VuXML entries as processed by FreshPorts | Date | Decscription | Port(s) |
2021-01-14 | VuXML ID 08b553ed-537a-11eb-be6e-0022489ad614
Node.js reports:
use-after-free in TLSWrap (High) (CVE-2020-8265)
Affected Node.js versions are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.
HTTP Request Smuggling in nodejs (Low) (CVE-2020-8287)
Affected versions of Node.js allow two copies of a header field in a http request. For example, two Transfer-Encoding header fields. In this case Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.
OpenSSL - EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)
iThis is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20201208.txt.
more... | node node10 node12 node14
more detail |
2021-01-14 | VuXML ID 0a8ebf4a-5660-11eb-b4e2-001b217b3468
SO-AND-SO reports:
Ability to steal a user's API access token through GitLab Pages
more... | gitlab-ce
more detail |
2021-01-14 | VuXML ID 6d554d6e-5638-11eb-9d36-5404a68ad561
The wavpack project reports:
src/pack_utils.c
- issue #91: fix integer overflows resulting in buffer overruns (CVE-2020-35738)
- sanitize configuration parameters better (improves clarity and aids debugging)
more... | wavpack
more detail |
2021-01-13 | VuXML ID d6f76976-e86d-4f9a-9362-76c849b10db2
Jenkins Security Advisory:
Description
(Medium) SECURITY-1452 / CVE-2021-21602
Arbitrary file read vulnerability in workspace browsers
(High) SECURITY-1889 / CVE-2021-21603
XSS vulnerability in notification bar
(High) SECURITY-1923 / CVE-2021-21604
Improper handling of REST API XML deserialization errors
(High) SECURITY-2021 / CVE-2021-21605
Path traversal vulnerability in agent names
(Medium) SECURITY-2023 / CVE-2021-21606
Arbitrary file existence check in file fingerprints
(Medium) SECURITY-2025 / CVE-2021-21607
Excessive memory allocation in graph URLs leads to denial of service
(High) SECURITY-2035 / CVE-2021-21608
Stored XSS vulnerability in button labels
(Low) SECURITY-2047 / CVE-2021-21609
Missing permission check for paths with specific prefix
(High) SECURITY-2153 / CVE-2021-21610
Reflected XSS vulnerability in markup formatter preview
(High) SECURITY-2171 / CVE-2021-21611
Stored XSS vulnerability on new item page
more... | jenkins jenkins-lts
more detail |
2021-01-12 | VuXML ID 1f655433-551b-11eb-9cda-589cfc0f81b0
phpmyfaq developers report:
phpMyFAQ does not implement sufficient checks to avoid XSS
injection for displaying tags.
more... | phpmyfaq
more detail |
2021-01-11 | VuXML ID 6193b3f6-548c-11eb-ba01-206a8a720317
Todd C. Miller reports:
A potential information leak in sudoedit that could be used to
test for the existence of directories not normally accessible to
the user in certain circumstances. When creating a new file,
sudoedit checks to make sure the parent directory of the new file
exists before running the editor. However, a race condition exists
if the invoking user can replace (or create) the parent directory.
If a symbolic link is created in place of the parent directory,
sudoedit will run the editor as long as the target of the link
exists.If the target of the link does not exist, an error message
will be displayed. The race condition can be used to test for the
existence of an arbitrary directory. However, it _cannot_ be used
to write to an arbitrary location.
more... | sudo
more detail |
2021-01-10 | VuXML ID a3cef1e6-51d8-11eb-9b8d-08002728f74c
CairoSVG security advisories:
When processing SVG files, the python package CairoSVG uses two regular
expressions which are vulnerable to Regular Expression Denial of Service
(REDoS).
If an attacker provides a malicious SVG, it can make cairosvg get stuck
processing the file for a very long time.
more... | py36-cairosvg py37-cairosvg py38-cairosvg py39-cairosvg
more detail |
2021-01-09 | VuXML ID a2a2b34d-52b4-11eb-87cb-001b217b3468
Gitlab reports:
Ability to steal a user's API access token through GitLab Pages
Prometheus denial of service via HTTP request with custom method
Unauthorized user is able to access private repository information under specific conditions
Regular expression denial of service in NuGet API
Regular expression denial of service in package uploads
Update curl dependency
CVE-2019-3881 mitigation
more... | gitlab-ce
more detail |
2021-01-07 | VuXML ID d153c4d2-50f8-11eb-8046-3065ec8fd3ec
Chrome Releases reports:
This release includes 16 security fixes, including:
- [1148749] High CVE-2021-21106: Use after free in autofill.
Reported by Weipeng Jiang (@Krace) from Codesafe Team of
Legendsec at Qi'anxin Group on 2020-11-13
- [1153595] High CVE-2021-21107: Use after free in drag and
drop. Reported by Leecraso and Guang Gong of 360 Alpha Lab on
2020-11-30
- [1155426] High CVE-2021-21108: Use after free in media.
Reported by Leecraso and Guang Gong of 360 Alpha Lab on
2020-12-04
- [1152334] High CVE-2021-21109: Use after free in payments.
Reported by Rong Jian and Guang Gong of 360 Alpha Lab on
2020-11-24
- [1152451] High CVE-2021-21110: Use after free in safe
browsing. Reported by Anonymous on 2020-11-24
- [1149125] High CVE-2021-21111: Insufficient policy enforcement
in WebUI. Reported by Alesandro Ortiz on 2020-11-15
- [1151298] High CVE-2021-21112: Use after free in Blink.
Reported by YoungJoo Lee(@ashuu_lee) of Raon Whitehat on
2020-11-20
- [1155178] High CVE-2021-21113: Heap buffer overflow in Skia.
Reported by tsubmunu on 2020-12-03
- [1148309] High CVE-2020-16043: Insufficient data validation in
networking. Reported by Samy Kamkar, Ben Seri at Armis, Gregory
Vishnepolsky at Armis on 2020-11-12
- [1150065] High CVE-2021-21114: Use after free in audio.
Reported by Man Yue Mo of GitHub Security Lab on 2020-11-17
- [1157790] High CVE-2020-15995: Out of bounds write in V8.
Reported by Bohan Liu (@P4nda20371774) of Tencent Security Xuanwu
Lab on 2020-12-11
- [1157814] High CVE-2021-21115: Use after free in safe browsing.
Reported by Leecraso and Guang Gong of 360 Alpha Lab on
2020-12-11
- [1151069] Medium CVE-2021-21116: Heap buffer overflow in audio.
Reported by Alison Huffman, Microsoft Browser Vulnerability
Research on 2020-11-19
more... | chromium
more detail |
2021-01-04 | VuXML ID bd98066d-4ea4-11eb-b412-e86a64caca56
Aki Tuomi reports:
When imap hibernation is active, an attacker can cause Dovecot to
discover file system directory structure and access other users'
emails using specially crafted command.
The attacker must have valid credentials to access the
mail server.
Mail delivery / parsing crashed when the 10 000th MIME part was
message/rfc822 (or if parent was multipart/digest). This happened
due to earlier MIME parsing changes for CVE-2020-12100.
more... | dovecot
more detail |
2021-01-01 | VuXML ID 53e9efa1-4be7-11eb-8558-3085a9a47796
The InspIRCd development team reports:
The websocket module before v3.8.1 contains a double free
vulnerability. When combined with a HTTP reverse proxy this
vulnerability can be used by any user who is [GKZ]-lined to remotely
crash an InspIRCd server.
more... | inspircd
more detail |
2020-12-31 | VuXML ID 2739b88b-4b88-11eb-a4c0-08002734b9ed
The Gitea Team reports for release 1.13.1:
- Hide private participation in Orgs
- Fix escaping issue in diff
more... | gitea
more detail |
2020-12-28 | VuXML ID fbcba194-ac7d-11ea-8b5e-b42e99a1b9c3
Intel reports:
Intel CPUs suffer Special Register Buffer Data Sampling vulnerability
more... | devcpu-data
more detail |
2020-12-22 | VuXML ID 6adf6ce0-44a6-11eb-95b7-001999f8d30b
The Asterisk project reports:
AST-2020-003: A crash can occur in Asterisk when a SIP
message is received that has a History-Info header, which
contains a tel-uri.
AST-2020-004: A crash can occur in Asterisk when a SIP
181 response is received that has a Diversion header,
which contains a tel-uri.
more... | asterisk13 asterisk16 asterisk18
more detail |
2020-12-21 | VuXML ID 61d89849-43cb-11eb-aba5-00a09858faf5
PowerDNS developers report:
A remote, unauthenticated attacker can trigger a race condition
leading to a crash, or possibly arbitrary code execution, by sending crafted queries with a GSS-TSIG signature.
A remote, unauthenticated attacker can cause a denial of service by
sending crafted queries with a GSS-TSIG signature.
A remote, unauthenticated attacker might be able to cause a double-free,
leading to a crash or possibly arbitrary code execution by sending crafted queries with a GSS-TSIG signature.
more... | powerdns
more detail |
2020-12-21 | VuXML ID eb2845c4-43ce-11eb-aba5-00a09858faf5
postsrsd developer reports:
PostSRSd could be tricked into consuming a lot of CPU time with
an SRS address that has an excessively long time stamp tag.
more... | postsrsd
more detail |
2020-12-17 | VuXML ID cc1fd3da-b8fd-4f4d-a092-c38541c0f993
Vault developers report:
Vault allowed enumeration of users via the LDAP auth method. This vulnerability, was fixed in Vault 1.6.1 and 1.5.6.
An external party reported that they were able to enumerate LDAP users via error messages returned by Vault?s LDAP auth method
more... | vault
more detail |
2020-12-15* | VuXML ID 1d56cfc5-3970-11eb-929d-d4c9ef517024
The OpenSSL project reports:
EDIPARTYNAME NULL pointer de-reference (High)
The X.509 GeneralName type is a generic type for representing
different types of names. One of those name types is known as
EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which
compares different instances of a GENERAL_NAME to see if they
are equal or not. This function behaves incorrectly when both
GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer
dereference and a crash may occur leading to a possible denial
of service attack.
more... | FreeBSD openssl
more detail |
2020-12-13 | VuXML ID 85349584-3ba4-11eb-919d-08002728f74c
JasPer NEWS:
Fix CVE-2020-27828, heap-overflow in cp_create() in jpc_enc.c.
more... | jasper
more detail |
2020-12-13 | VuXML ID cfa0be42-3cd7-11eb-9de7-641c67a117d8
Matrix developers reports:
A malicious or poorly-implemented homeserver can inject malformed events
into a room by specifying a different room id in the path of a /send_join,
/send_leave, /invite or /exchange_third_party_invite request.
This can lead to a denial of service in which future events will not be
correctly sent to other servers over federation.
This affects any server which accepts federation requests from untrusted
servers.
more... | py36-matrix-synapse py37-matrix-synapse py38-matrix-synapse py39-matrix-synapse
more detail |
2020-12-12 | VuXML ID 388ebb5b-3c95-11eb-929d-d4c9ef517024
NLNetLabs reports:
Unbound and NSD when writing the PID file would not check if an
existing file was a symlink. This could allow for a local symlink \
attack if an attacker has access to the user Unbound/NSD runs as.
more... | nsd unbound
more detail |
2020-12-12* | VuXML ID 88dfd92f-3b9c-11eb-929d-d4c9ef517024
The LibreSSL project reports:
Malformed ASN.1 in a certificate revocation list or a timestamp
response token can lead to a NULL pointer dereference.
more... | libressl libressl-devel
more detail |
2020-12-12 | VuXML ID fdc49972-3ca7-11eb-929d-d4c9ef517024
The p11-glue project reports:
CVE-2020-29363: Out-of-bounds write in
p11_rpc_buffer_get_byte_array_value function A heap-based buffer
overflow has been discovered in the RPC protocol used by p11-kit
server/remote commands and the client library. When the remote
entity supplies a serialized byte array in a CK_ATTRIBUTE, the
receiving entity may not allocate sufficient length for the buffer
to store the deserialized value.
CVE-2020-29362: Out-of-bounds read in p11_rpc_buffer_get_byte_array
function A heap-based buffer over-read has been discovered in
the RPC protocol used by thep11-kit server/remote commands and the
client library. When the remote entity supplies a byte array through
a serialized PKCS#11 function call, the receiving entity may allow
the reading of up to 4 bytes of memory past the heap
allocation.
CVE-2020-29361: Integer overflow when allocating memory for arrays
of attributes and object identifiers Multiple integer overflows
have been discovered in the array allocations in the p11-kit library
and the p11-kit list command, where overflow checks are missing
before calling realloc or calloc.
more... | p11-kit
more detail |
2020-12-09 | VuXML ID 3c77f139-3a09-11eb-929d-d4c9ef517024
The cURL project reports:
Trusting FTP PASV responses (CVE-2020-8284)
FTP wildcard stack overflow (CVE-2020-8285)
Inferior OCSP verification (CVE-2020-8286)
more... | curl
more detail |
2020-12-07 | VuXML ID 5d5e5cda-38e6-11eb-bbbf-001b217b3468
Gitlab reports:
XSS in Zoom Meeting URL
Limited Information Disclosure in Private Profile
User email exposed via GraphQL endpoint
Group and project membership potentially exposed via GraphQL
Search terms logged in search parameter in rails logs
Un-authorised access to feature flag user list
A specific query on the explore page causes statement timeouts
Exposure of starred projects on private user profiles
Uncontrolled Resource Consumption in any Markdown field using Mermaid
Former group members able to view updates to confidential epics
Update GraphicsMagick dependency
Update GnuPG dependency
Update libxml dependency
more... | gitlab-ce
more detail |
2020-12-06 | VuXML ID 8d17229f-3054-11eb-a455-ac1f6b16e566
Hashicorp reports:
Increase the permissions to read from the
/connect/ca/configuration endpoint to operator:write.
