- https://access.redhat.com/errata/RHSA-2017:2392
- https://access.redhat.com/errata/RHSA-2017:1856
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0264: Buffer overflow in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 6 before…
Published: 2016-05-24T15:59:00 Last Modified: 2021-09-09T17:17:00
Summary
Buffer overflow in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) allows remote attackers to execute arbitrary code via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0264 vulnerability.
References
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0702.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html
- http://rhn.redhat.com/errata/RHSA-2016-0701.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV84035
- http://www-01.ibm.com/support/docview.wss?uid=swg21980826
- http://rhn.redhat.com/errata/RHSA-2016-0708.html
- http://rhn.redhat.com/errata/RHSA-2016-0716.html
- https://access.redhat.com/errata/RHSA-2016:1430
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html
- http://www.securitytracker.com/id/1035953
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html
- http://rhn.redhat.com/errata/RHSA-2016-1039.html
- https://access.redhat.com/errata/RHSA-2017:1216
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2…
Published: 2016-05-23T10:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-4805 vulnerability.
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89
- https://github.com/torvalds/linux/commit/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89
- https://bugzilla.redhat.com/show_bug.cgi?id=1335803
- http://www.openwall.com/lists/oss-security/2016/05/15/2
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2
- http://www.ubuntu.com/usn/USN-3021-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
- http://www.ubuntu.com/usn/USN-3021-2
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
- http://www.debian.org/security/2016/dsa-3607
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
- http://www.securityfocus.com/bid/90605
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
- http://www.securitytracker.com/id/1036763
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-4578: sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data…
Published: 2016-05-23T10:59:00 Last Modified: 2019-03-25T18:58:00
Summary
sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-4578 vulnerability.
References
- https://github.com/torvalds/linux/commit/9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6
- https://github.com/torvalds/linux/commit/e4ec8cc8039a7063e24204299b462bd1383184a5
- https://bugzilla.redhat.com/show_bug.cgi?id=1335215
- http://www.openwall.com/lists/oss-security/2016/05/11/5
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4ec8cc8039a7063e24204299b462bd1383184a5
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6
- http://www.ubuntu.com/usn/USN-3017-2
- http://www.ubuntu.com/usn/USN-3018-2
- http://www.ubuntu.com/usn/USN-3016-4
- http://www.ubuntu.com/usn/USN-3016-1
- http://www.ubuntu.com/usn/USN-3016-2
- http://www.ubuntu.com/usn/USN-3016-3
- http://www.ubuntu.com/usn/USN-3018-1
- http://www.ubuntu.com/usn/USN-3019-1
- http://www.ubuntu.com/usn/USN-3017-3
- http://www.ubuntu.com/usn/USN-3020-1
- http://www.ubuntu.com/usn/USN-3017-1
- http://www.ubuntu.com/usn/USN-3021-1
- http://www.ubuntu.com/usn/USN-3021-2
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
- http://www.debian.org/security/2016/dsa-3607
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
- http://www.securityfocus.com/bid/90535
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- https://www.exploit-db.com/exploits/46529/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1833: The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X…
Published: 2016-05-20T10:59:00 Last Modified: 2019-03-25T17:22:00
Summary
The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1833 vulnerability.
References
- https://support.apple.com/HT206566
- http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
- https://support.apple.com/HT206567
- https://support.apple.com/HT206568
- https://support.apple.com/HT206564
- http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
- https://www.debian.org/security/2016/dsa-3593
- http://www.ubuntu.com/usn/USN-2994-1
- https://access.redhat.com/errata/RHSA-2016:1292
- https://bugs.chromium.org/p/project-zero/issues/detail?id=636
- https://git.gnome.org/browse/libxml2/commit/?id=0bcd05c5cd83dec3406c8f68b769b1d610c72f76
- https://bugzilla.gnome.org/show_bug.cgi?id=758606
- http://xmlsoft.org/news.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securitytracker.com/id/1035890
- https://kc.mcafee.com/corporate/index?page=content&id=SB10170
- https://www.tenable.com/security/tns-2016-18
- http://www.securityfocus.com/bid/90691
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1836: Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as…
Published: 2016-05-20T10:59:00 Last Modified: 2019-03-25T17:25:00
Summary
Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service via a crafted XML document.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1836 vulnerability.
References
- https://support.apple.com/HT206566
- http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
- https://support.apple.com/HT206567
- https://support.apple.com/HT206568
- https://support.apple.com/HT206564
- http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
- https://www.debian.org/security/2016/dsa-3593
- http://www.ubuntu.com/usn/USN-2994-1
- https://access.redhat.com/errata/RHSA-2016:1292
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- https://support.apple.com/HT206904
- https://support.apple.com/HT206899
- https://support.apple.com/HT206902
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
- https://support.apple.com/HT206905
- https://support.apple.com/HT206903
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
- https://support.apple.com/HT206901
- https://bugzilla.gnome.org/show_bug.cgi?id=759398
- https://git.gnome.org/browse/libxml2/commit/?id=45752d2c334b50016666d8f0ec3691e2d680f0a0
- http://xmlsoft.org/news.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securitytracker.com/id/1035890
- https://kc.mcafee.com/corporate/index?page=content&id=SB10170
- https://www.tenable.com/security/tns-2016-18
- https://security.gentoo.org/glsa/201701-37
- http://www.securityfocus.com/bid/90691
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1837: Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2)…
Published: 2016-05-20T10:59:00 Last Modified: 2019-03-25T17:26:00
Summary
Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1837 vulnerability.
References
- https://support.apple.com/HT206566
- http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
- https://support.apple.com/HT206567
- https://support.apple.com/HT206568
- https://support.apple.com/HT206564
- http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
- https://www.debian.org/security/2016/dsa-3593
- http://www.ubuntu.com/usn/USN-2994-1
- https://access.redhat.com/errata/RHSA-2016:1292
- https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852
- https://bugzilla.gnome.org/show_bug.cgi?id=760263
- http://xmlsoft.org/news.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securitytracker.com/id/1035890
- https://kc.mcafee.com/corporate/index?page=content&id=SB10170
- https://www.tenable.com/security/tns-2016-18
- http://www.securityfocus.com/bid/90691
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1838: The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS…
Published: 2016-05-20T10:59:00 Last Modified: 2019-03-25T17:26:00
Summary
The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-1838 vulnerability.
References
- https://support.apple.com/HT206566
- http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
- https://support.apple.com/HT206567
- https://support.apple.com/HT206568
- https://support.apple.com/HT206564
- http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
- https://www.debian.org/security/2016/dsa-3593
- http://www.ubuntu.com/usn/USN-2994-1
- https://access.redhat.com/errata/RHSA-2016:1292
- https://git.gnome.org/browse/libxml2/commit/?id=db07dd613e461df93dde7902c6505629bf0734e9
- https://bugs.chromium.org/p/project-zero/issues/detail?id=639
- https://bugzilla.gnome.org/show_bug.cgi?id=758588
- http://xmlsoft.org/news.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securitytracker.com/id/1035890
- https://kc.mcafee.com/corporate/index?page=content&id=SB10170
- https://www.tenable.com/security/tns-2016-18
- https://security.gentoo.org/glsa/201701-37
- http://www.securityfocus.com/bid/90691
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1839: The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X…
Published: 2016-05-20T10:59:00 Last Modified: 2019-03-25T17:27:00
Summary
The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-1839 vulnerability.
References
- https://support.apple.com/HT206566
- http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
- https://support.apple.com/HT206567
- https://support.apple.com/HT206568
- https://support.apple.com/HT206564
- http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
- https://www.debian.org/security/2016/dsa-3593
- http://www.ubuntu.com/usn/USN-2994-1
- https://access.redhat.com/errata/RHSA-2016:1292
- https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33
- https://bugzilla.gnome.org/show_bug.cgi?id=758605
- http://xmlsoft.org/news.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securitytracker.com/id/1035890
- https://kc.mcafee.com/corporate/index?page=content&id=SB10170
- https://www.tenable.com/security/tns-2016-18
- https://security.gentoo.org/glsa/201701-37
- http://www.securitytracker.com/id/1038623
- http://www.securityfocus.com/bid/90691
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1834: Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple…
Published: 2016-05-20T10:59:00 Last Modified: 2019-03-25T17:24:00
Summary
Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1834 vulnerability.
References
- https://support.apple.com/HT206566
- http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
- https://support.apple.com/HT206567
- https://support.apple.com/HT206568
- https://support.apple.com/HT206564
- http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
- https://www.debian.org/security/2016/dsa-3593
- http://www.ubuntu.com/usn/USN-2994-1
- https://access.redhat.com/errata/RHSA-2016:1292
- https://bugzilla.gnome.org/show_bug.cgi?id=763071
- https://git.gnome.org/browse/libxml2/commit/?id=8fbbf5513d609c1770b391b99e33314cd0742704
- http://xmlsoft.org/news.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securitytracker.com/id/1035890
- https://kc.mcafee.com/corporate/index?page=content&id=SB10170
- https://www.tenable.com/security/tns-2016-18
- http://www.securityfocus.com/bid/90691
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1840: Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as…
Published: 2016-05-20T10:59:00 Last Modified: 2019-03-25T17:27:00
Summary
Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1840 vulnerability.
References
- https://support.apple.com/HT206566
- http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
- https://support.apple.com/HT206567
- https://support.apple.com/HT206568
- https://support.apple.com/HT206564
- http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
- https://www.debian.org/security/2016/dsa-3593
- http://www.ubuntu.com/usn/USN-2994-1
- https://access.redhat.com/errata/RHSA-2016:1292
- https://bugzilla.gnome.org/show_bug.cgi?id=757711
- https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4
- http://xmlsoft.org/news.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securitytracker.com/id/1035890
- https://kc.mcafee.com/corporate/index?page=content&id=SB10170
- https://www.tenable.com/security/tns-2016-18
- https://security.gentoo.org/glsa/201701-37
- http://www.securityfocus.com/bid/90691
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3411: PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames…
Published: 2016-05-16T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3411 vulnerability.
References
- http://git.php.net/?p=php-src.git;a=commit;h=4435b9142ff9813845d5c97ab29a5d637bedb257
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69353
- http://www.securityfocus.com/bid/75255
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://www.securitytracker.com/id/1032709
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3412: PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames…
Published: 2016-05-16T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.
Common Weakness Enumeration (CWE): CWE-254: 7PK - Security Features
CWE Description: Software security is not security software. Here we’re concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3412 vulnerability.
References
- http://git.php.net/?p=php-src.git;a=commit;h=4435b9142ff9813845d5c97ab29a5d637bedb257
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69353
- http://www.securityfocus.com/bid/75250
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://www.securitytracker.com/id/1032709
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4602: The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40,…
Published: 2016-05-16T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a “type confusion” issue.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4602 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69152
- http://www.openwall.com/lists/oss-security/2015/06/16/12
- http://git.php.net/?p=php-src.git;a=commit;h=fb83c76deec58f1fab17c350f04c9f042e5977d1
- http://www.securityfocus.com/bid/75249
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://www.securitytracker.com/id/1032709
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4604: The mget function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before…
Published: 2016-05-16T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The mget function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly maintain a certain pointer relationship, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a “Python script text executable” rule.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4604 vulnerability.
References
- http://git.php.net/?p=php-src.git;a=commit;h=f938112c495b0d26572435c0be73ac0bfe642ecd
- http://php.net/ChangeLog-5.php
- http://www.openwall.com/lists/oss-security/2015/06/16/12
- https://bugs.php.net/bug.php?id=68819
- http://www.securityfocus.com/bid/75241
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://www.securitytracker.com/id/1032709
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4598: PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames…
Published: 2016-05-16T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4598 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69719
- http://www.openwall.com/lists/oss-security/2015/06/16/12
- http://www.securityfocus.com/bid/75244
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://www.securitytracker.com/id/1032709
- http://www.debian.org/security/2015/dsa-3344
- http://rhn.redhat.com/errata/RHSA-2015-1219.html
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4605: The mcopy function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before…
Published: 2016-05-16T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The mcopy function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly restrict a certain offset value, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a “Python script text executable” rule.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4605 vulnerability.
References
- http://git.php.net/?p=php-src.git;a=commit;h=f938112c495b0d26572435c0be73ac0bfe642ecd
- http://php.net/ChangeLog-5.php
- http://www.openwall.com/lists/oss-security/2015/06/16/12
- https://bugs.php.net/bug.php?id=68819
- http://www.securityfocus.com/bid/75233
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://www.securitytracker.com/id/1032709
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4644: The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP before…
Published: 2016-05-16T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not validate token extraction for table names, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4644 vulnerability.
References
- https://bugs.php.net/bug.php?id=69667
- http://php.net/ChangeLog-5.php
- http://git.php.net/?p=php-src.git;a=commit;h=2cc4e69cc6d8dbc4b3568ad3dd583324a7c11d64
- http://openwall.com/lists/oss-security/2015/06/18/6
- http://www.securityfocus.com/bid/75292
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- https://security.gentoo.org/glsa/201606-10
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://www.securitytracker.com/id/1032709
- http://www.debian.org/security/2015/dsa-3344
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4603: The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x…
Published: 2016-05-16T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a “type confusion” issue.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4603 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69152
- http://www.openwall.com/lists/oss-security/2015/06/16/12
- http://www.securityfocus.com/bid/75252
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://www.securitytracker.com/id/1032709
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4599: The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24,…
Published: 2016-05-16T10:59:00 Last Modified: 2018-01-05T02:30:00
Summary
The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a “type confusion” issue.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4599 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69152
- http://www.openwall.com/lists/oss-security/2015/06/16/12
- http://git.php.net/?p=php-src.git;a=commit;h=51856a76f87ecb24fe1385342be43610fb6c86e4
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/75251
- http://www.securitytracker.com/id/1032709
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4600: The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8…
Published: 2016-05-16T10:59:00 Last Modified: 2018-01-05T02:30:00
Summary
The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to “type confusion” issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4600 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69152
- http://www.openwall.com/lists/oss-security/2015/06/16/12
- http://git.php.net/?p=php-src.git;a=commit;h=0c136a2abd49298b66acb0cad504f0f972f5bfe8
- http://www.securityfocus.com/bid/74413
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securitytracker.com/id/1032709
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4601: PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or…
Published: 2016-05-16T10:59:00 Last Modified: 2018-01-05T02:30:00
Summary
PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to “type confusion” issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4601 vulnerability.
References
- http://php.net/ChangeLog-5.php
- http://www.openwall.com/lists/oss-security/2015/06/16/12
- http://git.php.net/?p=php-src.git;a=commit;h=0c136a2abd49298b66acb0cad504f0f972f5bfe8
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/75246
- http://www.securitytracker.com/id/1032709
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4643: Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before…
Published: 2016-05-16T10:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4643 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69545
- http://openwall.com/lists/oss-security/2015/06/18/6
- http://git.php.net/?p=php-src.git;a=commit;h=0765623d6991b62ffcd93ddb6be8a5203a2fa7e2
- http://www.securityfocus.com/bid/75291
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- https://security.gentoo.org/glsa/201606-10
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://www.securitytracker.com/id/1032709
- http://www.debian.org/security/2015/dsa-3344
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1666: Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.94 allow attackers to…
Published: 2016-05-14T21:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1666 vulnerability.
References
- https://crbug.com/607652
- http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
- https://bugs.chromium.org/p/chromium/issues/detail?id=601001
- https://bugs.chromium.org/p/chromium/issues/detail?id=605491
- http://rhn.redhat.com/errata/RHSA-2016-0707.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
- http://www.debian.org/security/2016/dsa-3564
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
- https://security.gentoo.org/glsa/201605-02
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
- http://www.ubuntu.com/usn/USN-2960-1
- http://www.securityfocus.com/bid/89106
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1665: The JSGenericLowering class in compiler/js-generic-lowering.cc in Google V8, as used in Google…
Published: 2016-05-14T21:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The JSGenericLowering class in compiler/js-generic-lowering.cc in Google V8, as used in Google Chrome before 50.0.2661.94, mishandles comparison operators, which allows remote attackers to obtain sensitive information via crafted JavaScript code.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1665 vulnerability.
References
- https://codereview.chromium.org/1925463003
- https://crbug.com/606181
- http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
- http://rhn.redhat.com/errata/RHSA-2016-0707.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
- http://www.debian.org/security/2016/dsa-3564
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
- https://security.gentoo.org/glsa/201605-02
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
- http://www.ubuntu.com/usn/USN-2960-1
- http://www.securityfocus.com/bid/89106
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1660: Blink, as used in Google Chrome before 50.0.2661.94, mishandles assertions in the WTF::BitArray…
Published: 2016-05-14T21:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Blink, as used in Google Chrome before 50.0.2661.94, mishandles assertions in the WTF::BitArray and WTF::double_conversion::Vector classes, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted web site.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1660 vulnerability.
References
- https://crbug.com/574802
- http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
- https://codereview.chromium.org/1672603002
- https://codereview.chromium.org/1677363002
- http://rhn.redhat.com/errata/RHSA-2016-0707.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
- http://www.debian.org/security/2016/dsa-3564
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
- https://security.gentoo.org/glsa/201605-02
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
- http://www.ubuntu.com/usn/USN-2960-1
- http://www.securityfocus.com/bid/89106
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1661: Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that frames satisfy a check…
Published: 2016-05-14T21:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that frames satisfy a check for the same renderer process in addition to a Same Origin Policy check, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted web site, related to BindingSecurity.cpp and DOMWindow.cpp.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 8.5
- Exploitability Score: 8.6
- CVSS: 8.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1661 vulnerability.
References
- https://crbug.com/601629
- http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
- https://codereview.chromium.org/1887553002/
- http://rhn.redhat.com/errata/RHSA-2016-0707.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
- http://www.debian.org/security/2016/dsa-3564
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
- https://security.gentoo.org/glsa/201605-02
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
- http://www.ubuntu.com/usn/USN-2960-1
- http://www.securityfocus.com/bid/89106
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1662: extensions/renderer/gc_callback.cc in Google Chrome before 50.0.2661.94 does not prevent fallback…
Published: 2016-05-14T21:59:00 Last Modified: 2018-10-30T16:27:00
Summary
extensions/renderer/gc_callback.cc in Google Chrome before 50.0.2661.94 does not prevent fallback execution once the Garbage Collection callback has started, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1662 vulnerability.
References
- https://crbug.com/603732
- http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
- https://codereview.chromium.org/1887423002
- http://rhn.redhat.com/errata/RHSA-2016-0707.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
- http://www.debian.org/security/2016/dsa-3564
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
- https://security.gentoo.org/glsa/201605-02
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
- http://www.securityfocus.com/bid/89106
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1664: The HistoryController::UpdateForCommit function in content/renderer/history_controller.cc in…
Published: 2016-05-14T21:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The HistoryController::UpdateForCommit function in content/renderer/history_controller.cc in Google Chrome before 50.0.2661.94 mishandles the interaction between subframe forward navigations and other forward navigations, which allows remote attackers to spoof the address bar via a crafted web site.
Common Weakness Enumeration (CWE): CWE-254: 7PK - Security Features
CWE Description: Software security is not security software. Here we’re concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1664 vulnerability.
References
- http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
- https://crbug.com/597322
- https://codereview.chromium.org/1848813005/
- http://rhn.redhat.com/errata/RHSA-2016-0707.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
- http://www.debian.org/security/2016/dsa-3564
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
- https://security.gentoo.org/glsa/201605-02
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
- http://www.securityfocus.com/bid/89106
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1663: The SerializedScriptValue::transferArrayBuffers function in…
Published: 2016-05-14T21:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The SerializedScriptValue::transferArrayBuffers function in WebKit/Source/bindings/core/v8/SerializedScriptValue.cpp in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.94, mishandles certain array-buffer data structures, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1663 vulnerability.
References
- https://crbug.com/603987
- https://codereview.chromium.org/1904913002/
- http://googlechromereleases.blogspot.com/2016/04/stable-channel-update_28.html
- http://rhn.redhat.com/errata/RHSA-2016-0707.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00048.html
- http://www.debian.org/security/2016/dsa-3564
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00004.html
- https://security.gentoo.org/glsa/201605-02
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00002.html
- http://www.ubuntu.com/usn/USN-2960-1
- http://www.securityfocus.com/bid/89106
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3710: The VGA module in QEMU improperly performs bounds checking on banked access to video memory,…
Published: 2016-05-11T21:59:00 Last Modified: 2021-08-04T17:15:00
Summary
The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the “Dark Portal” issue.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-3710 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2016/05/09/3
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01197.html
- http://xenbits.xen.org/xsa/advisory-179.html
- http://www.securitytracker.com/id/1035794
- http://www.debian.org/security/2016/dsa-3573
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
- http://www.ubuntu.com/usn/USN-2974-1
- http://rhn.redhat.com/errata/RHSA-2016-1019.html
- https://access.redhat.com/errata/RHSA-2016:1224
- http://rhn.redhat.com/errata/RHSA-2016-1002.html
- http://rhn.redhat.com/errata/RHSA-2016-1001.html
- http://rhn.redhat.com/errata/RHSA-2016-0725.html
- http://rhn.redhat.com/errata/RHSA-2016-0999.html
- http://rhn.redhat.com/errata/RHSA-2016-1000.html
- http://rhn.redhat.com/errata/RHSA-2016-0724.html
- http://rhn.redhat.com/errata/RHSA-2016-0997.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.securityfocus.com/bid/90316
- http://support.citrix.com/article/CTX212736
- http://rhn.redhat.com/errata/RHSA-2016-1943.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3712: Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of…
Published: 2016-05-11T21:59:00 Last Modified: 2020-05-14T15:35:00
Summary
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-3712 vulnerability.
References
- http://xenbits.xen.org/xsa/advisory-179.html
- https://lists.gnu.org/archive/html/qemu-devel/2016-05/msg01196.html
- http://www.securitytracker.com/id/1035794
- http://www.debian.org/security/2016/dsa-3573
- http://www.openwall.com/lists/oss-security/2016/05/09/4
- http://www.ubuntu.com/usn/USN-2974-1
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/90314
- http://support.citrix.com/article/CTX212736
- http://rhn.redhat.com/errata/RHSA-2017-0621.html
- http://rhn.redhat.com/errata/RHSA-2016-2585.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3717: The LABEL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to…
Published: 2016-05-05T18:59:00 Last Modified: 2018-10-09T20:00:00
Summary
The LABEL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to read arbitrary files via a crafted image.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: COMPLETE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-3717 vulnerability.
References
- https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
- https://www.imagemagick.org/script/changelog.php
- http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
- http://www.openwall.com/lists/oss-security/2016/05/03/18
- http://www.ubuntu.com/usn/USN-2990-1
- http://rhn.redhat.com/errata/RHSA-2016-0726.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
- http://www.debian.org/security/2016/dsa-3580
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
- https://security.gentoo.org/glsa/201611-21
- https://www.exploit-db.com/exploits/39767/
- https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
- http://www.securityfocus.com/archive/1/538378/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3716: The MSL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to…
Published: 2016-05-05T18:59:00 Last Modified: 2018-10-09T20:00:00
Summary
The MSL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to move arbitrary files via a crafted image.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-3716 vulnerability.
References
- https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
- https://www.imagemagick.org/script/changelog.php
- http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
- http://www.openwall.com/lists/oss-security/2016/05/03/18
- http://www.ubuntu.com/usn/USN-2990-1
- http://rhn.redhat.com/errata/RHSA-2016-0726.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
- http://www.debian.org/security/2016/dsa-3580
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
- https://security.gentoo.org/glsa/201611-21
- https://www.exploit-db.com/exploits/39767/
- https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
- http://www.securityfocus.com/archive/1/538378/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3718: The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow…
Published: 2016-05-05T18:59:00 Last Modified: 2018-10-09T20:00:00
Summary
The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-3718 vulnerability.
References
- https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
- https://www.imagemagick.org/script/changelog.php
- http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
- http://www.openwall.com/lists/oss-security/2016/05/03/18
- http://www.ubuntu.com/usn/USN-2990-1
- http://rhn.redhat.com/errata/RHSA-2016-0726.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
- http://www.debian.org/security/2016/dsa-3580
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
- https://security.gentoo.org/glsa/201611-21
- https://www.exploit-db.com/exploits/39767/
- https://lists.debian.org/debian-lts-announce/2018/06/msg00009.html
- http://www.securityfocus.com/archive/1/538378/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3715: The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers…
Published: 2016-05-05T18:59:00 Last Modified: 2018-10-09T19:59:00
Summary
The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-3715 vulnerability.
References
- https://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=29588
- https://www.imagemagick.org/script/changelog.php
- http://git.imagemagick.org/repos/ImageMagick/blob/a01518e08c840577cabd7d3ff291a9ba735f7276/ChangeLog
- http://www.openwall.com/lists/oss-security/2016/05/03/18
- http://www.ubuntu.com/usn/USN-2990-1
- http://rhn.redhat.com/errata/RHSA-2016-0726.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00024.html
- http://www.debian.org/security/2016/dsa-3580
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.440568
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00028.html
- http://www.securityfocus.com/bid/89852
- https://security.gentoo.org/glsa/201611-21
- https://www.exploit-db.com/exploits/39767/
- http://www.debian.org/security/2016/dsa-3746
- http://www.securityfocus.com/archive/1/538378/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2106: Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before…
Published: 2016-05-05T01:59:00 Last Modified: 2018-07-19T01:29:00
Summary
Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-2106 vulnerability.
References
- https://www.openssl.org/news/secadv/20160503.txt
- https://git.openssl.org/?p=openssl.git;a=commit;h=3f3582139fbb259a1c3cbb0a25236500a409bf26
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- http://rhn.redhat.com/errata/RHSA-2016-0722.html
- http://rhn.redhat.com/errata/RHSA-2016-0996.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- https://support.apple.com/HT206903
- http://www.securityfocus.com/bid/91787
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://rhn.redhat.com/errata/RHSA-2016-1650.html
- http://rhn.redhat.com/errata/RHSA-2016-1648.html
- http://rhn.redhat.com/errata/RHSA-2016-1649.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- http://www.securityfocus.com/bid/89744
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
- http://www.ubuntu.com/usn/USN-2959-1
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
- http://www.securitytracker.com/id/1035721
- http://www.debian.org/security/2016/dsa-3566
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
- https://bto.bluecoat.com/security-advisory/sa123
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- https://security.gentoo.org/glsa/201612-16
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://www.tenable.com/security/tns-2016-18
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://source.android.com/security/bulletin/pixel/2017-11-01
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://rhn.redhat.com/errata/RHSA-2016-2073.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2108: The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers…
Published: 2016-05-05T01:59:00 Last Modified: 2018-01-05T02:30:00
Summary
The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the “negative zero” issue.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-2108 vulnerability.
References
- https://git.openssl.org/?p=openssl.git;a=commit;h=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27
- https://www.openssl.org/news/secadv/20160503.txt
- https://git.openssl.org/?p=openssl.git;a=commit;h=3661bb4e7934668bd99ca777ea8b30eedfafa871
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
- http://source.android.com/security/bulletin/2016-07-01.html
- http://rhn.redhat.com/errata/RHSA-2016-0722.html
- http://rhn.redhat.com/errata/RHSA-2016-0996.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- https://support.apple.com/HT206903
- http://www.securityfocus.com/bid/91787
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/89752
- https://access.redhat.com/errata/RHSA-2016:1137
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
- http://www.ubuntu.com/usn/USN-2959-1
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
- http://www.securitytracker.com/id/1035721
- http://www.debian.org/security/2016/dsa-3566
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
- https://bto.bluecoat.com/security-advisory/sa123
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- http://support.citrix.com/article/CTX212736
- https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067&languageid=en-fr
- https://security.gentoo.org/glsa/201612-16
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- https://www.tenable.com/security/tns-2016-18
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://access.redhat.com/errata/RHSA-2017:0194
- https://access.redhat.com/errata/RHSA-2017:0193
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://rhn.redhat.com/errata/RHSA-2016-2073.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2105: Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t…
Published: 2016-05-05T01:59:00 Last Modified: 2019-02-21T15:09:00
Summary
Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-2105 vulnerability.
References
- https://www.openssl.org/news/secadv/20160503.txt
- https://git.openssl.org/?p=openssl.git;a=commit;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
- http://rhn.redhat.com/errata/RHSA-2016-0722.html
- http://rhn.redhat.com/errata/RHSA-2016-0996.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- https://support.apple.com/HT206903
- http://www.securityfocus.com/bid/91787
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://rhn.redhat.com/errata/RHSA-2016-1650.html
- http://rhn.redhat.com/errata/RHSA-2016-1648.html
- http://rhn.redhat.com/errata/RHSA-2016-1649.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- http://www.securityfocus.com/bid/89757
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
- http://www.ubuntu.com/usn/USN-2959-1
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
- http://www.securitytracker.com/id/1035721
- http://www.debian.org/security/2016/dsa-3566
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
- https://bto.bluecoat.com/security-advisory/sa123
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- https://security.gentoo.org/glsa/201612-16
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://www.tenable.com/security/tns-2016-18
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://source.android.com/security/bulletin/pixel/2017-11-01
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://rhn.redhat.com/errata/RHSA-2016-2073.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2107: The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider…
Published: 2016-05-05T01:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-2107 vulnerability.
References
- https://git.openssl.org/?p=openssl.git;a=commit;h=68595c0c2886e7942a14f98c17a55a88afb6c292
- https://www.openssl.org/news/secadv/20160503.txt
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
- http://source.android.com/security/bulletin/2016-07-01.html
- http://rhn.redhat.com/errata/RHSA-2016-0722.html
- http://rhn.redhat.com/errata/RHSA-2016-0996.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- https://support.apple.com/HT206903
- http://www.securityfocus.com/bid/91787
- https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- http://www.securityfocus.com/bid/89760
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html
- http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
- https://www.exploit-db.com/exploits/39768/
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html
- http://www.ubuntu.com/usn/USN-2959-1
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
- http://www.securitytracker.com/id/1035721
- http://www.debian.org/security/2016/dsa-3566
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html
- https://bto.bluecoat.com/security-advisory/sa123
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- http://support.citrix.com/article/CTX212736
- https://security.gentoo.org/glsa/201612-16
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://www.tenable.com/security/tns-2016-18
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- https://security.netapp.com/advisory/ntap-20160504-0001/
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://rhn.redhat.com/errata/RHSA-2016-2073.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2109: The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in…
Published: 2016-05-05T01:59:00 Last Modified: 2018-07-19T01:29:00
Summary
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-2109 vulnerability.
References
- https://www.openssl.org/news/secadv/20160503.txt
- https://git.openssl.org/?p=openssl.git;a=commit;h=c62981390d6cf9e3d612c489b8b77c2913b25807
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- http://rhn.redhat.com/errata/RHSA-2016-0722.html
- http://rhn.redhat.com/errata/RHSA-2016-0996.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- https://support.apple.com/HT206903
- http://www.securityfocus.com/bid/91787
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- http://www.securityfocus.com/bid/87940
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html
- https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html
- http://www.ubuntu.com/usn/USN-2959-1
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html
- http://www.securitytracker.com/id/1035721
- http://www.debian.org/security/2016/dsa-3566
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html
- https://bto.bluecoat.com/security-advisory/sa123
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- https://security.gentoo.org/glsa/201612-16
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://www.tenable.com/security/tns-2016-18
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://source.android.com/security/bulletin/2017-07-01
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- https://security.netapp.com/advisory/ntap-20160504-0001/
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://rhn.redhat.com/errata/RHSA-2016-2073.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr…
Published: 2016-05-02T10:59:00 Last Modified: 2021-07-15T19:16:00
Summary
The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.
Common Weakness Enumeration (CWE): CWE-552: Files or Directories Accessible to External Parties
CWE Description: The product makes files or directories accessible to unauthorized actors, even though they should not be.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-1350 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1185139
- http://www.openwall.com/lists/oss-security/2015/01/24/5
- http://marc.info/?l=linux-kernel&m=142153722930533&w=2
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770492
- http://www.securityfocus.com/bid/76075
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4170: Race condition in the ldsem_cmpxchg function in drivers/tty/tty_ldsem.c in the Linux kernel…
Published: 2016-05-02T10:59:00 Last Modified: 2017-11-12T02:29:00
Summary
Race condition in the ldsem_cmpxchg function in drivers/tty/tty_ldsem.c in the Linux kernel before 3.13-rc4-next-20131218 allows local users to cause a denial of service (ldsem_down_read and ldsem_down_write deadlock) by establishing a new tty thread during shutdown of a previous tty thread.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-4170 vulnerability.
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf872776fc84128bb779ce2b83a37c884c3203ae
- https://bugzilla.redhat.com/show_bug.cgi?id=1218879
- http://www.openwall.com/lists/oss-security/2015/05/26/1
- https://github.com/torvalds/linux/commit/cf872776fc84128bb779ce2b83a37c884c3203ae
- https://www.kernel.org/pub/linux/kernel/next/patch-v3.13-rc4-next-20131218.xz
- https://access.redhat.com/errata/RHSA-2016:1395
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/74820
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0647: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and…
Published: 2016-04-21T10:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0647 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.debian.org/security/2016/dsa-3595
- https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://www.securityfocus.com/bid/86495
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.ubuntu.com/usn/USN-2954-1
- http://www.securitytracker.com/id/1035606
- http://www.debian.org/security/2016/dsa-3557
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0655: Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier and MariaDB…
Published: 2016-04-21T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to InnoDB.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0655 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.debian.org/security/2016/dsa-3595
- https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/86424
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.ubuntu.com/usn/USN-2954-1
- http://www.securitytracker.com/id/1035606
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0648: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and…
Published: 2016-04-21T10:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to PS.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0648 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.debian.org/security/2016/dsa-3595
- https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://www.securityfocus.com/bid/86457
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.ubuntu.com/usn/USN-2954-1
- http://www.securitytracker.com/id/1035606
- http://www.debian.org/security/2016/dsa-3557
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0639: Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier allows remote…
Published: 2016-04-21T10:59:00 Last Modified: 2019-02-19T19:33:00
Summary
Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Pluggable Authentication.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0639 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/86418
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.ubuntu.com/usn/USN-2954-1
- http://www.securitytracker.com/id/1035606
- http://www.ubuntu.com/usn/USN-2953-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0643: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and…
Published: 2016-04-21T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0643 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.debian.org/security/2016/dsa-3595
- https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://www.securityfocus.com/bid/86486
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.ubuntu.com/usn/USN-2954-1
- http://www.securitytracker.com/id/1035606
- http://www.debian.org/security/2016/dsa-3557
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0641: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and…
Published: 2016-04-21T10:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.
Scores
- Impact Score: 4.9
- Exploitability Score: 6.8
- CVSS: 4.9
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0641 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.debian.org/security/2016/dsa-3595
- https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://www.securityfocus.com/bid/86470
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.securitytracker.com/id/1035606
- http://www.debian.org/security/2016/dsa-3557
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0665: Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local…
Published: 2016-04-21T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local users to affect availability via vectors related to Security: Encryption.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0665 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/86513
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.securitytracker.com/id/1035606
- http://www.ubuntu.com/usn/USN-2953-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0640: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and…
Published: 2016-04-21T10:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.
Scores
- Impact Score: 4.9
- Exploitability Score: 6.8
- CVSS: 4.9
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0640 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.debian.org/security/2016/dsa-3595
- https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://www.securityfocus.com/bid/86427
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.securitytracker.com/id/1035606
- http://www.debian.org/security/2016/dsa-3557
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0642: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and…
Published: 2016-04-21T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.
Scores
- Impact Score: 4.9
- Exploitability Score: 5.5
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:M/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: MULTIPLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0642 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/86445
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.ubuntu.com/usn/USN-2954-1
- http://www.securitytracker.com/id/1035606
- http://www.debian.org/security/2016/dsa-3557
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0650: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and…
Published: 2016-04-21T10:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to Replication.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0650 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.debian.org/security/2016/dsa-3595
- https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://www.securityfocus.com/bid/86496
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.securitytracker.com/id/1035606
- http://www.debian.org/security/2016/dsa-3557
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0661: Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local…
Published: 2016-04-21T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local users to affect availability via vectors related to Options.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0661 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/86511
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.securitytracker.com/id/1035606
- http://www.ubuntu.com/usn/USN-2953-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0668: Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier and MariaDB…
Published: 2016-04-21T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier and MariaDB 10.0.x before 10.0.24 and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to InnoDB.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.2
- CVSS: 1.7
- CVSS Vector: AV:N/AC:H/Au:M/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: MULTIPLE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0668 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.debian.org/security/2016/dsa-3595
- https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/86467
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.securitytracker.com/id/1035606
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0666: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and…
Published: 2016-04-21T10:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to Security: Privileges.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0666 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.debian.org/security/2016/dsa-3595
- https://mariadb.com/kb/en/mariadb/mariadb-10025-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5549-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10114-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://www.securityfocus.com/bid/86509
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.ubuntu.com/usn/USN-2954-1
- http://www.securitytracker.com/id/1035606
- http://www.debian.org/security/2016/dsa-3557
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0646: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and…
Published: 2016-04-21T10:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DML.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0646 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.debian.org/security/2016/dsa-3595
- https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/86436
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.securitytracker.com/id/1035606
- http://www.debian.org/security/2016/dsa-3557
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0644: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and…
Published: 2016-04-21T10:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DDL.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0644 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.debian.org/security/2016/dsa-3595
- https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securityfocus.com/bid/86442
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.securitytracker.com/id/1035606
- http://www.debian.org/security/2016/dsa-3557
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0649: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and…
Published: 2016-04-21T10:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0649 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.debian.org/security/2016/dsa-3595
- https://mariadb.com/kb/en/mariadb/mariadb-10024-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-5548-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10112-release-notes/
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1024168
- http://www.securityfocus.com/bid/86498
- http://rhn.redhat.com/errata/RHSA-2016-1602.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.securitytracker.com/id/1035606
- http://www.debian.org/security/2016/dsa-3557
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0695: Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and…
Published: 2016-04-21T10:59:00 Last Modified: 2020-09-08T12:30:00
Summary
Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality via vectors related to Security.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0695 vulnerability.
References
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://rhn.redhat.com/errata/RHSA-2016-0723.html
- https://security.gentoo.org/glsa/201606-18
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/86438
- https://kc.mcafee.com/corporate/index?page=content&id=SB10159
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html
- http://rhn.redhat.com/errata/RHSA-2016-0676.html
- http://rhn.redhat.com/errata/RHSA-2016-0675.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html
- http://www.ubuntu.com/usn/USN-2972-1
- http://www.ubuntu.com/usn/USN-2963-1
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html
- http://rhn.redhat.com/errata/RHSA-2016-0679.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html
- http://www.ubuntu.com/usn/USN-2964-1
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html
- http://rhn.redhat.com/errata/RHSA-2016-0677.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html
- http://rhn.redhat.com/errata/RHSA-2016-0678.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html
- http://rhn.redhat.com/errata/RHSA-2016-0651.html
- http://rhn.redhat.com/errata/RHSA-2016-0650.html
- http://www.debian.org/security/2016/dsa-3558
- http://www.securitytracker.com/id/1035596
- https://security.netapp.com/advisory/ntap-20160420-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0741: slapd/connection.c in 389 Directory Server (formerly Fedora Directory Server) 1.3.4.x before…
Published: 2016-04-19T21:59:00 Last Modified: 2016-10-12T02:01:00
Summary
slapd/connection.c in 389 Directory Server (formerly Fedora Directory Server) 1.3.4.x before 1.3.4.7 allows remote attackers to cause a denial of service (infinite loop and connection blocking) by leveraging an abnormally closed connection.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0741 vulnerability.
References
- https://fedorahosted.org/389/ticket/48412
- http://directory.fedoraproject.org/docs/389ds/releases/release-1-3-4-7.html
- http://www.securityfocus.com/bid/82343
- https://fedorahosted.org/389/changeset/cd45d032421b0ecf76d8cbb9b1c3aeef7680d9a2/
- http://rhn.redhat.com/errata/RHSA-2016-0204.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-5325: Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before…
Published: 2016-04-15T14:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-5325 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1218297
- http://www.openwall.com/lists/oss-security/2016/02/15/7
- https://bugs.linuxfoundation.org/show_bug.cgi?id=515
- http://rhn.redhat.com/errata/RHSA-2016-0491.html
- http://www.openwall.com/lists/oss-security/2016/02/15/1
- http://bzr.linuxfoundation.org/loggerhead/openprinting/foomatic-4.0/foomatic-filters/annotate/head:/ChangeLog
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-8540: Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99,…
Published: 2016-04-14T14:59:00 Last Modified: 2021-06-29T15:15:00
Summary
Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-8540 vulnerability.
References
- http://sourceforge.net/projects/libpng/files/libpng10/1.0.66/
- http://www.openwall.com/lists/oss-security/2015/12/10/7
- http://www.openwall.com/lists/oss-security/2015/12/11/2
- http://sourceforge.net/projects/libpng/files/libpng12/1.2.56/
- http://sourceforge.net/p/libpng/bugs/244/
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174435.html
- http://sourceforge.net/projects/libpng/files/libpng15/1.5.26/
- http://sourceforge.net/projects/libpng/files/libpng14/1.4.19/
- http://www.securityfocus.com/bid/80592
- http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/
- http://www.openwall.com/lists/oss-security/2015/12/10/6
- http://www.openwall.com/lists/oss-security/2015/12/17/10
- http://www.openwall.com/lists/oss-security/2015/12/11/1
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://access.redhat.com/errata/RHSA-2016:1430
- https://security.gentoo.org/glsa/201611-08
- http://www.debian.org/security/2016/dsa-3443
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0739: libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-…
Published: 2016-04-13T17:59:00 Last Modified: 2017-12-09T02:29:00
Summary
libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a “bits/bytes confusion bug.”
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0739 vulnerability.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178822.html
- http://rhn.redhat.com/errata/RHSA-2016-0566.html
- https://www.libssh.org/2016/02/23/libssh-0-7-3-security-and-bugfix-release/
- http://www.ubuntu.com/usn/USN-2912-1
- https://www.libssh.org/security/advisories/CVE-2016-0739.txt
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178058.html
- http://www.debian.org/security/2016/dsa-3488
- https://security.gentoo.org/glsa/201606-12
- http://lists.opensuse.org/opensuse-updates/2016-03/msg00111.html
- https://puppet.com/security/cve/CVE-2016-0739
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3068: Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted git ext::…
Published: 2016-04-13T16:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted git ext:: URL when cloning a subrepository.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-3068 vulnerability.
References
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00017.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181505.html
- https://selenic.com/repo/hg-stable/rev/34d43cb85de8
- https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_3.7.3_.282016-3-29.29
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181542.html
- http://www.debian.org/security/2016/dsa-3542
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00043.html
- http://rhn.redhat.com/errata/RHSA-2016-0706.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/85733
- https://security.gentoo.org/glsa/201612-19
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-3069: Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted name when…
Published: 2016-04-13T16:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted name when converting a Git repository.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-3069 vulnerability.
References
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00018.html
- https://selenic.com/repo/hg-stable/rev/197eed39e3d5
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00017.html
- https://selenic.com/repo/hg-stable/rev/ae279d4a19e9
- https://selenic.com/repo/hg-stable/rev/b732e7f2aba4
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181505.html
- https://selenic.com/repo/hg-stable/rev/cdda7b96afff
- https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_3.7.3_.282016-3-29.29
- http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181542.html
- http://www.debian.org/security/2016/dsa-3542
- https://selenic.com/repo/hg-stable/rev/80cac1de6aea
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00043.html
- http://rhn.redhat.com/errata/RHSA-2016-0706.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201612-19
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-8553: Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS…
Published: 2016-04-13T15:59:00 Last Modified: 2019-08-13T23:15:00
Summary
Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-8553 vulnerability.
References
- http://xenbits.xen.org/xsa/advisory-120.html
- https://www.debian.org/security/2019/dsa-4497
- https://seclists.org/bugtraq/2019/Aug/18
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2857: The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to…
Published: 2016-04-12T02:00:00 Last Modified: 2021-08-04T17:15:00
Summary
The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-2857 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2016/03/03/9
- http://www.openwall.com/lists/oss-security/2016/03/07/3
- http://git.qemu.org/?p=qemu.git;a=commitdiff;h=362786f14a753d8a5256ef97d7c10ed576d6572b
- http://www.ubuntu.com/usn/USN-2974-1
- http://www.securityfocus.com/bid/84130
- http://rhn.redhat.com/errata/RHSA-2017-0350.html
- http://rhn.redhat.com/errata/RHSA-2017-0344.html
- http://rhn.redhat.com/errata/RHSA-2017-0334.html
- http://rhn.redhat.com/errata/RHSA-2017-0309.html
- http://rhn.redhat.com/errata/RHSA-2017-0083.html
- http://rhn.redhat.com/errata/RHSA-2016-2706.html
- http://rhn.redhat.com/errata/RHSA-2016-2705.html
- http://rhn.redhat.com/errata/RHSA-2016-2704.html
- http://rhn.redhat.com/errata/RHSA-2016-2671.html
- http://rhn.redhat.com/errata/RHSA-2016-2670.html
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5229: The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not…
Published: 2016-04-08T15:59:00 Last Modified: 2016-11-28T19:32:00
Summary
The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-17:
CWE Description:
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5229 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1293976
- http://rhn.redhat.com/errata/RHSA-2016-0176.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1246713
- https://bugzilla.redhat.com/show_bug.cgi?id=1256285
- https://kc.mcafee.com/corporate/index?page=content&id=SB10150
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/84172
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0636: Unspecified vulnerability in Oracle Java SE 7u97, 8u73, and 8u74 allows remote attackers to…
Published: 2016-03-24T18:59:00 Last Modified: 2020-09-08T12:30:00
Summary
Unspecified vulnerability in Oracle Java SE 7u97, 8u73, and 8u74 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to the Hotspot sub-component.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0636 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/alert-cve-2016-0636-2949497.html
- http://rhn.redhat.com/errata/RHSA-2016-0516.html
- https://security.gentoo.org/glsa/201606-18
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/85376
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00008.html
- http://www.ubuntu.com/usn/USN-2942-1
- http://rhn.redhat.com/errata/RHSA-2016-0512.html
- http://rhn.redhat.com/errata/RHSA-2016-0511.html
- http://rhn.redhat.com/errata/RHSA-2016-0513.html
- http://www.securitytracker.com/id/1035401
- http://www.debian.org/security/2016/dsa-3558
- http://rhn.redhat.com/errata/RHSA-2016-0514.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00013.html
- http://rhn.redhat.com/errata/RHSA-2016-0515.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00005.html
- https://security.gentoo.org/glsa/201610-08
- https://security.netapp.com/advisory/ntap-20160328-0001/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-1762: The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of…
Published: 2016-03-24T01:59:00 Last Modified: 2019-03-26T17:11:00
Summary
The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-1762 vulnerability.
References
- https://support.apple.com/HT206166
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00005.html
- https://support.apple.com/HT206169
- https://support.apple.com/HT206171
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- https://support.apple.com/HT206168
- https://support.apple.com/HT206167
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- https://www.debian.org/security/2016/dsa-3593
- http://www.ubuntu.com/usn/USN-2994-1
- https://access.redhat.com/errata/RHSA-2016:1292
- https://git.gnome.org/browse/libxml2/commit/?id=a7a94612aa3b16779e2c74e1fa353b5d9786c602
- https://bugzilla.gnome.org/show_bug.cgi?id=759671
- http://xmlsoft.org/news.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.securityfocus.com/bid/85059
- http://www.securitytracker.com/id/1035353
- https://kc.mcafee.com/corporate/index?page=content&id=SB10170
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7547: Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the…
Published: 2016-02-18T21:59:00 Last Modified: 2022-01-25T14:15:00
Summary
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing “dual A/AAAA DNS queries” and the libnss_dns.so.2 NSS module.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2015-7547 vulnerability.
- glibc - 'getaddrinfo' Remote Stack Buffer Overflow by SpeeDr00t at 2016-09-06
- glibc - 'getaddrinfo' Stack Buffer Overflow (PoC) by Google Security Research at 2016-02-16
References
- http://ubuntu.com/usn/usn-2900-1
- https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=18665
- https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1293532
- https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html
- https://access.redhat.com/articles/2161461
- https://bto.bluecoat.com/security-advisory/sa114
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/
- http://rhn.redhat.com/errata/RHSA-2016-0176.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
- http://www.debian.org/security/2016/dsa-3481
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- https://security.gentoo.org/glsa/201602-02
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
- https://kc.mcafee.com/corporate/index?page=content&id=SB10150
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
- http://marc.info/?l=bugtraq&m=145672440608228&w=2
- http://marc.info/?l=bugtraq&m=146161017210491&w=2
- http://marc.info/?l=bugtraq&m=145690841819314&w=2
- http://marc.info/?l=bugtraq&m=145857691004892&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367
- http://marc.info/?l=bugtraq&m=145596041017029&w=2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/83265
- http://www.debian.org/security/2016/dsa-3480
- http://rhn.redhat.com/errata/RHSA-2016-0175.html
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en
- http://rhn.redhat.com/errata/RHSA-2016-0225.html
- http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
- http://rhn.redhat.com/errata/RHSA-2016-0277.html
- https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01
- http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
- https://support.lenovo.com/us/en/product_security/len_5450
- http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html
- https://www.kb.cert.org/vuls/id/457759
- http://www.vmware.com/security/advisories/VMSA-2016-0002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html
- http://support.citrix.com/article/CTX206991
- https://www.exploit-db.com/exploits/39454/
- http://www.securitytracker.com/id/1035020
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://www.exploit-db.com/exploits/40339/
- https://www.tenable.com/security/research/tra-2017-08
- https://security.netapp.com/advisory/ntap-20160217-0002/
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- http://seclists.org/fulldisclosure/2019/Sep/7
- https://seclists.org/bugtraq/2019/Sep/7
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
- http://seclists.org/fulldisclosure/2021/Sep/0
- http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-8629: The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5)…
Published: 2016-02-13T02:59:00 Last Modified: 2021-02-02T19:24:00
Summary
The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether ‘\0’ characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:N/AC:H/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-8629 vulnerability.
References
- https://github.com/krb5/krb5/commit/df17a1224a3406f57477bcd372c61e04c0e5a5bb
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8341
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/82801
- http://rhn.redhat.com/errata/RHSA-2016-0532.html
- http://rhn.redhat.com/errata/RHSA-2016-0493.html
- http://www.securitytracker.com/id/1034914
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
- http://www.debian.org/security/2016/dsa-3466
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-8631: Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5)…
Published: 2016-02-13T02:59:00 Last Modified: 2021-02-02T19:15:00
Summary
Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
Common Weakness Enumeration (CWE): CWE-772: Missing Release of Resource after Effective Lifetime
CWE Description: The software does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-8631 vulnerability.
References
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8343
- https://github.com/krb5/krb5/commit/83ed75feba32e46f736fcce0d96a0445f29b96c2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://rhn.redhat.com/errata/RHSA-2016-0532.html
- http://rhn.redhat.com/errata/RHSA-2016-0493.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00110.html
- http://www.debian.org/security/2016/dsa-3466
- http://www.securitytracker.com/id/1034916
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00059.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0985: Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and…
Published: 2016-02-10T20:59:00 Last Modified: 2017-09-10T01:29:00
Summary
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code by leveraging an unspecified “type confusion.”
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2016-0985 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
- https://security.gentoo.org/glsa/201603-07
- http://rhn.redhat.com/errata/RHSA-2016-0166.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
- http://www.securitytracker.com/id/1034970
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
- https://www.exploit-db.com/exploits/39461/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2047: The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x…
Published: 2016-01-27T20:59:00 Last Modified: 2019-12-27T16:08:00
Summary
The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject’s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a “/CN=” string in a field in a certificate, as demonstrated by “/OU=/CN=bar.com/CN=foo.com.”
Common Weakness Enumeration (CWE): CWE-254: 7PK - Security Features
CWE Description: Software security is not security software. Here we’re concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-2047 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2016/01/26/3
- https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
- http://www.debian.org/security/2016/dsa-3453
- https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
- https://mariadb.atlassian.net/browse/MDEV-9212
- https://mariadb.com/kb/en/mdb-10023-rn/
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/81810
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
- http://www.ubuntu.com/usn/USN-2954-1
- http://www.securitytracker.com/id/1035606
- http://www.debian.org/security/2016/dsa-3557
- http://www.ubuntu.com/usn/USN-2953-1
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-2051: Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17, as used in Google Chrome…
Published: 2016-01-25T11:59:00 Last Modified: 2016-12-07T18:33:00
Summary
Multiple unspecified vulnerabilities in Google V8 before 4.8.271.17, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-2051 vulnerability.
References
- http://googlechromereleases.blogspot.com/2016/01/stable-channel-update_20.html
- http://www.securityfocus.com/bid/81431
- http://rhn.redhat.com/errata/RHSA-2016-0072.html
- http://www.securitytracker.com/id/1034801
- http://www.ubuntu.com/usn/USN-2877-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0611: Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote…
Published: 2016-01-21T03:02:00 Last Modified: 2019-05-01T18:11:00
Summary
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0611 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/81164
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.securitytracker.com/id/1034708
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0595: Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier allows remote authenticated users to…
Published: 2016-01-21T03:02:00 Last Modified: 2018-10-30T16:27:00
Summary
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0595 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/81121
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.securitytracker.com/id/1034708
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0598: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and…
Published: 2016-01-21T03:02:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0598 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
- http://www.debian.org/security/2016/dsa-3453
- https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
- https://mariadb.com/kb/en/mdb-10023-rn/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/81182
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.debian.org/security/2016/dsa-3459
- http://www.securitytracker.com/id/1034708
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0608: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and…
Published: 2016-01-21T03:02:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0608 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
- http://www.debian.org/security/2016/dsa-3453
- https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
- https://mariadb.com/kb/en/mdb-10023-rn/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/81226
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.debian.org/security/2016/dsa-3459
- http://www.securitytracker.com/id/1034708
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0596: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB…
Published: 2016-01-21T03:02:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0596 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
- http://www.debian.org/security/2016/dsa-3453
- https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
- https://mariadb.com/kb/en/mdb-10023-rn/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/81130
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.debian.org/security/2016/dsa-3459
- http://www.securitytracker.com/id/1034708
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0609: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and…
Published: 2016-01-21T03:02:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.2
- CVSS: 1.7
- CVSS Vector: AV:N/AC:H/Au:M/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: MULTIPLE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0609 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
- http://www.debian.org/security/2016/dsa-3453
- https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
- https://mariadb.com/kb/en/mdb-10023-rn/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/81258
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.debian.org/security/2016/dsa-3459
- http://www.securitytracker.com/id/1034708
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0607: Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote…
Published: 2016-01-21T03:02:00 Last Modified: 2019-04-22T17:48:00
Summary
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to replication.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.8
- CVSS Vector: AV:N/AC:M/Au:M/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: MULTIPLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0607 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/81238
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.securitytracker.com/id/1034708
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0605: Unspecified vulnerability in Oracle MySQL 5.6.26 and earlier allows remote authenticated users to…
Published: 2016-01-21T03:02:00 Last Modified: 2018-10-30T16:27:00
Summary
Unspecified vulnerability in Oracle MySQL 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:N/AC:H/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0605 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/81253
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.securitytracker.com/id/1034708
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0600: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and…
Published: 2016-01-21T03:02:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0600 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
- http://www.debian.org/security/2016/dsa-3453
- https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
- https://mariadb.com/kb/en/mdb-10023-rn/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/81188
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.debian.org/security/2016/dsa-3459
- http://www.securitytracker.com/id/1034708
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0606: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and…
Published: 2016-01-21T03:02:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0606 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
- http://www.debian.org/security/2016/dsa-3453
- https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
- https://mariadb.com/kb/en/mdb-10023-rn/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.debian.org/security/2016/dsa-3459
- http://www.securitytracker.com/id/1034708
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0597: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and…
Published: 2016-01-21T03:02:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0597 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
- http://www.debian.org/security/2016/dsa-3453
- https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
- https://mariadb.com/kb/en/mdb-10023-rn/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/81151
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.debian.org/security/2016/dsa-3459
- http://www.securitytracker.com/id/1034708
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0610: Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and…
Published: 2016-01-21T03:02:00 Last Modified: 2019-04-22T17:48:00
Summary
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0610 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/
- https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/81198
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.securitytracker.com/id/1034708
- https://access.redhat.com/errata/RHSA-2016:1132
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0616: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x…
Published: 2016-01-21T03:02:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0616 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
- http://www.debian.org/security/2016/dsa-3453
- https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
- https://mariadb.com/kb/en/mdb-10023-rn/
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/81176
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://www.debian.org/security/2016/dsa-3459
- http://www.securitytracker.com/id/1034708
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0546: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and…
Published: 2016-01-21T03:01:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2016-0546 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
- http://www.debian.org/security/2016/dsa-3453
- https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
- https://mariadb.com/kb/en/mdb-10023-rn/
- https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html
- https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1301493
- https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/81066
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.debian.org/security/2016/dsa-3459
- http://www.securitytracker.com/id/1034708
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0504: Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote…
Published: 2016-01-21T03:00:00 Last Modified: 2018-10-30T16:27:00
Summary
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0503.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.0
- CVSS: 6.8
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0504 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/81077
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.securitytracker.com/id/1034708
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0503: Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote…
Published: 2016-01-21T03:00:00 Last Modified: 2018-10-30T16:27:00
Summary
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0504.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0503 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/81126
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.securitytracker.com/id/1034708
See also: All popular products CVE Vulnerabilities of redhat
CVE-2016-0505: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and…
Published: 2016-01-21T03:00:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.0
- CVSS: 6.8
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2016-0505 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/
- http://www.debian.org/security/2016/dsa-3453
- https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/
- https://mariadb.com/kb/en/mdb-10023-rn/
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.ubuntu.com/usn/USN-2881-1
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/81088
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html
- http://www.debian.org/security/2016/dsa-3459
- http://www.securitytracker.com/id/1034708
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1779: The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service…
Published: 2016-01-12T19:59:00 Last Modified: 2020-10-05T11:40:00
Summary
The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1779 vulnerability.
References
- http://www.debian.org/security/2015/dsa-3259
- https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html
- http://www.securitytracker.com/id/1033975
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html
- http://www.openwall.com/lists/oss-security/2015/03/24/9
- http://www.ubuntu.com/usn/USN-2608-1
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html
- http://www.securityfocus.com/bid/73303
- https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html
- http://rhn.redhat.com/errata/RHSA-2015-1943.html
- http://rhn.redhat.com/errata/RHSA-2015-1931.html
- http://www.openwall.com/lists/oss-security/2015/04/09/6
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- https://security.gentoo.org/glsa/201602-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7512: Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a…
Published: 2016-01-08T21:59:00 Last Modified: 2020-09-09T15:14:00
Summary
Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7512 vulnerability.
References
- http://www.securitytracker.com/id/1034527
- http://git.qemu.org/?p=qemu.git;a=commit;h=8b98a2f07175d46c3f7217639bd5e03f
- http://www.securityfocus.com/bid/78230
- http://www.openwall.com/lists/oss-security/2015/11/30/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- https://security.gentoo.org/glsa/201602-01
- http://www.debian.org/security/2016/dsa-3471
- http://www.debian.org/security/2016/dsa-3470
- http://www.debian.org/security/2016/dsa-3469
- http://rhn.redhat.com/errata/RHSA-2015-2696.html
- http://rhn.redhat.com/errata/RHSA-2015-2695.html
- http://rhn.redhat.com/errata/RHSA-2015-2694.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5277: The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C…
Published: 2015-12-17T19:59:00 Last Modified: 2017-07-01T01:29:00
Summary
The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-5277 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1262914
- https://sourceware.org/bugzilla/show_bug.cgi?id=17079
- http://www.securitytracker.com/id/1034196
- http://rhn.redhat.com/errata/RHSA-2015-2172.html
- https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html
- http://www.ubuntu.com/usn/USN-2985-2
- http://www.ubuntu.com/usn/USN-2985-1
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/78092
- https://security.gentoo.org/glsa/201702-11
- http://seclists.org/fulldisclosure/2019/Sep/7
- https://seclists.org/bugtraq/2019/Sep/7
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-8327: Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0…
Published: 2015-12-17T19:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via ` (backtick) characters in a print job.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-8327 vulnerability.
References
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806886
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS
- http://www.ubuntu.com/usn/USN-2831-1
- https://lists.debian.org/debian-printing/2015/11/msg00020.html
- http://www.ubuntu.com/usn/USN-2831-2
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406
- http://www.debian.org/security/2015/dsa-3411
- https://lists.debian.org/debian-printing/2015/12/msg00001.html
- http://rhn.redhat.com/errata/RHSA-2016-0491.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/78524
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00065.html
- http://www.debian.org/security/2015/dsa-3429
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5312: The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly…
Published: 2015-12-15T21:59:00 Last Modified: 2019-03-08T16:06:00
Summary
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5312 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1276693
- https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e
- http://www.ubuntu.com/usn/USN-2834-1
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://xmlsoft.org/news.html
- https://support.apple.com/HT206166
- https://support.apple.com/HT206169
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- https://support.apple.com/HT206168
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- https://support.apple.com/HT206167
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://www.debian.org/security/2015/dsa-3430
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.securityfocus.com/bid/79536
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- https://security.gentoo.org/glsa/201701-37
- http://www.securitytracker.com/id/1034243
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7497: Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before…
Published: 2015-12-15T21:59:00 Last Modified: 2017-09-14T01:29:00
Summary
Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7497 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1281862
- http://www.ubuntu.com/usn/USN-2834-1
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://xmlsoft.org/news.html
- https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9
- http://www.debian.org/security/2015/dsa-3430
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79508
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- https://security.gentoo.org/glsa/201701-37
- http://www.securitytracker.com/id/1034243
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7498: Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3…
Published: 2015-12-15T21:59:00 Last Modified: 2017-09-14T01:29:00
Summary
Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7498 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1281879
- https://git.gnome.org/browse/libxml2/commit/?id=afd27c21f6b36e22682b7da20d726bce2dcb2f43
- http://www.ubuntu.com/usn/USN-2834-1
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://xmlsoft.org/news.html
- http://www.debian.org/security/2015/dsa-3430
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79548
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- https://security.gentoo.org/glsa/201701-37
- http://www.securitytracker.com/id/1034243
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7500: The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers…
Published: 2015-12-15T21:59:00 Last Modified: 2019-03-08T16:06:00
Summary
The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7500 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- https://git.gnome.org/browse/libxml2/commit/?id=f1063fdbe7fa66332bbb76874101c2a7b51b519f
- http://www.ubuntu.com/usn/USN-2834-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1281943
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://xmlsoft.org/news.html
- https://support.apple.com/HT206166
- https://support.apple.com/HT206169
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- https://support.apple.com/HT206168
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- https://support.apple.com/HT206167
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://www.debian.org/security/2015/dsa-3430
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.securityfocus.com/bid/79562
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- https://security.gentoo.org/glsa/201701-37
- http://www.securitytracker.com/id/1034243
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7499: Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows…
Published: 2015-12-15T21:59:00 Last Modified: 2019-03-19T01:04:00
Summary
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7499 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1281925
- https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc
- http://www.ubuntu.com/usn/USN-2834-1
- https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://xmlsoft.org/news.html
- https://support.apple.com/HT206166
- https://support.apple.com/HT206169
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- https://support.apple.com/HT206168
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- https://support.apple.com/HT206167
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://www.debian.org/security/2015/dsa-3430
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79509
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- https://security.gentoo.org/glsa/201701-37
- http://www.securitytracker.com/id/1034243
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-8241: The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows…
Published: 2015-12-15T21:59:00 Last Modified: 2017-09-14T01:29:00
Summary
The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-8241 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- https://bugzilla.gnome.org/show_bug.cgi?id=756263
- http://www.openwall.com/lists/oss-security/2015/11/18/23
- http://www.openwall.com/lists/oss-security/2015/11/17/5
- http://www.ubuntu.com/usn/USN-2834-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1281936
- https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://www.debian.org/security/2015/dsa-3430
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.securityfocus.com/bid/77621
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://www.securitytracker.com/id/1034243
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-8242: The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before…
Published: 2015-12-15T21:59:00 Last Modified: 2019-03-08T16:06:00
Summary
The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-8242 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- https://bugzilla.gnome.org/show_bug.cgi?id=756372
- http://www.openwall.com/lists/oss-security/2015/11/18/23
- http://www.openwall.com/lists/oss-security/2015/11/17/5
- http://www.ubuntu.com/usn/USN-2834-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1281950
- https://git.gnome.org/browse/libxml2/commit/?id=8fb4a770075628d6441fb17a1e435100e2f3b1a2
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://xmlsoft.org/news.html
- https://support.apple.com/HT206166
- https://support.apple.com/HT206169
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- https://support.apple.com/HT206168
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- https://support.apple.com/HT206167
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.securityfocus.com/bid/77681
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- https://security.gentoo.org/glsa/201701-37
- http://www.securitytracker.com/id/1034243
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-8317: The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent…
Published: 2015-12-15T21:59:00 Last Modified: 2017-09-14T01:29:00
Summary
The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-8317 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://www.openwall.com/lists/oss-security/2015/11/21/1
- https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e
- https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c
- https://bugzilla.gnome.org/show_bug.cgi?id=751603
- http://www.openwall.com/lists/oss-security/2015/11/22/3
- https://blog.fuzzing-project.org/28-Libxml2-Several-out-of-bounds-reads.html
- http://www.ubuntu.com/usn/USN-2834-1
- https://bugzilla.gnome.org/show_bug.cgi?id=751631
- https://bugzilla.redhat.com/show_bug.cgi?id=1281930
- http://www.debian.org/security/2015/dsa-3430
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.securityfocus.com/bid/77681
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- https://support.apple.com/HT206905
- https://support.apple.com/HT206904
- https://support.apple.com/HT206903
- https://support.apple.com/HT206902
- https://support.apple.com/HT206901
- https://support.apple.com/HT206899
- http://www.securityfocus.com/bid/91826
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://www.securitytracker.com/id/1034243
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3276: The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse…
Published: 2015-12-07T20:59:00 Last Modified: 2016-10-15T02:01:00
Summary
The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.
Common Weakness Enumeration (CWE): CWE-310: Cryptographic Issues
CWE Description: Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3276 vulnerability.
References
- http://www.securitytracker.com/id/1034221
- http://rhn.redhat.com/errata/RHSA-2015-2131.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1238322
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5006: IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR2, 7 R1 before SR3…
Published: 2015-12-07T20:59:00 Last Modified: 2019-06-19T15:35:00
Summary
IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR2, 7 R1 before SR3 FP20, 7 before SR9 FP20, 6 R1 before SR8 FP15, and 6 before SR16 FP15 allow physically proximate attackers to obtain sensitive information by reading the Kerberos Credential Cache.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-5006 vulnerability.
References
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV78316
- http://www.securitytracker.com/id/1034214
- http://www-01.ibm.com/support/docview.wss?uid=swg21969225
- https://access.redhat.com/errata/RHSA-2016:1430
- http://www.securityfocus.com/bid/77645
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2015-2506.html
- http://rhn.redhat.com/errata/RHSA-2015-2507.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
- http://rhn.redhat.com/errata/RHSA-2015-2509.html
- http://rhn.redhat.com/errata/RHSA-2015-2508.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5287: The abrt-hook-ccpp help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local…
Published: 2015-12-07T18:59:00 Last Modified: 2016-12-07T18:16:00
Summary
The abrt-hook-ccpp help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users with certain permissions to gain privileges via a symlink attack on a file with a predictable name, as demonstrated by /var/tmp/abrt/abrt-hax-coredump or /var/spool/abrt/abrt-hax-coredump.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Exploits Database (Total Exploits Count: 3)
Code designed for conducting penetration testing on CVE-2015-5287 vulnerability.
- ABRT - sosreport Privilege Escalation (Metasploit) by Metasploit at 2019-09-25
- RHEL 7.0/7.1 - 'abrt/sosreport' Local Privilege Escalation by rebel at 2015-12-01
- abrt (Centos 7.1 / Fedora 22) - Local Privilege Escalation by rebel at 2015-12-01
References
- http://www.openwall.com/lists/oss-security/2015/12/01/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1266837
- http://rhn.redhat.com/errata/RHSA-2015-2505.html
- https://github.com/abrt/abrt/commit/3c1b60cfa62d39e5fff5a53a5bc53dae189e740e
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/78137
- https://www.exploit-db.com/exploits/38832/
- http://packetstormsecurity.com/files/154592/ABRT-sosreport-Privilege-Escalation.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5273: The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool…
Published: 2015-12-07T18:59:00 Last Modified: 2016-12-07T18:16:00
Summary
The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users to write to arbitrary files via a symlink attack on unpacked.cpio in a pre-created directory with a predictable name in /var/tmp.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2015-5273 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2015/12/01/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1262252
- http://rhn.redhat.com/errata/RHSA-2015-2505.html
- https://github.com/abrt/abrt/commit/50ee8130fb4cd4ef1af7682a2c85dd99cb99424e
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/78113
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172809.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3196: ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when…
Published: 2015-12-06T20:59:00 Last Modified: 2019-06-13T18:15:00
Summary
ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3196 vulnerability.
References
- http://openssl.org/news/secadv/20151203.txt
- https://git.openssl.org/?p=openssl.git;a=commit;h=3c66a669dfc7b3792f7af0758ea26fe8502ce70c
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://marc.info/?l=bugtraq&m=145382583417444&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.securityfocus.com/bid/78622
- http://fortiguard.com/advisory/openssl-advisory-december-2015
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl
- http://rhn.redhat.com/errata/RHSA-2015-2617.html
- http://www.fortiguard.com/advisory/openssl-advisory-december-2015
- http://www.ubuntu.com/usn/USN-2830-1
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html
- http://www.debian.org/security/2015/dsa-3413
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322
- http://www.securitytracker.com/id/1034294
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3195: The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0…
Published: 2015-12-06T20:59:00 Last Modified: 2021-01-19T17:27:00
Summary
The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3195 vulnerability.
References
- http://openssl.org/news/secadv/20151203.txt
- https://git.openssl.org/?p=openssl.git;a=commit;h=cc598f321fbac9c04da5766243ed55d55948637d
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://support.apple.com/HT206167
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://marc.info/?l=bugtraq&m=145382583417444&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.securityfocus.com/bid/91787
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.securityfocus.com/bid/78626
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
- http://fortiguard.com/advisory/openssl-advisory-december-2015
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://www.fortiguard.com/advisory/openssl-advisory-december-2015
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html
- http://www.debian.org/security/2015/dsa-3413
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl
- http://rhn.redhat.com/errata/RHSA-2015-2617.html
- http://rhn.redhat.com/errata/RHSA-2015-2616.html
- http://www.ubuntu.com/usn/USN-2830-1
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00103.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.securitytracker.com/id/1034294
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5281: The grub2 package before 2.02-0.29 in Red Hat Enterprise Linux (RHEL) 7, when used on UEFI…
Published: 2015-11-24T20:59:00 Last Modified: 2016-12-07T18:16:00
Summary
The grub2 package before 2.02-0.29 in Red Hat Enterprise Linux (RHEL) 7, when used on UEFI systems, allows local users to bypass intended Secure Boot restrictions and execute non-verified code via a crafted (1) multiboot or (2) multiboot2 module in the configuration file or physically proximate attackers to bypass intended Secure Boot restrictions and execute non-verified code via the (3) boot menu.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 4.9
- Exploitability Score: 1.9
- CVSS: 2.6
- CVSS Vector: AV:L/AC:H/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-5281 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1264103
- http://www.securitytracker.com/id/1034198
- http://rhn.redhat.com/errata/RHSA-2015-2401.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77983
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172942.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172611.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7981: The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54,…
Published: 2015-11-24T20:59:00 Last Modified: 2017-07-01T01:29:00
Summary
The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-7981 vulnerability.
References
- http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/
- http://sourceforge.net/p/libpng/bugs/241/
- http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/
- http://www.openwall.com/lists/oss-security/2015/10/26/1
- http://www.debian.org/security/2015/dsa-3399
- http://www.openwall.com/lists/oss-security/2015/10/26/3
- http://www.ubuntu.com/usn/USN-2815-1
- http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/
- http://rhn.redhat.com/errata/RHSA-2015-2595.html
- http://rhn.redhat.com/errata/RHSA-2015-2594.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- https://access.redhat.com/errata/RHSA-2016:1430
- http://www.securityfocus.com/bid/77304
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html
- http://www.securitytracker.com/id/1034393
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html
- https://security.gentoo.org/glsa/201611-08
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-8126: Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before…
Published: 2015-11-13T03:59:00 Last Modified: 2020-09-08T12:30:00
Summary
Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-8126 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2015/11/12/2
- http://www.debian.org/security/2015/dsa-3399
- http://www.ubuntu.com/usn/USN-2815-1
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- https://code.google.com/p/chromium/issues/detail?id=560291
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- https://support.apple.com/HT206167
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174905.html
- http://rhn.redhat.com/errata/RHSA-2015-2596.html
- http://rhn.redhat.com/errata/RHSA-2015-2595.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175073.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174936.html
- http://rhn.redhat.com/errata/RHSA-2015-2594.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- https://access.redhat.com/errata/RHSA-2016:1430
- http://www.securityfocus.com/bid/77568
- https://security.gentoo.org/glsa/201603-09
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html
- http://www.debian.org/security/2016/dsa-3507
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177344.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177382.html
- https://kc.mcafee.com/corporate/index?page=content&id=SB10148
- http://rhn.redhat.com/errata/RHSA-2016-0057.html
- http://rhn.redhat.com/errata/RHSA-2016-0056.html
- http://rhn.redhat.com/errata/RHSA-2016-0055.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00028.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00159.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172797.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00063.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00062.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00034.html
- http://www.securitytracker.com/id/1034142
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172769.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172823.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172324.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00030.html
- https://security.gentoo.org/glsa/201611-08
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4913: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows…
Published: 2015-10-22T00:00:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4913 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77153
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4910: Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated…
Published: 2015-10-22T00:00:00 Last Modified: 2016-12-24T02:59:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:N/AC:H/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4910 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/77234
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4836: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier,…
Published: 2015-10-21T23:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.8
- CVSS Vector: AV:N/AC:M/Au:M/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: MULTIPLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4836 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77190
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4861: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier,…
Published: 2015-10-21T23:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4861 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77137
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4862: Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated…
Published: 2015-10-21T23:59:00 Last Modified: 2016-12-24T02:59:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to DML.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4862 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/77147
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4870: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier,…
Published: 2015-10-21T23:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2015-4870 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77208
- http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://www.exploit-db.com/exploits/39867/
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4858: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier,…
Published: 2015-10-21T23:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4858 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77145
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4890: Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated…
Published: 2015-10-21T23:59:00 Last Modified: 2016-12-24T02:59:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Replication.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4890 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/77231
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4879: Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier,…
Published: 2015-10-21T23:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:N/AC:H/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4879 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77140
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4792: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows…
Published: 2015-10-21T21:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.2
- CVSS: 1.7
- CVSS Vector: AV:N/AC:H/Au:M/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: MULTIPLE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4792 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77171
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4800: Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated…
Published: 2015-10-21T21:59:00 Last Modified: 2016-12-24T02:59:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4800 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.securityfocus.com/bid/77216
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4802: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows…
Published: 2015-10-21T21:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4802 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77165
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4815: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows…
Published: 2015-10-21T21:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4815 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77222
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4830: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows…
Published: 2015-10-21T21:59:00 Last Modified: 2019-02-11T18:45:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4830 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77228
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4826: Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows…
Published: 2015-10-21T21:59:00 Last Modified: 2019-02-11T18:48:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4826 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://rhn.redhat.com/errata/RHSA-2016-0705.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77237
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2016-1480.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4816: Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated…
Published: 2015-10-21T21:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4816 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77134
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4819: Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier,…
Published: 2015-10-21T21:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-4819 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://rhn.redhat.com/errata/RHSA-2016-0534.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/77196
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html
- http://www.debian.org/security/2015/dsa-3385
- http://www.ubuntu.com/usn/USN-2781-1
- http://www.securitytracker.com/id/1033894
- http://www.debian.org/security/2015/dsa-3377
- https://access.redhat.com/errata/RHSA-2016:1132
- http://rhn.redhat.com/errata/RHSA-2016-1481.html
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-7833: The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7…
Published: 2015-10-19T10:59:00 Last Modified: 2017-09-13T01:29:00
Summary
The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.
Common Weakness Enumeration (CWE): CWE-17:
CWE Description:
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-7833 vulnerability.
References
- http://www.securityfocus.com/archive/1/536629
- http://www.os-s.net/advisories/DOS-KernelCrashesOnInvalidUSBDeviceDescriptors-UsbvisionDriver.pdf
- https://bugzilla.redhat.com/show_bug.cgi?id=1201858
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
- http://www.ubuntu.com/usn/USN-2967-1
- http://www.ubuntu.com/usn/USN-2967-2
- http://www.ubuntu.com/usn/USN-2929-1
- http://www.ubuntu.com/usn/USN-2947-2
- http://www.ubuntu.com/usn/USN-2932-1
- http://www.ubuntu.com/usn/USN-2947-3
- http://www.ubuntu.com/usn/USN-2948-2
- http://www.ubuntu.com/usn/USN-2929-2
- http://www.ubuntu.com/usn/USN-2947-1
- http://www.ubuntu.com/usn/USN-2948-1
- http://www.securityfocus.com/bid/77030
- http://www.debian.org/security/2015/dsa-3396
- http://www.debian.org/security/2015/dsa-3426
- http://www.securitytracker.com/id/1034452
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5234: IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which…
Published: 2015-10-09T14:59:00 Last Modified: 2018-10-30T16:27:00
Summary
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5234 vulnerability.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167120.html
- http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2015-September/033546.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1233667
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167130.html
- http://rhn.redhat.com/errata/RHSA-2016-0778.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.ubuntu.com/usn/USN-2817-1
- http://www.securitytracker.com/id/1033780
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5235: IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of…
Published: 2015-10-09T14:59:00 Last Modified: 2018-10-30T16:27:00
Summary
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5235 vulnerability.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167120.html
- http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2015-September/033546.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1233697
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167130.html
- http://rhn.redhat.com/errata/RHSA-2016-0778.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.ubuntu.com/usn/USN-2817-1
- http://www.securitytracker.com/id/1033780
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9751: The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X…
Published: 2015-10-06T01:59:00 Last Modified: 2021-09-08T17:19:00
Summary
The read_network_packet function in ntp_io.c in ntpd in NTP 4.x before 4.2.8p1 on Linux and OS X does not properly determine whether a source IP address is an IPv6 loopback address, which makes it easier for remote attackers to spoof restricted packets, and read or write to the runtime state, by leveraging the ability to reach the ntpd machine’s network interface with a packet from the ::1 address.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9751 vulnerability.
References
- http://bugs.ntp.org/show_bug.cgi?id=2672
- http://www.kb.cert.org/vuls/id/852879
- http://support.ntp.org/bin/view/Main/SecurityNotice#December_2014_NTP_Security_Vulne
- https://bugzilla.redhat.com/show_bug.cgi?id=1184572
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/72584
- http://www.debian.org/security/2015/dsa-3388
- http://rhn.redhat.com/errata/RHSA-2015-1459.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03886en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9750: ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows…
Published: 2015-10-06T01:59:00 Last Modified: 2020-06-18T16:38:00
Summary
ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field with an invalid value for the length of its value field.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9750 vulnerability.
References
- http://www.kb.cert.org/vuls/id/852879
- http://bugs.ntp.org/show_bug.cgi?id=2671
- https://bugzilla.redhat.com/show_bug.cgi?id=1184573
- http://support.ntp.org/bin/view/Main/SecurityNotice#December_2014_NTP_Security_Vulne
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/72583
- http://www.debian.org/security/2015/dsa-3388
- http://rhn.redhat.com/errata/RHSA-2015-1459.html
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03886en_us
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3247: Race condition in the worker_update_monitors_config function in SPICE 0.12.4 allows a remote…
Published: 2015-09-08T15:59:00 Last Modified: 2019-04-22T17:48:00
Summary
Race condition in the worker_update_monitors_config function in SPICE 0.12.4 allows a remote authenticated guest user to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-3247 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-1714.html
- http://rhn.redhat.com/errata/RHSA-2015-1715.html
- http://www.securitytracker.com/id/1033459
- http://rhn.redhat.com/errata/RHSA-2015-1713.html
- http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html
- http://www.ubuntu.com/usn/USN-2736-1
- http://www.securitytracker.com/id/1033460
- http://www.debian.org/security/2015/dsa-3354
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00018.html
- http://www.securitytracker.com/id/1033753
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5157: arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET…
Published: 2015-08-31T10:59:00 Last Modified: 2016-12-22T02:59:00
Summary
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-5157 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6
- https://github.com/torvalds/linux/commit/9b6e6a8334d56354853f9c255d1395c2ba570e0a
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b6e6a8334d56354853f9c255d1395c2ba570e0a
- http://www.openwall.com/lists/oss-security/2015/07/22/7
- http://rhn.redhat.com/errata/RHSA-2016-0715.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/76005
- http://rhn.redhat.com/errata/RHSA-2016-0212.html
- http://rhn.redhat.com/errata/RHSA-2016-0185.html
- http://rhn.redhat.com/errata/RHSA-2016-0224.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
- http://www.ubuntu.com/usn/USN-2691-1
- http://www.ubuntu.com/usn/USN-2690-1
- http://www.ubuntu.com/usn/USN-2689-1
- http://www.ubuntu.com/usn/USN-2688-1
- http://www.ubuntu.com/usn/USN-2687-1
- http://www.debian.org/security/2015/dsa-3313
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5364: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not…
Published: 2015-08-31T10:59:00 Last Modified: 2018-01-05T02:30:00
Summary
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5364 vulnerability.