Previously Connect CA configuration, including the private
key, set via this endpoint could be read back by an operator
with operator:read privileges.
more... | consul
more detail |
2020-12-05 | VuXML ID 01ffd06a-36ed-11eb-b655-3065ec8fd3ec
Chrome Releases reports:
This release contains 8 security fixes, including:
- [1142331] High CVE-2020-16037: Use after free in clipboard.
Reported by Ryoya Tsukasaki on 2020-10-26
- [1138683] High CVE-2020-16038: Use after free in media.
Reported by Khalil Zhani on 2020-10-14
- [1149177] High CVE-2020-16039: Use after free in extensions.
Reported by Anonymous on 2020-11-15
- [1150649] High CVE-2020-16040: Insufficient data validation in
V8. Reported by Lucas Pinheiro, Microsoft Browser Vulnerability
Research on 2020-11-19
- [1151865] Medium CVE-2020-16041: Out of bounds read in
networking. Reported by Sergei Glazunov and Mark Brand of Google
Project Zero on 2020-11-23
- [1151890] Medium CVE-2020-16042: Uninitialized Use in V8.
Reported by André Bargull on 2020-11-2
more... | chromium
more detail |
2020-12-04 | VuXML ID b99492b2-362b-11eb-9f86-08002734b9ed
The Gitea Team reports for release 1.13.0:
- Add Allow-/Block-List for Migrate and Mirrors
- Prevent git operations for inactive users
- Disallow urlencoded new lines in git protocol paths if there is a port
- Mitigate Security vulnerability in the git hook feature
- Disable DSA ssh keys by default
- Set TLS minimum version to 1.2
- Use argon as default password hash algorithm
- Escape failed highlighted files
more... | gitea
more detail |
2020-12-02 | VuXML ID 8eed0c5c-3482-11eb-b87a-901b0ef719ab
Problem Description:
When an ICMPv6 error message is received, the FreeBSD ICMPv6 stack
may extract information from the message to hand to upper-layer
protocols. As a part of this operation, it may parse IPv6 header
options from a packet embedded in the ICMPv6 message.
The handler for a routing option caches a pointer into the packet
buffer holding the ICMPv6 message. However, when processing
subsequent options the packet buffer may be freed, rendering the
cached pointer invalid. The network stack may later dereference the
pointer, potentially triggering a use-after-free.
Impact:
A remote host may be able to trigger a read of freed kernel memory.
This may trigger a kernel panic if the address had been unmapped.
more... | FreeBSD-kernel
more detail |
2020-12-02 | VuXML ID e2748c9d-3483-11eb-b87a-901b0ef719ab
Problem Description:
Two bugs exist in rtsold(8)'s RDNSS and DNSSL option handling.
First, rtsold(8) failed to perform sufficient bounds checking on the
extent of the option. In particular, it does not verify that the
option does not extend past the end of the received packet before
processing its contents. The kernel currently ignores such
malformed packets but still passes them to userspace programs.
Second, when processing a DNSSL option, rtsold(8) decodes domain
name labels per an encoding specified in RFC 1035 in which the first
octet of each label contains the label's length. rtsold(8) did not
validate label lengths correctly and could overflow the destination
buffer.
Impact:
It is believed that these bugs could be exploited to gain remote
code execution within the rtsold(8) daemon, which runs as root.
Note that rtsold(8) only processes messages received from hosts
attached to the same physical link as the interface(s) on which
rtsold(8) is listening.
In FreeBSD 12.2 rtsold(8) runs in a Capsicum sandbox, limiting the
scope of a compromised rtsold(8) process.
more... | FreeBSD
more detail |
2020-12-01 | VuXML ID 76c8b690-340b-11eb-a2b7-54e1ad3d6335
The X.org project reports:
These issues can lead to privileges elevations for authorized
clients on systems where the X server is running privileged.
Insufficient checks on the lengths of the XkbSetMap request can
lead to out of bounds memory accesses in the X server.
Insufficient checks on input of the XkbSetDeviceInfo request can
lead to a buffer overflow on the head in the X server.
more... | xephyr xorg-dmx xorg-nestserver xorg-server xorg-vfbserver xwayland
more detail |
2020-11-27 | VuXML ID 618010ff-3044-11eb-8112-000c292ee6b8
The HashiCorp team reports:
- artifact: Fixed a bug where interpolation can be used in the
artifact destination field to write artifact payloads outside
the allocation directory.
- template: Fixed a bug where interpolation can be used in the
template source and destination fields to read or write files
outside the allocation directory even when disable_file_sandbox
was set to false (the default).
- template: Fixed a bug where the disable_file_sandbox
configuration was only respected for the template file function
and not the template source and destination fields.
more... | nomad
more detail |
2020-11-21 | VuXML ID 55facdb0-2c24-11eb-9aac-08002734b9ed
The Gitea Team reports for release 1.12.6:
- Prevent git operations for inactive users
- Disallow urlencoded new lines in git protocol paths if there is a port
more... | gitea
more detail |
2020-11-21 | VuXML ID ad792169-2aa4-11eb-ab71-0022489ad614
Node.js reports:
Updates are now available for v12.x, v14.x and v15.x Node.js release lines for the following issues.
Denial of Service through DNS request (CVE-2020-8277)
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of service by getting the application to resolve a DNS record with a larger number of responses.
more... | node node12 node14
more detail |
2020-11-20 | VuXML ID dc132c91-2b71-11eb-8cfd-4437e6ad11c4
Kevin J. McCarthy reports:
Mutt had incorrect error handling when initially connecting to an IMAP
server, which could result in an attempt to authenticate without enabling TLS.
more... | mutt
more detail |
2020-11-15* | VuXML ID 19259833-26b1-11eb-a239-1c697a013f4b
Mantis 2.24.3 release reports:
This release fixes 3 security issues:
- 0027039: CVE-2020-25781: Access to private bug note attachments
- 0027275: CVE-2020-25288: HTML Injection on bug_update_page.php
- 0027304: CVE-2020-25830: HTML Injection in bug_actiongroup_page.php
more... | mantis-php72 mantis-php73 mantis-php74 mantis-php80
more detail |
2020-11-15* | VuXML ID 8da79498-e6f6-11ea-8cbf-54e1ad3d6335
The X.org project reports:
There is an integer overflow and a double free vulnerability in
the way LibX11 handles locales. The integer overflow is a necessary
precursor to the double free.
more... | libX11
more detail |
2020-11-12 | VuXML ID 50259d8b-243e-11eb-8bae-b42e99975750
SaltStack reports multiple security vulnerabilities in Salt 3002:
- CVE-2020-16846: Prevent shell injections in netapi ssh client.
- CVE-2020-17490: Prevent creating world readable private keys with the tls execution module.
- CVE-2020-25592: Properly validate eauth credentials and tokens along with their ACLs.
Prior to this change eauth was not properly validated when calling Salt ssh via the salt-api.
Any value for 'eauth' or 'token' would allow a user to bypass authentication and make calls
to Salt ssh.
more... | py36-salt py37-salt py38-salt
more detail |
2020-11-12 | VuXML ID db4b2f27-252a-11eb-865c-00155d646400
The Go project reports:
A number of math/big.Int methods (Div, Exp, DivMod, Quo, Rem,
QuoRem, Mod, ModInverse, ModSqrt, Jacobi, and GCD) can panic
when provided crafted large inputs. For the panic to happen,
the divisor or modulo argument must be larger than 3168 bits
(on 32-bit architectures) or 6336 bits (on 64-bit architectures).
Multiple math/big.Rat methods are similarly affected.
The go command may execute arbitrary code at build time when
cgo is in use. This may occur when running go get on a malicious
package, or any other command that builds untrusted code. This
can be caused by a malicious gcc flags specified via a #cgo
directive.
The go command may execute arbitrary code at build time when
cgo is in use. This may occur when running go get on a malicious
package, or any other command that builds untrusted code. This
can be caused by malicious unquoted symbol names.
more... | go
more detail |
2020-11-10 | VuXML ID 4f15ca7b-23ae-11eb-9f59-1c1b0d9ea7e6
The Apache Openofffice project reports:
CVE-2020-13958 Unrestricted actions leads to arbitrary code execution in crafted documents
Description
A vulnerability in Apache OpenOffice scripting events allows an attacker to construct documents containing hyperlinks pointing to an executable on the target users file system. These hyperlinks can be triggered unconditionally. In fixed versions no internal protocol may be called from the document event handler and other hyperlinks require a control-click.
Severity: Low
There are no known exploits of this vulnerability. A proof-of-concept demonstration exists.
Thanks to the reporter for discovering this issue.
Acknowledgments
The Apache OpenOffice Security Team would like to thank Imre Rad for discovering and reporting this attack vector.
more... | apache-openoffice apache-openoffice-devel
more detail |
2020-11-09 | VuXML ID 07c7ae7a-224b-11eb-aa6e-e0d55e2a8bf9
CVE MITRE reports:
raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).
more... | raptor2
more detail |
2020-11-08 | VuXML ID cf39ddf8-21be-11eb-8b47-641c67a117d8
Jupyter reports:
6.1.5 is a security release, fixing one vulnerability:
Fix open redirect vulnerability GHSA-c7vm-f5p4-8fqh (CVE to be assigned)
more... | py37-notebook py38-notebook py39-notebook
more detail |
2020-11-07* | VuXML ID 4fba07ca-13aa-11eb-b31e-d4c9ef517024
Oracle reports:
This Critical Patch Update contains 48 new security patches for
Oracle MySQL.
The highest CVSS v3.1 Base Score of vulnerabilities affecting Oracle
MySQL is 8.
NOTE: MariaDB only contains CVE-2020-14812 CVE-2020-14765
CVE-2020-14776 and CVE-2020-14789
more... | mariadb103-server mariadb104-server mariadb105-server mysql56-server mysql57-server mysql80-server
more detail |
2020-11-05 | VuXML ID 29b7f0be-1fb7-11eb-b9d4-001999f8d30b
The Asterisk project reports:
If Asterisk is challenged on an outbound INVITE and
the nonce is changed in each response, Asterisk will
continually send INVITEs in a loop. This causes Asterisk
to consume more and more memory since the transaction
will never terminate (even if the call is hung up),
ultimately leading to a restart or shutdown of Asterisk.
Outbound authentication must be configured on the endpoint
for this to occur.
more... | asterisk13 asterisk16 asterisk18
more detail |
2020-11-05 | VuXML ID 972fe546-1fb6-11eb-b9d4-001999f8d30b
The Asterisk project reports:
Upon receiving a new SIP Invite, Asterisk did not
return the created dialog locked or referenced. This
caused a gap between the creation of the dialog object,
and its next use by the thread that created it. Depending
upon some off nominal circumstances, and timing it was
possible for another thread to free said dialog in this
gap. Asterisk could then crash when the dialog object,
or any of its dependent objects were de-referenced, or
accessed next by the initial creation thread.
more... | asterisk13 asterisk16 asterisk18
more detail |
2020-11-03 | VuXML ID 3ec6ab59-1e0c-11eb-a428-3065ec8fd3ec
Chrome Releases reports:
This release contains 10 security fixes, including:
- [1138911] High CVE-2020-16004: Use after free in user interface.
Reported by Leecraso and Guang Gong of 360 Alpha Lab working with
360 BugCloud on 2020-10-15
- [1139398] High CVE-2020-16005: Insufficient policy enforcement
in ANGLE. Reported by Jaehun Jeong (@n3sk) of Theori on
2020-10-16
- [1133527] High CVE-2020-16006: Inappropriate implementation in
V8. Reported by Bill Parks on 2020-09-29
- [1125018] High CVE-2020-16007: Insufficient data validation in
installer. Reported by Abdelhamid Naceri (halov) on
2020-09-04
- [1134107] High CVE-2020-16008: Stack buffer overflow in WebRTC.
Reported by Tolya Korniltsev on 2020-10-01
- [1143772] High CVE-2020-16009: Inappropriate implementation in
V8. Reported by Clement Lecigne of Google's Threat Analysis Group
and Samuel Groß of Google Project Zero on 2020-10-29
- [1144489] High CVE-2020-16011: Heap buffer overflow in UI on
Windows. Reported by Sergei Glazunov of Google Project Zero on
2020-11-01
There are reports that an exploit for CVE-2020-16009 exists in the
wild.
more... | chromium
more detail |
2020-11-02 | VuXML ID 11325357-1d3c-11eb-ab74-4c72b94353b5
wordpress developers reports:
Ten security issues affect WordPress versions 5.5.1 and earlier. If you havent yet updated to 5.5,
all WordPress versions since 3.7 have also been updated to fix the following security issues:
-Props to Alex Concha of the WordPress Security Team for their work in hardening deserialization requests.
-Props to David Binovec on a fix to disable spam embeds from disabled sites on a multisite network.
-Thanks to Marc Montas from Sucuri for reporting an issue that could lead to XSS from global variables.
-Thanks to Justin Tran who reported an issue surrounding privilege escalation in XML-RPC. He also found and disclosed an issue around privilege escalation around post commenting via XML-RPC.
-Props to Omar Ganiev who reported a method where a DoS attack could lead to RCE.
-Thanks to Karim El Ouerghemmi from RIPS who disclosed a method to store XSS in post slugs.
-Thanks to Slavco for reporting, and confirmation from Karim El Ouerghemmi, a method to bypass protected meta that could lead to arbitrary file deletion.
more... | de-wordpress fr-wordpress ja-wordpress ru-wordpress wordpress zh_CN-wordpress zh_TW-wordpress
more detail |
2020-11-02 | VuXML ID 174e466b-1d48-11eb-bd0f-001b217b3468
Gitlab reports:
Path Traversal in LFS Upload
Path traversal allows saving packages in arbitrary location
Kubernetes agent API leaks private repos
Terraform state deletion API exposes object storage URL
Stored-XSS in error message of build-dependencies
Git credentials persisted on disk
Potential Denial of service via container registry
Info leak when group is transferred from private to public group
Limited File Disclosure Via Multipart Bypass
Unauthorized user is able to access scheduled pipeline variables and values
CSRF in runner administration page allows an attacker to pause/resume runners
Regex backtracking attack in path parsing of Advanced Search result
Bypass of required CODEOWNERS approval
SAST CiConfiguration information visible without permissions
more... | gitlab-ce
more detail |
2020-10-30 | VuXML ID 8827134c-1a8f-11eb-9bb0-08002725d892
Nicholas Marriott reports:
tmux has a stack overflow in CSI parsing.
more... | tmux
more detail |
2020-10-30 | VuXML ID 9ca85b7c-1b31-11eb-8762-005056a311d1
The Samba Team reports:
- CVE-2020-14318: Missing handle permissions check in SMB1/2/3 ChangeNotify
- CVE-2020-14323: Unprivileged user can crash winbind
- CVE-2020-14383: An authenticated user can crash the DCE/RPC DNS with easily crafted records
more... | samba410 samba411 samba412 samba413
more detail |
2020-10-28 | VuXML ID 94ffc0d9-1915-11eb-b809-b42e991fc52e
cxsecurity.com reports:
A Denial of Service condition in Motion-Project Motion 3.2 through
4.3.1 allows remote unauthenticated users to cause a webu.c
segmentation fault and kill the main process via a crafted HTTP
request
more... | motion
more detail |
2020-10-22 | VuXML ID 190176ce-3b3a-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before 9.5.3, ajax/comments.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any database table (e.g., glpi_tickets, glpi_users, etc.).
more... | glpi
more detail |
2020-10-22 | VuXML ID 458df97f-1440-11eb-aaec-e0d55e2a8bf9
The freetype project reports:
A heap buffer overflow has been found in the handling of embedded
PNG bitmaps, introduced in FreeType version 2.6.
more... | freetype2
more detail |
2020-10-22 | VuXML ID 695b2310-3b3a-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before 9.5.3, ajax/getDropdownValue.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any itemType (e.g., Ticket, Users, etc.).
more... | glpi
more detail |
2020-10-21 | VuXML ID f4722927-1375-11eb-8711-3065ec8fd3ec
Chrome Releases reports:
This release includes 5 security fixes:
- [1125337] High CVE-2020-16000: Inappropriate implementation in
Blink. Reported by amaebi_jp on 2020-09-06
- [1135018] High CVE-2020-16001: Use after free in media.
Reported by Khalil Zhani on 2020-10-05
- [1137630] High CVE-2020-16002: Use after free in PDFium.
Reported by Weipeng Jiang (@Krace) from Codesafe Team of Legendsec
at Qi'anxin Group on 2020-10-13
- [1139963] High CVE-2020-15999: Heap buffer overflow in
Freetype. Reported by Sergei Glazunov of Google Project Zero on
2020-10-19
- [1134960] Medium CVE-2020-16003: Use after free in printing.
Reported by Khalil Zhani on 2020-10-04
more... | chromium
more detail |
2020-10-18 | VuXML ID a2565962-1156-11eb-9c9c-d4c9ef517024
The MariaDB project reports:
Details of this vulnerability have not yet been disclosed
more... | mariadb103-client mariadb103-server mariadb104-client mariadb104-server mariadb105-client mariadb105-server
more detail |
2020-10-17 | VuXML ID 5f39d80f-107c-11eb-8b47-641c67a117d8
Matrix developers reports:
The fallback authentication endpoint served via Synapse were vulnerable
to cross-site scripting (XSS) attacks. The impact depends on the
configuration of the domain that Synapse is deployed on, but may allow
access to cookies and other browser data, CSRF vulnerabilities, and
access to other resources served on the same domain or parent domains.
more... | py36-matrix-synapse py37-matrix-synapse py38-matrix-synapse py39-matrix-synapse
more detail |
2020-10-17 | VuXML ID 95d9d986-1078-11eb-ab74-4c72b94353b5
Drupal Security Team reports:
The Drupal AJAX API does not disable JSONP by default, which can
lead to cross-site scripting.
more... | drupal7
more detail |
2020-10-14 | VuXML ID a6860b11-0dee-11eb-94ff-6805ca2fa271
PowerDNS Team reports:
CVE-2020-25829: An issue has been found in PowerDNS Recursor where a
remote attacker can cause the cached records for a given name to be
updated to the ?Bogus? DNSSEC validation state, instead of their actual
DNSSEC ?Secure? state, via a DNS ANY query. This results in a denial
of service for installations that always validate (dnssec=validate)
and for clients requesting validation when on-demand validation is
enabled (dnssec=process).
more... | powerdns-recursor
more detail |
2020-10-13 | VuXML ID 42926d7b-0da3-11eb-8dbd-6451062f0f7a
Adobe reports:
- This update resolves a NULL pointer dereference vulnerability
that could lead to arbitrary code execution (CVE-2020-9746).
more... | linux-flashplayer
more detail |
2020-10-10 | VuXML ID 040707f9-0b2a-11eb-8834-00155d01f202
NIST reports:
- Heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
more... | mozjpeg
more detail |
2020-10-10 | VuXML ID 23a667c7-0b28-11eb-8834-00155d01f202
libjpeg-turbo releases reports:
This release fixes the following security issue:
- Heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
more... | libjpeg-turbo
more detail |
2020-10-10 | VuXML ID 95f306a6-0aee-11eb-add4-08002728f74c
Ruby on Rails blog:
Rails version 6.0.3.4 has been released! This version is a security
release and addresses one possible XSS attack vector in Actionable
Exceptions.
more... | rubygem-actionpack60
more detail |
2020-10-07 | VuXML ID 64988354-0889-11eb-a01b-e09467587c17
Chrome releases reports:
This release contains 35 security fixes, including:
- [1127322] Critical CVE-2020-15967: Use after free in payments.
Reported by Man Yue Mo of GitHub Security Lab on 2020-09-11
- [1126424] High CVE-2020-15968: Use after free in Blink.
Reported by Anonymous on 2020-09-09
- [1124659] High CVE-2020-15969: Use after free in WebRTC.
Reported by Anonymous on 2020-09-03
- [1108299] High CVE-2020-15970: Use after free in NFC. Reported
by Man Yue Mo of GitHub Security Lab on 2020-07-22
- [1114062] High CVE-2020-15971: Use after free in printing.
Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on
2020-08-07
- [1115901] High CVE-2020-15972: Use after free in audio.
Reported by Anonymous on 2020-08-13
- [1133671] High CVE-2020-15990: Use after free in autofill.
Reported by Rong Jian and Guang Gong of Alpha Lab, Qihoo 360 on
2020-09-30
- [1133688] High CVE-2020-15991: Use after free in password
manager. Reported by Rong Jian and Guang Gong of Alpha Lab, Qihoo
360 on 2020-09-30
- [1106890] Medium CVE-2020-15973: Insufficient policy
enforcement in extensions. Reported by David Erceg on
2020-07-17
- [1104103] Medium CVE-2020-15974: Integer overflow in Blink.
Reported by Juno Im (junorouse) of Theori on 2020-07-10
- [1110800] Medium CVE-2020-15975: Integer overflow in
SwiftShader. Reported by Anonymous on 2020-07-29
- [1123522] Medium CVE-2020-15976: Use after free in WebXR.
Reported by YoungJoo Lee (@ashuu_lee) of Raon Whitehat on
2020-08-31
- [1083278] Medium CVE-2020-6557: Inappropriate implementation
in networking. Reported by Matthias Gierlings and Marcus Brinkmann
(NDS Ruhr-University Bochum) on 2020-05-15
- [1097724] Medium CVE-2020-15977: Insufficient data validation
in dialogs. Reported by Narendra Bhati (@imnarendrabhati) on
2020-06-22
- [1116280] Medium CVE-2020-15978: Insufficient data validation
in navigation. Reported by Luan Herrera (@lbherrera_) on
2020-08-14
- [1127319] Medium CVE-2020-15979: Inappropriate implementation
in V8. Reported by Avihay Cohen (@SeraphicAlgorithms) on
2020-09-11
- [1092453] Medium CVE-2020-15980: Insufficient policy
enforcement in Intents. Reported by Yongke Wang (@Rudykewang) and
Aryb1n (@aryb1n) of Tencent Security Xuanwu Lab on 2020-06-08
- [1123023] Medium CVE-2020-15981: Out of bounds read in audio.
Reported by Christoph Guttandin on 2020-08-28
- [1039882] Medium CVE-2020-15982: Side-channel information
leakage in cache. Reported by Luan Herrera (@lbherrera_) on
2020-01-07
- [1076786] Medium CVE-2020-15983: Insufficient data validation
in webUI. Reported by Jun Kokatsu, Microsoft Browser Vulnerability
Research on 2020-04-30
- [1080395] Medium CVE-2020-15984: Insufficient policy
enforcement in Omnibox. Reported by Rayyan Bijoora on
2020-05-07
- [1099276] Medium CVE-2020-15985: Inappropriate implementation
in Blink. Reported by Abdulrahman Alqabandi, Microsoft Browser
Vulnerability Research on 2020-06-25
- [1100247] Medium CVE-2020-15986: Integer overflow in media.
Reported by Mark Brand of Google Project Zero on 2020-06-29
- [1127774] Medium CVE-2020-15987: Use after free in WebRTC.
Reported by Philipp Hancke on 2020-09-14
- [1110195] Medium CVE-2020-15992: Insufficient policy
enforcement in networking. Reported by Alison Huffman, Microsoft
Browser Vulnerability Research on 2020-07-28
- [1092518] Low CVE-2020-15988: Insufficient policy enforcement
in downloads. Reported by Samuel Attard on 2020-06-08
- [1108351] Low CVE-2020-15989: Uninitialized Use in PDFium.
Reported by Gareth Evans (Microsoft) on 2020-07-22
more... | chromium
more detail |
2020-10-07 | VuXML ID 769a4f60-9056-4c27-89a1-1758a59a21f8
Jon Siwek of Corelight reports:
This release fixes the following security issue:
- A memory leak in multipart MIME code has potential
for remote exploitation and cause for Denial of Service
via resource exhaustion.
more... | zeek
more detail |
2020-10-06 | VuXML ID 71c71ce0-0805-11eb-a3a4-0019dbb15b3f
Payara Releases reports:
The following is a list of tracked Common Vulnerabilities and Exposures that have been reported and analyzed, which can or have impacted Payara Server across releases:
- CVE-2018-14721 FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks
- CVE-2018-14720 FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct external XML entity (XXE) attacks
- CVE-2018-14719 FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code
- CVE-2018-14718 FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code
- CVE-2018-14371 Eclipse Mojarra before 2.3.7 is affected by Directory Traversal via the loc parameter
more... | payara
more detail |
2020-10-06 | VuXML ID b07bdd3c-0809-11eb-a3a4-0019dbb15b3f
Payara Releases reports:
The following is a list of tracked Common Vulnerabilities and Exposures that have been reported and analyzed, which can or have impacted Payara Server across releases:
- CVE-2020-6950 Eclipse Mojarra vulnerable to path trasversal flaw via either loc/con parameters
more... | payara
more detail |
2020-10-06 | VuXML ID bd159669-0808-11eb-a3a4-0019dbb15b3f
Payara Releases reports:
The following is a list of tracked Common Vulnerabilities and Exposures that have been reported and analyzed, which can or have impacted Payara Server across releases:
- CVE-2019-12086 A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9
more... | payara
more detail |
2020-10-05 | VuXML ID cff0b2e2-0716-11eb-9e5d-08002728f74c
Release notes:
Lots of fixes exposed by fuzzers like AFL, ClusterFuzz, OSSFuzz and others:
CVE-2016-6328: fixed integer overflow when parsing maker notes
CVE-2017-7544: fixed buffer overread
CVE-2018-20030: Fix for recursion DoS
CVE-2019-9278: replaced integer overflow checks the compiler could optimize away by safer constructs
CVE-2020-0093: read overflow
CVE-2020-12767: fixed division by zero
CVE-2020-13112: Various buffer overread fixes due to integer overflows in maker notes
CVE-2020-13113: Potential use of uninitialized memory
CVE-2020-13114: Time consumption DoS when parsing canon array markers
more... | libexif
more detail |
2020-10-04 | VuXML ID c71ed065-0600-11eb-8758-e0d55e2a8bf9
Albert Astals Cid reports:
KDE Project Security Advisory
Title |
KDE Connect: packet manipulation can be exploited in a Denial of Service attack |
Risk Rating |
Important |
CVE |
CVE-2020-26164 |
Versions |
kdeconnect <= 20.08.1 |
Author |
Albert Vaca Cintora |
Date |
2 October 2020 |
Overview
An attacker on your local network could send maliciously crafted
packets to other hosts running kdeconnect on the network, causing
them to use large amounts of CPU, memory or network connections,
which could be used in a Denial of Service attack within the
network.
Impact
Computers that run kdeconnect are susceptible to DoS attacks from
the local network.