References
- https://twitter.com/grsecurity/status/605854034260426753
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.6
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=beb39db59d14990e401e235faf66a6b9b31240b0
- https://bugzilla.redhat.com/show_bug.cgi?id=1239029
- http://www.openwall.com/lists/oss-security/2015/06/30/13
- https://github.com/torvalds/linux/commit/beb39db59d14990e401e235faf66a6b9b31240b0
- https://access.redhat.com/errata/RHSA-2016:1225
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75510
- http://rhn.redhat.com/errata/RHSA-2016-1100.html
- http://rhn.redhat.com/errata/RHSA-2016-1096.html
- http://rhn.redhat.com/errata/RHSA-2016-0045.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
- http://www.debian.org/security/2015/dsa-3329
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2015-1787.html
- http://rhn.redhat.com/errata/RHSA-2015-1778.html
- http://www.ubuntu.com/usn/USN-2714-1
- http://www.ubuntu.com/usn/USN-2713-1
- http://www.ubuntu.com/usn/USN-2684-1
- http://www.ubuntu.com/usn/USN-2683-1
- http://www.ubuntu.com/usn/USN-2682-1
- http://www.ubuntu.com/usn/USN-2681-1
- http://www.ubuntu.com/usn/USN-2680-1
- http://www.debian.org/security/2015/dsa-3313
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://www.securitytracker.com/id/1032794
- http://rhn.redhat.com/errata/RHSA-2015-1623.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5366: The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide…
Published: 2015-08-31T10:59:00 Last Modified: 2018-01-05T02:30:00
Summary
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5366 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.6
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=beb39db59d14990e401e235faf66a6b9b31240b0
- https://bugzilla.redhat.com/show_bug.cgi?id=1239029
- http://www.openwall.com/lists/oss-security/2015/06/30/13
- https://github.com/torvalds/linux/commit/beb39db59d14990e401e235faf66a6b9b31240b0
- https://access.redhat.com/errata/RHSA-2016:1225
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75510
- http://rhn.redhat.com/errata/RHSA-2016-1100.html
- http://rhn.redhat.com/errata/RHSA-2016-1096.html
- http://rhn.redhat.com/errata/RHSA-2016-0045.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
- http://www.debian.org/security/2015/dsa-3329
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2015-1787.html
- http://rhn.redhat.com/errata/RHSA-2015-1778.html
- http://www.ubuntu.com/usn/USN-2714-1
- http://www.ubuntu.com/usn/USN-2713-1
- http://www.ubuntu.com/usn/USN-2684-1
- http://www.ubuntu.com/usn/USN-2683-1
- http://www.ubuntu.com/usn/USN-2682-1
- http://www.ubuntu.com/usn/USN-2681-1
- http://www.ubuntu.com/usn/USN-2680-1
- http://www.debian.org/security/2015/dsa-3313
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://www.securitytracker.com/id/1032794
- http://rhn.redhat.com/errata/RHSA-2015-1623.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1819: The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption)…
Published: 2015-08-14T18:59:00 Last Modified: 2019-12-27T16:08:00
Summary
The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1819 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-1419.html
- https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9
- http://www.ubuntu.com/usn/USN-2812-1
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://xmlsoft.org/news.html
- https://support.apple.com/HT206166
- https://support.apple.com/HT206169
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- https://support.apple.com/HT206168
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- https://support.apple.com/HT206167
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/75570
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172710.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172943.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- https://security.gentoo.org/glsa/201507-08
- https://security.gentoo.org/glsa/201701-37
- http://www.securitytracker.com/id/1034243
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5165: The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen…
Published: 2015-08-12T14:59:00 Last Modified: 2022-02-11T14:52:00
Summary
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-908: Use of Uninitialized Resource
CWE Description: The software uses or accesses a resource that has not been initialized.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5165 vulnerability.
References
- http://xenbits.xen.org/xsa/advisory-140.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167820.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167792.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76153
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
- http://support.citrix.com/article/CTX201717
- http://rhn.redhat.com/errata/RHSA-2015-1833.html
- http://rhn.redhat.com/errata/RHSA-2015-1793.html
- http://rhn.redhat.com/errata/RHSA-2015-1740.html
- http://rhn.redhat.com/errata/RHSA-2015-1739.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165373.html
- http://www.securitytracker.com/id/1033176
- http://rhn.redhat.com/errata/RHSA-2015-1683.html
- http://rhn.redhat.com/errata/RHSA-2015-1674.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html
- http://www.debian.org/security/2015/dsa-3349
- http://www.debian.org/security/2015/dsa-3348
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1867: Pacemaker before 1.1.13 does not properly evaluate added nodes, which allows remote read-only…
Published: 2015-08-12T14:59:00 Last Modified: 2017-10-10T01:30:00
Summary
Pacemaker before 1.1.13 does not properly evaluate added nodes, which allows remote read-only users to gain privileges via an acl command.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1867 vulnerability.
References
- https://github.com/ClusterLabs/pacemaker/commit/84ac07c
- https://bugzilla.redhat.com/show_bug.cgi?id=1211370
- http://rhn.redhat.com/errata/RHSA-2015-1424.html
- http://rhn.redhat.com/errata/RHSA-2015-2383.html
- http://www.securityfocus.com/bid/74231
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169671.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170610.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169995.html
- https://security.gentoo.org/glsa/201710-08
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3636: The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize…
Published: 2015-08-06T01:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-3636 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2015/05/02/5
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.3
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a134f083e79fb4c3d0a925691e732c56911b4326
- https://bugzilla.redhat.com/show_bug.cgi?id=1218074
- https://github.com/torvalds/linux/commit/a134f083e79fb4c3d0a925691e732c56911b4326
- http://www.debian.org/security/2015/dsa-3290
- http://rhn.redhat.com/errata/RHSA-2015-1564.html
- http://www.ubuntu.com/usn/USN-2631-1
- http://www.ubuntu.com/usn/USN-2632-1
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/74450
- http://www.ubuntu.com/usn/USN-2634-1
- http://www.ubuntu.com/usn/USN-2633-1
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157897.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157788.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158804.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
- http://www.securitytracker.com/id/1033186
- http://rhn.redhat.com/errata/RHSA-2015-1643.html
- http://rhn.redhat.com/errata/RHSA-2015-1583.html
- http://rhn.redhat.com/errata/RHSA-2015-1534.html
- http://rhn.redhat.com/errata/RHSA-2015-1221.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1273: Heap-based buffer overflow in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Heap-based buffer overflow in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid JPEG2000 data in a PDF document.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1273 vulnerability.
References
- https://pdfium.googlesource.com/pdfium/+/cddfde0cddbc8467e0d5fa04c30405ee257750fc
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://code.google.com/p/chromium/issues/detail?id=459215
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1288: The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.
Common Weakness Enumeration (CWE): CWE-17:
CWE Description:
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1288 vulnerability.
References
- https://codereview.chromium.org/1056103005
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://code.google.com/p/chromium/issues/detail?id=479162
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1274: Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous file types, which makes it easier for remote attackers to execute arbitrary code by providing a crafted file and leveraging a user’s previous “Always open files of this type” choice, related to download_commands.cc and download_prefs.cc.
Common Weakness Enumeration (CWE): CWE-254: 7PK - Security Features
CWE Description: Software security is not security software. Here we’re concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1274 vulnerability.
References
- https://codereview.chromium.org/1165893004/
- https://code.google.com/p/chromium/issues/detail?id=461858
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1272: Use-after-free vulnerability in the GPU process implementation in Google Chrome before…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChannelHost data structure during Blink shutdown, related to content/browser/gpu/browser_gpu_channel_host_factory.cc and content/renderer/render_thread_impl.cc.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1272 vulnerability.
References
- https://codereview.chromium.org/1128233004/
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://codereview.chromium.org/867553003/
- https://code.google.com/p/chromium/issues/detail?id=451456
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1287: Blink, as used in Google Chrome before 44.0.2403.89, enables a quirks-mode exception that limits…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Blink, as used in Google Chrome before 44.0.2403.89, enables a quirks-mode exception that limits the cases in which a Cascading Style Sheets (CSS) document is required to have the text/css content type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to core/fetch/CSSStyleSheetResource.cpp.
Common Weakness Enumeration (CWE): CWE-17:
CWE Description:
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1287 vulnerability.
References
- https://code.google.com/p/chromium/issues/detail?id=419383
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://src.chromium.org/viewvc/blink?revision=195266&view=revision
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1271: PDFium, as used in Google Chrome before 44.0.2403.89, does not properly handle certain out-of-…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
PDFium, as used in Google Chrome before 44.0.2403.89, does not properly handle certain out-of-memory conditions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted PDF document that triggers a large memory allocation.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1271 vulnerability.
References
- https://code.google.com/p/chromium/issues/detail?id=446032
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://codereview.chromium.org/1226403008
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1270: The ucnv_io_getConverterName function in common/ucnv_io.cpp in International Components for…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The ucnv_io_getConverterName function in common/ucnv_io.cpp in International Components for Unicode (ICU), as used in Google Chrome before 44.0.2403.89, mishandles converter names with initial x- substrings, which allows remote attackers to cause a denial of service (read of uninitialized memory) or possibly have unspecified other impact via a crafted file.
Common Weakness Enumeration (CWE): CWE-19: Data Processing Errors
CWE Description: Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1270 vulnerability.
References
- https://chromium.googlesource.com/chromium/deps/icu/+/f1ad7f9ba957571dc692ea3e187612c685615e19
- https://code.google.com/p/chromium/issues/detail?id=444573
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://codereview.chromium.org/1157143002/
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.ubuntu.com/usn/USN-2740-1
- http://www.debian.org/security/2015/dsa-3360
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1281: core/loader/ImageLoader.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
core/loader/ImageLoader.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly determine the V8 context of a microtask, which allows remote attackers to bypass Content Security Policy (CSP) restrictions by providing an image from an unintended source.
Common Weakness Enumeration (CWE): CWE-254: 7PK - Security Features
CWE Description: Software security is not security software. Here we’re concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1281 vulnerability.
References
- https://code.google.com/p/chromium/issues/detail?id=487155
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://src.chromium.org/viewvc/blink?revision=196071&view=revision
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1278: content/browser/web_contents/web_contents_impl.cc in Google Chrome before 44.0.2403.89 does not…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
content/browser/web_contents/web_contents_impl.cc in Google Chrome before 44.0.2403.89 does not ensure that a PDF document’s modal dialog is closed upon navigation to an interstitial page, which allows remote attackers to spoof URLs via a crafted document, as demonstrated by the alert_dialog.pdf document.
Common Weakness Enumeration (CWE): CWE-254: 7PK - Security Features
CWE Description: Software security is not security software. Here we’re concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1278 vulnerability.
References
- https://codereview.chromium.org/1156663004/
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://code.google.com/p/chromium/issues/detail?id=482380
- https://codereview.chromium.org/1150843002/
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1284: The LocalFrame::isURLAllowed function in core/frame/LocalFrame.cpp in Blink, as used in Google…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The LocalFrame::isURLAllowed function in core/frame/LocalFrame.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly check for a page’s maximum number of frames, which allows remote attackers to cause a denial of service (invalid count value and use-after-free) or possibly have unspecified other impact via crafted JavaScript code that makes many createElement calls for IFRAME elements.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1284 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://code.google.com/p/chromium/issues/detail?id=493243
- https://src.chromium.org/viewvc/blink?revision=197139&view=revision
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1279: Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium,…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via large height and stride values.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1279 vulnerability.
References
- https://codereview.chromium.org/1241493002
- https://code.google.com/p/chromium/issues/detail?id=483981
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://codereview.chromium.org/1237723002
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1277: Use-after-free vulnerability in the accessibility implementation in Google Chrome before…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Use-after-free vulnerability in the accessibility implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging lack of certain validity checks for accessibility-tree data structures.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1277 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://codereview.chromium.org/1151393006/
- https://code.google.com/p/chromium/issues/detail?id=479743
- https://codereview.chromium.org/1144363004/
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1286: Cross-site scripting (XSS) vulnerability in the V8ContextNativeHandler::GetModuleSystem function…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Cross-site scripting (XSS) vulnerability in the V8ContextNativeHandler::GetModuleSystem function in extensions/renderer/v8_context_native_handler.cc in Google Chrome before 44.0.2403.89 allows remote attackers to inject arbitrary web script or HTML by leveraging the lack of a certain V8 context restriction, aka a Blink “Universal XSS (UXSS).”
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1286 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://code.google.com/p/chromium/issues/detail?id=504011
- https://codereview.chromium.org/1235863003/
- https://codereview.chromium.org/1231803002/
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1282: Multiple use-after-free vulnerabilities in fpdfsdk/src/javascript/Document.cpp in PDFium, as used…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Multiple use-after-free vulnerabilities in fpdfsdk/src/javascript/Document.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to the (1) Document::delay and (2) Document::DoFieldDelay functions.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1282 vulnerability.
References
- https://pdfium.googlesource.com/pdfium/+/4ff7a4246c81a71b4f878e959b3ca304cd76ec8a
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://code.google.com/p/chromium/issues/detail?id=487928
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1276: Use-after-free vulnerability in content/browser/indexed_db/indexed_db_backing_store.cc in the…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Use-after-free vulnerability in content/browser/indexed_db/indexed_db_backing_store.cc in the IndexedDB implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an abort action before a certain write operation.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1276 vulnerability.
References
- https://codereview.chromium.org/1060613002/
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://code.google.com/p/chromium/issues/detail?id=472614
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1280: SkPictureShader.cpp in Skia, as used in Google Chrome before 44.0.2403.89, allows remote…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
SkPictureShader.cpp in Skia, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging access to a renderer process and providing crafted serialized data.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1280 vulnerability.
References
- https://code.google.com/p/chromium/issues/detail?id=486947
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://codereview.chromium.org/1151663002
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1285: The XSSAuditor::canonicalize function in core/html/parser/XSSAuditor.cpp in the XSS auditor in…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The XSSAuditor::canonicalize function in core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 44.0.2403.89, does not properly choose a truncation point, which makes it easier for remote attackers to obtain sensitive information via an unspecified linear-time attack.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1285 vulnerability.
References
- https://src.chromium.org/viewvc/blink?revision=196971&view=revision
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://code.google.com/p/chromium/issues/detail?id=498982
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1289: Multiple unspecified vulnerabilities in Google Chrome before 44.0.2403.89 allow attackers to…
Published: 2015-07-23T00:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Multiple unspecified vulnerabilities in Google Chrome before 44.0.2403.89 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1289 vulnerability.
References
- https://crbug.com/458024
- https://crbug.com/485855
- https://crbug.com/506749
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- https://crbug.com/495682
- https://crbug.com/401995
- https://crbug.com/460938
- https://crbug.com/471990
- https://crbug.com/478575
- https://crbug.com/459898
- https://code.google.com/p/chromium/issues/detail?id=512110
- https://crbug.com/507821
- https://crbug.com/484432
- https://crbug.com/492981
- https://crbug.com/504692
- https://crbug.com/492448
- https://crbug.com/477713
- https://crbug.com/404462
- https://crbug.com/486004
- https://crbug.com/487286
- https://crbug.com/398235
- https://crbug.com/491216
- http://www.debian.org/security/2015/dsa-3315
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.securityfocus.com/bid/75973
- https://security.gentoo.org/glsa/201603-09
- http://www.securitytracker.com/id/1033031
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-2643: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows…
Published: 2015-07-16T11:00:00 Last Modified: 2019-02-05T18:09:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-2643 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.ubuntu.com/usn/USN-2674-1
- http://rhn.redhat.com/errata/RHSA-2015-1630.html
- http://www.debian.org/security/2015/dsa-3308
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/75830
- http://rhn.redhat.com/errata/RHSA-2015-1629.html
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html
- https://security.gentoo.org/glsa/201610-06
- http://www.securitytracker.com/id/1032911
- http://www.debian.org/security/2015/dsa-3311
- http://rhn.redhat.com/errata/RHSA-2015-1665.html
- http://rhn.redhat.com/errata/RHSA-2015-1647.html
- http://rhn.redhat.com/errata/RHSA-2015-1646.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4752: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows…
Published: 2015-07-16T11:00:00 Last Modified: 2019-02-12T16:28:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4752 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.ubuntu.com/usn/USN-2674-1
- http://rhn.redhat.com/errata/RHSA-2015-1630.html
- http://www.debian.org/security/2015/dsa-3308
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/75849
- http://rhn.redhat.com/errata/RHSA-2015-1629.html
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html
- https://security.gentoo.org/glsa/201610-06
- http://www.securitytracker.com/id/1032911
- http://www.debian.org/security/2015/dsa-3311
- http://rhn.redhat.com/errata/RHSA-2015-1665.html
- http://rhn.redhat.com/errata/RHSA-2015-1647.html
- http://rhn.redhat.com/errata/RHSA-2015-1646.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4756: Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated…
Published: 2015-07-16T11:00:00 Last Modified: 2019-04-22T17:48:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB, a different vulnerability than CVE-2015-0439.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4756 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://rhn.redhat.com/errata/RHSA-2015-1630.html
- http://www.securityfocus.com/bid/75785
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html
- https://security.gentoo.org/glsa/201610-06
- http://www.securitytracker.com/id/1032911
- http://rhn.redhat.com/errata/RHSA-2015-1646.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-2582: Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows…
Published: 2015-07-16T10:59:00 Last Modified: 2019-06-13T16:43:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-2582 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.ubuntu.com/usn/USN-2674-1
- http://rhn.redhat.com/errata/RHSA-2015-1630.html
- http://www.debian.org/security/2015/dsa-3308
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/75751
- http://rhn.redhat.com/errata/RHSA-2015-1629.html
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html
- https://security.gentoo.org/glsa/201610-06
- http://www.securitytracker.com/id/1032911
- http://www.debian.org/security/2015/dsa-3311
- http://rhn.redhat.com/errata/RHSA-2015-1665.html
- http://rhn.redhat.com/errata/RHSA-2015-1647.html
- http://rhn.redhat.com/errata/RHSA-2015-1646.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5123: Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation…
Published: 2015-07-14T10:59:00 Last Modified: 2021-09-08T17:19:00
Summary
Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-5123 vulnerability.
References
- http://www.kb.cert.org/vuls/id/918568
- https://helpx.adobe.com/security/products/flash-player/apsa15-04.html
- http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak/
- http://rhn.redhat.com/errata/RHSA-2015-1235.html
- https://helpx.adobe.com/security/products/flash-player/apsb15-18.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html
- http://www.us-cert.gov/ncas/alerts/TA15-195A
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://www.securityfocus.com/bid/75710
- https://security.gentoo.org/glsa/201508-01
- http://www.securitytracker.com/id/1032890
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-5122: Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3)…
Published: 2015-07-14T10:59:00 Last Modified: 2021-09-08T17:19:00
Summary
Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2015-5122 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsa15-04.html
- https://www.fireeye.com/blog/threat-research/2015/07/cve-2015-5122_-_seco.html
- http://www.kb.cert.org/vuls/id/338736
- http://rhn.redhat.com/errata/RHSA-2015-1235.html
- https://helpx.adobe.com/security/products/flash-player/apsb15-18.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00028.html
- http://www.us-cert.gov/ncas/alerts/TA15-195A
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04796784
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://www.securityfocus.com/bid/75712
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04952467
- https://security.gentoo.org/glsa/201508-01
- http://www.rapid7.com/db/modules/exploit/multi/browser/adobe_flash_opaque_background_uaf
- https://www.exploit-db.com/exploits/37599/
- http://www.securitytracker.com/id/1032890
- http://packetstormsecurity.com/files/132663/Adobe-Flash-opaqueBackground-Use-After-Free.html
- https://perception-point.io/2018/04/11/breaking-cfi-cve-2015-5122-coop/
- https://perception-point.io/new/breaking-cfi.php
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3216: Race condition in a certain Red Hat patch to the PRNG lock implementation in the…
Published: 2015-07-07T10:59:00 Last Modified: 2018-01-05T02:30:00
Summary
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3216 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1225994
- http://www.securityfocus.com/bid/75219
- http://www.securitytracker.com/id/1032587
- http://rhn.redhat.com/errata/RHSA-2015-1115.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3281: The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly…
Published: 2015-07-06T15:59:00 Last Modified: 2019-06-26T13:49:00
Summary
The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3281 vulnerability.
References
- http://git.haproxy.org/?p=haproxy-1.5.git;a=commit;h=7ec765568883b2d4e5a2796adbeb492a22ec9bd4
- http://www.debian.org/security/2015/dsa-3301
- http://www.haproxy.org/news.html
- http://www.securityfocus.com/bid/75554
- http://rhn.redhat.com/errata/RHSA-2015-2666.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html
- http://rhn.redhat.com/errata/RHSA-2015-1741.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00023.html
- http://www.ubuntu.com/usn/USN-2668-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0192: Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1…
Published: 2015-07-02T21:59:00 Last Modified: 2019-06-03T15:51:00
Summary
Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0192 vulnerability.
References
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV70682
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV70683
- http://rhn.redhat.com/errata/RHSA-2015-1091.html
- http://rhn.redhat.com/errata/RHSA-2015-1021.html
- http://rhn.redhat.com/errata/RHSA-2015-1020.html
- http://rhn.redhat.com/errata/RHSA-2015-1007.html
- http://rhn.redhat.com/errata/RHSA-2015-1006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3900: RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the…
Published: 2015-06-24T14:59:00 Last Modified: 2019-04-22T17:48:00
Summary
RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a “DNS hijack attack.”
Common Weakness Enumeration (CWE): CWE-254: 7PK - Security Features
CWE Description: Software security is not security software. Here we’re concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3900 vulnerability.
References
- http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html
- https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356
- http://rhn.redhat.com/errata/RHSA-2015-1657.html
- http://www.openwall.com/lists/oss-security/2015/06/26/2
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/75482
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html
- https://puppet.com/security/cve/CVE-2015-3900
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3209: Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute…
Published: 2015-06-15T15:59:00 Last Modified: 2022-02-11T05:40:00
Summary
Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3209 vulnerability.
References
- http://xenbits.xen.org/xsa/advisory-135.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698
- https://security.gentoo.org/glsa/201510-02
- http://www.securityfocus.com/bid/75123
- http://www.ubuntu.com/usn/USN-2630-1
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00014.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160685.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160677.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160669.html
- http://www.securitytracker.com/id/1032545
- http://www.debian.org/security/2015/dsa-3286
- http://rhn.redhat.com/errata/RHSA-2015-1089.html
- http://rhn.redhat.com/errata/RHSA-2015-1088.html
- http://rhn.redhat.com/errata/RHSA-2015-1087.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00004.html
- https://kb.juniper.net/JSA10783
- https://security.gentoo.org/glsa/201604-03
- http://www.debian.org/security/2015/dsa-3285
- http://www.debian.org/security/2015/dsa-3284
- http://rhn.redhat.com/errata/RHSA-2015-1189.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1180-security-advisory-13
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4142: Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant…
Published: 2015-06-15T15:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4142 vulnerability.
References
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html
- http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt
- http://rhn.redhat.com/errata/RHSA-2015-1090.html
- http://www.openwall.com/lists/oss-security/2015/05/09/5
- http://www.openwall.com/lists/oss-security/2015/05/31/6
- http://rhn.redhat.com/errata/RHSA-2015-1439.html
- https://security.gentoo.org/glsa/201606-17
- http://www.securitytracker.com/id/1032625
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172608.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172655.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171401.html
- http://www.debian.org/security/2015/dsa-3397
- http://www.ubuntu.com/usn/USN-2650-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-2783: ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote…
Published: 2015-06-09T18:59:00 Last Modified: 2019-04-22T17:48:00
Summary
ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-2783 vulnerability.
References
- https://bugs.php.net/bug.php?id=69324
- http://php.net/ChangeLog-5.php
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- https://support.apple.com/kb/HT205031
- https://support.apple.com/HT205267
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://marc.info/?l=bugtraq&m=143403519711434&w=2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/74239
- https://security.gentoo.org/glsa/201606-10
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://www.securitytracker.com/id/1032146
- http://www.ubuntu.com/usn/USN-2572-1
- http://www.debian.org/security/2015/dsa-3280
- http://rhn.redhat.com/errata/RHSA-2015-1066.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3329: Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP…
Published: 2015-06-09T18:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3329 vulnerability.
References
- http://git.php.net/?p=php-src.git;a=commit;h=f59b67ae50064560d7bfcdb0d6a8ab284179053c
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69441
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- https://support.apple.com/kb/HT205031
- https://support.apple.com/HT205267
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/74240
- https://security.gentoo.org/glsa/201606-10
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://www.ubuntu.com/usn/USN-2572-1
- http://www.securitytracker.com/id/1032145
- http://www.debian.org/security/2015/dsa-3280
- http://rhn.redhat.com/errata/RHSA-2015-1066.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00004.html
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3330: The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before…
Published: 2015-06-09T18:59:00 Last Modified: 2019-12-27T16:08:00
Summary
The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via pipelined HTTP requests that result in a “deconfigured interpreter.”
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3330 vulnerability.
References
- http://git.php.net/?p=php-src.git;a=commit;h=809610f5ea38a83b284e1125d1fff129bdd615e7
- https://bugs.php.net/bug.php?id=69218
- http://php.net/ChangeLog-5.php
- http://openwall.com/lists/oss-security/2015/04/17/7
- https://bugs.php.net/bug.php?id=68486
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- https://support.apple.com/kb/HT205031
- https://support.apple.com/HT205267
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/74204
- https://security.gentoo.org/glsa/201606-10
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://www.ubuntu.com/usn/USN-2572-1
- http://www.securitytracker.com/id/1033703
- http://rhn.redhat.com/errata/RHSA-2015-1066.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00004.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3307: The phar_parse_metadata function in ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24,…
Published: 2015-06-09T18:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The phar_parse_metadata function in ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (heap metadata corruption) or possibly have unspecified other impact via a crafted tar archive.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3307 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1223441
- https://bugs.php.net/bug.php?id=69443
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- https://support.apple.com/kb/HT205031
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/74703
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://rhn.redhat.com/errata/RHSA-2015-1066.html
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4025: PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon…
Published: 2015-06-09T18:59:00 Last Modified: 2019-04-22T17:48:00
Summary
PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
Common Weakness Enumeration (CWE): CWE-19: Data Processing Errors
CWE Description: Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4025 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69418
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- https://support.apple.com/kb/HT205031
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- https://security.gentoo.org/glsa/201606-10
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159031.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158915.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158616.html
- http://www.securitytracker.com/id/1032431
- http://www.securityfocus.com/bid/74904
- http://www.debian.org/security/2015/dsa-3280
- http://rhn.redhat.com/errata/RHSA-2015-1219.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4024: Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c…
Published: 2015-06-09T18:59:00 Last Modified: 2019-12-27T16:08:00
Summary
Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4024 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69364
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- https://support.apple.com/kb/HT205031
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158915.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158616.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159031.html
- http://www.securitytracker.com/id/1032432
- http://www.securityfocus.com/bid/74903
- http://www.debian.org/security/2015/dsa-3280
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2015-1219.html
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4021: The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and…
Published: 2015-06-09T18:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4021 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69453
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- https://support.apple.com/kb/HT205031
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/74700
- https://security.gentoo.org/glsa/201606-10
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158915.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158616.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159031.html
- http://www.securitytracker.com/id/1032433
- http://www.debian.org/security/2015/dsa-3280
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2015-1219.html
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4026: The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9…
Published: 2015-06-09T18:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
Common Weakness Enumeration (CWE): CWE-19: Data Processing Errors
CWE Description: Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4026 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=68598
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- https://support.apple.com/kb/HT205031
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/75056
- https://security.gentoo.org/glsa/201606-10
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158915.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158616.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159031.html
- http://www.securitytracker.com/id/1032431
- http://www.debian.org/security/2015/dsa-3280
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2015-1219.html
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4022: Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before…
Published: 2015-06-09T18:59:00 Last Modified: 2019-04-22T17:48:00
Summary
Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4022 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69545
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- https://support.apple.com/kb/HT205031
- http://rhn.redhat.com/errata/RHSA-2015-1187.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- https://security.gentoo.org/glsa/201606-10
- http://rhn.redhat.com/errata/RHSA-2015-1186.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159031.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158915.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158616.html
- http://www.securitytracker.com/id/1032433
- http://www.securityfocus.com/bid/74902
- http://www.debian.org/security/2015/dsa-3280
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2015-1219.html
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4147: The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and…
Published: 2015-06-09T18:59:00 Last Modified: 2018-01-05T02:30:00
Summary
The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a “type confusion” issue.
Common Weakness Enumeration (CWE): CWE-19: Data Processing Errors
CWE Description: Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-4147 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69085
- http://openwall.com/lists/oss-security/2015/06/01/4
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- https://support.apple.com/kb/HT205031
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.securityfocus.com/bid/73357
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- https://security.gentoo.org/glsa/201606-10
- http://www.securitytracker.com/id/1032459
- http://rhn.redhat.com/errata/RHSA-2015-1066.html
- http://rhn.redhat.com/errata/RHSA-2015-1053.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-4148: The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x…
Published: 2015-06-09T18:59:00 Last Modified: 2018-01-05T02:30:00
Summary
The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a “type confusion” issue.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2015-4148 vulnerability.
References
- http://php.net/ChangeLog-5.php
- https://bugs.php.net/bug.php?id=69085
- http://openwall.com/lists/oss-security/2015/06/01/4
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- https://support.apple.com/kb/HT205031
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://www.securityfocus.com/bid/75103
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- https://security.gentoo.org/glsa/201606-10
- http://www.securitytracker.com/id/1032459
- http://rhn.redhat.com/errata/RHSA-2015-1066.html
- http://rhn.redhat.com/errata/RHSA-2015-1053.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1848: The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an…
Published: 2015-05-14T14:59:00 Last Modified: 2016-12-31T02:59:00
Summary
The pcs daemon (pcsd) in PCS 0.9.137 and earlier does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2015-3983 is for the issue with not setting the HTTPOnly flag.
Common Weakness Enumeration (CWE): CWE-310: Cryptographic Issues
CWE Description: Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1848 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-0990.html
- https://bugzilla.redhat.com/attachment.cgi?id=1009855
- http://rhn.redhat.com/errata/RHSA-2015-0980.html
- http://www.securityfocus.com/bid/74623
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159412.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159401.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159374.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0797: GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and…
Published: 2015-05-14T10:59:00 Last Modified: 2020-09-28T15:09:00
Summary
GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 on Linux, allows remote attackers to cause a denial of service (buffer over-read and application crash) or possibly execute arbitrary code via crafted H.264 video data in an m4v file.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0797 vulnerability.
References
- http://www.mozilla.org/security/announce/2015/mfsa2015-47.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1080995
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201512-07
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- http://www.debian.org/security/2015/dsa-3264
- http://www.debian.org/security/2015/dsa-3260
- http://www.debian.org/security/2015/dsa-3225
- http://rhn.redhat.com/errata/RHSA-2015-1012.html
- http://rhn.redhat.com/errata/RHSA-2015-0988.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00038.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3456: The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local…
Published: 2015-05-13T18:59:00 Last Modified: 2021-11-17T22:15:00
Summary
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 5.1
- CVSS: 7.7
- CVSS Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2015-3456 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-1002.html
- http://rhn.redhat.com/errata/RHSA-2015-1000.html
- http://rhn.redhat.com/errata/RHSA-2015-0999.html
- http://rhn.redhat.com/errata/RHSA-2015-0998.html
- http://xenbits.xen.org/xsa/advisory-133.html
- http://git.qemu.org/?p=qemu.git;a=commitdiff;h=e907746266721f305d67bc0718795fedee2e824c
- http://rhn.redhat.com/errata/RHSA-2015-1001.html
- https://access.redhat.com/articles/1444903
- http://rhn.redhat.com/errata/RHSA-2015-1003.html
- https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/
- http://venom.crowdstrike.com/
- http://rhn.redhat.com/errata/RHSA-2015-1004.html
- https://www.suse.com/security/cve/CVE-2015-3456.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00021.html
- http://www.debian.org/security/2015/dsa-3274
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00019.html
- http://marc.info/?l=bugtraq&m=143229451215900&w=2
- http://www.securityfocus.com/bid/74640
- https://kc.mcafee.com/corporate/index?page=content&id=SB10118
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158072.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.debian.org/security/2015/dsa-3259
- http://www.ubuntu.com/usn/USN-2608-1
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html
- https://support.lenovo.com/us/en/product_security/venom
- http://marc.info/?l=bugtraq&m=143387998230996&w=2
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-438937.htm
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10693
- https://bto.bluecoat.com/security-advisory/sa95
- http://www.fortiguard.com/advisory/2015-05-19-cve-2015-3456-venom-vulnerability
- http://support.citrix.com/article/CTX201078
- http://lists.opensuse.org/opensuse-updates/2015-08/msg00021.html
- https://www.exploit-db.com/exploits/37053/
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00001.html
- http://www.securitytracker.com/id/1032311
- http://www.securitytracker.com/id/1032306
- http://www.debian.org/security/2015/dsa-3262
- http://rhn.redhat.com/errata/RHSA-2015-1011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00009.html
- https://kb.juniper.net/JSA10783
- https://security.gentoo.org/glsa/201612-27
- https://security.gentoo.org/glsa/201604-03
- https://security.gentoo.org/glsa/201602-01
- http://www.securitytracker.com/id/1032917
- https://www.arista.com/en/support/advisories-notices/security-advisories/1128-security-advisory-10
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1250: Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135 allow attackers to…
Published: 2015-05-01T10:59:00 Last Modified: 2017-01-03T02:59:00
Summary
Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1250 vulnerability.
References
- https://code.google.com/p/chromium/issues/detail?id=473688
- https://code.google.com/p/chromium/issues/detail?id=453553
- https://code.google.com/p/chromium/issues/detail?id=458191
- https://code.google.com/p/chromium/issues/detail?id=475749
- http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_28.html
- https://code.google.com/p/chromium/issues/detail?id=481777
- http://www.securitytracker.com/id/1032234
- http://www.ubuntu.com/usn/USN-2582-1
- http://www.debian.org/security/2015/dsa-3242
- http://rhn.redhat.com/errata/RHSA-2015-0921.html
- http://www.securityfocus.com/bid/74389
- https://security.gentoo.org/glsa/201506-04
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00009.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1243: Use-after-free vulnerability in the MutationObserver::disconnect function in…
Published: 2015-05-01T10:59:00 Last Modified: 2017-01-03T02:59:00
Summary
Use-after-free vulnerability in the MutationObserver::disconnect function in core/dom/MutationObserver.cpp in the DOM implementation in Blink, as used in Google Chrome before 42.0.2311.135, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an attempt to unregister a MutationObserver object that is not currently registered.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1243 vulnerability.
References
- https://code.google.com/p/chromium/issues/detail?id=453279
- https://src.chromium.org/viewvc/blink?revision=192655&view=revision
- http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_28.html
- http://www.securitytracker.com/id/1032234
- http://www.ubuntu.com/usn/USN-2582-1
- http://www.debian.org/security/2015/dsa-3242
- http://rhn.redhat.com/errata/RHSA-2015-0921.html
- http://www.securityfocus.com/bid/74389
- https://security.gentoo.org/glsa/201506-04
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00009.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1774: The HWP filter in LibreOffice before 4.3.7 and 4.4.x before 4.4.2 and Apache OpenOffice before…
Published: 2015-04-28T14:59:00 Last Modified: 2022-02-07T16:32:00
Summary
The HWP filter in LibreOffice before 4.3.7 and 4.4.x before 4.4.2 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted HWP document, which triggers an out-of-bounds write.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1774 vulnerability.
References
- http://www.openoffice.org/security/cves/CVE-2015-1774.html
- http://www.debian.org/security/2015/dsa-3236
- https://www.libreoffice.org/about-us/security/advisories/cve-2015-1774/
- http://www.ubuntu.com/usn/USN-2578-1
- http://www.securitytracker.com/id/1032206
- http://www.securitytracker.com/id/1032205
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156582.html
- http://rhn.redhat.com/errata/RHSA-2015-1458.html
- http://www.securityfocus.com/bid/74338
- https://security.gentoo.org/glsa/201603-05
- https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1094
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00015.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157550.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1863: Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a…
Published: 2015-04-28T14:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 6.5
- CVSS: 5.8
- CVSS Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2015-1863 vulnerability.
References
- http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt
- http://www.debian.org/security/2015/dsa-3233
- http://www.ubuntu.com/usn/USN-2577-1
- http://packetstormsecurity.com/files/131598/Android-wpa_supplicant-Heap-Overflow.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00000.html
- http://www.securitytracker.com/id/1032192
- http://seclists.org/fulldisclosure/2015/Apr/82
- http://rhn.redhat.com/errata/RHSA-2015-1090.html
- https://security.gentoo.org/glsa/201606-17
- http://www.securityfocus.com/bid/74296
- http://security.alibaba.com/blog/blog.htm?spm=0.0.0.0.p1ECc3&id=19
- http://www.securityfocus.com/archive/1/535353/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0349: Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0351, CVE-2015-0358, and CVE-2015-3039.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0349 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74064
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0352: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0352 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74062
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0354: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0354 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74062
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0346: Double free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Double free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0359.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0346 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
- http://www.securityfocus.com/bid/74067
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0348: Buffer overflow in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Buffer overflow in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0348 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0355: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0355 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74062
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0351: Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0358, and CVE-2015-3039.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0351 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74064
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0347: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0347 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74062
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0350: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0350 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74062
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0353: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0353 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74062
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0360: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0360 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74062
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0358: Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-3039.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0358 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74064
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3041: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3042, and CVE-2015-3043.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3041 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74062
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3042: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3043.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2015-3042 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74062
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
- https://www.exploit-db.com/exploits/37839/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3044: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3044 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- https://security.gentoo.org/glsa/201505-02
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://www.securityfocus.com/bid/74065
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3038: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3038 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74062
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3043: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3042.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2015-3043 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74062
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
- https://www.exploit-db.com/exploits/37536/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3040: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-0357.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3040 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-3039: Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before…
Published: 2015-04-14T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-0358.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-3039 vulnerability.
References
- https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0813.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
- http://www.securityfocus.com/bid/74064
- https://security.gentoo.org/glsa/201504-07
- http://www.securitytracker.com/id/1032105
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-2775: Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias,…
Published: 2015-04-13T14:59:00 Last Modified: 2016-12-24T02:59:00
Summary
Directory traversal vulnerability in GNU Mailman before 2.1.20, when not using a static alias, allows remote attackers to execute arbitrary files via a .. (dot dot) in a list name.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 10.0
- Exploitability Score: 4.9
- CVSS: 7.6
- CVSS Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-2775 vulnerability.
References
- https://bugs.launchpad.net/mailman/+bug/1437145
- http://www.debian.org/security/2015/dsa-3214
- https://mail.python.org/pipermail/mailman-developers/2015-March/024875.html
- https://mail.python.org/pipermail/mailman-developers/2015-March/024871.html
- http://www.ubuntu.com/usn/USN-2558-1
- https://mail.python.org/pipermail/mailman-announce/2015-March/000209.html
- http://www.securitytracker.com/id/1032033
- http://rhn.redhat.com/errata/RHSA-2015-1153.html
- http://www.securityfocus.com/bid/73922
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156742.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154911.html
- http://rhn.redhat.com/errata/RHSA-2015-1417.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0251: The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote…
Published: 2015-04-08T18:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.
Common Weakness Enumeration (CWE): CWE-345: Insufficient Verification of Data Authenticity
CWE Description: The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0251 vulnerability.
References
- http://subversion.apache.org/security/CVE-2015-0251-advisory.txt
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:192
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1633.html
- https://support.apple.com/HT205217
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/74259
- http://rhn.redhat.com/errata/RHSA-2015-1742.html
- http://www.ubuntu.com/usn/USN-2721-1
- http://seclists.org/fulldisclosure/2015/Jun/32
- http://www.debian.org/security/2015/dsa-3231
- https://security.gentoo.org/glsa/201610-05
- http://www.securitytracker.com/id/1033214
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0248: The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through…
Published: 2015-04-08T18:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0248 vulnerability.
References
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:192
- http://subversion.apache.org/security/CVE-2015-0248-advisory.txt
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1633.html
- https://support.apple.com/HT205217
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/74260
- http://rhn.redhat.com/errata/RHSA-2015-1742.html
- http://www.ubuntu.com/usn/USN-2721-1
- http://www.debian.org/security/2015/dsa-3231
- https://security.gentoo.org/glsa/201610-05
- http://www.securitytracker.com/id/1033214
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-2808: The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state…
Published: 2015-04-01T02:00:00 Last Modified: 2020-11-23T19:47:00
Summary
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the “Bar Mitzvah” issue.
Common Weakness Enumeration (CWE): CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CWE Description: The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-2808 vulnerability.
References
- https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://marc.info/?l=bugtraq&m=143817021313142&w=2
- http://marc.info/?l=bugtraq&m=143817899717054&w=2
- http://marc.info/?l=bugtraq&m=143741441012338&w=2
- http://marc.info/?l=bugtraq&m=143818140118771&w=2
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.huawei.com/en/psirt/security-advisories/hw-454055
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.securityfocus.com/bid/91787
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
- http://marc.info/?l=bugtraq&m=144060576831314&w=2
- http://marc.info/?l=bugtraq&m=144069189622016&w=2
- http://marc.info/?l=bugtraq&m=144493176821532&w=2
- http://marc.info/?l=bugtraq&m=144102017024820&w=2
- http://marc.info/?l=bugtraq&m=143629696317098&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144059660127919&w=2
- http://marc.info/?l=bugtraq&m=144059703728085&w=2
- http://marc.info/?l=bugtraq&m=144104565600964&w=2
- http://marc.info/?l=bugtraq&m=143456209711959&w=2
- http://marc.info/?l=bugtraq&m=144104533800819&w=2
- http://marc.info/?l=bugtraq&m=144060606031437&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
- https://kc.mcafee.com/corporate/index?page=content&id=SB10163
- http://www.securitytracker.com/id/1032599
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
- https://security.gentoo.org/glsa/201512-10
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
- http://www.securitytracker.com/id/1033769
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
- http://www.securitytracker.com/id/1033737
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
- http://www.securitytracker.com/id/1033432
- http://www.securitytracker.com/id/1033431
- http://www.securitytracker.com/id/1033415
- http://www.securitytracker.com/id/1033386
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- http://www.ubuntu.com/usn/USN-2706-1
- http://www.ubuntu.com/usn/USN-2696-1
- http://www.debian.org/security/2015/dsa-3339
- http://rhn.redhat.com/errata/RHSA-2015-1526.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- http://www-304.ibm.com/support/docview.wss?uid=swg21960015
- http://www-304.ibm.com/support/docview.wss?uid=swg21903565
- http://www.securitytracker.com/id/1032868
- http://www.securitytracker.com/id/1032858
- http://www.securitytracker.com/id/1032788
- http://www.securitytracker.com/id/1032734
- http://www.securitytracker.com/id/1032708
- http://www.securitytracker.com/id/1032707
- http://rhn.redhat.com/errata/RHSA-2015-1091.html
- http://rhn.redhat.com/errata/RHSA-2015-1021.html
- http://rhn.redhat.com/errata/RHSA-2015-1020.html
- http://rhn.redhat.com/errata/RHSA-2015-1007.html
- http://rhn.redhat.com/errata/RHSA-2015-1006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
- http://www.securityfocus.com/bid/73684
- https://kb.juniper.net/JSA10783
- http://www.securitytracker.com/id/1036222
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
- http://www.securitytracker.com/id/1033072
- http://www.securitytracker.com/id/1033071
- http://www.securitytracker.com/id/1032990
- http://www.securitytracker.com/id/1032910
- http://www.securitytracker.com/id/1032600
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.debian.org/security/2015/dsa-3316
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
- http://rhn.redhat.com/errata/RHSA-2015-1243.html
- http://rhn.redhat.com/errata/RHSA-2015-1242.html
- http://rhn.redhat.com/errata/RHSA-2015-1241.html
- http://rhn.redhat.com/errata/RHSA-2015-1230.html
- http://rhn.redhat.com/errata/RHSA-2015-1229.html
- http://rhn.redhat.com/errata/RHSA-2015-1228.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-2301: Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before…
Published: 2015-03-30T10:59:00 Last Modified: 2019-10-09T23:13:00
Summary
Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-2301 vulnerability.
References
- https://bugs.php.net/bug.php?id=68901
- http://openwall.com/lists/oss-security/2015/03/15/6
- http://git.php.net/?p=php-src.git;a=commit;h=b2cf3f064b8f5efef89bb084521b61318c71781b
- https://bugzilla.redhat.com/show_bug.cgi?id=1194747
- http://php.net/ChangeLog-5.php
- http://www.debian.org/security/2015/dsa-3198
- http://www.ubuntu.com/usn/USN-2535-1
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:079
- http://www.securitytracker.com/id/1031949
- https://support.apple.com/HT205267
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://marc.info/?l=bugtraq&m=143403519711434&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/73037
- https://security.gentoo.org/glsa/201606-10
- http://rhn.redhat.com/errata/RHSA-2015-1066.html
- http://rhn.redhat.com/errata/RHSA-2015-1053.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-2348: The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39,…
Published: 2015-03-30T10:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-2348 vulnerability.
References
- http://git.php.net/?p=php-src.git;a=commit;h=1291d6bbee93b6109eb07e8f7916ff1b7fcc13e1
- https://bugs.php.net/bug.php?id=69207
- http://php.net/ChangeLog-5.php
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00015.html
- https://support.apple.com/HT205267
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/73434
- https://security.gentoo.org/glsa/201606-10
- http://www.ubuntu.com/usn/USN-2572-1
- http://www.securitytracker.com/id/1032484
- http://rhn.redhat.com/errata/RHSA-2015-1066.html
- http://rhn.redhat.com/errata/RHSA-2015-1053.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-2787: Use-after-free vulnerability in the process_nested_data function in…
Published: 2015-03-30T10:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-2787 vulnerability.
References
- https://gist.github.com/smalyshev/eea9eafc7c88a4a6d10d
- https://bugs.php.net/bug.php?id=68976
- http://php.net/ChangeLog-5.php
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00015.html
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- https://support.apple.com/kb/HT205031
- https://support.apple.com/HT205267
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1135.html
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/bid/73431
- https://security.gentoo.org/glsa/201606-10
- http://www.ubuntu.com/usn/USN-2572-1
- http://www.securitytracker.com/id/1032485
- http://rhn.redhat.com/errata/RHSA-2015-1066.html
- http://rhn.redhat.com/errata/RHSA-2015-1053.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2015-1218.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8169: automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user’s…
Published: 2015-03-18T16:59:00 Last Modified: 2018-10-30T16:27:00
Summary
automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user’s USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-8169 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1192565
- https://bugzilla.suse.com/show_bug.cgi?id=917977
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00033.html
- http://rhn.redhat.com/errata/RHSA-2015-1344.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/73211
- http://www.ubuntu.com/usn/USN-2579-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8159: The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat…
Published: 2015-03-16T10:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-8159 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1181166
- http://www.ubuntu.com/usn/USN-2525-1
- http://www.ubuntu.com/usn/USN-2526-1
- http://www.ubuntu.com/usn/USN-2530-1
- http://www.ubuntu.com/usn/USN-2529-1
- http://www.ubuntu.com/usn/USN-2527-1
- http://www.ubuntu.com/usn/USN-2528-1
- http://rhn.redhat.com/errata/RHSA-2015-0674.html
- http://rhn.redhat.com/errata/RHSA-2015-0695.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152747.html
- http://rhn.redhat.com/errata/RHSA-2015-0726.html
- http://rhn.redhat.com/errata/RHSA-2015-0751.html
- http://rhn.redhat.com/errata/RHSA-2015-0782.html
- http://rhn.redhat.com/errata/RHSA-2015-0783.html
- http://rhn.redhat.com/errata/RHSA-2015-0803.html
- http://www.securitytracker.com/id/1032224
- http://rhn.redhat.com/errata/RHSA-2015-0919.html
- http://www.securityfocus.com/bid/73060
- http://www.debian.org/security/2015/dsa-3237
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.html
- http://www.ubuntu.com/usn/USN-2561-1
- http://rhn.redhat.com/errata/RHSA-2015-0870.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1215: The filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote…
Published: 2015-03-09T00:59:00 Last Modified: 2016-12-22T02:59:00
Summary
The filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1215 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- https://code.google.com/p/chromium/issues/detail?id=445809
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.securityfocus.com/bid/72901
- http://www.ubuntu.com/usn/USN-2521-1
- https://security.gentoo.org/glsa/201503-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1231: Multiple unspecified vulnerabilities in Google Chrome before 41.0.2272.76 allow attackers to…
Published: 2015-03-09T00:59:00 Last Modified: 2016-12-22T02:59:00
Summary
Multiple unspecified vulnerabilities in Google Chrome before 41.0.2272.76 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1231 vulnerability.
References
- https://code.google.com/p/chromium/issues/detail?id=453126
- https://code.google.com/p/chromium/issues/detail?id=439877
- https://code.google.com/p/chromium/issues/detail?id=433078
- https://code.google.com/p/chromium/issues/detail?id=421499
- https://code.google.com/p/chromium/issues/detail?id=449777
- https://code.google.com/p/chromium/issues/detail?id=450653
- https://code.google.com/p/chromium/issues/detail?id=451753
- https://code.google.com/p/chromium/issues/detail?id=429679
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- https://code.google.com/p/chromium/issues/detail?id=449610
- https://code.google.com/p/chromium/issues/detail?id=463349
- https://code.google.com/p/chromium/issues/detail?id=404300
- https://code.google.com/p/chromium/issues/detail?id=426762
- https://code.google.com/p/chromium/issues/detail?id=438364
- https://code.google.com/p/chromium/issues/detail?id=429379
- https://code.google.com/p/chromium/issues/detail?id=383777
- https://code.google.com/p/chromium/issues/detail?id=449045
- https://code.google.com/p/chromium/issues/detail?id=449049
- https://code.google.com/p/chromium/issues/detail?id=453994
- https://code.google.com/p/chromium/issues/detail?id=448056
- https://code.google.com/p/chromium/issues/detail?id=442756
- https://code.google.com/p/chromium/issues/detail?id=438638
- https://code.google.com/p/chromium/issues/detail?id=450654
- https://code.google.com/p/chromium/issues/detail?id=406871
- https://code.google.com/p/chromium/issues/detail?id=460145
- https://code.google.com/p/chromium/issues/detail?id=445831
- https://code.google.com/p/chromium/issues/detail?id=437636
- https://code.google.com/p/chromium/issues/detail?id=451685
- https://code.google.com/p/chromium/issues/detail?id=451755
- https://code.google.com/p/chromium/issues/detail?id=452455
- https://code.google.com/p/chromium/issues/detail?id=452324
- https://code.google.com/p/chromium/issues/detail?id=459115
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.ubuntu.com/usn/USN-2521-1
- https://security.gentoo.org/glsa/201503-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1214: Integer overflow in the SkAutoSTArray implementation in include/core/SkTemplates.h in the filters…
Published: 2015-03-09T00:59:00 Last Modified: 2016-12-22T02:59:00
Summary
Integer overflow in the SkAutoSTArray implementation in include/core/SkTemplates.h in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a reset action with a large count value, leading to an out-of-bounds write operation.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1214 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- https://skia.googlesource.com/skia/+/23d432080cb8506bf8e371b1637ce8f2de9c0c05
- https://code.google.com/p/chromium/issues/detail?id=445810
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.securityfocus.com/bid/72901
- http://www.ubuntu.com/usn/USN-2521-1
- https://security.gentoo.org/glsa/201503-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1216: Use-after-free vulnerability in the V8Window::namedPropertyGetterCustom function in…
Published: 2015-03-09T00:59:00 Last Modified: 2016-12-22T02:59:00
Summary
Use-after-free vulnerability in the V8Window::namedPropertyGetterCustom function in bindings/core/v8/custom/V8WindowCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a frame detachment.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1216 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- https://src.chromium.org/viewvc/blink?revision=189574&view=revision
- https://code.google.com/p/chromium/issues/detail?id=454954
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.securityfocus.com/bid/72901
- http://www.ubuntu.com/usn/USN-2521-1
- https://security.gentoo.org/glsa/201503-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1217: The V8LazyEventListener::prepareListenerObject function in…
Published: 2015-03-09T00:59:00 Last Modified: 2016-12-22T02:59:00
Summary
The V8LazyEventListener::prepareListenerObject function in bindings/core/v8/V8LazyEventListener.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, does not properly compile listeners, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage “type confusion.”
Common Weakness Enumeration (CWE): CWE-17:
CWE Description:
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1217 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- https://codereview.chromium.org/910683002
- https://src.chromium.org/viewvc/blink?revision=189796&view=revision
- https://code.google.com/p/chromium/issues/detail?id=456192
- https://codereview.chromium.org/958543002
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.securityfocus.com/bid/72901
- http://www.ubuntu.com/usn/USN-2521-1
- https://security.gentoo.org/glsa/201503-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1219: Integer overflow in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in…
Published: 2015-03-09T00:59:00 Last Modified: 2016-12-22T02:59:00
Summary
Integer overflow in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted allocation of a large amount of memory during WebGL rendering.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1219 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- https://code.google.com/p/chromium/issues/detail?id=446164
- https://skia.googlesource.com/skia/+/2ff257bd95c732b9cebc3aac03fbed72d6e6082a
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.securityfocus.com/bid/72901
- http://www.ubuntu.com/usn/USN-2521-1
- https://security.gentoo.org/glsa/201503-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1218: Multiple use-after-free vulnerabilities in the DOM implementation in Blink, as used in Google…
Published: 2015-03-09T00:59:00 Last Modified: 2016-12-22T02:59:00
Summary
Multiple use-after-free vulnerabilities in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger movement of a SCRIPT element to different documents, related to (1) the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp and (2) the SVGScriptElement::didMoveToNewDocument function in core/svg/SVGScriptElement.cpp.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1218 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- https://code.google.com/p/chromium/issues/detail?id=456059
- https://src.chromium.org/viewvc/blink?revision=189886&view=revision
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.securityfocus.com/bid/72901
- http://www.ubuntu.com/usn/USN-2521-1
- https://security.gentoo.org/glsa/201503-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1230: The getHiddenProperty function in bindings/core/v8/V8EventListenerList.h in Blink, as used in…
Published: 2015-03-09T00:59:00 Last Modified: 2016-12-22T02:59:00
Summary
The getHiddenProperty function in bindings/core/v8/V8EventListenerList.h in Blink, as used in Google Chrome before 41.0.2272.76, has a name conflict with the AudioContext class, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that adds an AudioContext event listener and triggers “type confusion.”
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1230 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- https://code.google.com/p/chromium/issues/detail?id=449610
- https://src.chromium.org/viewvc/blink?revision=189006&view=revision
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.securityfocus.com/bid/72901
- http://www.ubuntu.com/usn/USN-2521-1
- https://security.gentoo.org/glsa/201503-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1220: Use-after-free vulnerability in the GIFImageReader::parseData function in platform/image-…
Published: 2015-03-09T00:59:00 Last Modified: 2016-12-22T02:59:00
Summary
Use-after-free vulnerability in the GIFImageReader::parseData function in platform/image-decoders/gif/GIFImageReader.cpp in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted frame size in a GIF image.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1220 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- https://src.chromium.org/viewvc/blink?revision=188423&view=revision
- https://code.google.com/p/chromium/issues/detail?id=437651
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.securityfocus.com/bid/72901
- http://www.ubuntu.com/usn/USN-2521-1
- https://security.gentoo.org/glsa/201503-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1228: The RenderCounter::updateCounter function in core/rendering/RenderCounter.cpp in Blink, as used…
Published: 2015-03-09T00:59:00 Last Modified: 2016-12-22T02:59:00
Summary
The RenderCounter::updateCounter function in core/rendering/RenderCounter.cpp in Blink, as used in Google Chrome before 41.0.2272.76, does not force a relayout operation and consequently does not initialize memory for a data structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted Cascading Style Sheets (CSS) token sequence.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1228 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- https://code.google.com/p/chromium/issues/detail?id=444707
- https://src.chromium.org/viewvc/blink?revision=188180&view=revision
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.securityfocus.com/bid/72901
- http://www.ubuntu.com/usn/USN-2521-1
- https://security.gentoo.org/glsa/201503-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1229: net/http/proxy_client_socket.cc in Google Chrome before 41.0.2272.76 does not properly handle a…
Published: 2015-03-09T00:59:00 Last Modified: 2016-12-22T02:59:00
Summary
net/http/proxy_client_socket.cc in Google Chrome before 41.0.2272.76 does not properly handle a 407 (aka Proxy Authentication Required) HTTP status code accompanied by a Set-Cookie header, which allows remote proxy servers to conduct cookie-injection attacks via a crafted response.
Common Weakness Enumeration (CWE): CWE-19: Data Processing Errors
CWE Description: Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1229 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/03/stable-channel-update.html
- https://code.google.com/p/chromium/issues/detail?id=431504
- https://codereview.chromium.org/769043003
- http://rhn.redhat.com/errata/RHSA-2015-0627.html
- http://www.securityfocus.com/bid/72901
- http://www.ubuntu.com/usn/USN-2521-1
- https://security.gentoo.org/glsa/201503-12
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0239: The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the…
Published: 2015-03-02T11:59:00 Last Modified: 2020-05-21T14:19:00
Summary
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-0239 vulnerability.
References
- http://permalink.gmane.org/gmane.linux.kernel.commits.head/502245
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f3747379accba8e95d70cec0eae0582c8c182050
- https://github.com/torvalds/linux/commit/f3747379accba8e95d70cec0eae0582c8c182050
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.5
- http://www.openwall.com/lists/oss-security/2015/01/27/6
- https://bugzilla.redhat.com/show_bug.cgi?id=1186448
- http://www.ubuntu.com/usn/USN-2518-1
- http://www.ubuntu.com/usn/USN-2515-1
- http://www.ubuntu.com/usn/USN-2516-1
- http://www.ubuntu.com/usn/USN-2517-1
- http://www.securityfocus.com/bid/72842
- http://www.ubuntu.com/usn/USN-2514-1
- http://www.ubuntu.com/usn/USN-2513-1
- http://www.debian.org/security/2015/dsa-3170
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:058
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://rhn.redhat.com/errata/RHSA-2015-1272.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8160: net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect…
Published: 2015-03-02T11:59:00 Last Modified: 2020-05-21T20:11:00
Summary
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8160 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2015/01/14/3
- https://bugzilla.redhat.com/show_bug.cgi?id=1182059
- https://github.com/torvalds/linux/commit/db29a9508a9246e77087c5531e45b2c88ec6988b
- http://www.spinics.net/lists/netfilter-devel/msg33430.html
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=db29a9508a9246e77087c5531e45b2c88ec6988b
- http://www.ubuntu.com/usn/USN-2518-1
- http://www.ubuntu.com/usn/USN-2515-1
- http://www.ubuntu.com/usn/USN-2516-1
- http://www.ubuntu.com/usn/USN-2517-1
- http://www.securityfocus.com/bid/72061
- http://www.ubuntu.com/usn/USN-2514-1
- http://www.ubuntu.com/usn/USN-2513-1
- http://rhn.redhat.com/errata/RHSA-2015-0284.html
- http://rhn.redhat.com/errata/RHSA-2015-0674.html
- http://rhn.redhat.com/errata/RHSA-2015-0290.html
- http://www.debian.org/security/2015/dsa-3170
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:057
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:058
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0831: Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function…
Published: 2015-02-25T11:59:00 Last Modified: 2019-04-22T17:48:00
Summary
Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0831 vulnerability.
References
- http://www.mozilla.org/security/announce/2015/mfsa2015-16.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1130541
- http://www.securitytracker.com/id/1031791
- http://www.securitytracker.com/id/1031792
- http://www.securityfocus.com/bid/72746
- http://rhn.redhat.com/errata/RHSA-2015-0265.html
- http://rhn.redhat.com/errata/RHSA-2015-0266.html
- http://www.debian.org/security/2015/dsa-3174
- http://www.ubuntu.com/usn/USN-2505-1
- http://www.ubuntu.com/usn/USN-2506-1
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00001.html
- http://www.debian.org/security/2015/dsa-3179
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-0642.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00026.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00067.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- https://security.gentoo.org/glsa/201504-01
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-7423: The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does…
Published: 2015-02-24T15:59:00 Last Modified: 2021-09-01T18:15:00
Summary
The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
Common Weakness Enumeration (CWE): CWE-17:
CWE Description:
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-7423 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2015/01/28/20
- https://github.com/golang/go/issues/6336
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=15946
- http://www.ubuntu.com/usn/USN-2519-1
- http://www.securityfocus.com/bid/72844
- https://security.gentoo.org/glsa/201602-02
- https://access.redhat.com/errata/RHSA-2016:1207
- http://rhn.redhat.com/errata/RHSA-2015-0863.html
- http://seclists.org/fulldisclosure/2021/Sep/0
- http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0240: The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before…
Published: 2015-02-24T01:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
Common Weakness Enumeration (CWE): CWE-17:
CWE Description:
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2015-0240 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1191325
- https://www.samba.org/samba/security/CVE-2015-0240
- https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/
- http://rhn.redhat.com/errata/RHSA-2015-0251.html
- http://rhn.redhat.com/errata/RHSA-2015-0256.html
- https://access.redhat.com/articles/1346913
- http://rhn.redhat.com/errata/RHSA-2015-0255.html
- http://rhn.redhat.com/errata/RHSA-2015-0253.html
- http://rhn.redhat.com/errata/RHSA-2015-0249.html
- http://rhn.redhat.com/errata/RHSA-2015-0250.html
- http://www.debian.org/security/2015/dsa-3171
- http://rhn.redhat.com/errata/RHSA-2015-0252.html
- http://rhn.redhat.com/errata/RHSA-2015-0257.html
- http://www.ubuntu.com/usn/USN-2508-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2015-0254.html
- http://www.securitytracker.com/id/1031783
- http://www.securityfocus.com/bid/72711
- http://security.gentoo.org/glsa/glsa-201502-15.xml
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.360345
- http://marc.info/?l=bugtraq&m=142722696102151&w=2
- http://advisories.mageia.org/MGASA-2015-0084.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:081
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:082
- https://www.exploit-db.com/exploits/36741/
- http://marc.info/?l=bugtraq&m=143039217203031&w=2
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
- https://support.lenovo.com/product_security/samba_remote_vuln
- https://support.lenovo.com/us/en/product_security/samba_remote_vuln
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9660: The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9660 vulnerability.
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=af8346172a7b573715134f7a51e6c5c60fa7f2ab
- http://code.google.com/p/google-security-research/issues/detail?id=188
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9664: FreeType before 2.5.4 does not check for the end of the data during certain parsing actions,…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9664 vulnerability.
References
- http://code.google.com/p/google-security-research/issues/detail?id=183
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=73be9f9ab67842cfbec36ee99e8d2301434c84ca
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=dd89710f0f643eb0f99a3830e0712d26c7642acd
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9667: sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9667 vulnerability.
References
- http://code.google.com/p/google-security-research/issues/detail?id=166
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=677ddf4f1dc1b36cef7c7ddd59a14c508f4b1891
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9669: Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9669 vulnerability.
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=602040b1112c9f94d68e200be59ea7ac3d104565
- http://code.google.com/p/google-security-research/issues/detail?id=163
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9670: Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9670 vulnerability.
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=ef1eba75187adfac750f326b563fe543dd5ff4e6
- http://code.google.com/p/google-security-research/issues/detail?id=158
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9657: The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9657 vulnerability.
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=eca0f067068020870a429fe91f6329e499390d55
- http://code.google.com/p/google-security-research/issues/detail?id=195
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9661: type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9661 vulnerability.
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=42fcd6693ec7bd6ffc65ddc63e74287a65dda669
- http://code.google.com/p/google-security-research/issues/detail?id=187
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3788187e0c396952cd7d905c6c61f3ff8e84b2b4
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://packetstormsecurity.com/files/134396/FreeType-2.5.3-Type42-Parsing-Use-After-Free.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9671: Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9671 vulnerability.
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=0e2f5d518c60e2978f26400d110eff178fa7e3c3
- http://code.google.com/p/google-security-research/issues/detail?id=157
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9673: Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9673 vulnerability.
References
- http://code.google.com/p/google-security-research/issues/detail?id=154
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=35252ae9aa1dd9343e9f4884e9ddb1fee10ef415
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9663: The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field’s value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9663 vulnerability.
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=9bd20b7304aae61de5d50ac359cf27132bafd4c1
- http://code.google.com/p/google-security-research/issues/detail?id=184
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9666: The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9666 vulnerability.
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=257c270bd25e15890190a28a1456e7623bba4439
- http://code.google.com/p/google-security-research/issues/detail?id=167
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9674: The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9674 vulnerability.
References
- http://code.google.com/p/google-security-research/issues/detail?id=153
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=240c94a185cd8dae7d03059abec8a5662c35ecd3
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=cd4a5a26e591d01494567df9dec7f72d59551f6e
- http://www.ubuntu.com/usn/USN-2510-1
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.debian.org/security/2016/dsa-3461
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9675: bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9675 vulnerability.
References
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=2c4832d30939b45c05757f0a05128ce64c4cacc7
- http://code.google.com/p/google-security-research/issues/detail?id=151
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- https://source.android.com/security/bulletin/2016-11-01.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9658: The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect…
Published: 2015-02-08T11:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-9658 vulnerability.
References
- http://code.google.com/p/google-security-research/issues/detail?id=194
- http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f70d9342e65cd2cb44e9f26b6d7edeedf191fc6c
- http://www.ubuntu.com/usn/USN-2510-1
- http://www.debian.org/security/2015/dsa-3188
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150162.html
- http://rhn.redhat.com/errata/RHSA-2015-0696.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:055
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150148.html
- http://advisories.mageia.org/MGASA-2015-0083.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00091.html
- http://www.ubuntu.com/usn/USN-2739-1
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securityfocus.com/bid/72986
- https://security.gentoo.org/glsa/201503-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1209: Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in…
Published: 2015-02-06T11:59:00 Last Modified: 2021-09-08T17:19:00
Summary
Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1209 vulnerability.
References
- https://code.google.com/p/chromium/issues/detail?id=447906
- http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html
- https://src.chromium.org/viewvc/blink?revision=188788&view=revision
- http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html
- http://www.ubuntu.com/usn/USN-2495-1
- http://rhn.redhat.com/errata/RHSA-2015-0163.html
- http://www.securitytracker.com/id/1031709
- http://secunia.com/advisories/62818
- http://secunia.com/advisories/62670
- http://www.securityfocus.com/bid/72497
- http://secunia.com/advisories/62917
- http://secunia.com/advisories/62925
- http://security.gentoo.org/glsa/glsa-201502-13.xml
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100715
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1210: The V8ThrowException::createDOMException function in bindings/core/v8/V8ThrowException.cpp in the…
Published: 2015-02-06T11:59:00 Last Modified: 2021-09-08T17:19:00
Summary
The V8ThrowException::createDOMException function in bindings/core/v8/V8ThrowException.cpp in the V8 bindings in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, does not properly consider frame access restrictions during the throwing of an exception, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1210 vulnerability.
References
- https://src.chromium.org/viewvc/blink?revision=189365&view=revision
- https://code.google.com/p/chromium/issues/detail?id=453979
- http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html
- http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html
- http://www.ubuntu.com/usn/USN-2495-1
- http://rhn.redhat.com/errata/RHSA-2015-0163.html
- http://www.securitytracker.com/id/1031709
- http://secunia.com/advisories/62818
- http://secunia.com/advisories/62670
- http://www.securityfocus.com/bid/72497
- http://secunia.com/advisories/62917
- http://secunia.com/advisories/62925
- http://security.gentoo.org/glsa/glsa-201502-13.xml
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100716
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1211: The OriginCanAccessServiceWorkers function in…
Published: 2015-02-06T11:59:00 Last Modified: 2021-09-08T17:19:00
Summary
The OriginCanAccessServiceWorkers function in content/browser/service_worker/service_worker_dispatcher_host.cc in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android does not properly restrict the URI scheme during a ServiceWorker registration, which allows remote attackers to gain privileges via a filesystem: URI.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1211 vulnerability.
References
- https://codereview.chromium.org/889323002
- http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html
- https://code.google.com/p/chromium/issues/detail?id=453982
- http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html
- http://www.ubuntu.com/usn/USN-2495-1
- http://rhn.redhat.com/errata/RHSA-2015-0163.html
- http://www.securitytracker.com/id/1031709
- http://secunia.com/advisories/62818
- http://secunia.com/advisories/62670
- http://www.securityfocus.com/bid/72497
- http://secunia.com/advisories/62917
- http://secunia.com/advisories/62925
- http://security.gentoo.org/glsa/glsa-201502-13.xml
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100717
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-1212: Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and…
Published: 2015-02-06T11:59:00 Last Modified: 2021-09-08T17:19:00
Summary
Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-1212 vulnerability.
References
- https://code.google.com/p/chromium/issues/detail?id=446459
- https://code.google.com/p/chromium/issues/detail?id=445679
- https://code.google.com/p/chromium/issues/detail?id=427303
- https://code.google.com/p/chromium/issues/detail?id=451684
- http://googlechromereleases.blogspot.com/2015/02/chrome-for-android-update.html
- https://code.google.com/p/chromium/issues/detail?id=455225
- https://code.google.com/p/chromium/issues/detail?id=451918
- https://code.google.com/p/chromium/issues/detail?id=438365
- http://googlechromereleases.blogspot.com/2015/02/stable-channel-update.html
- http://rhn.redhat.com/errata/RHSA-2015-0163.html
- http://www.ubuntu.com/usn/USN-2495-1
- http://secunia.com/advisories/62670
- http://secunia.com/advisories/62818
- http://www.securitytracker.com/id/1031709
- http://www.securityfocus.com/bid/72497
- http://secunia.com/advisories/62917
- http://secunia.com/advisories/62925
- http://security.gentoo.org/glsa/glsa-201502-13.xml
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100718
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0236: libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the…
Published: 2015-01-29T15:59:00 Last Modified: 2018-10-30T16:27:00
Summary
libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0236 vulnerability.
References
- http://security.libvirt.org/2015/0001.html
- http://secunia.com/advisories/62766
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2015-0323.html
- http://advisories.mageia.org/MGASA-2015-0046.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:035
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:070
- http://www.ubuntu.com/usn/USN-2867-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8157: Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote…
Published: 2015-01-26T15:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8157 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-0074.html
- http://www.ocert.org/advisories/ocert-2015-001.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1179282
- http://secunia.com/advisories/62765
- http://secunia.com/advisories/62619
- http://secunia.com/advisories/62615
- http://secunia.com/advisories/62583
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html
- http://www.debian.org/security/2015/dsa-3138
- http://www.ubuntu.com/usn/USN-2483-1
- http://www.ubuntu.com/usn/USN-2483-2
- http://rhn.redhat.com/errata/RHSA-2015-0698.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:034
- http://advisories.mageia.org/MGASA-2015-0038.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:159
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
- http://www.securityfocus.com/bid/72296
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8158: Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote…
Published: 2015-01-26T15:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8158 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2015-0074.html
- http://www.ocert.org/advisories/ocert-2015-001.html
- http://secunia.com/advisories/62765
- http://secunia.com/advisories/62619
- http://secunia.com/advisories/62615
- http://secunia.com/advisories/62583
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00014.html
- http://www.debian.org/security/2015/dsa-3138
- http://www.ubuntu.com/usn/USN-2483-1
- http://www.ubuntu.com/usn/USN-2483-2
- http://rhn.redhat.com/errata/RHSA-2015-0698.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:034
- http://advisories.mageia.org/MGASA-2015-0038.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:159
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
- http://www.securityfocus.com/bid/72293
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-7923: The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN…
Published: 2015-01-22T22:59:00 Last Modified: 2019-04-23T19:29:00
Summary
The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a look-behind expression.
Common Weakness Enumeration (CWE): CWE-17:
CWE Description:
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-7923 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb
- http://bugs.icu-project.org/trac/ticket/11370
- https://code.google.com/p/chromium/issues/detail?id=430353
- https://codereview.chromium.org/726973003
- https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c
- http://secunia.com/advisories/62575
- http://security.gentoo.org/glsa/glsa-201502-13.xml
- http://www.ubuntu.com/usn/USN-2476-1
- http://rhn.redhat.com/errata/RHSA-2015-0093.html
- http://www.securityfocus.com/bid/72288
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
- http://advisories.mageia.org/MGASA-2015-0047.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securitytracker.com/id/1031623
- http://secunia.com/advisories/62665
- http://secunia.com/advisories/62383
- https://security.gentoo.org/glsa/201503-06
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-7926: The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN…
Published: 2015-01-22T22:59:00 Last Modified: 2019-04-23T19:29:00
Summary
The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a zero-length quantifier.
Common Weakness Enumeration (CWE): CWE-17:
CWE Description:
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-7926 vulnerability.
References
- https://code.google.com/p/chromium/issues/detail?id=422824
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- https://chromium.googlesource.com/chromium/deps/icu52/+/6242e2fbb36f486f2c0addd1c3cef67fc4ed33fb
- https://codereview.chromium.org/726973003
- https://chromium.googlesource.com/chromium/deps/icu52/+/3af4ce5982311035e5f36803d547c0befa576c8c
- http://bugs.icu-project.org/trac/ticket/11369
- http://secunia.com/advisories/62575
- http://security.gentoo.org/glsa/glsa-201502-13.xml
- http://www.ubuntu.com/usn/USN-2476-1
- http://rhn.redhat.com/errata/RHSA-2015-0093.html
- http://www.securityfocus.com/bid/72288
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
- http://advisories.mageia.org/MGASA-2015-0047.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securitytracker.com/id/1031623
- http://secunia.com/advisories/62665
- http://secunia.com/advisories/62383
- https://security.gentoo.org/glsa/201503-06
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-7939: Google Chrome before 40.0.2214.91, when the Harmony proxy in Google V8 is enabled, allows remote…
Published: 2015-01-22T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Google Chrome before 40.0.2214.91, when the Harmony proxy in Google V8 is enabled, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code with Proxy.create and console.log calls, related to HTTP responses that lack an “X-Content-Type-Options: nosniff” header.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-7939 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- https://code.google.com/p/chromium/issues/detail?id=399951
- http://security.gentoo.org/glsa/glsa-201502-13.xml
- http://rhn.redhat.com/errata/RHSA-2015-0093.html
- http://www.securityfocus.com/bid/72288
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
- http://www.securitytracker.com/id/1031623
- http://secunia.com/advisories/62665
- http://secunia.com/advisories/62383
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-7943: Skia, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of…
Published: 2015-01-22T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
Skia, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-7943 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- https://code.google.com/p/chromium/issues/detail?id=422492
- http://secunia.com/advisories/62575
- http://security.gentoo.org/glsa/glsa-201502-13.xml
- http://www.ubuntu.com/usn/USN-2476-1
- http://rhn.redhat.com/errata/RHSA-2015-0093.html
- http://www.securityfocus.com/bid/72288
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
- http://www.securitytracker.com/id/1031623
- http://secunia.com/advisories/62665
- http://secunia.com/advisories/62383
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-7942: The Fonts implementation in Google Chrome before 40.0.2214.91 does not initialize memory for a…
Published: 2015-01-22T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The Fonts implementation in Google Chrome before 40.0.2214.91 does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-7942 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- https://code.google.com/p/chromium/issues/detail?id=426762
- http://secunia.com/advisories/62575
- http://security.gentoo.org/glsa/glsa-201502-13.xml
- http://www.ubuntu.com/usn/USN-2476-1
- http://rhn.redhat.com/errata/RHSA-2015-0093.html
- http://www.securityfocus.com/bid/72288
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
- http://www.securitytracker.com/id/1031623
- http://secunia.com/advisories/62665
- http://secunia.com/advisories/62383
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-7941: The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI…
Published: 2015-01-22T22:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI implementation in Google Chrome before 40.0.2214.91 uses an incorrect data type for a certain length value, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted X11 data.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-7941 vulnerability.