Workaround
We advise you to stop KDE Connect when on untrusted networks like
those on airports or conferences.
Since kdeconnect is dbus activated it is relatively hard to make
sure it stays stopped so the brute force approach is to uninstall
the kdeconnect package from your system and then run
kquitapp5 kdeconnectd
Just install the package again once you're back in a trusted
network.
Solution
KDE Connect 20.08.2 patches several code paths that could result
in a DoS.
You can apply these patches on top of 20.08.1:
-
https://invent.kde.org/network/kdeconnect-kde/-/commit/f183b5447bad47655c21af87214579f03bf3a163
-
https://invent.kde.org/network/kdeconnect-kde/-/commit/b279c52101d3f7cc30a26086d58de0b5f1c547fa
-
https://invent.kde.org/network/kdeconnect-kde/-/commit/d35b88c1b25fe13715f9170f18674d476ca9acdc
-
https://invent.kde.org/network/kdeconnect-kde/-/commit/b496e66899e5bc9547b6537a7f44ab44dd0aaf38
-
https://invent.kde.org/network/kdeconnect-kde/-/commit/5310eae85dbdf92fba30375238a2481f2e34943e
-
https://invent.kde.org/network/kdeconnect-kde/-/commit/721ba9faafb79aac73973410ee1dd3624ded97a5
-
https://invent.kde.org/network/kdeconnect-kde/-/commit/ae58b9dec49c809b85b5404cee17946116f8a706
-
https://invent.kde.org/network/kdeconnect-kde/-/commit/66c768aa9e7fba30b119c8b801efd49ed1270b0a
-
https://invent.kde.org/network/kdeconnect-kde/-/commit/85b691e40f525e22ca5cc4ebe79c361d71d7dc05
-
https://invent.kde.org/network/kdeconnect-kde/-/commit/48180b46552d40729a36b7431e97bbe2b5379306
Credits
Thanks Matthias Gerstner and the openSUSE security team for
reporting the issue.
Thanks to Aleix Pol, Nicolas Fella and Albert Vaca Cintora for the
patches.
more... | kdeconnect-kde
more detail |
2020-10-03 | VuXML ID a23871f6-059b-11eb-8758-e0d55e2a8bf9
CVE mitre reports:
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
more... | upnp
more detail |
2020-10-02 | VuXML ID a3495e61-047f-11eb-86ea-001b217b3468
Gitlab reports:
Potential Denial Of Service Via Update Release Links API
Insecure Storage of Session Key In Redis
Improper Access Expiration Date Validation
Cross-Site Scripting in Multiple Pages
Unauthorized Users Can View Custom Project Template
Cross-Site Scripting in SVG Image Preview
Incomplete Handling in Account Deletion
Insufficient Rate Limiting at Re-Sending Confirmation Email
Improper Type Check in GraphQL
To-dos Are Not Redacted When Membership Changes
Guest users can modify confidentiality attribute
Command injection on runner host
Insecure Runner Configuration in Kubernetes Environments
more... | gitlab-ce
more detail |
2020-10-01 | VuXML ID 6a467439-3b38-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of every other user, even admin ones. This issue is fixed in version 9.5.3. As a workaround, one can remove the caldav.php file to block access to CalDAV server.
more... | glpi
more detail |
2020-09-28 | VuXML ID 6d5f1b0b-b865-48d5-935b-3fb6ebb425fc
Apache reports:
Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the
default temporary directory identified by the Java
system property java.io.tmpdir for several tasks and
may thus leak sensitive information. The fixcrlf and
replaceregexp tasks also copy files from the temporary
directory back into the build tree allowing an attacker
to inject modified source files into the build
process.
more... | apache-ant
more detail |
2020-09-26* | VuXML ID 456375e1-cd09-11ea-9172-4c72b94353b5
Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is:
The heap based buffer overflow can be used to get code execution. The component is:
function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop
condition. The attack vector is: Bug can be used when application pass invalid utf-8
strings to functions like pango_itemize.
more... | pango
more detail |
2020-09-24 | VuXML ID b371db92-fe34-11ea-b90e-6805ca2fa271
PowerDNS Team reports
CVE-2020-17482: An issue has been found in PowerDNS Authoritative
Server before 4.3.1 where an authorized user with the
ability to insert crafted records into a zone might
be able to leak the content of uninitialized memory.
Such a user could be a customer inserting data via a
control panel, or somebody with access to the REST
API. Crafted records cannot be inserted via AXFR.
more... | powerdns
more detail |
2020-09-22 | VuXML ID e68d3db1-fd04-11ea-a67f-e09467587c17
Chrome Releases reports:
This release fixes 10 security issues, including:
- [1100136] High CVE-2020-15960: Out of bounds read in storage.
Reported by Anonymous on 2020-06-28
- [1114636] High CVE-2020-15961: Insufficient policy
enforcement in extensions. Reported by David Erceg on
2020-08-10
- [1121836] High CVE-2020-15962: Insufficient policy
enforcement in serial. Reported by Leecraso and Guang Gong of 360
Alpha Lab working with 360 BugCloud on 2020-08-26
- [1113558] High CVE-2020-15963: Insufficient policy
enforcement in extensions. Reported by David Erceg on
2020-08-06
- [1126249] High CVE-2020-15965: Out of bounds write in V8.
Reported by Lucas Pinheiro, Microsoft Browser Vulnerability
Research on 2020-09-08
- [1113565] Medium CVE-2020-15966: Insufficient policy
enforcement in extensions. Reported by David Erceg on
2020-08-06
- [1121414] Low CVE-2020-15964: Insufficient data validation in
media. Reported by Woojin Oh(@pwn_expoit) of STEALIEN on
2020-08-25
more... | chromium
more detail |
2020-09-22 | VuXML ID f5abafc0-fcf6-11ea-8758-e0d55e2a8bf9
CVE mitre reports:
CVE-2019-20388
xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.
CVE-2020-7595
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
CVE-2020-24977
GNOME project libxml2 v2.9.10 and earlier have a global buffer over-read vulnerability in xmlEncodeEntitiesInternal
more... | libxml2
more detail |
2020-09-21 | VuXML ID 2327234d-fc4b-11ea-adef-641c67a117d8
Problem Description:
Affected Synapse versions assume that all events have an "origin" field set. If an event
without the "origin" field is sent into a federated room, servers not already joined to
the room will be unable to do so due to failing to fetch the malformed event.
Impact:
An attacker could cause a denial of service by deliberately sending a malformed event
into a room, thus preventing new servers (and thus their users) from joining the
room.
more... | py36-matrix-synapse py37-matrix-synapse py38-matrix-synapse
more detail |
2020-09-20 | VuXML ID 24ace516-fad7-11ea-8d8c-005056a311d1
The Samba Team reports:
An unauthenticated attacker on the network can gain
administrator access by exploiting a netlogon protocol flaw.
more... | samba410 samba411 samba412
more detail |
2020-09-20 | VuXML ID 2cb21232-fb32-11ea-a929-a4bf014bf5f7
Python reports:
bpo-39603: Prevent http header injection by rejecting control characters in http.client.putrequest(?).
bpo-29778: Ensure python3.dll is loaded from correct locations when Python is embedded (CVE-2020-15523).
bpo-41004: CVE-2020-14422: The __hash__() methods of ipaddress.IPv4Interface and ipaddress.IPv6Interface incorrectly generated constant hash values of 32 and 128 respectively. This resulted in always causing hash collisions. The fix uses hash() to generate hash values for the tuple of (address, mask length, network address).
bpo-39073: Disallow CR or LF in email.headerregistry.Address arguments to guard against header injection attacks.
bpo-38576: Disallow control characters in hostnames in http.client, addressing CVE-2019-18348. Such potentially malicious header injection URLs now cause a InvalidURL to be raised.
bpo-39503: CVE-2020-8492: The AbstractBasicAuthHandler class of the urllib.request module uses an inefficient regular expression which can be exploited by an attacker to cause a denial of service. Fix the regex to prevent the catastrophic backtracking. Vulnerability reported by Ben Caller and Matt Schwager.
bpo-38945: Newline characters have been escaped when performing uu encoding to prevent them from overflowing into to content section of the encoded file. This prevents malicious or accidental modification of data during the decoding process.
bpo-38804: Fixes a ReDoS vulnerability in http.cookiejar. Patch by Ben Caller.
bpo-39017: Avoid infinite loop when reading specially crafted TAR files using the tarfile module (CVE-2019-20907).
bpo-41183: Use 3072 RSA keys and SHA-256 signature for test certs and keys.
bpo-39503: AbstractBasicAuthHandler of urllib.request now parses all WWW-Authenticate HTTP headers and accepts multiple challenges per header: use the realm of the first Basic challenge.
more... | python35
more detail |
2020-09-20 | VuXML ID 2eec1e85-faf3-11ea-8ac0-4437e6ad11c4
tt-rss project reports:
The cached_url feature mishandles JavaScript inside an SVG document.
imgproxy in plugins/af_proxy_http/init.php mishandles $_REQUEST["url"] in an error message.
It does not validate all URLs before requesting them.
Allows remote attackers to execute arbitrary PHP code via a crafted plural forms header.
more... | tt-rss
more detail |
2020-09-19 | VuXML ID eeec4e6f-fa71-11ea-9bb7-d4c9ef517024
The Nextcloud project reports:
NC-SA-2020-026 (low): Password of share by mail is not hashed when
given on the create share call
A logic error in Nextcloud Server 19.0.0 caused a plaintext storage
of the share password when it was given on the initial create API
call.
more... | nextcloud
more detail |
2020-09-16 | VuXML ID 2c5b9cd7-f7e6-11ea-88f8-901b0ef719ab
Problem Description:
AMD and Intel CPUs support hardware virtualization using specialized data
structures that control various aspects of guest operation. These are the
Virtual Machine Control Structure (VMCS) on Intel CPUs, and the Virtual
Machine Control Block (VMCB) on AMD CPUs. Insufficient access controls allow
root users, including those running in a jail, to change these data
structures.
Impact:
An attacker with host root access (including to a jailed bhyve instance) can
use this vulnerability to achieve kernel code execution.
more... | FreeBSD-kernel
more detail |
2020-09-16 | VuXML ID 4ca5894c-f7f1-11ea-8ff8-0022489ad614
Node.js reports:
Updates are now available for v10,x, v12.x and v14.x Node.js release lines for the following issues.
HTTP Request Smuggling due to CR-to-Hyphen conversion (High) (CVE-2020-8201)
Affected Node.js versions converted carriage returns in HTTP request headers to a hyphen before parsing. This can lead to HTTP Request Smuggling as it is a non-standard interpretation of the header.
Impacts:
- All versions of the 14.x and 12.x releases line
Denial of Service by resource exhaustion CWE-400 due to unfinished HTTP/1.1 requests (Critical) (CVE-2020-8251)
Node.js is vulnerable to HTTP denial of service (DOS) attacks based on delayed requests submission which can make the server unable to accept new connections. The fix a new http.Server option called requestTimeout with a default value of 0 which means it is disabled by default. This should be set when Node.js is used as an edge server, for more details refer to the documentation.
Impacts:
- All versions of the 14.x release line
fs.realpath.native on may cause buffer overflow (Medium) (CVE-2020-8252)
libuv's realpath implementation incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
Impacts:
- All versions of the 10.x release line
- All versions of the 12.x release line
- All versions of the 14.x release line before 14.9.0
more... | node node10 node12
more detail |
2020-09-16 | VuXML ID 6d334fdb-f7e7-11ea-88f8-901b0ef719ab
Problem Description:
A ftpd(8) bug in the implementation of the file system sandbox, combined
with capabilities available to an authenticated FTP user, can be used to
escape the file system restriction configured in ftpchroot(5).
Moreover, the bug allows a malicious client to gain root privileges.
Impact:
A malicious FTP user can gain privileged access to an affected system.
more... | FreeBSD
more detail |
2020-09-16 | VuXML ID bb53af7b-f7e4-11ea-88f8-901b0ef719ab
Problem Description:
A programming error in the ure(4) device driver caused some Realtek USB
Ethernet interfaces to incorrectly report packets with more than 2048 bytes
in a single USB transfer as having a length of only 2048 bytes.
An adversary can exploit this to cause the driver to misinterpret part of the
payload of a large packet as a separate packet, and thereby inject packets
across security boundaries such as VLANs.
Impact:
An attacker that can send large frames (larger than 2048 bytes in size) to be
received by the host (be it VLAN, or non-VLAN tagged packet), can inject
arbitrary packets to be received and processed by the host. This includes
spoofing packets from other hosts, or injecting packets to other VLANs than
the host is on.
more... | FreeBSD-kernel
more detail |
2020-09-16 | VuXML ID e73c688b-f7e6-11ea-88f8-901b0ef719ab
Problem Description:
A number of AMD virtualization instructions operate on host physical
addresses, are not subject to nested page table translation, and guest use of
these instructions was not trapped.
Impact:
From kernel mode a malicious guest can write to arbitrary host memory (with
some constraints), affording the guest full control of the host.
more... | FreeBSD-kernel
more detail |
2020-09-12 | VuXML ID 7b630362-f468-11ea-a96c-08002728f74c
Ruby on Rails blog:
Rails 5.2.4.4 and 6.0.3.3 have been released! These releases contain an
important security fix, so please upgrade when you can.