References
- http://googlechromereleases.blogspot.com/2015/01/stable-update.html
- https://codereview.chromium.org/697863002
- https://code.google.com/p/chromium/issues/detail?id=428557
- http://security.gentoo.org/glsa/glsa-201502-13.xml
- http://rhn.redhat.com/errata/RHSA-2015-0093.html
- http://www.securityfocus.com/bid/72288
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00005.html
- http://www.securitytracker.com/id/1031623
- http://secunia.com/advisories/62665
- http://secunia.com/advisories/62383
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0412: Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to…
Published: 2015-01-21T19:59:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-0412 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securitytracker.com/id/1031580
- https://www-304.ibm.com/support/docview.wss?uid=swg21695474
- http://www.debian.org/security/2015/dsa-3147
- http://marc.info/?l=bugtraq&m=142496355704097&w=2
- http://www.debian.org/security/2015/dsa-3144
- http://www.ubuntu.com/usn/USN-2487-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
- http://www.ubuntu.com/usn/USN-2486-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2015-0264.html
- http://rhn.redhat.com/errata/RHSA-2015-0080.html
- http://rhn.redhat.com/errata/RHSA-2015-0068.html
- http://marc.info/?l=bugtraq&m=142607790919348&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0079.html
- http://rhn.redhat.com/errata/RHSA-2015-0085.html
- http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
- http://rhn.redhat.com/errata/RHSA-2015-0086.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
- http://www.vmware.com/security/advisories/VMSA-2015-0003.html
- https://security.gentoo.org/glsa/201603-14
- https://security.gentoo.org/glsa/201507-14
- http://www.securityfocus.com/bid/72136
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100140
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0411: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier,…
Published: 2015-01-21T19:59:00 Last Modified: 2019-02-01T17:53:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0411 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://secunia.com/advisories/62732
- http://secunia.com/advisories/62730
- http://secunia.com/advisories/62728
- http://www.securitytracker.com/id/1031581
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html
- http://www.ubuntu.com/usn/USN-2480-1
- http://www.debian.org/security/2015/dsa-3135
- http://rhn.redhat.com/errata/RHSA-2015-0116.html
- http://rhn.redhat.com/errata/RHSA-2015-0117.html
- http://rhn.redhat.com/errata/RHSA-2015-0118.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://security.gentoo.org/glsa/201504-05
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://www.securityfocus.com/bid/72191
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100183
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0432: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated…
Published: 2015-01-21T19:59:00 Last Modified: 2017-09-08T01:29:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0432 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://secunia.com/advisories/62732
- http://secunia.com/advisories/62730
- http://secunia.com/advisories/62728
- http://www.securitytracker.com/id/1031581
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html
- http://www.ubuntu.com/usn/USN-2480-1
- http://www.debian.org/security/2015/dsa-3135
- http://rhn.redhat.com/errata/RHSA-2015-0116.html
- http://rhn.redhat.com/errata/RHSA-2015-0117.html
- http://rhn.redhat.com/errata/RHSA-2015-0118.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- https://security.gentoo.org/glsa/201504-05
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://www.securityfocus.com/bid/72217
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100187
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0410: Unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component in Oracle Java SE…
Published: 2015-01-21T18:59:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows remote attackers to affect availability via unknown vectors related to Security.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0410 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securitytracker.com/id/1031580
- https://www-304.ibm.com/support/docview.wss?uid=swg21695474
- http://www.debian.org/security/2015/dsa-3147
- http://marc.info/?l=bugtraq&m=142496355704097&w=2
- http://www.debian.org/security/2015/dsa-3144
- http://www.ubuntu.com/usn/USN-2487-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
- http://www.ubuntu.com/usn/USN-2486-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2015-0264.html
- http://rhn.redhat.com/errata/RHSA-2015-0080.html
- http://rhn.redhat.com/errata/RHSA-2015-0068.html
- http://rhn.redhat.com/errata/RHSA-2015-0136.html
- http://marc.info/?l=bugtraq&m=142607790919348&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0079.html
- http://rhn.redhat.com/errata/RHSA-2015-0085.html
- http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
- http://rhn.redhat.com/errata/RHSA-2015-0086.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
- http://www.vmware.com/security/advisories/VMSA-2015-0003.html
- https://source.android.com/security/bulletin/2016-11-01.html
- https://security.gentoo.org/glsa/201507-14
- https://kc.mcafee.com/corporate/index?page=content&id=SB10104
- http://www.securityfocus.com/bid/72165
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100151
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0408: Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers…
Published: 2015-01-21T18:59:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0408 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securitytracker.com/id/1031580
- https://www-304.ibm.com/support/docview.wss?uid=swg21695474
- http://www.debian.org/security/2015/dsa-3147
- http://marc.info/?l=bugtraq&m=142496355704097&w=2
- http://www.debian.org/security/2015/dsa-3144
- http://www.ubuntu.com/usn/USN-2487-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
- http://www.ubuntu.com/usn/USN-2486-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2015-0264.html
- http://rhn.redhat.com/errata/RHSA-2015-0080.html
- http://rhn.redhat.com/errata/RHSA-2015-0068.html
- http://rhn.redhat.com/errata/RHSA-2015-0136.html
- http://marc.info/?l=bugtraq&m=142607790919348&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0079.html
- http://rhn.redhat.com/errata/RHSA-2015-0085.html
- http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
- http://rhn.redhat.com/errata/RHSA-2015-0086.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
- http://www.vmware.com/security/advisories/VMSA-2015-0003.html
- https://security.gentoo.org/glsa/201603-14
- https://security.gentoo.org/glsa/201507-14
- http://www.securityfocus.com/bid/72140
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100142
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0407: Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers…
Published: 2015-01-21T18:59:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0407 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securitytracker.com/id/1031580
- https://www-304.ibm.com/support/docview.wss?uid=swg21695474
- http://www.debian.org/security/2015/dsa-3147
- http://marc.info/?l=bugtraq&m=142496355704097&w=2
- http://www.debian.org/security/2015/dsa-3144
- http://www.ubuntu.com/usn/USN-2487-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
- http://www.ubuntu.com/usn/USN-2486-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2015-0264.html
- http://rhn.redhat.com/errata/RHSA-2015-0080.html
- http://rhn.redhat.com/errata/RHSA-2015-0068.html
- http://rhn.redhat.com/errata/RHSA-2015-0136.html
- http://marc.info/?l=bugtraq&m=142607790919348&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0079.html
- http://rhn.redhat.com/errata/RHSA-2015-0085.html
- http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
- http://rhn.redhat.com/errata/RHSA-2015-0086.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
- http://www.vmware.com/security/advisories/VMSA-2015-0003.html
- https://security.gentoo.org/glsa/201603-14
- https://security.gentoo.org/glsa/201507-14
- http://www.securityfocus.com/bid/72162
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100150
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0391: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier,…
Published: 2015-01-21T18:59:00 Last Modified: 2019-02-01T17:58:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0391 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/bid/72205
- http://secunia.com/advisories/62732
- http://secunia.com/advisories/62730
- http://secunia.com/advisories/62728
- http://www.securitytracker.com/id/1031581
- http://rhn.redhat.com/errata/RHSA-2015-0116.html
- http://rhn.redhat.com/errata/RHSA-2015-0117.html
- http://rhn.redhat.com/errata/RHSA-2015-0118.html
- https://security.gentoo.org/glsa/201504-05
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100186
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0382: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows…
Published: 2015-01-21T18:59:00 Last Modified: 2019-02-01T17:58:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0382 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/bid/72200
- http://secunia.com/advisories/62732
- http://secunia.com/advisories/62730
- http://secunia.com/advisories/62728
- http://www.securitytracker.com/id/1031581
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html
- http://www.ubuntu.com/usn/USN-2480-1
- http://www.debian.org/security/2015/dsa-3135
- http://rhn.redhat.com/errata/RHSA-2015-0116.html
- http://rhn.redhat.com/errata/RHSA-2015-0117.html
- http://rhn.redhat.com/errata/RHSA-2015-0118.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://security.gentoo.org/glsa/201504-05
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100184
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0395: Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers…
Published: 2015-01-21T18:59:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0395 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securitytracker.com/id/1031580
- https://www-304.ibm.com/support/docview.wss?uid=swg21695474
- http://www.debian.org/security/2015/dsa-3147
- http://marc.info/?l=bugtraq&m=142496355704097&w=2
- http://www.debian.org/security/2015/dsa-3144
- http://www.ubuntu.com/usn/USN-2487-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
- http://www.ubuntu.com/usn/USN-2486-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2015-0264.html
- http://rhn.redhat.com/errata/RHSA-2015-0080.html
- http://rhn.redhat.com/errata/RHSA-2015-0068.html
- http://rhn.redhat.com/errata/RHSA-2015-0136.html
- http://marc.info/?l=bugtraq&m=142607790919348&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0079.html
- http://rhn.redhat.com/errata/RHSA-2015-0085.html
- http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
- http://rhn.redhat.com/errata/RHSA-2015-0086.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
- http://www.vmware.com/security/advisories/VMSA-2015-0003.html
- https://security.gentoo.org/glsa/201603-14
- https://security.gentoo.org/glsa/201507-14
- http://www.securityfocus.com/bid/72142
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100143
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0374: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows…
Published: 2015-01-21T18:59:00 Last Modified: 2019-02-01T18:04:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0374 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/bid/72227
- http://secunia.com/advisories/62732
- http://secunia.com/advisories/62730
- http://secunia.com/advisories/62728
- http://www.securitytracker.com/id/1031581
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html
- http://www.ubuntu.com/usn/USN-2480-1
- http://www.debian.org/security/2015/dsa-3135
- http://rhn.redhat.com/errata/RHSA-2015-0116.html
- http://rhn.redhat.com/errata/RHSA-2015-0117.html
- http://rhn.redhat.com/errata/RHSA-2015-0118.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- https://security.gentoo.org/glsa/201504-05
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100191
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0381: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows…
Published: 2015-01-21T18:59:00 Last Modified: 2019-02-01T18:02:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2015-0381 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/bid/72214
- http://secunia.com/advisories/62732
- http://secunia.com/advisories/62730
- http://secunia.com/advisories/62728
- http://www.securitytracker.com/id/1031581
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html
- http://www.ubuntu.com/usn/USN-2480-1
- http://www.debian.org/security/2015/dsa-3135
- http://rhn.redhat.com/errata/RHSA-2015-0116.html
- http://rhn.redhat.com/errata/RHSA-2015-0117.html
- http://rhn.redhat.com/errata/RHSA-2015-0118.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://security.gentoo.org/glsa/201504-05
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100185
See also: All popular products CVE Vulnerabilities of redhat
CVE-2015-0383: Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71…
Published: 2015-01-21T18:59:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows local users to affect integrity and availability via unknown vectors related to Hotspot.
Scores
- Impact Score: 7.8
- Exploitability Score: 3.4
- CVSS: 5.4
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2015-0383 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/bid/72155
- http://www.securitytracker.com/id/1031580
- http://www.debian.org/security/2015/dsa-3147
- http://marc.info/?l=bugtraq&m=142496355704097&w=2
- http://www.debian.org/security/2015/dsa-3144
- http://www.ubuntu.com/usn/USN-2487-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
- http://www.ubuntu.com/usn/USN-2486-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2015-0080.html
- http://rhn.redhat.com/errata/RHSA-2015-0068.html
- http://marc.info/?l=bugtraq&m=142607790919348&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0079.html
- http://rhn.redhat.com/errata/RHSA-2015-0085.html
- http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
- http://rhn.redhat.com/errata/RHSA-2015-0086.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158810.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158088.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158791.html
- http://www.vmware.com/security/advisories/VMSA-2015-0003.html
- https://security.gentoo.org/glsa/201603-14
- https://security.gentoo.org/glsa/201507-14
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100148
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-6601: Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to…
Published: 2015-01-21T18:59:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-6601 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securitytracker.com/id/1031580
- http://www.debian.org/security/2015/dsa-3147
- http://marc.info/?l=bugtraq&m=142496355704097&w=2
- http://www.debian.org/security/2015/dsa-3144
- http://www.ubuntu.com/usn/USN-2487-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
- http://www.ubuntu.com/usn/USN-2486-1
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2015-0080.html
- http://rhn.redhat.com/errata/RHSA-2015-0068.html
- http://marc.info/?l=bugtraq&m=142607790919348&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0079.html
- http://rhn.redhat.com/errata/RHSA-2015-0085.html
- http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
- http://rhn.redhat.com/errata/RHSA-2015-0086.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
- http://www.vmware.com/security/advisories/VMSA-2015-0003.html
- https://security.gentoo.org/glsa/201603-14
- https://security.gentoo.org/glsa/201507-14
- http://www.securityfocus.com/bid/72132
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-6568: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier,…
Published: 2015-01-21T15:28:00 Last Modified: 2018-12-18T16:06:00
Summary
Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-6568 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/bid/72210
- http://secunia.com/advisories/62732
- http://secunia.com/advisories/62730
- http://secunia.com/advisories/62728
- http://www.securitytracker.com/id/1031581
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html
- http://www.ubuntu.com/usn/USN-2480-1
- http://www.debian.org/security/2015/dsa-3135
- http://rhn.redhat.com/errata/RHSA-2015-0116.html
- http://rhn.redhat.com/errata/RHSA-2015-0117.html
- http://rhn.redhat.com/errata/RHSA-2015-0118.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- https://security.gentoo.org/glsa/201504-05
- http://rhn.redhat.com/errata/RHSA-2015-1628.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9584: The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2…
Published: 2015-01-09T21:59:00 Last Modified: 2020-05-21T20:34:00
Summary
The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-9584 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
- http://www.openwall.com/lists/oss-security/2015/01/09/4
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4e2024624e678f0ebb916e6192bd23c1f9fdf696
- https://bugzilla.redhat.com/show_bug.cgi?id=1180119
- https://github.com/torvalds/linux/commit/4e2024624e678f0ebb916e6192bd23c1f9fdf696
- http://www.ubuntu.com/usn/USN-2512-1
- http://www.ubuntu.com/usn/USN-2511-1
- http://www.ubuntu.com/usn/USN-2518-1
- http://www.ubuntu.com/usn/USN-2515-1
- http://www.ubuntu.com/usn/USN-2516-1
- http://www.ubuntu.com/usn/USN-2517-1
- http://www.debian.org/security/2015/dsa-3128
- http://www.ubuntu.com/usn/USN-2514-1
- http://www.ubuntu.com/usn/USN-2513-1
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:058
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/71883
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
- http://rhn.redhat.com/errata/RHSA-2015-1138.html
- http://rhn.redhat.com/errata/RHSA-2015-1137.html
- http://rhn.redhat.com/errata/RHSA-2015-0864.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9585: The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not…
Published: 2015-01-09T21:59:00 Last Modified: 2020-05-21T20:35:00
Summary
The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-9585 vulnerability.
References
- http://git.kernel.org/?p=linux/kernel/git/tip/tip.git;a=commit;h=fbe1bf140671619508dfa575d74a185ae53c5dbb
- http://www.openwall.com/lists/oss-security/2015/01/09/8
- http://www.openwall.com/lists/oss-security/2014/12/09/10
- http://git.kernel.org/?p=linux/kernel/git/luto/linux.git;a=commit;h=bc3b94c31d65e761ddfe150d02932c65971b74e2
- http://v0ids3curity.blogspot.in/2014/12/return-to-vdso-using-elf-auxiliary.html
- http://www.ubuntu.com/usn/USN-2518-1
- http://www.ubuntu.com/usn/USN-2515-1
- http://www.ubuntu.com/usn/USN-2516-1
- http://www.ubuntu.com/usn/USN-2517-1
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html
- http://www.ubuntu.com/usn/USN-2514-1
- http://www.ubuntu.com/usn/USN-2513-1
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://www.debian.org/security/2015/dsa-3170
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:058
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148480.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2015-1787.html
- http://rhn.redhat.com/errata/RHSA-2015-1778.html
- http://www.securityfocus.com/bid/71990
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
- http://rhn.redhat.com/errata/RHSA-2015-1081.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9529: Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel…
Published: 2015-01-09T21:59:00 Last Modified: 2020-05-21T17:41:00
Summary
Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-9529 vulnerability.
References
- https://github.com/torvalds/linux/commit/a3a8784454692dd72e5d5d34dcdab17b4420e74c
- http://www.openwall.com/lists/oss-security/2015/01/06/10
- https://bugzilla.redhat.com/show_bug.cgi?id=1179813
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a3a8784454692dd72e5d5d34dcdab17b4420e74c
- http://www.ubuntu.com/usn/USN-2512-1
- http://www.ubuntu.com/usn/USN-2511-1
- http://www.ubuntu.com/usn/USN-2518-1
- http://www.ubuntu.com/usn/USN-2515-1
- http://www.ubuntu.com/usn/USN-2516-1
- http://www.ubuntu.com/usn/USN-2517-1
- http://www.debian.org/security/2015/dsa-3128
- http://www.ubuntu.com/usn/USN-2514-1
- http://www.ubuntu.com/usn/USN-2513-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:058
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html
- http://www.securityfocus.com/bid/71880
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
- http://www.securitytracker.com/id/1036763
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99641
- http://rhn.redhat.com/errata/RHSA-2015-1138.html
- http://rhn.redhat.com/errata/RHSA-2015-1137.html
- http://rhn.redhat.com/errata/RHSA-2015-0864.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-7300: GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the…
Published: 2014-12-25T21:59:00 Last Modified: 2016-08-31T15:08:00
Summary
GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a temporary lock outage, and the resulting temporary shell availability, caused by the Linux kernel OOM killer.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-7300 vulnerability.
References
- https://bugzilla.gnome.org/show_bug.cgi?id=737456
- http://openwall.com/lists/oss-security/2014/09/29/17
- https://git.gnome.org/browse/gnome-shell/commit/?id=a72dca361080ffc9f45ff90188a7cf013c3c4013
- https://git.gnome.org/browse/gnome-shell/commit/?id=f02b007337e61436aaa0e81a86ad707b6d277378
- http://rhn.redhat.com/errata/RHSA-2015-0535.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-2771: The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier…
Published: 2014-12-24T18:59:00 Last Modified: 2019-12-27T16:08:00
Summary
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-2771 vulnerability.
References
- http://secunia.com/advisories/61585
- http://secunia.com/advisories/60940
- http://secunia.com/advisories/61693
- http://www.debian.org/security/2014/dsa-3105
- http://seclists.org/oss-sec/2014/q4/1066
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278748
- http://rhn.redhat.com/errata/RHSA-2014-1999.html
- http://linux.oracle.com/errata/ELSA-2014-1999.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8137: Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier…
Published: 2014-12-24T18:59:00 Last Modified: 2018-01-05T02:29:00
Summary
Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8137 vulnerability.
References
- http://secunia.com/advisories/61747
- https://www.ocert.org/advisories/ocert-2014-012.html
- http://rhn.redhat.com/errata/RHSA-2014-2021.html
- http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html
- http://secunia.com/advisories/62311
- http://secunia.com/advisories/62619
- http://secunia.com/advisories/62615
- http://www.ubuntu.com/usn/USN-2483-1
- http://www.debian.org/security/2014/dsa-3106
- http://www.ubuntu.com/usn/USN-2483-2
- http://rhn.redhat.com/errata/RHSA-2015-0698.html
- http://advisories.mageia.org/MGASA-2014-0539.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:012
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:159
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html
- http://www.securityfocus.com/bid/71742
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
- http://www.securitytracker.com/id/1033459
- http://rhn.redhat.com/errata/RHSA-2015-1713.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8138: Heap-based buffer overflow in the jp2_decode function in JasPer 1.900.1 and earlier allows remote…
Published: 2014-12-24T18:59:00 Last Modified: 2018-01-05T02:29:00
Summary
Heap-based buffer overflow in the jp2_decode function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 file.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8138 vulnerability.
References
- http://secunia.com/advisories/61747
- https://www.ocert.org/advisories/ocert-2014-012.html
- http://rhn.redhat.com/errata/RHSA-2014-2021.html
- http://packetstormsecurity.com/files/129660/JasPer-1.900.1-Double-Free-Heap-Overflow.html
- http://secunia.com/advisories/62311
- http://secunia.com/advisories/62619
- http://secunia.com/advisories/62615
- http://www.ubuntu.com/usn/USN-2483-1
- http://www.debian.org/security/2014/dsa-3106
- http://www.ubuntu.com/usn/USN-2483-2
- http://rhn.redhat.com/errata/RHSA-2015-0698.html
- http://advisories.mageia.org/MGASA-2014-0539.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:012
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:159
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00017.html
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00014.html
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00013.html
- http://www.securityfocus.com/bid/71746
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
- http://www.securitytracker.com/id/1033459
- http://rhn.redhat.com/errata/RHSA-2015-1713.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8136: The (1) qemuDomainMigratePerform and (2) qemuDomainMigrateFinish2 functions in qemu/qemu_driver.c…
Published: 2014-12-19T15:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The (1) qemuDomainMigratePerform and (2) qemuDomainMigrateFinish2 functions in qemu/qemu_driver.c in libvirt do not unlock the domain when an ACL check fails, which allow local users to cause a denial of service via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-8136 vulnerability.
References
- http://libvirt.org/git/?p=libvirt.git;a=commit;h=2bdcd29c713dfedd813c89f56ae98f6f3898313d
- http://secunia.com/advisories/61111
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2015-0323.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:070
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:023
- http://advisories.mageia.org/MGASA-2015-0002.html
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00003.html
- http://www.ubuntu.com/usn/USN-2867-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3580: The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x…
Published: 2014-12-18T15:59:00 Last Modified: 2016-12-24T02:59:00
Summary
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3580 vulnerability.
References
- http://subversion.apache.org/security/CVE-2014-3580-advisory.txt
- http://secunia.com/advisories/61131
- http://www.debian.org/security/2014/dsa-3107
- http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html
- https://support.apple.com/HT204427
- http://rhn.redhat.com/errata/RHSA-2015-0166.html
- http://rhn.redhat.com/errata/RHSA-2015-0165.html
- http://www.securityfocus.com/bid/71726
- http://www.ubuntu.com/usn/USN-2721-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8108: The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x…
Published: 2014-12-18T15:59:00 Last Modified: 2017-01-03T02:59:00
Summary
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8108 vulnerability.
References
- http://subversion.apache.org/security/CVE-2014-8108-advisory.txt
- http://secunia.com/advisories/61131
- http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html
- https://support.apple.com/HT204427
- http://rhn.redhat.com/errata/RHSA-2015-0166.html
- http://www.ubuntu.com/usn/USN-2721-1
- http://www.securityfocus.com/bid/71725
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9322: arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults…
Published: 2014-12-17T11:59:00 Last Modified: 2020-08-14T18:23:00
Summary
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2014-9322 vulnerability.
- Linux Kernel - 'BadIRET' Local Privilege Escalation by Ren Kimura at 2017-07-24
- Linux Kernel 3.17.5 - IRET Instruction #SS Fault Handling Crash (PoC) by Emeric Nasi at 2015-03-04
References
- http://www.openwall.com/lists/oss-security/2014/12/15/6
- https://bugzilla.redhat.com/show_bug.cgi?id=1172806
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.5
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6f442be2fb22be02cafa606f1769fa1e6f894441
- https://github.com/torvalds/linux/commit/6f442be2fb22be02cafa606f1769fa1e6f894441
- http://secunia.com/advisories/62336
- http://www.ubuntu.com/usn/USN-2491-1
- http://www.exploit-db.com/exploits/36266
- http://osvdb.org/show/osvdb/115919
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://www.zerodayinitiative.com/advisories/ZDI-16-170
- https://help.joyent.com/entries/98788667-Security-Advisory-ZDI-CAN-3263-ZDI-CAN-3284-and-ZDI-CAN-3364-Vulnerabilities
- http://source.android.com/security/bulletin/2016-04-02.html
- http://marc.info/?l=bugtraq&m=142722450701342&w=2
- http://marc.info/?l=bugtraq&m=142722544401658&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0009.html
- http://rhn.redhat.com/errata/RHSA-2014-2031.html
- http://rhn.redhat.com/errata/RHSA-2014-2028.html
- http://rhn.redhat.com/errata/RHSA-2014-2008.html
- http://rhn.redhat.com/errata/RHSA-2014-1998.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-5353: The krb5_ldap_get_password_policy_from_dn function in…
Published: 2014-12-16T23:59:00 Last Modified: 2021-02-02T18:57:00
Summary
The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.8
- CVSS: 3.5
- CVSS Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-5353 vulnerability.
References
- https://github.com/krb5/krb5/commit/d1f707024f1d0af6e54a18885322d70fa15ec4d3
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:009
- http://www.securityfocus.com/bid/71679
- http://advisories.mageia.org/MGASA-2014-0536.html
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773226
- http://rhn.redhat.com/errata/RHSA-2015-0439.html
- http://www.ubuntu.com/usn/USN-2498-1
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00061.html
- http://rhn.redhat.com/errata/RHSA-2015-0794.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155828.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.securitytracker.com/id/1031376
- https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-7840: The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration,…
Published: 2014-12-12T15:59:00 Last Modified: 2020-08-11T15:21:00
Summary
The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-7840 vulnerability.
References
- http://thread.gmane.org/gmane.comp.emulators.qemu/306117
- http://git.qemu.org/?p=qemu.git;a=commit;h=0be839a2701369f669532ea5884c15bead1c6e08
- https://bugzilla.redhat.com/show_bug.cgi?id=1163075
- http://rhn.redhat.com/errata/RHSA-2015-0349.html
- http://rhn.redhat.com/errata/RHSA-2015-0624.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99194
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-9273: lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain…
Published: 2014-12-08T16:59:00 Last Modified: 2018-10-30T16:27:00
Summary
lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain privileges via a small hive files, which triggers an out-of-bounds read or write.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-9273 vulnerability.
References
- https://github.com/libguestfs/hivex/commit/4bbdf555f88baeae0fa804a369a81a83908bd705
- http://www.openwall.com/lists/oss-security/2014/11/25/6
- https://bugzilla.redhat.com/show_bug.cgi?id=1167756
- http://www.openwall.com/lists/oss-security/2014/12/04/14
- https://github.com/libguestfs/hivex/commit/357f26fa64fd1d9ccac2331fe174a8ee9c607adb
- https://www.redhat.com/archives/libguestfs/2014-October/msg00235.html
- http://secunia.com/advisories/62792
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2015-0301.html
- http://rhn.redhat.com/errata/RHSA-2015-1378.html
- http://www.securityfocus.com/bid/71279
- https://security.gentoo.org/glsa/201503-07
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8867: The acceleration support for the “REP MOVS” instruction in Xen 4.4.x, 3.2.x, and earlier lacks…
Published: 2014-12-01T15:59:00 Last Modified: 2018-10-30T16:27:00
Summary
The acceleration support for the “REP MOVS” instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-17:
CWE Description:
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-8867 vulnerability.
References
- http://xenbits.xenproject.org/xsa/advisory-112.html
- http://www.securityfocus.com/bid/71331
- http://secunia.com/advisories/59949
- http://secunia.com/advisories/62672
- http://www.debian.org/security/2015/dsa-3140
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2015-0783.html
- http://support.citrix.com/article/CTX201794
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- https://security.gentoo.org/glsa/201504-04
- http://support.citrix.com/article/CTX200288
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6662: Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in…
Published: 2014-11-24T16:59:00 Last Modified: 2018-07-14T01:29:00
Summary
Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-6662 vulnerability.
References
- https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde
- https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e
- http://bugs.jqueryui.com/ticket/8861
- http://seclists.org/oss-sec/2014/q4/616
- http://seclists.org/oss-sec/2014/q4/613
- http://bugs.jqueryui.com/ticket/8859
- http://rhn.redhat.com/errata/RHSA-2015-0442.html
- http://www.securityfocus.com/bid/71107
- http://rhn.redhat.com/errata/RHSA-2015-1462.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98697
- https://github.com/jquery/jquery/issues/2432
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-4975: Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through…
Published: 2014-11-15T20:59:00 Last Modified: 2017-08-29T01:35:00
Summary
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-4975 vulnerability.
References
- https://bugs.ruby-lang.org/issues/10019
- https://bugzilla.redhat.com/show_bug.cgi?id=1118158
- http://www.ubuntu.com/usn/USN-2397-1
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778
- http://www.openwall.com/lists/oss-security/2014/07/09/13
- http://rhn.redhat.com/errata/RHSA-2014-1913.html
- http://rhn.redhat.com/errata/RHSA-2014-1912.html
- http://rhn.redhat.com/errata/RHSA-2014-1914.html
- http://www.debian.org/security/2015/dsa-3157
- http://advisories.mageia.org/MGASA-2014-0472.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:129
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/68474
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94706
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-7815: The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of…
Published: 2014-11-14T15:59:00 Last Modified: 2020-08-11T15:21:00
Summary
The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-7815 vulnerability.
References
- http://www.debian.org/security/2014/dsa-3067
- http://secunia.com/advisories/62143
- http://secunia.com/advisories/61484
- http://secunia.com/advisories/62144
- http://git.qemu.org/?p=qemu.git;a=commit;h=e6908bfe8e07f2b452e78e677da1b45b1c0f6829
- https://bugzilla.redhat.com/show_bug.cgi?id=1157641
- http://www.ubuntu.com/usn/USN-2409-1
- http://www.debian.org/security/2014/dsa-3066
- http://rhn.redhat.com/errata/RHSA-2015-0349.html
- http://rhn.redhat.com/errata/RHSA-2015-0624.html
- http://support.citrix.com/article/CTX200892
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8567: The mod_auth_mellon module before 0.8.1 allows remote attackers to cause a denial of service…
Published: 2014-11-14T15:59:00 Last Modified: 2019-07-09T12:29:00
Summary
The mod_auth_mellon module before 0.8.1 allows remote attackers to cause a denial of service (Apache HTTP server crash) via a crafted logout request that triggers a read of uninitialized data.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 9.2
- Exploitability Score: 10.0
- CVSS: 9.4
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8567 vulnerability.
References
- http://secunia.com/advisories/62094
- http://rhn.redhat.com/errata/RHSA-2014-1803.html
- https://github.com/UNINETT/mod_auth_mellon/commit/0f5b4fd860fa7e3a6c47201637aab05395f32647
- https://postlister.uninett.no/sympa/arc/modmellon/2014-11/msg00000.html
- http://secunia.com/advisories/62125
- http://linux.oracle.com/errata/ELSA-2014-1803.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8564: The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x…
Published: 2014-11-13T21:32:00 Last Modified: 2018-10-30T16:27:00
Summary
The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.
Common Weakness Enumeration (CWE): CWE-310: Cryptographic Issues
CWE Description: Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8564 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2014-1846.html
- http://secunia.com/advisories/62284
- http://www.ubuntu.com/usn/USN-2403-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1161443
- http://secunia.com/advisories/62294
- http://lists.opensuse.org/opensuse-updates/2014-11/msg00084.html
- http://secunia.com/advisories/59991
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3611: Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM…
Published: 2014-11-10T11:55:00 Last Modified: 2020-08-12T17:50:00
Summary
Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-3611 vulnerability.
References
- https://github.com/torvalds/linux/commit/2febc839133280d5a5e8e1179c94ea674489dae2
- https://bugzilla.redhat.com/show_bug.cgi?id=1144878
- http://www.openwall.com/lists/oss-security/2014/10/24/9
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2febc839133280d5a5e8e1179c94ea674489dae2
- http://www.ubuntu.com/usn/USN-2394-1
- http://www.ubuntu.com/usn/USN-2418-1
- http://www.ubuntu.com/usn/USN-2417-1
- http://www.debian.org/security/2014/dsa-3060
- http://www.ubuntu.com/usn/USN-2491-1
- http://rhn.redhat.com/errata/RHSA-2015-0126.html
- http://rhn.redhat.com/errata/RHSA-2015-0284.html
- http://rhn.redhat.com/errata/RHSA-2015-0869.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3673: The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a…
Published: 2014-11-10T11:55:00 Last Modified: 2021-07-15T19:16:00
Summary
The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3673 vulnerability.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9de7922bc709eee2f609cd01d98aaedc4cf5ea74
- https://bugzilla.redhat.com/show_bug.cgi?id=1147850
- https://github.com/torvalds/linux/commit/9de7922bc709eee2f609cd01d98aaedc4cf5ea74
- http://www.ubuntu.com/usn/USN-2418-1
- http://www.ubuntu.com/usn/USN-2417-1
- http://www.debian.org/security/2014/dsa-3060
- http://linux.oracle.com/errata/ELSA-2014-3088.html
- http://linux.oracle.com/errata/ELSA-2014-3087.html
- http://www.securityfocus.com/bid/70883
- http://linux.oracle.com/errata/ELSA-2014-3089.html
- http://secunia.com/advisories/62428
- http://rhn.redhat.com/errata/RHSA-2015-0062.html
- http://rhn.redhat.com/errata/RHSA-2015-0115.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://marc.info/?l=bugtraq&m=142722450701342&w=2
- http://marc.info/?l=bugtraq&m=142722544401658&w=2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3690: arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors…
Published: 2014-11-10T11:55:00 Last Modified: 2020-08-13T20:34:00
Summary
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-3690 vulnerability.
References
- https://github.com/torvalds/linux/commit/d974baa398f34393db76be45f7d4d04fbdbb4a0a
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d974baa398f34393db76be45f7d4d04fbdbb4a0a
- http://www.openwall.com/lists/oss-security/2014/10/21/4
- https://bugzilla.redhat.com/show_bug.cgi?id=1153322
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.2
- http://www.openwall.com/lists/oss-security/2014/10/29/7
- http://www.ubuntu.com/usn/USN-2421-1
- http://www.ubuntu.com/usn/USN-2419-1
- http://www.ubuntu.com/usn/USN-2420-1
- http://www.ubuntu.com/usn/USN-2418-1
- http://www.ubuntu.com/usn/USN-2417-1
- http://www.debian.org/security/2014/dsa-3060
- http://www.securityfocus.com/bid/70691
- http://secunia.com/advisories/60174
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0290.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:058
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://rhn.redhat.com/errata/RHSA-2015-0782.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2015-0864.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3646: arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit…
Published: 2014-11-10T11:55:00 Last Modified: 2020-08-13T19:34:00
Summary
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-3646 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1144825
- http://www.openwall.com/lists/oss-security/2014/10/24/9
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a642fc305053cc1c6e47e4f4df327895747ab485
- https://github.com/torvalds/linux/commit/a642fc305053cc1c6e47e4f4df327895747ab485
- http://www.ubuntu.com/usn/USN-2394-1
- http://www.ubuntu.com/usn/USN-2418-1
- http://www.ubuntu.com/usn/USN-2417-1
- http://www.debian.org/security/2014/dsa-3060
- http://rhn.redhat.com/errata/RHSA-2015-0126.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-0284.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3647: arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly…
Published: 2014-11-10T11:55:00 Last Modified: 2020-08-13T18:09:00
Summary
arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-3647 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2014/10/24/9
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=234f3ce485d54017f15cf5e0699cff4100121601
- https://github.com/torvalds/linux/commit/d1442d85cc30ea75f7d399474ca738e0bc96f715
- https://bugzilla.redhat.com/show_bug.cgi?id=1144897
- https://github.com/torvalds/linux/commit/234f3ce485d54017f15cf5e0699cff4100121601
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d1442d85cc30ea75f7d399474ca738e0bc96f715
- http://www.ubuntu.com/usn/USN-2394-1
- http://www.ubuntu.com/usn/USN-2418-1
- http://www.ubuntu.com/usn/USN-2417-1
- http://www.debian.org/security/2014/dsa-3060
- http://www.securityfocus.com/bid/70748
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3640: The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of…
Published: 2014-11-07T19:55:00 Last Modified: 2017-11-04T01:29:00
Summary
The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-3640 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1144818
- http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg04707.html
- http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg03543.html
- http://lists.nongnu.org/archive/html/qemu-devel/2014-09/msg04598.html
- http://www.debian.org/security/2014/dsa-3045
- http://www.ubuntu.com/usn/USN-2409-1
- http://rhn.redhat.com/errata/RHSA-2015-0349.html
- http://rhn.redhat.com/errata/RHSA-2015-0624.html
- http://www.debian.org/security/2014/dsa-3044
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3693: Use-after-free vulnerability in the socket manager of Impress Remote in LibreOffice 4.x before…
Published: 2014-11-07T19:55:00 Last Modified: 2018-10-30T16:27:00
Summary
Use-after-free vulnerability in the socket manager of Impress Remote in LibreOffice 4.x before 4.2.7 and 4.3.x before 4.3.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to TCP port 1599.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3693 vulnerability.
References
- https://www.libreoffice.org/about-us/security/advisories/CVE-2014-3693/
- http://secunia.com/advisories/62132
- http://secunia.com/advisories/62111
- http://www.ubuntu.com/usn/USN-2398-1
- http://lists.opensuse.org/opensuse-updates/2014-11/msg00049.html
- http://secunia.com/advisories/62396
- http://rhn.redhat.com/errata/RHSA-2015-0377.html
- http://www.securityfocus.com/bid/71351
- https://security.gentoo.org/glsa/201603-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3660: parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity…
Published: 2014-11-04T16:55:00 Last Modified: 2016-12-08T03:05:00
Summary
parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the “billion laughs” attack.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3660 vulnerability.
References
- https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html
- http://www.securityfocus.com/bid/70644
- http://rhn.redhat.com/errata/RHSA-2014-1655.html
- http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html
- http://www.openwall.com/lists/oss-security/2014/10/17/7
- https://bugzilla.redhat.com/show_bug.cgi?id=1149084
- http://www.debian.org/security/2014/dsa-3057
- https://bugzilla.redhat.com/attachment.cgi?id=944444&action=diff
- http://www.ubuntu.com/usn/USN-2389-1
- http://secunia.com/advisories/61991
- http://secunia.com/advisories/61966
- http://secunia.com/advisories/61965
- http://rhn.redhat.com/errata/RHSA-2014-1885.html
- http://secunia.com/advisories/59903
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:244
- https://support.apple.com/kb/HT205030
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html
- https://support.apple.com/kb/HT205031
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-8080: The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4…
Published: 2014-11-03T16:55:00 Last Modified: 2018-10-30T16:27:00
Summary
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-8080 vulnerability.
References
- http://secunia.com/advisories/61607
- https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/
- http://www.ubuntu.com/usn/USN-2397-1
- http://rhn.redhat.com/errata/RHSA-2014-1911.html
- http://rhn.redhat.com/errata/RHSA-2014-1913.html
- http://rhn.redhat.com/errata/RHSA-2014-1912.html
- http://rhn.redhat.com/errata/RHSA-2014-1914.html
- http://lists.opensuse.org/opensuse-updates/2014-12/msg00035.html
- http://secunia.com/advisories/62748
- http://www.debian.org/security/2015/dsa-3159
- http://www.debian.org/security/2015/dsa-3157
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00000.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:129
- http://advisories.mageia.org/MGASA-2014-0443.html
- https://support.apple.com/HT205267
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/70935
- http://secunia.com/advisories/62050
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3615: The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a…
Published: 2014-11-01T23:55:00 Last Modified: 2020-08-11T15:49:00
Summary
The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-3615 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2014-1670.html
- http://git.qemu.org/?p=qemu.git;a=commit;h=ab9509cceabef28071e41bdfa073083859c949a7
- https://bugzilla.redhat.com/show_bug.cgi?id=1139115
- http://git.qemu.org/?p=qemu.git;a=commitdiff;h=c1b886c45dc70f247300f549dce9833f3fa2def5
- http://rhn.redhat.com/errata/RHSA-2014-1669.html
- http://secunia.com/advisories/61829
- http://www.ubuntu.com/usn/USN-2409-1
- http://rhn.redhat.com/errata/RHSA-2014-1941.html
- http://www.securityfocus.com/bid/69654
- http://support.citrix.com/article/CTX200892
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.html
- http://www.debian.org/security/2014/dsa-3044
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3566: The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic…
Published: 2014-10-15T00:55:00 Last Modified: 2021-11-17T22:15:00
Summary
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the “POODLE” issue.
Common Weakness Enumeration (CWE): CWE-310: Cryptographic Issues
CWE Description: Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3566 vulnerability.
References
- https://www.openssl.org/~bodo/ssl-poodle.pdf
- http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
- http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
- https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
- http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
- http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1152789
- https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
- https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
- https://access.redhat.com/articles/1232123
- https://www.imperialviolet.org/2014/10/14/poodle.html
- http://marc.info/?l=openssl-dev&m=141333049205629&w=2
- http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
- https://technet.microsoft.com/library/security/3009008.aspx
- https://www.suse.com/support/kb/doc.php?id=7015773
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- https://support.apple.com/kb/HT6536
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
- https://support.apple.com/kb/HT6542
- https://support.apple.com/kb/HT6541
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
- https://support.apple.com/kb/HT6535
- http://www.securityfocus.com/archive/1/533746
- http://www.securityfocus.com/archive/1/533747
- http://www.securitytracker.com/id/1031096
- http://www.securitytracker.com/id/1031085
- http://secunia.com/advisories/60056
- http://www.securitytracker.com/id/1031029
- http://www.securitytracker.com/id/1031092
- http://www.securityfocus.com/bid/70574
- http://www.securitytracker.com/id/1031088
- https://support.apple.com/kb/HT6527
- http://www.securitytracker.com/id/1031095
- http://secunia.com/advisories/61827
- http://secunia.com/advisories/61345
- http://www.securitytracker.com/id/1031091
- https://support.apple.com/kb/HT6531
- https://bto.bluecoat.com/security-advisory/sa83
- http://www.securitytracker.com/id/1031105
- http://secunia.com/advisories/60792
- http://secunia.com/advisories/61303
- http://www.securitytracker.com/id/1031123
- http://www.securitytracker.com/id/1031087
- http://www.securitytracker.com/id/1031107
- http://www.securitytracker.com/id/1031094
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
- http://www.securitytracker.com/id/1031090
- http://secunia.com/advisories/61810
- http://www-01.ibm.com/support/docview.wss?uid=swg21687172
- http://secunia.com/advisories/61019
- http://www.securitytracker.com/id/1031039
- http://www.securitytracker.com/id/1031093
- http://secunia.com/advisories/61825
- http://www.securitytracker.com/id/1031106
- http://www.securitytracker.com/id/1031086
- https://support.apple.com/kb/HT6529
- http://secunia.com/advisories/61782
- http://www.securitytracker.com/id/1031089
- http://secunia.com/advisories/61359
- http://rhn.redhat.com/errata/RHSA-2014-1652.html
- http://marc.info/?l=bugtraq&m=141477196830952&w=2
- http://www.kb.cert.org/vuls/id/577193
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
- http://marc.info/?l=bugtraq&m=141450452204552&w=2
- http://marc.info/?l=bugtraq&m=141450973807288&w=2
- http://www.debian.org/security/2014/dsa-3053
- https://www.openssl.org/news/secadv_20141015.txt
- http://www.us-cert.gov/ncas/alerts/TA14-290A
- http://rhn.redhat.com/errata/RHSA-2014-1692.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
- http://secunia.com/advisories/61926
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
- http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
- http://www-01.ibm.com/support/docview.wss?uid=swg21686997
- http://secunia.com/advisories/61819
- http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
- http://advisories.mageia.org/MGASA-2014-0416.html
- http://www.securitytracker.com/id/1031131
- http://secunia.com/advisories/61130
- https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
- http://secunia.com/advisories/60859
- http://www.securitytracker.com/id/1031130
- http://www.securitytracker.com/id/1031120
- http://secunia.com/advisories/61995
- http://support.citrix.com/article/CTX200238
- http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
- http://www.securitytracker.com/id/1031132
- http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
- http://secunia.com/advisories/60206
- http://secunia.com/advisories/59627
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
- http://secunia.com/advisories/61316
- http://rhn.redhat.com/errata/RHSA-2014-1653.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
- http://www.securitytracker.com/id/1031124
- http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21687611
- http://marc.info/?l=bugtraq&m=141703183219781&w=2
- http://marc.info/?l=bugtraq&m=141697676231104&w=2
- http://marc.info/?l=bugtraq&m=141715130023061&w=2
- http://marc.info/?l=bugtraq&m=141694355519663&w=2
- http://www-01.ibm.com/support/docview.wss?uid=swg21688283
- http://downloads.asterisk.org/pub/security/AST-2014-011.html
- http://marc.info/?l=bugtraq&m=141697638231025&w=2
- http://rhn.redhat.com/errata/RHSA-2014-1880.html
- http://rhn.redhat.com/errata/RHSA-2014-1876.html
- http://rhn.redhat.com/errata/RHSA-2014-1881.html
- http://rhn.redhat.com/errata/RHSA-2014-1882.html
- https://www-01.ibm.com/support/docview.wss?uid=swg21688165
- http://rhn.redhat.com/errata/RHSA-2014-1877.html
- http://rhn.redhat.com/errata/RHSA-2014-1920.html
- http://rhn.redhat.com/errata/RHSA-2014-1948.html
- http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
- http://marc.info/?l=bugtraq&m=141775427104070&w=2
- http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
- http://support.apple.com/HT204244
- http://marc.info/?l=bugtraq&m=142296755107581&w=2
- http://marc.info/?l=bugtraq&m=141813976718456&w=2
- http://marc.info/?l=bugtraq&m=142354438527235&w=2
- http://www.debian.org/security/2015/dsa-3144
- http://marc.info/?l=bugtraq&m=141814011518700&w=2
- http://marc.info/?l=bugtraq&m=142496355704097&w=2
- http://www.debian.org/security/2015/dsa-3147
- http://marc.info/?l=bugtraq&m=142546741516006&w=2
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
- http://marc.info/?l=bugtraq&m=142350196615714&w=2
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
- http://www.ubuntu.com/usn/USN-2486-1
- http://marc.info/?l=bugtraq&m=141879378918327&w=2
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
- http://marc.info/?l=bugtraq&m=142350298616097&w=2
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
- http://marc.info/?l=bugtraq&m=142103967620673&w=2
- http://marc.info/?l=bugtraq&m=142357976805598&w=2
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
- http://www.ubuntu.com/usn/USN-2487-1
- http://marc.info/?l=bugtraq&m=142495837901899&w=2
- http://marc.info/?l=bugtraq&m=142350743917559&w=2
- http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
- http://rhn.redhat.com/errata/RHSA-2015-0080.html
- http://marc.info/?l=bugtraq&m=142624619906067
- http://marc.info/?l=bugtraq&m=142607790919348&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0086.html
- http://marc.info/?l=bugtraq&m=142624619906067&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0264.html
- http://rhn.redhat.com/errata/RHSA-2015-0085.html
- http://marc.info/?l=bugtraq&m=142624679706236&w=2
- http://marc.info/?l=bugtraq&m=142624719706349&w=2
- http://marc.info/?l=bugtraq&m=142118135300698&w=2
- http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
- http://marc.info/?l=bugtraq&m=142624590206005&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0068.html
- http://rhn.redhat.com/errata/RHSA-2015-0079.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
- http://marc.info/?l=bugtraq&m=142660345230545&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0698.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://marc.info/?l=bugtraq&m=142721830231196&w=2
- http://marc.info/?l=bugtraq&m=142721887231400&w=2
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- http://marc.info/?l=bugtraq&m=142740155824959&w=2
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://marc.info/?l=bugtraq&m=142791032306609&w=2
- http://marc.info/?l=bugtraq&m=142805027510172&w=2
- http://marc.info/?l=bugtraq&m=142804214608580&w=2
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://marc.info/?l=bugtraq&m=143039249603103&w=2
- http://marc.info/?l=bugtraq&m=143101048219218&w=2
- http://www.debian.org/security/2015/dsa-3253
- https://www.elastic.co/blog/logstash-1-4-3-released
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://rhn.redhat.com/errata/RHSA-2015-1545.html
- http://rhn.redhat.com/errata/RHSA-2015-1546.html
- https://support.apple.com/HT205217
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
- http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
- http://www.vmware.com/security/advisories/VMSA-2015-0003.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- https://security.gentoo.org/glsa/201606-11
- http://marc.info/?l=bugtraq&m=145983526810210&w=2
- http://marc.info/?l=bugtraq&m=144101915224472&w=2
- http://marc.info/?l=bugtraq&m=143558192010071&w=2
- http://marc.info/?l=bugtraq&m=143290371927178&w=2
- http://marc.info/?l=bugtraq&m=144251162130364&w=2
- http://marc.info/?l=bugtraq&m=142962817202793&w=2
- http://marc.info/?l=bugtraq&m=143290437727362&w=2
- http://marc.info/?l=bugtraq&m=143628269912142&w=2
- http://marc.info/?l=bugtraq&m=141628688425177&w=2
- http://marc.info/?l=bugtraq&m=144294141001552&w=2
- http://marc.info/?l=bugtraq&m=141577350823734&w=2
- http://marc.info/?l=bugtraq&m=143290522027658&w=2
- http://marc.info/?l=bugtraq&m=141620103726640&w=2
- http://marc.info/?l=bugtraq&m=141576815022399&w=2
- http://marc.info/?l=bugtraq&m=143558137709884&w=2
- http://marc.info/?l=bugtraq&m=141577087123040&w=2
- http://marc.info/?l=bugtraq&m=143290583027876&w=2
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- https://support.lenovo.com/product_security/poodle
- http://www.debian.org/security/2016/dsa-3489
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
- https://support.lenovo.com/us/en/product_security/poodle
- https://security.gentoo.org/glsa/201507-14
- https://kc.mcafee.com/corporate/index?page=content&id=SB10104
- https://kc.mcafee.com/corporate/index?page=content&id=SB10091
- https://kc.mcafee.com/corporate/index?page=content&id=SB10090
- http://www-01.ibm.com/support/docview.wss?uid=swg21692299
- https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- https://security.netapp.com/advisory/ntap-20141015-0001/
- https://support.citrix.com/article/CTX216642
- https://puppet.com/security/cve/poodle-sslv3-vulnerability
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://github.com/mpgn/poodle-PoC
- https://groups.google.com/forum/#!topic/docker-user/oYm0i3xShJU
- http://www.securityfocus.com/archive/1/533724/100/0/threaded
- https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E
- https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E
- https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E
- https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E
- https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E
- https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E
- https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3191: Use-after-free vulnerability in Blink, as used in Google Chrome before 38.0.2125.101, allows…
Published: 2014-10-08T10:55:00 Last Modified: 2016-11-28T19:11:00
Summary
Use-after-free vulnerability in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers a widget-position update that improperly interacts with the render tree, related to the FrameView::updateLayoutAndStyleForPainting function in core/frame/FrameView.cpp and the RenderLayerScrollableArea::setScrollOffset function in core/rendering/RenderLayerScrollableArea.cpp.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3191 vulnerability.
References
- https://crbug.com/402407
- https://src.chromium.org/viewvc/blink?revision=180681&view=revision
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- http://rhn.redhat.com/errata/RHSA-2014-1626.html
- http://www.securityfocus.com/bid/70273
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3190: Use-after-free vulnerability in the Event::currentTarget function in core/events/Event.cpp in…
Published: 2014-10-08T10:55:00 Last Modified: 2016-11-28T19:11:00
Summary
Use-after-free vulnerability in the Event::currentTarget function in core/events/Event.cpp in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted JavaScript code that accesses the path property of an Event object.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3190 vulnerability.
References
- https://src.chromium.org/viewvc/blink?revision=181234&view=revision
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- https://crbug.com/400476
- http://rhn.redhat.com/errata/RHSA-2014-1626.html
- http://www.securityfocus.com/bid/70273
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3200: Multiple unspecified vulnerabilities in Google Chrome before 38.0.2125.101 allow attackers to…
Published: 2014-10-08T10:55:00 Last Modified: 2016-11-28T19:11:00
Summary
Multiple unspecified vulnerabilities in Google Chrome before 38.0.2125.101 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3200 vulnerability.
References
- https://code.google.com/p/chromium/issues/detail?id=365141
- https://code.google.com/p/chromium/issues/detail?id=411154
- https://code.google.com/p/chromium/issues/detail?id=387817
- https://code.google.com/p/chromium/issues/detail?id=387818
- https://code.google.com/p/chromium/issues/detail?id=387848
- https://code.google.com/p/chromium/issues/detail?id=387779
- https://code.google.com/p/chromium/issues/detail?id=390973
- https://code.google.com/p/chromium/issues/detail?id=387797
- https://code.google.com/p/chromium/issues/detail?id=387786
- https://code.google.com/p/chromium/issues/detail?id=400025
- https://code.google.com/p/chromium/issues/detail?id=405335
- https://code.google.com/p/chromium/issues/detail?id=387857
- https://code.google.com/p/chromium/issues/detail?id=387793
- https://code.google.com/p/chromium/issues/detail?id=387853
- https://code.google.com/p/chromium/issues/detail?id=381696
- https://code.google.com/p/chromium/issues/detail?id=407477
- https://code.google.com/p/chromium/issues/detail?id=390069
- https://code.google.com/p/chromium/issues/detail?id=384365
- https://code.google.com/p/chromium/issues/detail?id=387816
- https://code.google.com/p/chromium/issues/detail?id=399783
- https://code.google.com/p/chromium/issues/detail?id=392718
- https://code.google.com/p/chromium/issues/detail?id=387812
- https://code.google.com/p/chromium/issues/detail?id=395351
- https://code.google.com/p/chromium/issues/detail?id=401363
- https://code.google.com/p/chromium/issues/detail?id=409023
- https://code.google.com/p/chromium/issues/detail?id=387809
- https://code.google.com/p/chromium/issues/detail?id=420899
- https://code.google.com/p/chromium/issues/detail?id=387827
- https://code.google.com/p/chromium/issues/detail?id=387808
- https://code.google.com/p/chromium/issues/detail?id=391004
- https://code.google.com/p/chromium/issues/detail?id=387839
- https://code.google.com/p/chromium/issues/detail?id=387780
- https://code.google.com/p/chromium/issues/detail?id=387835
- https://code.google.com/p/chromium/issues/detail?id=387845
- https://code.google.com/p/chromium/issues/detail?id=391905
- https://code.google.com/p/chromium/issues/detail?id=404513
- https://code.google.com/p/chromium/issues/detail?id=384891
- https://code.google.com/p/chromium/issues/detail?id=388134
- https://code.google.com/p/chromium/issues/detail?id=390944
- https://code.google.com/p/chromium/issues/detail?id=389573
- https://code.google.com/p/chromium/issues/detail?id=391470
- https://code.google.com/p/chromium/issues/detail?id=387782
- https://code.google.com/p/chromium/issues/detail?id=406548
- https://code.google.com/p/chromium/issues/detail?id=360433
- https://code.google.com/p/chromium/issues/detail?id=387855
- https://code.google.com/p/chromium/issues/detail?id=387846
- https://code.google.com/p/chromium/issues/detail?id=393452
- https://code.google.com/p/chromium/issues/detail?id=387838
- https://code.google.com/p/chromium/issues/detail?id=387776
- https://code.google.com/p/chromium/issues/detail?id=386730
- https://code.google.com/p/chromium/issues/detail?id=387834
- https://code.google.com/p/chromium/issues/detail?id=387814
- https://code.google.com/p/chromium/issues/detail?id=387832
- https://code.google.com/p/chromium/issues/detail?id=387506
- https://code.google.com/p/chromium/issues/detail?id=387010
- https://code.google.com/p/chromium/issues/detail?id=387811
- https://code.google.com/p/chromium/issues/detail?id=387783
- https://code.google.com/p/chromium/issues/detail?id=411177
- https://code.google.com/p/chromium/issues/detail?id=387781
- https://code.google.com/p/chromium/issues/detail?id=387844
- https://code.google.com/p/chromium/issues/detail?id=387861
- https://code.google.com/p/chromium/issues/detail?id=392721
- https://code.google.com/p/chromium/issues/detail?id=377416
- https://code.google.com/p/chromium/issues/detail?id=409506
- https://code.google.com/p/chromium/issues/detail?id=387819
- https://code.google.com/p/chromium/issues/detail?id=387821
- https://code.google.com/p/chromium/issues/detail?id=387800
- https://code.google.com/p/chromium/issues/detail?id=408551
- https://code.google.com/p/chromium/issues/detail?id=387792
- https://code.google.com/p/chromium/issues/detail?id=393833
- https://code.google.com/p/chromium/issues/detail?id=387852
- https://code.google.com/p/chromium/issues/detail?id=387806
- https://code.google.com/p/chromium/issues/detail?id=387790
- https://code.google.com/p/chromium/issues/detail?id=379458
- https://code.google.com/p/chromium/issues/detail?id=411318
- https://code.google.com/p/chromium/issues/detail?id=411163
- https://code.google.com/p/chromium/issues/detail?id=387837
- https://code.google.com/p/chromium/issues/detail?id=355438
- https://code.google.com/p/chromium/issues/detail?id=387826
- https://code.google.com/p/chromium/issues/detail?id=387820
- https://code.google.com/p/chromium/issues/detail?id=387831
- https://code.google.com/p/chromium/issues/detail?id=391910
- https://code.google.com/p/chromium/issues/detail?id=387813
- https://code.google.com/p/chromium/issues/detail?id=417731
- https://code.google.com/p/chromium/issues/detail?id=387802
- https://code.google.com/p/chromium/issues/detail?id=387815
- https://code.google.com/p/chromium/issues/detail?id=348333
- https://code.google.com/p/chromium/issues/detail?id=387777
- https://code.google.com/p/chromium/issues/detail?id=387784
- https://code.google.com/p/chromium/issues/detail?id=397835
- https://code.google.com/p/chromium/issues/detail?id=386729
- https://code.google.com/p/chromium/issues/detail?id=390999
- https://code.google.com/p/chromium/issues/detail?id=387850
- https://code.google.com/p/chromium/issues/detail?id=393831
- https://code.google.com/p/chromium/issues/detail?id=387778
- https://code.google.com/p/chromium/issues/detail?id=390308
- https://code.google.com/p/chromium/issues/detail?id=397834
- https://code.google.com/p/chromium/issues/detail?id=416526
- https://code.google.com/p/chromium/issues/detail?id=387840
- https://code.google.com/p/chromium/issues/detail?id=387860
- https://code.google.com/p/chromium/issues/detail?id=391000
- https://code.google.com/p/chromium/issues/detail?id=387824
- https://code.google.com/p/chromium/issues/detail?id=388135
- https://code.google.com/p/chromium/issues/detail?id=390601
- https://code.google.com/p/chromium/issues/detail?id=387785
- https://code.google.com/p/chromium/issues/detail?id=393603
- https://code.google.com/p/chromium/issues/detail?id=391472
- https://code.google.com/p/chromium/issues/detail?id=387791
- https://code.google.com/p/chromium/issues/detail?id=390567
- https://code.google.com/p/chromium/issues/detail?id=374052
- https://code.google.com/p/chromium/issues/detail?id=387854
- https://code.google.com/p/chromium/issues/detail?id=395650
- https://code.google.com/p/chromium/issues/detail?id=388133
- https://code.google.com/p/chromium/issues/detail?id=387843
- https://code.google.com/p/chromium/issues/detail?id=387836
- https://code.google.com/p/chromium/issues/detail?id=392723
- https://code.google.com/p/chromium/issues/detail?id=387856
- https://code.google.com/p/chromium/issues/detail?id=390941
- https://code.google.com/p/chromium/issues/detail?id=387796
- https://code.google.com/p/chromium/issues/detail?id=390945
- https://code.google.com/p/chromium/issues/detail?id=386728
- https://code.google.com/p/chromium/issues/detail?id=411210
- https://code.google.com/p/chromium/issues/detail?id=391301
- https://code.google.com/p/chromium/issues/detail?id=405416
- https://code.google.com/p/chromium/issues/detail?id=387842
- https://code.google.com/p/chromium/issues/detail?id=387775
- https://code.google.com/p/chromium/issues/detail?id=387803
- https://code.google.com/p/chromium/issues/detail?id=406879
- https://code.google.com/p/chromium/issues/detail?id=395461
- https://code.google.com/p/chromium/issues/detail?id=387788
- https://code.google.com/p/chromium/issues/detail?id=387789
- https://code.google.com/p/chromium/issues/detail?id=387807
- https://code.google.com/p/chromium/issues/detail?id=387798
- https://code.google.com/p/chromium/issues/detail?id=387847
- https://code.google.com/p/chromium/issues/detail?id=387011
- https://code.google.com/p/chromium/issues/detail?id=387013
- https://code.google.com/p/chromium/issues/detail?id=387014
- https://code.google.com/p/chromium/issues/detail?id=407235
- https://code.google.com/p/chromium/issues/detail?id=387805
- https://code.google.com/p/chromium/issues/detail?id=387313
- https://code.google.com/p/chromium/issues/detail?id=416528
- https://code.google.com/p/chromium/issues/detail?id=387822
- https://code.google.com/p/chromium/issues/detail?id=387801
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- https://code.google.com/p/chromium/issues/detail?id=387825
- https://code.google.com/p/chromium/issues/detail?id=387841
- https://code.google.com/p/chromium/issues/detail?id=387833
- https://code.google.com/p/chromium/issues/detail?id=387774
- http://rhn.redhat.com/errata/RHSA-2014-1626.html
- http://www.securityfocus.com/bid/70273
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3194: Use-after-free vulnerability in the Web Workers implementation in Google Chrome before…
Published: 2014-10-08T10:55:00 Last Modified: 2016-11-28T19:11:00
Summary
Use-after-free vulnerability in the Web Workers implementation in Google Chrome before 38.0.2125.101 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3194 vulnerability.
References
- https://crbug.com/401115
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- http://rhn.redhat.com/errata/RHSA-2014-1626.html
- http://www.securityfocus.com/bid/70273
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3193: The SessionService::GetLastSession function in browser/sessions/session_service.cc in Google…
Published: 2014-10-08T10:55:00 Last Modified: 2016-11-28T19:11:00
Summary
The SessionService::GetLastSession function in browser/sessions/session_service.cc in Google Chrome before 38.0.2125.101 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors that leverage “type confusion” for callback processing.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3193 vulnerability.
References
- https://codereview.chromium.org/500143002/
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- https://crbug.com/399655
- http://rhn.redhat.com/errata/RHSA-2014-1626.html
- http://www.securityfocus.com/bid/70273
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3195: Google V8, as used in Google Chrome before 38.0.2125.101, does not properly track JavaScript…
Published: 2014-10-08T10:55:00 Last Modified: 2016-11-28T19:11:00
Summary
Google V8, as used in Google Chrome before 38.0.2125.101, does not properly track JavaScript heap-memory allocations as allocations of uninitialized memory and does not properly concatenate arrays of double-precision floating-point numbers, which allows remote attackers to obtain sensitive information via crafted JavaScript code, related to the PagedSpace::AllocateRaw and NewSpace::AllocateRaw functions in heap/spaces-inl.h, the LargeObjectSpace::AllocateRaw function in heap/spaces.cc, and the Runtime_ArrayConcat function in runtime.cc.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3195 vulnerability.
References
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- https://crbug.com/403409
- https://code.google.com/p/v8/source/detail?r=23144
- https://code.google.com/p/v8/source/detail?r=23268
- http://rhn.redhat.com/errata/RHSA-2014-1626.html
- http://www.securityfocus.com/bid/70273
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3199: The wrap function in bindings/core/v8/custom/V8EventCustom.cpp in the V8 bindings in Blink, as…
Published: 2014-10-08T10:55:00 Last Modified: 2016-11-28T19:11:00
Summary
The wrap function in bindings/core/v8/custom/V8EventCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 38.0.2125.101, has an erroneous fallback outcome for wrapper-selection failures, which allows remote attackers to cause a denial of service via vectors that trigger stopping a worker process that had been handling an Event object.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3199 vulnerability.
References
- https://src.chromium.org/viewvc/blink?revision=179340&view=revision
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- https://crbug.com/395411
- http://rhn.redhat.com/errata/RHSA-2014-1626.html
- http://www.securityfocus.com/bid/70273
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3188: Google Chrome before 38.0.2125.101 and Chrome OS before 38.0.2125.101 do not properly handle the…
Published: 2014-10-08T10:55:00 Last Modified: 2016-09-07T15:32:00
Summary
Google Chrome before 38.0.2125.101 and Chrome OS before 38.0.2125.101 do not properly handle the interaction of IPC and Google V8, which allows remote attackers to execute arbitrary code via vectors involving JSON data, related to improper parsing of an escaped index by ParseJsonObject in json-parser.h.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3188 vulnerability.
References
- https://code.google.com/p/v8/source/detail?r=24125
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update-for-chrome-os.html
- https://crbug.com/416449
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- http://rhn.redhat.com/errata/RHSA-2014-1626.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3197: The NavigationScheduler::schedulePageBlock function in core/loader/NavigationScheduler.cpp in…
Published: 2014-10-08T10:55:00 Last Modified: 2016-11-28T19:11:00
Summary
The NavigationScheduler::schedulePageBlock function in core/loader/NavigationScheduler.cpp in Blink, as used in Google Chrome before 38.0.2125.101, does not properly provide substitute data for pages blocked by the XSS auditor, which allows remote attackers to obtain sensitive information via a crafted web site.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3197 vulnerability.
References
- https://crbug.com/396544
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- https://src.chromium.org/viewvc/blink?revision=179240&view=revision
- http://rhn.redhat.com/errata/RHSA-2014-1626.html
- http://www.securityfocus.com/bid/70273
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3189: The chrome_pdf::CopyImage function in pdf/draw_utils.cc in the PDFium component in Google Chrome…
Published: 2014-10-08T10:55:00 Last Modified: 2016-11-28T19:11:00
Summary
The chrome_pdf::CopyImage function in pdf/draw_utils.cc in the PDFium component in Google Chrome before 38.0.2125.101 does not properly validate image-data dimensions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via unknown vectors.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3189 vulnerability.
References
- https://codereview.chromium.org/519873002/
- https://crbug.com/398384
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- http://rhn.redhat.com/errata/RHSA-2014-1626.html
- http://www.securityfocus.com/bid/70273
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3192: Use-after-free vulnerability in the ProcessingInstruction::setXSLStyleSheet function in…
Published: 2014-10-08T10:55:00 Last Modified: 2019-03-08T16:06:00
Summary
Use-after-free vulnerability in the ProcessingInstruction::setXSLStyleSheet function in core/dom/ProcessingInstruction.cpp in the DOM implementation in Blink, as used in Google Chrome before 38.0.2125.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3192 vulnerability.
References
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- https://src.chromium.org/viewvc/blink?revision=182309&view=revision
- https://crbug.com/403276
- http://rhn.redhat.com/errata/RHSA-2014-1626.html
- http://lists.apple.com/archives/security-announce/2015/Jan/msg00002.html
- http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html
- http://support.apple.com/HT204246
- http://support.apple.com/HT204243
- http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html
- http://support.apple.com/HT204245
- http://www.securitytracker.com/id/1031647
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html
- https://support.apple.com/kb/HT204949
- http://www.securityfocus.com/bid/70273
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3198: The Instance::HandleInputEvent function in pdf/instance.cc in the PDFium component in Google…
Published: 2014-10-08T10:55:00 Last Modified: 2016-11-28T19:11:00
Summary
The Instance::HandleInputEvent function in pdf/instance.cc in the PDFium component in Google Chrome before 38.0.2125.101 interprets a certain -1 value as an index instead of a no-visible-page error code, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3198 vulnerability.
References
- http://googlechromereleases.blogspot.com/2014/10/stable-channel-update.html
- https://crbug.com/415307
- https://codereview.chromium.org/560133004
- http://rhn.redhat.com/errata/RHSA-2014-1626.html
- http://www.securityfocus.com/bid/70273
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-6055: Multiple stack-based buffer overflows in the File Transfer feature in rfbserver.c in LibVNCServer…
Published: 2014-09-30T16:55:00 Last Modified: 2020-10-23T13:15:00
Summary
Multiple stack-based buffer overflows in the File Transfer feature in rfbserver.c in LibVNCServer 0.9.9 and earlier allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a (1) long file or (2) directory name or the (3) FileTime attribute in a rfbFileTransferOffer message.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-6055 vulnerability.
References
- http://www.ocert.org/advisories/ocert-2014-007.html
- http://www.securityfocus.com/bid/70096
- http://seclists.org/oss-sec/2014/q3/639
- https://github.com/newsoft/libvncserver/commit/06ccdf016154fde8eccb5355613ba04c59127b2e
- http://www.openwall.com/lists/oss-security/2014/09/25/11
- http://secunia.com/advisories/61506
- http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html
- https://github.com/newsoft/libvncserver/commit/f528072216dec01cee7ca35d94e171a3b909e677
- https://www.kde.org/info/security/advisory-20140923-1.txt
- http://www.debian.org/security/2014/dsa-3081
- http://rhn.redhat.com/errata/RHSA-2015-0113.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
- https://security.gentoo.org/glsa/201507-07
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96187
- https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
- https://usn.ubuntu.com/4587-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-6051: Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and…
Published: 2014-09-30T16:55:00 Last Modified: 2020-10-23T13:15:00
Summary
Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-6051 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2014/09/25/11
- http://seclists.org/oss-sec/2014/q3/639
- https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273
- http://www.ocert.org/advisories/ocert-2014-007.html
- http://secunia.com/advisories/61506
- http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139445.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html
- https://www.kde.org/info/security/advisory-20140923-1.txt
- http://www.debian.org/security/2014/dsa-3081
- http://rhn.redhat.com/errata/RHSA-2015-0113.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/70093
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00022.html
- https://security.gentoo.org/glsa/201507-07
- https://security.gentoo.org/glsa/201612-36
- https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
- https://usn.ubuntu.com/4587-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-7145: The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS…
Published: 2014-09-28T10:55:00 Last Modified: 2016-08-24T17:54:00
Summary
The SMB2_tcon function in fs/cifs/smb2pdu.c in the Linux kernel before 3.16.3 allows remote CIFS servers to cause a denial of service (NULL pointer dereference and client system crash) or possibly have unspecified other impact by deleting the IPC$ share during resolution of DFS referrals.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-7145 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3
- http://www.openwall.com/lists/oss-security/2014/09/22/4
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- https://github.com/torvalds/linux/commit/18f39e7be0121317550d03e267e3ebd4dbfbb3ce
- http://www.securityfocus.com/bid/69867
- http://www.ubuntu.com/usn/USN-2394-1
- http://rhn.redhat.com/errata/RHSA-2015-0102.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3575: The OLE preview generation in Apache OpenOffice before 4.1.1 and OpenOffice.org (OOo) might allow…
Published: 2014-08-27T00:55:00 Last Modified: 2022-02-07T16:32:00
Summary
The OLE preview generation in Apache OpenOffice before 4.1.1 and OpenOffice.org (OOo) might allow remote attackers to embed arbitrary data into documents via crafted OLE objects.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3575 vulnerability.
References
- http://archives.neohapsis.com/archives/bugtraq/2014-08/0115.html
- http://www.securitytracker.com/id/1030754
- http://rhn.redhat.com/errata/RHSA-2015-0377.html
- http://www.securityfocus.com/bid/69354
- https://security.gentoo.org/glsa/201603-05
- http://www.openoffice.org/security/cves/CVE-2014-3575.html
- http://secunia.com/advisories/59877
- http://secunia.com/advisories/59600
- http://lists.fedoraproject.org/pipermail/package-announce/2014-September/137657.html
- http://blog.documentfoundation.org/2014/08/28/libreoffice-4-3-1-fresh-announced/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95420
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3562: Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote…
Published: 2014-08-21T14:55:00 Last Modified: 2019-04-22T17:48:00
Summary
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3562 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1123477
- http://rhn.redhat.com/errata/RHSA-2014-1032.html
- http://rhn.redhat.com/errata/RHSA-2014-1031.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3528: Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of…
Published: 2014-08-19T18:55:00 Last Modified: 2018-10-30T16:27:00
Summary
Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm.
Common Weakness Enumeration (CWE): CWE-255: Credentials Management Errors
CWE Description: Weaknesses in this category are related to the management of credentials.
Scores
- Impact Score: 4.9
- Exploitability Score: 4.9
- CVSS: 4.0
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3528 vulnerability.
References
- http://subversion.apache.org/security/CVE-2014-3528-advisory.txt
- http://www.ubuntu.com/usn/USN-2316-1
- http://secunia.com/advisories/60722
- http://lists.opensuse.org/opensuse-updates/2014-08/msg00038.html
- http://lists.apple.com/archives/security-announce/2015/Mar/msg00003.html
- https://support.apple.com/HT204427
- http://rhn.redhat.com/errata/RHSA-2015-0166.html
- http://rhn.redhat.com/errata/RHSA-2015-0165.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/68995
- http://secunia.com/advisories/59584
- http://secunia.com/advisories/59432
- https://security.gentoo.org/glsa/201610-05
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-4344: The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT…
Published: 2014-08-14T05:01:00 Last Modified: 2020-01-21T15:46:00
Summary
The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain point during a SPNEGO negotiation.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-4344 vulnerability.
References
- https://github.com/krb5/krb5/commit/a7886f0ed1277c69142b14a2c6629175a6331edc
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7970
- http://www.debian.org/security/2014/dsa-3000
- http://rhn.redhat.com/errata/RHSA-2015-0439.html
- https://github.com/krb5/krb5/commit/524688ce87a15fc75f87efc8c039ba4c7d5c197b
- https://bugzilla.redhat.com/show_bug.cgi?id=1121877
- http://www.securitytracker.com/id/1030706
- http://www.securityfocus.com/bid/69160
- http://www.osvdb.org/109389
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
- http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15561.html
- http://secunia.com/advisories/61051
- http://secunia.com/advisories/60448
- http://secunia.com/advisories/60082
- http://secunia.com/advisories/59102
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
- http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
- http://advisories.mageia.org/MGASA-2014-0345.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95210
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-4343: Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in…
Published: 2014-08-14T05:01:00 Last Modified: 2020-01-21T15:46:00
Summary
Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 10.0
- Exploitability Score: 4.9
- CVSS: 7.6
- CVSS Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-4343 vulnerability.
References
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7969
- https://github.com/krb5/krb5/commit/f18ddf5d82de0ab7591a36e465bc24225776940f
- http://www.debian.org/security/2014/dsa-3000
- http://security.gentoo.org/glsa/glsa-201412-53.xml
- http://rhn.redhat.com/errata/RHSA-2015-0439.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1121876
- http://www.securitytracker.com/id/1030706
- http://www.securityfocus.com/bid/69159
- http://www.osvdb.org/109390
- http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15553.html
- http://secunia.com/advisories/61052
- http://secunia.com/advisories/60448
- http://secunia.com/advisories/60082
- http://secunia.com/advisories/59102
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
- http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
- http://advisories.mageia.org/MGASA-2014-0345.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95211
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3560: NetBIOS name services daemon (nmbd) in Samba 4.0.x before 4.0.21 and 4.1.x before 4.1.11 allows…
Published: 2014-08-06T18:55:00 Last Modified: 2019-04-22T17:48:00
Summary
NetBIOS name services daemon (nmbd) in Samba 4.0.x before 4.0.21 and 4.1.x before 4.1.11 allows remote attackers to execute arbitrary code via unspecified vectors that modify heap memory, involving a sizeof operation on an incorrect variable in the unstrcpy macro in string_wrappers.h.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 10.0
- Exploitability Score: 5.5
- CVSS: 7.9
- CVSS Vector: AV:A/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2014-3560 vulnerability.
References
- http://www.securitytracker.com/id/1030663
- http://www.ubuntu.com/usn/USN-2305-1
- https://git.samba.org/?p=samba.git;a=commitdiff;h=fb1d325d96dfe9bc2e9c4ec46ad4c55e8f18f4a2
- https://git.samba.org/?p=samba.git;a=commitdiff;h=e6a848630da3ba958c442438ea131c99fa088605
- https://bugzilla.redhat.com/show_bug.cgi?id=1126010
- http://www.samba.org/samba/security/CVE-2014-3560
- http://lists.opensuse.org/opensuse-updates/2014-08/msg00027.html
- http://www.securityfocus.com/bid/69021
- http://secunia.com/advisories/59976
- http://secunia.com/advisories/59610
- http://secunia.com/advisories/59583
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136280.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95081
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0179: libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read…
Published: 2014-08-03T18:55:00 Last Modified: 2019-04-22T17:48:00
Summary
libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-0179 vulnerability.
References
- http://libvirt.org/news.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
- http://security.libvirt.org/2014/0003.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
- http://rhn.redhat.com/errata/RHSA-2014-0560.html
- http://www.ubuntu.com/usn/USN-2366-1
- http://www.debian.org/security/2014/dsa-3038
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-5177: libvirt 1.0.0 through 1.2.x before 1.2.5, when fine grained access control is enabled, allows…
Published: 2014-08-03T18:55:00 Last Modified: 2019-04-22T17:48:00
Summary
libvirt 1.0.0 through 1.2.x before 1.2.5, when fine grained access control is enabled, allows local users to read arbitrary files via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virDomainDefineXML, (2) virNetworkCreateXML, (3) virNetworkDefineXML, (4) virStoragePoolCreateXML, (5) virStoragePoolDefineXML, (6) virStorageVolCreateXML, (7) virDomainCreateXML, (8) virNodeDeviceCreateXML, (9) virInterfaceDefineXML, (10) virStorageVolCreateXMLFrom, (11) virConnectDomainXMLFromNative, (12) virConnectDomainXMLToNative, (13) virSecretDefineXML, (14) virNWFilterDefineXML, (15) virDomainSnapshotCreateXML, (16) virDomainSaveImageDefineXML, (17) virDomainCreateXMLWithFiles, (18) virConnectCompareCPU, or (19) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT from CVE-2014-0179 per ADT3 due to different affected versions of some vectors.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 1.9
- CVSS: 1.2
- CVSS Vector: AV:L/AC:H/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-5177 vulnerability.
References
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
- http://security.libvirt.org/2014/0003.html
- http://libvirt.org/news.html
- http://rhn.redhat.com/errata/RHSA-2014-0560.html
- http://www.ubuntu.com/usn/USN-2366-1
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-5045: The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly…
Published: 2014-08-01T11:13:00 Last Modified: 2020-08-14T18:11:00
Summary
The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly maintain a certain reference count during attempts to use the umount system call in conjunction with a symlink, which allows local users to cause a denial of service (memory consumption or use-after-free) or possibly have unspecified other impact via the umount program.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 10.0
- Exploitability Score: 1.9
- CVSS: 6.2
- CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-5045 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2014/07/24/2
- https://github.com/torvalds/linux/commit/295dc39d941dc2ae53d5c170365af4c9d5c16212
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=295dc39d941dc2ae53d5c170365af4c9d5c16212
- https://bugzilla.redhat.com/show_bug.cgi?id=1122472
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8
- http://rhn.redhat.com/errata/RHSA-2015-0062.html
- http://www.securityfocus.com/bid/68862
- http://secunia.com/advisories/60353
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when…
Published: 2014-08-01T11:13:00 Last Modified: 2020-08-13T16:27:00
Summary
The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-5077 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2014/07/26/1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1be9a950c646c9092fb3618197f7b6bfb50e82aa
- https://bugzilla.redhat.com/show_bug.cgi?id=1122982
- https://github.com/torvalds/linux/commit/1be9a950c646c9092fb3618197f7b6bfb50e82aa
- http://secunia.com/advisories/59777
- http://secunia.com/advisories/60564
- http://rhn.redhat.com/errata/RHSA-2014-1083.html
- http://www.ubuntu.com/usn/USN-2358-1
- http://www.ubuntu.com/usn/USN-2334-1
- http://www.ubuntu.com/usn/USN-2335-1
- http://www.ubuntu.com/usn/USN-2359-1
- http://secunia.com/advisories/60744
- http://rhn.redhat.com/errata/RHSA-2014-1668.html
- http://rhn.redhat.com/errata/RHSA-2014-1763.html
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
- http://secunia.com/advisories/62563
- http://www.securitytracker.com/id/1030681
- http://www.securityfocus.com/bid/68881
- http://secunia.com/advisories/60545
- http://secunia.com/advisories/60430
- https://exchange.xforce.ibmcloud.com/vulnerabilities/95134
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-4341: MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service…
Published: 2014-07-20T11:12:00 Last Modified: 2021-02-02T19:00:00
Summary
MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-4341 vulnerability.
References
- https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
- http://www.debian.org/security/2014/dsa-3000
- http://security.gentoo.org/glsa/glsa-201412-53.xml
- http://rhn.redhat.com/errata/RHSA-2015-0439.html
- http://www.securitytracker.com/id/1030706
- http://www.securityfocus.com/bid/68909
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
- http://secunia.com/advisories/60448
- http://secunia.com/advisories/60082
- http://secunia.com/advisories/59102
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136360.html
- http://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc
- http://advisories.mageia.org/MGASA-2014-0345.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94904
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-4342: MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a…
Published: 2014-07-20T11:12:00 Last Modified: 2020-01-21T15:46:00
Summary
MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-4342 vulnerability.
References
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7949
- https://github.com/krb5/krb5/commit/e6ae703ae597d798e310368d52b8f38ee11c6a73
- http://www.debian.org/security/2014/dsa-3000
- http://rhn.redhat.com/errata/RHSA-2015-0439.html
- http://www.securitytracker.com/id/1030706
- http://www.securityfocus.com/bid/68908
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:165
- http://secunia.com/advisories/60082
- http://secunia.com/advisories/59102
- http://advisories.mageia.org/MGASA-2014-0345.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94903
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users…
Published: 2014-07-19T19:55:00 Last Modified: 2020-08-14T18:09:00
Summary
The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2014-4943 vulnerability.
- Linux Kernel 3.15.6 - PPP-over-L2TP Socket Level Handling Crash (PoC) by Emeric Nasi at 2015-03-04
- Linux/x86 - execve(/bin/sh) + Socket Re-Use Shellcode (50 bytes) by ZadYree at 2014-07-14
References
- http://openwall.com/lists/oss-security/2014/07/17/1
- https://github.com/torvalds/linux/commit/3cf521f7dc87c031617fd47e4b7aa2593c2f3daf
- https://bugzilla.redhat.com/show_bug.cgi?id=1119458
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf
- http://secunia.com/advisories/60393
- http://secunia.com/advisories/60011
- http://linux.oracle.com/errata/ELSA-2014-0924.html
- http://linux.oracle.com/errata/ELSA-2014-3047.html
- http://secunia.com/advisories/60071
- http://linux.oracle.com/errata/ELSA-2014-3048.html
- http://secunia.com/advisories/60220
- http://secunia.com/advisories/60380
- http://www.securitytracker.com/id/1030610
- http://www.debian.org/security/2014/dsa-2992
- http://rhn.redhat.com/errata/RHSA-2014-1025.html
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
- http://www.exploit-db.com/exploits/36267
- http://osvdb.org/show/osvdb/109277
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://secunia.com/advisories/59790
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94665
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-2483: Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u60 and OpenJDK 7…
Published: 2014-07-17T05:10:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u60 and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-4223. NOTE: the previous information is from the July 2014 CPU. Oracle has not commented on another vendor’s claim that the issue is related to improper restriction of the “use of privileged annotations.”
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-2483 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://hg.openjdk.java.net/jdk7u/jdk7u/hotspot/rev/848481af9003
- https://bugzilla.redhat.com/show_bug.cgi?id=1119626
- http://www.debian.org/security/2014/dsa-2987
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://security.gentoo.org/glsa/glsa-201502-12.xml
- http://marc.info/?l=bugtraq&m=140852886808946&w=2
- http://www.securitytracker.com/id/1030577
- http://www.securityfocus.com/bid/68608
- http://secunia.com/advisories/60812
- http://secunia.com/advisories/60485
- https://access.redhat.com/errata/RHSA-2014:0902
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0247: LibreOffice 4.2.4 executes unspecified VBA macros automatically, which has unspecified impact and…
Published: 2014-07-03T17:55:00 Last Modified: 2018-10-30T16:27:00
Summary
LibreOffice 4.2.4 executes unspecified VBA macros automatically, which has unspecified impact and attack vectors, possibly related to doc/docmacromode.cxx.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-0247 vulnerability.
References
- http://www.securityfocus.com/bid/68151
- http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0247.html
- https://bugs.mageia.org/show_bug.cgi?id=13580
- http://www.ubuntu.com/usn/USN-2253-1
- https://gerrit.libreoffice.org/gitweb?p=core.git;a=blobdiff;f=sfx2/source/doc/docmacromode.cxx;h=4d4ae52b4339582a039744d03671c1db0633d6c3;hp=2108d1920f8148ff60fd4a57684f295d6d733e7b;hb=1b0402f87c9b17fef2141130bfaa1798ece6ba0d;hpb=4d2113250fa7ed62fe2c53ed0f76e3de5875cb81
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00006.html
- http://secunia.com/advisories/59330
- http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135020.html
- https://www.libreoffice.org/about-us/security/advisories/cve-2014-0247/
- http://secunia.com/advisories/57383
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://secunia.com/advisories/60799
- http://rhn.redhat.com/errata/RHSA-2015-0377.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-4656: Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the…
Published: 2014-07-03T04:22:00 Last Modified: 2020-08-14T18:02:00
Summary
Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-4656 vulnerability.
References
- https://github.com/torvalds/linux/commit/883a1d49f0d77d30012f114b2e19fc141beb3e8e
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ac902c112d90a89e59916f751c2745f4dbdbb4bd
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
- https://github.com/torvalds/linux/commit/ac902c112d90a89e59916f751c2745f4dbdbb4bd
- http://www.openwall.com/lists/oss-security/2014/06/26/6
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=883a1d49f0d77d30012f114b2e19fc141beb3e8e
- https://bugzilla.redhat.com/show_bug.cgi?id=1113470
- http://secunia.com/advisories/59434
- http://secunia.com/advisories/59777
- http://secunia.com/advisories/60564
- http://rhn.redhat.com/errata/RHSA-2014-1083.html
- http://www.ubuntu.com/usn/USN-2334-1
- http://www.ubuntu.com/usn/USN-2335-1
- http://rhn.redhat.com/errata/RHSA-2015-0087.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://secunia.com/advisories/60545
- https://source.android.com/security/bulletin/2017-04-01
- http://www.securitytracker.com/id/1038201
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-4652: Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in…
Published: 2014-07-03T04:22:00 Last Modified: 2020-08-14T17:53:00
Summary
Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-4652 vulnerability.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=07f4d9d74a04aa7c72c5dae0ef97565f28f17b92
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2
- http://www.openwall.com/lists/oss-security/2014/06/26/6
- https://github.com/torvalds/linux/commit/07f4d9d74a04aa7c72c5dae0ef97565f28f17b92
- https://bugzilla.redhat.com/show_bug.cgi?id=1113406
- http://secunia.com/advisories/59434
- http://secunia.com/advisories/59777
- http://secunia.com/advisories/60564
- http://rhn.redhat.com/errata/RHSA-2014-1083.html
- http://www.ubuntu.com/usn/USN-2334-1
- http://www.ubuntu.com/usn/USN-2335-1
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://rhn.redhat.com/errata/RHSA-2015-1272.html
- http://secunia.com/advisories/60545
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94412
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-4027: The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before…
Published: 2014-06-23T11:21:00 Last Modified: 2020-08-21T18:24:00
Summary
The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 4.4
- CVSS: 2.3
- CVSS Vector: AV:A/AC:M/Au:S/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2014-4027 vulnerability.
References
- https://github.com/torvalds/linux/commit/4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc
- https://bugzilla.redhat.com/show_bug.cgi?id=1108744
- http://permalink.gmane.org/gmane.linux.scsi.target.devel/6618
- http://www.openwall.com/lists/oss-security/2014/06/11/1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc
- http://secunia.com/advisories/59777
- http://secunia.com/advisories/60564
- http://www.ubuntu.com/usn/USN-2334-1
- http://www.ubuntu.com/usn/USN-2335-1
- https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html
- http://secunia.com/advisories/61310
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
- http://secunia.com/advisories/59134
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-4038: ppc64-diag 2.6.1 allows local users to overwrite arbitrary files via a symlink attack related to…
Published: 2014-06-17T15:55:00 Last Modified: 2017-01-07T03:00:00
Summary
ppc64-diag 2.6.1 allows local users to overwrite arbitrary files via a symlink attack related to (1) rtas_errd/diag_support.c and /tmp/get_dt_files, (2) scripts/ppc64_diag_mkrsrc and /tmp/diagSEsnap/snapH.tar.gz, or (3) lpd/test/lpd_ela_test.sh and /var/tmp/ras.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-4038 vulnerability.
References
- https://bugzilla.novell.com/show_bug.cgi?id=882667
- https://bugzilla.redhat.com/show_bug.cgi?id=1109371
- http://openwall.com/lists/oss-security/2014/06/17/1
- http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-0383.html
- http://rhn.redhat.com/errata/RHSA-2015-1320.html
- http://www.securityfocus.com/bid/68049
- http://secunia.com/advisories/60616
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-4039: ppc64-diag 2.6.1 uses 0775 permissions for /tmp/diagSEsnap and does not properly restrict…
Published: 2014-06-17T15:55:00 Last Modified: 2017-01-07T03:00:00
Summary
ppc64-diag 2.6.1 uses 0775 permissions for /tmp/diagSEsnap and does not properly restrict permissions for /tmp/diagSEsnap/snapH.tar.gz, which allows local users to obtain sensitive information by reading files in this archive, as demonstrated by /var/log/messages and /etc/yaboot.conf.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-4039 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1109371
- http://openwall.com/lists/oss-security/2014/06/17/1
- http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-0383.html
- http://rhn.redhat.com/errata/RHSA-2015-1320.html
- http://www.securityfocus.com/bid/68086
- http://secunia.com/advisories/60616
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0186: A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote…
Published: 2014-06-14T11:18:00 Last Modified: 2014-06-16T14:52:00
Summary
A certain tomcat7 package for Apache Tomcat 7 in Red Hat Enterprise Linux (RHEL) 7 allows remote attackers to cause a denial of service (CPU consumption) via a crafted request. NOTE: this vulnerability exists because of an unspecified regression.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-0186 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1089884
- https://rhn.redhat.com/errata/RHSA-2014-0686.html
- http://www.osvdb.org/108060
- https://security-tracker.debian.org/tracker/CVE-2014-0186
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0249: The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership…
Published: 2014-06-11T14:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.4
- CVSS: 3.3
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-0249 vulnerability.
References
- https://lists.fedorahosted.org/pipermail/sssd-devel/2014-May/019495.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1101751
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3153: The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure…
Published: 2014-06-07T14:55:00 Last Modified: 2021-02-08T16:25:00
Summary
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2014-3153 vulnerability.
References
- http://openwall.com/lists/oss-security/2014/06/05/24
- http://www.openwall.com/lists/oss-security/2014/06/05/22
- http://openwall.com/lists/oss-security/2014/06/06/20
- https://bugzilla.redhat.com/show_bug.cgi?id=1103626
- https://github.com/torvalds/linux/commit/e9c243a5a6de0be8e584c604d353412584b592f8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e9c243a5a6de0be8e584c604d353412584b592f8
- http://secunia.com/advisories/59153
- http://secunia.com/advisories/59092
- http://secunia.com/advisories/59029
- http://linux.oracle.com/errata/ELSA-2014-3038.html
- http://secunia.com/advisories/58500
- http://linux.oracle.com/errata/ELSA-2014-3039.html
- http://www.securityfocus.com/bid/67906
- http://linux.oracle.com/errata/ELSA-2014-3037.html
- http://secunia.com/advisories/58990
- http://secunia.com/advisories/59309
- http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00006.html
- http://secunia.com/advisories/59599
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://secunia.com/advisories/59262
- http://secunia.com/advisories/59386
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
- http://www.exploit-db.com/exploits/35370
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b3eaa9fc5cd0a4d74b18f6b8dc617aeaf1873270
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a217887a7b658e2650c3feff22756ab80c7339
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=13fbca4c6ecd96ec1a1cfa2e4f2ce191fe928a5e
- http://www.securitytracker.com/id/1030451
- http://rhn.redhat.com/errata/RHSA-2014-0800.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00025.html
- http://www.ubuntu.com/usn/USN-2240-1
- http://www.ubuntu.com/usn/USN-2237-1
- http://www.debian.org/security/2014/dsa-2949
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00014.html
- http://www.openwall.com/lists/oss-security/2021/02/01/4
- https://github.com/elongl/CVE-2014-3153
- https://elongl.github.io/exploitation/2021/01/08/cve-2014-3153.html
- https://www.openwall.com/lists/oss-security/2021/02/01/4
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0195: The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before…
Published: 2014-06-05T21:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-0195 vulnerability.
References
- http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Once-Bled-Twice-Shy-OpenSSL-CVE-2014-0195/ba-p/6501048
- https://bugzilla.redhat.com/show_bug.cgi?id=1103598
- http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/ZDI-14-173-CVE-2014-0195-OpenSSL-DTLS-Fragment-Out-of-Bounds/ba-p/6501002
- http://www.openssl.org/news/secadv_20140605.txt
- https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=1632ef744872edc2aa2a53d487d3e79c965a4ad3
- https://kb.bluecoat.com/index?page=content&id=SA80
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
- http://www.blackberry.com/btsc/KB36051
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://secunia.com/advisories/59301
- http://secunia.com/advisories/59450
- http://secunia.com/advisories/59491
- http://secunia.com/advisories/59721
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://secunia.com/advisories/59655
- http://secunia.com/advisories/59659
- http://www-01.ibm.com/support/docview.wss?uid=swg21678289
- http://secunia.com/advisories/59162
- http://secunia.com/advisories/59528
- http://secunia.com/advisories/58939
- http://secunia.com/advisories/59666
- http://secunia.com/advisories/59587
- http://secunia.com/advisories/59126
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15356.html
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://secunia.com/advisories/59490
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21678167
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://secunia.com/advisories/59514
- http://www-01.ibm.com/support/docview.wss?uid=swg21677527
- http://secunia.com/advisories/59669
- http://secunia.com/advisories/59413
- http://secunia.com/advisories/58883
- http://secunia.com/advisories/59300
- http://secunia.com/advisories/59895
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://secunia.com/advisories/59530
- http://www.fortiguard.com/advisory/FG-IR-14-018/
- http://secunia.com/advisories/59342
- http://secunia.com/advisories/59451
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://secunia.com/advisories/58743
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://secunia.com/advisories/59990
- http://secunia.com/advisories/60571
- http://secunia.com/advisories/59784
- http://support.apple.com/kb/HT6443
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://marc.info/?l=bugtraq&m=142660345230545&w=2
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://marc.info/?l=bugtraq&m=140431828824371&w=2
- http://marc.info/?l=bugtraq&m=140499827729550&w=2
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://marc.info/?l=bugtraq&m=140491231331543&w=2
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- https://www.novell.com/support/kb/doc.php?id=7015271
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
- http://www-01.ibm.com/support/docview.wss?uid=swg21683332
- http://www-01.ibm.com/support/docview.wss?uid=swg21676889
- http://www-01.ibm.com/support/docview.wss?uid=swg21676879
- http://www-01.ibm.com/support/docview.wss?uid=swg21676644
- http://www-01.ibm.com/support/docview.wss?uid=swg21676071
- http://www-01.ibm.com/support/docview.wss?uid=swg21675821
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
- http://www.vmware.com/security/advisories/VMSA-2014-0006.html
- http://www.securitytracker.com/id/1030337
- http://www.securityfocus.com/bid/67900
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:106
- http://www.ibm.com/support/docview.wss?uid=swg24037783
- http://www.ibm.com/support/docview.wss?uid=swg21676793
- http://www.ibm.com/support/docview.wss?uid=swg21676356
- http://www.f-secure.com/en/web/labs_global/fsc-2014-6
- http://support.citrix.com/article/CTX140876
- http://security.gentoo.org/glsa/glsa-201407-05.xml
- http://secunia.com/advisories/61254
- http://secunia.com/advisories/59518
- http://secunia.com/advisories/59454
- http://secunia.com/advisories/59449
- http://secunia.com/advisories/59441
- http://secunia.com/advisories/59437
- http://secunia.com/advisories/59429
- http://secunia.com/advisories/59365
- http://secunia.com/advisories/59364
- http://secunia.com/advisories/59310
- http://secunia.com/advisories/59306
- http://secunia.com/advisories/59305
- http://secunia.com/advisories/59287
- http://secunia.com/advisories/59223
- http://secunia.com/advisories/59192
- http://secunia.com/advisories/59189
- http://secunia.com/advisories/59188
- http://secunia.com/advisories/59175
- http://secunia.com/advisories/59040
- http://secunia.com/advisories/58977
- http://secunia.com/advisories/58945
- http://secunia.com/advisories/58714
- http://secunia.com/advisories/58713
- http://secunia.com/advisories/58660
- http://secunia.com/advisories/58615
- http://secunia.com/advisories/58337
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0221: The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before…
Published: 2014-06-05T21:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-0221 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1103593
- https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d3152655d5319ce883c8e3ac4b99f8de4c59d846
- http://www.openssl.org/news/secadv_20140605.txt
- https://kb.bluecoat.com/index?page=content&id=SA80
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
- http://www.blackberry.com/btsc/KB36051
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://secunia.com/advisories/59301
- http://secunia.com/advisories/59450
- http://secunia.com/advisories/59491
- http://secunia.com/advisories/59721
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://secunia.com/advisories/59655
- http://secunia.com/advisories/59659
- http://secunia.com/advisories/59162
- http://www-01.ibm.com/support/docview.wss?uid=swg21678289
- http://secunia.com/advisories/59120
- http://secunia.com/advisories/59528
- http://secunia.com/advisories/58939
- http://secunia.com/advisories/59666
- http://secunia.com/advisories/59126
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://secunia.com/advisories/59490
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21678167
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://secunia.com/advisories/59514
- http://www-01.ibm.com/support/docview.wss?uid=swg21677527
- http://secunia.com/advisories/59495
- http://secunia.com/advisories/59669
- http://secunia.com/advisories/59413
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E
- http://secunia.com/advisories/59300
- http://secunia.com/advisories/59895
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.fortiguard.com/advisory/FG-IR-14-018/
- http://secunia.com/advisories/59342
- http://secunia.com/advisories/59451
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://rhn.redhat.com/errata/RHSA-2014-1021.html
- http://secunia.com/advisories/59990
- http://secunia.com/advisories/59221
- http://secunia.com/advisories/60571
- http://linux.oracle.com/errata/ELSA-2014-1053.html
- http://secunia.com/advisories/60687
- http://secunia.com/advisories/59784
- http://support.apple.com/kb/HT6443
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://marc.info/?l=bugtraq&m=140431828824371&w=2
- http://marc.info/?l=bugtraq&m=140499827729550&w=2
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://marc.info/?l=bugtraq&m=140491231331543&w=2
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- https://www.novell.com/support/kb/doc.php?id=7015271
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
- http://www-01.ibm.com/support/docview.wss?uid=swg21683332
- http://www-01.ibm.com/support/docview.wss?uid=swg21676889
- http://www-01.ibm.com/support/docview.wss?uid=swg21676879
- http://www-01.ibm.com/support/docview.wss?uid=swg21676071
- http://www-01.ibm.com/support/docview.wss?uid=swg21675821
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
- http://www.vmware.com/security/advisories/VMSA-2014-0006.html
- http://www.securitytracker.com/id/1030337
- http://www.securityfocus.com/bid/67901
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:106
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:105
- http://www.ibm.com/support/docview.wss?uid=swg24037783
- http://www.ibm.com/support/docview.wss?uid=swg21676793
- http://www.ibm.com/support/docview.wss?uid=swg21676356
- http://www.ibm.com/support/docview.wss?uid=swg21676226
- http://support.citrix.com/article/CTX140876
- http://security.gentoo.org/glsa/glsa-201407-05.xml
- http://secunia.com/advisories/61254
- http://secunia.com/advisories/59518
- http://secunia.com/advisories/59460
- http://secunia.com/advisories/59454
- http://secunia.com/advisories/59449
- http://secunia.com/advisories/59441
- http://secunia.com/advisories/59437
- http://secunia.com/advisories/59429
- http://secunia.com/advisories/59365
- http://secunia.com/advisories/59364
- http://secunia.com/advisories/59310
- http://secunia.com/advisories/59306
- http://secunia.com/advisories/59287
- http://secunia.com/advisories/59284
- http://secunia.com/advisories/59192
- http://secunia.com/advisories/59189
- http://secunia.com/advisories/59175
- http://secunia.com/advisories/59167
- http://secunia.com/advisories/59027
- http://secunia.com/advisories/58977
- http://secunia.com/advisories/58945
- http://secunia.com/advisories/58714
- http://secunia.com/advisories/58713
- http://secunia.com/advisories/58615
- http://secunia.com/advisories/58337
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0224: OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict…
Published: 2014-06-05T21:55:00 Last Modified: 2021-11-17T22:15:00
Summary
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the “CCS Injection” vulnerability.
Common Weakness Enumeration (CWE): CWE-326: Inadequate Encryption Strength
CWE Description: The software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-0224 vulnerability.
References
- http://www.openssl.org/news/secadv_20140605.txt
- http://ccsinjection.lepidum.co.jp
- http://www.kb.cert.org/vuls/id/978508
- https://bugzilla.redhat.com/show_bug.cgi?id=1103586
- https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441
- https://www.imperialviolet.org/2014/06/05/earlyccs.html
- https://access.redhat.com/site/blogs/766093/posts/908133
- http://secunia.com/advisories/59191
- http://secunia.com/advisories/58579
- https://kb.bluecoat.com/index?page=content&id=SA80
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
- http://www.kerio.com/support/kerio-control/release-history
- http://secunia.com/advisories/59438
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://secunia.com/advisories/59301
- http://secunia.com/advisories/59721
- http://secunia.com/advisories/59491
- http://secunia.com/advisories/59450
- http://www-01.ibm.com/support/docview.wss?uid=swg21676845
- http://secunia.com/advisories/59655
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://secunia.com/advisories/59659
- http://secunia.com/advisories/58639
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737
- http://secunia.com/advisories/58759
- http://www-01.ibm.com/support/docview.wss?uid=swg21678289
- http://secunia.com/advisories/59043
- http://secunia.com/advisories/59666
- http://secunia.com/advisories/59126
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740
- http://marc.info/?l=bugtraq&m=140499864129699&w=2
- http://www-01.ibm.com/support/docview.wss?uid=swg21677567
- http://secunia.com/advisories/59055
- http://secunia.com/advisories/59490
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://secunia.com/advisories/59514
- http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html
- http://secunia.com/advisories/59602
- http://secunia.com/advisories/59495
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://esupport.trendmicro.com/solution/en-US/1103813.aspx
- http://secunia.com/advisories/58930
- http://secunia.com/advisories/59370
- http://secunia.com/advisories/59012
- http://www.blackberry.com/btsc/KB36051
- http://secunia.com/advisories/58385
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://secunia.com/advisories/59120
- http://secunia.com/advisories/59162
- http://secunia.com/advisories/58939
- http://secunia.com/advisories/59528
- http://secunia.com/advisories/59063
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172
- http://secunia.com/advisories/58128
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- http://www-01.ibm.com/support/docview.wss?uid=swg21676496
- http://www-01.ibm.com/support/docview.wss?uid=swg21678167
- http://secunia.com/advisories/59442
- http://secunia.com/advisories/59824
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E
- http://www-01.ibm.com/support/docview.wss?uid=swg21677527
- https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf
- http://secunia.com/advisories/59827
- http://secunia.com/advisories/59669
- http://secunia.com/advisories/59413
- http://www-01.ibm.com/support/docview.wss?uid=swg24037761
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E
- http://www-01.ibm.com/support/docview.wss?uid=swg21677390
- http://secunia.com/advisories/59300
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690
- http://secunia.com/advisories/59383
- http://www.splunk.com/view/SP-CAAAM2D
- https://discussions.nessus.org/thread/7517
- http://secunia.com/advisories/59885
- http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://secunia.com/advisories/59459
- http://secunia.com/advisories/58745
- http://secunia.com/advisories/59530
- http://secunia.com/advisories/59589
- http://secunia.com/advisories/59451
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www.fortiguard.com/advisory/FG-IR-14-018/
- http://secunia.com/advisories/59506
- https://filezilla-project.org/versions.php?type=server
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://secunia.com/advisories/59894
- http://secunia.com/advisories/60049
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues
- http://secunia.com/advisories/58743
- http://secunia.com/advisories/59342
- http://secunia.com/advisories/59325
- http://secunia.com/advisories/59354
- http://secunia.com/advisories/59916
- http://rhn.redhat.com/errata/RHSA-2014-0624.html
- http://marc.info/?l=bugtraq&m=140386311427810&w=2
- http://rhn.redhat.com/errata/RHSA-2014-0631.html
- http://rhn.redhat.com/errata/RHSA-2014-0632.html
- http://rhn.redhat.com/errata/RHSA-2014-0630.html
- http://rhn.redhat.com/errata/RHSA-2014-0627.html
- http://marc.info/?l=bugtraq&m=140369637402535&w=2
- http://rhn.redhat.com/errata/RHSA-2014-0680.html
- http://rhn.redhat.com/errata/RHSA-2014-0633.html
- http://rhn.redhat.com/errata/RHSA-2014-0626.html
- http://secunia.com/advisories/60066
- http://puppetlabs.com/security/cve/cve-2014-0224
- http://secunia.com/advisories/59990
- http://secunia.com/advisories/60522
- http://linux.oracle.com/errata/ELSA-2014-1053.html
- http://secunia.com/advisories/60577
- http://secunia.com/advisories/59784
- http://secunia.com/advisories/59878
- http://secunia.com/advisories/60176
- http://secunia.com/advisories/60567
- http://secunia.com/advisories/60571
- http://secunia.com/advisories/60819
- http://support.apple.com/kb/HT6443
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://marc.info/?l=bugtraq&m=141164638606214&w=2
- http://marc.info/?l=bugtraq&m=141383465822787&w=2
- http://marc.info/?l=bugtraq&m=141025641601169&w=2
- http://marc.info/?l=bugtraq&m=141383410222440&w=2
- http://marc.info/?l=bugtraq&m=141147110427269&w=2
- http://marc.info/?l=bugtraq&m=140983229106599&w=2
- http://secunia.com/advisories/61815
- http://www.securitytracker.com/id/1031032
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securitytracker.com/id/1031594
- http://marc.info/?l=bugtraq&m=142546741516006&w=2
- http://marc.info/?l=bugtraq&m=142350350616251&w=2
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://marc.info/?l=bugtraq&m=142805027510172&w=2
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://marc.info/?l=bugtraq&m=141658880509699&w=2
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://marc.info/?l=bugtraq&m=140491231331543&w=2
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://marc.info/?l=bugtraq&m=140870499402361&w=2
- http://marc.info/?l=bugtraq&m=140784085708882&w=2
- http://marc.info/?l=bugtraq&m=140852826008699&w=2
- http://marc.info/?l=bugtraq&m=140604261522465&w=2
- http://marc.info/?l=bugtraq&m=140431828824371&w=2
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140852757108392&w=2
- http://marc.info/?l=bugtraq&m=140544599631400&w=2
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://marc.info/?l=bugtraq&m=140672208601650&w=2
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- http://marc.info/?l=bugtraq&m=140794476212181&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- https://www.novell.com/support/kb/doc.php?id=7015271
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004671
- https://www.ibm.com/support/docview.wss?uid=ssg1S1004670
- https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
- http://www-01.ibm.com/support/docview.wss?uid=swg24037870
- http://www-01.ibm.com/support/docview.wss?uid=swg24037732
- http://www-01.ibm.com/support/docview.wss?uid=swg24037731
- http://www-01.ibm.com/support/docview.wss?uid=swg24037730
- http://www-01.ibm.com/support/docview.wss?uid=swg24037729
- http://www-01.ibm.com/support/docview.wss?uid=swg24037727
- http://www-01.ibm.com/support/docview.wss?uid=swg21683332
- http://www-01.ibm.com/support/docview.wss?uid=swg21678233
- http://www-01.ibm.com/support/docview.wss?uid=swg21677836
- http://www-01.ibm.com/support/docview.wss?uid=swg21677131
- http://www-01.ibm.com/support/docview.wss?uid=swg21677080
- http://www-01.ibm.com/support/docview.wss?uid=swg21676889
- http://www-01.ibm.com/support/docview.wss?uid=swg21676879
- http://www-01.ibm.com/support/docview.wss?uid=swg21676833
- http://www-01.ibm.com/support/docview.wss?uid=swg21676786
- http://www-01.ibm.com/support/docview.wss?uid=swg21676644
- http://www-01.ibm.com/support/docview.wss?uid=swg21676615
- http://www-01.ibm.com/support/docview.wss?uid=swg21676536
- http://www-01.ibm.com/support/docview.wss?uid=swg21676529
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676478
- http://www-01.ibm.com/support/docview.wss?uid=swg21676334
- http://www-01.ibm.com/support/docview.wss?uid=swg21676333
- http://www-01.ibm.com/support/docview.wss?uid=swg21676071
- http://www-01.ibm.com/support/docview.wss?uid=swg21675821
- http://www-01.ibm.com/support/docview.wss?uid=swg21675626
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
- http://www.vmware.com/security/advisories/VMSA-2014-0006.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:106
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:105
- http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
- http://www.ibm.com/support/docview.wss?uid=swg24037783
- http://www.ibm.com/support/docview.wss?uid=swg21676877
- http://www.ibm.com/support/docview.wss?uid=swg21676793
- http://www.ibm.com/support/docview.wss?uid=swg21676356
- http://www.ibm.com/support/docview.wss?uid=swg1IT02314
- http://www.ibm.com/support/docview.wss?uid=ssg1S1004678
- http://www.ibm.com/support/docview.wss?uid=isg3T1020948
- http://www.f-secure.com/en/web/labs_global/fsc-2014-6
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html
- http://support.citrix.com/article/CTX140876
- http://security.gentoo.org/glsa/glsa-201407-05.xml
- http://secunia.com/advisories/61254
- http://secunia.com/advisories/59677
- http://secunia.com/advisories/59661
- http://secunia.com/advisories/59529
- http://secunia.com/advisories/59525
- http://secunia.com/advisories/59518
- http://secunia.com/advisories/59502
- http://secunia.com/advisories/59483
- http://secunia.com/advisories/59460
- http://secunia.com/advisories/59454
- http://secunia.com/advisories/59449
- http://secunia.com/advisories/59448
- http://secunia.com/advisories/59447
- http://secunia.com/advisories/59446
- http://secunia.com/advisories/59445
- http://secunia.com/advisories/59444
- http://secunia.com/advisories/59441
- http://secunia.com/advisories/59440
- http://secunia.com/advisories/59437
- http://secunia.com/advisories/59435
- http://secunia.com/advisories/59429
- http://secunia.com/advisories/59389
- http://secunia.com/advisories/59380
- http://secunia.com/advisories/59375
- http://secunia.com/advisories/59374
- http://secunia.com/advisories/59368
- http://secunia.com/advisories/59365
- http://secunia.com/advisories/59364
- http://secunia.com/advisories/59362
- http://secunia.com/advisories/59347
- http://secunia.com/advisories/59338
- http://secunia.com/advisories/59310
- http://secunia.com/advisories/59306
- http://secunia.com/advisories/59305
- http://secunia.com/advisories/59287
- http://secunia.com/advisories/59284
- http://secunia.com/advisories/59282
- http://secunia.com/advisories/59264
- http://secunia.com/advisories/59231
- http://secunia.com/advisories/59223
- http://secunia.com/advisories/59215
- http://secunia.com/advisories/59214
- http://secunia.com/advisories/59211
- http://secunia.com/advisories/59202
- http://secunia.com/advisories/59192
- http://secunia.com/advisories/59190
- http://secunia.com/advisories/59189
- http://secunia.com/advisories/59188
- http://secunia.com/advisories/59186
- http://secunia.com/advisories/59175
- http://secunia.com/advisories/59167
- http://secunia.com/advisories/59163
- http://secunia.com/advisories/59142
- http://secunia.com/advisories/59135
- http://secunia.com/advisories/59132
- http://secunia.com/advisories/59101
- http://secunia.com/advisories/59093
- http://secunia.com/advisories/59040
- http://secunia.com/advisories/59004
- http://secunia.com/advisories/58977
- http://secunia.com/advisories/58945
- http://secunia.com/advisories/58742
- http://secunia.com/advisories/58719
- http://secunia.com/advisories/58716
- http://secunia.com/advisories/58714
- http://secunia.com/advisories/58713
- http://secunia.com/advisories/58667
- http://secunia.com/advisories/58660
- http://secunia.com/advisories/58615
- http://secunia.com/advisories/58492
- http://secunia.com/advisories/58433
- http://secunia.com/advisories/58337
- http://seclists.org/fulldisclosure/2014/Jun/38
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
- https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3470: The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before…
Published: 2014-06-05T21:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
Common Weakness Enumeration (CWE): CWE-310: Cryptographic Issues
CWE Description: Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3470 vulnerability.
References
- http://www.openssl.org/news/secadv_20140605.txt
- https://bugzilla.redhat.com/show_bug.cgi?id=1103600
- https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8011cd56e39a433b1837465259a9bd24a38727fb
- http://www.securityfocus.com/bid/67898
- http://secunia.com/advisories/58797
- http://secunia.com/advisories/59191
- http://secunia.com/advisories/58579
- https://kb.bluecoat.com/index?page=content&id=SA80
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
- http://www.blackberry.com/btsc/KB36051
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://secunia.com/advisories/59438
- http://secunia.com/advisories/59301
- http://secunia.com/advisories/59450
- http://secunia.com/advisories/59491
- http://secunia.com/advisories/59721
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://secunia.com/advisories/59655
- http://secunia.com/advisories/59659
- http://secunia.com/advisories/59162
- http://secunia.com/advisories/59120
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21678289
- http://secunia.com/advisories/58939
- http://secunia.com/advisories/59666
- http://secunia.com/advisories/59126
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://secunia.com/advisories/59490
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- http://www-01.ibm.com/support/docview.wss?uid=swg21676496
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21678167
- http://secunia.com/advisories/59442
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://secunia.com/advisories/59514
- http://www-01.ibm.com/support/docview.wss?uid=swg21677527
- http://secunia.com/advisories/59495
- http://secunia.com/advisories/59669
- http://secunia.com/advisories/59413
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E
- http://www-01.ibm.com/support/docview.wss?uid=swg24037761
- http://secunia.com/advisories/59300
- http://www.splunk.com/view/SP-CAAAM2D
- http://secunia.com/advisories/59895
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://secunia.com/advisories/59459
- http://secunia.com/advisories/59451
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://secunia.com/advisories/59342
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://secunia.com/advisories/59916
- http://secunia.com/advisories/59990
- http://secunia.com/advisories/60571
- http://secunia.com/advisories/59784
- http://support.apple.com/kb/HT6443
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://marc.info/?l=bugtraq&m=140431828824371&w=2
- http://marc.info/?l=bugtraq&m=140499827729550&w=2
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://marc.info/?l=bugtraq&m=140491231331543&w=2
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
- https://www.novell.com/support/kb/doc.php?id=7015271
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754
- http://www-01.ibm.com/support/docview.wss?uid=swg21683332
- http://www-01.ibm.com/support/docview.wss?uid=swg21677836
- http://www-01.ibm.com/support/docview.wss?uid=swg21676889
- http://www-01.ibm.com/support/docview.wss?uid=swg21676879
- http://www-01.ibm.com/support/docview.wss?uid=swg21676615
- http://www-01.ibm.com/support/docview.wss?uid=swg21676529
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676071
- http://www-01.ibm.com/support/docview.wss?uid=swg21675821
- http://www-01.ibm.com/support/docview.wss?uid=swg21675626
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163
- http://www.vmware.com/security/advisories/VMSA-2014-0006.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:106
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:105
- http://www.ibm.com/support/docview.wss?uid=swg24037783
- http://www.ibm.com/support/docview.wss?uid=swg21676793
- http://www.ibm.com/support/docview.wss?uid=swg21676356
- http://www.f-secure.com/en/web/labs_global/fsc-2014-6
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15342.html
- http://support.citrix.com/article/CTX140876
- http://security.gentoo.org/glsa/glsa-201407-05.xml
- http://secunia.com/advisories/61254
- http://secunia.com/advisories/59525
- http://secunia.com/advisories/59518
- http://secunia.com/advisories/59483
- http://secunia.com/advisories/59460
- http://secunia.com/advisories/59449
- http://secunia.com/advisories/59445
- http://secunia.com/advisories/59441
- http://secunia.com/advisories/59440
- http://secunia.com/advisories/59437
- http://secunia.com/advisories/59431
- http://secunia.com/advisories/59365
- http://secunia.com/advisories/59364
- http://secunia.com/advisories/59362
- http://secunia.com/advisories/59340
- http://secunia.com/advisories/59310
- http://secunia.com/advisories/59306
- http://secunia.com/advisories/59287
- http://secunia.com/advisories/59284
- http://secunia.com/advisories/59282
- http://secunia.com/advisories/59264
- http://secunia.com/advisories/59223
- http://secunia.com/advisories/59192
- http://secunia.com/advisories/59189
- http://secunia.com/advisories/59175
- http://secunia.com/advisories/59167
- http://secunia.com/advisories/58977
- http://secunia.com/advisories/58945
- http://secunia.com/advisories/58742
- http://secunia.com/advisories/58716
- http://secunia.com/advisories/58714
- http://secunia.com/advisories/58713
- http://secunia.com/advisories/58667
- http://secunia.com/advisories/58615
- http://secunia.com/advisories/58337
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3467: Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in…
Published: 2014-06-05T20:55:00 Last Modified: 2020-11-16T14:33:00
Summary
Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3467 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2014-0596.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1102022
- http://rhn.redhat.com/errata/RHSA-2014-0594.html
- http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html
- http://linux.oracle.com/errata/ELSA-2014-0596.html
- http://secunia.com/advisories/59057
- http://secunia.com/advisories/59021
- http://linux.oracle.com/errata/ELSA-2014-0594.html
- http://secunia.com/advisories/58614
- http://secunia.com/advisories/58591
- http://secunia.com/advisories/60415
- http://rhn.redhat.com/errata/RHSA-2014-0815.html
- http://www.debian.org/security/2014/dsa-3056
- http://secunia.com/advisories/61888
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:116
- http://advisories.mageia.org/MGASA-2014-0247.html
- http://www.novell.com/support/kb/doc.php?id=7015303
- http://www.novell.com/support/kb/doc.php?id=7015302
- http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html
- http://secunia.com/advisories/60320
- http://secunia.com/advisories/59408
- http://rhn.redhat.com/errata/RHSA-2014-0687.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3468: The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a…
Published: 2014-06-05T20:55:00 Last Modified: 2020-11-16T14:30:00
Summary
The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
Common Weakness Enumeration (CWE): CWE-131: Incorrect Calculation of Buffer Size
CWE Description: The software does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3468 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2014-0594.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1102323
- http://rhn.redhat.com/errata/RHSA-2014-0596.html
- http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f
- http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html
- http://linux.oracle.com/errata/ELSA-2014-0596.html
- http://secunia.com/advisories/59057
- http://secunia.com/advisories/59021
- http://linux.oracle.com/errata/ELSA-2014-0594.html
- http://secunia.com/advisories/58614
- http://secunia.com/advisories/58591
- http://secunia.com/advisories/60415
- http://rhn.redhat.com/errata/RHSA-2014-0815.html
- http://www.debian.org/security/2014/dsa-3056
- http://secunia.com/advisories/61888
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:116
- http://advisories.mageia.org/MGASA-2014-0247.html
- http://www.novell.com/support/kb/doc.php?id=7015303
- http://www.novell.com/support/kb/doc.php?id=7015302
- http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15423.html
- http://secunia.com/advisories/60320
- http://secunia.com/advisories/59408
- http://rhn.redhat.com/errata/RHSA-2014-0687.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3469: The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows…
Published: 2014-06-05T20:55:00 Last Modified: 2020-11-16T14:24:00
Summary
The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-3469 vulnerability.
References
- http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1102329
- http://rhn.redhat.com/errata/RHSA-2014-0594.html
- http://rhn.redhat.com/errata/RHSA-2014-0596.html
- http://linux.oracle.com/errata/ELSA-2014-0596.html
- http://secunia.com/advisories/59057
- http://secunia.com/advisories/59021
- http://linux.oracle.com/errata/ELSA-2014-0594.html
- http://secunia.com/advisories/58614
- http://secunia.com/advisories/58591
- http://secunia.com/advisories/60415
- http://rhn.redhat.com/errata/RHSA-2014-0815.html
- http://www.debian.org/security/2014/dsa-3056
- http://secunia.com/advisories/61888
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:116
- http://advisories.mageia.org/MGASA-2014-0247.html
- http://www.novell.com/support/kb/doc.php?id=7015303
- http://www.novell.com/support/kb/doc.php?id=7015302
- http://secunia.com/advisories/60320
- http://secunia.com/advisories/59408
- http://rhn.redhat.com/errata/RHSA-2014-0687.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00002.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3917: kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with…
Published: 2014-06-05T17:55:00 Last Modified: 2021-07-15T19:16:00
Summary
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 4.9
- Exploitability Score: 3.4
- CVSS: 3.3
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-3917 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1102571
- http://article.gmane.org/gmane.linux.kernel/1713179
- http://www.openwall.com/lists/oss-security/2014/05/29/5
- http://secunia.com/advisories/60011
- http://secunia.com/advisories/59777
- http://secunia.com/advisories/60564
- http://rhn.redhat.com/errata/RHSA-2014-1143.html
- http://www.ubuntu.com/usn/USN-2334-1
- http://www.ubuntu.com/usn/USN-2335-1
- http://rhn.redhat.com/errata/RHSA-2014-1281.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-3940: The Linux kernel through 3.14.5 does not properly consider the presence of hugetlb entries, which…
Published: 2014-06-05T17:55:00 Last Modified: 2021-07-15T19:16:00
Summary
The Linux kernel through 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering a race condition via numa_maps read operations during hugepage migration, related to fs/proc/task_mmu.c and mm/mempolicy.c.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.9
- Exploitability Score: 1.9
- CVSS: 4.0
- CVSS Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-3940 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2014/06/02/5
- https://bugzilla.redhat.com/show_bug.cgi?id=1104097
- https://lkml.org/lkml/2014/3/18/784
- http://www.securityfocus.com/bid/67786
- http://secunia.com/advisories/59011
- https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15685.html
- http://secunia.com/advisories/61310
- http://rhn.redhat.com/errata/RHSA-2015-0290.html
- http://rhn.redhat.com/errata/RHSA-2015-1272.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1738: The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does…
Published: 2014-05-11T21:55:00 Last Modified: 2020-08-21T18:29:00
Summary
The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-1738 vulnerability.
References
- https://github.com/torvalds/linux/commit/2145e15e0557a01b9195d1c7199a1b92cb9be81f
- http://www.openwall.com/lists/oss-security/2014/05/09/2
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2145e15e0557a01b9195d1c7199a1b92cb9be81f
- https://bugzilla.redhat.com/show_bug.cgi?id=1094299
- http://www.debian.org/security/2014/dsa-2928
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
- http://www.debian.org/security/2014/dsa-2926
- http://www.securityfocus.com/bid/67302
- http://secunia.com/advisories/59309
- http://secunia.com/advisories/59406
- http://secunia.com/advisories/59599
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- http://secunia.com/advisories/59262
- http://www.securitytracker.com/id/1030474
- http://rhn.redhat.com/errata/RHSA-2014-0801.html
- http://rhn.redhat.com/errata/RHSA-2014-0800.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1737: The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not…
Published: 2014-05-11T21:55:00 Last Modified: 2020-08-21T18:30:00
Summary
The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
Common Weakness Enumeration (CWE): CWE-754: Improper Check for Unusual or Exceptional Conditions
CWE Description: The software does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the software.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-1737 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1094299
- http://www.openwall.com/lists/oss-security/2014/05/09/2
- https://github.com/torvalds/linux/commit/ef87dbe7614341c2e7bfe8d32fcb7028cc97442c
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c
- http://www.debian.org/security/2014/dsa-2928
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
- http://www.debian.org/security/2014/dsa-2926
- http://www.securityfocus.com/bid/67300
- http://secunia.com/advisories/59406
- http://secunia.com/advisories/59599
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://linux.oracle.com/errata/ELSA-2014-3043.html
- http://secunia.com/advisories/59309
- http://secunia.com/advisories/59262
- http://www.securitytracker.com/id/1030474
- http://rhn.redhat.com/errata/RHSA-2014-0801.html
- http://rhn.redhat.com/errata/RHSA-2014-0800.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0196: The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not…
Published: 2014-05-07T10:55:00 Last Modified: 2020-08-19T19:40:00
Summary
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the “LECHO & !OPOST” case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2014-0196 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1094232
- http://www.openwall.com/lists/oss-security/2014/05/05/6
- http://bugzilla.novell.com/show_bug.cgi?id=875690
- http://pastebin.com/raw.php?i=yTSFUBgZ
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4291086b1f081b869c6d79e5b7441633dc3ace00
- https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00
- http://www.ubuntu.com/usn/USN-2199-1
- http://www.debian.org/security/2014/dsa-2928
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
- http://www.ubuntu.com/usn/USN-2201-1
- http://rhn.redhat.com/errata/RHSA-2014-0512.html
- http://www.debian.org/security/2014/dsa-2926
- http://www.ubuntu.com/usn/USN-2202-1
- http://www.ubuntu.com/usn/USN-2196-1
- http://www.ubuntu.com/usn/USN-2198-1
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
- http://www.ubuntu.com/usn/USN-2204-1
- http://www.ubuntu.com/usn/USN-2197-1
- http://www.ubuntu.com/usn/USN-2200-1
- http://www.ubuntu.com/usn/USN-2203-1
- http://secunia.com/advisories/59599
- http://linux.oracle.com/errata/ELSA-2014-0771.html
- http://secunia.com/advisories/59262
- http://source.android.com/security/bulletin/2016-07-01.html
- http://www.osvdb.org/106646
- http://www.exploit-db.com/exploits/33516
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html
- http://secunia.com/advisories/59218
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0189: virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to…
Published: 2014-05-02T14:55:00 Last Modified: 2016-08-26T12:02:00
Summary
virt-who uses world-readable permissions for /etc/sysconfig/virt-who, which allows local users to obtain password for hypervisors by reading the file.
Common Weakness Enumeration (CWE): CWE-310: Cryptographic Issues
CWE Description: Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-0189 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2014/04/28/2
- http://www.securityfocus.com/bid/67089
- https://bugzilla.redhat.com/show_bug.cgi?id=1088732
- https://bugzilla.redhat.com/show_bug.cgi?id=1081286
- http://rhn.redhat.com/errata/RHSA-2015-0430.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1530: The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5,…
Published: 2014-04-30T10:49:00 Last Modified: 2020-08-07T19:19:00
Summary
The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1530 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-43.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=895557
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
- http://www.ubuntu.com/usn/USN-2189-1
- http://rhn.redhat.com/errata/RHSA-2014-0448.html
- http://www.debian.org/security/2014/dsa-2924
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2014-0449.html
- http://www.debian.org/security/2014/dsa-2918
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
- http://www.ubuntu.com/usn/USN-2185-1
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
- http://secunia.com/advisories/59866
- http://www.securitytracker.com/id/1030165
- http://www.securitytracker.com/id/1030163
- http://www.securitytracker.com/id/1030164
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.securityfocus.com/bid/67137
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1529: The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5,…
Published: 2014-04-30T10:49:00 Last Modified: 2020-08-06T17:42:00
Summary
The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1529 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-42.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=987003
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
- http://www.ubuntu.com/usn/USN-2189-1
- http://rhn.redhat.com/errata/RHSA-2014-0448.html
- http://www.debian.org/security/2014/dsa-2924
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2014-0449.html
- http://www.debian.org/security/2014/dsa-2918
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
- http://www.ubuntu.com/usn/USN-2185-1
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
- http://secunia.com/advisories/59866
- http://www.securitytracker.com/id/1030165
- http://www.securitytracker.com/id/1030163
- http://www.securitytracker.com/id/1030164
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.securityfocus.com/bid/67135
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1531: Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in…
Published: 2014-04-30T10:49:00 Last Modified: 2020-08-07T19:26:00
Summary
Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1531 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-44.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=987140
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
- http://www.ubuntu.com/usn/USN-2189-1
- http://rhn.redhat.com/errata/RHSA-2014-0448.html
- http://www.debian.org/security/2014/dsa-2924
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2014-0449.html
- http://www.debian.org/security/2014/dsa-2918
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
- http://www.ubuntu.com/usn/USN-2185-1
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
- http://secunia.com/advisories/59866
- http://www.securitytracker.com/id/1030165
- http://www.securitytracker.com/id/1030163
- http://www.securitytracker.com/id/1030164
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.securityfocus.com/bid/67134
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1532: Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in…
Published: 2014-04-30T10:49:00 Last Modified: 2020-08-06T17:57:00
Summary
Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1532 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-46.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=966006
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
- http://www.ubuntu.com/usn/USN-2189-1
- http://rhn.redhat.com/errata/RHSA-2014-0448.html
- http://www.debian.org/security/2014/dsa-2924
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2014-0449.html
- http://www.debian.org/security/2014/dsa-2918
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
- http://www.ubuntu.com/usn/USN-2185-1
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
- http://secunia.com/advisories/59866
- http://www.securitytracker.com/id/1030165
- http://www.securitytracker.com/id/1030163
- http://www.securitytracker.com/id/1030164
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.securityfocus.com/bid/67130
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1523: Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR…
Published: 2014-04-30T10:49:00 Last Modified: 2020-08-07T18:53:00
Summary
Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1523 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=969226
- http://www.mozilla.org/security/announce/2014/mfsa2014-37.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
- http://www.ubuntu.com/usn/USN-2189-1
- http://rhn.redhat.com/errata/RHSA-2014-0448.html
- http://www.debian.org/security/2014/dsa-2924
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2014-0449.html
- http://www.debian.org/security/2014/dsa-2918
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
- http://www.ubuntu.com/usn/USN-2185-1
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
- http://www.securitytracker.com/id/1030165
- http://www.securitytracker.com/id/1030163
- http://www.securitytracker.com/id/1030164
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.securityfocus.com/bid/67129
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1524: The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR…
Published: 2014-04-30T10:49:00 Last Modified: 2020-08-06T17:35:00
Summary
The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1524 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=989183
- http://www.mozilla.org/security/announce/2014/mfsa2014-38.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
- http://www.ubuntu.com/usn/USN-2189-1
- http://rhn.redhat.com/errata/RHSA-2014-0448.html
- http://www.debian.org/security/2014/dsa-2924
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2014-0449.html
- http://www.debian.org/security/2014/dsa-2918
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
- http://www.ubuntu.com/usn/USN-2185-1
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
- http://secunia.com/advisories/59866
- http://www.securitytracker.com/id/1030165
- http://www.securitytracker.com/id/1030163
- http://www.securitytracker.com/id/1030164
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.securityfocus.com/bid/67131
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1518: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0,…
Published: 2014-04-30T10:49:00 Last Modified: 2020-08-07T18:52:00
Summary
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1518 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=986678
- https://bugzilla.mozilla.org/show_bug.cgi?id=991471
- https://bugzilla.mozilla.org/show_bug.cgi?id=980537
- https://bugzilla.mozilla.org/show_bug.cgi?id=952022
- https://bugzilla.mozilla.org/show_bug.cgi?id=993546
- https://bugzilla.mozilla.org/show_bug.cgi?id=966630
- https://bugzilla.mozilla.org/show_bug.cgi?id=944353
- https://bugzilla.mozilla.org/show_bug.cgi?id=992968
- https://bugzilla.mozilla.org/show_bug.cgi?id=986843
- http://www.mozilla.org/security/announce/2014/mfsa2014-34.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html
- http://rhn.redhat.com/errata/RHSA-2014-0448.html
- http://www.debian.org/security/2014/dsa-2924
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html
- http://www.ubuntu.com/usn/USN-2189-1
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2014-0449.html
- http://www.debian.org/security/2014/dsa-2918
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html
- http://www.ubuntu.com/usn/USN-2185-1
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html
- http://secunia.com/advisories/59866
- http://www.securitytracker.com/id/1030163
- http://www.securitytracker.com/id/1030164
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.securityfocus.com/bid/67123
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0181: The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for…
Published: 2014-04-27T00:55:00 Last Modified: 2020-08-26T19:44:00
Summary
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-0181 vulnerability.
References
- http://marc.info/?l=linux-netdev&m=139828832919748&w=2
- http://www.openwall.com/lists/oss-security/2014/04/23/6
- https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=90f62cf30a78721641e08737bda787552428061e
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.9
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.45
- http://rhn.redhat.com/errata/RHSA-2014-1959.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0150: Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and…
Published: 2014-04-18T14:55:00 Last Modified: 2020-11-02T14:39:00
Summary
Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.4
- CVSS: 4.9
- CVSS Vector: AV:A/AC:M/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2014-0150 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1078846
- http://thread.gmane.org/gmane.comp.emulators.qemu/266713
- http://article.gmane.org/gmane.comp.emulators.qemu/266768
- http://secunia.com/advisories/57878
- http://www.ubuntu.com/usn/USN-2182-1
- http://secunia.com/advisories/58191
- http://www.debian.org/security/2014/dsa-2910
- http://www.debian.org/security/2014/dsa-2909
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0160: The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle…
Published: 2014-04-07T22:55:00 Last Modified: 2020-10-15T13:29:00
Summary
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 5)
Code designed for conducting penetration testing on CVE-2014-0160 vulnerability.
- HeartBleed Attack - Paper by Jaspreet Singh at 2020-12-22
- OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (2) (DTLS Support) by Ayman Sagy at 2014-04-24
- OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (1) by prdelka at 2014-04-10
- OpenSSL 1.0.1f TLS Heartbeat Extension - 'Heartbleed' Memory Disclosure (Multiple SSL/TLS Versions) by Fitzl Csaba at 2014-04-09
- OpenSSL TLS Heartbeat Extension - 'Heartbleed' Memory Disclosure by Jared Stafford at 2014-04-08
References
- http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96db9023b881d7cd9f379b0c154650d6c108e9a3
- https://bugzilla.redhat.com/show_bug.cgi?id=1084875
- http://www.openssl.org/news/secadv_20140407.txt
- http://heartbleed.com/
- http://www.securitytracker.com/id/1030078
- http://seclists.org/fulldisclosure/2014/Apr/109
- http://seclists.org/fulldisclosure/2014/Apr/190
- https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html
- http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html
- http://rhn.redhat.com/errata/RHSA-2014-0376.html
- http://rhn.redhat.com/errata/RHSA-2014-0396.html
- http://www.securitytracker.com/id/1030082
- http://secunia.com/advisories/57347
- http://marc.info/?l=bugtraq&m=139722163017074&w=2
- http://www.securitytracker.com/id/1030077
- http://www-01.ibm.com/support/docview.wss?uid=swg21670161
- http://www.debian.org/security/2014/dsa-2896
- http://rhn.redhat.com/errata/RHSA-2014-0377.html
- http://www.securitytracker.com/id/1030080
- http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html
- http://www.securitytracker.com/id/1030074
- http://seclists.org/fulldisclosure/2014/Apr/90
- http://www.securitytracker.com/id/1030081
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed
- http://rhn.redhat.com/errata/RHSA-2014-0378.html
- http://seclists.org/fulldisclosure/2014/Apr/91
- http://secunia.com/advisories/57483
- http://www.splunk.com/view/SP-CAAAMB3
- http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html
- http://www.securitytracker.com/id/1030079
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html
- http://secunia.com/advisories/57721
- http://www.blackberry.com/btsc/KB35882
- http://www.securitytracker.com/id/1030026
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html
- http://www.securityfocus.com/bid/66690
- http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
- http://www.us-cert.gov/ncas/alerts/TA14-098A
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
- http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/
- https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
- http://secunia.com/advisories/57966
- http://www.f-secure.com/en/web/labs_global/fsc-2014-1
- http://seclists.org/fulldisclosure/2014/Apr/173
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
- http://secunia.com/advisories/57968
- https://code.google.com/p/mod-spdy/issues/detail?id=85
- http://www.exploit-db.com/exploits/32745
- http://www.kb.cert.org/vuls/id/720951
- https://www.cert.fi/en/reports/2014/vulnerability788210.html
- http://www.exploit-db.com/exploits/32764
- http://secunia.com/advisories/57836
- https://gist.github.com/chapmajs/10473815
- http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/
- http://cogentdatahub.com/ReleaseNotes.html
- http://marc.info/?l=bugtraq&m=139905458328378&w=2
- http://marc.info/?l=bugtraq&m=139869891830365&w=2
- http://marc.info/?l=bugtraq&m=139889113431619&w=2
- http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1
- http://www.kerio.com/support/kerio-control/release-history
- http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3
- http://advisories.mageia.org/MGASA-2014-0165.html
- https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- https://filezilla-project.org/versions.php?type=server
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217
- http://marc.info/?l=bugtraq&m=141287864628122&w=2
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://marc.info/?l=bugtraq&m=142660345230545&w=2
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://marc.info/?l=bugtraq&m=139817727317190&w=2
- http://marc.info/?l=bugtraq&m=139757726426985&w=2
- http://marc.info/?l=bugtraq&m=139758572430452&w=2
- http://marc.info/?l=bugtraq&m=139905653828999&w=2
- http://marc.info/?l=bugtraq&m=139842151128341&w=2
- http://marc.info/?l=bugtraq&m=139905405728262&w=2
- http://marc.info/?l=bugtraq&m=139833395230364&w=2
- http://marc.info/?l=bugtraq&m=139824993005633&w=2
- http://marc.info/?l=bugtraq&m=139843768401936&w=2
- http://marc.info/?l=bugtraq&m=139905202427693&w=2
- http://marc.info/?l=bugtraq&m=139774054614965&w=2
- http://marc.info/?l=bugtraq&m=139889295732144&w=2
- http://marc.info/?l=bugtraq&m=139835815211508&w=2
- http://marc.info/?l=bugtraq&m=140724451518351&w=2
- http://marc.info/?l=bugtraq&m=139808058921905&w=2
- http://marc.info/?l=bugtraq&m=139836085512508&w=2
- http://marc.info/?l=bugtraq&m=139869720529462&w=2
- http://marc.info/?l=bugtraq&m=139905868529690&w=2
- http://marc.info/?l=bugtraq&m=139765756720506&w=2
- http://marc.info/?l=bugtraq&m=140015787404650&w=2
- http://marc.info/?l=bugtraq&m=139824923705461&w=2
- http://marc.info/?l=bugtraq&m=139757919027752&w=2
- http://marc.info/?l=bugtraq&m=139774703817488&w=2
- http://marc.info/?l=bugtraq&m=139905243827825&w=2
- http://marc.info/?l=bugtraq&m=140075368411126&w=2
- http://marc.info/?l=bugtraq&m=139905295427946&w=2
- http://marc.info/?l=bugtraq&m=139835844111589&w=2
- http://marc.info/?l=bugtraq&m=139757819327350&w=2
- http://marc.info/?l=bugtraq&m=139817685517037&w=2
- http://marc.info/?l=bugtraq&m=139905351928096&w=2
- http://marc.info/?l=bugtraq&m=139817782017443&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661
- http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
- http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
- http://secunia.com/advisories/59347
- http://secunia.com/advisories/59243
- http://secunia.com/advisories/59139
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01
- https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html
- http://support.citrix.com/article/CTX140605
- http://www.ubuntu.com/usn/USN-2165-1
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@%3Cdev.tomcat.apache.org%3E
- https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html
- https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@%3Cdev.tomcat.apache.org%3E
- https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf
- https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@%3Cdev.tomcat.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3346: Buffer overflow in hw/scsi-disk.c in the SCSI subsystem in QEMU before 0.15.2, as used by Xen,…
Published: 2014-04-01T06:35:00 Last Modified: 2014-04-01T14:35:00
Summary
Buffer overflow in hw/scsi-disk.c in the SCSI subsystem in QEMU before 0.15.2, as used by Xen, might allow local guest users with permission to access the CD-ROM to cause a denial of service (guest crash) via a crafted SAI READ CAPACITY SCSI command. NOTE: this is only a vulnerability when root has manually modified certain permissions or ACLs.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 1.9
- CVSS: 4.0
- CVSS Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-3346 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2011-1401.html
- http://git.qemu.org/?p=qemu-stable-0.15.git;a=log
- https://github.com/bonzini/qemu/commit/7285477ab11831b1cf56e45878a89170dd06d9b9
- http://www.openwall.com/lists/oss-security/2011/10/20/2
- https://github.com/bonzini/qemu/commit/103b40f51e4012b3b0ad20f615562a1806d7f49a
- https://bugzilla.redhat.com/show_bug.cgi?id=736038
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3359: Luci in Red Hat Conga stores the user’s username and password in a Base64 encoded string in the…
Published: 2014-03-31T14:58:00 Last Modified: 2014-03-31T18:12:00
Summary
Luci in Red Hat Conga stores the user’s username and password in a Base64 encoded string in the __ac session cookie, which allows attackers to gain privileges by accessing this cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2013-7347 for the incorrect enforcement of a user timeout.
Common Weakness Enumeration (CWE): CWE-255: Credentials Management Errors
CWE Description: Weaknesses in this category are related to the management of credentials.
Scores
- Impact Score: 6.4
- Exploitability Score: 1.9
- CVSS: 3.7
- CVSS Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-3359 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-7347: Luci in Red Hat Conga does not properly enforce the user session timeout, which might allow…
Published: 2014-03-31T14:58:00 Last Modified: 2014-03-31T18:23:00
Summary
Luci in Red Hat Conga does not properly enforce the user session timeout, which might allow attackers to gain access to the session by reading the __ac session cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2012-3359 for the base64-encoded storage of the user and password in a cookie.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 1.9
- CVSS: 3.7
- CVSS Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-7347 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel…
Published: 2014-03-26T14:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors.
Scores
- Impact Score: 6.9
- Exploitability Score: 5.1
- CVSS: 5.5
- CVSS Vector: AV:A/AC:L/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2014-0055 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1062577
- http://rhn.redhat.com/errata/RHSA-2014-0328.html
- http://rhn.redhat.com/errata/RHSA-2014-0339.html
- http://www.securityfocus.com/bid/66441
- http://secunia.com/advisories/59386
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1493: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0,…
Published: 2014-03-19T10:55:00 Last Modified: 2020-08-11T13:48:00
Summary
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1493 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=977538
- https://bugzilla.mozilla.org/show_bug.cgi?id=958867
- http://www.mozilla.org/security/announce/2014/mfsa2014-15.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=896268
- https://bugzilla.mozilla.org/show_bug.cgi?id=967341
- https://bugzilla.mozilla.org/show_bug.cgi?id=963974
- https://bugzilla.mozilla.org/show_bug.cgi?id=965982
- https://bugzilla.mozilla.org/show_bug.cgi?id=960145
- http://www.debian.org/security/2014/dsa-2881
- http://rhn.redhat.com/errata/RHSA-2014-0310.html
- http://rhn.redhat.com/errata/RHSA-2014-0316.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html
- http://www.ubuntu.com/usn/USN-2151-1
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
- http://www.securityfocus.com/bid/66412
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.debian.org/security/2014/dsa-2911
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1497: The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR…
Published: 2014-03-19T10:55:00 Last Modified: 2020-08-06T20:45:00
Summary
The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1497 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=966311
- http://www.mozilla.org/security/announce/2014/mfsa2014-17.html
- http://www.debian.org/security/2014/dsa-2881
- http://rhn.redhat.com/errata/RHSA-2014-0310.html
- http://rhn.redhat.com/errata/RHSA-2014-0316.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
- http://www.ubuntu.com/usn/USN-2151-1
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
- http://www.securityfocus.com/bid/66423
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.debian.org/security/2014/dsa-2911
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1510: The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4,…
Published: 2014-03-19T10:55:00 Last Modified: 2020-08-03T16:04:00
Summary
The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2014-1510 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-29.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=982906
- http://www.debian.org/security/2014/dsa-2881
- http://rhn.redhat.com/errata/RHSA-2014-0310.html
- http://rhn.redhat.com/errata/RHSA-2014-0316.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
- http://www.ubuntu.com/usn/USN-2151-1
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
- http://www.securityfocus.com/bid/66206
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.debian.org/security/2014/dsa-2911
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1513: TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird…
Published: 2014-03-19T10:55:00 Last Modified: 2020-08-11T13:54:00
Summary
TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1513 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=982974
- http://www.mozilla.org/security/announce/2014/mfsa2014-31.html
- http://www.debian.org/security/2014/dsa-2881
- http://rhn.redhat.com/errata/RHSA-2014-0310.html
- http://rhn.redhat.com/errata/RHSA-2014-0316.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
- http://www.ubuntu.com/usn/USN-2151-1
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
- http://www.securityfocus.com/bid/66203
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.debian.org/security/2014/dsa-2911
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1509: Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla…
Published: 2014-03-19T10:55:00 Last Modified: 2020-08-03T16:08:00
Summary
Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25, allows remote attackers to execute arbitrary code via a crafted extension that renders fonts in a PDF document.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1509 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=966021
- http://www.mozilla.org/security/announce/2014/mfsa2014-27.html
- http://rhn.redhat.com/errata/RHSA-2014-0310.html
- http://rhn.redhat.com/errata/RHSA-2014-0316.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
- http://www.ubuntu.com/usn/USN-2151-1
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
- http://www.securityfocus.com/bid/66425
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1512: Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox…
Published: 2014-03-19T10:55:00 Last Modified: 2020-08-10T18:42:00
Summary
Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1512 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-30.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=982957
- http://www.debian.org/security/2014/dsa-2881
- http://rhn.redhat.com/errata/RHSA-2014-0310.html
- http://rhn.redhat.com/errata/RHSA-2014-0316.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
- http://www.ubuntu.com/usn/USN-2151-1
- http://archives.neohapsis.com/archives/bugtraq/2014-03/0145.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
- http://www.securityfocus.com/bid/66209
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.debian.org/security/2014/dsa-2911
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1514: vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird…
Published: 2014-03-19T10:55:00 Last Modified: 2020-08-05T14:00:00
Summary
vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1514 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=983344
- http://www.mozilla.org/security/announce/2014/mfsa2014-32.html
- http://www.debian.org/security/2014/dsa-2881
- http://rhn.redhat.com/errata/RHSA-2014-0310.html
- http://rhn.redhat.com/errata/RHSA-2014-0316.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
- http://www.ubuntu.com/usn/USN-2151-1
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
- http://www.securityfocus.com/bid/66240
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.debian.org/security/2014/dsa-2911
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1508: The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x…
Published: 2014-03-19T10:55:00 Last Modified: 2020-08-03T16:04:00
Summary
The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1508 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-26.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=963198
- http://www.debian.org/security/2014/dsa-2881
- http://rhn.redhat.com/errata/RHSA-2014-0310.html
- http://rhn.redhat.com/errata/RHSA-2014-0316.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
- http://www.ubuntu.com/usn/USN-2151-1
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
- http://www.securityfocus.com/bid/66426
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.debian.org/security/2014/dsa-2911
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1511: Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey…
Published: 2014-03-19T10:55:00 Last Modified: 2020-08-05T14:07:00
Summary
Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2014-1511 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-29.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=982909
- http://www.debian.org/security/2014/dsa-2881
- http://rhn.redhat.com/errata/RHSA-2014-0310.html
- http://rhn.redhat.com/errata/RHSA-2014-0316.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
- http://www.ubuntu.com/usn/USN-2151-1
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
- http://www.securityfocus.com/bid/66207
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.debian.org/security/2014/dsa-2911
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1505: The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4,…
Published: 2014-03-19T10:55:00 Last Modified: 2020-08-05T13:51:00
Summary
The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1505 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-28.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=941887
- http://www.debian.org/security/2014/dsa-2881
- http://rhn.redhat.com/errata/RHSA-2014-0310.html
- http://rhn.redhat.com/errata/RHSA-2014-0316.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
- http://www.ubuntu.com/usn/USN-2151-1
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
- http://www.securityfocus.com/bid/66418
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- http://www.debian.org/security/2014/dsa-2911
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0101: The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6…
Published: 2014-03-11T13:01:00 Last Modified: 2020-08-25T20:20:00
Summary
The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-0101 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2014/03/04/6
- https://bugzilla.redhat.com/show_bug.cgi?id=1070705
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ec0223ec48a90cb605244b45f7c62de856403729
- https://github.com/torvalds/linux/commit/ec0223ec48a90cb605244b45f7c62de856403729
- http://rhn.redhat.com/errata/RHSA-2014-0328.html
- http://www.securityfocus.com/bid/65943
- http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15317.html
- http://secunia.com/advisories/59216
- http://www.ubuntu.com/usn/USN-2174-1
- http://www.ubuntu.com/usn/USN-2173-1
- http://rhn.redhat.com/errata/RHSA-2014-0432.html
- http://rhn.redhat.com/errata/RHSA-2014-0419.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0069: The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not…
Published: 2014-02-28T06:18:00 Last Modified: 2020-08-26T13:28:00
Summary
The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2014-0069 vulnerability.
References
- https://github.com/torvalds/linux/commit/5d81de8e8667da7135d3a32a964087c0faf5483f
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5d81de8e8667da7135d3a32a964087c0faf5483f
- http://www.openwall.com/lists/oss-security/2014/02/17/4
- http://article.gmane.org/gmane.linux.kernel.cifs/9401
- https://bugzilla.redhat.com/show_bug.cgi?id=1064253
- http://rhn.redhat.com/errata/RHSA-2014-0328.html
- http://www.securityfocus.com/bid/65588
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-4111: Buffer overflow in the ccid_card_vscard_handle_message function in hw/ccid-card-passthru.c in…
Published: 2014-02-26T15:55:00 Last Modified: 2019-04-22T17:48:00
Summary
Buffer overflow in the ccid_card_vscard_handle_message function in hw/ccid-card-passthru.c in QEMU before 0.15.2 and 1.x before 1.0-rc4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VSC_ATR message.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.2
- CVSS: 6.8
- CVSS Vector: AV:A/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2011-4111 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=751310
- http://git.qemu.org/?p=qemu.git;a=log;h=refs/heads/stable-1.0
- http://git.qemu.org/?p=qemu-stable-0.15.git;a=log
- http://rhn.redhat.com/errata/RHSA-2011-1801.html
- http://rhn.redhat.com/errata/RHSA-2011-1777.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0081: Multiple cross-site scripting (XSS) vulnerabilities in…
Published: 2014-02-20T15:27:00 Last Modified: 2019-08-08T15:42:00
Summary
Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 allow remote attackers to inject arbitrary web script or HTML via the (1) format, (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage, or (c) number_to_human helper.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-0081 vulnerability.
References
- https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ
- http://openwall.com/lists/oss-security/2014/02/18/8
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html
- http://rhn.redhat.com/errata/RHSA-2014-0215.html
- http://rhn.redhat.com/errata/RHSA-2014-0306.html
- http://secunia.com/advisories/57376
- http://www.securitytracker.com/id/1029782
- http://www.securityfocus.com/bid/65647
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3404: The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and…
Published: 2014-02-10T18:15:00 Last Modified: 2019-04-22T17:48:00
Summary
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3404 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2012-1200.html
- http://www.openwall.com/lists/oss-security/2012/07/11/17
- https://bugzilla.redhat.com/show_bug.cgi?id=833703
- http://rhn.redhat.com/errata/RHSA-2012-1098.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=12445
- http://www.ubuntu.com/usn/USN-1589-1
- https://security.gentoo.org/glsa/201503-04
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3405: The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and…
Published: 2014-02-10T18:15:00 Last Modified: 2019-04-22T17:48:00
Summary
The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers “desynchronization within the buffer size handling,” a different vulnerability than CVE-2012-3404.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3405 vulnerability.
References
- http://www.ubuntu.com/usn/USN-1589-1
- http://www.openwall.com/lists/oss-security/2012/07/11/17
- https://bugzilla.redhat.com/show_bug.cgi?id=833704
- https://sourceware.org/bugzilla/show_bug.cgi?id=13446
- http://rhn.redhat.com/errata/RHSA-2012-1098.html
- http://rhn.redhat.com/errata/RHSA-2012-1200.html
- https://security.gentoo.org/glsa/201503-04
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3406: The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and…
Published: 2014-02-10T18:15:00 Last Modified: 2019-04-22T17:48:00
Summary
The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not “properly restrict the use of” the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3406 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2012-1097.html
- http://www.ubuntu.com/usn/USN-1589-1
- http://www.openwall.com/lists/oss-security/2012/07/11/17
- https://bugzilla.redhat.com/show_bug.cgi?id=826943
- https://bugzilla.redhat.com/attachment.cgi?id=594722
- http://rhn.redhat.com/errata/RHSA-2012-1200.html
- http://rhn.redhat.com/errata/RHSA-2012-1098.html
- http://rhn.redhat.com/errata/RHSA-2012-1185.html
- https://security.gentoo.org/glsa/201503-04
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1773: virt-v2v before 0.8.4 does not preserve the VNC console password when converting a guest, which…
Published: 2014-02-08T00:55:00 Last Modified: 2019-04-22T17:48:00
Summary
virt-v2v before 0.8.4 does not preserve the VNC console password when converting a guest, which allows local users to bypass the intended VNC authentication by connecting without a password.
Common Weakness Enumeration (CWE): CWE-255: Credentials Management Errors
CWE Description: Weaknesses in this category are related to the management of credentials.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-1773 vulnerability.
References
- http://www.osvdb.org/77558
- http://secunia.com/advisories/47086
- http://rhn.redhat.com/errata/RHSA-2011-1615.html
- https://git.fedorahosted.org/cgit/virt-v2v.git/commit/?id=7e9393129116699d1228bb02b9f65b78584582c1
- https://bugzilla.redhat.com/show_bug.cgi?id=702754
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1479: The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x…
Published: 2014-02-06T05:44:00 Last Modified: 2020-08-10T20:57:00
Summary
The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1479 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-02.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=911864
- http://rhn.redhat.com/errata/RHSA-2014-0132.html
- https://8pecxstudios.com/?page_id=44080
- http://rhn.redhat.com/errata/RHSA-2014-0133.html
- http://secunia.com/advisories/56706
- http://www.ubuntu.com/usn/USN-2102-1
- http://www.debian.org/security/2014/dsa-2858
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html
- http://www.ubuntu.com/usn/USN-2119-1
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html
- http://www.ubuntu.com/usn/USN-2102-2
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90898
- http://www.securitytracker.com/id/1029721
- http://www.securitytracker.com/id/1029720
- http://www.securitytracker.com/id/1029717
- http://www.securityfocus.com/bid/65320
- http://secunia.com/advisories/56922
- http://secunia.com/advisories/56888
- http://secunia.com/advisories/56858
- http://secunia.com/advisories/56787
- http://secunia.com/advisories/56767
- http://secunia.com/advisories/56763
- http://secunia.com/advisories/56761
- http://osvdb.org/102866
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1481: Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey…
Published: 2014-02-06T05:44:00 Last Modified: 2020-08-11T13:14:00
Summary
Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1481 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=936056
- http://www.mozilla.org/security/announce/2014/mfsa2014-13.html
- http://rhn.redhat.com/errata/RHSA-2014-0132.html
- https://8pecxstudios.com/?page_id=44080
- http://rhn.redhat.com/errata/RHSA-2014-0133.html
- http://secunia.com/advisories/56706
- http://www.ubuntu.com/usn/USN-2102-1
- http://www.debian.org/security/2014/dsa-2858
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html
- http://www.ubuntu.com/usn/USN-2119-1
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html
- http://www.ubuntu.com/usn/USN-2102-2
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90883
- http://www.securitytracker.com/id/1029721
- http://www.securitytracker.com/id/1029720
- http://www.securitytracker.com/id/1029717
- http://www.securityfocus.com/bid/65326
- http://secunia.com/advisories/56922
- http://secunia.com/advisories/56888
- http://secunia.com/advisories/56858
- http://secunia.com/advisories/56787
- http://secunia.com/advisories/56767
- http://secunia.com/advisories/56763
- http://secunia.com/advisories/56761
- http://osvdb.org/102863
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1486: Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0,…
Published: 2014-02-06T05:44:00 Last Modified: 2020-08-07T19:37:00
Summary
Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1486 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-08.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=942164
- http://rhn.redhat.com/errata/RHSA-2014-0132.html
- https://8pecxstudios.com/?page_id=44080
- http://rhn.redhat.com/errata/RHSA-2014-0133.html
- http://secunia.com/advisories/56706
- http://www.ubuntu.com/usn/USN-2102-1
- http://www.debian.org/security/2014/dsa-2858
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html
- http://www.ubuntu.com/usn/USN-2119-1
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html
- http://www.ubuntu.com/usn/USN-2102-2
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90890
- http://www.securitytracker.com/id/1029721
- http://www.securitytracker.com/id/1029720
- http://www.securitytracker.com/id/1029717
- http://www.securityfocus.com/bid/65334
- http://secunia.com/advisories/56922
- http://secunia.com/advisories/56888
- http://secunia.com/advisories/56858
- http://secunia.com/advisories/56787
- http://secunia.com/advisories/56767
- http://secunia.com/advisories/56763
- http://secunia.com/advisories/56761
- http://osvdb.org/102872
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1477: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0,…
Published: 2014-02-06T05:44:00 Last Modified: 2020-08-07T19:36:00
Summary
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1477 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=950438
- https://bugzilla.mozilla.org/show_bug.cgi?id=936808
- https://bugzilla.mozilla.org/show_bug.cgi?id=945939
- https://bugzilla.mozilla.org/show_bug.cgi?id=945334
- https://bugzilla.mozilla.org/show_bug.cgi?id=921470
- http://www.mozilla.org/security/announce/2014/mfsa2014-01.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=953114
- https://bugzilla.mozilla.org/show_bug.cgi?id=950000
- https://bugzilla.mozilla.org/show_bug.cgi?id=937132
- https://bugzilla.mozilla.org/show_bug.cgi?id=925896
- https://bugzilla.mozilla.org/show_bug.cgi?id=951366
- https://bugzilla.mozilla.org/show_bug.cgi?id=937697
- http://rhn.redhat.com/errata/RHSA-2014-0132.html
- http://secunia.com/advisories/56706
- http://rhn.redhat.com/errata/RHSA-2014-0133.html
- http://www.ubuntu.com/usn/USN-2102-1
- http://www.debian.org/security/2014/dsa-2858
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html
- https://8pecxstudios.com/?page_id=44080
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html
- http://www.ubuntu.com/usn/USN-2119-1
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html
- http://www.ubuntu.com/usn/USN-2102-2
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90899
- http://www.securitytracker.com/id/1029721
- http://www.securitytracker.com/id/1029720
- http://www.securitytracker.com/id/1029717
- http://www.securityfocus.com/bid/65317
- http://secunia.com/advisories/56888
- http://secunia.com/advisories/56858
- http://secunia.com/advisories/56787
- http://secunia.com/advisories/56767
- http://secunia.com/advisories/56763
- http://secunia.com/advisories/56761
- http://osvdb.org/102864
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1482: RasterImage.cpp in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before…
Published: 2014-02-06T05:44:00 Last Modified: 2020-08-11T13:33:00
Summary
RasterImage.cpp in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent access to discarded data, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect write operations) via crafted image data, as demonstrated by Goo Create.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1482 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-04.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=943803
- http://rhn.redhat.com/errata/RHSA-2014-0132.html
- https://8pecxstudios.com/?page_id=44080
- http://rhn.redhat.com/errata/RHSA-2014-0133.html
- http://secunia.com/advisories/56706
- http://www.ubuntu.com/usn/USN-2102-1
- http://www.debian.org/security/2014/dsa-2858
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html
- http://www.ubuntu.com/usn/USN-2119-1
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html
- http://www.ubuntu.com/usn/USN-2102-2
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90894
- http://www.securitytracker.com/id/1029721
- http://www.securitytracker.com/id/1029720
- http://www.securitytracker.com/id/1029717
- http://www.securityfocus.com/bid/65328
- http://secunia.com/advisories/56922
- http://secunia.com/advisories/56888
- http://secunia.com/advisories/56858
- http://secunia.com/advisories/56787
- http://secunia.com/advisories/56767
- http://secunia.com/advisories/56763
- http://secunia.com/advisories/56761
- http://osvdb.org/102868
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-1487: The Web workers implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3,…
Published: 2014-02-06T05:44:00 Last Modified: 2020-08-11T13:38:00
Summary
The Web workers implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to bypass the Same Origin Policy and obtain sensitive authentication information via vectors involving error messages.
Common Weakness Enumeration (CWE): CWE-346: Origin Validation Error
CWE Description: The software does not properly verify that the source of data or communication is valid.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-1487 vulnerability.
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-09.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=947592
- http://rhn.redhat.com/errata/RHSA-2014-0132.html
- https://8pecxstudios.com/?page_id=44080
- http://rhn.redhat.com/errata/RHSA-2014-0133.html
- http://secunia.com/advisories/56706
- http://www.ubuntu.com/usn/USN-2102-1
- http://www.debian.org/security/2014/dsa-2858
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00005.html
- http://www.ubuntu.com/usn/USN-2119-1
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00004.html
- http://www.ubuntu.com/usn/USN-2102-2
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/129218.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127966.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90889
- http://www.securitytracker.com/id/1029721
- http://www.securitytracker.com/id/1029720
- http://www.securitytracker.com/id/1029717
- http://www.securityfocus.com/bid/65330
- http://secunia.com/advisories/56922
- http://secunia.com/advisories/56888
- http://secunia.com/advisories/56858
- http://secunia.com/advisories/56787
- http://secunia.com/advisories/56767
- http://secunia.com/advisories/56763
- http://secunia.com/advisories/56761
- http://osvdb.org/102873
- http://download.novell.com/Download?buildid=Y2fux-JW1Qc
- http://download.novell.com/Download?buildid=VYQsgaFpQ2k
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0001: Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote…
Published: 2014-01-31T23:55:00 Last Modified: 2019-12-17T15:25:00
Summary
Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-0001 vulnerability.