Both releases contain the following fix: [CVE-2020-15169] Potential XSS
vulnerability in Action View
more... | rubygem-actionview52 rubygem-actionview60
more detail |
2020-09-09 | VuXML ID 2c92fdd3-896c-4a5a-a0d8-52acee69182d
Jon Siwek of Corelight reports:
This release fixes the following security issue:
- The AYIYA and GTPv1 parsing/decapsulation logic may
leak memory -- These leaks have potential for remote
exploitation to cause Denial of Service via resource
exhaustion.
more... | zeek
more detail |
2020-09-09 | VuXML ID bed5d41a-f2b4-11ea-a878-e09467587c17
Chrome Releases reports:
This release contains 5 security fixes:
- [1116304] High CVE-2020-6573: Use after free in video. Reported
by Leecraso and Guang Gong of 360 Alpha Lab working with 360
BugCloud on 2020-08-14
- [1102196] High CVE-2020-6574: Insufficient policy
enforcement in installer. Reported by CodeColorist of
Ant-Financial LightYear Labs on 2020-07-05
- [1081874] High CVE-2020-6575: Race in Mojo. Reported by
Microsoft on 2020-05-12
- [1111737] High CVE-2020-6576: Use after free in offscreen
canvas. Reported by Looben Yang on 2020-07-31
- [1122684] High CVE-2020-15959: Insufficient policy enforcement
in networking. Reported by Eric Lawrence of Microsoft on
2020-08-27
more... | chromium
more detail |
2020-09-07 | VuXML ID 3749ae9e-f132-11ea-97da-d05099c0ae8c
Chen Nan of Chaitin Security Research Lab reports:
Fix buffer overflow introduced in version 5.8: processing of
template %aX in a RADIUS authentication response might lead
to unexpected termination of the mpd5 process.
Installations not using RADIUS or not using %aX templates
in RADIUS attributes were not affected.
Fix buffer overflow in parsing of L2TP control packets
introduced in version 4.0 that initially brought in L2TP
support: a specially crafted incoming L2TP control packet
might lead to unexpected termination of the process.
Installations with neither L2TP clients nor L2TP server
configured are not affected.
more... | mpd5
more detail |
2020-09-07* | VuXML ID cd97c7ca-f079-11ea-9c31-001b216d295b
Version 5.9 contains security fix for L2TP clients and servers.
Insufficient validation of incoming L2TP control packet
specially crafted by unauthenticated user might lead to unexpected
termination of the process. The problem affects mpd versions
since 4.0 that brought in initial support for L2TP.
Installations not using L2TP clients nor L2TP server configuration were not affected.
more... | mpd5
more detail |
2020-09-06 | VuXML ID 2272e6f1-f029-11ea-838a-0011d823eebd
The GnuTLS project reports:
It was found by oss-fuzz that the server sending a
"no_renegotiation" alert in an unexpected timing, followed by an
invalid second handshake can cause a TLS 1.3 client to crash via a
null-pointer dereference. The crash happens in the application's
error handling path, where the gnutls_deinit function is called
after detecting a handshake failure.
more... | gnutls
more detail |
2020-09-06 | VuXML ID 4c69240f-f02c-11ea-838a-0011d823eebd
Manuel Pégourié-Gonnard reports:
When decrypting/authenticating (D)TLS record in a connection using
a CBC ciphersuite without the Encrypt-then-Mac extension RFC 7366,
Mbed TLS used dummy rounds of the compression function associated
with the hash used for HMAC in order to hide the length of the
padding to remote attackers, as recommended in the original Lucky
Thirteen paper.
A local attacker who is able to observe the state of the cache
could monitor the presence of mbedtls_md_process() in the cache in
order to determine when the actual computation ends and when the
dummy rounds start. This is a reliable target as it's always called
at least once, in response to a previous attack. The attacker can
then continue with one of many well-documented Lucky 13
variants.
more... | mbedtls
more detail |
2020-09-06 | VuXML ID bcdeb6d2-f02d-11ea-838a-0011d823eebd
Manuel Pégourié-Gonnard reports:
An attacker with access to precise enough timing and memory access
information (typically an untrusted operating system attacking a
secure enclave such as SGX or the TrustZone secure world) can
recover the private keys used in RSA or static (finite-field)
Diffie-Hellman operations.
more... | mbedtls
more detail |
2020-09-05 | VuXML ID 002432c8-ef6a-11ea-ba8f-08002728f74c
Django Release notes:
CVE-2020-24583: Incorrect permissions on intermediate-level directories
on Python 3.7+
On Python 3.7+, FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied
to intermediate-level directories created in the process of uploading
files and to intermediate-level collected static directories when using
the collectstatic management command.
CVE-2020-24584: Permission escalation in intermediate-level directories
of the file system cache on Python 3.7+
On Python 3.7+, the intermediate-level directories of the file system
cache had the system's standard umask rather than 0o077 (no group or
others permissions).
more... | py35-django22 py36-django22 py36-django30 py36-django31 py37-django22 py37-django30 py37-django31 py38-django22 py38-django30 py38-django31
more detail |
2020-09-05* | VuXML ID 6842ac7e-d250-11ea-b9b7-08002728f74c
JasPer NEWS:
- Fix CVE-2018-9154
- Fix CVE-2018-19541
- Fix CVE-2016-9399, CVE-2017-13751
- Fix CVE-2018-19540
- Fix CVE-2018-9055
- Fix CVE-2017-13748
- Fix CVE-2017-5503, CVE-2017-5504, CVE-2017-5505
- Fix CVE-2018-9252
- Fix CVE-2018-19139
- Fix CVE-2018-19543, CVE-2017-9782
- Fix CVE-2018-20570
- Fix CVE-2018-20622
- Fix CVE-2016-9398
- Fix CVE-2017-14132
- Fix CVE-2017-5499
- Fix CVE-2018-18873
- Fix CVE-2017-13750
more... | jasper
more detail |
2020-09-03 | VuXML ID f9fa7adc-ee51-11ea-a240-002590acae31
Importing an OpenPGP key having a preference list for AEAD algorithms
will lead to an array overflow and thus often to a crash or other
undefined behaviour.
Importing an arbitrary key can often easily be triggered by an attacker
and thus triggering this bug. Exploiting the bug aside from crashes is
not trivial but likely possible for a dedicated attacker. The major
hurdle for an attacker is that only every second byte is under their
control with every first byte having a fixed value of 0x04.
more... | gnupg
more detail |
2020-09-02 | VuXML ID 1fb13175-ed52-11ea-8b93-001b217b3468
Gitlab reports:
Vendor Cross-Account Assume-Role Attack
Stored XSS on the Vulnerability Page
Outdated Job Token Can Be Reused to Access Unauthorized Resources
File Disclosure Via Workhorse File Upload Bypass
Unauthorized Maintainer Can Edit Group Badge
Denial of Service Within Wiki Functionality
Sign-in Vulnerable to Brute-force Attacks
Invalidated Session Allows Account Access With an Old Password
GitLab Omniauth Endpoint Renders User Controlled Messages
Blind SSRF Through Repository Mirroring
Information Disclosure Through Incorrect Group Permission Verifications
No Rate Limit on GitLab Webhook Feature
GitLab Session Revocation Feature Does Not Invalidate All Sessions
OAuth Authorization Scope for an External Application Can Be Changed Without User Consent
Unauthorized Maintainer Can Delete Repository
Improper Verification of Deploy-Key Leads to Access Restricted Repository
Disabled Repository Still Accessible With a Deploy-Token
Duplicated Secret Code Generated by 2 Factor Authentication Mechanism
Lack of Validation Within Project Invitation Flow
Current Sessions Not Invalidated Upon Enabling 2 Factor Authentication
Users Without 2 Factor Authentication Can Be Blocked Accessing GitLab
Lack of Upper Bound Check Leading to Possible Denial of Service
2 Factor Authentication for Groups Was Not Enforced Within API Endpoint
GitLab Runner Denial of Service via CI Jobs
Update jQuery Dependency
more... | gitlab-ce
more detail |
2020-09-02 | VuXML ID 74bbde13-ec17-11ea-88f8-901b0ef719ab
Problem Description:
Due to improper mbuf handling in the kernel, a use-after-free bug might be
triggered by sending IPv6 Hop-by-Hop options over the loopback interface.
Impact:
Triggering the use-after-free situation may result in unintended kernel
behaviour including a kernel panic.
more... | FreeBSD-kernel
more detail |
2020-09-02 | VuXML ID 762b7d4a-ec19-11ea-88f8-901b0ef719ab
Problem Description:
When parsing option 119 data, dhclient(8) computes the uncompressed domain
list length so that it can allocate an appropriately sized buffer to store
the uncompressed list. The code to compute the length failed to handle
certain malformed input, resulting in a heap overflow when the uncompressed
list is copied into in inadequately sized buffer.
Impact:
The heap overflow could in principle be exploited to achieve remote code
execution. The affected process runs with reduced privileges in a Capsicum
sandbox, limiting the immediate impact of an exploit. However, it is
possible the bug could be combined with other vulnerabilities to escape the
sandbox.
more... | FreeBSD
more detail |
2020-09-02 | VuXML ID 77b877aa-ec18-11ea-88f8-901b0ef719ab
Problem Description:
Due to improper handling in the kernel, a use-after-free bug can be triggered
by sending large user messages from multiple threads on the same socket.
Impact:
Triggering the use-after-free situation may result in unintended kernel
behaviour including a kernel panic.
more... | FreeBSD-kernel
more detail |
2020-09-01 | VuXML ID 67b050ae-ec82-11ea-9071-10c37b4ac2ea
The Go project reports:
When a Handler does not explicitly set the Content-Type header, both
CGI implementations default to ?text/html?. If an attacker can make
a server generate content under their control (e.g. a JSON
containing user data or an uploaded image file) this might be
mistakenly returned by the server as ?text/html?. If a victim visits
such a page they could get the attacker's code executed in the
context of the server origin. If an attacker can make a server
generate content under their control (e.g. a JSON containing user
data or an uploaded image file) this might be mistakenly returned by
the server as ?text/html?. If a victim visits such a page they could
get the attacker's code executed in the context of the server
origin.
more... | go
more detail |
2020-08-28 | VuXML ID 38fdf07b-e8ec-11ea-8bbe-e0d55e2a8bf9
Albert Astals Cid reports:
Overview
A maliciously crafted TAR archive containing symlink entries
would install files anywhere in the user's home directory upon extraction.
Proof of concept
For testing, an example of malicious archive can be found at
dirsymlink.tar
Impact
Users can unwillingly install files like a modified .bashrc, or a malicious
script placed in ~/.config/autostart.
Workaround
Before extracting a downloaded archive using the Ark GUI, users should inspect it
to make sure it doesn't contain symlink entries pointing outside the extraction folder.
The 'Extract' context menu from the Dolphin file manager shouldn't be used.
Solution
Ark 20.08.1 skips maliciously crafted symlinks when extracting TAR archives.
Alternatively, 8bf8c5ef07b0ac5e914d752681e470dea403a5bd can be applied to previous releases.
Credits
Thanks to Fabian Vogt for reporting this issue and for fixing it.
more... | ark
more detail |
2020-08-27 | VuXML ID ee261034-b95e-4479-b947-08b0877e029f
grigoritchy at gmail dot com reports:
The phar_parse_zipfile function had use-after-free
vulnerability because of mishandling of the actual_alias
variable.
more... | php72 php73 php74
more detail |
2020-08-26 | VuXML ID d73bc4e6-e7c4-11ea-a878-e09467587c17
Chrome Releases reports:
This update includes 20 security fixes, including:
- [1109120] High CVE-2020-6558: Insufficient policy
enforcement in iOS. Reported by Alison Huffman, Microsoft Browser
Vulnerability Research on 2020-07-24
- [1116706] High CVE-2020-6559: Use after free in presentation
API. Reported by Liu Wei and Wu Zekai of Tencent Security Xuanwu
Lab on 2020-08-15
- [1108181] Medium CVE-2020-6560: Insufficient policy
enforcement in autofill. Reported by Nadja Ungethuem from
www.unnex.de on 2020-07-22
- [932892] Medium CVE-2020-6561: Inappropriate implementation
in Content Security Policy. Reported by Rob Wu on 2019-02-16
- [1086845] Medium CVE-2020-6562: Insufficient policy
enforcement in Blink. Reported by Masato Kinugawa on
2020-05-27
- [1104628] Medium CVE-2020-6563: Insufficient policy
enforcement in intent handling. Reported by Pedro Oliveira on
2020-07-12
- [841622] Medium CVE-2020-6564: Incorrect security UI in
permissions. Reported by Khalil Zhani on 2018-05-10
- [1029907] Medium CVE-2020-6565: Incorrect security UI in
Omnibox. Reported by Khalil Zhani on 2019-12-02
- [1065264] Medium CVE-2020-6566: Insufficient policy
enforcement in media. Reported by Jun Kokatsu, Microsoft Browser
Vulnerability Research on 2020-03-27
- [937179] Low CVE-2020-6567: Insufficient validation of
untrusted input in command line handling. Reported by Joshua
Graham of TSS on 2019-03-01
- [1092451] Low CVE-2020-6568: Insufficient policy enforcement
in intent handling. Reported by Yongke Wang(@Rudykewang) and
Aryb1n(@aryb1n) of Tencent Security Xuanwu Lab on 2020-06-08
- [995732] Low CVE-2020-6569: Integer overflow in WebUSB.
Reported by guaixiaomei on 2019-08-20
- [1084699] Low CVE-2020-6570: Side-channel information leakage
in WebRTC. Reported by Signal/Tenable on 2020-05-19
- [1085315] Low CVE-2020-6571: Incorrect security UI in Omnibox.
Reported by Rayyan Bijoora on 2020-05-21
more... | chromium
more detail |
2020-08-25* | VuXML ID a003b74f-d7b3-11ea-9df1-001b217b3468
Gitlab reports:
Arbitrary File Read when Moving an Issue
Memory Exhaustion via Excessive Logging of Invite Email Error
Denial of Service Through Project Import Feature
User Controlled Git Configuration Settings Resulting in SSRF
Stored XSS in Issue Reference Number Tooltip
Stored XSS in Issues List via Milestone Title
Improper Access Control After Group Transfer
Bypass Email Verification Required for OAuth Flow
Confusion When Using Hexadecimal Branch Names
Insufficient OAuth Revocation
Improper Access Control for Project Sharing
Stored XSS in Jobs Page
Improper Access Control of Applications Page
SSRF into Shared Runner
Update Kramdown Gem
more... | gitlab-ce
more detail |
2020-08-25 | VuXML ID ffa15b3b-e6f6-11ea-8cbf-54e1ad3d6335
The X.org project reports:
All theses issuses can lead to local privileges elevation on
systems where the X server is running privileged.
The handler for the XkbSetNames request does not validate the
request length before accessing its contents.
An integer underflow exists in the handler for the
XIChangeHierarchy request.
An integer underflow exist in the handler for the XkbSelectEvents
request.
An integer underflow exist in the handler for the CreateRegister
request of the X record extension.
more... | xephyr xorg-dmx xorg-nestserver xorg-server xorg-vfbserver xwayland
more detail |
2020-08-22 | VuXML ID 719f06af-e45e-11ea-95a1-c3b8167b8026
Miroslav Lichvar reports:
chrony-3.5.1 [...] fixes a security issue in writing of the pidfile.
When chronyd is configured to save the pidfile in a directory where the
chrony user has write permissions (e.g. /var/run/chrony - the default
since chrony-3.4), an attacker that compromised the chrony user account
could create a symbolic link at the location of the pidfile to make
chronyd starting with root privileges follow the symlink and write its
process ID to a file for which the chrony user doesn't have write
permissions, causing a denial of service, or data loss.
This issue was reported by Matthias Gerstner of SUSE.
more... | chrony
more detail |
2020-08-20 | VuXML ID 08de38d2-e2d0-11ea-9538-0c9d925bbbc0
Ian Jackson and the adns project reports:
Vulnerable applications: all adns callers.
Exploitable by: the local recursive resolver.
Likely worst case: Remote code execution.
Vulnerable applications: those that make SOA queries.
Exploitable by: upstream DNS data sources.
Likely worst case: DoS (crash of the adns-using application)
Vulnerable applications: those that use adns_qf_quoteok_query.
Exploitable by: sources of query domain names.
Likely worst case: DoS (crash of the adns-using application)
Vulnerable applications: adnshost.
Exploitable by: code responsible for framing the input.
Likely worst case: DoS (adnshost crashes at EOF).
more... | adns
more detail |
2020-08-20 | VuXML ID 2ed7e8db-e234-11ea-9392-002590bc43be
Andrew Walker reports:
Issue 1:
Users are always granted permissions to cd into a directory. The
check for whether execute is present on directories is a de-facto
no-op. This cannot be mitigated without upgrading. Even setting
an explicit "deny - execute" NFSv4 ACE will be bypassed.
Issue 2:
All ACEs for the owner_group (group@) and regular groups
(group:) are granted the current user. This means that
POSIX mode 770 is de-facto 777, and the below ACL is also de-facto
777 because the groupmember check for builtin_administrators
returns True.
root@TESTBOX[~]# getfacl testfile
# file: testfile
# owner: root
# group: wheel
group:builtin_administrators:rwxpDdaARWcCos:-------:allow
more... | openzfs-kmod
more detail |
2020-08-20 | VuXML ID fbca6863-e2ad-11ea-9d39-00a09858faf5
Elastic reports:
A field disclosure flaw was found in Elasticsearch when running
a scrolling search with Field Level Security. If a user runs
the same query another more privileged user recently ran,
the scrolling search can leak fields that should be hidden.
This could result in an attacker gaining additional permissions
against a restricted index.
more... | elasticsearch6
more detail |
2020-08-19 | VuXML ID 3fcb70a4-e22d-11ea-98b2-080027846a02
Python reports:
bpo-29778: Ensure python3.dll is loaded from correct locations when
Python is embedded (CVE-2020-15523).
bpo-41004: CVE-2020-14422: The __hash__() methods of ipaddress.IPv4Interface
and ipaddress.IPv6Interface incorrectly generated constant hash values
of 32 and 128 respectively. This resulted in always causing hash collisions.
The fix uses hash() to generate hash values for the tuple of (address, mask
length, network address).
bpo-39603: Prevent http header injection by rejecting control characters
in http.client.putrequest(...).
more... | python36 python37
more detail |
2020-08-19 | VuXML ID b905dff4-e227-11ea-b0ea-08002728f74c
curl security problems:
CVE-2020-8231: wrong connect-only connection
An application that performs multiple requests with libcurl's multi API
and sets the CURLOPT_CONNECT_ONLY option, might in rare circumstances
experience that when subsequently using the setup connect-only transfer,
libcurl will pick and use the wrong connection - and instead pick
another one the application has created since then.
CURLOPT_CONNECT_ONLY is the option to tell libcurl to not perform an
actual transfer, only connect. When that operation is completed, libcurl
remembers which connection it used for that transfer and "easy handle".
It remembers the connection using a pointer to the internal connectdata
struct in memory.
If more transfers are then done with the same multi handle before the
connect-only connection is used, leading to the initial connect-only
connection to get closed (for example due to idle time-out) while also
new transfers (and connections) are setup, such a new connection might
end up getting the exact same memory address as the now closed
connect-only connection.
If after those operations, the application then wants to use the
original transfer's connect-only setup to for example use
curl_easy_send() to send raw data over that connection, libcurl could
erroneously find an existing connection still being alive at the address
it remembered since before even though this is now a new and different
connection.
The application could then accidentally send data over that connection
which wasn't at all intended for that recipient, entirely unknowingly.
more... | curl
more detail |
2020-08-19 | VuXML ID f60561e7-e23e-11ea-be64-507b9d01076a
Icinga development team reports:
CVE-2020-24368
Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a
Directory Traversal vulnerability which allows an attacker to access
arbitrary files that are readable by the process running Icinga Web
2. This issue is fixed in Icinga Web 2 in v2.6.4, v2.7.4 and v2.8.2.
more... | icingaweb2
more detail |
2020-08-18 | VuXML ID 64575bb6-e188-11ea-beed-e09467587c17
Chrome Releases reports:
This release contains one security fix:
- [1115345] High CVE-2020-6556: Heap buffer overflow in
SwiftShader. Reported by Alison Huffman, Microsoft Browser
Vulnerability Research on 2020-08-12
more... | chromium
more detail |
2020-08-18 | VuXML ID e37a0a7b-e1a7-11ea-9538-0c9d925bbbc0
the TrouSerS project reports reports:
If the tcsd daemon is started with root privileges, it fails to
drop the root gid after it is no longer needed.
If the tcsd daemon is started with root privileges, the tss user
has read and write access to the /etc/tcsd.conf file.
If the tcsd daemon is started with root privileges, the creation
of the system.data file is prone to symlink attacks.
more... | trousers
more detail |
2020-08-17 | VuXML ID 09ea1b08-1d3e-4bf2-91a1-d6573f4da3d8
Jenkins Security Advisory:
Description
(Critical) SECURITY-1983 / CVE-2019-17638
Buffer corruption in bundled Jetty
more... | jenkins jenkins-lts
more detail |
2020-08-16 | VuXML ID 085399ab-dfd7-11ea-96e4-80ee73bc7b66
rsync developers reports:
Various zlib fixes, including security fixes for CVE-2016-9843, CVE-2016-9842, CVE-2016-9841, and CVE-2016-9840
more... | rsync
more detail |
2020-08-16 | VuXML ID a23ebf36-e8b6-4665-b0f3-4c977f9a145c
py-ecdsa developers report:
Fix CVE-2019-14853 - possible DoS caused by malformed signature decoding.
Fix CVE-2019-14859 - signature malleability caused by insufficient checks of DER encoding
more... | py27-ecdsa py37-ecdsa
more detail |
2020-08-16 | VuXML ID f20eb9a4-dfea-11ea-a9b8-9c5c8e84d621
Red Hat bugzilla reports:
A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway).
The vulnerability is related to the injection of HTTP headers via a CORS
ExposeHeader tag. The newline character in the ExposeHeader tag in the
CORS configuration file generates a header injection in the response
when the CORS request is made.
more... | ceph14
more detail |
2020-08-15 | VuXML ID b8ea5b66-deff-11ea-adef-641c67a117d8
Snmptt reports:
Fixed a security issue with EXEC / PREXEC / unknown_trap_exec that could
allow malicious shell code to be executed.
Fixed a bug with EXEC / PREXEC / unknown_trap_exec that caused commands to be
run as root instead of the user defined in daemon_uid.
more... | snmptt
more detail |
2020-08-13 | VuXML ID 87a07de1-e55e-4d51-bb64-8d117829a26a
Aki Tuomi reports:
Parsing mails with a large number of MIME parts could
have resulted in excessive CPU usage or a crash due to running out of
stack memory..
Dovecot's NTLM implementation does not correctly check
message buffer size, which leads to reading past allocation which can
lead to crash
lmtp/submission: Issuing the RCPT command with an
address that has the empty quoted string as local-part causes the lmtp
service to crash.
Dovecot's RPA mechanism implementation accepts
zero-length message, which leads to assert-crash later on.
more... | dovecot
more detail |
2020-08-13 | VuXML ID b1d6b383-dd51-11ea-a688-7b12871ef3ad
Cary Phillips reports:
v2.5.3 - Patch release with various bug/security fixes [...]:
- Various sanitizer/fuzz-identified issues related to handling of invalid input
more... | ilmbase openexr
more detail |
2020-08-12 | VuXML ID eef0d2d9-78c0-441e-8b03-454c5baebe20
Jenkins Security Advisory:
Description
(High) SECURITY-1955 / CVE-2020-2229
Stored XSS vulnerability in help icons
(High) SECURITY-1957 / CVE-2020-2230
Stored XSS vulnerability in project naming strategy
(High) SECURITY-1960 / CVE-2020-2231
Stored XSS vulnerability in 'Trigger builds remotely'
more... | jenkins jenkins-lts
more detail |
2020-08-11 | VuXML ID 10e3ed8a-db7f-11ea-8bdf-643150d3111d
Puppetlabs reports:
In June 2020, jackson-databind published security updates addressing several CVEs. Previous releases of PuppetDB contain a vulnerable version of jackson.core:jackson-databind. PuppetDB 5.2.18 contains an updated version of jackson-databind that has patched the vulnerabilities.
more... | puppetdb5
more detail |
2020-08-11 | VuXML ID 1110e286-dc08-11ea-beed-e09467587c17
Chrome Releases reports:
This release contains 15 security fixes, including:
- [1107433] High CVE-2020-6542: Use after free in ANGLE.
Reported by Piotr Bania of Cisco Talos on 2020-07-20
- [1104046] High CVE-2020-6543: Use after free in task
scheduling. Reported by Looben Yang on 2020-07-10
- [1108497] High CVE-2020-6544: Use after free in media. Reported
by Tim Becker of Theori on 2020-07-22
- [1095584] High CVE-2020-6545: Use after free in audio. Reported
by Anonymous on 2020-06-16
- [1100280] High CVE-2020-6546: Inappropriate implementation in
installer. Reported by Andrew Hess (any1) on 2020-06-29
- [1102153] High CVE-2020-6547: Incorrect security UI in media.
Reported by David Albert on 2020-07-05
- [1103827] High CVE-2020-6548: Heap buffer overflow in Skia.
Reported by Choongwoo Han, Microsoft Browser Vulnerability
Research on 2020-07-09
- [1105426] High CVE-2020-6549: Use after free in media. Reported
by Sergei Glazunov of Google Project Zero on 2020-07-14
- [1106682] High CVE-2020-6550: Use after free in IndexedDB.
Reported by Sergei Glazunov of Google Project Zero on
2020-07-17
- [1107815] High CVE-2020-6551: Use after free in WebXR. Reported
by Sergei Glazunov of Google Project Zero on 2020-07-21
- [1108518] High CVE-2020-6552: Use after free in Blink. Reported
by Tim Becker of Theori on 2020-07-22
- [1111307] High CVE-2020-6553: Use after free in offline mode.
Reported by Alison Huffman, Microsoft Browser Vulnerability
Research on 2020-07-30
- [1094235] Medium CVE-2020-6554: Use after free in extensions.
Reported by Anonymous on 2020-06-12
- [1105202] Medium CVE-2020-6555: Out of bounds read in WebGL.
Reported by Marcin Towalski of Cisco Talos on 2020-07-13
more... | chromium
more detail |
2020-08-10 | VuXML ID 6b6de127-db0b-11ea-ba1e-1c39475b9f84
Bftpd project reports:
Bftpd is vulnerable to out of bounds memory access, file descriptor leak and a potential buffer overflow.
more... | bftpd
more detail |
2020-08-08* | VuXML ID 76700d2f-d959-11ea-b53c-d4c9ef517024
The Apache httpd projec reports:
- mod_http2: Important: Push Diary Crash on Specifically
Crafted HTTP/2 Header (CVE-2020-9490)
A specially crafted value for the 'Cache-Digest' header in a HTTP/2
request would result in a crash when the server actually tries to
HTTP/2 PUSH a resource afterwards.