References
- http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64
- https://bugzilla.redhat.com/show_bug.cgi?id=1054592
- http://osvdb.org/102713
- http://www.osvdb.org/102714
- https://mariadb.com/kb/en/mariadb-5535-changelog/
- http://rhn.redhat.com/errata/RHSA-2014-0189.html
- http://rhn.redhat.com/errata/RHSA-2014-0164.html
- http://rhn.redhat.com/errata/RHSA-2014-0186.html
- http://rhn.redhat.com/errata/RHSA-2014-0173.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:029
- http://www.securityfocus.com/bid/65298
- http://security.gentoo.org/glsa/glsa-201409-04.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90901
- http://www.securitytracker.com/id/1029708
- http://secunia.com/advisories/52161
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-6425: Integer underflow in the pixman_trapezoid_valid macro in pixman.h in Pixman before 0.32.0, as…
Published: 2014-01-18T19:55:00 Last Modified: 2020-10-19T17:42:00
Summary
Integer underflow in the pixman_trapezoid_valid macro in pixman.h in Pixman before 0.32.0, as used in X.Org server and cairo, allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
Common Weakness Enumeration (CWE): CWE-191: Integer Underflow (Wrap or Wraparound)
CWE Description: The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-6425 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2013/12/03/8
- http://www.openwall.com/lists/oss-security/2013/12/04/8
- https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1197921
- https://bugs.freedesktop.org/show_bug.cgi?id=67484
- http://lists.freedesktop.org/archives/pixman/2013-November/003109.html
- http://www.ubuntu.com/usn/USN-2047-1
- http://cgit.freedesktop.org/pixman/commit/?id=5e14da97f16e421d084a9e735be21b1025150f0c
- http://www.debian.org/security/2013/dsa-2823
- http://rhn.redhat.com/errata/RHSA-2013-1869.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00008.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00005.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00097.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-5870: Unspecified vulnerability in Oracle Java SE 7u45 and JavaFX 2.2.45 allows remote attackers to…
Published: 2014-01-15T16:11:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in Oracle Java SE 7u45 and JavaFX 2.2.45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-5870 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.securityfocus.com/bid/64758
- http://www.securitytracker.com/id/1029608
- http://www.securityfocus.com/bid/64929
- http://osvdb.org/101994
- http://secunia.com/advisories/56485
- http://secunia.com/advisories/56535
- http://secunia.com/advisories/56484
- http://rhn.redhat.com/errata/RHSA-2014-0030.html
- http://marc.info/?l=bugtraq&m=139402697611681&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90337
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0420: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.34 and earlier, and…
Published: 2014-01-15T16:08:00 Last Modified: 2019-12-17T15:25:00
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.34 and earlier, and 5.6.14 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Replication.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.8
- CVSS Vector: AV:N/AC:M/Au:M/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: MULTIPLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-0420 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.securityfocus.com/bid/64758
- http://osvdb.org/102077
- http://secunia.com/advisories/56580
- http://www.securityfocus.com/bid/64888
- http://ubuntu.com/usn/usn-2086-1
- http://secunia.com/advisories/56491
- http://rhn.redhat.com/errata/RHSA-2014-0189.html
- http://www.debian.org/security/2014/dsa-2848
- http://rhn.redhat.com/errata/RHSA-2014-0186.html
- http://rhn.redhat.com/errata/RHSA-2014-0173.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://security.gentoo.org/glsa/glsa-201409-04.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90388
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0382: Unspecified vulnerability in Oracle Java SE 7u45 and JavaFX 2.2.45 allows remote attackers to…
Published: 2014-01-15T16:08:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in Oracle Java SE 7u45 and JavaFX 2.2.45 allows remote attackers to affect availability via unknown vectors related to JavaFX.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-0382 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.securityfocus.com/bid/64758
- http://www.securityfocus.com/bid/64936
- http://www.securitytracker.com/id/1029608
- http://secunia.com/advisories/56485
- http://secunia.com/advisories/56535
- http://osvdb.org/102026
- http://secunia.com/advisories/56484
- http://rhn.redhat.com/errata/RHSA-2014-0030.html
- http://marc.info/?l=bugtraq&m=139402697611681&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90355
See also: All popular products CVE Vulnerabilities of redhat
CVE-2014-0418: Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect…
Published: 2014-01-15T16:08:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5889, CVE-2013-5902, CVE-2014-0410, CVE-2014-0415, and CVE-2014-0424.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2014-0418 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.securityfocus.com/bid/64758
- http://osvdb.org/102012
- http://www.securitytracker.com/id/1029608
- http://secunia.com/advisories/56485
- http://secunia.com/advisories/56535
- http://www.securityfocus.com/bid/64917
- http://rhn.redhat.com/errata/RHSA-2014-0030.html
- http://marc.info/?l=bugtraq&m=139402697611681&w=2
- http://marc.info/?l=bugtraq&m=139402749111889&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90344
- https://access.redhat.com/errata/RHSA-2014:0414
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-5904: Unspecified vulnerability in Oracle Java SE 7u45 allows remote attackers to affect…
Published: 2014-01-15T16:08:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in Oracle Java SE 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-5904 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.securityfocus.com/bid/64758
- http://www.securitytracker.com/id/1029608
- http://www.securityfocus.com/bid/64890
- http://osvdb.org/101993
- http://secunia.com/advisories/56485
- http://secunia.com/advisories/56535
- http://rhn.redhat.com/errata/RHSA-2014-0030.html
- http://marc.info/?l=bugtraq&m=139402697611681&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90336
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-5895: Unspecified vulnerability in Oracle Java SE 7u45 and JavaFX 2.2.45 allows remote attackers to…
Published: 2014-01-15T16:08:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in Oracle Java SE 7u45 and JavaFX 2.2.45 allows remote attackers to affect confidentiality via unknown vectors related to JavaFX.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-5895 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.securityfocus.com/bid/64758
- http://www.securitytracker.com/id/1029608
- http://www.securityfocus.com/bid/64906
- http://secunia.com/advisories/56485
- http://secunia.com/advisories/56535
- http://osvdb.org/102022
- http://secunia.com/advisories/56484
- http://rhn.redhat.com/errata/RHSA-2014-0030.html
- http://marc.info/?l=bugtraq&m=139402697611681&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90353
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-5906: Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45 allows remote attackers to…
Published: 2014-01-15T16:08:00 Last Modified: 2020-09-08T13:00:00
Summary
Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install, a different vulnerability than CVE-2013-5905.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-5906 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.securityfocus.com/bid/64758
- http://www.securitytracker.com/id/1029608
- http://www.securityfocus.com/bid/64903
- http://secunia.com/advisories/56485
- http://secunia.com/advisories/56535
- http://osvdb.org/102010
- http://rhn.redhat.com/errata/RHSA-2014-0030.html
- http://marc.info/?l=bugtraq&m=139402697611681&w=2
- http://marc.info/?l=bugtraq&m=139402749111889&w=2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90342
- https://access.redhat.com/errata/RHSA-2014:0414
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2519: Xen in the Linux kernel, when running a guest on a host without hardware assisted paging (HAP),…
Published: 2013-12-27T01:55:00 Last Modified: 2020-12-08T15:25:00
Summary
Xen in the Linux kernel, when running a guest on a host without hardware assisted paging (HAP), allows guest users to cause a denial of service (invalid pointer dereference and hypervisor crash) via the SAHF instruction.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 5.1
- CVSS: 5.5
- CVSS Vector: AV:A/AC:L/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2011-2519 vulnerability.
References
- http://xenbits.xen.org/hg/xen-3.1-testing.hg/rev/15644
- http://rhn.redhat.com/errata/RHSA-2011-1212.html
- https://bugzilla.redhat.com/show_bug.cgi?id=718882
- http://www.openwall.com/lists/oss-security/2011/08/30/1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-6368: The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or…
Published: 2013-12-14T18:08:00 Last Modified: 2019-04-22T17:48:00
Summary
The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 10.0
- Exploitability Score: 1.9
- CVSS: 6.2
- CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-6368 vulnerability.
References
- https://github.com/torvalds/linux/commit/fda4e2e85589191b123d31cdc21fd33ee70f50fd
- http://www.openwall.com/lists/oss-security/2013/12/12/12
- https://bugzilla.redhat.com/show_bug.cgi?id=1032210
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fda4e2e85589191b123d31cdc21fd33ee70f50fd
- http://www.securityfocus.com/bid/64291
- http://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html
- http://rhn.redhat.com/errata/RHSA-2014-0163.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html
- http://www.ubuntu.com/usn/USN-2113-1
- http://www.ubuntu.com/usn/USN-2117-1
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html
- http://www.ubuntu.com/usn/USN-2133-1
- http://www.ubuntu.com/usn/USN-2138-1
- http://www.ubuntu.com/usn/USN-2136-1
- http://www.ubuntu.com/usn/USN-2134-1
- http://www.ubuntu.com/usn/USN-2139-1
- http://www.ubuntu.com/usn/USN-2141-1
- http://www.ubuntu.com/usn/USN-2135-1
- http://rhn.redhat.com/errata/RHSA-2014-0284.html
- http://rhn.redhat.com/errata/RHSA-2013-1801.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1978: Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD)…
Published: 2013-12-12T18:55:00 Last Modified: 2022-02-07T19:09:00
Summary
Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-1978 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2013-1778.html
- https://bugzilla.redhat.com/show_bug.cgi?id=953902
- http://www.securityfocus.com/bid/64098
- https://security.gentoo.org/glsa/201603-01
- http://www.ubuntu.com/usn/USN-2051-1
- http://www.debian.org/security/2013/dsa-2813
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1913: Integer overflow in the load_image function in file-xwd.c in the X Window Dump (XWD) plug-in in…
Published: 2013-12-12T18:55:00 Last Modified: 2022-02-07T19:12:00
Summary
Integer overflow in the load_image function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier, when used with glib before 2.24, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large color entries value in an X Window System (XWD) image dump.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-1913 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=947868
- http://rhn.redhat.com/errata/RHSA-2013-1778.html
- http://www.securityfocus.com/bid/64105
- https://security.gentoo.org/glsa/201603-01
- http://www.ubuntu.com/usn/USN-2051-1
- http://www.debian.org/security/2013/dsa-2813
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4566: mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does…
Published: 2013-12-12T18:55:00 Last Modified: 2019-04-22T17:48:00
Summary
mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 4.9
- Exploitability Score: 4.9
- CVSS: 4.0
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4566 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1016832
- http://rhn.redhat.com/errata/RHSA-2013-1779.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00118.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-5618: Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user…
Published: 2013-12-11T15:55:00 Last Modified: 2020-08-12T14:40:00
Summary
Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-5618 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=926361
- http://www.mozilla.org/security/announce/2013/mfsa2013-109.html
- http://www.ubuntu.com/usn/USN-2053-1
- http://www.ubuntu.com/usn/USN-2052-1
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2013-1812.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html
- http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html
- http://www.securitytracker.com/id/1029470
- http://www.securitytracker.com/id/1029476
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-5612: Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23…
Published: 2013-12-11T15:55:00 Last Modified: 2020-08-21T18:42:00
Summary
Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-5612 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=871161
- http://www.mozilla.org/security/announce/2013/mfsa2013-106.html
- http://www.ubuntu.com/usn/USN-2052-1
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2013-1812.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html
- http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html
- http://www.securityfocus.com/bid/64205
- http://www.securitytracker.com/id/1029470
- http://www.securitytracker.com/id/1029476
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-5609: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0,…
Published: 2013-12-11T15:55:00 Last Modified: 2020-08-12T14:42:00
Summary
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-5609 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=886850
- http://www.mozilla.org/security/announce/2013/mfsa2013-104.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=937582
- https://bugzilla.mozilla.org/show_bug.cgi?id=922009
- https://bugzilla.mozilla.org/show_bug.cgi?id=905382
- http://www.ubuntu.com/usn/USN-2053-1
- http://www.ubuntu.com/usn/USN-2052-1
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2013-1812.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html
- http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html
- http://www.securitytracker.com/id/1029470
- http://www.securitytracker.com/id/1029476
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-5613: Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox…
Published: 2013-12-11T15:55:00 Last Modified: 2020-08-12T14:45:00
Summary
Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-5613 vulnerability.
References
- http://www.mozilla.org/security/announce/2013/mfsa2013-114.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=932449
- https://bugzilla.mozilla.org/show_bug.cgi?id=930381
- http://www.ubuntu.com/usn/USN-2053-1
- http://www.ubuntu.com/usn/USN-2052-1
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2013-1812.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html
- http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html
- http://www.securitytracker.com/id/1029470
- http://www.securitytracker.com/id/1029476
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-5616: Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in…
Published: 2013-12-11T15:55:00 Last Modified: 2020-08-12T14:45:00
Summary
Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-5616 vulnerability.
References
- http://www.mozilla.org/security/announce/2013/mfsa2013-108.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=938341
- http://www.ubuntu.com/usn/USN-2053-1
- http://www.ubuntu.com/usn/USN-2052-1
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2013-1812.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html
- http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html
- http://www.securitytracker.com/id/1029470
- http://www.securitytracker.com/id/1029476
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-5614: Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox…
Published: 2013-12-11T15:55:00 Last Modified: 2020-08-21T18:41:00
Summary
Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
Common Weakness Enumeration (CWE): CWE-1021: Improper Restriction of Rendered UI Layers or Frames
CWE Description: The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-5614 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=886262
- http://www.mozilla.org/security/announce/2013/mfsa2013-107.html
- http://www.ubuntu.com/usn/USN-2052-1
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2013-1812.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html
- http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html
- http://www.securitytracker.com/id/1029470
- http://www.securitytracker.com/id/1029476
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-6671: The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before…
Published: 2013-12-11T15:55:00 Last Modified: 2020-08-12T14:39:00
Summary
The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-6671 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=930281
- http://www.mozilla.org/security/announce/2013/mfsa2013-111.html
- http://www.ubuntu.com/usn/USN-2053-1
- http://www.ubuntu.com/usn/USN-2052-1
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00119.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00121.html
- http://www.securityfocus.com/bid/64212
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2013-1812.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00085.html
- http://lists.opensuse.org/opensuse-security-announce/2013-12/msg00010.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-January/125470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124108.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00087.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00086.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124257.html
- http://www.securitytracker.com/id/1029470
- http://www.securitytracker.com/id/1029476
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- https://security.gentoo.org/glsa/201504-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2133: The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise…
Published: 2013-12-06T17:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) before 6.2.0, does not properly enforce the method level restrictions for JAX-WS Service endpoints, which allows remote authenticated users to access otherwise restricted JAX-WS handlers by leveraging permissions to the EJB class.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.0
- CVSS: 5.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-2133 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2013-1785.html
- http://rhn.redhat.com/errata/RHSA-2013-1784.html
- http://rhn.redhat.com/errata/RHSA-2013-1786.html
- http://www.securitytracker.com/id/1029431
- http://rhn.redhat.com/errata/RHSA-2015-0851.html
- http://rhn.redhat.com/errata/RHSA-2015-0850.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0223: The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a…
Published: 2013-11-23T18:55:00 Last Modified: 2021-05-13T20:28:00
Summary
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-0223 vulnerability.
References
- https://bugzilla.novell.com/show_bug.cgi?id=798541
- http://rhn.redhat.com/errata/RHSA-2013-1652.html
- https://bugzilla.redhat.com/show_bug.cgi?id=903466
- https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0221: The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a…
Published: 2013-11-23T18:55:00 Last Modified: 2021-05-13T20:29:00
Summary
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2013-0221 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=903464
- https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19
- https://bugzilla.novell.com/show_bug.cgi?id=798538
- http://rhn.redhat.com/errata/RHSA-2013-1652.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0222: The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a…
Published: 2013-11-23T18:55:00 Last Modified: 2021-05-13T20:29:00
Summary
The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-0222 vulnerability.
References
- https://bugzilla.novell.com/show_bug.cgi?id=796243
- https://build.opensuse.org/request/show/149348#diff_headline_coreutils-i18n-patch_diff_action_0_submit_0_19
- http://rhn.redhat.com/errata/RHSA-2013-1652.html
- https://bugzilla.redhat.com/show_bug.cgi?id=903465
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-0787: The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_rename_fails is set…
Published: 2013-11-23T18:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The clone_file function in transfer.c in Augeas before 1.0.0, when copy_if_rename_fails is set and EXDEV or EBUSY is returned by the rename function, allows local users to overwrite arbitrary files and obtain sensitive information via a bind mount on the (1) .augsave or (2) destination file when using the backup save option, or (3) .augnew file when using the newfile save option.
Scores
- Impact Score: 6.4
- Exploitability Score: 1.9
- CVSS: 3.7
- CVSS Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-0787 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=772261
- http://augeas.net/news.html
- http://secunia.com/advisories/55811
- https://github.com/hercules-team/augeas/commit/b8de6a8c
- http://rhn.redhat.com/errata/RHSA-2013-1537.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2561: OpenFabrics ibutils 1.5.7 allows local users to overwrite arbitrary files via a symlink attack on…
Published: 2013-11-23T18:55:00 Last Modified: 2019-04-22T17:48:00
Summary
OpenFabrics ibutils 1.5.7 allows local users to overwrite arbitrary files via a symlink attack on (1) ibdiagnet.db, (2) ibdiagnet.fdbs, (3) ibdiagnet_ibis.log, (4) ibdiagnet.log, (5) ibdiagnet.lst, (6) ibdiagnet.mcfdbs, (7) ibdiagnet.pkey, (8) ibdiagnet.psl, (9) ibdiagnet.slvl, or (10) ibdiagnet.sm in /tmp/.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 9.2
- Exploitability Score: 3.4
- CVSS: 6.3
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-2561 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2013/03/26/4
- http://seclists.org/fulldisclosure/2013/Mar/87
- http://www.openwall.com/lists/oss-security/2013/03/26/1
- http://rhn.redhat.com/errata/RHSA-2013-1661.html
- http://www.openwall.com/lists/oss-security/2013/03/19/8
- http://www.openwall.com/lists/oss-security/2013/03/26/11
- https://bugzilla.redhat.com/show_bug.cgi?id=927430
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/58335
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0281: Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management…
Published: 2013-11-23T11:55:00 Last Modified: 2019-04-22T17:48:00
Summary
Pacemaker 1.1.10, when remote Cluster Information Base (CIB) configuration or resource management is enabled, does not limit the duration of connections to the blocking sockets, which allows remote attackers to cause a denial of service (connection blocking).
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0281 vulnerability.
References
- https://github.com/ClusterLabs/pacemaker/commit/564f7cc2a51dcd2f28ab12a13394f31be5aa3c93
- http://rhn.redhat.com/errata/RHSA-2013-1635.html
- https://bugzilla.redhat.com/show_bug.cgi?id=891922
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1813: util-linux/mdev.c in BusyBox before 1.21.0 uses 0777 permissions for parent directories when…
Published: 2013-11-23T11:55:00 Last Modified: 2020-08-27T20:15:00
Summary
util-linux/mdev.c in BusyBox before 1.21.0 uses 0777 permissions for parent directories when creating nested directories under /dev/, which allows local users to have unknown impact and attack vectors.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-1813 vulnerability.
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701965
- http://rhn.redhat.com/errata/RHSA-2013-1732.html
- http://git.busybox.net/busybox/commit/?id=4609f477c7e043a4f6147dfe6e86b775da2ef784
- http://lists.busybox.net/pipermail/busybox/2013-January/078864.html
- https://support.t-mobile.com/docs/DOC-21994
- http://seclists.org/fulldisclosure/2019/Jun/18
- https://seclists.org/bugtraq/2019/Jun/14
- http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
- http://seclists.org/fulldisclosure/2020/Mar/15
- http://seclists.org/fulldisclosure/2020/Aug/20
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4485: 389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote…
Published: 2013-11-23T11:55:00 Last Modified: 2019-04-22T17:48:00
Summary
389 Directory Server 1.2.11.15 (aka Red Hat Directory Server before 8.2.11-14) allows remote authenticated users to cause a denial of service (crash) via multiple @ characters in a GER attribute list in a search request.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4485 vulnerability.
References
- http://secunia.com/advisories/55765
- http://rhn.redhat.com/errata/RHSA-2013-1752.html
- http://rhn.redhat.com/errata/RHSA-2013-1753.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4481: Race condition in Luci 0.26.0 creates /var/lib/luci/etc/luci.ini with world-readable permissions…
Published: 2013-11-23T11:55:00 Last Modified: 2019-04-22T17:48:00
Summary
Race condition in Luci 0.26.0 creates /var/lib/luci/etc/luci.ini with world-readable permissions before restricting the permissions, which allows local users to read the file and obtain sensitive information such as “authentication secrets.”
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-4481 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4482: Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when…
Published: 2013-11-23T11:55:00 Last Modified: 2019-04-22T17:48:00
Summary
Untrusted search path vulnerability in python-paste-script (aka paster) in Luci 0.26.0, when started using the initscript, allows local users to gain privileges via a Trojan horse .egg-info file in the (1) current working directory or (2) its parent directories.
Scores
- Impact Score: 10.0
- Exploitability Score: 1.9
- CVSS: 6.2
- CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-4482 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4282: Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0…
Published: 2013-11-02T19:55:00 Last Modified: 2019-04-22T17:48:00
Summary
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4282 vulnerability.
References
- http://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
- http://rhn.redhat.com/errata/RHSA-2013-1460.html
- http://rhn.redhat.com/errata/RHSA-2013-1474.html
- http://rhn.redhat.com/errata/RHSA-2013-1473.html
- http://www.ubuntu.com/usn/USN-2027-1
- http://www.debian.org/security/2014/dsa-2839
- http://www.securityfocus.com/bid/63408
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00008.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4299: Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6…
Published: 2013-10-24T10:53:00 Last Modified: 2019-04-22T17:48:00
Summary
Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 6.4
- Exploitability Score: 6.8
- CVSS: 6.0
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4299 vulnerability.
References
- https://github.com/torvalds/linux/commit/e9c6a182649f4259db704ae15a91ac820e63b0ca
- https://bugzilla.redhat.com/show_bug.cgi?id=1004233
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca
- http://rhn.redhat.com/errata/RHSA-2013-1450.html
- http://rhn.redhat.com/errata/RHSA-2013-1449.html
- http://rhn.redhat.com/errata/RHSA-2013-1436.html
- http://rhn.redhat.com/errata/RHSA-2013-1460.html
- http://www.ubuntu.com/usn/USN-2043-1
- http://www.ubuntu.com/usn/USN-2042-1
- http://www.ubuntu.com/usn/USN-2044-1
- http://www.ubuntu.com/usn/USN-2045-1
- http://rhn.redhat.com/errata/RHSA-2013-1520.html
- http://www.ubuntu.com/usn/USN-2046-1
- http://www.ubuntu.com/usn/USN-2041-1
- http://www.ubuntu.com/usn/USN-2040-1
- http://www.ubuntu.com/usn/USN-2049-1
- http://rhn.redhat.com/errata/RHSA-2013-1490.html
- http://www.ubuntu.com/usn/USN-2050-1
- http://rhn.redhat.com/errata/RHSA-2013-1860.html
- http://www.ubuntu.com/usn/USN-2066-1
- http://www.ubuntu.com/usn/USN-2067-1
- http://rhn.redhat.com/errata/RHSA-2013-1783.html
- http://rhn.redhat.com/errata/RHSA-2013-1519.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://www.ubuntu.com/usn/USN-2016-1
- http://www.ubuntu.com/usn/USN-2015-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4287: Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb…
Published: 2013-10-17T23:55:00 Last Modified: 2019-04-22T17:48:00
Summary
Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
Common Weakness Enumeration (CWE): CWE-310: Cryptographic Issues
CWE Description: Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4287 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2013-1427.html
- http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html
- http://www.openwall.com/lists/oss-security/2013/09/10/1
- http://secunia.com/advisories/55381
- http://rhn.redhat.com/errata/RHSA-2013-1441.html
- http://rhn.redhat.com/errata/RHSA-2013-1523.html
- http://rhn.redhat.com/errata/RHSA-2013-1852.html
- http://rhn.redhat.com/errata/RHSA-2014-0207.html
- https://puppet.com/security/cve/cve-2013-4287
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4397: Multiple integer overflows in the th_read function in lib/block.c in libtar before 1.2.20 allow…
Published: 2013-10-17T23:55:00 Last Modified: 2019-04-22T17:48:00
Summary
Multiple integer overflows in the th_read function in lib/block.c in libtar before 1.2.20 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) name or (2) link in an archive, which triggers a heap-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4397 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2013/10/10/4
- http://www.openwall.com/lists/oss-security/2013/10/10/6
- http://secunia.com/advisories/55188
- http://rhn.redhat.com/errata/RHSA-2013-1418.html
- http://www.securityfocus.com/bid/62922
- http://secunia.com/advisories/55253
- http://repo.or.cz/w/libtar.git/commitdiff/45448e8bae671c2f7e80b860ae0fc0cedf2bdc04
- http://www.securitytracker.com/id/1029166
- https://lists.feep.net:8080/pipermail/libtar/2013-October/000361.html
- http://www.debian.org/security/2013/dsa-2817
- http://www.securitytracker.com/id/1040106
- https://source.android.com/security/bulletin/2018-01-01
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4345: Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel…
Published: 2013-10-10T10:55:00 Last Modified: 2021-07-15T19:16:00
Summary
Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4345 vulnerability.
References
- http://marc.info/?l=linux-crypto-vger&m=137942122902845&w=2
- https://bugzilla.redhat.com/show_bug.cgi?id=1007690
- http://rhn.redhat.com/errata/RHSA-2013-1449.html
- http://rhn.redhat.com/errata/RHSA-2013-1490.html
- http://rhn.redhat.com/errata/RHSA-2013-1645.html
- http://www.ubuntu.com/usn/USN-2071-1
- http://www.ubuntu.com/usn/USN-2075-1
- http://www.ubuntu.com/usn/USN-2068-1
- http://www.ubuntu.com/usn/USN-2070-1
- http://www.ubuntu.com/usn/USN-2064-1
- http://www.ubuntu.com/usn/USN-2076-1
- http://www.ubuntu.com/usn/USN-2074-1
- http://www.ubuntu.com/usn/USN-2072-1
- http://www.ubuntu.com/usn/USN-2065-1
- http://www.ubuntu.com/usn/USN-2110-1
- http://www.ubuntu.com/usn/USN-2109-1
- http://www.ubuntu.com/usn/USN-2158-1
- http://www.securityfocus.com/bid/62740
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4342: xinetd does not enforce the user and group configuration directives for TCPMUX services, which…
Published: 2013-10-10T00:55:00 Last Modified: 2019-04-22T17:48:00
Summary
xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 10.0
- Exploitability Score: 4.9
- CVSS: 7.6
- CVSS Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4342 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2013-1409.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1006100
- https://github.com/xinetd-org/xinetd/pull/10
- https://security.gentoo.org/glsa/201611-06
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4332: Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and…
Published: 2013-10-09T22:55:00 Last Modified: 2017-07-01T01:29:00
Summary
Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4332 vulnerability.
References
- https://sourceware.org/bugzilla/show_bug.cgi?id=15855
- http://www.openwall.com/lists/oss-security/2013/09/12/6
- https://sourceware.org/bugzilla/show_bug.cgi?id=15856
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4332
- https://sourceware.org/bugzilla/show_bug.cgi?id=15857
- http://rhn.redhat.com/errata/RHSA-2013-1411.html
- http://secunia.com/advisories/55113
- http://www.ubuntu.com/usn/USN-1991-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:284
- http://rhn.redhat.com/errata/RHSA-2013-1605.html
- http://www.securityfocus.com/bid/62324
- https://security.gentoo.org/glsa/201503-04
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4344: Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has…
Published: 2013-10-04T17:55:00 Last Modified: 2020-08-11T15:21:00
Summary
Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-4344 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2013/10/02/2
- http://osvdb.org/98028
- http://www.securityfocus.com/bid/62773
- http://article.gmane.org/gmane.comp.emulators.qemu/237191
- http://rhn.redhat.com/errata/RHSA-2013-1754.html
- http://rhn.redhat.com/errata/RHSA-2013-1553.html
- http://www.ubuntu.com/usn/USN-2092-1
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4311: libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows…
Published: 2013-10-03T21:55:00 Last Modified: 2019-04-22T17:48:00
Summary
libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition in pkcheck via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-4311 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2013/09/18/6
- http://wiki.libvirt.org/page/Maintenance_Releases
- http://rhn.redhat.com/errata/RHSA-2013-1272.html
- http://www.ubuntu.com/usn/USN-1954-1
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2013-1460.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4288: Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit…
Published: 2013-10-03T21:55:00 Last Modified: 2020-11-16T20:11:00
Summary
Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the –process (unix-process) option for authorization to pkcheck.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-4288 vulnerability.
References
- http://www.ubuntu.com/usn/USN-1953-1
- http://rhn.redhat.com/errata/RHSA-2013-1270.html
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1002375
- http://www.openwall.com/lists/oss-security/2013/09/18/4
- http://seclists.org/oss-sec/2013/q3/626
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2013-1460.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00062.html
- http://lists.opensuse.org/opensuse-updates/2013-11/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4324: spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure…
Published: 2013-10-03T21:55:00 Last Modified: 2019-06-17T13:55:00
Summary
spice-gtk 0.14, and possibly other versions, invokes the polkit authority using the insecure polkit_unix_process_new API function, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-4324 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2013/09/18/6
- http://www.securityfocus.com/bid/62538
- http://secunia.com/advisories/54947
- http://rhn.redhat.com/errata/RHSA-2013-1273.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00031.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4326: RealtimeKit (aka rtkit) 0.5 does not properly use D-Bus for communication with a polkit…
Published: 2013-10-03T21:55:00 Last Modified: 2019-04-22T17:48:00
Summary
RealtimeKit (aka rtkit) 0.5 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-4326 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1006677
- http://rhn.redhat.com/errata/RHSA-2013-1282.html
- http://www.openwall.com/lists/oss-security/2013/09/18/6
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00022.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00051.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2231: Unquoted Windows search path vulnerability in the QEMU Guest Agent service for Red Hat Enterprise…
Published: 2013-10-01T17:55:00 Last Modified: 2019-04-22T17:48:00
Summary
Unquoted Windows search path vulnerability in the QEMU Guest Agent service for Red Hat Enterprise Linux Desktop 6, HPC Node 6, Server 6, Workstation 6, Desktop Supplementary 6, Server Supplementary 6, Supplementary AUS 6.4, Supplementary EUS 6.4.z, and Workstation Supplementary 6, when installing on Windows, allows local users to gain privileges via a crafted program in an unspecified folder.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-2231 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2013-1100.html
- http://rhn.redhat.com/errata/RHSA-2013-1101.html
- https://bugzilla.redhat.com/show_bug.cgi?id=980757
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4296: The remoteDispatchDomainMemoryStats function in daemon/remote.c in libvirt 0.9.1 through…
Published: 2013-09-30T21:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The remoteDispatchDomainMemoryStats function in daemon/remote.c in libvirt 0.9.1 through 0.10.1.x, 0.10.2.x before 0.10.2.8, 1.0.x before 1.0.5.6, and 1.1.x before 1.1.2 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a crafted RPC call.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4296 vulnerability.
References
- http://wiki.libvirt.org/page/Maintenance_Releases
- http://rhn.redhat.com/errata/RHSA-2013-1272.html
- http://libvirt.org/git/?p=libvirt.git;a=commit;h=e7f400a110e2e3673b96518170bfea0855dd82c0
- https://bugzilla.redhat.com/show_bug.cgi?id=1006173
- http://www.ubuntu.com/usn/USN-1954-1
- http://www.debian.org/security/2013/dsa-2764
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00023.html
- http://lists.opensuse.org/opensuse-updates/2013-10/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2013-1460.html
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2217: cache.py in Suds 0.4, when tempdir is set to None, allows local users to redirect SOAP queries…
Published: 2013-09-23T20:55:00 Last Modified: 2019-04-22T17:48:00
Summary
cache.py in Suds 0.4, when tempdir is set to None, allows local users to redirect SOAP queries and possibly have other unspecified impact via a symlink attack on a cache file with a predictable name in /tmp/suds/.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 2.9
- Exploitability Score: 1.9
- CVSS: 1.2
- CVSS Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-2217 vulnerability.
References
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00062.html
- http://www.openwall.com/lists/oss-security/2013/06/27/8
- https://bugzilla.redhat.com/show_bug.cgi?id=978696
- http://www.ubuntu.com/usn/USN-2008-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1824: The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read…
Published: 2013-09-16T13:02:00 Last Modified: 2019-04-22T17:48:00
Summary
The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-1824 vulnerability.
References
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
- http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-1824.html
- http://support.apple.com/kb/HT5880
- https://bugzilla.redhat.com/show_bug.cgi?id=918187
- http://git.php.net/?p=php-src.git;a=commit;h=afe98b7829d50806559acac9b530acb8283c3bf4
- http://git.php.net/?p=php-src.git;a=commit;h=188c196d4da60bdde9190d2fc532650d17f7af2d
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1872: The Intel drivers in Mesa 8.0.x and 9.0.x allow context-dependent attackers to cause a denial of…
Published: 2013-08-19T23:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The Intel drivers in Mesa 8.0.x and 9.0.x allow context-dependent attackers to cause a denial of service (reachable assertion and crash) and possibly execute arbitrary code via vectors involving 3d graphics that trigger an out-of-bounds array access, related to the fs_visitor::remove_dead_constants function. NOTE: this issue might be related to CVE-2013-0796.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-1872 vulnerability.
References
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00019.html
- http://www.securityfocus.com/bid/60285
- http://www.debian.org/security/2013/dsa-2704
- http://www.ubuntu.com/usn/USN-1888-1
- https://bugzilla.redhat.com/show_bug.cgi?id=923584
- https://bugs.freedesktop.org/show_bug.cgi?id=59429
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2013-0897.html
- http://advisories.mageia.org/MGASA-2013-0190.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2175: HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other…
Published: 2013-08-19T13:07:00 Last Modified: 2016-12-07T23:43:00
Summary
HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other “hdr_*” functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable.
Common Weakness Enumeration (CWE): CWE-284: Improper Access Control
CWE Description: The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-2175 vulnerability.
References
- http://marc.info/?l=haproxy&m=137147915029705&w=2
- http://rhn.redhat.com/errata/RHSA-2013-1120.html
- http://secunia.com/advisories/54344
- https://bugzilla.redhat.com/show_bug.cgi?id=974259
- http://www.ubuntu.com/usn/USN-1889-1
- http://www.debian.org/security/2013/dsa-2711
- http://rhn.redhat.com/errata/RHSA-2013-1204.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4248: The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x…
Published: 2013-08-18T02:52:00 Last Modified: 2016-11-28T19:09:00
Summary
The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a ‘\0’ character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4248 vulnerability.
References
- http://git.php.net/?p=php-src.git;a=commit;h=2874696a5a8d46639d261571f915c493cd875897
- http://www.php.net/ChangeLog-5.php
- http://www.debian.org/security/2013/dsa-2742
- http://www.ubuntu.com/usn/USN-1937-1
- http://secunia.com/advisories/54657
- http://secunia.com/advisories/54478
- http://rhn.redhat.com/errata/RHSA-2013-1307.html
- http://secunia.com/advisories/55078
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00125.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00126.html
- http://rhn.redhat.com/errata/RHSA-2013-1615.html
- http://www.securitytracker.com/id/1028924
- http://support.apple.com/kb/HT6150
- http://secunia.com/advisories/59652
- http://marc.info/?l=bugtraq&m=141390017113542&w=2
- http://www.securityfocus.com/bid/61776
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4124: Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before…
Published: 2013-08-06T02:56:00 Last Modified: 2018-10-30T16:27:00
Summary
Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2013-4124 vulnerability.
References
- http://ftp.samba.org/pub/samba/patches/security/samba-4.0.7-CVE-2013-4124.patch
- https://bugzilla.redhat.com/show_bug.cgi?id=984401
- http://www.samba.org/samba/history/samba-3.6.17.html
- http://www.samba.org/samba/history/samba-4.0.8.html
- http://www.samba.org/samba/security/CVE-2013-4124
- http://www.samba.org/samba/history/samba-3.5.22.html
- http://www.securitytracker.com/id/1028882
- http://archives.neohapsis.com/archives/bugtraq/2013-08/0028.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00015.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:207
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012.html
- http://osvdb.org/95969
- http://secunia.com/advisories/54519
- http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114011.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113591.html
- http://www.ubuntu.com/usn/USN-1966-1
- http://rhn.redhat.com/errata/RHSA-2013-1310.html
- http://rhn.redhat.com/errata/RHSA-2013-1543.html
- http://rhn.redhat.com/errata/RHSA-2013-1542.html
- http://rhn.redhat.com/errata/RHSA-2014-0305.html
- http://security.gentoo.org/glsa/glsa-201502-15.xml
- http://marc.info/?l=bugtraq&m=141660010015249&w=2
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/86185
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2174: Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl…
Published: 2013-07-31T13:20:00 Last Modified: 2019-04-22T17:48:00
Summary
Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a “%” (percent) character.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-2174 vulnerability.
References
- http://www.ubuntu.com/usn/USN-1894-1
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html
- http://rhn.redhat.com/errata/RHSA-2013-0983.html
- https://github.com/bagder/curl/commit/192c4f788d48f82c03e9cef40013f34370e90737
- http://www.debian.org/security/2013/dsa-2713
- http://curl.haxx.se/docs/adv_20130622.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/60737
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-4854: The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1,…
Published: 2013-07-29T13:59:00 Last Modified: 2019-04-22T17:48:00
Summary
The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-4854 vulnerability.
References
- https://kb.isc.org/article/AA-01016
- https://kb.isc.org/article/AA-01015
- http://secunia.com/advisories/54432
- http://secunia.com/advisories/54211
- http://secunia.com/advisories/54134
- http://secunia.com/advisories/54207
- http://www.securitytracker.com/id/1028838
- http://secunia.com/advisories/54185
- http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113251.html
- http://rhn.redhat.com/errata/RHSA-2013-1115.html
- http://www.freebsd.org/security/advisories/FreeBSD-SA-13:07.bind.asc
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00004.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113108.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:202
- http://www.securityfocus.com/bid/61479
- http://secunia.com/advisories/54323
- http://rhn.redhat.com/errata/RHSA-2013-1114.html
- http://archives.neohapsis.com/archives/bugtraq/2013-08/0030.html
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00018.html
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03922396
- https://kc.mcafee.com/corporate/index?page=content&id=SB10052
- http://www.zerodayinitiative.com/advisories/ZDI-13-210/
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
- https://support.apple.com/kb/HT6536
- http://linux.oracle.com/errata/ELSA-2014-1244
- https://exchange.xforce.ibmcloud.com/vulnerabilities/86004
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19561
- http://www.ubuntu.com/usn/USN-1910-1
- http://www.debian.org/security/2013/dsa-2728
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1935: A certain Red Hat patch to the KVM subsystem in the kernel package before 2.6.32-358.11.1.el6 on…
Published: 2013-07-16T14:08:00 Last Modified: 2019-04-22T17:48:00
Summary
A certain Red Hat patch to the KVM subsystem in the kernel package before 2.6.32-358.11.1.el6 on Red Hat Enterprise Linux (RHEL) 6 does not properly implement the PV EOI feature, which allows guest OS users to cause a denial of service (host OS crash) by leveraging a time window during which interrupts are disabled but copy_to_user function calls are possible.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.9
- Exploitability Score: 5.5
- CVSS: 5.7
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2013-1935 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2013-0911.html
- https://bugzilla.redhat.com/show_bug.cgi?id=949981
- https://rhn.redhat.com/errata/RHSA-2013-0907.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1943: The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are…
Published: 2013-07-16T14:08:00 Last Modified: 2020-08-03T15:58:00
Summary
The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest’s physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/x86/kvm/paging_tmpl.h and virt/kvm/kvm_main.c.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-1943 vulnerability.
References
- http://web.archive.org/web/20130329070349/http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0
- https://bugzilla.redhat.com/show_bug.cgi?id=950490
- https://github.com/torvalds/linux/commit/fa3d315a4ce2c0891cdde262562e710d95fba19e
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fa3d315a4ce2c0891cdde262562e710d95fba19e
- http://www.ubuntu.com/usn/USN-1939-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2188: A certain Red Hat patch to the do_filp_open function in fs/namei.c in the kernel package before…
Published: 2013-07-16T14:08:00 Last Modified: 2019-04-22T17:48:00
Summary
A certain Red Hat patch to the do_filp_open function in fs/namei.c in the kernel package before 2.6.32-358.11.1.el6 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle failure to obtain write permissions, which allows local users to cause a denial of service (system crash) by leveraging access to a filesystem that is mounted read-only.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-2188 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1976: The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of…
Published: 2013-07-09T17:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-1976 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2013-0871.html
- https://bugzilla.redhat.com/show_bug.cgi?id=927622
- http://rhn.redhat.com/errata/RHSA-2013-0872.html
- http://rhn.redhat.com/errata/RHSA-2013-0869.html
- http://rhn.redhat.com/errata/RHSA-2013-0870.html
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00013.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2051: The Tomcat 6 DIGEST authentication functionality as used in Red Hat Enterprise Linux 6 allows…
Published: 2013-07-09T17:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The Tomcat 6 DIGEST authentication functionality as used in Red Hat Enterprise Linux 6 allows remote attackers to bypass intended access restrictions by performing a replay attack after a nonce becomes stale. NOTE: this issue is due to an incomplete fix for CVE-2012-5887.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-2051 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=959047
- http://rhn.redhat.com/errata/RHSA-2013-0869.html
- http://www.securityfocus.com/bid/60187
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2164: The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10…
Published: 2013-07-04T21:55:00 Last Modified: 2021-07-15T19:16:00
Summary
The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-2164 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=973100
- http://www.openwall.com/lists/oss-security/2013/06/10/9
- http://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/drivers/cdrom/cdrom.c?id=050e4b8fb7cdd7096c987a9cd556029c622c7fe2
- http://www.ubuntu.com/usn/USN-1912-1
- http://www.ubuntu.com/usn/USN-1913-1
- http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html
- http://www.ubuntu.com/usn/USN-1942-1
- http://www.ubuntu.com/usn/USN-1941-1
- http://www.debian.org/security/2013/dsa-2766
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html
- http://rhn.redhat.com/errata/RHSA-2013-1645.html
- http://rhn.redhat.com/errata/RHSA-2013-1166.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2224: A certain Red Hat patch for the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows…
Published: 2013-07-04T21:55:00 Last Modified: 2019-04-22T17:48:00
Summary
A certain Red Hat patch for the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows local users to cause a denial of service (invalid free operation and system crash) or possibly gain privileges via a sendmsg system call with the IP_RETOPTS option, as demonstrated by hemlock.c. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-3552.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-2224 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2013/06/30/7
- https://bugzilla.redhat.com/show_bug.cgi?id=979936
- http://rhn.redhat.com/errata/RHSA-2013-1450.html
- http://rhn.redhat.com/errata/RHSA-2013-1166.html
- http://rhn.redhat.com/errata/RHSA-2013-1173.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2693: The perf subsystem in the kernel package 2.6.32-122.el6.x86_64 in Red Hat Enterprise Linux (RHEL)…
Published: 2013-06-08T13:05:00 Last Modified: 2019-04-22T17:48:00
Summary
The perf subsystem in the kernel package 2.6.32-122.el6.x86_64 in Red Hat Enterprise Linux (RHEL) 6 does not properly handle NMIs, which might allow local users to cause a denial of service (excessive log messages) via unspecified vectors.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-2693 vulnerability.
References
- https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=fadca7bdc43b02f518585d9547019966415cadfd
- https://bugzilla.redhat.com/show_bug.cgi?id=688547
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2942: A certain Red Hat patch to the __br_deliver function in net/bridge/br_forward.c in the Linux…
Published: 2013-06-08T13:05:00 Last Modified: 2013-06-10T04:00:00
Summary
A certain Red Hat patch to the __br_deliver function in net/bridge/br_forward.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging connectivity to a network interface that uses an Ethernet bridge device.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-2942 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=730917
- http://www.openwall.com/lists/oss-security/2011/10/24/3
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3347: A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6…
Published: 2013-06-08T13:05:00 Last Modified: 2019-04-22T17:48:00
Summary
A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.2
- CVSS: 4.6
- CVSS Vector: AV:A/AC:H/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2011-3347 vulnerability.
References
- https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=fadca7bdc43b02f518585d9547019966415cadfd
- https://bugzilla.redhat.com/show_bug.cgi?id=736425
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3593: A certain Red Hat patch to the vlan_hwaccel_do_receive function in net/8021q/vlan_core.c in the…
Published: 2013-06-08T13:05:00 Last Modified: 2019-04-22T17:48:00
Summary
A certain Red Hat patch to the vlan_hwaccel_do_receive function in net/8021q/vlan_core.c in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows remote attackers to cause a denial of service (system crash) via priority-tagged VLAN frames.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 5.5
- CVSS: 5.7
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2011-3593 vulnerability.
References
- https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=fadca7bdc43b02f518585d9547019966415cadfd
- https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=0e48f8daac293335e16e007663b9f4d248f89f0c
- https://bugzilla.redhat.com/show_bug.cgi?id=742846
- http://www.openwall.com/lists/oss-security/2012/03/05/3
See also: All popular products CVE Vulnerabilities of redhat
CVE-2002-2443: schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not…
Published: 2013-05-29T14:29:00 Last Modified: 2021-02-02T18:44:00
Summary
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2002-2443 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=962531
- https://github.com/krb5/krb5/commit/cf1a0c411b2668c57c41e9c4efd15ba17b6b322c
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7637
- http://www.debian.org/security/2013/dsa-2701
- http://rhn.redhat.com/errata/RHSA-2013-0942.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00007.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:166
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105879.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105978.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106698.html
- http://www.ubuntu.com/usn/USN-2810-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6137: rhn-migrate-classic-to-rhsm tool in Red Hat subscription-manager does not verify the Red Hat…
Published: 2013-05-21T18:55:00 Last Modified: 2017-08-29T01:32:00
Summary
rhn-migrate-classic-to-rhsm tool in Red Hat subscription-manager does not verify the Red Hat Network Classic server’s X.509 certificate when migrating to a Certificate-based Red Hat Network, which allows remote man-in-the-middle attackers to obtain sensitive information such as user credentials.
Common Weakness Enumeration (CWE): CWE-255: Credentials Management Errors
CWE Description: Weaknesses in this category are related to the management of credentials.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-6137 vulnerability.
References
- http://osvdb.org/93058
- http://www.securitytracker.com/id/1028520
- http://www.securityfocus.com/bid/59674
- http://secunia.com/advisories/53330
- http://rhn.redhat.com/errata/RHSA-2013-0788.html
- https://bugzilla.redhat.com/show_bug.cgi?id=885130
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84020
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2728: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:10:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-2728 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16932
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3326: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:21:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3326 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17050
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3327: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:36:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3327 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16897
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3330: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:38:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3330 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17083
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3332: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:50:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3332 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17141
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3328: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:37:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3328 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16995
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3325: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:20:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3325 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17118
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3331: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:42:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3331 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16846
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3324: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:20:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3324 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16969
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3329: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:37:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3329 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16913
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3334: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:52:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, and CVE-2013-3335.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3334 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16407
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3335: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:52:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3333, and CVE-2013-3334.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3335 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16921
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3333: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X,…
Published: 2013-05-16T11:45:00 Last Modified: 2020-08-25T13:51:00
Summary
Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3331, CVE-2013-3332, CVE-2013-3334, and CVE-2013-3335.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-3333 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb13-14.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0825.html
- http://secunia.com/advisories/53442
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16804
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2015: The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel before 3.7.3 does not…
Published: 2013-04-29T14:55:00 Last Modified: 2021-07-15T19:16:00
Summary
The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel before 3.7.3 does not properly handle orphan-list entries for non-journal filesystems, which allows physically proximate attackers to cause a denial of service (system hang) via a crafted filesystem on removable media, as demonstrated by the e2fsprogs tests/f_orphan_extents_inode/image.gz test.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-2015 vulnerability.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0e9a9a1ad619e7e987815d20262d36a2f95717ca
- http://www.openwall.com/lists/oss-security/2013/04/26/16
- https://github.com/torvalds/linux/commit/0e9a9a1ad619e7e987815d20262d36a2f95717ca
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.3
- https://bugzilla.redhat.com/show_bug.cgi?id=957123
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1928: The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel before 3.6.5 on…
Published: 2013-04-29T14:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel before 3.6.5 on unspecified architectures lacks a certain error check, which might allow local users to obtain sensitive information from kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: COMPLETE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-1928 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2013/04/06/2
- https://bugzilla.redhat.com/show_bug.cgi?id=949567
- http://www.openwall.com/lists/oss-security/2013/04/09/6
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.5
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=12176503366885edd542389eed3aaf94be163fdb
- https://github.com/torvalds/linux/commit/12176503366885edd542389eed3aaf94be163fdb
- http://www.ubuntu.com/usn/USN-1829-1
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2013-1645.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-3301: The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial…
Published: 2013-04-29T14:55:00 Last Modified: 2021-07-15T19:16:00
Summary
The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then making an lseek system call.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2013-3301 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.8
- http://www.openwall.com/lists/oss-security/2013/04/15/1
- https://github.com/torvalds/linux/commit/6a76f8c0ab19f215af2a3442870eeb5f0e81998d
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6a76f8c0ab19f215af2a3442870eeb5f0e81998d
- https://bugzilla.redhat.com/show_bug.cgi?id=952197
- http://www.ubuntu.com/usn/USN-1836-1
- http://www.ubuntu.com/usn/USN-1834-1
- http://www.ubuntu.com/usn/USN-1838-1
- http://www.ubuntu.com/usn/USN-1835-1
- http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html
- http://rhn.redhat.com/errata/RHSA-2013-1051.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1416: The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT…
Published: 2013-04-19T11:44:00 Last Modified: 2021-02-02T18:40:00
Summary
The prep_reprocess_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.5 does not properly perform service-principal realm referral, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS-REQ request.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-1416 vulnerability.
References
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=7600
- https://github.com/krb5/krb5/commit/8ee70ec63931d1e38567905387ab9b1d45734d81
- http://lists.opensuse.org/opensuse-updates/2013-05/msg00011.html
- http://rhn.redhat.com/errata/RHSA-2013-0748.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00041.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00102.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:158
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:157
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102074.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102058.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4546: The default configuration for IPA servers in Red Hat Enterprise Linux 6, when revoking a…
Published: 2013-04-03T00:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The default configuration for IPA servers in Red Hat Enterprise Linux 6, when revoking a certificate from an Identity Management replica, does not properly update another Identity Management replica, which causes inconsistent Certificate Revocation Lists (CRLs) to be used and might allow remote attackers to bypass intended access restrictions via a revoked certificate.
Common Weakness Enumeration (CWE): CWE-16: Configuration
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4546 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1861: MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68,…
Published: 2013-03-28T23:55:00 Last Modified: 2019-04-22T17:48:00
Summary
MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2013-1861 vulnerability.
References
- http://www.osvdb.org/91415
- https://bugzilla.redhat.com/show_bug.cgi?id=919247
- http://secunia.com/advisories/52639
- http://seclists.org/oss-sec/2013/q1/671
- http://www.securityfocus.com/bid/58511
- https://mariadb.atlassian.net/browse/MDEV-4252
- http://lists.askmonty.org/pipermail/commits/2013-March/004371.html
- http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
- http://www.ubuntu.com/usn/USN-1909-1
- http://secunia.com/advisories/54300
- http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html
- http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html
- http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html
- http://www.debian.org/security/2013/dsa-2818
- http://security.gentoo.org/glsa/glsa-201409-04.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/82895
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1854: The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x…
Published: 2013-03-19T22:55:00 Last Modified: 2019-08-08T15:42:00
Summary
The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-1854 vulnerability.
References
- https://groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain
- http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
- http://rhn.redhat.com/errata/RHSA-2013-0699.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00078.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00070.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00075.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00071.html
- http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
- http://support.apple.com/kb/HT5784
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
- http://rhn.redhat.com/errata/RHSA-2014-1863.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1855: The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the…
Published: 2013-03-19T22:55:00 Last Modified: 2019-08-08T15:42:00
Summary
The sanitize_css method in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle \n (newline) characters, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-1855 vulnerability.
References
- https://groups.google.com/group/rubyonrails-security/msg/8ed835a97cdd1afd?dmode=source&output=gplain
- http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
- http://rhn.redhat.com/errata/RHSA-2013-0698.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html
- http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
- http://support.apple.com/kb/HT5784
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html
- http://rhn.redhat.com/errata/RHSA-2014-1863.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1857: The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action…
Published: 2013-03-19T22:55:00 Last Modified: 2019-08-08T15:42:00
Summary
The sanitize helper in lib/action_controller/vendor/html-scanner/html/sanitizer.rb in the Action Pack component in Ruby on Rails before 2.3.18, 3.0.x and 3.1.x before 3.1.12, and 3.2.x before 3.2.13 does not properly handle encoded : (colon) characters in URLs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted scheme name, as demonstrated by including a : sequence.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-1857 vulnerability.
References
- https://groups.google.com/group/rubyonrails-security/msg/78b9817a5943f6d6?dmode=source&output=gplain
- http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
- http://rhn.redhat.com/errata/RHSA-2013-0698.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00072.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00073.html
- http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
- http://support.apple.com/kb/HT5784
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00013.html
- http://rhn.redhat.com/errata/RHSA-2014-1863.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6544: The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain…
Published: 2013-03-15T20:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-6544 vulnerability.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3f68ba07b1da811bf383b4b701b129bfcb2e4988
- http://www.openwall.com/lists/oss-security/2013/03/05/13
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e15ca9a0ef9a86f0477530b0f44a725d67f889ee
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=792039c73cf176c8e39a6e8beef2c94ff46522ed
- https://github.com/torvalds/linux/commit/e15ca9a0ef9a86f0477530b0f44a725d67f889ee
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2
- https://github.com/torvalds/linux/commit/792039c73cf176c8e39a6e8beef2c94ff46522ed
- https://github.com/torvalds/linux/commit/3f68ba07b1da811bf383b4b701b129bfcb2e4988
- http://www.ubuntu.com/usn/USN-1805-1
- http://www.ubuntu.com/usn/USN-1808-1
- http://rhn.redhat.com/errata/RHSA-2013-1173.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6537: net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not initialize certain structures, which…
Published: 2013-03-15T20:55:00 Last Modified: 2019-04-22T17:48:00
Summary
net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-6537 vulnerability.
References
- https://github.com/torvalds/linux/commit/f778a636713a435d3a922c60b1622a91136560c1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7b789836f434c87168eab067cfbed1ec4783dffd
- https://github.com/torvalds/linux/commit/7b789836f434c87168eab067cfbed1ec4783dffd
- http://www.openwall.com/lists/oss-security/2013/03/05/13
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1f86840f897717f86d523a13e99a447e6a5d2fa5
- https://github.com/torvalds/linux/commit/1f86840f897717f86d523a13e99a447e6a5d2fa5
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f778a636713a435d3a922c60b1622a91136560c1
- http://www.ubuntu.com/usn/USN-1798-1
- http://www.ubuntu.com/usn/USN-1792-1
- http://rhn.redhat.com/errata/RHSA-2013-0744.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6542: The llc_ui_getname function in net/llc/af_llc.c in the Linux kernel before 3.6 has an incorrect…
Published: 2013-03-15T20:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The llc_ui_getname function in net/llc/af_llc.c in the Linux kernel before 3.6 has an incorrect return value in certain circumstances, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that leverages an uninitialized pointer argument.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-6542 vulnerability.
References
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2
- http://www.openwall.com/lists/oss-security/2013/03/05/13
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3592aaeb80290bda0f2cf0b5456c97bfc638b192
- https://github.com/torvalds/linux/commit/3592aaeb80290bda0f2cf0b5456c97bfc638b192
- http://www.ubuntu.com/usn/USN-1805-1
- http://www.ubuntu.com/usn/USN-1808-1
- http://rhn.redhat.com/errata/RHSA-2013-1645.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6545: The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize…
Published: 2013-03-15T20:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-6545 vulnerability.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9344a972961d1a6d2c04d9008b13617bcb6ec2ef
- https://github.com/torvalds/linux/commit/f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a
- http://www.openwall.com/lists/oss-security/2013/03/05/13
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9ad2de43f1aee7e7274a4e0d41465489299e344b
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a
- https://github.com/torvalds/linux/commit/9ad2de43f1aee7e7274a4e0d41465489299e344b
- https://github.com/torvalds/linux/commit/9344a972961d1a6d2c04d9008b13617bcb6ec2ef
- http://www.ubuntu.com/usn/USN-1805-1
- http://www.ubuntu.com/usn/USN-1808-1
- http://rhn.redhat.com/errata/RHSA-2013-1645.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6546: The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures,…
Published: 2013-03-15T20:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-6546 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2013/03/05/13
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e862f1a9b7df4e8196ebec45ac62295138aa3fc2
- https://github.com/torvalds/linux/commit/3c0c5cfdcd4d69ffc4b9c0907cec99039f30a50a
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3c0c5cfdcd4d69ffc4b9c0907cec99039f30a50a
- https://github.com/torvalds/linux/commit/e862f1a9b7df4e8196ebec45ac62295138aa3fc2
- http://rhn.redhat.com/errata/RHSA-2013-0744.html
- http://www.ubuntu.com/usn/USN-1805-1
- http://www.ubuntu.com/usn/USN-1808-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6548: The udf_encode_fh function in fs/udf/namei.c in the Linux kernel before 3.6 does not initialize a…
Published: 2013-03-15T20:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The udf_encode_fh function in fs/udf/namei.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-6548 vulnerability.
References
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2
- http://www.openwall.com/lists/oss-security/2013/03/05/13
- https://github.com/torvalds/linux/commit/0143fc5e9f6f5aad4764801015bc8d4b4a278200
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0143fc5e9f6f5aad4764801015bc8d4b4a278200
- http://www.ubuntu.com/usn/USN-1813-1
- http://www.ubuntu.com/usn/USN-1812-1
- http://www.ubuntu.com/usn/USN-1809-1
- http://www.ubuntu.com/usn/USN-1805-1
- http://www.ubuntu.com/usn/USN-1808-1
- http://www.ubuntu.com/usn/USN-1811-1
- http://www.ubuntu.com/usn/USN-1814-1
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:176
- http://rhn.redhat.com/errata/RHSA-2013-1051.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6538: The copy_to_user_auth function in net/xfrm/xfrm_user.c in the Linux kernel before 3.6 uses an…
Published: 2013-03-15T20:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The copy_to_user_auth function in net/xfrm/xfrm_user.c in the Linux kernel before 3.6 uses an incorrect C library function for copying a string, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-6538 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2013/03/05/13
- https://github.com/torvalds/linux/commit/4c87308bdea31a7b4828a51f6156e6f721a1fcc9
- https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4c87308bdea31a7b4828a51f6156e6f721a1fcc9
- http://rhn.redhat.com/errata/RHSA-2013-0744.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-2555: Integer overflow in Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows…
Published: 2013-03-11T10:55:00 Last Modified: 2021-09-08T17:19:00
Summary
Integer overflow in Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK & Compiler before 3.7.0.1530 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-2555 vulnerability.
References
- http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157
- http://www.adobe.com/support/security/bulletins/apsb13-11.html
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html
- http://rhn.redhat.com/errata/RHSA-2013-0730.html
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html
- http://twitter.com/VUPEN/statuses/309713355466227713
- http://twitter.com/thezdi/statuses/309756927301283840
- http://archives.neohapsis.com/archives/bugtraq/2013-04/0197.html
- http://marc.info/?l=bugtraq&m=139455789818399&w=2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3201: GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via…
Published: 2013-03-08T21:55:00 Last Modified: 2017-08-29T01:30:00
Summary
GNOME Evolution before 3.2.3 allows user-assisted remote attackers to read arbitrary files via the attachment parameter to a mailto: URL, which attaches the file to the email.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-3201 vulnerability.
References
- https://git.gnome.org/browse/evolution/commit/?id=588c410718068388f8ce0004a71c104a4c89cce3
- https://git.gnome.org/browse/evolution/commit/?id=0a478083fa31aec0059bc6feacc054226fe55b56
- https://bugzilla.gnome.org/show_bug.cgi?id=657374
- https://bugzilla.redhat.com/show_bug.cgi?id=733504
- http://rhn.redhat.com/errata/RHSA-2013-0516.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/82450
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0200: HP Linux Imaging and Printing (HPLIP) through 3.12.4 allows local users to overwrite arbitrary…
Published: 2013-03-06T20:55:00 Last Modified: 2019-04-22T17:48:00
Summary
HP Linux Imaging and Printing (HPLIP) through 3.12.4 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/hpcupsfilterc_#.bmp, (2) /tmp/hpcupsfilterk_#.bmp, (3) /tmp/hpcups_job#.out, (4) /tmp/hpijs_#####.out, or (5) /tmp/hpps_job#.out temporary file, a different vulnerability than CVE-2011-2722.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-0200 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=902163
- http://hplipopensource.com/hplip-web/release_notes.html
- ftp://ftp.scientificlinux.org/linux/scientific/6x/SRPMS/vendor/hplip-3.12.4-4.el6.src.rpm
- http://secunia.com/advisories/55083
- http://www.ubuntu.com/usn/USN-1981-1
- http://www.debian.org/security/2013/dsa-2829
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0072
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:088
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3411: Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from…
Published: 2013-03-05T21:38:00 Last Modified: 2020-05-27T18:18:00
Summary
Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3411 vulnerability.
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=54dd393f3938fc0c19088fbd319b95e37d81a2b0
- http://www.securityfocus.com/bid/54353
- http://rhn.redhat.com/errata/RHSA-2013-0277.html
- http://www.openwall.com/lists/oss-security/2012/07/12/5
- https://bugzilla.redhat.com/show_bug.cgi?id=833033
- http://rhn.redhat.com/errata/RHSA-2013-0276.html
- http://www.thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=2f38141f434e23292f84cefc33e8de76fb856147
- http://rhn.redhat.com/errata/RHSA-2013-0579.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:072
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1182: kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of…
Published: 2013-03-01T12:37:00 Last Modified: 2020-07-30T19:26:00
Summary
kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-1182 vulnerability.
References
- http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=da48524eb20662618854bb3df2db01fc65f3070c
- https://bugzilla.redhat.com/show_bug.cgi?id=690028
- https://github.com/torvalds/linux/commit/da48524eb20662618854bb3df2db01fc65f3070c
- http://www.openwall.com/lists/oss-security/2011/03/23/2
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2491: The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the…
Published: 2013-03-01T12:37:00 Last Modified: 2020-07-31T20:22:00
Summary
The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-2491 vulnerability.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0b760113a3a155269a3fba93a409c640031dd68f
- http://www.openwall.com/lists/oss-security/2011/06/23/6
- https://bugzilla.redhat.com/show_bug.cgi?id=709393
- http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0
- https://github.com/torvalds/linux/commit/0b760113a3a155269a3fba93a409c640031dd68f
- http://rhn.redhat.com/errata/RHSA-2011-1212.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1568: The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise…
Published: 2013-03-01T05:40:00 Last Modified: 2019-04-22T17:48:00
Summary
The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-1568 vulnerability.
References
- http://openwall.com/lists/oss-security/2012/03/21/3
- https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=302a4fc15aebf202b6dffd6c804377c6058ee6e4
- http://www.openwall.com/lists/oss-security/2012/03/20/4
- http://scarybeastsecurity.blogspot.com/2012/03/some-random-observations-on-linux-aslr.html
- https://bugzilla.redhat.com/show_bug.cgi?id=804947
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1774: The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel before 3.7.4 allows…
Published: 2013-02-28T19:55:00 Last Modified: 2021-07-15T19:16:00
Summary
The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel before 3.7.4 allows local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converter.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.9
- Exploitability Score: 1.9
- CVSS: 4.0
- CVSS Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-1774 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=916191
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1ee0a224bc9aad1de496c795f96bc6ba2c394811
- http://www.openwall.com/lists/oss-security/2013/02/27/29
- https://github.com/torvalds/linux/commit/1ee0a224bc9aad1de496c795f96bc6ba2c394811
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.4
- http://rhn.redhat.com/errata/RHSA-2013-0744.html
- http://www.ubuntu.com/usn/USN-1805-1
- http://www.ubuntu.com/usn/USN-1808-1
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
- http://xorl.wordpress.com/2013/05/18/cve-2013-1774-linux-kernel-edgeport-usb-serial-converter-null-pointer-dereference/
- http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00016.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1773: Buffer overflow in the VFAT filesystem implementation in the Linux kernel before 3.3 allows local…
Published: 2013-02-28T19:55:00 Last Modified: 2021-07-15T19:16:00
Summary
Buffer overflow in the VFAT filesystem implementation in the Linux kernel before 3.3 allows local users to gain privileges or cause a denial of service (system crash) via a VFAT write operation on a filesystem with the utf8 mount option, which is not properly handled during UTF-8 to UTF-16 conversion.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 1.9
- CVSS: 6.2
- CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2013-1773 vulnerability.
References
- https://github.com/torvalds/linux/commit/0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd
- http://www.osvdb.org/88310
- https://bugzilla.redhat.com/show_bug.cgi?id=916115
- http://www.exploit-db.com/exploits/23248/
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd
- http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.3.bz2
- http://www.openwall.com/lists/oss-security/2013/02/26/8
- http://rhn.redhat.com/errata/RHSA-2013-0744.html
- http://rhn.redhat.com/errata/RHSA-2013-0928.html
- http://rhn.redhat.com/errata/RHSA-2013-1026.html
- http://www.securityfocus.com/bid/58200
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-2697: Unspecified vulnerability in autofs, as used in Red Hat Enterprise Linux (RHEL) 5, allows local…
Published: 2013-02-24T21:55:00 Last Modified: 2016-12-08T03:02:00
Summary
Unspecified vulnerability in autofs, as used in Red Hat Enterprise Linux (RHEL) 5, allows local users to cause a denial of service (autofs crash and delayed mounts) or prevent “mount expiration” via unspecified vectors related to “using an LDAP-based automount map.”
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-2697 vulnerability.
References
- http://www.securityfocus.com/bid/57183
- http://www.osvdb.org/89878
- http://rhn.redhat.com/errata/RHSA-2013-0132.html
- https://bugzilla.redhat.com/show_bug.cgi?id=831772
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0219: System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3)…
Published: 2013-02-24T19:55:00 Last Modified: 2019-04-22T17:48:00
Summary
System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user’s files.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 1.9
- CVSS: 3.7
- CVSS Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-0219 vulnerability.
References
- http://www.securityfocus.com/bid/57539
- http://git.fedorahosted.org/cgit/sssd.git/commit/?id=e864d914a44a37016736554e9257c06b18c57d37
- https://fedorahosted.org/sssd/wiki/Releases/Notes-1.9.4
- http://git.fedorahosted.org/cgit/sssd.git/commit/?id=020bf88fd1c5bdac8fc671b37c7118f5378c7047
- http://git.fedorahosted.org/cgit/sssd.git/commit/?id=94cbf1cfb0f88c967f1fb0a4cf23723148868e4a
- https://bugzilla.redhat.com/show_bug.cgi?id=884254
- http://git.fedorahosted.org/cgit/sssd.git/commit/?id=3843b284cd3e8f88327772ebebc7249990fd87b9
- http://secunia.com/advisories/52315
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098434.html
- http://rhn.redhat.com/errata/RHSA-2013-0508.html
- http://secunia.com/advisories/51928
- https://fedorahosted.org/sssd/ticket/1782
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098613.html
- http://rhn.redhat.com/errata/RHSA-2013-1319.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0311: The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not…
Published: 2013-02-22T00:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges.
Scores
- Impact Score: 10.0
- Exploitability Score: 2.5
- CVSS: 6.5
- CVSS Vector: AV:A/AC:H/Au:S/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: HIGH
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2013-0311 vulnerability.
References
- https://github.com/torvalds/linux/commit/bd97120fc3d1a11f3124c7c9ba1d91f51829eb85
- http://www.openwall.com/lists/oss-security/2013/02/20/6
- http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.7.bz2
- https://bugzilla.redhat.com/show_bug.cgi?id=912905
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bd97120fc3d1a11f3124c7c9ba1d91f51829eb85
- http://rhn.redhat.com/errata/RHSA-2013-0496.html
- http://rhn.redhat.com/errata/RHSA-2013-0579.html
- http://rhn.redhat.com/errata/RHSA-2013-0882.html
- http://rhn.redhat.com/errata/RHSA-2013-0928.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:176
- http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00018.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0309: arch/x86/include/asm/pgtable.h in the Linux kernel before 3.6.2, when transparent huge pages are…
Published: 2013-02-22T00:55:00 Last Modified: 2019-04-22T17:48:00
Summary
arch/x86/include/asm/pgtable.h in the Linux kernel before 3.6.2, when transparent huge pages are used, does not properly support PROT_NONE memory regions, which allows local users to cause a denial of service (system crash) via a crafted application.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-0309 vulnerability.
References
- https://github.com/torvalds/linux/commit/027ef6c87853b0a9df53175063028edb4950d476
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.6.2
- http://www.openwall.com/lists/oss-security/2013/02/20/4
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=027ef6c87853b0a9df53175063028edb4950d476
- https://bugzilla.redhat.com/show_bug.cgi?id=912898
- http://rhn.redhat.com/errata/RHSA-2013-0496.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0310: The cipso_v4_validate function in net/ipv4/cipso_ipv4.c in the Linux kernel before 3.4.8 allows…
Published: 2013-02-22T00:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The cipso_v4_validate function in net/ipv4/cipso_ipv4.c in the Linux kernel before 3.4.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an IPOPT_CIPSO IP_OPTIONS setsockopt system call.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 2.7
- CVSS: 6.6
- CVSS Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-0310 vulnerability.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=89d7ae34cdda4195809a5a987f697a517a2a3177
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.8
- https://github.com/torvalds/linux/commit/89d7ae34cdda4195809a5a987f697a517a2a3177
- https://bugzilla.redhat.com/show_bug.cgi?id=912900
- http://www.openwall.com/lists/oss-security/2013/02/20/5
- http://rhn.redhat.com/errata/RHSA-2013-0496.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5536: A certain Red Hat build of the pam_ssh_agent_auth module on Red Hat Enterprise Linux (RHEL) 6 and…
Published: 2013-02-22T00:55:00 Last Modified: 2019-04-22T17:48:00
Summary
A certain Red Hat build of the pam_ssh_agent_auth module on Red Hat Enterprise Linux (RHEL) 6 and Fedora Rawhide calls the glibc error function instead of the error function in the OpenSSH codebase, which allows local users to obtain sensitive information from process memory or possibly gain privileges via crafted use of an application that relies on this module, as demonstrated by su and sudo.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 10.0
- Exploitability Score: 1.9
- CVSS: 6.2
- CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-5536 vulnerability.
References
- http://pkgs.fedoraproject.org/cgit/openssh.git/commit/?id=4f4687ce8045418f678c323bb22c837f35d7b9fa
- https://bugzilla.redhat.com/show_bug.cgi?id=834618
- http://rhn.redhat.com/errata/RHSA-2013-0519.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0775: Use-after-free vulnerability in the nsImageLoadingContent::OnStopContainer function in Mozilla…
Published: 2013-02-19T23:55:00 Last Modified: 2020-08-06T16:41:00
Summary
Use-after-free vulnerability in the nsImageLoadingContent::OnStopContainer function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via crafted web script.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0775 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=831095
- http://www.mozilla.org/security/announce/2013/mfsa2013-26.html
- http://rhn.redhat.com/errata/RHSA-2013-0271.html
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
- http://rhn.redhat.com/errata/RHSA-2013-0272.html
- http://www.ubuntu.com/usn/USN-1729-1
- http://www.ubuntu.com/usn/USN-1748-1
- http://www.ubuntu.com/usn/USN-1729-2
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
- http://www.debian.org/security/2013/dsa-2699
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16950
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0783: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 19.0,…
Published: 2013-02-19T23:55:00 Last Modified: 2020-08-06T17:24:00
Summary
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0783 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=830399
- http://www.mozilla.org/security/announce/2013/mfsa2013-21.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=830975
- https://bugzilla.mozilla.org/show_bug.cgi?id=818241
- https://bugzilla.mozilla.org/show_bug.cgi?id=826471
- https://bugzilla.mozilla.org/show_bug.cgi?id=780549
- https://bugzilla.mozilla.org/show_bug.cgi?id=690970
- https://bugzilla.mozilla.org/show_bug.cgi?id=812380
- https://bugzilla.mozilla.org/show_bug.cgi?id=832162
- https://bugzilla.mozilla.org/show_bug.cgi?id=822858
- https://bugzilla.mozilla.org/show_bug.cgi?id=761448
- http://rhn.redhat.com/errata/RHSA-2013-0271.html
- http://www.ubuntu.com/usn/USN-1748-1
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
- http://rhn.redhat.com/errata/RHSA-2013-0272.html
- http://www.ubuntu.com/usn/USN-1729-1
- http://www.ubuntu.com/usn/USN-1729-2
- http://www.debian.org/security/2013/dsa-2699
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16219
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0772: The RasterImage::DrawFrameTo function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3,…
Published: 2013-02-19T23:55:00 Last Modified: 2020-08-06T16:28:00
Summary
The RasterImage::DrawFrameTo function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted GIF image.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0772 vulnerability.
References
- http://www.mozilla.org/security/announce/2013/mfsa2013-22.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=801366
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
- http://www.ubuntu.com/usn/USN-1729-1
- http://www.ubuntu.com/usn/USN-1729-2
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2013-1812.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17159
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0782: Heap-based buffer overflow in the nsSaveAsCharset::DoCharsetConversion function in Mozilla…
Published: 2013-02-19T23:55:00 Last Modified: 2020-08-06T17:14:00
Summary
Heap-based buffer overflow in the nsSaveAsCharset::DoCharsetConversion function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0782 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=827070
- http://www.mozilla.org/security/announce/2013/mfsa2013-28.html
- http://rhn.redhat.com/errata/RHSA-2013-0271.html
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
- http://rhn.redhat.com/errata/RHSA-2013-0272.html
- http://www.ubuntu.com/usn/USN-1729-1
- http://www.ubuntu.com/usn/USN-1748-1
- http://www.ubuntu.com/usn/USN-1729-2
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
- http://www.debian.org/security/2013/dsa-2699
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16906
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0776: Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3,…
Published: 2013-02-19T23:55:00 Last Modified: 2020-08-06T16:47:00
Summary
Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
Common Weakness Enumeration (CWE): CWE-295: Improper Certificate Validation
CWE Description: The software does not validate, or incorrectly validates, a certificate.
Scores
- Impact Score: 4.9
- Exploitability Score: 4.9
- CVSS: 4.0
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0776 vulnerability.
References
- http://www.mozilla.org/security/announce/2013/mfsa2013-27.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=796475
- http://rhn.redhat.com/errata/RHSA-2013-0271.html
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
- http://rhn.redhat.com/errata/RHSA-2013-0272.html
- http://www.ubuntu.com/usn/USN-1729-1
- http://www.ubuntu.com/usn/USN-1748-1
- http://www.ubuntu.com/usn/USN-1729-2
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
- http://www.debian.org/security/2013/dsa-2699
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16666
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0780: Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla…
Published: 2013-02-19T23:55:00 Last Modified: 2020-08-06T17:10:00
Summary
Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0780 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=812893
- http://www.mozilla.org/security/announce/2013/mfsa2013-28.html
- http://rhn.redhat.com/errata/RHSA-2013-0271.html
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html
- http://rhn.redhat.com/errata/RHSA-2013-0272.html
- http://www.ubuntu.com/usn/USN-1729-1
- http://www.ubuntu.com/usn/USN-1748-1
- http://www.ubuntu.com/usn/USN-1729-2
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html
- http://www.debian.org/security/2013/dsa-2699
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16383
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0241: The QXL display driver in QXL Virtual GPU 0.1.0 allows local users to cause a denial of service…
Published: 2013-02-13T01:55:00 Last Modified: 2017-08-29T01:33:00
Summary
The QXL display driver in QXL Virtual GPU 0.1.0 allows local users to cause a denial of service (guest crash or hang) via a SPICE connection that prevents other threads from obtaining the qemu_mutex mutex. NOTE: some of these details are obtained from third party information.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2013-0241 vulnerability.
References
- http://www.ubuntu.com/usn/USN-1714-1
- https://bugzilla.redhat.com/show_bug.cgi?id=906032
- http://www.openwall.com/lists/oss-security/2013/01/30/3
- http://www.openwall.com/lists/oss-security/2013/01/30/4
- http://rhn.redhat.com/errata/RHSA-2013-0218.html
- http://secunia.com/advisories/52021
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:138
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0036
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81704
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-6075: Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU…
Published: 2013-02-13T01:55:00 Last Modified: 2020-08-11T15:21:00
Summary
Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
Common Weakness Enumeration (CWE): CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
CWE Description: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-6075 vulnerability.
References
- http://lists.nongnu.org/archive/html/qemu-devel/2012-12/msg00533.html
- http://git.qemu.org/?p=qemu.git;a=commitdiff;h=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb
- http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097541.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097705.html
- http://www.ubuntu.com/usn/USN-1692-1
- https://bugzilla.redhat.com/show_bug.cgi?id=889301
- http://www.securityfocus.com/bid/57420
- http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097575.html
- http://www.openwall.com/lists/oss-security/2012/12/30/1
- http://www.debian.org/security/2013/dsa-2608
- http://www.debian.org/security/2013/dsa-2607
- http://www.debian.org/security/2013/dsa-2619
- http://rhn.redhat.com/errata/RHSA-2013-0610.html
- http://rhn.redhat.com/errata/RHSA-2013-0599.html
- http://rhn.redhat.com/errata/RHSA-2013-0609.html
- http://rhn.redhat.com/errata/RHSA-2013-0639.html
- http://rhn.redhat.com/errata/RHSA-2013-0608.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0170: Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in…
Published: 2013-02-08T20:55:00 Last Modified: 2020-10-22T15:40:00
Summary
Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0170 vulnerability.
References
- http://www.securityfocus.com/bid/57578
- http://libvirt.org/git/?p=libvirt.git;a=commit;h=46532e3e8ed5f5a736a02f67d6c805492f9ca720
- http://osvdb.org/89644
- http://wiki.libvirt.org/page/Maintenance_Releases
- http://secunia.com/advisories/52001
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098370.html
- http://www.securitytracker.com/id/1028047
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098326.html
- http://libvirt.org/news.html
- https://bugzilla.redhat.com/show_bug.cgi?id=893450
- http://secunia.com/advisories/52003
- http://rhn.redhat.com/errata/RHSA-2013-0199.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098398.html
- http://www.ubuntu.com/usn/USN-1708-1
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00016.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81552
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-1591: Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other…
Published: 2013-01-31T23:55:00 Last Modified: 2019-05-22T13:29:00
Summary
Stack-based buffer overflow in libpixman, as used in Pale Moon before 15.4 and possibly other products, has unspecified impact and context-dependent attack vectors. NOTE: this issue might be resultant from an integer overflow in the fast_composite_scaled_bilinear function in pixman-inlines.h, which triggers an infinite loop.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-1591 vulnerability.
References
- http://www.palemoon.org/releasenotes-ng.shtml
- https://bugzilla.redhat.com/show_bug.cgi?id=910149
- http://rhn.redhat.com/errata/RHSA-2013-0746.html
- http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f
- http://rhn.redhat.com/errata/RHSA-2013-0687.html
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0077
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:116
- https://support.f5.com/csp/article/K51392553
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5689: ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving…
Published: 2013-01-25T12:00:00 Last Modified: 2016-08-19T18:31:00
Summary
ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-5689 vulnerability.
References
- https://kb.isc.org/article/AA-00855/
- http://www.isc.org/software/bind/advisories/cve-2012-5689
- http://rhn.redhat.com/errata/RHSA-2013-0550.html
- http://www.ubuntu.com/usn/USN-2693-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-2124: functions/imap_general.php in SquirrelMail, as used in Red Hat Enterprise Linux (RHEL) 4 and 5,…
Published: 2013-01-18T11:48:00 Last Modified: 2013-01-18T11:48:00
Summary
functions/imap_general.php in SquirrelMail, as used in Red Hat Enterprise Linux (RHEL) 4 and 5, does not properly handle 8-bit characters in passwords, which allows remote attackers to cause a denial of service (disk consumption) by making many IMAP login attempts with different usernames, leading to the creation of many preference files. NOTE: this issue exists because of an incorrect fix for CVE-2010-2813.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-2124 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=814671
- http://www.openwall.com/lists/oss-security/2012/04/20/22
- http://rhn.redhat.com/errata/RHSA-2013-0126.html
- http://secunia.com/advisories/51730
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0744: Use-after-free vulnerability in the TableBackgroundPainter::TableBackgroundData::Destroy function…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-04T17:35:00
Summary
Use-after-free vulnerability in the TableBackgroundPainter::TableBackgroundData::Destroy function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an HTML document with a table containing many columns and column groups.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0744 vulnerability.
References
- http://www.mozilla.org/security/announce/2013/mfsa2013-05.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=814713
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://rhn.redhat.com/errata/RHSA-2013-0145.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2013-0144.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17007
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0748: The XBL.proto.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-04T18:59:00
Summary
The XBL.proto.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0748 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=806031
- http://www.mozilla.org/security/announce/2013/mfsa2013-11.html
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://rhn.redhat.com/errata/RHSA-2013-0145.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2013-0144.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17109
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0746: Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-04T18:22:00
Summary
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0746 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=816842
- http://www.mozilla.org/security/announce/2013/mfsa2013-09.html
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://rhn.redhat.com/errata/RHSA-2013-0145.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2013-0144.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16570
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0750: Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-04T18:59:00
Summary
Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0750 vulnerability.
References
- http://www.mozilla.org/security/announce/2013/mfsa2013-12.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=805121
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://rhn.redhat.com/errata/RHSA-2013-0145.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2013-0144.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16957
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0753: Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-04T16:21:00
Summary
Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2013-0753 vulnerability.
References
- http://www.mozilla.org/security/announce/2013/mfsa2013-16.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=814001
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://rhn.redhat.com/errata/RHSA-2013-0145.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2013-0144.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17053
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0754: Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-04T15:35:00
Summary
Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0754 vulnerability.
References
- http://www.mozilla.org/security/announce/2013/mfsa2013-17.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=814026
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://rhn.redhat.com/errata/RHSA-2013-0145.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2013-0144.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16812
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0767: The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 18.0, Firefox ESR…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-07T18:46:00
Summary
The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0767 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=812161
- http://www.mozilla.org/security/announce/2013/mfsa2013-02.html
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://rhn.redhat.com/errata/RHSA-2013-0145.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2013-0144.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- http://www.securityfocus.com/bid/57195
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16171
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0758: Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-04T15:32:00
Summary
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging improper interaction between plugin objects and SVG elements.
Common Weakness Enumeration (CWE): CWE-94: Improper Control of Generation of Code (‘Code Injection’)
CWE Description: The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2013-0758 vulnerability.
- GIT 1.8.5.6/1.9.5/2.0.5/2.1.4/2.2.1 & Mercurial < 3.2.3 - Multiple Vulnerabilities (Metasploit) by Metasploit at 2014-12-18
- Mozilla Firefox < 17.0.1 - Flash Privileged Code Injection (Metasploit) by Metasploit at 2013-01-08
References
- http://www.mozilla.org/security/announce/2013/mfsa2013-15.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=813906
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://rhn.redhat.com/errata/RHSA-2013-0145.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2013-0144.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17087
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0759: Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-04T15:31:00
Summary
Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.
Common Weakness Enumeration (CWE): CWE-287: Improper Authentication
CWE Description: When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0759 vulnerability.
References
- http://www.mozilla.org/security/announce/2013/mfsa2013-04.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=802026
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://rhn.redhat.com/errata/RHSA-2013-0145.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2013-0144.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16827
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0763: Use-after-free vulnerability in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1,…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-04T15:29:00
Summary
Use-after-free vulnerability in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to Mesa drivers and a resized WebGL canvas.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0763 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=791905
- http://www.mozilla.org/security/announce/2013/mfsa2013-02.html
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17107
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0768: Stack-based buffer overflow in the Canvas implementation in Mozilla Firefox before 18.0, Firefox…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-07T18:48:00
Summary
Stack-based buffer overflow in the Canvas implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via an HTML document that specifies invalid width and height values.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0768 vulnerability.
References
- http://www.mozilla.org/security/announce/2013/mfsa2013-03.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=815795
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16990
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0766: Use-after-free vulnerability in the ~nsHTMLEditRules implementation in Mozilla Firefox before…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-07T18:34:00
Summary
Use-after-free vulnerability in the ~nsHTMLEditRules implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0766 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=803853
- http://www.mozilla.org/security/announce/2013/mfsa2013-02.html
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://rhn.redhat.com/errata/RHSA-2013-0145.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2013-0144.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- http://www.securityfocus.com/bid/57194
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16189
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0769: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0,…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-11T13:09:00
Summary
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0769 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=809064
- https://bugzilla.mozilla.org/show_bug.cgi?id=768243
- https://bugzilla.mozilla.org/show_bug.cgi?id=801195
- https://bugzilla.mozilla.org/show_bug.cgi?id=806483
- http://www.mozilla.org/security/announce/2013/mfsa2013-01.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=811382
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.palemoon.org/releasenotes-ng.shtml
- http://www.ubuntu.com/usn/USN-1681-1
- http://rhn.redhat.com/errata/RHSA-2013-0145.html
- http://rhn.redhat.com/errata/RHSA-2013-0144.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://www.ubuntu.com/usn/USN-1681-4
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16199
See also: All popular products CVE Vulnerabilities of redhat
CVE-2013-0762: Use-after-free vulnerability in the imgRequest::OnStopFrame function in Mozilla Firefox before…
Published: 2013-01-13T20:55:00 Last Modified: 2020-08-04T15:31:00
Summary
Use-after-free vulnerability in the imgRequest::OnStopFrame function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2013-0762 vulnerability.
References
- http://www.mozilla.org/security/announce/2013/mfsa2013-02.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=788959
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://rhn.redhat.com/errata/RHSA-2013-0145.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2013-0144.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- http://www.securityfocus.com/bid/57193
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16288
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3515: Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a…
Published: 2012-11-23T20:55:00 Last Modified: 2020-08-11T15:21:00
Summary
Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a “device model’s address space.”
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-3515 vulnerability.
References
- http://secunia.com/advisories/50530
- http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability
- http://www.openwall.com/lists/oss-security/2012/09/05/10
- http://secunia.com/advisories/50472
- http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html
- http://support.citrix.com/article/CTX134708
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html
- http://www.debian.org/security/2012/dsa-2545
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html
- http://rhn.redhat.com/errata/RHSA-2012-1234.html
- http://www.debian.org/security/2012/dsa-2543
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
- http://www.ubuntu.com/usn/USN-1590-1
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
- http://rhn.redhat.com/errata/RHSA-2012-1235.html
- http://rhn.redhat.com/errata/RHSA-2012-1325.html
- http://rhn.redhat.com/errata/RHSA-2012-1233.html
- http://rhn.redhat.com/errata/RHSA-2012-1236.html
- http://rhn.redhat.com/errata/RHSA-2012-1262.html
- http://www.securityfocus.com/bid/55413
- http://secunia.com/advisories/50860
- http://secunia.com/advisories/50632
- http://secunia.com/advisories/50528
- http://secunia.com/advisories/50689
- http://secunia.com/advisories/50913
- http://secunia.com/advisories/51413
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://secunia.com/advisories/55082
- http://git.qemu.org/?p=qemu-stable-0.15.git;a=log
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
- https://security.gentoo.org/glsa/201604-03
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4202: Heap-based buffer overflow in the image::RasterImage::DrawFrameTo function in Mozilla Firefox…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-06T16:49:00
Summary
Heap-based buffer overflow in the image::RasterImage::DrawFrameTo function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via a crafted GIF image.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4202 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-92.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=758200
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://www.ubuntu.com/usn/USN-1638-2
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.securityfocus.com/bid/56614
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80170
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16739
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4207: The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-13T19:20:00
Summary
The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4207 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=801681
- http://www.mozilla.org/security/announce/2012/mfsa2012-101.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://www.debian.org/security/2012/dsa-2583
- http://www.ubuntu.com/usn/USN-1638-2
- http://www.debian.org/security/2012/dsa-2584
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://www.palemoon.org/releasenotes-ng.shtml
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.debian.org/security/2012/dsa-2588
- http://www.securityfocus.com/bid/56632
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://osvdb.org/87587
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80179
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16955
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4209: Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0,…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-13T19:32:00
Summary
Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a “top” frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4209 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=792405
- http://www.mozilla.org/security/announce/2012/mfsa2012-103.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://www.ubuntu.com/usn/USN-1638-2
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.securityfocus.com/bid/56629
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80181
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16880
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4214: Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-13T19:38:00
Summary
Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-5840.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4214 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=795804
- http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://www.ubuntu.com/usn/USN-1638-2
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://www.palemoon.org/releasenotes-ng.shtml
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.securityfocus.com/bid/56628
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80187
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16884
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4201: The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11,…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-14T17:33:00
Summary
The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4201 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=747607
- http://www.mozilla.org/security/announce/2012/mfsa2012-93.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://www.debian.org/security/2012/dsa-2583
- http://www.ubuntu.com/usn/USN-1638-2
- http://www.debian.org/security/2012/dsa-2584
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.debian.org/security/2012/dsa-2588
- http://www.securityfocus.com/bid/56618
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://osvdb.org/87594
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80171
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15995
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4215: Use-after-free vulnerability in the nsPlaintextEditor::FireClipboardEvent function in Mozilla…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-06T19:21:00
Summary
Use-after-free vulnerability in the nsPlaintextEditor::FireClipboardEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4215 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=798677
- http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://www.ubuntu.com/usn/USN-1638-2
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.securityfocus.com/bid/56633
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80188
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16690
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4216: Use-after-free vulnerability in the gfxFont::GetFontEntry function in Mozilla Firefox before…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-13T19:42:00
Summary
Use-after-free vulnerability in the gfxFont::GetFontEntry function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4216 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=798853
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://www.debian.org/security/2012/dsa-2583
- http://www.ubuntu.com/usn/USN-1638-2
- http://www.debian.org/security/2012/dsa-2584
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.debian.org/security/2012/dsa-2588
- http://www.securityfocus.com/bid/56634
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://osvdb.org/87609
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80189
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16902
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5829: Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-14T17:38:00
Summary
Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-5829 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=792305
- http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-2
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://www.debian.org/security/2012/dsa-2583
- http://www.debian.org/security/2012/dsa-2584
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-02.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://www.ubuntu.com/usn/USN-1681-2
- http://www.ubuntu.com/usn/USN-1681-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00017.html
- http://www.ubuntu.com/usn/USN-1681-4
- http://www.debian.org/security/2012/dsa-2588
- http://www.securityfocus.com/bid/56636
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://osvdb.org/87608
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80195
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16849
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5839: Heap-based buffer overflow in the gfxShapedWord::CompressedGlyph::IsClusterStart function in…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-06T16:47:00
Summary
Heap-based buffer overflow in the gfxShapedWord::CompressedGlyph::IsClusterStart function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-5839 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=804927
- http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-2
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://www.palemoon.org/releasenotes-ng.shtml
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.securityfocus.com/bid/56637
- http://osvdb.org/87607
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80196
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16968
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5830: Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11,…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-13T17:31:00
Summary
Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 on Mac OS X allows remote attackers to execute arbitrary code via an HTML document.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-5830 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=775228
- http://www.mozilla.org/security/announce/2012/mfsa2012-106.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-2
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://osvdb.org/87598
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80183
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5835: Integer overflow in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-06T16:47:00
Summary
Integer overflow in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via crafted data.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-5835 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-106.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=790879
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-2
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.securityfocus.com/bid/56643
- http://osvdb.org/87601
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80185
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16603
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5840: Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-06T17:38:00
Summary
Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4214.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-5840 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=805287
- http://www.mozilla.org/security/announce/2012/mfsa2012-105.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-2
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://www.palemoon.org/releasenotes-ng.shtml
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.securityfocus.com/bid/56635
- http://osvdb.org/87606
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80190
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16904
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5833: The texImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-06T16:50:00
Summary
The texImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via function calls involving certain values of the level parameter.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-5833 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=785734
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-2
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.securityfocus.com/bid/56642
- http://osvdb.org/87581
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://www.mozilla.org/security/announce/2012/mfsa2012-106.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80184
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16748
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5841: Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0,…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-06T16:48:00
Summary
Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 implement cross-origin wrappers with a filtering behavior that does not properly restrict write actions, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-5841 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-100.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=805807
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-2
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.securityfocus.com/bid/56631
- http://osvdb.org/87588
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80178
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16590
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-5842: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0,…
Published: 2012-11-21T12:55:00 Last Modified: 2020-08-06T16:47:00
Summary
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-5842 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=736537
- https://bugzilla.mozilla.org/show_bug.cgi?id=793848
- https://bugzilla.mozilla.org/show_bug.cgi?id=809674
- https://bugzilla.mozilla.org/show_bug.cgi?id=802168
- https://bugzilla.mozilla.org/show_bug.cgi?id=805957
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
- http://www.ubuntu.com/usn/USN-1638-1
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
- http://lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
- http://www.ubuntu.com/usn/USN-1638-2
- http://www.ubuntu.com/usn/USN-1638-3
- http://rhn.redhat.com/errata/RHSA-2012-1482.html
- http://www.debian.org/security/2012/dsa-2583
- http://www.debian.org/security/2012/dsa-2584
- http://rhn.redhat.com/errata/RHSA-2012-1483.html
- http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
- http://www.ubuntu.com/usn/USN-1636-1
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
- http://www.debian.org/security/2012/dsa-2588
- http://www.securityfocus.com/bid/56611
- http://secunia.com/advisories/51381
- http://secunia.com/advisories/51434
- http://secunia.com/advisories/51369
- http://secunia.com/advisories/51360
- http://secunia.com/advisories/51359
- http://secunia.com/advisories/51440
- http://secunia.com/advisories/51439
- http://www.mozilla.org/security/announce/2012/mfsa2012-91.html
- http://osvdb.org/87596
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:173
- http://secunia.com/advisories/51370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80169
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16573
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4564: ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote…
Published: 2012-11-11T13:00:00 Last Modified: 2020-11-12T13:48:00
Summary
ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4564 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2012/11/02/7
- http://www.osvdb.org/86878
- http://secunia.com/advisories/51133
- http://www.securityfocus.com/bid/56372
- http://www.openwall.com/lists/oss-security/2012/11/02/3
- https://bugzilla.redhat.com/show_bug.cgi?id=871700
- http://www.debian.org/security/2012/dsa-2575
- http://www.ubuntu.com/usn/USN-1631-1
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00076.html
- http://rhn.redhat.com/errata/RHSA-2012-1590.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79750
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4195: The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before…
Published: 2012-10-29T18:55:00 Last Modified: 2020-08-12T14:39:00
Summary
The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4195 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-90.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=793121
- http://rhn.redhat.com/errata/RHSA-2012-1407.html
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html
- http://rhn.redhat.com/errata/RHSA-2012-1413.html
- http://www.ubuntu.com/usn/USN-1620-1
- http://www.ubuntu.com/usn/USN-1620-2
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00025.html
- http://www.securityfocus.com/bid/56302
- http://secunia.com/advisories/51165
- http://secunia.com/advisories/51146
- http://secunia.com/advisories/51121
- http://secunia.com/advisories/51123
- http://secunia.com/advisories/51147
- http://secunia.com/advisories/51144
- http://secunia.com/advisories/51127
- http://secunia.com/advisories/55318
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16856
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4194: Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2,…
Published: 2012-10-29T18:55:00 Last Modified: 2020-08-12T17:43:00
Summary
Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4194 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=800666
- http://www.mozilla.org/security/announce/2012/mfsa2012-90.html
- http://rhn.redhat.com/errata/RHSA-2012-1407.html
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html
- http://rhn.redhat.com/errata/RHSA-2012-1413.html
- http://www.ubuntu.com/usn/USN-1620-1
- http://www.ubuntu.com/usn/USN-1620-2
- http://www.securityfocus.com/bid/56301
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00025.html
- http://secunia.com/advisories/51165
- http://secunia.com/advisories/51146
- http://secunia.com/advisories/51121
- http://secunia.com/advisories/51123
- http://secunia.com/advisories/51147
- http://secunia.com/advisories/51144
- http://secunia.com/advisories/51127
- http://secunia.com/advisories/55318
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16918
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4196: Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2,…
Published: 2012-10-29T18:55:00 Last Modified: 2020-08-12T17:45:00
Summary
Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
Common Weakness Enumeration (CWE): CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’)
CWE Description: The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4196 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-90.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=802557
- http://rhn.redhat.com/errata/RHSA-2012-1407.html
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00019.html
- http://rhn.redhat.com/errata/RHSA-2012-1413.html
- http://www.ubuntu.com/usn/USN-1620-1
- http://www.ubuntu.com/usn/USN-1620-2
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00025.html
- http://www.securityfocus.com/bid/56306
- http://secunia.com/advisories/51165
- http://secunia.com/advisories/51146
- http://secunia.com/advisories/51121
- http://secunia.com/advisories/51123
- http://secunia.com/advisories/51147
- http://secunia.com/advisories/51144
- http://secunia.com/advisories/51127
- http://secunia.com/advisories/55318
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16962
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3177: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and…
Published: 2012-10-17T00:55:00 Last Modified: 2020-08-05T15:06:00
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.0
- CVSS: 6.8
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3177 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
- http://rhn.redhat.com/errata/RHSA-2012-1462.html
- http://www.ubuntu.com/usn/USN-1621-1
- http://www.debian.org/security/2012/dsa-2581
- http://secunia.com/advisories/51177
- http://secunia.com/advisories/51309
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
- http://security.gentoo.org/glsa/glsa-201308-06.xml
- http://secunia.com/advisories/53372
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79383
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3166: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and…
Published: 2012-10-17T00:55:00 Last Modified: 2020-08-06T14:26:00
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.0
- CVSS: 4.0
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3166 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
- http://rhn.redhat.com/errata/RHSA-2012-1462.html
- http://www.ubuntu.com/usn/USN-1621-1
- http://www.debian.org/security/2012/dsa-2581
- http://secunia.com/advisories/51177
- http://secunia.com/advisories/51309
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
- http://security.gentoo.org/glsa/glsa-201308-06.xml
- http://secunia.com/advisories/53372
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4193: Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1,…
Published: 2012-10-12T10:44:00 Last Modified: 2020-08-14T18:07:00
Summary
Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
Common Weakness Enumeration (CWE): CWE-346: Origin Validation Error
CWE Description: The software does not properly verify that the source of data or communication is valid.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4193 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-89.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=720619
- http://rhn.redhat.com/errata/RHSA-2012-1362.html
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2012-1361.html
- http://secunia.com/advisories/50907
- http://secunia.com/advisories/50964
- http://secunia.com/advisories/50906
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79211
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16786
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3982: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0,…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-10T15:53:00
Summary
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3982 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=783502
- http://www.mozilla.org/security/announce/2012/mfsa2012-74.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=794025
- https://bugzilla.mozilla.org/show_bug.cgi?id=790856
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.debian.org/security/2012/dsa-2569
- http://www.debian.org/security/2012/dsa-2565
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.debian.org/security/2012/dsa-2572
- http://www.securityfocus.com/bid/55924
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/51181
- http://secunia.com/advisories/55318
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16612
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3994: Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-07T15:42:00
Summary
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3994 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-82.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=765527
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://osvdb.org/86110
- http://www.securityfocus.com/bid/56118
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/55318
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16798
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3991: Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-11T13:37:00
Summary
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict JSAPI access to the GetProperty function, which allows remote attackers to bypass the Same Origin Policy and possibly have unspecified other impact via a crafted web site.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3991 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=783260
- http://www.mozilla.org/security/announce/2012/mfsa2012-81.html
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.debian.org/security/2012/dsa-2569
- http://www.debian.org/security/2012/dsa-2565
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.debian.org/security/2012/dsa-2572
- http://www.securityfocus.com/bid/55930
- http://osvdb.org/86098
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/51181
- http://secunia.com/advisories/55318
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16646
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3992: Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-10T14:52:00
Summary
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage history data, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive POST content via vectors involving a location.hash write operation and history navigation that triggers the loading of a URL into the history object.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3992 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-84.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=775009
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.securityfocus.com/bid/56128
- http://secunia.com/advisories/50984
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/55318
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16987
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3995: The IsCSSWordSpacingSpace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-13T18:12:00
Summary
The IsCSSWordSpacingSpace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3995 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-85.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=765621
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.securityfocus.com/bid/56136
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79156
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16808
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4184: The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-13T18:32:00
Summary
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not prevent access to properties of a prototype for a standard class, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4184 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-83.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=780370
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.securityfocus.com/bid/56120
- http://osvdb.org/86113
- http://secunia.com/advisories/50984
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79154
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16946
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4181: Use-after-free vulnerability in the nsSMILAnimationController::DoSample function in Mozilla…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-07T15:42:00
Summary
Use-after-free vulnerability in the nsSMILAnimationController::DoSample function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4181 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=786111
- http://www.mozilla.org/security/announce/2012/mfsa2012-85.html
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://osvdb.org/86100
- http://www.securityfocus.com/bid/56130
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79159
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16523
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4182: Use-after-free vulnerability in the nsTextEditRules::WillInsert function in Mozilla Firefox…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-13T19:32:00
Summary
Use-after-free vulnerability in the nsTextEditRules::WillInsert function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4182 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=788950
- http://www.mozilla.org/security/announce/2012/mfsa2012-85.html
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.debian.org/security/2012/dsa-2569
- http://www.debian.org/security/2012/dsa-2565
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.debian.org/security/2012/dsa-2572
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/51181
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79160
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16191
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3986: Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-10T14:47:00
Summary
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict calls to DOMWindowUtils (aka nsDOMWindowUtils) methods, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3986 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=775868
- http://www.mozilla.org/security/announce/2012/mfsa2012-77.html
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.debian.org/security/2012/dsa-2569
- http://www.debian.org/security/2012/dsa-2565
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.debian.org/security/2012/dsa-2572
- http://www.securityfocus.com/bid/55922
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/51181
- http://secunia.com/advisories/55318
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16834
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4186: Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-11T13:43:00
Summary
Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4186 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-86.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=785967
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.debian.org/security/2012/dsa-2569
- http://www.debian.org/security/2012/dsa-2565
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.debian.org/security/2012/dsa-2572
- http://osvdb.org/86117
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/51181
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79163
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16193
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3988: Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8,…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-12T18:11:00
Summary
Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 might allow user-assisted remote attackers to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3988 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=725770
- http://www.mozilla.org/security/announce/2012/mfsa2012-79.html
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://osvdb.org/86109
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79149
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16334
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4188: Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-13T19:29:00
Summary
Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4188 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=787722
- http://www.mozilla.org/security/announce/2012/mfsa2012-86.html
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.debian.org/security/2012/dsa-2569
- http://www.debian.org/security/2012/dsa-2565
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.debian.org/security/2012/dsa-2572
- http://osvdb.org/86096
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/51181
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79165
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16964
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3990: Use-after-free vulnerability in the IME State Manager implementation in Mozilla Firefox before…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-13T19:27:00
Summary
Use-after-free vulnerability in the IME State Manager implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors, related to the nsIContent::GetNameSpaceID function.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3990 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=787704
- http://www.mozilla.org/security/announce/2012/mfsa2012-87.html
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.debian.org/security/2012/dsa-2569
- http://www.debian.org/security/2012/dsa-2565
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.debian.org/security/2012/dsa-2572
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/51181
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79172
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16642
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4185: Buffer overflow in the nsCharTraits::length function in Mozilla Firefox before 16.0, Firefox ESR…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-10T15:19:00
Summary
Buffer overflow in the nsCharTraits::length function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4185 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-86.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=785753
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.securityfocus.com/bid/56127
- http://osvdb.org/86116
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79162
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16009
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4179: Use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function in Mozilla…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-13T18:21:00
Summary
Use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4179 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-85.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=785574
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.debian.org/security/2012/dsa-2569
- http://www.debian.org/security/2012/dsa-2565
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.debian.org/security/2012/dsa-2572
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/51181
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79157
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16882
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4187: Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-10T14:59:00
Summary
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage a certain insPos variable, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and assertion failure) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4187 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-86.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=787493
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.securityfocus.com/bid/56125
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/55318
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16425
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4180: Heap-based buffer overflow in the nsHTMLEditor::IsPrevCharInNodeWhitespace function in Mozilla…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-10T16:44:00
Summary
Heap-based buffer overflow in the nsHTMLEditor::IsPrevCharInNodeWhitespace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4180 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-85.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=785720
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.debian.org/security/2012/dsa-2569
- http://www.debian.org/security/2012/dsa-2565
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.debian.org/security/2012/dsa-2572
- http://osvdb.org/86099
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://secunia.com/advisories/51181
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79158
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16428
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4183: Use-after-free vulnerability in the DOMSVGTests::GetRequiredFeatures function in Mozilla Firefox…
Published: 2012-10-10T17:55:00 Last Modified: 2020-08-11T13:47:00
Summary
Use-after-free vulnerability in the DOMSVGTests::GetRequiredFeatures function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-4183 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=786895
- http://rhn.redhat.com/errata/RHSA-2012-1351.html
- http://www.ubuntu.com/usn/USN-1611-1
- http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
- http://www.securityfocus.com/bid/56140
- http://osvdb.org/86095
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:163
- http://secunia.com/advisories/50936
- http://secunia.com/advisories/50935
- http://secunia.com/advisories/50856
- http://secunia.com/advisories/50984
- http://secunia.com/advisories/50904
- http://secunia.com/advisories/50892
- http://www.mozilla.org/security/announce/2012/mfsa2012-85.html
- http://secunia.com/advisories/55318
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79161
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16850
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4453: dracut.sh in dracut, as used in Red Hat Enterprise Linux 6, Fedora 16 and 17, and possibly other…
Published: 2012-10-09T23:55:00 Last Modified: 2020-10-09T18:10:00
Summary
dracut.sh in dracut, as used in Red Hat Enterprise Linux 6, Fedora 16 and 17, and possibly other products, creates initramfs images with world-readable permissions, which might allow local users to obtain sensitive information.
Common Weakness Enumeration (CWE): CWE-276: Incorrect Default Permissions
CWE Description: During installation, installed file permissions are set to allow anyone to modify those files.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-4453 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2012/09/27/4
- http://git.kernel.org/?p=boot/dracut/dracut.git;a=commit;h=e1b48995c26c4f06d1a71
- http://www.openwall.com/lists/oss-security/2012/09/27/6
- https://bugzilla.redhat.com/show_bug.cgi?id=859448
- http://www.openwall.com/lists/oss-security/2012/09/27/3
- http://www.securityfocus.com/bid/55713
- http://rhn.redhat.com/errata/RHSA-2013-1674.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79258
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3552: Race condition in the IP implementation in the Linux kernel before 3.0 might allow remote…
Published: 2012-10-03T11:02:00 Last Modified: 2020-07-31T11:33:00
Summary
Race condition in the IP implementation in the Linux kernel before 3.0 might allow remote attackers to cause a denial of service (slab corruption and system crash) by sending packets to an application that sets socket options during the handling of network traffic.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3552 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=853465
- http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0
- http://www.openwall.com/lists/oss-security/2012/08/31/11
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f6d8bd051c391c1c0458a30b2a7abcd939329259
- https://github.com/torvalds/linux/commit/f6d8bd051c391c1c0458a30b2a7abcd939329259
- http://rhn.redhat.com/errata/RHSA-2012-1540.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1970: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0,…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-28T13:30:00
Summary
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1970 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=775206
- https://bugzilla.mozilla.org/show_bug.cgi?id=761831
- https://bugzilla.mozilla.org/show_bug.cgi?id=764176
- https://bugzilla.mozilla.org/show_bug.cgi?id=745158
- https://bugzilla.mozilla.org/show_bug.cgi?id=758408
- https://bugzilla.mozilla.org/show_bug.cgi?id=778765
- http://www.mozilla.org/security/announce/2012/mfsa2012-57.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=777806
- http://www.debian.org/security/2012/dsa-2553
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.debian.org/security/2012/dsa-2556
- http://www.ubuntu.com/usn/USN-1548-1
- http://www.debian.org/security/2012/dsa-2554
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- http://www.securityfocus.com/bid/55266
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16910
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1976: Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-26T20:36:00
Summary
Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1976 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=776213
- http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
- http://www.debian.org/security/2012/dsa-2553
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.debian.org/security/2012/dsa-2556
- http://www.ubuntu.com/usn/USN-1548-1
- http://www.debian.org/security/2012/dsa-2554
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55319
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16818
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1973: Use-after-free vulnerability in the nsObjectLoadingContent::LoadObject function in Mozilla…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-26T20:35:00
Summary
Use-after-free vulnerability in the nsObjectLoadingContent::LoadObject function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1973 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=773207
- http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
- http://www.debian.org/security/2012/dsa-2553
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.debian.org/security/2012/dsa-2556
- http://www.ubuntu.com/usn/USN-1548-1
- http://www.debian.org/security/2012/dsa-2554
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55316
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17045
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1972: Use-after-free vulnerability in the nsHTMLEditor::CollapseAdjacentTextNodes function in Mozilla…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-28T13:33:00
Summary
Use-after-free vulnerability in the nsHTMLEditor::CollapseAdjacentTextNodes function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1972 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=778428
- http://www.debian.org/security/2012/dsa-2553
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.debian.org/security/2012/dsa-2556
- http://www.ubuntu.com/usn/USN-1548-1
- http://www.debian.org/security/2012/dsa-2554
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55314
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17017
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1975: Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-28T13:44:00
Summary
Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1975 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=777578
- http://www.debian.org/security/2012/dsa-2553
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.debian.org/security/2012/dsa-2556
- http://www.ubuntu.com/usn/USN-1548-1
- http://www.debian.org/security/2012/dsa-2554
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55318
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17040
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1974: Use-after-free vulnerability in the gfxTextRun::CanBreakLineBefore function in Mozilla Firefox…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-26T20:36:00
Summary
Use-after-free vulnerability in the gfxTextRun::CanBreakLineBefore function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1974 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=769303
- http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
- http://www.debian.org/security/2012/dsa-2553
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.debian.org/security/2012/dsa-2556
- http://www.ubuntu.com/usn/USN-1548-1
- http://www.debian.org/security/2012/dsa-2554
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55317
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17015
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3956: Use-after-free vulnerability in the MediaStreamGraphThreadRunnable::Run function in Mozilla…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-28T14:09:00
Summary
Use-after-free vulnerability in the MediaStreamGraphThreadRunnable::Run function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3956 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=774597
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.ubuntu.com/usn/USN-1548-1
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55320
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16997
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3957: Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-28T14:12:00
Summary
Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3957 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=774548
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.ubuntu.com/usn/USN-1548-1
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55341
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16940
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3959: Use-after-free vulnerability in the nsRangeUpdater::SelAdjDeleteNode function in Mozilla Firefox…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-26T20:36:00
Summary
Use-after-free vulnerability in the nsRangeUpdater::SelAdjDeleteNode function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3959 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=771994
- http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
- http://www.debian.org/security/2012/dsa-2553
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.debian.org/security/2012/dsa-2556
- http://www.ubuntu.com/usn/USN-1548-1
- http://www.debian.org/security/2012/dsa-2554
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55324
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16805
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3960: Use-after-free vulnerability in the mozSpellChecker::SetCurrentDictionary function in Mozilla…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-26T20:37:00
Summary
Use-after-free vulnerability in the mozSpellChecker::SetCurrentDictionary function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3960 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=771976
- http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.ubuntu.com/usn/USN-1548-1
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55325
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16853
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3961: Use-after-free vulnerability in the RangeData implementation in Mozilla Firefox before 15.0,…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-28T14:23:00
Summary
Use-after-free vulnerability in the RangeData implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3961 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=771873
- http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.ubuntu.com/usn/USN-1548-1
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55321
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16514
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3963: Use-after-free vulnerability in the js::gc::MapAllocToTraceKind function in Mozilla Firefox…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-26T20:38:00
Summary
Use-after-free vulnerability in the js::gc::MapAllocToTraceKind function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3963 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=762280
- http://www.mozilla.org/security/announce/2012/mfsa2012-58.html
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.ubuntu.com/usn/USN-1548-1
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55340
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16437
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3967: The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7,…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-14T17:21:00
Summary
The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large number of sampler uniforms are used, does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted web site.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3967 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-62.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=777028
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.ubuntu.com/usn/USN-1548-1
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55277
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3968: Use-after-free vulnerability in the WebGL implementation in Mozilla Firefox before 15.0, Firefox…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-28T14:23:00
Summary
Use-after-free vulnerability in the WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via vectors related to deletion of a fragment shader by its accessor.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3968 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=775852
- http://www.mozilla.org/security/announce/2012/mfsa2012-62.html
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.ubuntu.com/usn/USN-1548-1
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55276
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16280
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3972: The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0,…
Published: 2012-08-29T10:56:00 Last Modified: 2020-09-09T14:51:00
Summary
The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based buffer over-read.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3972 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-65.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=746855
- http://www.debian.org/security/2012/dsa-2553
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.debian.org/security/2012/dsa-2556
- http://www.ubuntu.com/usn/USN-1548-1
- http://www.debian.org/security/2012/dsa-2554
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-1211.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16234
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3976: Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not…
Published: 2012-08-29T10:56:00 Last Modified: 2020-08-26T20:39:00
Summary
Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-3976 vulnerability.
References
- http://www.mozilla.org/security/announce/2012/mfsa2012-69.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=768568
- http://www.ubuntu.com/usn/USN-1548-2
- http://www.ubuntu.com/usn/USN-1548-1
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00028.html
- http://rhn.redhat.com/errata/RHSA-2012-1210.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00011.html
- http://www.securityfocus.com/bid/55313
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16060
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4291: The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2…
Published: 2012-08-16T10:38:00 Last Modified: 2018-10-30T16:27:00
Summary
The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.5
- CVSS: 3.3
- CVSS Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2012-4291 vulnerability.
References
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7570
- http://www.wireshark.org/security/wnpa-sec-2012-20.html
- https://hermes.opensuse.org/messages/15514562
- http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html
- http://rhn.redhat.com/errata/RHSA-2013-0125.html
- http://www.securityfocus.com/bid/55035
- https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3
- http://secunia.com/advisories/51363
- http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
- http://secunia.com/advisories/54425
- http://secunia.com/advisories/50276
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15813
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4285: The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in…
Published: 2012-08-16T10:38:00 Last Modified: 2018-10-30T16:27:00
Summary
The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a zero-length message.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.5
- CVSS: 3.3
- CVSS Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2012-4285 vulnerability.
References
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7566
- http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=44247&r2=44246&pathrev=44247
- http://www.wireshark.org/security/wnpa-sec-2012-13.html
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=44247
- https://hermes.opensuse.org/messages/15514562
- http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html
- http://rhn.redhat.com/errata/RHSA-2013-0125.html
- http://www.securityfocus.com/bid/55035
- https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3
- http://secunia.com/advisories/51363
- http://secunia.com/advisories/50276
- http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
- http://secunia.com/advisories/54425
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15712
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4290: The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2…
Published: 2012-08-16T10:38:00 Last Modified: 2018-10-30T16:27:00
Summary
The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.5
- CVSS: 3.3
- CVSS Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2012-4290 vulnerability.
References
- http://www.wireshark.org/security/wnpa-sec-2012-23.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7573
- https://hermes.opensuse.org/messages/15514562
- http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html
- http://rhn.redhat.com/errata/RHSA-2013-0125.html
- http://www.securityfocus.com/bid/55035
- https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3
- http://secunia.com/advisories/51363
- http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
- http://secunia.com/advisories/54425
- http://secunia.com/advisories/50276
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15619
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-4289: epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before…
Published: 2012-08-16T10:38:00 Last Modified: 2018-10-30T16:27:00
Summary
epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 6.5
- CVSS: 3.3
- CVSS Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2012-4289 vulnerability.
References
- http://www.wireshark.org/security/wnpa-sec-2012-17.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7603
- http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-afp.c?r1=44317&r2=44316&pathrev=44317
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=44317
- https://hermes.opensuse.org/messages/15514562
- http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html
- http://rhn.redhat.com/errata/RHSA-2013-0125.html
- http://www.securityfocus.com/bid/55035
- https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3
- http://secunia.com/advisories/51363
- http://secunia.com/advisories/50276
- http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
- http://secunia.com/advisories/54425
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14963
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-3440: A certain Red Hat script for sudo 1.7.2 on Red Hat Enterprise Linux (RHEL) 5 allows local users…
Published: 2012-08-08T10:26:00 Last Modified: 2016-11-28T19:08:00
Summary
A certain Red Hat script for sudo 1.7.2 on Red Hat Enterprise Linux (RHEL) 5 allows local users to overwrite arbitrary files via a symlink attack on the /var/tmp/nsswitch.conf.bak temporary file.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 9.2
- Exploitability Score: 1.9
- CVSS: 5.6
- CVSS Vector: AV:L/AC:H/Au:N/C:N/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-3440 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=844442
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/54868
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-2665: Multiple heap-based buffer overflows in the XML manifest encryption tag parsing functionality in…
Published: 2012-08-06T18:55:00 Last Modified: 2022-02-07T16:34:00
Summary
Multiple heap-based buffer overflows in the XML manifest encryption tag parsing functionality in OpenOffice.org and LibreOffice before 3.5.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Open Document Text (.odt) file with (1) a child tag within an incorrect parent tag, (2) duplicate tags, or (3) a Base64 ChecksumAttribute whose length is not evenly divisible by four.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-2665 vulnerability.
References
- http://www.securitytracker.com/id?1027332
- http://www.securitytracker.com/id?1027331
- http://secunia.com/advisories/50146
- http://rhn.redhat.com/errata/RHSA-2012-1135.html
- http://secunia.com/advisories/50142
- https://bugzilla.redhat.com/show_bug.cgi?id=826077
- http://www.ubuntu.com/usn/USN-1536-1
- http://www.debian.org/security/2012/dsa-2520
- http://www.ubuntu.com/usn/USN-1537-1
- http://www.securityfocus.com/bid/54769
- http://security.gentoo.org/glsa/glsa-201209-05.xml
- http://secunia.com/advisories/50692
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://secunia.com/advisories/60799
- http://www.pre-cert.de/advisories/PRE-SA-2012-05.txt
- http://www.libreoffice.org/about-us/security/advisories/cve-2012-2665/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-0867: PostgreSQL 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 truncates the common…
Published: 2012-07-18T23:55:00 Last Modified: 2016-12-07T19:56:00
Summary
PostgreSQL 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 truncates the common name to only 32 characters when verifying SSL certificates, which allows remote attackers to spoof connections when the host name is exactly 32 characters.
Common Weakness Enumeration (CWE): CWE-295: Improper Certificate Validation
CWE Description: The software does not validate, or incorrectly validates, a certificate.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-0867 vulnerability.
References
- http://www.postgresql.org/docs/8.4/static/release-8-4-11.html
- http://www.postgresql.org/docs/9.0/static/release-9-0-7.html
- http://rhn.redhat.com/errata/RHSA-2012-0678.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:026
- http://www.postgresql.org/about/news/1377/
- http://www.debian.org/security/2012/dsa-2418
- http://www.postgresql.org/docs/9.1/static/release-9-1-3.html
- http://lists.opensuse.org/opensuse-updates/2012-09/msg00060.html
- http://secunia.com/advisories/49273
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1149: Integer overflow in the vclmi.dll module in OpenOffice.org (OOo) 3.3, 3.4 Beta, and possibly…
Published: 2012-06-21T15:55:00 Last Modified: 2017-08-29T01:31:00
Summary
Integer overflow in the vclmi.dll module in OpenOffice.org (OOo) 3.3, 3.4 Beta, and possibly earlier, and LibreOffice before 3.5.3, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted embedded image object, as demonstrated by a JPEG image in a .DOC file, which triggers a heap-based buffer overflow.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1149 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2012-0705.html
- http://www.osvdb.org/81988
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:090
- http://www.debian.org/security/2012/dsa-2487
- http://www.securityfocus.com/bid/53570
- http://www.openoffice.org/security/cves/CVE-2012-1149.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:091
- http://secunia.com/advisories/49392
- http://www.debian.org/security/2012/dsa-2473
- http://securitytracker.com/id?1027068
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081319.html
- http://secunia.com/advisories/46992
- http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082168.html
- http://secunia.com/advisories/49373
- http://secunia.com/advisories/47244
- http://archives.neohapsis.com/archives/bugtraq/2012-05/0089.html
- http://secunia.com/advisories/49140
- http://security.gentoo.org/glsa/glsa-201209-05.xml
- http://secunia.com/advisories/50692
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://secunia.com/advisories/60799
- http://www.libreoffice.org/advisories/cve-2012-1149/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75692
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-2149: The WPXContentListener::_closeTableRow function in WPXContentListener.cpp in libwpd 0.8.8, as…
Published: 2012-06-21T15:55:00 Last Modified: 2016-08-17T18:38:00
Summary
The WPXContentListener::_closeTableRow function in WPXContentListener.cpp in libwpd 0.8.8, as used by OpenOffice.org (OOo) before 3.4, allows remote attackers to execute arbitrary code via a crafted Wordperfect .WPD document that causes a negative array index to be used. NOTE: some sources report this issue as an integer overflow.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-2149 vulnerability.
References
- https://www.sec-consult.com/files/20120518-0_openoffice_memory_overwrite.txt
- http://packetstormsecurity.org/files/112862/libwpd-WPXContentListener-_closeTableRow-Memory-Overwrite.html
- http://www.openoffice.org/security/cves/CVE-2012-2149.html
- http://www.securityfocus.com/bid/53570
- http://secunia.com/advisories/46992
- http://rhn.redhat.com/errata/RHSA-2012-1043.html
- http://archives.neohapsis.com/archives/bugtraq/2012-05/0090.html
- http://www.securitytracker.com/id?1027069
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://secunia.com/advisories/60799
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3193: Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-…
Published: 2012-06-16T00:55:00 Last Modified: 2021-07-14T15:41:00
Summary
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-3193 vulnerability.
References
- http://secunia.com/advisories/46128
- http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html
- http://git.gnome.org/browse/pango/commit/pango/opentype/harfbuzz-gpos.c?id=a7a715480db66148b1f487528887508a7991dcd0
- http://secunia.com/advisories/46119
- http://rhn.redhat.com/errata/RHSA-2011-1323.html
- http://www.osvdb.org/75652
- http://secunia.com/advisories/41537
- https://hermes.opensuse.org/messages/12056605
- http://rhn.redhat.com/errata/RHSA-2011-1328.html
- http://rhn.redhat.com/errata/RHSA-2011-1327.html
- http://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7c7bf156dbf65
- http://www.openwall.com/lists/oss-security/2011/08/22/6
- http://www.openwall.com/lists/oss-security/2011/08/25/1
- http://rhn.redhat.com/errata/RHSA-2011-1326.html
- http://secunia.com/advisories/46410
- http://rhn.redhat.com/errata/RHSA-2011-1325.html
- http://secunia.com/advisories/46117
- http://www.openwall.com/lists/oss-security/2011/08/24/8
- https://qt.gitorious.org/qt/qt/commit/9ae6f2f9a57f0c3096d5785913e437953fa6775c
- http://www.securityfocus.com/bid/49723
- http://secunia.com/advisories/46371
- http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html
- http://cgit.freedesktop.org/harfbuzz/commit/src/harfbuzz-gpos.c?id=da2c52abcd75d46929b34cad55c4fb2c8892bc08
- http://secunia.com/advisories/46118
- http://rhn.redhat.com/errata/RHSA-2011-1324.html
- http://www.ubuntu.com/usn/USN-1504-1
- http://secunia.com/advisories/49895
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69991
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-2313: The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel before 3.3.7 does…
Published: 2012-06-13T10:24:00 Last Modified: 2016-09-06T13:25:00
Summary
The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel before 3.3.7 does not restrict access to the SIOCSMIIREG command, which allows local users to write data to an Ethernet adapter via an ioctl call.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 1.9
- CVSS: 1.2
- CVSS Vector: AV:L/AC:H/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-2313 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2012/05/04/8
- https://bugzilla.redhat.com/show_bug.cgi?id=818820
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.7
- https://github.com/torvalds/linux/commit/1bb57e940e1958e40d51f2078f50c3a96a9b2d75
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1bb57e940e1958e40d51f2078f50c3a96a9b2d75
- http://rhn.redhat.com/errata/RHSA-2012-1174.html
- http://rhn.redhat.com/errata/RHSA-2012-1589.html
- http://rhn.redhat.com/errata/RHSA-2012-1481.html
- http://www.securityfocus.com/bid/53965
- http://rhn.redhat.com/errata/RHSA-2012-1541.html
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
- http://marc.info/?l=bugtraq&m=139447903326211&w=2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-2038: Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X;…
Published: 2012-06-09T00:55:00 Last Modified: 2021-09-08T17:19:00
Summary
Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-2038 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb12-14.html
- http://rhn.redhat.com/errata/RHSA-2012-0722.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-2039: Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X;…
Published: 2012-06-09T00:55:00 Last Modified: 2021-09-08T17:19:00
Summary
Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-2039 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb12-14.html
- http://rhn.redhat.com/errata/RHSA-2012-0722.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-2035: Stack-based buffer overflow in Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257…
Published: 2012-06-09T00:55:00 Last Modified: 2021-09-08T17:19:00
Summary
Stack-based buffer overflow in Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-2035 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb12-14.html
- http://rhn.redhat.com/errata/RHSA-2012-0722.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-2036: Integer overflow in Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows…
Published: 2012-06-09T00:55:00 Last Modified: 2021-09-08T17:19:00
Summary
Integer overflow in Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-2036 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb12-14.html
- http://rhn.redhat.com/errata/RHSA-2012-0722.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-2034: Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X;…
Published: 2012-06-09T00:55:00 Last Modified: 2021-09-08T17:19:00
Summary
Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2037.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-2034 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb12-14.html
- http://rhn.redhat.com/errata/RHSA-2012-0722.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-2037: Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X;…
Published: 2012-06-09T00:55:00 Last Modified: 2021-09-08T17:19:00
Summary
Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2034.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-2037 vulnerability.
References
- http://www.adobe.com/support/security/bulletins/apsb12-14.html
- http://rhn.redhat.com/errata/RHSA-2012-0722.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1938: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 13.0,…
Published: 2012-06-05T23:55:00 Last Modified: 2020-08-28T13:20:00
Summary
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 13.0, Thunderbird before 13.0, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) methodjit/ImmutableSync.cpp, (2) the JSObject::makeDenseArraySlow function in js/src/jsarray.cpp, and unknown other components.
Scores
- Impact Score: 10.0
- Exploitability Score: 8.6
- CVSS: 9.3
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1938 vulnerability.
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=723773
- http://www.mozilla.org/security/announce/2012/mfsa2012-34.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=699594
- https://bugzilla.mozilla.org/show_bug.cgi?id=670317
- https://bugzilla.mozilla.org/show_bug.cgi?id=723971
- https://bugzilla.mozilla.org/show_bug.cgi?id=708688
- https://bugzilla.mozilla.org/show_bug.cgi?id=718852
- https://bugzilla.mozilla.org/show_bug.cgi?id=736012
- https://bugzilla.mozilla.org/show_bug.cgi?id=748948
- https://bugzilla.mozilla.org/show_bug.cgi?id=730415
- https://bugzilla.mozilla.org/show_bug.cgi?id=716067
- http://www.securityfocus.com/bid/53796
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17058
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:088
- http://rhn.redhat.com/errata/RHSA-2012-0715.html
- http://rhn.redhat.com/errata/RHSA-2012-0710.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00012.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-0260: The JPEGWarningHandler function in coders/jpeg.c in ImageMagick before 6.7.6-3 allows remote…
Published: 2012-06-05T22:55:00 Last Modified: 2020-07-31T18:42:00
Summary
The JPEGWarningHandler function in coders/jpeg.c in ImageMagick before 6.7.6-3 allows remote attackers to cause a denial of service (memory consumption) via a JPEG image with a crafted sequence of restart markers.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-0260 vulnerability.
References
- http://www.osvdb.org/81022
- http://www.cert.fi/en/reports/2012/vulnerability635606.html
- http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html
- http://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=20629
- http://secunia.com/advisories/49068
- http://secunia.com/advisories/49063
- http://rhn.redhat.com/errata/RHSA-2012-0544.html
- http://secunia.com/advisories/48974
- http://secunia.com/advisories/49317
- http://www.securityfocus.com/bid/52898
- http://www.debian.org/security/2012/dsa-2462
- http://rhn.redhat.com/errata/RHSA-2012-0545.html
- http://www.securitytracker.com/id?1027032
- http://secunia.com/advisories/55035
- http://secunia.com/advisories/57224
- http://www.ubuntu.com/usn/USN-2132-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74658
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-0247: ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory…
Published: 2012-06-05T22:55:00 Last Modified: 2020-07-31T18:39:00
Summary
ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset and count values in the ResolutionUnit tag in the EXIF IFD0 of an image.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-0247 vulnerability.
References
- http://secunia.com/advisories/49043
- http://ubuntu.com/usn/usn-1435-1
- http://rhn.redhat.com/errata/RHSA-2012-0545.html
- http://rhn.redhat.com/errata/RHSA-2012-0544.html
- http://secunia.com/advisories/48247
- http://www.gentoo.org/security/en/glsa/glsa-201203-09.xml
- http://secunia.com/advisories/48259
- http://www.cert.fi/en/reports/2012/vulnerability595210.html
- http://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=20286
- http://www.debian.org/security/2012/dsa-2427
- http://secunia.com/advisories/49068
- http://secunia.com/advisories/47926
- http://secunia.com/advisories/49063
- http://www.osvdb.org/79003
- http://www.securitytracker.com/id?1027032
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-0248: ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (infinite…
Published: 2012-06-05T22:55:00 Last Modified: 2020-07-31T18:39:00
Summary
ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted image whose IFD contains IOP tags that all reference the beginning of the IDF.
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-0248 vulnerability.
References
- http://secunia.com/advisories/49063
- http://www.cert.fi/en/reports/2012/vulnerability595210.html
- http://www.debian.org/security/2012/dsa-2427
- http://secunia.com/advisories/49068
- http://ubuntu.com/usn/usn-1435-1
- http://secunia.com/advisories/48259
- http://secunia.com/advisories/48247
- http://www.osvdb.org/79003
- http://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=20286
- http://rhn.redhat.com/errata/RHSA-2012-0545.html
- http://secunia.com/advisories/49043
- http://rhn.redhat.com/errata/RHSA-2012-0544.html
- http://www.gentoo.org/security/en/glsa/glsa-201203-09.xml
- http://www.securityfocus.com/bid/51957
- http://secunia.com/advisories/47926
- http://www.securitytracker.com/id?1027032
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1798: The TIFFGetEXIFProperties function in coders/tiff.c in ImageMagick before 6.7.6-3 allows remote…
Published: 2012-06-05T22:55:00 Last Modified: 2020-07-31T18:43:00
Summary
The TIFFGetEXIFProperties function in coders/tiff.c in ImageMagick before 6.7.6-3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted EXIF IFD in a TIFF image.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1798 vulnerability.
References
- http://secunia.com/advisories/49317
- http://secunia.com/advisories/49068
- http://secunia.com/advisories/49063
- http://www.osvdb.org/81023
- http://www.debian.org/security/2012/dsa-2462
- http://secunia.com/advisories/48974
- http://www.securityfocus.com/bid/52898
- http://rhn.redhat.com/errata/RHSA-2012-0544.html
- http://lists.opensuse.org/opensuse-updates/2012-06/msg00001.html
- http://www.imagemagick.org/discourse-server/viewtopic.php?f=4&t=20629
- http://www.securitytracker.com/id?1027032
- http://secunia.com/advisories/55035
- https://exchange.xforce.ibmcloud.com/vulnerabilities/74659
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2517: Multiple buffer overflows in net/wireless/nl80211.c in the Linux kernel before 2.6.39.2 allow…
Published: 2012-05-24T23:55:00 Last Modified: 2020-07-28T13:55:00
Summary
Multiple buffer overflows in net/wireless/nl80211.c in the Linux kernel before 2.6.39.2 allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability during scan operations with a long SSID value.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-2517 vulnerability.
References
- http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.2
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=208c72f4fe44fe09577e7975ba0e7fa0278f3d03
- https://bugzilla.redhat.com/show_bug.cgi?id=718152
- https://github.com/torvalds/linux/commit/208c72f4fe44fe09577e7975ba0e7fa0278f3d03
- http://www.openwall.com/lists/oss-security/2011/07/01/4
- http://rhn.redhat.com/errata/RHSA-2011-1212.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2699: The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification…
Published: 2012-05-24T23:55:00 Last Modified: 2021-07-15T19:16:00
Summary
The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-2699 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=87c48fa3b4630905f98268dde838ee43626a060c
- https://bugzilla.redhat.com/show_bug.cgi?id=723429
- http://www.openwall.com/lists/oss-security/2011/07/20/5
- https://github.com/torvalds/linux/commit/87c48fa3b4630905f98268dde838ee43626a060c
- http://www.securitytracker.com/id?1027274
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3191: Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel…
Published: 2012-05-24T23:55:00 Last Modified: 2020-07-31T10:59:00
Summary
Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel before 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read request for a directory.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 6.5
- CVSS: 8.3
- CVSS Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2011-3191 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2011/08/24/2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9438fabb73eb48055b58b89fc51e0bc4db22fabd
- https://github.com/torvalds/linux/commit/9438fabb73eb48055b58b89fc51e0bc4db22fabd
- https://bugzilla.redhat.com/show_bug.cgi?id=732869
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3188: The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4…
Published: 2012-05-24T23:55:00 Last Modified: 2020-07-29T17:21:00
Summary
The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-3188 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=732658
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec
- https://github.com/torvalds/linux/commit/bc0b96b54a21246e377122d54569eef71cec535f
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=bc0b96b54a21246e377122d54569eef71cec535f
- http://www.openwall.com/lists/oss-security/2011/08/23/2
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1
- https://github.com/torvalds/linux/commit/6e5714eaf77d79ae1c8b47e3e040ff5411b717ec
- http://marc.info/?l=bugtraq&m=139447903326211&w=2
- https://support.f5.com/csp/article/K15301?utm_source=f5support&utm_medium=RSS
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3363: The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not…
Published: 2012-05-24T23:55:00 Last Modified: 2020-07-27T23:18:00
Summary
The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 6.5
- CVSS: 6.1
- CVSS Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2011-3363 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2011/09/14/12
- https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33
- https://bugzilla.redhat.com/show_bug.cgi?id=738291
- http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=70945643722ffeac779d2529a348f99567fa5c33
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1097: The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle…
Published: 2012-05-17T11:00:00 Last Modified: 2021-07-15T19:16:00
Summary
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2012-1097 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2012/03/05/1
- https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c8e252586f8d5de906385d8cf6385fee289a825e
- https://bugzilla.redhat.com/show_bug.cgi?id=799209
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10
- http://secunia.com/advisories/48898
- http://secunia.com/advisories/48842
- http://secunia.com/advisories/48964
- http://rhn.redhat.com/errata/RHSA-2012-0531.html
- http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
- http://rhn.redhat.com/errata/RHSA-2012-0481.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3637: The m_stop function in fs/proc/task_mmu.c in the Linux kernel before 2.6.39 allows local users to…
Published: 2012-05-17T11:00:00 Last Modified: 2020-07-27T23:24:00
Summary
The m_stop function in fs/proc/task_mmu.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (OOPS) via vectors that trigger an m_start error.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-3637 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=747848
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=76597cd31470fa130784c78fadb4dab2e624a723
- http://www.openwall.com/lists/oss-security/2012/02/06/1
- http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
- https://github.com/torvalds/linux/commit/76597cd31470fa130784c78fadb4dab2e624a723
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-4097: Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on…
Published: 2012-05-17T11:00:00 Last Modified: 2020-07-29T15:27:00
Summary
Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-4097 vulnerability.
References
- https://github.com/torvalds/linux/commit/56c6a8a4aadca809e04276eabe5552935c51387f
- https://bugzilla.redhat.com/show_bug.cgi?id=750399
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.8
- http://www.openwall.com/lists/oss-security/2011/11/01/2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-0207: The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote…
Published: 2012-05-17T11:00:00 Last Modified: 2020-07-30T19:39:00
Summary
The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets.
Common Weakness Enumeration (CWE): CWE-369: Divide By Zero
CWE Description: The product divides a value by zero.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2012-0207 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2012/01/10/5
- https://bugzilla.redhat.com/show_bug.cgi?id=772867
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.1
- https://github.com/torvalds/linux/commit/a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a8c1f65c79cbbb2f7da782d4c9d15639a9b94b27
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=654876
- https://github.com/torvalds/linux/commit/25c413ad0029ea86008234be28aee33456e53e5b
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-1703: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and…
Published: 2012-05-03T22:55:00 Last Modified: 2019-12-17T20:23:00
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer, a different vulnerability than CVE-2012-1690.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.0
- CVSS: 6.8
- CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-1703 vulnerability.
References
- http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
- http://www.securityfocus.com/bid/53058
- http://secunia.com/advisories/49179
- http://secunia.com/advisories/48890
- http://rhn.redhat.com/errata/RHSA-2012-1462.html
- http://secunia.com/advisories/51309
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
- http://security.gentoo.org/glsa/glsa-201308-06.xml
- http://secunia.com/advisories/53372
- http://www.securitytracker.com/id?1026934
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-0041: The dissect_packet function in epan/packet.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before…
Published: 2012-04-11T10:39:00 Last Modified: 2017-09-19T01:34:00
Summary
The dissect_packet function in epan/packet.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a capture file, as demonstrated by an airopeek file.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-0041 vulnerability.
References
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6663
- http://www.wireshark.org/security/wnpa-sec-2012-01.html
- http://www.openwall.com/lists/oss-security/2012/01/20/4
- http://www.openwall.com/lists/oss-security/2012/01/11/7
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=40164
- http://secunia.com/advisories/48947
- http://rhn.redhat.com/errata/RHSA-2013-0125.html
- http://secunia.com/advisories/47494
- http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
- http://secunia.com/advisories/54425
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15297
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-0067: wiretap/iptrace.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers…
Published: 2012-04-11T10:39:00 Last Modified: 2017-09-19T01:34:00
Summary
wiretap/iptrace.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in an AIX iptrace file.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2012-0067 vulnerability.
References
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=40167
- http://www.openwall.com/lists/oss-security/2012/01/20/4
- http://www.wireshark.org/security/wnpa-sec-2012-01.html
- http://www.openwall.com/lists/oss-security/2012/01/11/7
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6668
- http://secunia.com/advisories/48947
- http://rhn.redhat.com/errata/RHSA-2013-0125.html
- http://secunia.com/advisories/47494
- http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
- http://secunia.com/advisories/54425
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15192
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-0042: Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 does not properly perform certain string…
Published: 2012-04-11T10:39:00 Last Modified: 2017-09-19T01:34:00
Summary
Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 does not properly perform certain string conversions, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet, related to epan/to_str.c.
Scores
- Impact Score: 2.9
- Exploitability Score: 5.5
- CVSS: 2.9
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2012-0042 vulnerability.
References
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=40194
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6634
- http://www.wireshark.org/security/wnpa-sec-2012-02.html
- http://www.openwall.com/lists/oss-security/2012/01/11/7
- http://secunia.com/advisories/48947
- http://rhn.redhat.com/errata/RHSA-2013-0125.html
- http://www.securitytracker.com/id?1026507
- http://secunia.com/advisories/47494
- http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
- http://secunia.com/advisories/54425
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15368
See also: All popular products CVE Vulnerabilities of redhat
CVE-2012-0066: Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of…
Published: 2012-04-11T10:39:00 Last Modified: 2017-09-19T01:34:00
Summary
Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a (1) Accellent 5Views (aka .5vw) file, (2) I4B trace file, or (3) NETMON 2 capture file.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2012-0066 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2012/01/11/7
- http://www.openwall.com/lists/oss-security/2012/01/20/4
- http://www.wireshark.org/security/wnpa-sec-2012-01.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6666
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6669
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=40166
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=40165
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6667
- http://secunia.com/advisories/48947
- http://rhn.redhat.com/errata/RHSA-2013-0125.html
- http://secunia.com/advisories/47494
- http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
- http://secunia.com/advisories/54425
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15111
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3045: Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01,…
Published: 2012-03-22T16:55:00 Last Modified: 2020-04-14T16:06:00
Summary
Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-3045 vulnerability.
References
- http://googlechromereleases.blogspot.com/2012/03/stable-channel-update_21.html
- http://code.google.com/p/chromium/issues/detail?id=116162
- http://src.chromium.org/viewvc/chrome?view=rev&revision=125311
- http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng;a=commit;h=a8c319a2b281af68f7ca0e2f9a28ca57b44ceb2b
- https://bugzilla.redhat.com/show_bug.cgi?id=799000
- http://secunia.com/advisories/48485
- http://secunia.com/advisories/48512
- http://secunia.com/advisories/48554
- http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076731.html
- http://secunia.com/advisories/48320
- http://lists.opensuse.org/opensuse-updates/2012-03/msg00051.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-March/076461.html
- http://secunia.com/advisories/49660
- http://security.gentoo.org/glsa/glsa-201206-15.xml
- http://www.securitytracker.com/id?1026823
- http://rhn.redhat.com/errata/RHSA-2012-0488.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14763
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:033
- http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075987.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075981.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075619.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075424.html
- http://www.debian.org/security/2012/dsa-2439
- http://rhn.redhat.com/errata/RHSA-2012-0407.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2525: The qdisc_notify function in net/sched/sch_api.c in the Linux kernel before 2.6.35 does not…
Published: 2012-02-02T04:09:00 Last Modified: 2020-08-04T15:13:00
Summary
The qdisc_notify function in net/sched/sch_api.c in the Linux kernel before 2.6.35 does not prevent tc_fill_qdisc function calls referencing builtin (aka CQ_F_BUILTIN) Qdisc structures, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a crafted call.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-2525 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=720552
- http://kerneltrap.org/mailarchive/linux-netdev/2010/5/21/6277805
- http://mirror.anl.gov/pub/linux/kernel/v2.6/ChangeLog-2.6.35
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=53b0f08042f04813cd1a7473dacd3edfacb28eb3
- http://openwall.com/lists/oss-security/2011/07/12/1
- http://rhn.redhat.com/errata/RHSA-2011-1065.html
- http://rhn.redhat.com/errata/RHSA-2011-1163.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3919: Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote…
Published: 2012-01-07T11:55:00 Last Modified: 2020-05-07T19:05:00
Summary
Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Common Weakness Enumeration (CWE): CWE-787: Out-of-bounds Write
CWE Description: The software writes data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-3919 vulnerability.
References
- http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html
- http://code.google.com/p/chromium/issues/detail?id=107128
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:005
- http://www.securitytracker.com/id?1026487
- http://secunia.com/advisories/47449
- http://www.securityfocus.com/bid/51300
- http://support.apple.com/kb/HT5281
- http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2394
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://secunia.com/advisories/55568
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14504
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-3905: libxml2, as used in Google Chrome before 16.0.912.63, allows remote attackers to cause a denial…
Published: 2011-12-13T21:55:00 Last Modified: 2020-05-07T19:05:00
Summary
libxml2, as used in Google Chrome before 16.0.912.63, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-125: Out-of-bounds Read
CWE Description: The software reads data past the end, or before the beginning, of the intended buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-3905 vulnerability.
References
- http://googlechromereleases.blogspot.com/2011/12/stable-channel-update.html
- http://code.google.com/p/chromium/issues/detail?id=95465
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:188
- http://www.debian.org/security/2012/dsa-2394
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14761
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2189: net/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high…
Published: 2011-10-10T10:55:00 Last Modified: 2021-07-15T19:16:00
Summary
net/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2011-2189 vulnerability.
References
- http://www.debian.org/security/2011/dsa-2305
- http://www.openwall.com/lists/oss-security/2011/06/06/20
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629373
- https://bugs.launchpad.net/ubuntu/+source/linux/+bug/720095
- http://kerneltrap.org/mailarchive/git-commits-head/2009/12/8/15289
- https://bugzilla.redhat.com/show_bug.cgi?id=711245
- http://www.openwall.com/lists/oss-security/2011/06/06/10
- https://bugzilla.redhat.com/show_bug.cgi?id=711134
- http://neil.brown.name/git?p=linux-2.6;a=patch;h=2b035b39970740722598f7a9d548835f9bdd730f
- http://patchwork.ozlabs.org/patch/88217/
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2b035b39970740722598f7a9d548835f9bdd730f
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f875bae065334907796da12523f9df85c89f5712
- http://ie.archive.ubuntu.com/linux/kernel/v2.6/ChangeLog-2.6.33
- http://www.ubuntu.com/usn/USN-1288-1
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2834: Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote…
Published: 2011-09-19T12:02:00 Last Modified: 2020-05-08T18:12:00
Summary
Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-2834 vulnerability.
References
- http://code.google.com/p/chromium/issues/detail?id=93472
- http://googlechromereleases.blogspot.com/2011/09/stable-channel-update_16.html
- http://osvdb.org/75560
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:145
- http://www.redhat.com/support/errata/RHSA-2011-1749.html
- http://support.apple.com/kb/HT5281
- http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- http://support.apple.com/kb/HT5503
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://www.debian.org/security/2012/dsa-2394
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69885
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14410
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1776: The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check…
Published: 2011-09-06T16:55:00 Last Modified: 2020-07-27T20:00:00
Summary
The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 7.8
- Exploitability Score: 3.9
- CVSS: 5.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-1776 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
- http://www.securityfocus.com/bid/47796
- https://bugzilla.redhat.com/show_bug.cgi?id=703026
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fa039d5f6b126fbd65eefa05db2f67e44df8f121
- http://www.pre-cert.de/advisories/PRE-SA-2011-04.txt
- http://openwall.com/lists/oss-security/2011/05/10/4
- http://securityreason.com/securityalert/8369
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1576: The Generic Receive Offload (GRO) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise…
Published: 2011-08-31T23:55:00 Last Modified: 2019-04-22T17:48:00
Summary
The Generic Receive Offload (GRO) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux 5 and 2.6.32 on Red Hat Enterprise Linux 6, as used in Red Hat Enterprise Virtualization (RHEV) Hypervisor and other products, allows remote attackers to cause a denial of service via crafted VLAN packets that are processed by the napi_reuse_skb function, leading to (1) a memory leak or (2) memory corruption, a different vulnerability than CVE-2011-1478.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.9
- Exploitability Score: 5.5
- CVSS: 5.7
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2011-1576 vulnerability.
References
- http://www.securitytracker.com/id?1025853
- http://www.redhat.com/support/errata/RHSA-2011-1090.html
- http://www.redhat.com/support/errata/RHSA-2011-1106.html
- https://bugzilla.redhat.com/show_bug.cgi?id=695173
- http://www.securityfocus.com/bid/48907
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2213: The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does…
Published: 2011-08-29T18:55:00 Last Modified: 2020-07-31T21:32:00
Summary
The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.
Common Weakness Enumeration (CWE): CWE-835: Loop with Unreachable Exit Condition (‘Infinite Loop’)
CWE Description: The program contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-2213 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=714536
- http://article.gmane.org/gmane.linux.network/197208
- http://www.openwall.com/lists/oss-security/2011/06/20/13
- http://article.gmane.org/gmane.linux.network/197386
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.3
- http://article.gmane.org/gmane.linux.network/198809
- http://www.openwall.com/lists/oss-security/2011/06/20/16
- http://patchwork.ozlabs.org/patch/100857/
- http://article.gmane.org/gmane.linux.network/197206
- http://www.openwall.com/lists/oss-security/2011/06/20/1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=eeb1497277d6b1a0a34ed36b97e18f2bd7d6de0d
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
- http://marc.info/?l=bugtraq&m=139447903326211&w=2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2821: Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote…
Published: 2011-08-29T15:55:00 Last Modified: 2020-05-19T13:43:00
Summary
Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-2821 vulnerability.
References
- http://googlechromereleases.blogspot.com/2011/08/stable-channel-update_22.html
- http://code.google.com/p/chromium/issues/detail?id=89402
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:145
- http://www.redhat.com/support/errata/RHSA-2011-1749.html
- http://support.apple.com/kb/HT5281
- http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://support.apple.com/kb/HT5503
- http://www.debian.org/security/2012/dsa-2394
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13840
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2492: The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain…
Published: 2011-07-28T22:55:00 Last Modified: 2020-07-31T19:46:00
Summary
The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockopt_old function in net/bluetooth/l2cap_sock.c and (2) the rfcomm_sock_getsockopt_old function in net/bluetooth/rfcomm/sock.c.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-2492 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2011/06/24/2
- http://permalink.gmane.org/gmane.linux.bluez.kernel/12909
- http://securitytracker.com/id?1025778
- http://www.openwall.com/lists/oss-security/2011/06/24/3
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8d03e971cf403305217b8e62db3a2e5ad2d6263f
- http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc4
- https://bugzilla.redhat.com/show_bug.cgi?id=703019
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
- http://marc.info/?l=bugtraq&m=139447903326211&w=2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2689: The gfs2_fallocate function in fs/gfs2/file.c in the Linux kernel before 3.0-rc1 does not ensure…
Published: 2011-07-28T22:55:00 Last Modified: 2020-07-31T19:53:00
Summary
The gfs2_fallocate function in fs/gfs2/file.c in the Linux kernel before 3.0-rc1 does not ensure that the size of a chunk allocation is a multiple of the block size, which allows local users to cause a denial of service (BUG and system crash) by arranging for all resource groups to have too little free space.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-2689 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc1
- http://www.openwall.com/lists/oss-security/2011/07/13/1
- http://secunia.com/advisories/45193
- http://securitytracker.com/id?1025776
- https://bugzilla.redhat.com/show_bug.cgi?id=720861
- http://www.securityfocus.com/bid/48677
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6905d9e4dda6112f007e9090bca80507da158e63
- http://rhn.redhat.com/errata/RHSA-2011-1065.html
- http://marc.info/?l=bugtraq&m=139447903326211&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68557
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1093: The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control…
Published: 2011-07-18T22:55:00 Last Modified: 2020-07-31T21:31:00
Summary
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2011-1093 vulnerability.
References
- http://www.securityfocus.com/bid/46793
- https://bugzilla.redhat.com/show_bug.cgi?id=682954
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38
- http://openwall.com/lists/oss-security/2011/03/08/4
- http://openwall.com/lists/oss-security/2011/03/08/19
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=720dc34bbbe9493c7bd48b2243058b4e447a929d
- http://rhn.redhat.com/errata/RHSA-2011-0833.html
- http://downloads.avaya.com/css/P8/documents/100145416
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-4251: The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly…
Published: 2011-05-26T16:55:00 Last Modified: 2020-08-04T15:45:00
Summary
The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-4251 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=657303
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34
- http://www.securityfocus.com/bid/46637
- http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8eae939f1400326b06d0c9afe53d2a484a326871
- http://secunia.com/advisories/46397
- http://www.vmware.com/security/advisories/VMSA-2011-0012.html
- http://www.securityfocus.com/archive/1/520102/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-4805: The socket implementation in net/core/sock.c in the Linux kernel before 2.6.35 does not properly…
Published: 2011-05-26T16:55:00 Last Modified: 2020-08-04T17:52:00
Summary
The socket implementation in net/core/sock.c in the Linux kernel before 2.6.35 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service by sending a large amount of network traffic, related to the sk_add_backlog function and the sk_rmem_alloc socket field. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4251.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-4805 vulnerability.
References
- http://www.securityfocus.com/bid/46637
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c377411f2494a931ff7facdbb3a6839b1266bcf6
- https://bugzilla.redhat.com/show_bug.cgi?id=657303
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35
- http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1745: Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the…
Published: 2011-05-09T19:55:00 Last Modified: 2020-08-04T19:01:00
Summary
Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-1745 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
- http://openwall.com/lists/oss-security/2011/04/21/4
- https://bugzilla.redhat.com/show_bug.cgi?id=698996
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=194b3da873fd334ef183806db751473512af29ce
- http://openwall.com/lists/oss-security/2011/04/22/7
- https://lkml.org/lkml/2011/4/14/293
- http://www.securityfocus.com/bid/47534
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1746: Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory…
Published: 2011-05-09T19:55:00 Last Modified: 2020-07-28T19:28:00
Summary
Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory functions in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allow local users to trigger buffer overflows, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via vectors related to calls that specify a large number of memory pages.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-1746 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b522f02184b413955f3bc952e3776ce41edc6355
- https://bugzilla.redhat.com/show_bug.cgi?id=698998
- http://openwall.com/lists/oss-security/2011/04/21/4
- http://openwall.com/lists/oss-security/2011/04/22/7
- https://lkml.org/lkml/2011/4/19/400
- https://lkml.org/lkml/2011/4/14/294
- http://www.securityfocus.com/bid/47535
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-2022: The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before…
Published: 2011-05-09T19:55:00 Last Modified: 2020-07-29T15:17:00
Summary
The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-2022 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.5
- https://bugzilla.redhat.com/show_bug.cgi?id=698996
- http://openwall.com/lists/oss-security/2011/04/21/4
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=194b3da873fd334ef183806db751473512af29ce
- https://lkml.org/lkml/2011/4/14/293
- http://openwall.com/lists/oss-security/2011/04/22/7
- http://www.securityfocus.com/bid/47843
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-0714: Use-after-free vulnerability in a certain Red Hat patch for the RPC server sockets functionality…
Published: 2011-05-04T22:55:00 Last Modified: 2019-04-22T17:48:00
Summary
Use-after-free vulnerability in a certain Red Hat patch for the RPC server sockets functionality in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 might allow remote attackers to cause a denial of service (crash) via malformed data in a packet, related to lockd and the svc_xprt_received function.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 5.5
- CVSS: 5.7
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2011-0714 vulnerability.
References
- http://openwall.com/lists/oss-security/2011/03/09/1
- https://bugzilla.redhat.com/show_bug.cgi?id=678144
- https://rhn.redhat.com/errata/RHSA-2011-0329.html
- http://openwall.com/lists/oss-security/2011/03/08/17
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1593: Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel before…
Published: 2011-05-03T20:55:00 Last Modified: 2020-08-05T14:42:00
Summary
Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel before 2.6.38.4 allow local users to cause a denial of service (system crash) via a crafted (1) getdents or (2) readdir system call.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-1593 vulnerability.
References
- http://openwall.com/lists/oss-security/2011/04/20/1
- http://groups.google.com/group/fa.linux.kernel/msg/4a28ecb7f755a88d?dmode=source
- http://secunia.com/advisories/44164
- https://bugzilla.redhat.com/show_bug.cgi?id=697822
- http://securitytracker.com/id?1025420
- http://openwall.com/lists/oss-security/2011/04/19/1
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c78193e9c7bcbf25b8237ad0dec82f805c4ea69b
- http://www.securityfocus.com/bid/47497
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38.4
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d8bdc59f215e62098bc5b4256fd9928bf27053a1
- http://www.ubuntu.com/usn/USN-1146-1
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66876
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1163: The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not…
Published: 2011-04-10T02:51:00 Last Modified: 2020-08-07T19:35:00
Summary
The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-1163 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38
- https://bugzilla.redhat.com/show_bug.cgi?id=688021
- http://securitytracker.com/id?1025225
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1eafbfeb7bdf59cfe173304c76188f3fd5f1fd05
- http://openwall.com/lists/oss-security/2011/03/15/14
- http://openwall.com/lists/oss-security/2011/03/15/9
- http://www.pre-cert.de/advisories/PRE-SA-2011-02.txt
- http://www.spinics.net/lists/mm-commits/msg82737.html
- http://www.securityfocus.com/archive/1/517050
- http://www.securityfocus.com/bid/46878
- http://securityreason.com/securityalert/8189
- http://rhn.redhat.com/errata/RHSA-2011-0833.html
- http://downloads.avaya.com/css/P8/documents/100145416
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-0536: Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of…
Published: 2011-04-08T15:17:00 Last Modified: 2018-10-09T19:29:00
Summary
Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dynamic shared object (DSO) in a subdirectory of the current working directory during execution of a (1) setuid or (2) setgid program that has $ORIGIN in (a) RPATH or (b) RUNPATH within the program itself or a referenced library. NOTE: this issue exists because of an incorrect fix for CVE-2010-3847.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2011-0536 vulnerability.
References
- https://launchpad.net/bugs/701783
- http://secunia.com/advisories/43989
- http://sourceware.org/git/?p=glibc.git;a=commit;h=96611391ad8823ba58405325d78cefeae5cdf699
- http://openwall.com/lists/oss-security/2011/02/01/3
- http://openwall.com/lists/oss-security/2011/02/03/2
- http://lists.debian.org/debian-security-announce/2011/msg00005.html
- https://bugzilla.redhat.com/show_bug.cgi?id=667974
- http://www.vupen.com/english/advisories/2011/0863
- http://www.redhat.com/support/errata/RHSA-2011-0413.html
- http://www.ubuntu.com/usn/USN-1009-2
- http://securitytracker.com/id?1025289
- http://www.redhat.com/support/errata/RHSA-2011-0412.html
- http://secunia.com/advisories/43830
- http://secunia.com/advisories/46397
- http://www.vmware.com/security/advisories/VMSA-2011-0012.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:178
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13086
- http://www.securityfocus.com/archive/1/520102/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1083: The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a…
Published: 2011-04-04T12:27:00 Last Modified: 2020-08-12T16:46:00
Summary
The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
Common Weakness Enumeration (CWE): CWE-400: Uncontrolled Resource Consumption
CWE Description: The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2011-1083 vulnerability.
References
- http://article.gmane.org/gmane.linux.kernel/1105744
- http://openwall.com/lists/oss-security/2011/03/02/2
- http://article.gmane.org/gmane.linux.kernel/1106686
- http://openwall.com/lists/oss-security/2011/03/02/1
- https://bugzilla.redhat.com/show_bug.cgi?id=681578
- http://secunia.com/advisories/43522
- http://www.osvdb.org/71265
- http://article.gmane.org/gmane.linux.kernel/1105888
- http://rhn.redhat.com/errata/RHSA-2012-0862.html
- http://secunia.com/advisories/48898
- http://secunia.com/advisories/48964
- http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
- http://secunia.com/advisories/48410
- http://secunia.com/advisories/48115
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-0695: Race condition in the cm_work_handler function in the InfiniBand driver…
Published: 2011-03-15T17:55:00 Last Modified: 2020-08-11T20:17:00
Summary
Race condition in the cm_work_handler function in the InfiniBand driver (drivers/infiniband/core/cma.c) in Linux kernel 2.6.x allows remote attackers to cause a denial of service (panic) by sending an InfiniBand request while other request handlers are still running, which triggers an invalid pointer dereference.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.9
- Exploitability Score: 5.5
- CVSS: 5.7
- CVSS Vector: AV:A/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2011-0695 vulnerability.
References
- http://www.spinics.net/lists/linux-rdma/msg07448.html
- http://secunia.com/advisories/43693
- http://www.securityfocus.com/bid/46839
- http://www.spinics.net/lists/linux-rdma/msg07447.html
- http://www.openwall.com/lists/oss-security/2011/03/11/1
- http://www.ubuntu.com/usn/USN-1146-1
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66056
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-0711: The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3…
Published: 2011-03-01T23:00:00 Last Modified: 2020-08-07T14:48:00
Summary
The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-0711 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=677260
- http://www.securityfocus.com/bid/46417
- http://openwall.com/lists/oss-security/2011/02/16/10
- http://openwall.com/lists/oss-security/2011/02/16/4
- https://patchwork.kernel.org/patch/555461/
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba
- http://osvdb.org/70950
- http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git3.log
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1011: The seunshare_mount function in sandbox/seunshare.c in seunshare in certain Red Hat packages of…
Published: 2011-02-24T21:00:00 Last Modified: 2019-04-22T17:48:00
Summary
The seunshare_mount function in sandbox/seunshare.c in seunshare in certain Red Hat packages of policycoreutils 2.0.83 and earlier in Red Hat Enterprise Linux (RHEL) 6 and earlier, and Fedora 14 and earlier, mounts a new directory on top of /tmp without assigning root ownership and the sticky bit to this new directory, which allows local users to replace or delete arbitrary /tmp files, and consequently cause a denial of service or possibly gain privileges, by running a setuid application that relies on /tmp, as demonstrated by the ksu application.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-1011 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=633544
- http://openwall.com/lists/oss-security/2011/02/23/2
- http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0585.html
- http://secunia.com/advisories/43415
- http://pkgs.fedoraproject.org/gitweb/?p=policycoreutils.git;a=blob;f=policycoreutils-rhat.patch;h=d4db5bc06027de23d12a4b3f18fa6f9b1517df27;hb=HEAD#l2197
- http://openwall.com/lists/oss-security/2011/02/23/1
- http://www.securityfocus.com/bid/46510
- http://www.vupen.com/english/advisories/2011/0864
- http://www.securitytracker.com/id?1025291
- http://www.redhat.com/support/errata/RHSA-2011-0414.html
- http://secunia.com/advisories/44034
- http://secunia.com/advisories/43844
- http://www.vupen.com/english/advisories/2011/0701
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056227.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65641
See also: All popular products CVE Vulnerabilities of redhat
CVE-2011-1044: The ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before…
Published: 2011-02-18T20:00:00 Last Modified: 2020-08-12T19:39:00
Summary
The ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 does not initialize a certain response buffer, which allows local users to obtain potentially sensitive information from kernel memory via vectors that cause this buffer to be only partially filled, a different vulnerability than CVE-2010-4649.
Common Weakness Enumeration (CWE): CWE-909: Missing Initialization of Resource
CWE Description: The software does not initialize a critical resource.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2011-1044 vulnerability.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7182afea8d1afd432a17c18162cc3fd441d0da93
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
- https://bugzilla.redhat.com/show_bug.cgi?id=667916
- http://www.securityfocus.com/bid/46488
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65563
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-4649: Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the…
Published: 2011-02-18T20:00:00 Last Modified: 2020-08-11T13:56:00
Summary
Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain structure member.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2010-4649 vulnerability.
References
- http://www.securityfocus.com/bid/46073
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
- https://bugzilla.redhat.com/show_bug.cgi?id=667916
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7182afea8d1afd432a17c18162cc3fd441d0da93
- http://rhn.redhat.com/errata/RHSA-2011-0927.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-4161: The udp_queue_rcv_skb function in net/ipv4/udp.c in a certain Red Hat build of the Linux kernel…
Published: 2010-12-30T19:00:00 Last Modified: 2018-10-10T20:07:00
Summary
The udp_queue_rcv_skb function in net/ipv4/udp.c in a certain Red Hat build of the Linux kernel 2.6.18 in Red Hat Enterprise Linux (RHEL) 5 allows attackers to cause a denial of service (deadlock and system hang) by sending UDP traffic to a socket that has a crafted socket filter, a related issue to CVE-2010-4158.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2010-4161 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=651698
- http://www.spinics.net/lists/netdev/msg146404.html
- http://www.securityfocus.com/archive/1/514845
- https://bugzilla.redhat.com/show_bug.cgi?id=652534
- http://www.redhat.com/support/errata/RHSA-2011-0004.html
- http://secunia.com/advisories/42789
- http://www.vupen.com/english/advisories/2011/0024
- http://secunia.com/advisories/46397
- http://www.vmware.com/security/advisories/VMSA-2011-0012.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64497
- http://www.securityfocus.com/archive/1/520102/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-3881: arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure…
Published: 2010-12-23T18:00:00 Last Modified: 2020-08-06T19:10:00
Summary
arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2010-3881 vulnerability.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=97e69aa62f8b5d338d6cff49be09e37cc1262838
- http://www.spinics.net/lists/kvm/msg44130.html
- http://www.vupen.com/english/advisories/2010/3287
- https://bugzilla.redhat.com/show_bug.cgi?id=649920
- http://git.kernel.org/?p=virt/kvm/kvm.git;a=commit;h=831d9d02f9522e739825a51a11e3bc5aa531a905
- http://openwall.com/lists/oss-security/2010/11/04/10
- http://openwall.com/lists/oss-security/2010/11/05/4
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
- http://securitytracker.com/id?1024912
- http://rhn.redhat.com/errata/RHSA-2010-0998.html
- http://www.securityfocus.com/bid/44666
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html
- http://secunia.com/advisories/42932
- http://www.vupen.com/english/advisories/2011/0124
- http://www.vupen.com/english/advisories/2011/0298
- http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-4494: Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before…
Published: 2010-12-07T21:00:00 Last Modified: 2020-07-31T18:38:00
Summary
Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-4494 vulnerability.