- mod_proxy_uwsgi: Moderate: mod_proxy_uwsgi buffer overflow
(CVE-2020-11984)
info disclosure and possible RCE
- mod_http2: Moderate: Push Diary Crash on Specifically Crafted
HTTP/2 Header (CVE-2020-11993)
When trace/debug was enabled for the HTTP/2 module and on certain
traffic edge patterns, logging statements were made on the wrong
connection, causing concurrent use of memory pools.
more... | apache24 mod_http2
more detail |
2020-08-06 | VuXML ID 8db74c04-d794-11ea-88f8-901b0ef719ab
Problem Description:
When handling a 32-bit sendmsg(2) call, the compat32 subsystem copies the
control message to be transmitted (if any) into kernel memory, and adjusts
alignment of control message headers. The code which performs this work
contained a time-of-check to time-of-use (TOCTOU) vulnerability which allows a
malicious userspace program to modify control message headers after they were
validated by the kernel.
Impact:
The TOCTOU bug can be exploited by an unprivileged malicious userspace program
to trigger privilege escalation.
more... | FreeBSD-kernel
more detail |
2020-08-06 | VuXML ID 9eb01384-d793-11ea-88f8-901b0ef719ab
Problem Description:
A missing length validation code common to these three drivers means that a
malicious USB device could write beyond the end of an allocated network
packet buffer.
Impact:
An attacker with physical access to a USB port and the ability to bring a
network interface up may be able to use a specially crafted USB device to
gain kernel or user-space code execution.
more... | FreeBSD-kernel
more detail |
2020-08-06 | VuXML ID bc7aff8c-d806-11ea-a5aa-0800272260e5
The Go project reports:
Certain invalid inputs to ReadUvarint or ReadVarint could cause
those functions to read an unlimited number of bytes from the
ByteReader argument before returning an error. This could lead to
processing more input than expected when the caller is reading
directly from the network and depends on ReadUvarint and ReadVarint
only consuming a small, bounded number of bytes, even from invalid
inputs.
more... | go
more detail |
2020-08-06* | VuXML ID c4ac9c79-ab37-11ea-8b5e-b42e99a1b9c3
sqlite3 update:
Various security issues could be used by an attacker to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code.
- CVE-2020-11655: SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
- CVE-2020-13434: SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
- CVE-2020-13435: SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
- CVE-2020-13630: ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
- CVE-2020-13631: SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
- CVE-2020-13632: ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
more... | FreeBSD sqlite3
more detail |
2020-08-04 | VuXML ID eab964f8-d632-11ea-9172-4c72b94353b5
Typo3 Team reports:
In case an attacker manages to generate a valid cryptographic message authentication
code (HMAC-SHA1) - either by using a different existing vulnerability or in case the
internal encryptionKey was exposed - it is possible to retrieve arbitrary files of a
TYPO3 installation. This includes the possibility to fetch typo3conf/LocalConfiguration.php
which again contains the encryptionKey as well as credentials of the database management
system being used.
In case a database server is directly accessible either via internet or in a shared hosting
network, this allows to completely retrieve, manipulate or delete database contents.
This includes creating an administration user account - which can be used to trigger remote
code execution by injecting custom extensions.
It has been discovered that an internal verification mechanism can be used to generate
arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic
message authentication code (HMAC-SHA1) and can lead to various attack chains as described
below.
more... | typo3-10-php72 typo3-10-php73 typo3-10-php74 typo3-9-php72 typo3-9-php73 typo3-9-php74
more detail |
2020-08-01 | VuXML ID 3c7ba82a-d3fb-11ea-9aba-0c9d925bbbc0
The X.org project reports:
Allocation for pixmap data in AllocatePixmap() does not initialize
the memory in xserver, it leads to leak uninitialize heap memory to
clients. When the X server runs with elevated privileges.
This flaw can lead to ASLR bypass, which when combined with other
flaws (known/unknown) could lead to lead to privilege elevation in
the client.
more... | xephyr xorg-dmx xorg-nestserver xorg-server xorg-vfbserver xwayland
more detail |
2020-08-01 | VuXML ID 6faa7feb-d3fa-11ea-9aba-0c9d925bbbc0
The X.org project reports:
The X Input Method (XIM) client implementation in libX11 has some
integer overflows and signed/unsigned comparison issues that can
lead to heap corruption when handling malformed messages from an
input method.
more... | libX11
more detail |
2020-07-31 | VuXML ID 7d7221ee-d334-11ea-bc50-080027846a02
Python reports:
bpo-41304: Fixes python3x._pth being ignored on Windows, caused by the fix for
bpo-29778 (CVE-2020-15801).
bpo-39603: Prevent http header injection by rejecting control characters in
http.client.putreques().
more... | python38
more detail |
2020-07-30 | VuXML ID d1ef1138-d273-11ea-a757-e0d55e2a8bf9
KDE Project Security Advisory reports:
KDE Project Security Advisory
Title: |
Ark: maliciously crafted archive can install files outside the extraction directory. |
Risk Rating: |
Important |
CVE: |
CVE-2020-16116 |
Versions: |
ark <= 20.04.3 |
Author: |
Elvis Angelaccio |
Date: |
30 July 2020 |
Overview
A maliciously crafted archive with "../" in the file paths
would install files anywhere in the user's home directory upon extraction.
Proof of concept
For testing, an example of malicious archive can be found at
https://github.com/jwilk/traversal-archives/releases/download/0/relative2.zip
Impact
Users can unwillingly install files like a modified .bashrc, or a malicious
script placed in ~/.config/autostart
Workaround
Users should not use the 'Extract' context menu from the Dolphin file manager.
Before extracting a downloaded archive using the Ark GUI, users should inspect it
to make sure it doesn't contain entries with "../" in the file path.
Solution
Ark 20.08.0 prevents loading of malicious archives and shows a warning message
to the users.
Alternatively,
https://invent.kde.org/utilities/ark/-/commit/0df592524fed305d6fbe74ddf8a196bc9ffdb92f
can be applied to previous releases.
Credits
Thanks to Dominik Penner for finding and reporting this issue and thanks to
Elvis Angelaccio and Albert Astals Cid for fixing it.
more... | ark
more detail |
2020-07-28 | VuXML ID 086c96cd-d0cb-11ea-b922-5404a68ad561
RedHat reports:
It was discovered the fix for CVE-2018-19758 was not complete and
still allows a read beyond the limits of a buffer in
wav_write_header() function in wav.c. A local attacker may use
this flaw to make the application crash.
more... | libsndfile
more detail |
2020-07-28 | VuXML ID 9a447f78-d0f8-11ea-9837-e09467587c17
Chrome Releases reports:
This update contains 8 security fixes, including:
- [1105318] High CVE-2020-6537: Type Confusion in V8. Reported by
Alphalaab on 2020-07-14
- [1096677] High CVE-2020-6538: Inappropriate implementation in
WebView. Reported by Yongke Wang(@Rudykewang) and Aryb1n(@aryb1n)
of Tencent Security Xuanwu Lab on 2020-06-18
- [1104061] High CVE-2020-6532: Use after free in SCTP. Reported
by Anonymous on 2020-07-09
- [1105635] High CVE-2020-6539: Use after free in CSS. Reported
by Oriol Brufau on 2020-07-14
- [1105720] High CVE-2020-6540: Heap buffer overflow in Skia.
Reported by Zhen Zhou of NSFOCUS Security Team on 2020-07-15
- [1106773] High CVE-2020-6541: Use after free in WebUSB. Reported
by Sergei Glazunov of Google Project Zero on 2020-07-17
more... | chromium
more detail |
2020-07-28 | VuXML ID a955cdb7-d089-11ea-8c6f-080027eedc6a
Bernhard Miklautz reports:
-
Integer overflow due to missing input sanitation in rdpegfx channel
- All FreeRDP clients are affected
-
The input rectangles from the server are not checked against local
surface coordinates and blindly accepted. A malicious server can send
data that will crash the client later on (invalid length arguments to
a memcpy)
more... | freerdp
more detail |
2020-07-28 | VuXML ID e333084c-9588-4eee-8bdc-323e02cb4fe0
Jon Siwek of Corelight reports:
This release fixes the following security issues:
- Fix potential DNS analyzer stack overflow
- Fix potential NetbiosSSN analyzer stack overflow
more... | zeek
more detail |
2020-07-27 | VuXML ID cd2dc126-cfe4-11ea-9172-4c72b94353b5
Cacti developers reports:
Multiple fixes for bundled jQuery to prevent
code exec (CVE-2020-11022, CVE-2020-11023).
PHPMail contains a escaping bug
(CVE-2020-13625).
SQL Injection via color.php in Cacti
(CVE-2020-14295).
more... | cacti
more detail |
2020-07-24 | VuXML ID e1d3a580-cd8b-11ea-bad0-08002728f74c
GitHub Advisory Database:
When a form page type is made available to Wagtail editors through the
wagtail.contrib.forms app, and the page template is built using
Django's standard form rendering helpers such as form.as_p (as directed
in the documentation), any HTML tags used within a form field's help
text will be rendered unescaped in the page. Allowing HTML within help
text is an intentional design decision by Django; however, as a matter
of policy Wagtail does not allow editors to insert arbitrary HTML by
default, as this could potentially be used to carry out cross-site
scripting attacks, including privilege escalation. This functionality
should therefore not have been made available to editor-level users.
The vulnerability is not exploitable by an ordinary site visitor
without access to the Wagtail admin.
more... | py36-wagtail py37-wagtail py38-wagtail
more detail |
2020-07-23* | VuXML ID 6a72eff7-ccd6-11ea-9172-4c72b94353b5
The Apache Software Foundation reports:
An h2c direct connection did not release the HTTP/1.1 processor after
the upgrade to HTTP/2. If a sufficient number of such requests were
made, an OutOfMemoryException could occur leading to a denial of service.
The payload length in a WebSocket frame was not correctly validated.
Invalid payload lengths could trigger an infinite loop. Multiple
requests with invalid payload lengths could lead to a denial of service.
A specially crafted sequence of HTTP/2 requests could trigger high CPU
usage for several seconds. If a sufficient number of such requests were
made on concurrent HTTP/2 connections, the server could become unresponsive.
more... | tomcat-devel tomcat7 tomcat85 tomcat9
more detail |
2020-07-20 | VuXML ID a9eeb3a3-ca5e-11ea-930b-080027846a02
Python reports:
bpo-41162:Audit hooks are now cleared later during finalization to avoid missing
events.
bpo-29778:Ensure python3.dll is loaded from correct locations when Python is
embedded.
more... | python38
more detail |
2020-07-19 | VuXML ID 1e7b316b-c6a8-11ea-a7d5-001999f8d30b
Oracle reports:
Vulnerabilities in VirtualBox core can allow users
with logon access to the infrastructure where Oracle VM
VirtualBox executes to compromise Oracle VM VirtualBox.
Successful attacks of these vulnerabilities can result
in unauthorized access to critical data, access to all
Oracle VM VirtualBox accessible data, unauthorized ability
to cause a hang or frequently repeatable crash (complete
DOS) or takeover of Oracle VM VirtualBox.
more... | virtualbox-ose
more detail |
2020-07-16 | VuXML ID 714e6c35-c75b-11ea-aa29-d74973d1f9f3
Cary Phillips reports:
openexr 2.5.2 [is a p]atch release with various bug/security and build/install fixes:
- Invalid input could cause a heap-use-after-free error in DeepScanLineInputFile::DeepScanLineInputFile()
- Invalid chunkCount attributes could cause heap buffer overflow in getChunkOffsetTableSize()
- Invalid tiled input file could cause invalid memory access TiledInputFile::TiledInputFile()
more... | ilmbase openexr
more detail |
2020-07-16 | VuXML ID f7a02651-c798-11ea-81d6-6805cabe6ebb
Micah Snyder reports:
- CVE-2020-3350
-
Fixed a vulnerability a malicious user could exploit to replace
a scan target's directory with a symlink to another path to trick
clamscan, clamdscan, or clamonacc into removing or moving a different
file (such as a critical system file). The issue would affect users
that use the --move or --remove options for clamscan, clamdscan and
clamonacc.
- CVE-2020-3327
-
Fixed a vulnerability in the ARJ archive-parsing module in ClamAV
0.102.3 that could cause a denial-of-service (DoS) condition.
Improper bounds checking resulted in an out-of-bounds read that could
cause a crash. The previous fix for this CVE in version 0.102.3 was
incomplete. This fix correctly resolves the issue.
- CVE-2020-3481
-
Fixed a vulnerability in the EGG archive module in ClamAV 0.102.0
- 0.102.3 that could cause a denial-of-service (DoS) condition.
Improper error handling could cause a crash due to a NULL pointer
dereference. This vulnerability is mitigated for those using the
official ClamAV signature databases because the file type signatures
in daily.cvd will not enable the EGG archive parser in affected
versions.
more... | clamav
more detail |
2020-07-15 | VuXML ID 1ddab5cb-14c9-4632-959f-802c412a9593
Jenkins Security Advisory:
Description
(High) SECURITY-1868 / CVE-2020-2220
Stored XSS vulnerability in job build time trend
(High) SECURITY-1901 / CVE-2020-2221
Stored XSS vulnerability in upstream cause
(High) SECURITY-1902 / CVE-2020-2222
Stored XSS vulnerability in 'keep forever' badge icons
(High) SECURITY-1945 / CVE-2020-2223
Stored XSS vulnerability in console links
more... | jenkins jenkins-lts
more detail |
2020-07-15 | VuXML ID 870d59b0-c6c4-11ea-8015-e09467587c17
Chrome Releases reports:
This update contains 38 security fixes, including:
- [1103195] Critical CVE-2020-6510: Heap buffer overflow in
background fetch. Reported by Leecraso and Guang Gong of 360
Alpha Lab working with 360 BugCloud on 2020-07-08
- [1074317] High CVE-2020-6511: Side-channel information leakage
in content security policy. Reported by Mikhail Oblozhikhin on
2020-04-24
- [1084820] High CVE-2020-6512: Type Confusion in V8. Reported by
nocma, leogan, cheneyxu of WeChat Open Platform Security Team on
2020-05-20
- [1091404] High CVE-2020-6513: Heap buffer overflow in PDFium.