References
- http://code.google.com/p/chromium/issues/detail?id=63444
- http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html
- http://secunia.com/advisories/42762
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:260
- http://secunia.com/advisories/42721
- http://www.vupen.com/english/advisories/2010/3336
- http://www.vupen.com/english/advisories/2010/3319
- http://www.debian.org/security/2010/dsa-2137
- http://www.vupen.com/english/advisories/2011/0230
- http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html
- http://support.apple.com/kb/HT4554
- http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html
- http://support.apple.com/kb/HT4564
- http://support.apple.com/kb/HT4566
- http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html
- http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html
- http://support.apple.com/kb/HT4581
- http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055775.html
- http://www.redhat.com/support/errata/RHSA-2011-1749.html
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
- http://secunia.com/advisories/42472
- http://secunia.com/advisories/40775
- http://marc.info/?l=bugtraq&m=139447903326211&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11916
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-4008: libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier,…
Published: 2010-11-17T01:00:00 Last Modified: 2020-06-04T20:31:00
Summary
libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-4008 vulnerability.
References
- http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html
- http://secunia.com/advisories/42175
- http://code.google.com/p/chromium/issues/detail?id=58731
- http://mail.gnome.org/archives/xml/2010-November/msg00015.html
- http://secunia.com/advisories/42109
- http://blog.bkis.com/en/libxml2-vulnerability-in-google-chrome-and-apple-safari/
- http://support.apple.com/kb/HT4456
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
- http://www.debian.org/security/2010/dsa-2128
- http://www.securityfocus.com/bid/44779
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:243
- http://www.vupen.com/english/advisories/2010/3046
- http://www.ubuntu.com/usn/USN-1016-1
- http://secunia.com/advisories/42429
- http://www.vupen.com/english/advisories/2010/3076
- http://secunia.com/advisories/42314
- http://www.vupen.com/english/advisories/2010/3100
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
- http://www.vupen.com/english/advisories/2011/0230
- http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html
- http://support.apple.com/kb/HT4554
- http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html
- http://support.apple.com/kb/HT4566
- http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html
- http://support.apple.com/kb/HT4581
- http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
- http://marc.info/?l=bugtraq&m=130331363227777&w=2
- http://www.redhat.com/support/errata/RHSA-2011-1749.html
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://secunia.com/advisories/40775
- http://marc.info/?l=bugtraq&m=139447903326211&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12148
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-4203: WebM libvpx (aka the VP8 Codec SDK) before 0.9.5, as used in Google Chrome before 7.0.517.44,…
Published: 2010-11-06T00:00:00 Last Modified: 2020-07-31T18:24:00
Summary
WebM libvpx (aka the VP8 Codec SDK) before 0.9.5, as used in Google Chrome before 7.0.517.44, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via invalid frames.
Common Weakness Enumeration (CWE): CWE-190: Integer Overflow or Wraparound
CWE Description: The software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-4203 vulnerability.
References
- http://googlechromereleases.blogspot.com/2010/11/stable-channel-update.html
- http://code.google.com/p/chromium/issues/detail?id=60055
- http://review.webmproject.org/gitweb?p=libvpx.git;a=commit;h=09bcc1f710ea65dc158639479288fb1908ff0c53
- http://secunia.com/advisories/42118
- http://secunia.com/advisories/42109
- http://review.webmproject.org/gitweb?p=libvpx.git;a=blob;f=CHANGELOG
- http://secunia.com/advisories/42690
- https://rhn.redhat.com/errata/RHSA-2010-0999.html
- http://security.gentoo.org/glsa/glsa-201101-03.xml
- http://www.vupen.com/english/advisories/2011/0115
- http://secunia.com/advisories/42908
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12198
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-3702: The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly…
Published: 2010-11-05T18:00:00 Last Modified: 2020-12-23T15:01:00
Summary
The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
Common Weakness Enumeration (CWE): CWE-476: NULL Pointer Dereference
CWE Description: NULL pointer dereferences are frequently resultant from rarely encountered error conditions, since these are most likely to escape detection during the testing phases.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-3702 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2010-0749.html
- http://www.ubuntu.com/usn/USN-1005-1
- https://bugzilla.redhat.com/show_bug.cgi?id=595245
- http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049523.html
- http://www.redhat.com/support/errata/RHSA-2010-0753.html
- http://www.redhat.com/support/errata/RHSA-2010-0751.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049392.html
- http://www.redhat.com/support/errata/RHSA-2010-0752.html
- http://www.securityfocus.com/bid/43845
- http://www.debian.org/security/2010/dsa-2119
- ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl5.patch
- http://www.redhat.com/support/errata/RHSA-2010-0750.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049545.html
- http://www.openwall.com/lists/oss-security/2010/10/04/6
- http://www.vupen.com/english/advisories/2010/2897
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050268.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050390.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050285.html
- http://secunia.com/advisories/42141
- http://www.redhat.com/support/errata/RHSA-2010-0754.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:230
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
- http://secunia.com/advisories/42397
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:229
- http://www.redhat.com/support/errata/RHSA-2010-0755.html
- http://www.redhat.com/support/errata/RHSA-2010-0859.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:231
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:228
- http://secunia.com/advisories/42357
- http://www.vupen.com/english/advisories/2010/3097
- http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.571720
- http://secunia.com/advisories/42691
- http://www.debian.org/security/2010/dsa-2135
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
- http://www.openoffice.org/security/cves/CVE-2010-3702_CVE-2010-3704.html
- http://www.vupen.com/english/advisories/2011/0230
- http://secunia.com/advisories/43079
- http://rhn.redhat.com/errata/RHSA-2012-1201.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-1772: Use-after-free vulnerability in page/Geolocation.cpp in WebCore in WebKit before r59859, as used…
Published: 2010-09-24T19:00:00 Last Modified: 2020-08-14T16:22:00
Summary
Use-after-free vulnerability in page/Geolocation.cpp in WebCore in WebKit before r59859, as used in Google Chrome before 5.0.375.70, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site, related to failure to stop timers associated with geolocation upon deletion of a document.
Common Weakness Enumeration (CWE): CWE-416: Use After Free
CWE Description: Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-1772 vulnerability.
References
- http://secunia.com/advisories/40072
- https://bugs.webkit.org/show_bug.cgi?id=39388
- http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html
- http://trac.webkit.org/changeset/59859
- https://bugzilla.redhat.com/show_bug.cgi?id=596498
- http://code.google.com/p/chromium/issues/detail?id=44868
- http://www.vupen.com/english/advisories/2010/1801
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044031.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044023.html
- http://secunia.com/advisories/40557
- http://www.vupen.com/english/advisories/2010/2722
- http://www.ubuntu.com/usn/USN-1006-1
- http://secunia.com/advisories/41856
- http://secunia.com/advisories/43068
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
- http://www.vupen.com/english/advisories/2011/0212
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
- http://www.vupen.com/english/advisories/2011/0552
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11661
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-1773: Off-by-one error in the toAlphabetic function in rendering/RenderListMarker.cpp in WebCore in…
Published: 2010-09-24T19:00:00 Last Modified: 2020-08-14T16:23:00
Summary
Off-by-one error in the toAlphabetic function in rendering/RenderListMarker.cpp in WebCore in WebKit before r59950, as used in Google Chrome before 5.0.375.70, allows remote attackers to obtain sensitive information, cause a denial of service (memory corruption and application crash), or possibly execute arbitrary code via vectors related to list markers for HTML lists, aka rdar problem 8009118.
Common Weakness Enumeration (CWE): CWE-193: Off-by-one Error
CWE Description: A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-1773 vulnerability.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044023.html
- http://secunia.com/advisories/40072
- https://bugzilla.redhat.com/show_bug.cgi?id=596500
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044031.html
- http://trac.webkit.org/changeset/59950
- https://bugs.webkit.org/show_bug.cgi?id=39508
- http://secunia.com/advisories/40557
- http://www.vupen.com/english/advisories/2010/1801
- http://code.google.com/p/chromium/issues/detail?id=44955
- http://googlechromereleases.blogspot.com/2010/06/stable-channel-update.html
- http://www.vupen.com/english/advisories/2010/2722
- http://www.ubuntu.com/usn/USN-1006-1
- http://secunia.com/advisories/41856
- http://secunia.com/advisories/43068
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
- http://www.vupen.com/english/advisories/2011/0212
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
- http://www.vupen.com/english/advisories/2011/0552
- http://www.securityfocus.com/bid/41575
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11830
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-2598: LibTIFF in Red Hat Enterprise Linux (RHEL) 3 on x86_64 platforms, as used in tiff2rgba, attempts…
Published: 2010-07-02T12:43:00 Last Modified: 2016-11-08T14:56:00
Summary
LibTIFF in Red Hat Enterprise Linux (RHEL) 3 on x86_64 platforms, as used in tiff2rgba, attempts to process image data even when the required compression functionality is not configured, which allows remote attackers to cause a denial of service via a crafted TIFF image, related to “downsampled OJPEG input.”
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-2598 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=583081
- http://www.vupen.com/english/advisories/2010/1761
- http://www.redhat.com/support/errata/RHSA-2010-0520.html
- http://secunia.com/advisories/40536
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-0730: The MMIO instruction decoder in the Xen hypervisor in the Linux kernel 2.6.18 in Red Hat…
Published: 2010-05-12T11:46:00 Last Modified: 2018-10-10T19:53:00
Summary
The MMIO instruction decoder in the Xen hypervisor in the Linux kernel 2.6.18 in Red Hat Enterprise Linux (RHEL) 5 allows guest OS users to cause a denial of service (32-bit guest OS crash) via vectors that trigger an unspecified instruction emulation.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2010-0730 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2010-0398.html
- http://secunia.com/advisories/39649
- http://www.securityfocus.com/bid/39979
- https://bugzilla.redhat.com/show_bug.cgi?id=572971
- http://www.openwall.com/lists/oss-security/2010/05/07/1
- http://support.avaya.com/css/P8/documents/100088287
- http://www.vmware.com/security/advisories/VMSA-2011-0003.html
- http://secunia.com/advisories/43315
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11430
- http://www.securityfocus.com/archive/1/516397/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-0729: A certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 4 on the ia64…
Published: 2010-03-16T19:30:00 Last Modified: 2017-09-19T01:30:00
Summary
A certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 4 on the ia64 platform allows local users to use ptrace on an arbitrary process, and consequently gain privileges, via vectors related to a missing ptrace_check_attach call.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2010-0729 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=572007
- http://www.openwall.com/lists/oss-security/2010/03/12/2
- http://www.securityfocus.com/bid/38702
- http://www.redhat.com/support/errata/RHSA-2010-0394.html
- http://support.avaya.com/css/P8/documents/100090459
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8687
See also: All popular products CVE Vulnerabilities of redhat
CVE-2010-0727: The gfs2_lock function in the Linux kernel before 2.6.34-rc1-next-20100312, and the gfs_lock…
Published: 2010-03-16T19:30:00 Last Modified: 2020-08-07T15:13:00
Summary
The gfs2_lock function in the Linux kernel before 2.6.34-rc1-next-20100312, and the gfs_lock function in the Linux kernel on Red Hat Enterprise Linux (RHEL) 5 and 6, does not properly remove POSIX locks on files that are setgid without group-execute permission, which allows local users to cause a denial of service (BUG and system crash) by locking a file on a (1) GFS or (2) GFS2 filesystem, and then changing this file’s permissions.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2010-0727 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2010/03/12/1
- https://bugzilla.redhat.com/show_bug.cgi?id=570863
- http://lkml.org/lkml/2010/3/11/269
- http://www.kernel.org/pub/linux/kernel/v2.6/next/patch-v2.6.34-rc1-next-20100312.bz2
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:066
- http://www.redhat.com/support/errata/RHSA-2010-0330.html
- http://securitytracker.com/id?1023809
- http://www.redhat.com/support/errata/RHSA-2010-0380.html
- http://secunia.com/advisories/39830
- http://www.debian.org/security/2010/dsa-2053
- http://www.redhat.com/support/errata/RHSA-2010-0521.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11392
See also: All popular products CVE Vulnerabilities of redhat
CVE-2009-3556: A certain Red Hat configuration step for the qla2xxx driver in the Linux kernel 2.6.18 on Red Hat…
Published: 2010-01-27T17:30:00 Last Modified: 2017-09-19T01:29:00
Summary
A certain Red Hat configuration step for the qla2xxx driver in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when N_Port ID Virtualization (NPIV) hardware is used, sets world-writable permissions for the (1) vport_create and (2) vport_delete files under /sys/class/scsi_host/, which allows local users to make arbitrary changes to SCSI host attributes by modifying these files.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2009-3556 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=537177
- https://rhn.redhat.com/errata/RHSA-2010-0046.html
- http://www.openwall.com/lists/oss-security/2010/01/20/2
- https://rhn.redhat.com/errata/RHSA-2010-0095.html
- http://support.avaya.com/css/P8/documents/100073666
- http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00007.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55809
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9738
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6744
See also: All popular products CVE Vulnerabilities of redhat
CVE-2009-4272: A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise…
Published: 2010-01-27T17:30:00 Last Modified: 2017-09-19T01:29:00
Summary
A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and trigger a routing “emergency” in which a hash chain is too long. NOTE: this is related to an issue in the Linux kernel before 2.6.31, when the kernel routing cache is disabled, involving an uninitialized pointer and a panic.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2009-4272 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2010/01/20/1
- https://bugzilla.redhat.com/show_bug.cgi?id=545411
- https://rhn.redhat.com/errata/RHSA-2010-0046.html
- http://www.openwall.com/lists/oss-security/2010/01/20/6
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b6280b47a7a42970d098a3059f4ebe7e55e90d8d
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=73e42897e8e5619eacb787d2ce69be12f47cfc21
- https://rhn.redhat.com/errata/RHSA-2010-0095.html
- http://support.avaya.com/css/P8/documents/100073666
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55808
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7026
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11167
See also: All popular products CVE Vulnerabilities of redhat
CVE-2009-3080: Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel…
Published: 2009-11-20T17:30:00 Last Modified: 2020-09-09T12:56:00
Summary
Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.
Common Weakness Enumeration (CWE): CWE-129: Improper Validation of Array Index
CWE Description: The most common condition situation leading to an out-of-bounds array index is the use of loop index variables as buffer indexes. If the end condition for the loop is subject to a flaw, the index can grow or shrink unbounded, therefore causing a buffer overflow or underflow. Another common situation leading to this condition is the use of a function’s return value, or the resulting value of a calculation directly as an index in to a buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2009-3080 vulnerability.
References
- http://www.securityfocus.com/bid/37068
- http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.32-rc8
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=690e744869f3262855b83b4fb59199cf142765b0
- http://secunia.com/advisories/37435
- http://secunia.com/advisories/37720
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00777.html
- http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html
- http://secunia.com/advisories/37909
- http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html
- http://secunia.com/advisories/38017
- http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html
- http://www.redhat.com/support/errata/RHSA-2010-0041.html
- https://rhn.redhat.com/errata/RHSA-2010-0046.html
- https://rhn.redhat.com/errata/RHSA-2010-0095.html
- http://support.avaya.com/css/P8/documents/100073666
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:030
- http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html
- http://www.ubuntu.com/usn/usn-864-1
- http://secunia.com/advisories/38276
- http://www.debian.org/security/2010/dsa-2005
- http://www.redhat.com/support/errata/RHSA-2010-0882.html
- http://www.vmware.com/security/advisories/VMSA-2011-0009.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7101
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12862
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10989
See also: All popular products CVE Vulnerabilities of redhat
CVE-2009-2910: arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not…
Published: 2009-10-20T17:30:00 Last Modified: 2020-08-07T15:02:00
Summary
arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2009-2910 vulnerability.
References
- http://secunia.com/advisories/36927
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.4
- https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html
- http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git;a=commit;h=24e35800cdc4350fc34e2bed37b608a9e13ab3b6
- http://marc.info/?l=oss-security&m=125444390112831&w=2
- http://marc.info/?l=oss-security&m=125442304214452&w=2
- http://secunia.com/advisories/37075
- https://bugzilla.redhat.com/show_bug.cgi?id=526788
- http://lkml.org/lkml/2009/10/1/164
- http://marc.info/?l=oss-security&m=125511635004768&w=2
- http://www.securityfocus.com/bid/36576
- https://rhn.redhat.com/errata/RHSA-2009-1540.html
- http://www.openwall.com/lists/oss-security/2009/10/02/1
- http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html
- http://secunia.com/advisories/37351
- http://www.redhat.com/support/errata/RHSA-2009-1671.html
- https://rhn.redhat.com/errata/RHSA-2010-0046.html
- https://rhn.redhat.com/errata/RHSA-2010-0095.html
- http://support.avaya.com/css/P8/documents/100073666
- http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
- http://www.ubuntu.com/usn/usn-864-1
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7359
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10823
See also: All popular products CVE Vulnerabilities of redhat
CVE-2009-3228: The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x…
Published: 2009-10-19T20:00:00 Last Modified: 2020-08-13T12:59:00
Summary
The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-909: Missing Initialization of Resource
CWE Description: The software does not initialize a critical resource.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2009-3228 vulnerability.
References
- http://www.openwall.com/lists/oss-security/2009/09/17/1
- http://www.openwall.com/lists/oss-security/2009/09/06/2
- http://www.openwall.com/lists/oss-security/2009/09/05/2
- http://www.openwall.com/lists/oss-security/2009/09/17/9
- http://patchwork.ozlabs.org/patch/32830/
- http://www.openwall.com/lists/oss-security/2009/09/07/2
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=16ebb5e0b36ceadc8186f71d68b0c4fa4b6e781b
- http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.6
- http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc9
- http://www.openwall.com/lists/oss-security/2009/09/03/1
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=096ed17f20affc2db0e307658c69b67433992a7a
- https://bugzilla.redhat.com/show_bug.cgi?id=520990
- http://www.securitytracker.com/id?1023073
- https://rhn.redhat.com/errata/RHSA-2009-1548.html
- https://rhn.redhat.com/errata/RHSA-2009-1540.html
- http://www.ubuntu.com/usn/usn-864-1
- http://secunia.com/advisories/38834
- http://www.vupen.com/english/advisories/2010/0528
- http://lists.vmware.com/pipermail/security-announce/2010/000082.html
- http://secunia.com/advisories/38794
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:198
- http://www.redhat.com/support/errata/RHSA-2009-1522.html
- http://secunia.com/advisories/37084
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9409
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6757
See also: All popular products CVE Vulnerabilities of redhat
CVE-2009-2848: The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear…
Published: 2009-08-18T21:00:00 Last Modified: 2020-08-28T13:10:00
Summary
The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
Common Weakness Enumeration (CWE): CWE-269: Improper Privilege Management
CWE Description: The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Scores
- Impact Score: 8.5
- Exploitability Score: 3.4
- CVSS: 5.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:C
Impact
- Availability: COMPLETE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2009-2848 vulnerability.
References
- http://article.gmane.org/gmane.linux.kernel/871942
- http://www.openwall.com/lists/oss-security/2009/08/05/10
- http://www.openwall.com/lists/oss-security/2009/08/04/2
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01256.html
- http://secunia.com/advisories/36501
- http://secunia.com/advisories/35983
- http://secunia.com/advisories/36759
- http://www.redhat.com/support/errata/RHSA-2009-1438.html
- https://rhn.redhat.com/errata/RHSA-2009-1550.html
- http://secunia.com/advisories/37351
- http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2009/3316
- http://secunia.com/advisories/37471
- http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
- http://secunia.com/advisories/37105
- http://www.ubuntu.com/usn/USN-852-1
- http://secunia.com/advisories/36562
- http://rhn.redhat.com/errata/RHSA-2009-1243.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/52899
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9766
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8598
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11412
- http://www.securityfocus.com/archive/1/512019/100/0/threaded
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2009-1893: The configtest function in the Red Hat dhcpd init script for DHCP 3.0.1 in Red Hat Enterprise…
Published: 2009-07-17T16:30:00 Last Modified: 2017-09-29T01:34:00
Summary
The configtest function in the Red Hat dhcpd init script for DHCP 3.0.1 in Red Hat Enterprise Linux (RHEL) 3 allows local users to overwrite arbitrary files via a symlink attack on an unspecified temporary file, related to the “dhcpd -t” command.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2009-1893 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=510024
- http://secunia.com/advisories/35831
- http://www.redhat.com/support/errata/RHSA-2009-1154.html
- http://securitytracker.com/id?1022554
- http://www.securityfocus.com/bid/35670
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51718
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6440
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11597
See also: All popular products CVE Vulnerabilities of redhat
CVE-2009-0834: The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform…
Published: 2009-03-06T11:30:00 Last Modified: 2020-08-26T12:57:00
Summary
The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2009-0834 vulnerability.
References
- http://marc.info/?l=oss-security&m=123597642832637&w=2
- https://bugzilla.redhat.com/show_bug.cgi?id=487990
- http://secunia.com/advisories/34084
- http://www.securityfocus.com/bid/33951
- http://marc.info/?l=linux-kernel&m=123579056530191&w=2
- http://marc.info/?l=linux-kernel&m=123579065130246&w=2
- http://scary.beasts.org/security/CESA-2009-001.html
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ccbe495caa5e604b04d5a31d7459a6f6a76a756c
- http://www.ubuntu.com/usn/usn-751-1
- http://www.redhat.com/support/errata/RHSA-2009-0451.html
- http://secunia.com/advisories/34917
- http://secunia.com/advisories/34962
- http://rhn.redhat.com/errata/RHSA-2009-0459.html
- http://www.debian.org/security/2009/dsa-1787
- http://secunia.com/advisories/34981
- http://secunia.com/advisories/35011
- http://www.debian.org/security/2009/dsa-1794
- http://www.securitytracker.com/id?1022153
- http://secunia.com/advisories/35015
- http://rhn.redhat.com/errata/RHSA-2009-0473.html
- http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
- http://secunia.com/advisories/35121
- http://www.debian.org/security/2009/dsa-1800
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:118
- http://wiki.rpath.com/Advisories:rPSA-2009-0084
- http://secunia.com/advisories/35185
- http://secunia.com/advisories/35120
- http://secunia.com/advisories/35394
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
- http://secunia.com/advisories/35390
- http://secunia.com/advisories/37471
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vupen.com/english/advisories/2009/3316
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49061
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- http://www.securityfocus.com/archive/1/503610/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-4313: A certain Red Hat patch for tog-pegasus in OpenGroup Pegasus 2.7.0 does not properly configure…
Published: 2008-11-27T00:30:00 Last Modified: 2017-09-29T01:32:00
Summary
A certain Red Hat patch for tog-pegasus in OpenGroup Pegasus 2.7.0 does not properly configure the PAM tty name, which allows remote authenticated users to bypass intended access restrictions and send requests to OpenPegasus WBEM services.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 6.8
- CVSS: 6.0
- CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2008-4313 vulnerability.
References
- https://admin.fedoraproject.org/updates/tog-pegasus-2.7.0-7.fc9
- http://www.securityfocus.com/bid/32460
- http://secunia.com/advisories/32862
- https://bugzilla.redhat.com/show_bug.cgi?id=459217
- http://www.redhat.com/support/errata/RHSA-2008-1001.html
- https://admin.fedoraproject.org/updates/tog-pegasus-2.7.1-3.fc10
- http://www.securitytracker.com/id?1021283
- http://osvdb.org/50277
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46829
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9556
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-4315: tog-pegasus in OpenGroup Pegasus 2.7.0 on Red Hat Enterprise Linux (RHEL) 5, Fedora 9, and Fedora…
Published: 2008-11-27T00:30:00 Last Modified: 2017-09-29T01:32:00
Summary
tog-pegasus in OpenGroup Pegasus 2.7.0 on Red Hat Enterprise Linux (RHEL) 5, Fedora 9, and Fedora 10 does not log failed authentication attempts to the OpenPegasus CIM server, which makes it easier for remote attackers to avoid detection of password guessing attacks.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2008-4315 vulnerability.
References
- https://admin.fedoraproject.org/updates/tog-pegasus-2.7.1-3.fc10
- https://bugzilla.redhat.com/show_bug.cgi?id=472017
- http://www.redhat.com/support/errata/RHSA-2008-1001.html
- https://admin.fedoraproject.org/updates/tog-pegasus-2.7.0-7.fc9
- http://secunia.com/advisories/32862
- http://www.securitytracker.com/id?1021281
- http://osvdb.org/50278
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46830
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9431
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-3825: pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option…
Published: 2008-10-03T15:07:00 Last Modified: 2018-10-11T20:49:00
Summary
pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.4
- CVSS: 4.4
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2008-3825 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2008-0907.html
- https://bugzilla.redhat.com/show_bug.cgi?id=461960
- http://www.securitytracker.com/id?1020978
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00166.html
- http://secunia.com/advisories/32119
- https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00150.html
- http://secunia.com/advisories/32174
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:209
- http://secunia.com/advisories/32135
- http://www.securityfocus.com/bid/31534
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
- http://www.vmware.com/security/advisories/VMSA-2011-0003.html
- http://secunia.com/advisories/43314
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45635
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10923
- http://www.securityfocus.com/archive/1/516397/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-3270: yum-rhn-plugin in Red Hat Enterprise Linux (RHEL) 5 does not verify the SSL certificate for a…
Published: 2008-08-18T17:41:00 Last Modified: 2017-09-29T01:31:00
Summary
yum-rhn-plugin in Red Hat Enterprise Linux (RHEL) 5 does not verify the SSL certificate for a file download from a Red Hat Network (RHN) server, which makes it easier for remote man-in-the-middle attackers to cause a denial of service (loss of updates) or force the download and installation of official Red Hat packages that were not requested.
Common Weakness Enumeration (CWE): CWE-310: Cryptographic Issues
CWE Description: Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2008-3270 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=457113
- http://www.redhat.com/support/errata/RHSA-2008-0815.html
- http://www.securityfocus.com/bid/30695
- http://securitytracker.com/id?1020698
- http://secunia.com/advisories/31472
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10864
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-1945: QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to…
Published: 2008-08-08T19:41:00 Last Modified: 2020-12-16T00:34:00
Summary
QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2008-1945 vulnerability.
References
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
- http://www.securityfocus.com/bid/30604
- http://secunia.com/advisories/32063
- http://secunia.com/advisories/32088
- https://rhn.redhat.com/errata/RHSA-2008-0892.html
- http://www.securitytracker.com/id?1020959
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
- http://secunia.com/advisories/34642
- http://secunia.com/advisories/35031
- http://www.debian.org/security/2009/dsa-1799
- http://www.ubuntu.com/usn/usn-776-1
- http://secunia.com/advisories/35062
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44269
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9905
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-3272: The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound…
Published: 2008-08-08T18:41:00 Last Modified: 2020-07-31T21:24:00
Summary
The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2008-3272 vulnerability.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=82e68f7ffec3800425f2391c8c86277606860442
- http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.27-rc2
- http://www.securityfocus.com/bid/30559
- http://secunia.com/advisories/31366
- http://www.securitytracker.com/id?1020636
- http://secunia.com/advisories/31614
- http://www.debian.org/security/2008/dsa-1636
- http://secunia.com/advisories/31881
- http://www.redhat.com/support/errata/RHSA-2008-0885.html
- http://secunia.com/advisories/32023
- http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html
- http://www.redhat.com/support/errata/RHSA-2008-0857.html
- http://secunia.com/advisories/32190
- http://secunia.com/advisories/31836
- http://secunia.com/advisories/31551
- http://www.debian.org/security/2008/dsa-1630
- http://rhn.redhat.com/errata/RHSA-2008-0972.html
- http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
- http://secunia.com/advisories/32799
- http://secunia.com/advisories/32759
- http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html
- http://secunia.com/advisories/32103
- http://secunia.com/advisories/32104
- http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:220
- http://www.vupen.com/english/advisories/2008/2307
- http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html
- http://secunia.com/advisories/32370
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44225
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11182
- https://usn.ubuntu.com/637-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-2365: Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used…
Published: 2008-06-30T21:41:00 Last Modified: 2018-10-30T16:25:00
Summary
Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user’s process that trigger a conflict between utrace_detach and report_quiescent, related to “late ptrace_may_attach() check” and “race around &dead_engine_ops setting,” a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.
Common Weakness Enumeration (CWE): CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’)
CWE Description: The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2008-2365 vulnerability.
- Linux Kernel 2.6.9 < 2.6.25 (RHEL 4) - utrace and ptrace Local Denial of Service (1) by Alexei Dobryanov at 2008-06-25
- Linux Kernel 2.6.9 < 2.6.25 (RHEL 4) - utrace and ptrace Local Denial of Service (2) by Alexei Dobryanov at 2008-06-25
References
- http://marc.info/?l=linux-kernel&m=117863520707703&w=2
- http://www.openwall.com/lists/oss-security/2008/06/26/1
- http://sources.redhat.com/cgi-bin/cvsweb.cgi/~checkout~/tests/ptrace-tests/tests/late-ptrace-may-attach-check.c?cvsroot=systemtap
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=5ecfbae093f0c37311e89b29bfc0c9d586eace87
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=f358166a9405e4f1d8e50d8f415c26d95505b6de
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git;a=commit;h=f5b40e363ad6041a96e3da32281d8faa191597b9
- https://bugzilla.redhat.com/show_bug.cgi?id=449359
- http://rhn.redhat.com/errata/RHSA-2008-0508.html
- http://www.securityfocus.com/bid/29945
- http://www.openwall.com/lists/oss-security/2008/07/14/1
- http://secunia.com/advisories/31107
- http://www.securitytracker.com/id?1020362
- http://secunia.com/advisories/30850
- http://www.ubuntu.com/usn/usn-625-1
- http://securityreason.com/securityalert/3965
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43567
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10749
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-2944: Double free vulnerability in the utrace support in the Linux kernel, probably 2.6.18, in Red Hat…
Published: 2008-06-30T21:41:00 Last Modified: 2022-02-07T19:50:00
Summary
Double free vulnerability in the utrace support in the Linux kernel, probably 2.6.18, in Red Hat Enterprise Linux (RHEL) 5 and Fedora Core 6 (FC6) allows local users to cause a denial of service (oops), as demonstrated by a crash when running the GNU GDB testsuite, a different vulnerability than CVE-2008-2365.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2008-2944 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=207002
- https://bugzilla.redhat.com/show_bug.cgi?id=449359
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43556
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-1951: Untrusted search path vulnerability in a certain Red Hat build script for Standards Based Linux…
Published: 2008-06-25T12:36:00 Last Modified: 2017-09-29T01:30:00
Summary
Untrusted search path vulnerability in a certain Red Hat build script for Standards Based Linux Instrumentation for Manageability (sblim) libraries before 1-13a.el4_6.1 in Red Hat Enterprise Linux (RHEL) 4, and before 1-31.el5_2.1 in RHEL 5, allows local users to gain privileges via a malicious library in a certain subdirectory of /var/tmp, related to an incorrect RPATH setting, as demonstrated by a malicious libc.so library for tog-pegasus.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2008-1951 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=447705
- https://rhn.redhat.com/errata/RHSA-2008-0497.html
- http://secunia.com/advisories/30803
- http://www.securitytracker.com/id?1020354
- http://www.securityfocus.com/bid/29913
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43315
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9635
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-1036: The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat…
Published: 2008-06-02T21:30:00 Last Modified: 2017-09-29T01:30:00
Summary
The International Components for Unicode (ICU) library in Apple Mac OS X before 10.5.3, Red Hat Enterprise Linux 5, and other operating systems omits some invalid character sequences during conversion of some character encodings, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.
Common Weakness Enumeration (CWE): CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CWE Description: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2008-1036 vulnerability.
References
- http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
- http://www.us-cert.gov/cas/techalerts/TA08-150A.html
- http://www.securityfocus.com/bid/29412
- http://securitytracker.com/id?1020139
- http://secunia.com/advisories/30430
- http://www.securityfocus.com/bid/29488
- http://www.redhat.com/support/errata/RHSA-2009-0296.html
- http://secunia.com/advisories/34290
- http://www.ubuntu.com/usn/USN-747-1
- http://www.debian.org/security/2009/dsa-1762
- http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064
- http://secunia.com/advisories/34777
- http://www.vupen.com/english/advisories/2008/1697
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42717
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-1767: Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause…
Published: 2008-05-23T15:32:00 Last Modified: 2017-09-29T01:30:00
Summary
Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT “transformation match” condition that triggers a large number of steps.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2008-1767 vulnerability.
References
- http://bugzilla.gnome.org/show_bug.cgi?id=527297
- http://www.redhat.com/support/errata/RHSA-2008-0287.html
- http://www.securityfocus.com/bid/29312
- http://www.securitytracker.com/id?1020071
- http://secunia.com/advisories/30315
- http://secunia.com/advisories/30323
- http://www.debian.org/security/2008/dsa-1589
- http://security.gentoo.org/glsa/glsa-200806-02.xml
- http://secunia.com/advisories/30393
- http://secunia.com/advisories/30521
- http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:151
- http://secunia.com/advisories/31074
- http://www.novell.com/linux/security/advisories/2008_13_sr.html
- http://www.ubuntu.com/usn/usn-633-1
- http://secunia.com/advisories/30717
- http://secunia.com/advisories/31363
- http://www.securityfocus.com/bid/31681
- http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
- http://support.apple.com/kb/HT3216
- http://secunia.com/advisories/32222
- http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
- http://support.apple.com/kb/HT3298
- http://www.vupen.com/english/advisories/2008/1580/references
- http://www.vupen.com/english/advisories/2008/2094/references
- http://www.vupen.com/english/advisories/2008/2780
- http://secunia.com/advisories/32706
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42560
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9785
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-5962: Memory leak in a certain Red Hat patch, applied to vsftpd 2.0.5 on Red Hat Enterprise Linux…
Published: 2008-05-22T13:09:00 Last Modified: 2018-10-15T21:48:00
Summary
Memory leak in a certain Red Hat patch, applied to vsftpd 2.0.5 on Red Hat Enterprise Linux (RHEL) 5 and Fedora 6 through 8, and on Foresight Linux and rPath appliances, allows remote attackers to cause a denial of service (memory consumption) via a large number of CWD commands, as demonstrated by an attack on a daemon with the deny_file configuration option.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 3)
Code designed for conducting penetration testing on CVE-2007-5962 vulnerability.
- vsftpd 2.0.5 - 'CWD' (Authenticated) Remote Memory Consumption by Praveen Darshanam at 2008-06-14
- vsftpd 2.0.5 - 'deny_file' Option Remote Denial of Service (1) by Martin Nagy at 2008-05-21
- vsftpd 2.0.5 - 'deny_file' Option Remote Denial of Service (2) by Praveen Darshanam at 2008-05-21
References
- http://www.openwall.com/lists/oss-security/2008/05/21/10
- http://www.openwall.com/lists/oss-security/2008/05/21/12
- http://www.openwall.com/lists/oss-security/2008/05/21/8
- https://bugzilla.redhat.com/show_bug.cgi?id=397011
- http://www.redhat.com/support/errata/RHSA-2008-0295.html
- http://www.securityfocus.com/bid/29322
- http://securitytracker.com/id?1020079
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0185
- https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00691.html
- https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00681.html
- http://secunia.com/advisories/30354
- https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00699.html
- http://secunia.com/advisories/30341
- http://www.vupen.com/english/advisories/2008/1600
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42593
- https://www.exploit-db.com/exploits/5814
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8850
- http://www.securityfocus.com/archive/1/493167/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-1615: Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows…
Published: 2008-05-08T00:20:00 Last Modified: 2017-09-29T01:30:00
Summary
Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2008-1615 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=431430
- http://www.redhat.com/support/errata/RHSA-2008-0237.html
- http://www.debian.org/security/2008/dsa-1588
- https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00357.html
- http://www.redhat.com/support/errata/RHSA-2008-0275.html
- http://www.securityfocus.com/bid/29086
- http://www.securitytracker.com/id?1020047
- http://secunia.com/advisories/30252
- http://secunia.com/advisories/30294
- http://secunia.com/advisories/30368
- http://secunia.com/advisories/30818
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
- http://www.ubuntu.com/usn/usn-625-1
- http://secunia.com/advisories/30890
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:167
- http://secunia.com/advisories/31107
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:174
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html
- http://secunia.com/advisories/30962
- http://www.redhat.com/support/errata/RHSA-2008-0585.html
- http://secunia.com/advisories/31628
- http://secunia.com/advisories/30112
- http://secunia.com/advisories/30982
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42278
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9563
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-5001: Linux kernel before 2.4.21 allows local users to cause a denial of service (kernel panic) via…
Published: 2008-05-08T00:20:00 Last Modified: 2017-09-29T01:29:00
Summary
Linux kernel before 2.4.21 allows local users to cause a denial of service (kernel panic) via asynchronous input or output on a FIFO special file.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-5001 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=326251
- http://www.redhat.com/support/errata/RHSA-2008-0211.html
- http://www.securityfocus.com/bid/29083
- http://lists.vmware.com/pipermail/security-announce/2008/000023.html
- http://secunia.com/advisories/31246
- http://osvdb.org/44987
- http://secunia.com/advisories/30110
- http://www.vupen.com/english/advisories/2008/2222/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42273
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11329
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-6282: The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of…
Published: 2008-05-08T00:20:00 Last Modified: 2017-09-29T01:29:00
Summary
The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.
Common Weakness Enumeration (CWE): CWE-16: Configuration
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2007-6282 vulnerability.
References
- http://marc.info/?l=linux-netdev&m=120372380411259&w=2
- https://bugzilla.redhat.com/show_bug.cgi?id=404291
- http://www.redhat.com/support/errata/RHSA-2008-0237.html
- http://www.redhat.com/support/errata/RHSA-2008-0275.html
- http://www.securityfocus.com/bid/29081
- http://secunia.com/advisories/30294
- http://www.ubuntu.com/usn/usn-625-1
- http://secunia.com/advisories/30818
- http://secunia.com/advisories/30962
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html
- http://secunia.com/advisories/30890
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
- http://secunia.com/advisories/31107
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
- http://www.redhat.com/support/errata/RHSA-2008-0585.html
- http://secunia.com/advisories/31628
- http://www.debian.org/security/2008/dsa-1630
- http://secunia.com/advisories/31551
- http://secunia.com/advisories/30112
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42276
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10549
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-0884: The Replace function in the capp-lspp-config script in the (1) lspp-eal4-config-ibm and (2) capp-…
Published: 2008-04-04T00:44:00 Last Modified: 2022-02-03T19:56:00
Summary
The Replace function in the capp-lspp-config script in the (1) lspp-eal4-config-ibm and (2) capp-lspp-eal4-config-hp packages before 0.65-2 in Red Hat Enterprise Linux (RHEL) 5 uses lstat instead of stat to determine the /etc/pam.d/system-auth file permissions, leading to a change to world-writable permissions for the /etc/pam.d/system-auth-ac file, which allows local users to gain privileges by modifying this file.
Common Weakness Enumeration (CWE): CWE-732: Incorrect Permission Assignment for Critical Resource
CWE Description: The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2008-0884 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=435442
- http://rhn.redhat.com/errata/RHSA-2008-0193.html
- http://www.securityfocus.com/bid/28557
- http://securitytracker.com/id?1019740
- http://secunia.com/advisories/29642
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41584
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-1198: The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use…
Published: 2008-03-06T21:44:00 Last Modified: 2022-02-03T19:56:00
Summary
The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use aggressive IKE mode instead of main IKE mode, which makes it easier for remote attackers to conduct brute force attacks by sniffing an unencrypted preshared key (PSK) hash.
Scores
- Impact Score: 6.9
- Exploitability Score: 8.6
- CVSS: 7.1
- CVSS Vector: AV:N/AC:M/Au:N/C:C/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: COMPLETE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2008-1198 vulnerability.
References
- http://www.ernw.de/download/pskattack.pdf
- https://bugzilla.redhat.com/show_bug.cgi?id=435274
- http://www.securitytracker.com/id?1019563
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41053
- http://secunia.com/advisories/48045
See also: All popular products CVE Vulnerabilities of redhat
CVE-2008-0595: dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes…
Published: 2008-02-29T19:44:00 Last Modified: 2022-02-07T18:24:00
Summary
dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes in allow directives in the security policy only for fully qualified method calls, which allows local users to bypass intended access restrictions via a method call with a NULL interface.
Common Weakness Enumeration (CWE): CWE-863: Incorrect Authorization
CWE Description: The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2008-0595 vulnerability.
References
- http://lists.freedesktop.org/archives/dbus/2008-February/009401.html
- http://www.j5live.com/2008/02/27/announce-d-bus-1120-conisten-water-released/
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:054
- http://www.redhat.com/support/errata/RHSA-2008-0159.html
- http://www.securityfocus.com/bid/28023
- http://securitytracker.com/id?1019512
- http://secunia.com/advisories/29148
- http://secunia.com/advisories/29160
- http://secunia.com/advisories/29171
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00893.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00911.html
- http://secunia.com/advisories/29173
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0099
- https://issues.rpath.com/browse/RPL-2282
- http://secunia.com/advisories/29281
- http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
- http://secunia.com/advisories/29323
- http://wiki.rpath.com/Advisories:rPSA-2008-0099
- http://www.ubuntu.com/usn/usn-653-1
- http://secunia.com/advisories/32281
- http://secunia.com/advisories/30869
- http://www.debian.org/security/2008/dsa-1599
- http://www.vupen.com/english/advisories/2008/0694
- http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9353
- http://www.securityfocus.com/archive/1/489280/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-4130: The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64)…
Published: 2008-02-05T00:00:00 Last Modified: 2017-09-29T01:29:00
Summary
The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-4130 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=179665
- http://rhn.redhat.com/errata/RHSA-2008-0055.html
- http://secunia.com/advisories/28748
- http://www.securityfocus.com/bid/27556
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11437
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-6285: The default configuration for autofs 5 (autofs5) in some Linux distributions, such as Red Hat…
Published: 2007-12-20T22:46:00 Last Modified: 2017-09-29T01:29:00
Summary
The default configuration for autofs 5 (autofs5) in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 4 and 5, does not specify the nodev mount option for the -hosts map, which allows local users to access “important devices” by operating a remote NFS server and creating special device files on that server, as demonstrated by the /dev/mem device.
Common Weakness Enumeration (CWE): CWE-16: Configuration
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 10.0
- Exploitability Score: 1.9
- CVSS: 6.2
- CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-6285 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2007-1176.html
- http://rhn.redhat.com/errata/RHSA-2007-1177.html
- https://bugzilla.redhat.com/show_bug.cgi?id=426218
- http://secunia.com/advisories/28156
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:009
- http://secunia.com/advisories/28456
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00726.html
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00732.html
- http://www.securityfocus.com/bid/26970
- http://securitytracker.com/id?1019137
- http://secunia.com/advisories/28168
- http://osvdb.org/40442
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39188
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11457
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-6283: Red Hat Enterprise Linux 5 and Fedora install the Bind /etc/rndc.key file with world-readable…
Published: 2007-12-18T01:46:00 Last Modified: 2022-02-03T17:19:00
Summary
Red Hat Enterprise Linux 5 and Fedora install the Bind /etc/rndc.key file with world-readable permissions, which allows local users to perform unauthorized named commands, such as causing a denial of service by stopping named.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-6283 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2007-6283
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00587.html
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00671.html
- http://secunia.com/advisories/28180
- http://www.redhat.com/support/errata/RHSA-2008-0300.html
- http://secunia.com/advisories/30313
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9977
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-5964: The default configuration of autofs 5 in some Linux distributions, such as Red Hat Enterprise…
Published: 2007-12-13T18:46:00 Last Modified: 2017-09-29T01:29:00
Summary
The default configuration of autofs 5 in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 5, omits the nosuid option for the hosts (/net filesystem) map, which allows local users to gain privileges via a setuid program on a remote NFS server.
Common Weakness Enumeration (CWE): CWE-16: Configuration
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-5964 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=410031
- http://www.redhat.com/support/errata/RHSA-2007-1128.html
- http://secunia.com/advisories/28052
- https://bugzilla.redhat.com/show_bug.cgi?id=409701
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00474.html
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00549.html
- http://www.redhat.com/support/errata/RHSA-2007-1129.html
- http://www.securityfocus.com/bid/26841
- http://securitytracker.com/id?1019087
- http://secunia.com/advisories/28097
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:009
- http://secunia.com/advisories/28456
- http://osvdb.org/40441
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10158
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-6206: The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and…
Published: 2007-12-04T00:46:00 Last Modified: 2020-08-12T19:26:00
Summary
The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-6206 vulnerability.
References
- http://bugzilla.kernel.org/show_bug.cgi?id=3043
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=c46f739dd39db3b07ab5deb4e3ec81e1c04a91af
- http://www.securityfocus.com/bid/26701
- http://secunia.com/advisories/27908
- http://www.debian.org/security/2007/dsa-1436
- http://secunia.com/advisories/28141
- http://www.redhat.com/support/errata/RHSA-2008-0089.html
- http://rhn.redhat.com/errata/RHSA-2008-0055.html
- http://www.ubuntu.com/usn/usn-574-1
- http://secunia.com/advisories/28748
- http://secunia.com/advisories/28706
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:044
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00005.html
- http://secunia.com/advisories/28826
- http://secunia.com/advisories/28889
- http://www.debian.org/security/2008/dsa-1503
- http://www.debian.org/security/2008/dsa-1504
- http://www.ubuntu.com/usn/usn-578-1
- http://secunia.com/advisories/28971
- http://secunia.com/advisories/29058
- http://secunia.com/advisories/28643
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:086
- http://www.redhat.com/support/errata/RHSA-2008-0211.html
- http://lists.vmware.com/pipermail/security-announce/2008/000023.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:112
- http://secunia.com/advisories/31246
- http://secunia.com/advisories/30962
- http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html
- http://secunia.com/advisories/30818
- http://secunia.com/advisories/30110
- http://secunia.com/advisories/33280
- http://www.redhat.com/support/errata/RHSA-2008-0787.html
- http://www.vupen.com/english/advisories/2007/4090
- http://www.vupen.com/english/advisories/2008/2222/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38841
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10719
- http://www.securityfocus.com/archive/1/487808/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-7226: Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the…
Published: 2007-12-03T20:46:00 Last Modified: 2017-10-11T01:31:00
Summary
Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified “subpattern containing a named recursion or subroutine reference,” which allows context-dependent attackers to cause a denial of service (error or crash).
Scores
- Impact Score: 2.9
- Exploitability Score: 8.6
- CVSS: 4.3
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2006-7226 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=384781
- http://www.pcre.org/changelog.txt
- http://www.redhat.com/support/errata/RHSA-2007-1059.html
- http://www.redhat.com/support/errata/RHSA-2007-1068.html
- http://www.securityfocus.com/bid/26727
- http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm
- http://secunia.com/advisories/28041
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:030
- http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
- http://secunia.com/advisories/28658
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40020
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11545
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-5494: Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4…
Published: 2007-11-30T02:46:00 Last Modified: 2017-09-29T01:29:00
Summary
Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-5494 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=315051
- http://www.redhat.com/support/errata/RHSA-2007-0993.html
- http://www.securitytracker.com/id?1019017
- http://secunia.com/advisories/27824
- http://www.redhat.com/support/errata/RHSA-2007-1104.html
- http://secunia.com/advisories/28162
- http://www.securityfocus.com/bid/26657
- http://osvdb.org/44153
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38823
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10884
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-5116: Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in…
Published: 2007-11-07T23:46:00 Last Modified: 2018-10-15T21:40:00
Summary
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2007-5116 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=323571
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:207
- http://www.redhat.com/support/errata/RHSA-2007-0966.html
- http://www.redhat.com/support/errata/RHSA-2007-1011.html
- http://www.securityfocus.com/bid/26350
- http://secunia.com/advisories/27531
- http://secunia.com/advisories/27546
- https://bugzilla.redhat.com/show_bug.cgi?id=378131
- https://issues.rpath.com/browse/RPL-1813
- http://www.debian.org/security/2007/dsa-1400
- http://www.gentoo.org/security/en/glsa/glsa-200711-28.xml
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.023.html
- http://www.novell.com/linux/security/advisories/2007_24_sr.html
- http://www.ubuntu.com/usn/usn-552-1
- http://securitytracker.com/id?1018899
- http://secunia.com/advisories/27479
- http://secunia.com/advisories/27515
- http://secunia.com/advisories/27548
- http://secunia.com/advisories/27613
- http://secunia.com/advisories/27570
- http://secunia.com/advisories/27936
- http://docs.info.apple.com/article.html?artnum=307179
- ftp://aix.software.ibm.com/aix/efixes/security/README
- http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10220
- http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10244
- http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
- http://www.us-cert.gov/cas/techalerts/TA07-352A.html
- http://secunia.com/advisories/28167
- http://lists.vmware.com/pipermail/security-announce/2008/000002.html
- http://support.avaya.com/elmodocs2/security/ASA-2008-014.htm
- http://secunia.com/advisories/28368
- http://secunia.com/advisories/28387
- http://secunia.com/advisories/27756
- http://www.vmware.com/security/advisories/VMSA-2008-0001.html
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-31524-1
- http://secunia.com/advisories/28993
- http://secunia.com/advisories/29074
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-231524-1
- http://secunia.com/advisories/31208
- http://www.ipcop.org/index.php?name=News&file=article&sid=41
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1018985.1-1
- http://www.vupen.com/english/advisories/2007/4238
- http://www.vupen.com/english/advisories/2008/0064
- http://www.vupen.com/english/advisories/2008/0641
- http://www.vupen.com/english/advisories/2007/3724
- http://www.vupen.com/english/advisories/2007/4255
- http://marc.info/?l=bugtraq&m=120352263023774&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38270
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10669
- http://www.securityfocus.com/archive/1/486859/100/0/threaded
- http://www.securityfocus.com/archive/1/485936/100/0/threaded
- http://www.securityfocus.com/archive/1/483584/100/0/threaded
- http://www.securityfocus.com/archive/1/483563/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-4574: Unspecified vulnerability in the “stack unwinder fixes” in kernel in Red Hat Enterprise Linux 5,…
Published: 2007-10-23T10:46:00 Last Modified: 2017-09-29T01:29:00
Summary
Unspecified vulnerability in the “stack unwinder fixes” in kernel in Red Hat Enterprise Linux 5, when running on AMD64 and Intel 64, allows local users to cause a denial of service via unknown vectors.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-4574 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2007-0940.html
- http://www.securityfocus.com/bid/26158
- http://securitytracker.com/id?1018844
- http://secunia.com/advisories/27322
- http://osvdb.org/45489
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10681
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-5365: Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0…
Published: 2007-10-11T10:17:00 Last Modified: 2018-10-15T21:44:00
Summary
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2007-5365 vulnerability.
References
- http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c
- http://www.openbsd.org/errata40.html#016_dhcpd
- http://www.openbsd.org/errata41.html#010_dhcpd
- http://www.openbsd.org/errata42.html#001_dhcpd
- http://www.securityfocus.com/bid/25984
- http://secunia.com/advisories/27160
- http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354
- http://www.debian.org/security/2007/dsa-1388
- http://www.redhat.com/support/errata/RHSA-2007-0970.html
- http://www.ubuntu.com/usn/usn-531-1
- http://www.ubuntu.com/usn/usn-531-2
- http://www.securitytracker.com/id?1018794
- http://secunia.com/advisories/27273
- http://secunia.com/advisories/27350
- http://secunia.com/advisories/27338
- http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1
- http://securitytracker.com/id?1021157
- http://www.securityfocus.com/bid/32213
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1
- http://secunia.com/advisories/32668
- http://www.vupen.com/english/advisories/2008/3088
- https://exchange.xforce.ibmcloud.com/vulnerabilities/37045
- https://www.exploit-db.com/exploits/4601
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817
- http://www.securityfocus.com/archive/1/483230/100/100/threaded
- http://www.securityfocus.com/archive/1/482085/100/100/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-0004: The NFS client implementation in the kernel in Red Hat Enterprise Linux (RHEL) 3, when a…
Published: 2007-09-18T19:17:00 Last Modified: 2008-09-05T21:16:00
Summary
The NFS client implementation in the kernel in Red Hat Enterprise Linux (RHEL) 3, when a filesystem is mounted with the noacl option, checks permissions for the open system call via vfs_permission (mode bits) data rather than an NFS ACCESS call to the server, which allows local client processes to obtain a false success status from open calls that the server would deny, and possibly obtain sensitive information about file permissions on the server, as demonstrated in a root_squash environment. NOTE: it is uncertain whether any scenarios involving this issue cross privilege boundaries.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-0004 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-1865: ** DISPUTED ** The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux…
Published: 2007-09-18T19:17:00 Last Modified: 2008-11-13T06:36:00
Summary
** DISPUTED ** The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter. NOTE: this issue has been disputed in a bug comment, stating that “len is ignored when copying header info to the user’s buffer.”
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-1865 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-3379: Unspecified vulnerability in the kernel in Red Hat Enterprise Linux (RHEL) 4 on the x86_64…
Published: 2007-09-17T17:17:00 Last Modified: 2017-10-11T01:32:00
Summary
Unspecified vulnerability in the kernel in Red Hat Enterprise Linux (RHEL) 4 on the x86_64 platform allows local users to cause a denial of service (OOPS) via unspecified vectors related to the get_gate_vma function and the fuser command.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-3379 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=178981
- http://rhn.redhat.com/errata/RHBA-2007-0304.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10426
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-3739: mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does not prevent stack expansion…
Published: 2007-09-14T01:17:00 Last Modified: 2017-09-29T01:29:00
Summary
mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does not prevent stack expansion from entering into reserved kernel page memory, which allows local users to cause a denial of service (OOPS) via unspecified vectors.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-3739 vulnerability.
References
- http://lkml.org/lkml/2007/1/29/180
- https://bugzilla.redhat.com/show_bug.cgi?id=253313
- http://www.redhat.com/support/errata/RHSA-2007-0705.html
- http://secunia.com/advisories/26760
- http://support.avaya.com/elmodocs2/security/ASA-2007-474.htm
- http://www.debian.org/security/2007/dsa-1378
- http://www.redhat.com/support/errata/RHSA-2007-0939.html
- http://www.redhat.com/support/errata/RHSA-2007-1049.html
- http://www.ubuntu.com/usn/usn-518-1
- http://secunia.com/advisories/23955
- http://secunia.com/advisories/26955
- http://secunia.com/advisories/26978
- http://secunia.com/advisories/27436
- http://secunia.com/advisories/27747
- http://secunia.com/advisories/27913
- http://www.debian.org/security/2008/dsa-1504
- http://secunia.com/advisories/29058
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36592
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11455
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-3849: Red Hat Enterprise Linux (RHEL) 5 ships the rpm for the Advanced Intrusion Detection Environment…
Published: 2007-09-05T01:17:00 Last Modified: 2017-09-29T01:29:00
Summary
Red Hat Enterprise Linux (RHEL) 5 ships the rpm for the Advanced Intrusion Detection Environment (AIDE) before 0.13.1 with a database that lacks checksum information, which allows context-dependent attackers to bypass file integrity checks and modify certain files.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.4
- CVSS: 1.9
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-3849 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=236923
- http://www.redhat.com/support/errata/RHSA-2007-0539.html
- http://www.securityfocus.com/bid/25542
- http://www.securitytracker.com/id?1018652
- http://secunia.com/advisories/26711
- http://osvdb.org/40439
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36452
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10217
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-3103: The init.d script for the X.Org X11 xfs font server on various Linux distributions might allow…
Published: 2007-07-15T22:30:00 Last Modified: 2018-10-16T16:47:00
Summary
The init.d script for the X.Org X11 xfs font server on various Linux distributions might allow local users to change the permissions of arbitrary files via a symlink attack on the /tmp/.font-unix temporary file.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 10.0
- Exploitability Score: 1.9
- CVSS: 6.2
- CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2007-3103 vulnerability.
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=557
- http://bugzilla.redhat.com/242903
- http://www.redhat.com/support/errata/RHSA-2007-0519.html
- http://www.redhat.com/support/errata/RHSA-2007-0520.html
- https://issues.rpath.com/browse/RPL-1485
- http://bugs.gentoo.org/show_bug.cgi?id=185660
- http://www.debian.org/security/2007/dsa-1342
- http://security.gentoo.org/glsa/glsa-200710-11.xml
- http://www.securityfocus.com/bid/24888
- http://www.securitytracker.com/id?1018375
- http://secunia.com/advisories/26081
- http://secunia.com/advisories/26282
- http://secunia.com/advisories/26056
- http://secunia.com/advisories/27240
- https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00096.html
- http://secunia.com/advisories/35674
- https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00095.html
- http://osvdb.org/40945
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35375
- https://www.exploit-db.com/exploits/5167
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10802
- http://www.securityfocus.com/archive/1/473869/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-0773: The Linux kernel before 2.6.9-42.0.8 in Red Hat 4.4 allows local users to cause a denial of…
Published: 2007-06-26T18:30:00 Last Modified: 2017-10-11T01:31:00
Summary
The Linux kernel before 2.6.9-42.0.8 in Red Hat 4.4 allows local users to cause a denial of service (kernel OOPS from null dereference) via fput in a 32-bit ioctl on 64-bit x86 systems, an incomplete fix of CVE-2005-3044.1.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.1
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:S/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-0773 vulnerability.
References
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=243252
- http://rhn.redhat.com/errata/RHSA-2007-0488.html
- http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm
- http://www.novell.com/linux/security/advisories/2007_53_kernel.html
- http://secunia.com/advisories/25838
- http://secunia.com/advisories/26289
- http://secunia.com/advisories/27227
- http://osvdb.org/37128
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11267
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-3099: usr/mgmt_ipc.c in iscsid in open-iscsi (iscsi-initiator-utils) before 2.0-865 checks the client’s…
Published: 2007-06-14T19:30:00 Last Modified: 2017-10-11T01:32:00
Summary
usr/mgmt_ipc.c in iscsid in open-iscsi (iscsi-initiator-utils) before 2.0-865 checks the client’s UID on the listening AF_LOCAL socket instead of the new connection, which allows remote attackers to access the management interface and cause a denial of service (iscsid exit or iSCSI connection loss).
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-3099 vulnerability.
References
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=243719
- http://svn.berlios.de/viewcvs/open-iscsi?rev=857&view=rev
- http://www.redhat.com/support/errata/RHSA-2007-0497.html
- http://secunia.com/advisories/25679
- http://support.novell.com/techcenter/psdb/187174044e1dbe78726bcf840f7530ed.html
- http://www.debian.org/security/2007/dsa-1314
- http://www.novell.com/linux/security/advisories/2007_17_sr.html
- http://www.securityfocus.com/bid/24471
- http://www.securitytracker.com/id?1018246
- http://secunia.com/advisories/25749
- http://secunia.com/advisories/26438
- http://secunia.com/advisories/26543
- http://osvdb.org/37269
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34944
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11595
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-1864: Buffer overflow in the bundled libxmlrpc library in PHP before 4.4.7, and 5.x before 5.2.2, has…
Published: 2007-05-09T00:19:00 Last Modified: 2019-05-22T18:44:00
Summary
Buffer overflow in the bundled libxmlrpc library in PHP before 4.4.7, and 5.x before 5.2.2, has unknown impact and remote attack vectors.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2007-1864 vulnerability.
References
- http://us2.php.net/releases/4_4_7.php
- http://us2.php.net/releases/5_2_2.php
- https://rhn.redhat.com/errata/RHSA-2007-0348.html
- http://www.redhat.com/support/errata/RHSA-2007-0349.html
- http://www.redhat.com/support/errata/RHSA-2007-0355.html
- http://www.securitytracker.com/id?1018024
- http://secunia.com/advisories/25187
- http://secunia.com/advisories/25191
- http://www.trustix.org/errata/2007/0017/
- http://secunia.com/advisories/25255
- http://support.avaya.com/elmodocs2/security/ASA-2007-231.htm
- https://issues.rpath.com/browse/RPL-1693
- http://www.debian.org/security/2007/dsa-1330
- http://www.debian.org/security/2007/dsa-1331
- http://security.gentoo.org/glsa/glsa-200705-19.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:102
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:103
- http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
- http://www.ubuntu.com/usn/usn-485-1
- http://www.securityfocus.com/bid/23813
- http://secunia.com/advisories/25445
- http://secunia.com/advisories/25660
- http://secunia.com/advisories/25938
- http://secunia.com/advisories/25945
- http://secunia.com/advisories/26048
- http://secunia.com/advisories/26102
- http://secunia.com/advisories/27377
- http://www.vupen.com/english/advisories/2007/2187
- http://osvdb.org/34674
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11257
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-0771: The utrace support in Linux kernel 2.6.18, and other versions, allows local users to cause a…
Published: 2007-05-02T22:19:00 Last Modified: 2017-10-11T01:31:00
Summary
The utrace support in Linux kernel 2.6.18, and other versions, allows local users to cause a denial of service (system hang) related to “MT exec + utrace_attach spin failure mode,” as demonstrated by ptrace-thrash.c.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-0771 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2007-0169.html
- http://www.securityfocus.com/bid/23720
- http://securitytracker.com/id?1017979
- http://secunia.com/advisories/25080
- https://bugzilla.redhat.com/show_bug.cgi?id=227952
- https://bugzilla.redhat.com/show_bug.cgi?id=228816
- http://osvdb.org/35927
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34128
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9447
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-2030: lharc.c in lha does not securely create temporary files, which might allow local users to read or…
Published: 2007-04-16T20:19:00 Last Modified: 2017-07-29T01:31:00
Summary
lharc.c in lha does not securely create temporary files, which might allow local users to read or write files by creating a file before LHA is invoked.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: COMPLETE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-2030 vulnerability.
References
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=236585
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:117
- http://www.securityfocus.com/bid/24336
- http://secunia.com/advisories/25519
- http://osvdb.org/37049
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34063
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-1352: Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows…
Published: 2007-04-06T01:19:00 Last Modified: 2018-10-16T16:38:00
Summary
Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
Scores
- Impact Score: 4.9
- Exploitability Score: 4.4
- CVSS: 3.8
- CVSS Vector: AV:A/AC:M/Au:S/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2007-1352 vulnerability.
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502
- http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
- http://www.redhat.com/support/errata/RHSA-2007-0126.html
- http://www.ubuntu.com/usn/usn-448-1
- http://www.securityfocus.com/bid/23283
- http://www.securitytracker.com/id?1017857
- http://secunia.com/advisories/24741
- http://secunia.com/advisories/24756
- http://secunia.com/advisories/24770
- http://issues.foresightlinux.org/browse/FL-223
- https://issues.rpath.com/browse/RPL-1213
- http://rhn.redhat.com/errata/RHSA-2007-0125.html
- http://www.redhat.com/support/errata/RHSA-2007-0132.html
- http://secunia.com/advisories/24745
- http://secunia.com/advisories/24758
- http://secunia.com/advisories/24765
- http://secunia.com/advisories/24771
- http://secunia.com/advisories/24772
- http://secunia.com/advisories/24791
- http://www.novell.com/linux/security/advisories/2007_27_x.html
- http://secunia.com/advisories/25004
- http://www.openbsd.org/errata39.html#021_xorg
- http://www.openbsd.org/errata40.html#011_xorg
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
- http://www.securityfocus.com/bid/23300
- http://secunia.com/advisories/25006
- http://security.gentoo.org/glsa/glsa-200705-10.xml
- http://secunia.com/advisories/25195
- http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
- http://secunia.com/advisories/25216
- http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
- http://www.debian.org/security/2007/dsa-1294
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
- http://secunia.com/advisories/25305
- http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
- http://secunia.com/advisories/33937
- http://support.apple.com/kb/HT3438
- http://www.vupen.com/english/advisories/2007/1548
- http://www.vupen.com/english/advisories/2007/1217
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33419
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523
- http://www.securityfocus.com/archive/1/464816/100/0/threaded
- http://www.securityfocus.com/archive/1/464686/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-1351: Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before…
Published: 2007-04-06T01:19:00 Last Modified: 2018-10-16T16:38:00
Summary
Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 10.0
- Exploitability Score: 6.8
- CVSS: 8.5
- CVSS Vector: AV:N/AC:M/Au:S/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2007-1351 vulnerability.
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501
- http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
- http://www.redhat.com/support/errata/RHSA-2007-0126.html
- http://www.ubuntu.com/usn/usn-448-1
- http://www.securityfocus.com/bid/23283
- http://www.securitytracker.com/id?1017857
- http://secunia.com/advisories/24741
- http://secunia.com/advisories/24756
- http://secunia.com/advisories/24770
- http://issues.foresightlinux.org/browse/FL-223
- http://sourceforge.net/project/shownotes.php?release_id=498954
- https://issues.rpath.com/browse/RPL-1213
- http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954
- http://rhn.redhat.com/errata/RHSA-2007-0125.html
- http://www.redhat.com/support/errata/RHSA-2007-0132.html
- http://secunia.com/advisories/24745
- http://secunia.com/advisories/24758
- http://secunia.com/advisories/24765
- http://secunia.com/advisories/24768
- http://secunia.com/advisories/24771
- http://secunia.com/advisories/24772
- http://secunia.com/advisories/24776
- http://secunia.com/advisories/24791
- http://www.redhat.com/support/errata/RHSA-2007-0150.html
- http://www.securityfocus.com/bid/23402
- http://secunia.com/advisories/24885
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733
- http://www.novell.com/linux/security/advisories/2007_6_sr.html
- http://www.novell.com/linux/security/advisories/2007_27_x.html
- http://secunia.com/advisories/24889
- http://secunia.com/advisories/25004
- http://secunia.com/advisories/24921
- http://secunia.com/advisories/24996
- http://www.openbsd.org/errata39.html#021_xorg
- http://www.openbsd.org/errata40.html#011_xorg
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
- http://www.securityfocus.com/bid/23300
- http://secunia.com/advisories/25006
- http://security.gentoo.org/glsa/glsa-200705-02.xml
- http://security.gentoo.org/glsa/glsa-200705-10.xml
- http://secunia.com/advisories/25096
- http://secunia.com/advisories/25195
- http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
- http://secunia.com/advisories/25216
- http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm
- http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
- http://www.debian.org/security/2007/dsa-1294
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:081
- http://secunia.com/advisories/25305
- http://secunia.com/advisories/25495
- http://www.debian.org/security/2008/dsa-1454
- http://secunia.com/advisories/28333
- http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
- http://secunia.com/advisories/30161
- http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
- http://secunia.com/advisories/33937
- http://support.apple.com/kb/HT3438
- http://www.vupen.com/english/advisories/2007/1548
- http://www.vupen.com/english/advisories/2007/1217
- http://www.vupen.com/english/advisories/2007/1264
- http://www.trustix.org/errata/2007/0013/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33417
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266
- http://www.securityfocus.com/archive/1/464816/100/0/threaded
- http://www.securityfocus.com/archive/1/464686/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-1349: PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not…
Published: 2007-03-30T00:19:00 Last Modified: 2022-02-03T16:26:00
Summary
PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
Common Weakness Enumeration (CWE): CWE-20: Improper Input Validation
CWE Description: The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2007-1349 vulnerability.
References
- http://www.gossamer-threads.com/lists/modperl/modperl/92739
- http://svn.apache.org/repos/asf/perl/modperl/branches/1.x/Changes
- http://secunia.com/advisories/24678
- http://www.securityfocus.com/bid/23192
- http://secunia.com/advisories/24839
- http://www.novell.com/linux/security/advisories/2007_8_sr.html
- http://security.gentoo.org/glsa/glsa-200705-04.xml
- http://secunia.com/advisories/25110
- http://secunia.com/advisories/25072
- http://support.avaya.com/elmodocs2/security/ASA-2007-293.htm
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:083
- http://rhn.redhat.com/errata/RHSA-2007-0395.html
- http://www.redhat.com/support/errata/RHSA-2007-0486.html
- http://www.redhat.com/support/errata/RHSA-2007-0396.html
- ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
- http://www.novell.com/linux/security/advisories/2007_12_sr.html
- http://www.trustix.org/errata/2007/0023/
- http://www.ubuntu.com/usn/usn-488-1
- http://www.securitytracker.com/id?1018259
- http://secunia.com/advisories/25432
- http://secunia.com/advisories/25655
- http://secunia.com/advisories/25730
- http://secunia.com/advisories/25894
- http://secunia.com/advisories/26084
- http://secunia.com/advisories/26231
- http://secunia.com/advisories/26290
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- http://rhn.redhat.com/errata/RHSA-2008-0630.html
- http://secunia.com/advisories/31493
- http://www.redhat.com/support/errata/RHSA-2008-0627.html
- http://secunia.com/advisories/31490
- http://secunia.com/advisories/33723
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-248386-1
- http://secunia.com/advisories/33720
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1
- http://www.vupen.com/english/advisories/2007/1150
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33312
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8349
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10987
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-1716: pam_console does not properly restore ownership for certain console devices when there are…
Published: 2007-03-27T22:19:00 Last Modified: 2017-10-11T01:31:00
Summary
pam_console does not properly restore ownership for certain console devices when there are multiple users logged into the console and one user logs out, which might allow local users to gain privileges.
Scores
- Impact Score: 6.4
- Exploitability Score: 1.2
- CVSS: 3.4
- CVSS Vector: AV:L/AC:H/Au:M/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: MULTIPLE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-1716 vulnerability.
References
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230823
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
- http://security.gentoo.org/glsa/glsa-200711-23.xml
- http://www.redhat.com/support/errata/RHSA-2007-0465.html
- http://www.redhat.com/support/errata/RHSA-2007-0555.html
- http://www.redhat.com/support/errata/RHSA-2007-0737.html
- ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
- http://secunia.com/advisories/25631
- http://secunia.com/advisories/25894
- http://secunia.com/advisories/27590
- http://secunia.com/advisories/26909
- http://secunia.com/advisories/27706
- http://support.avaya.com/elmodocs2/security/ASA-2007-526.htm
- http://secunia.com/advisories/28319
- http://osvdb.org/37271
- http://www.vupen.com/english/advisories/2007/3229
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11483
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-0001: The file watch implementation in the audit subsystem (auditctl -w) in the Red Hat Enterprise…
Published: 2007-03-02T21:18:00 Last Modified: 2017-10-11T01:31:00
Summary
The file watch implementation in the audit subsystem (auditctl -w) in the Red Hat Enterprise Linux (RHEL) 4 kernel 2.6.9 allows local users to cause a denial of service (kernel panic) by replacing a watched file, which does not cause the watch on the old inode to be dropped.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2007-0001 vulnerability.
References
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=223129
- http://www.redhat.com/support/errata/RHSA-2007-0085.html
- http://secunia.com/advisories/24300
- http://www.securityfocus.com/bid/22737
- http://www.securitytracker.com/id?1017705
- http://osvdb.org/33031
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9560
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-1007: Format string vulnerability in GnomeMeeting 1.0.2 and earlier allows remote attackers to cause a…
Published: 2007-02-20T17:28:00 Last Modified: 2017-10-11T01:31:00
Summary
Format string vulnerability in GnomeMeeting 1.0.2 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in the name, which is not properly handled in a call to the gnomemeeting_log_insert function.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2007-1007 vulnerability.
References
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=229266
- http://www.redhat.com/support/errata/RHSA-2007-0086.html
- http://secunia.com/advisories/24185
- http://www.debian.org/security/2007/dsa-1262
- http://www.ubuntu.com/usn/usn-426-1
- http://secunia.com/advisories/24271
- http://secunia.com/advisories/24379
- http://www.novell.com/linux/security/advisories/2007_9_sr.html
- http://secunia.com/advisories/25119
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:045
- ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
- http://secunia.com/advisories/24284
- http://osvdb.org/32083
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11776
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-5753: Unspecified vulnerability in the listxattr system call in Linux kernel, when a “bad inode” is…
Published: 2007-01-30T19:28:00 Last Modified: 2017-10-11T01:31:00
Summary
Unspecified vulnerability in the listxattr system call in Linux kernel, when a “bad inode” is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2006-5753 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2007-0014.html
- http://lkml.org/lkml/2007/1/3/150
- http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
- https://issues.rpath.com/browse/RPL-1106
- http://fedoranews.org/cms/node/2739
- http://fedoranews.org/cms/node/2740
- http://www.novell.com/linux/security/advisories/2007_18_kernel.html
- http://www.novell.com/linux/security/advisories/2007_21_kernel.html
- http://www.ubuntu.com/usn/usn-416-1
- http://www.securityfocus.com/bid/22316
- http://secunia.com/advisories/23955
- http://secunia.com/advisories/23997
- http://secunia.com/advisories/24100
- http://secunia.com/advisories/24098
- http://secunia.com/advisories/24206
- http://secunia.com/advisories/24400
- http://secunia.com/advisories/24429
- http://secunia.com/advisories/24482
- http://secunia.com/advisories/24547
- http://www.novell.com/linux/security/advisories/2007_30_kernel.html
- http://www.securityfocus.com/archive/1/471457
- http://www.debian.org/security/2007/dsa-1304
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:040
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:060
- http://www.novell.com/linux/security/advisories/2007_35_kernel.html
- http://secunia.com/advisories/25683
- http://secunia.com/advisories/25714
- http://secunia.com/advisories/25691
- http://secunia.com/advisories/25226
- http://www.debian.org/security/2008/dsa-1503
- http://secunia.com/advisories/29058
- http://osvdb.org/33020
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9371
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-6235: A “stack overwrite” vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0…
Published: 2006-12-07T11:28:00 Last Modified: 2018-10-17T21:47:00
Summary
A “stack overwrite” vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2006-6235 vulnerability.
References
- http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html
- http://www.redhat.com/support/errata/RHSA-2006-0754.html
- http://www.securityfocus.com/bid/21462
- http://secunia.com/advisories/23245
- http://www.ubuntu.com/usn/usn-393-1
- http://secunia.com/advisories/23250
- http://secunia.com/advisories/23255
- http://secunia.com/advisories/23269
- https://issues.rpath.com/browse/RPL-835
- http://www.debian.org/security/2006/dsa-1231
- http://security.gentoo.org/glsa/glsa-200612-03.xml
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html
- http://www.trustix.org/errata/2006/0070
- http://www.ubuntu.com/usn/usn-393-2
- http://securitytracker.com/id?1017349
- http://secunia.com/advisories/23259
- http://secunia.com/advisories/23299
- http://secunia.com/advisories/23303
- http://secunia.com/advisories/23329
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:228
- http://www.novell.com/linux/security/advisories/2006_28_sr.html
- http://secunia.com/advisories/23290
- http://secunia.com/advisories/23335
- http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html
- http://www.kb.cert.org/vuls/id/427009
- http://secunia.com/advisories/23284
- ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc
- http://secunia.com/advisories/23513
- http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm
- http://secunia.com/advisories/24047
- http://www.vupen.com/english/advisories/2006/4881
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30711
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245
- http://www.securityfocus.com/archive/1/453723/100/0/threaded
- http://www.securityfocus.com/archive/1/453664/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-4342: The kernel in Red Hat Enterprise Linux 3, when running on SMP systems, allows local users to…
Published: 2006-10-17T17:07:00 Last Modified: 2017-10-11T01:31:00
Summary
The kernel in Red Hat Enterprise Linux 3, when running on SMP systems, allows local users to cause a denial of service (deadlock) by running the shmat function on an shm at the same time that shmctl is removing that shm (IPC_RMID), which prevents a spinlock from being unlocked.
Scores
- Impact Score: 6.9
- Exploitability Score: 1.9
- CVSS: 4.0
- CVSS Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2006-4342 vulnerability.
References
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205618
- http://www.redhat.com/support/errata/RHSA-2006-0710.html
- http://secunia.com/advisories/22497
- http://www.kb.cert.org/vuls/id/245984
- http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm
- http://secunia.com/advisories/23064
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9649
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-5170: pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other…
Published: 2006-10-10T04:06:00 Last Modified: 2022-02-03T17:19:00
Summary
pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2006-5170 vulnerability.
References
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207286
- https://issues.rpath.com/browse/RPL-680
- http://bugzilla.padl.com/show_bug.cgi?id=291
- http://www.debian.org/security/2006/dsa-1203
- http://www.securityfocus.com/bid/20880
- http://securitytracker.com/id?1017153
- http://secunia.com/advisories/22682
- http://secunia.com/advisories/22694
- http://secunia.com/advisories/22696
- http://rhn.redhat.com/errata/RHSA-2006-0719.html
- http://secunia.com/advisories/22869
- http://www.novell.com/linux/security/advisories/2006_27_sr.html
- http://secunia.com/advisories/23132
- http://security.gentoo.org/glsa/glsa-200612-19.xml
- http://secunia.com/advisories/23428
- http://www.trustix.org/errata/2006/0061/
- http://secunia.com/advisories/22685
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:201
- http://www.vupen.com/english/advisories/2006/4319
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10418
- http://www.securityfocus.com/archive/1/447859/100/200/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-3813: A regression error in the Perl package for Red Hat Enterprise Linux 4 omits the patch for…
Published: 2006-08-11T21:04:00 Last Modified: 2017-10-11T01:31:00
Summary
A regression error in the Perl package for Red Hat Enterprise Linux 4 omits the patch for CVE-2005-0155, which allows local users to overwrite arbitrary files with debugging information.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2006-3813 vulnerability.
References
- http://rhn.redhat.com/errata/RHSA-2006-0605.html
- http://support.avaya.com/elmodocs2/security/ASA-2006-163.htm
- http://secunia.com/advisories/21646
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9456
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-2933: kdesktop_lock in kdebase before 3.1.3-5.11 for KDE in Red Hat Enterprise Linux (RHEL) 3 does not…
Published: 2006-07-27T22:04:00 Last Modified: 2017-10-11T01:30:00
Summary
kdesktop_lock in kdebase before 3.1.3-5.11 for KDE in Red Hat Enterprise Linux (RHEL) 3 does not properly terminate, which can prevent the screensaver from activating or prevent users from manually locking the desktop.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2006-2933 vulnerability.
References
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=177755
- http://www.redhat.com/support/errata/RHSA-2006-0576.html
- http://secunia.com/advisories/21203
- http://www.securityfocus.com/bid/19152
- http://securitytracker.com/id?1016571
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10535
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-1918: The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat…
Published: 2005-12-31T05:00:00 Last Modified: 2018-10-19T15:32:00
Summary
The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an “incorrect optimization” that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving “/../” sequences with a leading “/”.
Common Weakness Enumeration (CWE): CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
CWE Description: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Scores
- Impact Score: 2.9
- Exploitability Score: 4.9
- CVSS: 2.6
- CVSS Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-1918 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2006-0195.html
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140589
- http://www.securityfocus.com/bid/5834
- http://securitytracker.com/id?1015655
- http://secunia.com/advisories/18988
- ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
- http://www.novell.com/linux/security/advisories/2006_05_sr.html
- http://secunia.com/advisories/19130
- http://secunia.com/advisories/19183
- http://support.avaya.com/elmodocs2/security/ASA-2006-110.htm
- http://secunia.com/advisories/20397
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9946
- http://www.securityfocus.com/archive/1/430297/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-3624: The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml,…
Published: 2005-12-31T05:00:00 Last Modified: 2018-10-19T15:37:00
Summary
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-3624 vulnerability.
References
- http://scary.beasts.org/security/CESA-2005-003.txt
- http://www.kde.org/info/security/advisory-20051207-2.txt
- http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
- http://www.securityfocus.com/bid/16143
- http://secunia.com/advisories/18303
- http://secunia.com/advisories/18312
- http://secunia.com/advisories/18313
- http://secunia.com/advisories/18329
- http://secunia.com/advisories/18332
- http://secunia.com/advisories/18334
- http://www.debian.org/security/2005/dsa-931
- http://www.debian.org/security/2005/dsa-932
- http://www.debian.org/security/2005/dsa-937
- http://www.debian.org/security/2005/dsa-938
- http://www.debian.org/security/2005/dsa-940
- http://rhn.redhat.com/errata/RHSA-2006-0177.html
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
- http://secunia.com/advisories/18387
- http://secunia.com/advisories/18416
- http://secunia.com/advisories/18338
- http://secunia.com/advisories/18349
- http://secunia.com/advisories/18375
- http://secunia.com/advisories/18385
- http://secunia.com/advisories/18389
- http://secunia.com/advisories/18423
- http://secunia.com/advisories/18448
- http://www.debian.org/security/2006/dsa-936
- http://www.debian.org/security/2006/dsa-950
- http://www.redhat.com/support/errata/RHSA-2006-0160.html
- http://secunia.com/advisories/18398
- http://secunia.com/advisories/18407
- http://secunia.com/advisories/18534
- http://secunia.com/advisories/18582
- ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
- ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
- http://secunia.com/advisories/18517
- http://secunia.com/advisories/18554
- http://www.debian.org/security/2006/dsa-961
- http://www.debian.org/security/2006/dsa-962
- http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
- http://secunia.com/advisories/18642
- http://secunia.com/advisories/18644
- http://secunia.com/advisories/18674
- http://secunia.com/advisories/18675
- http://secunia.com/advisories/18679
- http://secunia.com/advisories/18908
- http://secunia.com/advisories/18913
- http://www.redhat.com/support/errata/RHSA-2006-0163.html
- ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
- http://www.trustix.org/errata/2006/0002/
- http://secunia.com/advisories/19230
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
- http://secunia.com/advisories/19377
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
- http://secunia.com/advisories/18425
- http://secunia.com/advisories/18463
- http://secunia.com/advisories/18147
- http://secunia.com/advisories/18373
- http://secunia.com/advisories/18380
- http://secunia.com/advisories/18414
- http://secunia.com/advisories/18428
- http://secunia.com/advisories/18436
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
- http://secunia.com/advisories/25729
- http://www.vupen.com/english/advisories/2007/2280
- http://www.vupen.com/english/advisories/2006/0047
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24022
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437
- https://usn.ubuntu.com/236-1/
- http://www.securityfocus.com/archive/1/427990/100/0/threaded
- http://www.securityfocus.com/archive/1/427053/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-3626: Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and…
Published: 2005-12-31T05:00:00 Last Modified: 2018-10-19T15:37:00
Summary
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-3626 vulnerability.
References
- http://scary.beasts.org/security/CESA-2005-003.txt
- http://www.kde.org/info/security/advisory-20051207-2.txt
- http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
- http://www.securityfocus.com/bid/16143
- http://secunia.com/advisories/18303
- http://secunia.com/advisories/18312
- http://secunia.com/advisories/18313
- http://secunia.com/advisories/18329
- http://secunia.com/advisories/18332
- http://secunia.com/advisories/18334
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
- http://secunia.com/advisories/18335
- http://www.debian.org/security/2005/dsa-931
- http://www.debian.org/security/2005/dsa-932
- http://www.debian.org/security/2005/dsa-937
- http://www.debian.org/security/2005/dsa-938
- http://www.debian.org/security/2005/dsa-940
- http://rhn.redhat.com/errata/RHSA-2006-0177.html
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
- http://secunia.com/advisories/18387
- http://secunia.com/advisories/18416
- http://secunia.com/advisories/18338
- http://secunia.com/advisories/18349
- http://secunia.com/advisories/18375
- http://secunia.com/advisories/18385
- http://secunia.com/advisories/18389
- http://secunia.com/advisories/18423
- http://secunia.com/advisories/18448
- http://www.debian.org/security/2006/dsa-936
- http://www.debian.org/security/2006/dsa-950
- http://www.redhat.com/support/errata/RHSA-2006-0160.html
- http://secunia.com/advisories/18398
- http://secunia.com/advisories/18407
- http://secunia.com/advisories/18534
- http://secunia.com/advisories/18582
- ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
- ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
- http://secunia.com/advisories/18517
- http://secunia.com/advisories/18554
- http://www.debian.org/security/2006/dsa-961
- http://www.debian.org/security/2006/dsa-962
- http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
- http://secunia.com/advisories/18642
- http://secunia.com/advisories/18644
- http://secunia.com/advisories/18674
- http://secunia.com/advisories/18675
- http://secunia.com/advisories/18679
- http://secunia.com/advisories/18908
- http://secunia.com/advisories/18913
- http://www.redhat.com/support/errata/RHSA-2006-0163.html
- ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
- http://www.trustix.org/errata/2006/0002/
- http://secunia.com/advisories/19230
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
- http://secunia.com/advisories/19377
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
- http://secunia.com/advisories/18425
- http://secunia.com/advisories/18463
- http://secunia.com/advisories/18147
- http://secunia.com/advisories/18373
- http://secunia.com/advisories/18380
- http://secunia.com/advisories/18414
- http://secunia.com/advisories/18428
- http://secunia.com/advisories/18436
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
- http://secunia.com/advisories/25729
- http://www.vupen.com/english/advisories/2007/2280
- http://www.vupen.com/english/advisories/2006/0047
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24026
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992
- https://usn.ubuntu.com/236-1/
- http://www.securityfocus.com/archive/1/427990/100/0/threaded
- http://www.securityfocus.com/archive/1/427053/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-3629: initscripts in Red Hat Enterprise Linux 4 does not properly handle certain environment variables…
Published: 2005-12-31T05:00:00 Last Modified: 2017-10-11T01:30:00
Summary
initscripts in Red Hat Enterprise Linux 4 does not properly handle certain environment variables when /sbin/service is executed, which allows local users with sudo permissions for /sbin/service to gain root privileges via unknown vectors.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-3629 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2006-0016.html
- http://securitytracker.com/id?1015732
- http://secunia.com/advisories/19162
- http://www.redhat.com/support/errata/RHSA-2006-0015.html
- http://www.securityfocus.com/bid/17038
- ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
- http://secunia.com/advisories/19532
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25374
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11198
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-3625: Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and…
Published: 2005-12-31T05:00:00 Last Modified: 2018-10-19T15:37:00
Summary
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka “Infinite CPU spins.”
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-3625 vulnerability.
References
- http://scary.beasts.org/security/CESA-2005-003.txt
- http://www.kde.org/info/security/advisory-20051207-2.txt
- http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
- http://www.securityfocus.com/bid/16143
- http://secunia.com/advisories/18303
- http://secunia.com/advisories/18312
- http://secunia.com/advisories/18313
- http://secunia.com/advisories/18329
- http://secunia.com/advisories/18332
- http://secunia.com/advisories/18334
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
- http://secunia.com/advisories/18335
- http://www.debian.org/security/2005/dsa-931
- http://www.debian.org/security/2005/dsa-932
- http://www.debian.org/security/2005/dsa-937
- http://www.debian.org/security/2005/dsa-938
- http://www.debian.org/security/2005/dsa-940
- http://rhn.redhat.com/errata/RHSA-2006-0177.html
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
- http://secunia.com/advisories/18387
- http://secunia.com/advisories/18416
- http://secunia.com/advisories/18338
- http://secunia.com/advisories/18349
- http://secunia.com/advisories/18375
- http://secunia.com/advisories/18385
- http://secunia.com/advisories/18389
- http://secunia.com/advisories/18423
- http://secunia.com/advisories/18448
- http://www.debian.org/security/2006/dsa-936
- http://www.debian.org/security/2006/dsa-950
- http://www.redhat.com/support/errata/RHSA-2006-0160.html
- http://secunia.com/advisories/18398
- http://secunia.com/advisories/18407
- http://secunia.com/advisories/18534
- http://secunia.com/advisories/18582
- ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
- ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
- http://secunia.com/advisories/18517
- http://secunia.com/advisories/18554
- http://www.debian.org/security/2006/dsa-961
- http://www.debian.org/security/2006/dsa-962
- http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
- http://secunia.com/advisories/18642
- http://secunia.com/advisories/18644
- http://secunia.com/advisories/18674
- http://secunia.com/advisories/18675
- http://secunia.com/advisories/18679
- http://secunia.com/advisories/18908
- http://secunia.com/advisories/18913
- http://www.redhat.com/support/errata/RHSA-2006-0163.html
- ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
- http://www.trustix.org/errata/2006/0002/
- http://secunia.com/advisories/19230
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
- http://secunia.com/advisories/19377
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
- http://secunia.com/advisories/18425
- http://secunia.com/advisories/18463
- http://secunia.com/advisories/18147
- http://secunia.com/advisories/18373
- http://secunia.com/advisories/18380
- http://secunia.com/advisories/18414
- http://secunia.com/advisories/18428
- http://secunia.com/advisories/18436
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
- http://secunia.com/advisories/25729
- http://www.vupen.com/english/advisories/2007/2280
- http://www.vupen.com/english/advisories/2006/0047
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24023
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575
- https://usn.ubuntu.com/236-1/
- http://www.securityfocus.com/archive/1/427990/100/0/threaded
- http://www.securityfocus.com/archive/1/427053/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-3631: udev does not properly set permissions on certain files in /dev/input, which allows local users…
Published: 2005-12-22T11:03:00 Last Modified: 2017-10-11T01:30:00
Summary
udev does not properly set permissions on certain files in /dev/input, which allows local users to obtain sensitive data that is entered at the console, such as user passwords.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-3631 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-864.html
- http://www.securityfocus.com/bid/15994
- http://secunia.com/advisories/18193
- http://securitytracker.com/id?1015386
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10854
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-2100: The rw_vm function in usercopy.c in the 4GB split patch for the Linux kernel in Red Hat…
Published: 2005-10-25T17:06:00 Last Modified: 2017-10-11T01:30:00
Summary
The rw_vm function in usercopy.c in the 4GB split patch for the Linux kernel in Red Hat Enterprise Linux 4 does not perform proper bounds checking, which allows local users to cause a denial of service (crash).
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-2100 vulnerability.
References
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165547
- http://www.redhat.com/support/errata/RHSA-2005-514.html
- http://secunia.com/advisories/17073
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11556
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-2492: The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a…
Published: 2005-09-14T19:03:00 Last Modified: 2018-10-19T15:33:00
Summary
The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 4.9
- Exploitability Score: 3.9
- CVSS: 3.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-2492 vulnerability.
References
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166830
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1
- http://www.ubuntu.com/usn/usn-178-1
- http://www.securityfocus.com/bid/14787
- http://secunia.com/advisories/16747/
- http://secunia.com/advisories/17918
- http://www.redhat.com/support/errata/RHSA-2005-514.html
- http://secunia.com/advisories/17073
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
- http://marc.info/?l=bugtraq&m=112690609622266&w=2
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22218
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11031
- http://www.securityfocus.com/archive/1/427980/100/0/threaded
- http://www.securityfocus.com/archive/1/419522/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-2700: ssl_engine_kernel.c in mod_ssl before 2.8.24, when using “SSLVerifyClient optional” in the global…
Published: 2005-09-06T23:03:00 Last Modified: 2021-06-06T11:15:00
Summary
ssl_engine_kernel.c in mod_ssl before 2.8.24, when using “SSLVerifyClient optional” in the global virtual host configuration, does not properly enforce “SSLVerifyClient require” in a per-location context, which allows remote attackers to bypass intended access restrictions.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-2700 vulnerability.
References
- http://people.apache.org/~jorton/CAN-2005-2700.diff
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=167195
- http://www.securityfocus.com/bid/14721
- http://www.debian.org/security/2005/dsa-805
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:161
- http://www.debian.org/security/2005/dsa-807
- http://www.redhat.com/support/errata/RHSA-2005-608.html
- http://www.redhat.com/support/errata/RHSA-2005-773.html
- http://www.novell.com/linux/security/advisories/2005_51_apache2.html
- http://www.ubuntu.com/usn/usn-177-1
- http://www.kb.cert.org/vuls/id/744929
- http://www.osvdb.org/19188
- http://secunia.com/advisories/16700
- http://www.gentoo.org/security/en/glsa/glsa-200509-12.xml
- http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
- http://secunia.com/advisories/16705
- http://secunia.com/advisories/16714
- http://secunia.com/advisories/16743
- http://secunia.com/advisories/16746
- http://secunia.com/advisories/16748
- http://secunia.com/advisories/16753
- http://secunia.com/advisories/16754
- http://secunia.com/advisories/16769
- http://secunia.com/advisories/16771
- http://secunia.com/advisories/16789
- http://secunia.com/advisories/16864
- http://secunia.com/advisories/16956
- http://secunia.com/advisories/17088
- http://secunia.com/advisories/17288
- http://secunia.com/advisories/17311
- http://secunia.com/advisories/17813
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1
- http://secunia.com/advisories/19072
- http://secunia.com/advisories/19073
- http://www.redhat.com/support/errata/RHSA-2005-816.html
- http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
- http://www.novell.com/linux/security/advisories/2005_52_apache2.html
- http://secunia.com/advisories/21848
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
- http://secunia.com/advisories/22523
- http://www.vupen.com/english/advisories/2006/0789
- http://www.vupen.com/english/advisories/2006/4207
- http://www.vupen.com/english/advisories/2005/1625
- http://www.vupen.com/english/advisories/2005/2659
- http://marc.info/?l=bugtraq&m=112604765028607&w=2
- http://marc.info/?l=bugtraq&m=112870296926652&w=2
- http://marc.info/?l=apache-modssl&m=112569517603897&w=2
- https://lists.opensuse.org/opensuse-security-announce/2006-09/msg00016.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10416
- https://lists.apache.org/thread.html/117bc3f09847ebf020b1bb70301ebcc105ddc446856150b63f37f8eb@%3Cdev.httpd.apache.org%3E
- https://lists.apache.org/thread.html/5b1e7d66c5adf286f14f6cc0f857b6fca107444f68aed9e70eedab47@%3Cdev.httpd.apache.org%3E
- https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0403: init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not…
Published: 2005-09-01T22:03:00 Last Modified: 2017-10-11T01:29:00
Summary
init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty’s in multi-threaded applications, which allows local users to cause a denial of service (crash) and possibly gain tty access via unknown attack vectors that trigger an access of a pointer to a freed structure.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0403 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-293.html
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=144059
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9435
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-1268: Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in…
Published: 2005-08-05T04:00:00 Last Modified: 2021-06-06T11:15:00
Summary
Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
Common Weakness Enumeration (CWE): CWE-193: Off-by-one Error
CWE Description: A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-1268 vulnerability.
References
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=163013
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:129
- http://rhn.redhat.com/errata/RHSA-2005-582.html
- http://www.debian.org/security/2005/dsa-805
- http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
- http://www.securityfocus.com/bid/14366
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1
- http://secunia.com/advisories/19072
- http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
- http://secunia.com/advisories/19185
- http://www.novell.com/linux/security/advisories/2005_46_apache.html
- http://www.novell.com/linux/security/advisories/2005_18_sr.html
- http://securityreason.com/securityalert/604
- http://www.vupen.com/english/advisories/2006/0789
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9589
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1747
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1714
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1346
- http://www.securityfocus.com/archive/1/428138/100/0/threaded
- https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-1760: sysreport 1.3.15 and earlier includes contents of the up2date file in a report, which leaks the…
Published: 2005-06-13T04:00:00 Last Modified: 2017-10-11T01:30:00
Summary
sysreport 1.3.15 and earlier includes contents of the up2date file in a report, which leaks the password for a proxy server in plaintext and allows local users to gain privileges.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-1760 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-502.html
- http://www.securityfocus.com/bid/13936
- http://securitytracker.com/id?1014181
- http://secunia.com/advisories/15675
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9522
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A623
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0757: The xattr file system code, as backported in Red Hat Enterprise Linux 3 on 64-bit systems, does…
Published: 2005-05-18T04:00:00 Last Modified: 2017-10-11T01:30:00
Summary
The xattr file system code, as backported in Red Hat Enterprise Linux 3 on 64-bit systems, does not properly handle certain offsets, which allows local users to cause a denial of service (system crash) via certain actions on an ext3 file system with extended attributes enabled.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0757 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-294.html
- http://www.debian.org/security/2005/dsa-922
- http://www.debian.org/security/2005/dsa-921
- http://www.securityfocus.com/bid/13680
- http://secunia.com/advisories/18056
- http://secunia.com/advisories/18059
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11406
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-1194: Stack-based buffer overflow in the ieee_putascii function for nasm 0.98 and earlier allows…
Published: 2005-05-04T04:00:00 Last Modified: 2017-10-11T01:30:00
Summary
Stack-based buffer overflow in the ieee_putascii function for nasm 0.98 and earlier allows attackers to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2004-1287.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-1194 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-381.html
- http://www.securityfocus.com/bid/13506
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11256
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0091: Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using…
Published: 2005-05-02T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using the hugemem kernel, allows local users to read and write to arbitrary kernel memory and gain privileges via certain syscalls.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0091 vulnerability.
References
- http://www.securityfocus.com/bid/12599
- http://www.redhat.com/support/errata/RHSA-2005-092.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20619
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11249
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0001: Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to…
Published: 2005-05-02T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.4
- CVSS: 6.9
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0001 vulnerability.
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030826.html
- http://isec.pl/vulnerabilities/isec-0022-pagefault.txt
- http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- http://www.redhat.com/support/errata/RHSA-2005-043.html
- http://www.redhat.com/support/errata/RHSA-2005-092.html
- http://www.trustix.org/errata/2005/0001/
- http://securitytracker.com/id?1012862
- http://secunia.com/advisories/13822
- http://www.redhat.com/support/errata/RHSA-2005-016.html
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://www.redhat.com/support/errata/RHSA-2005-017.html
- http://www.securityfocus.com/bid/12244
- http://secunia.com/advisories/20163
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- http://marc.info/?l=bugtraq&m=110554694522719&w=2
- http://marc.info/?l=bugtraq&m=110581146702951&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18849
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10322
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0078: The KDE screen saver in KDE before 3.0.5 does not properly check the return value from a certain…
Published: 2005-05-02T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The KDE screen saver in KDE before 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0078 vulnerability.
References
- http://www.debian.org/security/2005/dsa-660
- http://www.redhat.com/support/errata/RHSA-2005-009.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19084
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9260
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0207: Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows NFS clients to cause a…
Published: 2005-05-02T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows NFS clients to cause a denial of service via O_DIRECT.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0207 vulnerability.
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000930
- http://www.securityfocus.com/advisories/7880
- http://www.securityfocus.com/bid/12330
- http://www.redhat.com/support/errata/RHSA-2005-366.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11001
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0077: The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a…
Published: 2005-05-02T04:00:00 Last Modified: 2018-10-19T15:31:00
Summary
The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0077 vulnerability.
References
- http://www.debian.org/security/2005/dsa-658
- http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml
- http://www.redhat.com/support/errata/RHSA-2005-072.html
- http://www.securityfocus.com/bid/12360
- http://securitytracker.com/id?1013007
- http://secunia.com/advisories/14015
- http://secunia.com/advisories/14050
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:030
- http://marc.info/?l=bugtraq&m=110667936707597&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19068
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552
- http://www.securityfocus.com/archive/1/426530/30/6600/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0090: A regression error in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch omits an “access…
Published: 2005-05-02T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
A regression error in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch omits an “access check,” which allows local users to cause a denial of service (crash).
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0090 vulnerability.
References
- http://www.securityfocus.com/bid/12599
- http://www.redhat.com/support/errata/RHSA-2005-092.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20618
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10425
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0086: Heap-based buffer overflow in less in Red Hat Enterprise Linux 3 allows attackers to cause a…
Published: 2005-05-02T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Heap-based buffer overflow in less in Red Hat Enterprise Linux 3 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted file, as demonstrated using the UTF-8 locale.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0086 vulnerability.
References
- https://bugzilla.fedora.us/show_bug.cgi?id=2404
- http://www.redhat.com/support/errata/RHSA-2005-068.html
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=145527
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19131
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11027
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0988: Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local…
Published: 2005-05-02T04:00:00 Last Modified: 2017-10-11T01:30:00
Summary
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.
Scores
- Impact Score: 6.4
- Exploitability Score: 1.9
- CVSS: 3.7
- CVSS Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0988 vulnerability.
References
- http://www.securityfocus.com/archive/1/394965
- http://www.securityfocus.com/bid/12996
- http://www.debian.org/security/2005/dsa-752
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
- http://secunia.com/advisories/18100
- http://rhn.redhat.com/errata/RHSA-2005-357.html
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1
- http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
- http://secunia.com/advisories/21253
- http://www.osvdb.org/15487
- http://www.securityfocus.com/bid/19289
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
- http://secunia.com/advisories/22033
- http://www.us-cert.gov/cas/techalerts/TA06-214A.html
- http://www.vupen.com/english/advisories/2006/3101
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0337: Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in…
Published: 2005-05-02T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0337 vulnerability.
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=267837
- http://www.securityfocus.com/bid/12445
- http://secunia.com/advisories/14137/
- http://www.redhat.com/support/errata/RHSA-2005-152.html
- http://marc.info/?l=bugtraq&m=110763358832637&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19218
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11339
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-1038: crontab in Vixie cron 4.1, when running with the -e option, allows local users to read the cron…
Published: 2005-05-02T04:00:00 Last Modified: 2017-10-11T01:30:00
Summary
crontab in Vixie cron 4.1, when running with the -e option, allows local users to read the cron files of other users by changing the file being edited to a symlink. NOTE: there is insufficient information to know whether this is a duplicate of CVE-2001-0235.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-1038 vulnerability.
References
- http://www.securityfocus.com/archive/1/395093
- http://www.securityfocus.com/bid/13024
- http://www.redhat.com/support/errata/RHSA-2005-361.html
- http://www.redhat.com/support/errata/RHSA-2006-0117.html
- ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
- http://secunia.com/advisories/19532
- http://support.avaya.com/elmodocs2/security/ASA-2006-118.htm
- http://secunia.com/advisories/20666
- http://www.novell.com/linux/security/advisories/2007_007_suse.html
- http://secunia.com/advisories/24995
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11104
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-1061: The secure script in LogWatch before 2.6-2 allows attackers to prevent LogWatch from detecting…
Published: 2005-05-02T04:00:00 Last Modified: 2008-09-05T20:48:00
Summary
The secure script in LogWatch before 2.6-2 allows attackers to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka “logwatch log processing regular expression DoS.”
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2005-1061 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-364.html
- https://bugzilla.redhat.com/bugzilla-old/show_bug.cgi?id=137502
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0087: The alsa-lib package in Red Hat Linux 4 disables stack protection for the libasound.so library,…
Published: 2005-04-27T04:00:00 Last Modified: 2020-05-22T15:20:00
Summary
The alsa-lib package in Red Hat Linux 4 disables stack protection for the libasound.so library, which makes it easier for attackers to execute arbitrary code if there are other vulnerabilities in the library.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0087 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-033.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10355
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0206: The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete…
Published: 2005-04-27T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0206 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-213.html
- http://www.securityfocus.com/bid/11501
- http://www.redhat.com/support/errata/RHSA-2005-034.html
- http://www.redhat.com/support/errata/RHSA-2005-053.html
- http://www.redhat.com/support/errata/RHSA-2005-057.html
- http://www.redhat.com/support/errata/RHSA-2005-132.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:041
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:042
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:043
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:044
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:056
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17818
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0003: The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not…
Published: 2005-04-14T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0003 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-043.html
- http://www.securityfocus.com/bid/12261
- http://linux.bkbits.net:8080/linux-2.4/cset@41c36fb6q1Z68WUzKQFjJR-40Ev3tw
- http://www.novell.com/linux/security/advisories/2005_18_kernel.html
- http://www.trustix.org/errata/2005/0001/
- http://linux.bkbits.net:8080/linux-2.6/cset@41a6721cce-LoPqkzKXudYby_3TUmg
- http://securitytracker.com/id?1012885
- http://www.redhat.com/support/errata/RHSA-2005-017.html
- http://secunia.com/advisories/20163
- http://secunia.com/advisories/20202
- http://secunia.com/advisories/20338
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1082
- http://www.debian.org/security/2006/dsa-1069
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18886
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9512
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1093: Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service…
Published: 2005-04-14T04:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service via “use of already freed memory.”
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1093 vulnerability.
References
- http://www.debian.org/security/2005/dsa-639
- http://secunia.com/advisories/13863/
- http://www.redhat.com/support/errata/RHSA-2005-512.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18905
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1174: direntry.c in Midnight Commander (mc) 4.5.55 and earlier allows attackers to cause a denial of…
Published: 2005-04-14T04:00:00 Last Modified: 2017-07-11T01:30:00
Summary
direntry.c in Midnight Commander (mc) 4.5.55 and earlier allows attackers to cause a denial of service by “manipulating non-existing file handles.”
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1174 vulnerability.
References
- http://www.debian.org/security/2005/dsa-639
- http://secunia.com/advisories/13863/
- http://securitytracker.com/id?1012903
- http://www.redhat.com/support/errata/RHSA-2005-512.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18909
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1005: Multiple buffer overflows in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to…
Published: 2005-04-14T04:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Multiple buffer overflows in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1005 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-217.html
- http://secunia.com/advisories/13863/
- http://www.debian.org/security/2005/dsa-639
- http://www.gentoo.org/security/en/glsa/glsa-200502-24.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18898
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1176: Buffer underflow in extfs.c in Midnight Commander (mc) 4.5.55 and earlier allows remote attackers…
Published: 2005-04-14T04:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Buffer underflow in extfs.c in Midnight Commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1176 vulnerability.
References
- http://www.debian.org/security/2005/dsa-639
- http://secunia.com/advisories/13863
- http://www.gentoo.org/security/en/glsa/glsa-200502-24.xml
- http://www.redhat.com/support/errata/RHSA-2005-217.html
- http://securitytracker.com/id?1012903
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18911
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1092: Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service…
Published: 2005-04-14T04:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service by causing mc to free unallocated memory.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1092 vulnerability.
References
- http://www.debian.org/security/2005/dsa-639
- http://secunia.com/advisories/13863/
- http://www.gentoo.org/security/en/glsa/glsa-200502-24.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18904
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1235: Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux…
Published: 2005-04-14T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
Scores
- Impact Score: 10.0
- Exploitability Score: 1.9
- CVSS: 6.2
- CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Exploits Database (Total Exploits Count: 3)
Code designed for conducting penetration testing on CVE-2004-1235 vulnerability.
- Linux Kernel 2.4.x/2.6.x - 'uselib()' Local Privilege Escalation (3) by sd at 2005-03-22
- Linux Kernel 2.4 - 'uselib()' Local Privilege Escalation (2) by Tim Hsu at 2005-01-27
- Linux Kernel 2.4.29-rc2 - 'uselib()' Local Privilege Escalation (1) by Paul Starzetz at 2005-01-07
References
- http://www.redhat.com/support/errata/RHSA-2005-043.html
- http://www.securityfocus.com/bid/12190
- http://isec.pl/vulnerabilities/isec-0021-uselib.txt
- http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
- http://www.securityfocus.com/advisories/7806
- http://www.securityfocus.com/advisories/7805
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- http://www.redhat.com/support/errata/RHSA-2005-092.html
- http://www.trustix.org/errata/2005/0001/
- http://www.securityfocus.com/advisories/7804
- http://www.redhat.com/support/errata/RHSA-2005-016.html
- http://www.redhat.com/support/errata/RHSA-2005-017.html
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://secunia.com/advisories/20202
- http://secunia.com/advisories/20338
- http://www.novell.com/linux/security/advisories/2005_01_sr.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1082
- http://www.debian.org/security/2006/dsa-1069
- http://marc.info/?l=bugtraq&m=110512575901427&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18800
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1237: Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat…
Published: 2005-04-14T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1237 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-043.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11282
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1091: Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service…
Published: 2005-04-14T04:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service by triggering a null dereference.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1091 vulnerability.
References
- http://www.debian.org/security/2005/dsa-639
- http://secunia.com/advisories/13863
- http://www.redhat.com/support/errata/RHSA-2005-512.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18908
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0812: Unknown vulnerability in the Linux kernel before 2.4.23, on the AMD AMD64 and Intel EM64T…
Published: 2005-04-14T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Unknown vulnerability in the Linux kernel before 2.4.23, on the AMD AMD64 and Intel EM64T architectures, associated with “setting up TSS limits,” allows local users to cause a denial of service (crash) and possibly execute arbitrary code.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-0812 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-549.html
- http://www.ciac.org/ciac/bulletins/p-047.shtml
- http://www.securityfocus.com/bid/11794
- http://linux.bkbits.net:8080/linux-2.6/cset@3fad673ber4GuU7iWppydzNIyLntEQ
- http://secunia.com/advisories/13359
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18346
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11375
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1090: Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service…
Published: 2005-04-14T04:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service via “a corrupt section header.”
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1090 vulnerability.
References
- http://www.debian.org/security/2005/dsa-639
- http://secunia.com/advisories/13863/
- http://www.redhat.com/support/errata/RHSA-2005-512.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18907
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1004: Multiple format string vulnerabilities in Midnight Commander (mc) 4.5.55 and earlier allow remote…
Published: 2005-04-14T04:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Multiple format string vulnerabilities in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1004 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-217.html
- http://secunia.com/advisories/13863/
- http://www.debian.org/security/2005/dsa-639
- http://www.gentoo.org/security/en/glsa/glsa-200502-24.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18902
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1175: fish.c in midnight commander allows remote attackers to execute arbitrary programs via “insecure…
Published: 2005-04-14T04:00:00 Last Modified: 2017-07-19T01:29:00
Summary
fish.c in midnight commander allows remote attackers to execute arbitrary programs via “insecure filename quoting,” possibly using shell metacharacters.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1175 vulnerability.
References
- http://www.debian.org/security/2005/dsa-639
- http://secunia.com/advisories/13863/
- http://securitytracker.com/id?1012903
- http://www.redhat.com/support/errata/RHSA-2005-512.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18906
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1009: Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service…
Published: 2005-04-14T04:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1009 vulnerability.
References
- http://www.debian.org/security/2005/dsa-639
- http://secunia.com/advisories/13863/
- http://www.redhat.com/support/errata/RHSA-2005-512.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18903
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0750: The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1…
Published: 2005-03-27T05:00:00 Last Modified: 2017-10-11T01:30:00
Summary
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 4)
Code designed for conducting penetration testing on CVE-2005-0750 vulnerability.
- Linux Kernel 2.4.x/2.6.x - 'Bluez' BlueTooth Signed Buffer Index Privilege Escalation (2) by qobaiashi at 2005-10-26
- Linux Kernel 2.4.30/2.6.11.5 - BlueTooth 'bluez_sock_create' Local Privilege Escalation by backdoored.net at 2005-10-19
- Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index Privilege Escalation (1) by qobaiashi at 2005-04-08
- Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index (PoC) by ilja van sprundel at 2005-03-28
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html
- http://www.redhat.com/support/errata/RHSA-2005-283.html
- http://www.redhat.com/support/errata/RHSA-2005-284.html
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
- http://www.redhat.com/support/errata/RHSA-2005-293.html
- http://www.redhat.com/support/errata/RHSA-2005-366.html
- http://www.securityfocus.com/bid/12911
- http://marc.info/?l=bugtraq&m=111204562102633&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19844
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0384: Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to…
Published: 2005-03-15T05:00:00 Last Modified: 2018-10-03T21:29:00
Summary
Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0384 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-283.html
- http://www.redhat.com/support/errata/RHSA-2005-284.html
- http://www.novell.com/linux/security/advisories/2005_18_kernel.html
- http://www.trustix.org/errata/2005/0009/
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
- http://www.redhat.com/support/errata/RHSA-2005-293.html
- http://www.redhat.com/support/errata/RHSA-2005-366.html
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://www.securityfocus.com/bid/12810
- http://secunia.com/advisories/20163
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562
- https://usn.ubuntu.com/95-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0473: The HTML parsing functions in Gaim before 1.1.3 allow remote attackers to cause a denial of…
Published: 2005-03-14T05:00:00 Last Modified: 2018-10-19T15:31:00
Summary
The HTML parsing functions in Gaim before 1.1.3 allow remote attackers to cause a denial of service (application crash) via malformed HTML that causes “an invalid memory access,” a different vulnerability than CVE-2005-0208.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0473 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-215.html
- http://www.kb.cert.org/vuls/id/523888
- http://gaim.sourceforge.net/security/index.php?id=11
- http://www.gentoo.org/security/en/glsa/glsa-200503-03.xml
- http://secunia.com/advisories/14322
- http://www.securityfocus.com/bid/12589
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000933
- http://www.novell.com/linux/security/advisories/2005_36_sudo.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:049
- http://marc.info/?l=bugtraq&m=110935655500670&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19381
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10212
- http://www.securityfocus.com/archive/1/426078/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0398: The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of…
Published: 2005-03-14T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0398 vulnerability.
References
- http://sourceforge.net/mailarchive/forum.php?thread_id=6787713&forum_id=32000
- http://security.gentoo.org/glsa/glsa-200503-33.xml
- http://www.redhat.com/support/errata/RHSA-2005-232.html
- https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=109966&action=view
- http://securitytracker.com/id?1013433
- http://www.securityfocus.com/bid/12804
- http://secunia.com/advisories/14584
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:062
- http://www.vupen.com/english/advisories/2005/0264
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19707
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10028
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0472: Gaim before 1.1.3 allows remote attackers to cause a denial of service (infinite loop) via…
Published: 2005-03-14T05:00:00 Last Modified: 2018-10-19T15:31:00
Summary
Gaim before 1.1.3 allows remote attackers to cause a denial of service (infinite loop) via malformed SNAC packets from (1) AIM or (2) ICQ.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0472 vulnerability.
References
- http://www.kb.cert.org/vuls/id/839280
- http://gaim.sourceforge.net/security/index.php?id=10
- http://www.debian.org/security/2005/dsa-716
- http://www.gentoo.org/security/en/glsa/glsa-200503-03.xml
- http://www.redhat.com/support/errata/RHSA-2005-215.html
- http://secunia.com/advisories/14322
- http://www.redhat.com/support/errata/RHSA-2005-432.html
- http://www.securityfocus.com/bid/12589
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000933
- http://www.novell.com/linux/security/advisories/2005_36_sudo.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:049
- http://marc.info/?l=bugtraq&m=110935655500670&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19380
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10433
- http://www.securityfocus.com/archive/1/426078/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0736: Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local…
Published: 2005-03-09T05:00:00 Last Modified: 2018-10-03T21:29:00
Summary
Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2005-0736 vulnerability.
- Linux Kernel 2.6.9 < 2.6.11 (RHEL 4) - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation by alert7 at 2005-12-30
- Linux Kernel 2.6.x - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation (1) by sd at 2005-03-09
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032314.html
- http://www.novell.com/linux/security/advisories/2005_18_kernel.html
- http://www.securityfocus.com/bid/12763
- http://www.redhat.com/support/errata/RHSA-2005-293.html
- http://www.redhat.com/support/errata/RHSA-2005-366.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9870
- http://linux.bkbits.net:8080/linux-2.6/cset@422dd06a1p5PsyFhoGAJseinjEq3ew?nav=index.html |ChangeSet@-1d
- https://usn.ubuntu.com/95-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0699: Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector…
Published: 2005-03-08T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0699 vulnerability.
References
- http://www.securityfocus.com/archive/1/392659
- http://www.ethereal.com/appnotes/enpa-sa-00018.html
- http://security.gentoo.org/glsa/glsa-200503-16.xml
- http://www.redhat.com/support/errata/RHSA-2005-306.html
- http://www.securityfocus.com/bid/12759
- http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html
- http://security.lss.hr/en/index.php?page=details&ID=LSS-2005-03-04
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:053
- http://marc.info/?l=bugtraq&m=111083125521813&w=2
- http://marc.info/?l=bugtraq&m=111038641832400&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10147
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0667: Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers…
Published: 2005-03-07T05:00:00 Last Modified: 2008-09-05T20:46:00
Summary
Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0667 vulnerability.
References
- http://sylpheed.good-day.net/changelog.html.en
- http://sylpheed.good-day.net/changelog-devel.html.en
- http://www.gentoo.org/security/en/glsa/glsa-200503-26.xml
- http://www.redhat.com/support/errata/RHSA-2005-303.html
- http://securitytracker.com/id?1013376
- http://secunia.com/advisories/14491
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0109: Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel…
Published: 2005-03-05T05:00:00 Last Modified: 2018-10-16T12:06:00
Summary
Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: COMPLETE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0109 vulnerability.
References
- http://www.securityfocus.com/bid/12724
- http://www.daemonology.net/papers/htt.pdf
- http://www.daemonology.net/hyperthreading-considered-harmful/
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1
- http://www.kb.cert.org/vuls/id/911878
- http://securitytracker.com/id?1013967
- http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754
- http://secunia.com/advisories/15348
- http://secunia.com/advisories/18165
- http://www.redhat.com/support/errata/RHSA-2005-476.html
- http://www.redhat.com/support/errata/RHSA-2005-800.html
- http://www.vupen.com/english/advisories/2005/3002
- http://www.vupen.com/english/advisories/2005/0540
- http://marc.info/?l=freebsd-security&m=110994370429609&w=2
- http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2
- http://marc.info/?l=openbsd-misc&m=110995101417256&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0605: scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value…
Published: 2005-03-02T05:00:00 Last Modified: 2018-10-03T21:29:00
Summary
scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0605 vulnerability.
References
- https://bugs.freedesktop.org/attachment.cgi?id=1909
- http://security.gentoo.org/glsa/glsa-200503-08.xml
- http://www.gentoo.org/security/en/glsa/glsa-200503-15.xml
- http://bugs.gentoo.org/show_bug.cgi?id=83655
- http://bugs.gentoo.org/show_bug.cgi?id=83598
- http://www.redhat.com/support/errata/RHSA-2005-331.html
- http://securitytracker.com/id?1013339
- http://www.securityfocus.com/bid/12714
- http://www.debian.org/security/2005/dsa-723
- http://www.redhat.com/support/errata/RHSA-2005-412.html
- http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
- http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.57/SCOSA-2005.57.txt
- http://secunia.com/advisories/14460
- http://secunia.com/advisories/18049
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.5/SCOSA-2006.5.txt
- http://secunia.com/advisories/18316
- http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html
- http://www.redhat.com/support/errata/RHSA-2005-044.html
- http://www.redhat.com/support/errata/RHSA-2005-198.html
- http://www.redhat.com/support/errata/RHSA-2005-473.html
- ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U
- http://secunia.com/advisories/19624
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10411
- https://usn.ubuntu.com/97-1/
- https://usn.ubuntu.com/92-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0092: Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when running…
Published: 2005-02-19T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when running on x86 with the hugemem kernel, allows local users to cause a denial of service (crash).
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0092 vulnerability.
References
- http://www.securityfocus.com/bid/12599
- http://www.redhat.com/support/errata/RHSA-2005-092.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20620
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11647
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0977: The make_oidjoins_check script in PostgreSQL 7.4.5 and earlier allows local users to overwrite…
Published: 2005-02-09T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The make_oidjoins_check script in PostgreSQL 7.4.5 and earlier allows local users to overwrite files via a symlink attack on temporary files.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-0977 vulnerability.
References
- http://www.securityfocus.com/bid/11295
- http://www.debian.org/security/2004/dsa-577
- http://security.gentoo.org/glsa/glsa-200410-16.xml
- http://www.redhat.com/support/errata/RHSA-2004-489.html
- http://www.trustix.org/errata/2004/0050
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136300
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:149
- http://marc.info/?l=bugtraq&m=109910073808903&w=2
- https://www.ubuntu.com/usn/usn-6-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11360
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0968: The catchsegv script in glibc 2.3.2 and earlier allows local users to overwrite files via a…
Published: 2005-02-09T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The catchsegv script in glibc 2.3.2 and earlier allows local users to overwrite files via a symlink attack on temporary files.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-0968 vulnerability.
References
- http://www.securityfocus.com/bid/11286
- http://www.trustix.org/errata/2004/0050
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136318
- http://www.debian.org/security/2005/dsa-636
- http://security.gentoo.org/glsa/glsa-200410-19.xml
- http://www.redhat.com/support/errata/RHSA-2004-586.html
- http://www.redhat.com/support/errata/RHSA-2005-261.html
- https://www.ubuntu.com/usn/usn-4-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9523
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0957: Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a…
Published: 2005-02-09T05:00:00 Last Modified: 2019-12-17T17:11:00
Summary
Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a “_” (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0957 vulnerability.
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947
- http://www.debian.org/security/2005/dsa-707
- http://www.redhat.com/support/errata/RHSA-2004-597.html
- http://www.redhat.com/support/errata/RHSA-2004-611.html
- http://www.ciac.org/ciac/bulletins/p-018.shtml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:070
- https://www.ubuntu.com/usn/usn-32-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17783
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0960: FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via…
Published: 2005-02-09T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0960 vulnerability.
References
- http://www.securityfocus.com/bid/11222
- http://www.kb.cert.org/vuls/id/541574
- http://security.gentoo.org/glsa/glsa-200409-29.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17440
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11023
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0961: Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service…
Published: 2005-02-09T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0961 vulnerability.
References
- http://www.securityfocus.com/bid/11222
- http://www.kb.cert.org/vuls/id/541574
- http://security.gentoo.org/glsa/glsa-200409-29.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17440
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10024
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0156: Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support…
Published: 2005-02-07T05:00:00 Last Modified: 2018-08-13T21:47:00
Summary
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2005-0156 vulnerability.
References
- http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml
- http://www.redhat.com/support/errata/RHSA-2005-103.html
- http://www.redhat.com/support/errata/RHSA-2005-105.html
- http://www.trustix.org/errata/2005/0003/
- http://www.securityfocus.com/bid/12426
- http://secunia.com/advisories/14120
- http://fedoranews.org/updates/FEDORA--.shtml
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:031
- http://secunia.com/advisories/55314
- http://marc.info/?l=bugtraq&m=110737149402683&w=2
- http://marc.info/?l=full-disclosure&m=110779721503111&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19208
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803
- http://www.digitalmunition.com/DMA[2005-0131b].txt
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0902: Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Release, Mozilla…
Published: 2005-01-27T05:00:00 Last Modified: 2018-05-03T01:29:00
Summary
Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via (1) the “Send page” functionality, (2) certain responses from a malicious POP3 server, or (3) a link containing a non-ASCII hostname.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0902 vulnerability.
References
- http://www.us-cert.gov/cas/techalerts/TA04-261A.html
- http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3
- http://bugzilla.mozilla.org/show_bug.cgi?id=258005
- http://bugzilla.mozilla.org/show_bug.cgi?id=245066
- http://bugzilla.mozilla.org/show_bug.cgi?id=226669
- http://bugzilla.mozilla.org/show_bug.cgi?id=256316
- http://security.gentoo.org/glsa/glsa-200409-26.xml
- http://www.novell.com/linux/security/advisories/2004_36_mozilla.html
- http://marc.info/?l=bugtraq&m=109698896104418&w=2
- http://marc.info/?l=bugtraq&m=109900315219363&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17379
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17378
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11201
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0930: The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote…
Published: 2005-01-27T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0930 vulnerability.
References
- http://www.idefense.com/application/poi/display?id=156&type=vulnerabilities&flashstatus=false
- http://www.securityfocus.com/bid/11624
- http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
- http://www.gentoo.org/security/en/glsa/glsa-200411-21.xml
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
- ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
- http://www.novell.com/linux/security/advisories/2004_40_samba.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101783-1
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:131
- http://marc.info/?l=bugtraq&m=110330519803655&w=2
- http://marc.info/?l=bugtraq&m=109993720717957&w=2
- https://www.ubuntu.com/usn/usn-22-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17987
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10936
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0882: Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow…
Published: 2005-01-27T05:00:00 Last Modified: 2018-10-30T16:25:00
Summary
Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small “maximum data bytes” value.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0882 vulnerability.
References
- http://www.trustix.net/errata/2004/0058/
- http://security.e-matters.de/advisories/132004.html
- http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
- ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
- http://www.novell.com/linux/security/advisories/2004_40_samba.html
- http://www.ciac.org/ciac/bulletins/p-038.shtml
- http://www.kb.cert.org/vuls/id/457622
- http://www.osvdb.org/11782
- http://securitytracker.com/id?1012235
- http://secunia.com/advisories/13189
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899
- http://marc.info/?l=bugtraq&m=110330519803655&w=2
- http://marc.info/?l=bugtraq&m=110055646329581&w=2
- http://marc.info/?l=bugtraq&m=110054671403755&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18070
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0886: Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial…
Published: 2005-01-27T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0886 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-577.html
- http://www.securityfocus.com/bid/11406
- http://www.kde.org/info/security/advisory-20041209-2.txt
- http://www.debian.org/security/2004/dsa-567
- http://www.redhat.com/support/errata/RHSA-2005-354.html
- http://www.novell.com/linux/security/advisories/2004_38_libtiff.html
- http://www.trustix.org/errata/2004/0054/
- http://www.kb.cert.org/vuls/id/687568
- http://www.ciac.org/ciac/bulletins/p-015.shtml
- http://secunia.com/advisories/12818
- http://securitytracker.com/id?1011674
- http://www.redhat.com/support/errata/RHSA-2005-021.html
- http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:109
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
- http://marc.info/?l=bugtraq&m=109779465621929&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17715
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0888: Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as…
Published: 2005-01-27T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0888 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-543.html
- http://www.securityfocus.com/bid/11501
- http://www.debian.org/security/2004/dsa-573
- http://www.debian.org/security/2004/dsa-581
- http://www.debian.org/security/2004/dsa-599
- http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml
- http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml
- http://www.redhat.com/support/errata/RHSA-2004-592.html
- http://www.redhat.com/support/errata/RHSA-2005-066.html
- http://www.redhat.com/support/errata/RHSA-2005-354.html
- http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:113
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:114
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:115
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:116
- https://bugzilla.fedora.us/show_bug.cgi?id=2353
- http://marc.info/?l=bugtraq&m=109880927526773&w=2
- http://marc.info/?l=bugtraq&m=110815379627883&w=2
- https://www.ubuntu.com/usn/usn-9-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17818
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0903: Stack-based buffer overflow in the writeGroup function in nsVCardObj.cpp for Mozilla Firefox…
Published: 2005-01-27T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Stack-based buffer overflow in the writeGroup function in nsVCardObj.cpp for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to execute arbitrary code via malformed VCard attachments that are not properly handled when previewing a message.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0903 vulnerability.
References
- http://www.kb.cert.org/vuls/id/414240
- http://www.securityfocus.com/bid/11174
- http://bugzilla.mozilla.org/show_bug.cgi?id=257314
- http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3
- http://security.gentoo.org/glsa/glsa-200409-26.xml
- http://www.novell.com/linux/security/advisories/2004_36_mozilla.html
- http://www.us-cert.gov/cas/techalerts/TA04-261A.html
- http://marc.info/?l=bugtraq&m=109698896104418&w=2
- http://marc.info/?l=bugtraq&m=109900315219363&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17380
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10873
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0889: Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow…
Published: 2005-01-27T05:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0889 vulnerability.
References
- http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml
- http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml
- http://www.securityfocus.com/bid/11501
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:113
- http://marc.info/?l=bugtraq&m=109880927526773&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17819
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1057: Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO…
Published: 2005-01-21T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1057 vulnerability.
References
- http://www.kernel.org/pub/linux/kernel/people/andrea/kernels/v2.4/2.4.23aa3/00_VM_IO-4
- http://www.redhat.com/support/errata/RHSA-2005-016.html
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=137821
- http://www.redhat.com/support/errata/RHSA-2006-0140.html
- http://www.securityfocus.com/bid/12338
- http://secunia.com/advisories/18562
- http://www.redhat.com/support/errata/RHSA-2005-017.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19275
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11474
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0883: Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0883 vulnerability.
References
- http://www.securityfocus.com/bid/11695
- http://www.redhat.com/support/errata/RHSA-2004-537.html
- http://security.e-matters.de/advisories/142004.html
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- http://secunia.com/advisories/13232/
- http://www.kb.cert.org/vuls/id/726198
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- http://marc.info/?l=bugtraq&m=110082989725345&w=2
- http://marc.info/?l=bugtraq&m=110072140811965&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18136
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18135
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18134
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1071: The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8,…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1071 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-537.html
- http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://www.securityfocus.com/bid/11646
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
- http://secunia.com/advisories/19607
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18025
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1014: statd in nfs-utils 1.257 and earlier does not ignore the SIGPIPE signal, which allows remote…
Published: 2005-01-10T05:00:00 Last Modified: 2018-10-19T15:30:00
Summary
statd in nfs-utils 1.257 and earlier does not ignore the SIGPIPE signal, which allows remote attackers to cause a denial of service (server process crash) via a TCP connection that is prematurely terminated.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1014 vulnerability.
References
- http://www.securityfocus.com/bid/11785
- http://www.debian.org/security/2004/dsa-606
- http://www.redhat.com/support/errata/RHSA-2004-583.html
- http://www.redhat.com/support/errata/RHSA-2005-014.html
- http://www.trustix.org/errata/2004/0065/
- http://cvs.sourceforge.net/viewcvs.py/nfs/nfs-utils/ChangeLog?rev=1.258&view=markup
- https://www.ubuntu.com/usn/usn-36-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18332
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10899
- http://www.securityfocus.com/archive/1/426072/30/6740/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1073: The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27,…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-1073 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-549.html
- http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
- http://www.redhat.com/support/errata/RHSA-2006-0190.html
- http://www.redhat.com/support/errata/RHSA-2006-0191.html
- http://secunia.com/advisories/18684
- http://www.redhat.com/support/errata/RHSA-2005-293.html
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://www.securityfocus.com/bid/11646
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18025
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11503
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1068: A “missing serialization” error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier,…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
A “missing serialization” error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.
Scores
- Impact Score: 10.0
- Exploitability Score: 1.9
- CVSS: 6.2
- CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1068 vulnerability.
References
- http://www.securityfocus.com/bid/11715
- http://www.securityfocus.com/archive/1/381689
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- http://www.redhat.com/support/errata/RHSA-2004-537.html
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- http://www.novell.com/linux/security/advisories/2004_44_kernel.html
- ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
- http://secunia.com/advisories/19607
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- http://marc.info/?l=bugtraq&m=110306397320336&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18230
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0946: rquotad in nfs-utils (rquota_server.c) before 1.0.6-r6 on 64-bit architectures does not properly…
Published: 2005-01-10T05:00:00 Last Modified: 2018-10-19T15:30:00
Summary
rquotad in nfs-utils (rquota_server.c) before 1.0.6-r6 on 64-bit architectures does not properly perform an integer conversion, which leads to a stack-based buffer overflow and allows remote attackers to execute arbitrary code via a crafted NFS request.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0946 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-583.html
- http://www.gentoo.org/security/en/glsa/glsa-200412-08.xml
- http://www.securityfocus.com/bid/11911
- http://www.redhat.com/support/errata/RHSA-2005-014.html
- http://bugs.gentoo.org/show_bug.cgi?id=72113
- http://www.kb.cert.org/vuls/id/698302
- http://secunia.com/advisories/13440/
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:005
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18455
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10464
- http://www.securityfocus.com/archive/1/426072/30/6740/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1070: The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1070 vulnerability.
References
- http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- http://www.redhat.com/support/errata/RHSA-2004-549.html
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://www.securityfocus.com/bid/11646
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
- http://secunia.com/advisories/19607
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18025
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9450
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0949: The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0949 vulnerability.
References
- http://www.securityfocus.com/bid/11695
- http://www.redhat.com/support/errata/RHSA-2004-537.html
- http://security.e-matters.de/advisories/142004.html
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- http://www.trustix.org/errata/2004/0061/
- http://secunia.com/advisories/13232/
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- http://marc.info/?l=bugtraq&m=110072140811965&w=2
- https://www.ubuntu.com/usn/usn-30-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18137
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1072: The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8,…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1072 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-537.html
- http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- http://www.redhat.com/support/errata/RHSA-2005-275.html
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://www.securityfocus.com/bid/11646
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
- http://secunia.com/advisories/19607
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18025
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11195
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0802: Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute…
Published: 2004-12-31T05:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0802 vulnerability.
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870
- http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089
- http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html
- http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup
- http://www.securityfocus.com/bid/11084
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17183
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0817: Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to…
Published: 2004-12-31T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0817 vulnerability.
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870
- http://www.debian.org/security/2004/dsa-548
- http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml
- http://www.redhat.com/support/errata/RHSA-2004-465.html
- http://www.securityfocus.com/bid/11084
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:089
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17182
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0491: The linux-2.4.21-mlock.patch in Red Hat Enterprise Linux 3 does not properly maintain the mlock…
Published: 2004-12-31T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The linux-2.4.21-mlock.patch in Red Hat Enterprise Linux 3 does not properly maintain the mlock page count when one process unlocks pages that belong to another process, which allows local users to mlock more memory than specified by the rlimit.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-0491 vulnerability.
References
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=126411
- http://www.redhat.com/support/errata/RHSA-2005-472.html
- http://www.securityfocus.com/bid/13769
- ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
- http://secunia.com/advisories/19607
- http://marc.info/?l=linux-kernel&m=108087017610947&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1117
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10672
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0904: Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release,…
Published: 2004-12-31T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to execute arbitrary code via wide bitmap files that trigger heap-based buffer overflows.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0904 vulnerability.
References
- http://www.kb.cert.org/vuls/id/847200
- http://www.securityfocus.com/bid/11171
- http://bugzilla.mozilla.org/show_bug.cgi?id=255067
- http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3
- http://security.gentoo.org/glsa/glsa-200409-26.xml
- http://www.novell.com/linux/security/advisories/2004_36_mozilla.html
- http://www.us-cert.gov/cas/techalerts/TA04-261A.html
- http://marc.info/?l=bugtraq&m=109698896104418&w=2
- http://marc.info/?l=bugtraq&m=109900315219363&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17381
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10952
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0685: Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized…
Published: 2004-12-23T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-0685 vulnerability.
References
- http://www.kb.cert.org/vuls/id/981134
- http://www.securityfocus.com/bid/10892
- http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml
- http://www.trustix.net/errata/2004/0041/
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127921
- http://www.securityspace.com/smysecure/catid.html?id=14580
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16931
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10665
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0803: Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier,…
Published: 2004-12-23T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0803 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-577.html
- http://www.kb.cert.org/vuls/id/948752
- http://www.debian.org/security/2004/dsa-567
- http://scary.beasts.org/security/CESA-2004-006.txt
- http://www.kde.org/info/security/advisory-20041209-2.txt
- http://www.gentoo.org/security/en/glsa/glsa-200410-11.xml
- http://www.redhat.com/support/errata/RHSA-2005-354.html
- http://www.novell.com/linux/security/advisories/2004_38_libtiff.html
- http://www.securityfocus.com/bid/11406
- http://secunia.com/advisories/12818
- http://www.redhat.com/support/errata/RHSA-2005-021.html
- http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:109
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
- http://marc.info/?l=bugtraq&m=109778785107450&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17703
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8896
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100114
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1142: Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU…
Published: 2004-12-15T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1142 vulnerability.
References
- http://www.ethereal.com/appnotes/enpa-sa-00016.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916
- http://www.debian.org/security/2004/dsa-613
- http://www.gentoo.org/security/en/glsa/glsa-200412-15.xml
- http://www.redhat.com/support/errata/RHSA-2005-037.html
- http://www.ciac.org/ciac/bulletins/p-061.shtml
- http://secunia.com/advisories/13468/
- http://www.securityfocus.com/bid/11943
- http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:152
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18488
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11278
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1139: Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote…
Published: 2004-12-15T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote attackers to cause a denial of service (application crash).
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1139 vulnerability.
References
- http://www.ethereal.com/appnotes/enpa-sa-00016.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916
- http://www.gentoo.org/security/en/glsa/glsa-200412-15.xml
- http://www.redhat.com/support/errata/RHSA-2005-037.html
- http://www.ciac.org/ciac/bulletins/p-061.shtml
- http://www.securityfocus.com/bid/11943
- http://secunia.com/advisories/13468/
- http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:152
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18484
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11319
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1145: Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted…
Published: 2004-12-15T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1145 vulnerability.
References
- http://www.heise.de/security/dienste/browsercheck/tests/java.shtml
- http://www.kde.org/info/security/advisory-20041220-1.txt
- http://www.gentoo.org/security/en/glsa/glsa-200501-16.xml
- http://www.redhat.com/support/errata/RHSA-2005-065.html
- http://www.kb.cert.org/vuls/id/420222
- http://secunia.com/advisories/13586
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:154
- http://marc.info/?l=bugtraq&m=110356286722875&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18596
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10173
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0607: The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when…
Published: 2004-12-06T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, which could allow remote attackers to bypass authentication.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0607 vulnerability.
References
- http://security.gentoo.org/glsa/glsa-200406-17.xml
- http://www.securityfocus.com/bid/10546
- http://www.redhat.com/support/errata/RHSA-2004-308.html
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt
- http://sourceforge.net/project/shownotes.php?release_id=245982
- http://www.osvdb.org/7113
- http://securitytracker.com/id?1010495
- http://secunia.com/advisories/11863
- http://secunia.com/advisories/11877
- http://marc.info/?l=bugtraq&m=108731967126033&w=2
- http://marc.info/?l=bugtraq&m=108726102304507&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16414
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9163
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0635: The SNMP dissector in Ethereal 0.8.15 through 0.10.4 allows remote attackers to cause a denial of…
Published: 2004-12-06T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The SNMP dissector in Ethereal 0.8.15 through 0.10.4 allows remote attackers to cause a denial of service (process crash) via a (1) malformed or (2) missing community string, which causes an out-of-bounds read.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0635 vulnerability.
References
- http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html
- http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html
- http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067
- http://www.ethereal.com/appnotes/enpa-sa-00015.html
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916
- http://www.debian.org/security/2004/dsa-528
- http://www.redhat.com/support/errata/RHSA-2004-378.html
- http://www.kb.cert.org/vuls/id/835846
- http://securitytracker.com/id?1010655
- http://secunia.com/advisories/12024
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16632
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9721
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0497: Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files,…
Published: 2004-12-06T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-0497 vulnerability.
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066
- http://www.redhat.com/support/errata/RHSA-2004-354.html
- http://www.redhat.com/support/errata/RHSA-2004-360.html
- http://www.novell.com/linux/security/advisories/2004_20_kernel.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16599
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9867
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0634: The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote attackers to cause a…
Published: 2004-12-06T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote attackers to cause a denial of service (process crash) via a handle without a policy name, which causes a null dereference.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0634 vulnerability.
References
- http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html
- http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html
- http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067
- http://www.ethereal.com/appnotes/enpa-sa-00015.html
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381
- http://www.redhat.com/support/errata/RHSA-2004-378.html
- http://www.kb.cert.org/vuls/id/518782
- http://securitytracker.com/id?1010655
- http://secunia.com/advisories/12024
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16631
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10252
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0633: The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial…
Published: 2004-12-06T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-0633 vulnerability.
References
- http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00013.html
- http://www.redhat.com/archives/fedora-announce-list/2004-July/msg00014.html
- http://www.gentoo.org/security/en/glsa/glsa-200407-08.xml
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:067
- http://www.ethereal.com/appnotes/enpa-sa-00015.html
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127381
- http://www.redhat.com/support/errata/RHSA-2004-378.html
- http://www.kb.cert.org/vuls/id/829422
- http://securitytracker.com/id?1010655
- http://secunia.com/advisories/12024
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16630
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9931
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0112: The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos…
Published: 2004-11-23T05:00:00 Last Modified: 2021-11-08T15:48:00
Summary
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0112 vulnerability.
References
- http://www.securityfocus.com/bid/9899
- http://www.us-cert.gov/cas/techalerts/TA04-078A.html
- http://www.openssl.org/news/secadv_20040317.txt
- http://www.uniras.gov.uk/vuls/2004/224012/index.htm
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc
- http://www.redhat.com/support/errata/RHSA-2004-121.html
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt
- http://www.novell.com/linux/security/advisories/2004_07_openssl.html
- http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524
- http://docs.info.apple.com/article.html?artnum=61798
- http://lists.apple.com/mhonarc/security-announce/msg00045.html
- http://www.kb.cert.org/vuls/id/484726
- http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml
- http://security.gentoo.org/glsa/glsa-200403-03.xml
- http://www.redhat.com/support/errata/RHSA-2004-120.html
- http://www.trustix.org/errata/2004/0012
- http://www.ciac.org/ciac/bulletins/o-101.shtml
- http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
- http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
- http://secunia.com/advisories/11139
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:023
- http://marc.info/?l=bugtraq&m=108403806509920&w=2
- http://marc.info/?l=bugtraq&m=107953412903636&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15508
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9580
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A928
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1049
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0081: OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote…
Published: 2004-11-23T05:00:00 Last Modified: 2021-11-08T15:48:00
Summary
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0081 vulnerability.
References
- http://www.kb.cert.org/vuls/id/465542
- http://www.securityfocus.com/bid/9899
- http://www.uniras.gov.uk/vuls/2004/224012/index.htm
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834
- http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html
- http://www.debian.org/security/2004/dsa-465
- http://rhn.redhat.com/errata/RHSA-2004-119.html
- http://www.redhat.com/support/errata/RHSA-2004-121.html
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt
- ftp://patches.sgi.com/support/free/security/advisories/20040304-01-U.asc
- http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524
- http://www.us-cert.gov/cas/techalerts/TA04-078A.html
- http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml
- http://fedoranews.org/updates/FEDORA-2004-095.shtml
- http://security.gentoo.org/glsa/glsa-200403-03.xml
- http://www.redhat.com/support/errata/RHSA-2004-120.html
- http://www.redhat.com/support/errata/RHSA-2004-139.html
- http://www.trustix.org/errata/2004/0012
- http://secunia.com/advisories/11139
- http://marc.info/?l=bugtraq&m=107955049331965&w=2
- http://marc.info/?l=bugtraq&m=108403850228012&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15509
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A902
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A871
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11755
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0079: The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows…
Published: 2004-11-23T05:00:00 Last Modified: 2021-11-08T15:48:00
Summary
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0079 vulnerability.
References
- http://www.us-cert.gov/cas/techalerts/TA04-078A.html
- http://www.securityfocus.com/bid/9899
- http://www.openssl.org/news/secadv_20040317.txt
- http://www.uniras.gov.uk/vuls/2004/224012/index.htm
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834
- http://www.debian.org/security/2004/dsa-465
- http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc
- http://www.redhat.com/support/errata/RHSA-2004-121.html
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt
- http://www.novell.com/linux/security/advisories/2004_07_openssl.html
- http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524
- http://docs.info.apple.com/article.html?artnum=61798
- http://lists.apple.com/mhonarc/security-announce/msg00045.html
- http://www.kb.cert.org/vuls/id/288574
- http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml
- http://fedoranews.org/updates/FEDORA-2004-095.shtml
- http://security.gentoo.org/glsa/glsa-200403-03.xml
- http://www.redhat.com/support/errata/RHSA-2004-120.html
- http://www.redhat.com/support/errata/RHSA-2004-139.html
- http://www.trustix.org/errata/2004/0012
- http://www.ciac.org/ciac/bulletins/o-101.shtml
- http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
- http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
- http://www.redhat.com/support/errata/RHSA-2005-830.html
- http://secunia.com/advisories/11139
- http://secunia.com/advisories/17401
- http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html
- http://www.redhat.com/support/errata/RHSA-2005-829.html
- http://secunia.com/advisories/17381
- http://secunia.com/advisories/17398
- http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961
- http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm
- http://secunia.com/advisories/18247
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:023
- http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US
- http://marc.info/?l=bugtraq&m=108403806509920&w=2
- http://marc.info/?l=bugtraq&m=107953412903636&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15505
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0494: Multiple extfs backend scripts for GNOME virtual file system (VFS) before 1.0.1 may allow remote…
Published: 2004-11-23T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple extfs backend scripts for GNOME virtual file system (VFS) before 1.0.1 may allow remote attackers to perform certain unauthorized actions via a gnome-vfs URI.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0494 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-373.html
- https://bugzilla.fedora.us/show_bug.cgi?id=1944
- http://rpmfind.net/linux/RPM/suse/9.3/i386/suse/i586/gnome-vfs-1.0.5-816.2.i586.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16897
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9854
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0750: Unknown vulnerability in redhat-config-nfs before 1.0.13, when shares are exported to multiple…
Published: 2004-10-20T04:00:00 Last Modified: 2018-10-19T15:30:00
Summary
Unknown vulnerability in redhat-config-nfs before 1.0.13, when shares are exported to multiple hosts, can produce incorrect permissions and prevent the all_squash option from being applied.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0750 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-434.html
- http://www.securityfocus.com/bid/11240
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17478
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10696
- http://www.securityfocus.com/archive/1/419762/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1613: Mozilla allows remote attackers to cause a denial of service (application crash from null…
Published: 2004-10-18T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Mozilla allows remote attackers to cause a denial of service (application crash from null dereference or infinite loop) via a web page that contains a (1) TEXTAREA, (2) INPUT, (3) FRAMESET or (4) IMG tag followed by a null character and some trailing characters, as demonstrated by mangleme.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1613 vulnerability.
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html
- http://lcamtuf.coredump.cx/mangleme/gallery/
- http://www.redhat.com/support/errata/RHSA-2005-323.html
- http://www.securityfocus.com/bid/11439
- http://securitytracker.com/id?1011810
- http://marc.info/?l=bugtraq&m=109811406620511&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17805
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10227
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0643: Double free vulnerability in the krb5_rd_cred function for MIT Kerberos 5 (krb5) 1.3.1 and…
Published: 2004-09-28T04:00:00 Last Modified: 2021-02-02T18:08:00
Summary
Double free vulnerability in the krb5_rd_cred function for MIT Kerberos 5 (krb5) 1.3.1 and earlier may allow local users to execute arbitrary code.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-0643 vulnerability.
References
- http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml
- http://www.trustix.net/errata/2004/0045/
- http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt
- http://www.us-cert.gov/cas/techalerts/TA04-247A.html
- http://www.kb.cert.org/vuls/id/866472
- http://www.debian.org/security/2004/dsa-543
- http://rhn.redhat.com/errata/RHSA-2004-350.html
- http://www.securityfocus.com/bid/11078
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860
- http://marc.info/?l=bugtraq&m=109508872524753&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17159
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3322
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10267
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0642: Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key…
Published: 2004-09-28T04:00:00 Last Modified: 2021-02-02T18:05:00
Summary
Double free vulnerabilities in the error handling code for ASN.1 decoders in the (1) Key Distribution Center (KDC) library and (2) client library for MIT Kerberos 5 (krb5) 1.3.4 and earlier may allow remote attackers to execute arbitrary code.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0642 vulnerability.
References
- http://www.gentoo.org/security/en/glsa/glsa-200409-09.xml
- http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-002-dblfree.txt
- http://www.us-cert.gov/cas/techalerts/TA04-247A.html
- http://www.kb.cert.org/vuls/id/795632
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000860
- http://www.debian.org/security/2004/dsa-543
- http://rhn.redhat.com/errata/RHSA-2004-350.html
- http://www.trustix.net/errata/2004/0045/
- http://www.securityfocus.com/bid/11078
- http://marc.info/?l=bugtraq&m=109508872524753&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17157
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4936
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10709
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0827: Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before…
Published: 2004-09-16T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0827 vulnerability.
References
- http://www.debian.org/security/2004/dsa-547
- http://www.redhat.com/support/errata/RHSA-2004-480.html
- http://www.redhat.com/support/errata/RHSA-2004-494.html
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1
- http://secunia.com/advisories/28800
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1
- http://www.vupen.com/english/advisories/2008/0412
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17173
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0809: The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of…
Published: 2004-09-16T04:00:00 Last Modified: 2021-06-06T11:15:00
Summary
The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0809 vulnerability.
References
- http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml
- http://www.debian.org/security/2004/dsa-558
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096
- http://www.redhat.com/support/errata/RHSA-2004-463.html
- http://www.trustix.org/errata/2004/0047/
- http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/dav/fs/lock.c?r1=1.32&r2=1.33
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17366
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9588
- https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0905: Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8…
Published: 2004-09-14T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to perform cross-domain scripting and possibly execute arbitrary code by convincing a user to drag and drop javascript: links to a frame or page in another domain.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-0905 vulnerability.
References
- http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3
- http://bugzilla.mozilla.org/show_bug.cgi?id=250862
- http://security.gentoo.org/glsa/glsa-200409-26.xml
- http://www.novell.com/linux/security/advisories/2004_36_mozilla.html
- http://www.us-cert.gov/cas/techalerts/TA04-261A.html
- http://www.kb.cert.org/vuls/id/651928
- http://www.securityfocus.com/bid/11177
- http://marc.info/?l=bugtraq&m=109698896104418&w=2
- http://marc.info/?l=bugtraq&m=109900315219363&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17374
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10378
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0421: The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a…
Published: 2004-08-18T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The Portable Network Graphics library (libpng) 1.0.15 and earlier allows attackers to cause a denial of service (crash) via a malformed PNG image file that triggers an error that causes an out-of-bounds read when creating the error message.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0421 vulnerability.
References
- http://www.securityfocus.com/bid/10244
- http://www.redhat.com/support/errata/RHSA-2004-180.html
- http://lists.apple.com/mhonarc/security-announce/msg00056.html
- http://www.debian.org/security/2004/dsa-498
- http://www.redhat.com/support/errata/RHSA-2004-181.html
- http://secunia.com/advisories/22957
- http://secunia.com/advisories/22958
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:040
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:212
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:213
- http://marc.info/?l=bugtraq&m=108334922320309&w=2
- http://marc.info/?l=bugtraq&m=108335030208523&w=2
- http://marc.info/?l=fedora-announce-list&m=108451350029261&w=2
- http://marc.info/?l=fedora-announce-list&m=108451353608968&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16022
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A971
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11710
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0495: Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges…
Published: 2004-08-06T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-0495 vulnerability.
References
- http://www.securityfocus.com/bid/10566
- http://security.gentoo.org/glsa/glsa-200407-02.xml
- http://www.redhat.com/support/errata/RHSA-2004-255.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846
- http://lwn.net/Articles/91155/
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066
- http://www.redhat.com/support/errata/RHSA-2004-260.html
- http://www.novell.com/linux/security/advisories/2004_20_kernel.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16449
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2961
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10155
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0557: Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX)…
Published: 2004-08-06T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 through 12.17.4 allow remote attackers to execute arbitrary code via certain WAV file header fields.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2004-0557 vulnerability.
- SoX - '.wav' Local Buffer Overflow by Rave at 2004-08-04
- SoX - Local Buffer Overflow by Serkan Akpolat at 2004-08-01
References
- http://www.securityfocus.com/bid/10819
- http://www.gentoo.org/security/en/glsa/glsa-200407-23.xml
- http://www.redhat.com/support/errata/RHSA-2004-409.html
- http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0014.html
- http://www.debian.org/security/2004/dsa-565
- http://lwn.net/Articles/95530/
- http://lwn.net/Articles/95529/
- https://bugzilla.fedora.us/show_bug.cgi?id=1945
- http://secunia.com/advisories/12175
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000855
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:076
- http://seclists.org/fulldisclosure/2004/Jul/1227.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16827
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9801
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0554: Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system…
Published: 2004-08-06T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a “crash.c” program.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-0554 vulnerability.
References
- http://www.kb.cert.org/vuls/id/973654
- http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905
- http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845
- http://lwn.net/Articles/91155/
- http://security.gentoo.org/glsa/glsa-200407-02.xml
- http://www.redhat.com/support/errata/RHSA-2004-255.html
- http://www.redhat.com/support/errata/RHSA-2004-260.html
- http://www.novell.com/linux/security/advisories/2004_17_kernel.html
- http://www.trustix.net/errata/2004/0034/
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:062
- http://www.securityfocus.com/bid/10538
- http://marc.info/?l=linux-kernel&m=108681568931323&w=2
- http://marc.info/?l=bugtraq&m=108786114032681&w=2
- http://marc.info/?l=bugtraq&m=108793699910896&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16412
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9426
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2915
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0111: gdk-pixbuf before 0.20 allows attackers to cause a denial of service (crash) via a malformed…
Published: 2004-04-15T04:00:00 Last Modified: 2017-10-10T01:30:00
Summary
gdk-pixbuf before 0.20 allows attackers to cause a denial of service (crash) via a malformed bitmap (BMP) file.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0111 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-103.html
- http://www.securityfocus.com/bid/9842
- http://www.debian.org/security/2004/dsa-464
- https://bugzilla.fedora.us/show_bug.cgi?id=2005
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:020
- http://www.redhat.com/support/errata/RHSA-2004-102.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A846
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A845
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15426
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0104: Multiple format string vulnerabilities in Metamail 2.7 and earlier allow remote attackers to…
Published: 2004-03-03T05:00:00 Last Modified: 2017-07-11T01:29:00
Summary
Multiple format string vulnerabilities in Metamail 2.7 and earlier allow remote attackers to execute arbitrary code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-0104 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-073.html
- http://www.securityfocus.com/bid/9692
- http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0041.html
- http://www.debian.org/security/2004/dsa-449
- http://www.kb.cert.org/vuls/id/518518
- http://secunia.com/advisories/10908
- http://www.ciac.org/ciac/bulletins/o-083.shtml
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.404734
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:014
- http://marc.info/?l=bugtraq&m=107713476911429&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15259
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15245
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0105: Multiple buffer overflows in Metamail 2.7 and earlier allow remote attackers to execute arbitrary…
Published: 2004-03-03T05:00:00 Last Modified: 2017-07-11T01:29:00
Summary
Multiple buffer overflows in Metamail 2.7 and earlier allow remote attackers to execute arbitrary code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0105 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-073.html
- http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0041.html
- http://www.debian.org/security/2004/dsa-449
- http://www.kb.cert.org/vuls/id/513062
- http://secunia.com/advisories/10908
- http://www.ciac.org/ciac/bulletins/o-083.shtml
- http://www.securityfocus.com/bid/9692
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.404734
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:014
- http://marc.info/?l=bugtraq&m=107713476911429&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15258
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15247
See also: All popular products CVE Vulnerabilities of redhat
CVE-2003-0857: The (1) ipq_read and (2) ipulog_read functions in iptables allow local users to cause a denial of…
Published: 2003-12-31T05:00:00 Last Modified: 2008-09-05T20:35:00
Summary
The (1) ipq_read and (2) ipulog_read functions in iptables allow local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.
Common Weakness Enumeration (CWE): CWE-264: Permissions, Privileges, and Access Controls
CWE Description: Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2003-0857 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2003-0986: Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to…
Published: 2003-12-31T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to 2.4.24 do not use the copy_from_user function when copying data from userspace to kernelspace, which crosses security boundaries and allows local users to cause a denial of service.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.1
- CVSS: 1.7
- CVSS Vector: AV:L/AC:L/Au:S/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2003-0986 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-017.html
- http://linux.bkbits.net:8080/linux-2.6/cset@3ffcf122S7e3xPZCpibrXq6KRRjwqw
- http://linux.bkbits.net:8080/linux-2.4/cset@3fdd54b3u9Eq0Wny2Nn1HGfI3pofOQ
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9707
See also: All popular products CVE Vulnerabilities of redhat
CVE-2003-1295: Unspecified vulnerability in xscreensaver 4.12, and possibly other versions, allows attackers to…
Published: 2003-12-31T05:00:00 Last Modified: 2008-09-05T20:36:00
Summary
Unspecified vulnerability in xscreensaver 4.12, and possibly other versions, allows attackers to cause xscreensaver to crash via unspecified vectors “while verifying the user-password.”
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2003-1295 vulnerability.
References
See also: All popular products CVE Vulnerabilities of redhat
CVE-2003-0859: The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a…
Published: 2003-12-15T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2003-0859 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2003-325.html
- http://www.redhat.com/support/errata/RHSA-2003-334.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11337
See also: All popular products CVE Vulnerabilities of redhat
CVE-2003-0689: The getgrouplist function in GNU libc (glibc) 2.2.4 and earlier allows attackers to cause a…
Published: 2003-10-20T04:00:00 Last Modified: 2008-09-10T19:20:00
Summary
The getgrouplist function in GNU libc (glibc) 2.2.4 and earlier allows attackers to cause a denial of service (segmentation fault) and execute arbitrary code when a user is a member of a large number of groups, which can cause a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2003-0689 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2003-249.html
- http://www.redhat.com/support/errata/RHSA-2003-325.html
See also: All popular products CVE Vulnerabilities of redhat
CVE-2003-0699: The C-Media PCI sound driver in Linux before 2.4.21 does not use the get_user function to access…
Published: 2003-08-27T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The C-Media PCI sound driver in Linux before 2.4.21 does not use the get_user function to access userspace, which crosses security boundaries and may facilitate the exploitation of vulnerabilities, a different vulnerability than CVE-2003-0700.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2003-0699 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2003-198.html
- http://www.redhat.com/support/errata/RHSA-2003-238.html
- http://www.redhat.com/support/errata/RHSA-2003-239.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A387
See also: All popular products CVE Vulnerabilities of redhat
CVE-2003-0548: The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to…
Published: 2003-08-27T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) when a chosen host expires, a different issue than CVE-2003-0549.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2003-0548 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2003-258.html
- http://www.redhat.com/support/errata/RHSA-2003-259.html
- http://mail.gnome.org/archives/gnome-hackers/2003-August/msg00045.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000729
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A113
See also: All popular products CVE Vulnerabilities of redhat
CVE-2003-0549: The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to…
Published: 2003-08-27T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) via a short authorization key name.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2003-0549 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2003-258.html
- http://www.redhat.com/support/errata/RHSA-2003-259.html
- http://mail.gnome.org/archives/gnome-hackers/2003-August/msg00045.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000729
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A129
See also: All popular products CVE Vulnerabilities of redhat
CVE-2003-0434: Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to…
Published: 2003-07-24T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2003-0434 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2003-196.html
- http://www.redhat.com/support/errata/RHSA-2003-197.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-June/005719.html
- http://www.kb.cert.org/vuls/id/200132
- http://secunia.com/advisories/9037
- http://secunia.com/advisories/9038
- http://www.mandriva.com/security/advisories?name=MDKSA-2003:071
- http://marc.info/?l=bugtraq&m=105777963019186&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A664
See also: All popular products CVE Vulnerabilities of redhat
CVE-2002-2185: The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via…
Published: 2002-12-31T05:00:00 Last Modified: 2018-10-19T15:29:00
Summary
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target’s Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2002-2185 vulnerability.
References
- http://online.securityfocus.com/archive/1/276968
- http://www.cs.ucsb.edu/~krishna/igmp_dos/
- ftp://patches.sgi.com/support/free/security/advisories/20020901-01-A
- http://www.securityfocus.com/bid/5020
- http://www.redhat.com/support/errata/RHSA-2006-0101.html
- http://www.redhat.com/support/errata/RHSA-2006-0140.html
- http://secunia.com/advisories/18510
- http://secunia.com/advisories/18562
- http://www.redhat.com/support/errata/RHSA-2006-0190.html
- http://www.redhat.com/support/errata/RHSA-2006-0191.html
- http://secunia.com/advisories/18684
- https://exchange.xforce.ibmcloud.com/vulnerabilities/9436
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10736
- http://www.securityfocus.com/archive/1/428058/100/0/threaded
- http://www.securityfocus.com/archive/1/428028/100/0/threaded
- http://www.securityfocus.com/archive/1/427981/100/0/threaded
- http://www.securityfocus.com/archive/1/427980/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2002-1323: Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out…
Published: 2002-12-11T05:00:00 Last Modified: 2018-10-30T16:25:00
Summary
Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2002-1323 vulnerability.
References
- http://use.perl.org/articles/02/10/06/1118222.shtml?tid=5
- http://www.securityfocus.com/bid/6111
- http://www.debian.org/security/2002/dsa-208
- http://www.iss.net/security_center/static/10574.php
- http://bugs6.perl.org/rt2/Ticket/Display.html?id=17744
- http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0061.html
- http://www.redhat.com/support/errata/RHSA-2003-256.html
- http://www.redhat.com/support/errata/RHSA-2003-257.html
- ftp://patches.sgi.com/support/free/security/advisories/20030606-01-A
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-007.0.txt
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.1/SCOSA-2004.1.txt
- http://www.osvdb.org/2183
- http://www.osvdb.org/3814
- http://marc.info/?l=bugtraq&m=104040175522502&w=2
- http://marc.info/?l=bugtraq&m=104033126305252&w=2
- http://marc.info/?l=bugtraq&m=104005919814869&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1160
See also: All popular products CVE Vulnerabilities of redhat
CVE-1999-1572: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask…
Published: 1996-07-16T04:00:00 Last Modified: 2017-10-19T01:29:00
Summary
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-1999-1572 vulnerability.
References
- http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391
- http://www.debian.org/security/2005/dsa-664
- http://www.redhat.com/support/errata/RHSA-2005-073.html
- http://www.redhat.com/support/errata/RHSA-2005-080.html
- http://www.trustix.org/errata/2005/0003/
- http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf
- http://www.redhat.com/support/errata/RHSA-2005-806.html
- http://secunia.com/advisories/14357
- http://secunia.com/advisories/17063
- http://secunia.com/advisories/17532
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:032
- http://marc.info/?l=bugtraq&m=110763404701519&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19167
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888
See also: All popular products CVE Vulnerabilities of redhat