Reported by Aleksandar Nikolic of Cisco Talos on 2020-06-04
- [1076703] High CVE-2020-6514: Inappropriate implementation in
WebRTC. Reported by Natalie Silvanovich of Google Project Zero on
2020-04-30
- [1082755] High CVE-2020-6515: Use after free in tab strip.
Reported by DDV_UA on 2020-05-14
- [1092449] High CVE-2020-6516: Policy bypass in CORS. Reported by
Yongke Wang(@Rudykewang) and Aryb1n(@aryb1n) of Tencent Security
Xuanwu Lab on 2020-06-08
- [1095560] High CVE-2020-6517: Heap buffer overflow in history.
Reported by ZeKai Wu (@hellowuzekai) of Tencent Security Xuanwu
Lab on 2020-06-16
- [986051] Medium CVE-2020-6518: Use after free in developer
tools. Reported by David Erceg on 2019-07-20
- [1064676] Medium CVE-2020-6519: Policy bypass in CSP. Reported
by Gal Weizman (@WeizmanGal) of PerimeterX on 2020-03-25
- [1092274] Medium CVE-2020-6520: Heap buffer overflow in Skia.
Reported by Zhen Zhou of NSFOCUS Security Team on 2020-06-08
- [1075734] Medium CVE-2020-6521: Side-channel information leakage
in autofill. Reported by Xu Lin (University of Illinois at
Chicago), Panagiotis Ilia (University of Illinois at Chicago),
Jason Polakis (University of Illinois at Chicago) on
2020-04-27
- [1052093] Medium CVE-2020-6522: Inappropriate implementation in
external protocol handlers. Reported by Eric Lawrence of Microsoft
on 2020-02-13
- [1080481] Medium CVE-2020-6523: Out of bounds write in Skia.
Reported by Liu Wei and Wu Zekai of Tencent Security Xuanwu Lab on
2020-05-08
- [1081722] Medium CVE-2020-6524: Heap buffer overflow in
WebAudio. Reported by Sung Ta (@Mipu94) of SEFCOM Lab, Arizona
State University on 2020-05-12
- [1091670] Medium CVE-2020-6525: Heap buffer overflow in Skia.
Reported by Zhen Zhou of NSFOCUS Security Team on 2020-06-05
- [1074340] Low CVE-2020-6526: Inappropriate implementation in
iframe sandbox. Reported by Jonathan Kingston on 2020-04-24
- [992698] Low CVE-2020-6527: Insufficient policy enforcement in
CSP. Reported by Zhong Zhaochen of andsecurity.cn on
2019-08-10
- [1063690] Low CVE-2020-6528: Incorrect security UI in basic
auth. Reported by Rayyan Bijoora on 2020-03-22
- [978779] Low CVE-2020-6529: Inappropriate implementation in
WebRTC. Reported by kaustubhvats7 on 2019-06-26
- [1016278] Low CVE-2020-6530: Out of bounds memory access in
developer tools. Reported by myvyang on 2019-10-21
- [1042986] Low CVE-2020-6531: Side-channel information leakage in
scroll to text. Reported by Jun Kokatsu, Microsoft Browser
Vulnerability Research on 2020-01-17
- [1069964] Low CVE-2020-6533: Type Confusion in V8. Reported by
Avihay Cohen @ SeraphicAlgorithms on 2020-04-11
- [1072412] Low CVE-2020-6534: Heap buffer overflow in WebRTC.
Reported by Anonymous on 2020-04-20
- [1073409] Low CVE-2020-6535: Insufficient data validation in
WebUI. Reported by Jun Kokatsu, Microsoft Browser Vulnerability
Research on 2020-04-22
- [1080934] Low CVE-2020-6536: Incorrect security UI in PWAs.
Reported by Zhiyang Zeng of Tencent security platform department
on 2020-05-09
more... | chromium
more detail |
2020-07-11 | VuXML ID 0ed71663-c369-11ea-b53c-d4c9ef517024
Oracle reports:
This Critical Patch Update contains 40 new security patches for
Oracle MySQL. 6 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without
requiring user credentials.
The highest CVSS v3.1 Base Score of vulnerabilities affecting Oracle
MySQL is 9.8.
This Pre-Release Announcement provides advance information about the
Oracle Critical Patch Update for July 2020, which will be released on
Tuesday, July 14, 2020.
more... | mysql56-client mysql56-server mysql57-client mysql57-server mysql80-client mysql80-server
more detail |
2020-07-10* | VuXML ID a2cb7c31-9c79-11ea-a9c2-d05099c0ae8c
NLNetLabs reports:
This release fixes CVE-2020-12662 and CVE-2020-12663.
Bug Fixes:
- CVE-2020-12662 Unbound can be tricked into
amplifying an incoming query into a large
number of queries directed to a target.
- CVE-2020-12663 Malformed answers from
upstream name servers can be used to make
Unbound unresponsive.
more... | FreeBSD unbound
more detail |
2020-07-10 | VuXML ID c11ee146-c266-11ea-8659-901b0ef719ab
Problem Description:
The IPV6_2292PKTOPTIONS set handler was missing synchronization,
so racing accesses could modify freed memory.
Impact:
A malicious user application could trigger memory corruption, leading
to privilege escalation.
more... | FreeBSD-kernel
more detail |
2020-07-10 | VuXML ID efd03116-c2a9-11ea-82bc-b42e99a1b9c3
The WebKitGTK project reports vulnerabilities:
- CVE-2020-9802: Processing maliciously crafted web content may lead to arbitrary code execution.
- CVE-2020-9803: Processing maliciously crafted web content may lead to arbitrary code execution.
- CVE-2020-9805: Processing maliciously crafted web content may lead to universal cross site scripting.
- CVE-2020-9806: Processing maliciously crafted web content may lead to arbitrary code execution.
- CVE-2020-9807: Processing maliciously crafted web content may lead to arbitrary code execution.
- CVE-2020-9843: Processing maliciously crafted web content may lead to a cross site scripting attack.
- CVE-2020-9850: A remote attacker may be able to cause arbitrary code execution.
- CVE-2020-13753: CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal?s input buffer.
more... | webkit2-gtk3
more detail |
2020-07-10 | VuXML ID f8b46415-c264-11ea-8659-901b0ef719ab
Problem Description:
posix_spawnp spawns a new thread with a limited stack allocated on the heap
before delegating to execvp for the final execution within that thread.
execvp would previously make unbounded allocations on the stack, directly
proportional to the length of the user-controlled PATH environment variable.
Impact:
Long values in the user-controlled PATH environment variable cause
posix_spawnp to write beyond the end of stack that was allocated, ultimately
overflowing the heap-allocated stack with a direct copy of the value stored
in PATH.
more... | FreeBSD
more detail |
2020-07-09 | VuXML ID 198a120d-c22d-11ea-9172-4c72b94353b5
mybb Team reports:
High risk: Installer RCE on settings file write
Medium risk: Arbitrary upload paths and Local File Inclusion RCE
Medium risk: XSS via insufficient HTML sanitization of Blog feed and Extend data
Low risk: Open redirect on login
Low risk: SCEditor reflected XSS
more... | mybb
more detail |
2020-07-08 | VuXML ID 20b46222-c12b-11ea-abe8-08002728f74c
kramdown news:
CVE-2020-14001 is addressed to avoid problems when using the
{::options /} extension together with the 'template' option.
more... | rubygem-kramdown
more detail |
2020-07-07 | VuXML ID c685edd9-c045-11ea-8898-001cc0382b2f
Manuel Pégourié-Gonnard reports:
The scalar multiplication function in Mbed TLS accepts a random
number generator (RNG) as an optional argument and, if provided,
uses it to protect against some attacks.
It is the caller's responsibility to provide a RNG if protection
against side-channel attacks is desired; however two groups of
functions in Mbed TLS itself fail to pass a RNG:
- mbedtls_pk_parse_key() and mbedtls_pk_parse_keyfile()
- mbedtls_ecp_check_pub_priv() and mbedtls_pk_check_pair()
When those functions are called, scalar multiplication is computed
without randomisation, a number of old and new attacks apply,
allowing a powerful local attacker to fully recover the private
key.
more... | mbedtls
more detail |
2020-07-07 | VuXML ID f7a97d43-c039-11ea-a051-001b217b3468
Gitlab reports:
Workhorse bypass allows files in /tmp to be read via Maven Repository APIs
more... | gitlab-ce
more detail |
2020-07-06 | VuXML ID 33c05d57-bf6e-11ea-ba1e-0800273f78d3
Python reports:
The AbstractBasicAuthHandler class of the urllib.request module uses an inefficient
regular expression which can be exploited by an attacker to cause a denial of service.
Fix the regex to prevent the catastrophic backtracking. Vulnerability reported by Ben
Caller and Matt Schwager.
Disallow control characters in hostnames in http.client, addressing CVE-2019-18348.
Such potentially malicious header injection URLs now cause a InvalidURL to be raised.
Disallow CR or LF in email.headerregistry.Address arguments to guard against header
injection attacks.
more... | python37
more detail |
2020-07-04 | VuXML ID 4344861a-be0b-11ea-9172-4c72b94353b5
Anydesk reports:
AnyDesk before 5.5.3 on Linux and FreeBSD has a format string
vulnerability that can be exploited for remote code execution.
more... | anydesk
more detail |
2020-07-03 | VuXML ID 27616957-b084-11ea-937b-b42e99a1b9c3
GitHub Security Lab reports:
D-Bus has a file descriptor leak, which can lead to denial of service when the dbus-daemon runs out of file descriptors.
An unprivileged local attacker can use this to attack the system dbus-daemon, leading to denial of service for all users of the machine.
more... | dbus
more detail |
2020-07-03 | VuXML ID d9f686f3-fde0-48dc-ab0a-01c2fe3e0529
Matrix developers report:
Due to the two security issues highlighted below, server administrators are encouraged to update Synapse. We are not aware of these vulnerabilities being exploited in the wild.
- A malicious homeserver could force Synapse to reset the state in a room to a small subset of the correct state. This affects all Synapse deployments which federate with untrusted servers.
- HTML pages served via Synapse were vulnerable to clickjacking attacks. This predominantly affects homeservers with single-sign-on enabled, but all server administrators are encouraged to upgrade.
more... | py36-matrix-synapse py37-matrix-synapse py38-matrix-synapse
more detail |
2020-07-02 | VuXML ID 0a305431-bc98-11ea-a051-001b217b3468
Gitlab reports:
Missing Permission Check on Time Tracking
Cross-Site Scripting in PyPi Files API
Insecure Authorization Check on Private Project Security Dashboard
Cross-Site Scripting in References
Cross-Site Scripting in Group Names
Cross-Site Scripting in Blob Viewer
Cross-Site Scripting in Error Tracking
Insecure Authorisation Check on Creation and Deletion of Deploy Tokens
User Name Format Restiction Bypass
Denial of Service in Issue Comments
Cross-Site Scripting in Wiki Pages
Private Merge Request Updates Leaked via Todos
Private User Activity Leaked via API
Cross-Site Scripting in Bitbucket Import Feature
Github Project Restriction Bypass
Update PCRE Dependency
Update Kaminari Gem
Cross-Site Scripting in User Profile
Update Xterm.js
more... | gitlab-ce
more detail |
2020-07-02 | VuXML ID 641cd669-bc37-11ea-babf-6805ca2fa271
PowerDNS Team reports:
CVE-2020-14196: An issue has been found in PowerDNS Recursor where the ACL applied to the internal
web server via webserver-allow-from is not properly enforced, allowing a remote attacker to send
HTTP queries to the internal web server, bypassing the restriction.
In the default configuration the API webserver is not enabled. Only installations using a
non-default value for webserver and webserver-address are affected.
more... | powerdns-recursor
more detail |
2020-07-02 | VuXML ID 6fd773d3-bc5a-11ea-b38d-f0def1d0c3ea
Bryan Call reports:
ATS is vulnerable to certain types of HTTP/2 HEADERS frames that can cause the server to allocate a large amount of memory and spin the thread.
more... | trafficserver
more detail |
2020-07-02 | VuXML ID ae599263-bca2-11ea-b78f-b42e99a1b9c3
The Samba Team reports:
Four vulnerabilities were fixed in samba:
- CVE-2020-10730: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results
- CVE-2020-10745: Parsing and packing of NBT and DNS packets can consume excessive CPU in the AD DC (only)
- CVE-2020-10760: LDAP Use-after-free in Samba AD DC Global Catalog with paged_results and VLV
- CVE-2020-14303: Empty UDP packet DoS in Samba AD DC nbtd
more... | samba410 samba411 samba412
more detail |
2020-07-02 | VuXML ID fce7a6e7-bc5d-11ea-b38d-f0def1d0c3ea
Felix Dörre reports:
The issue is that STUN/TURN response buffer is not initialized properly. (CWE 665)
This is a leak of information between different client connections. One client (an attacker)
could use their connection to intelligently query coturn to get interesting bytes in the
padding bytes from the connection of another client.
more... | coturn
more detail |
2020-07-01 | VuXML ID b51d5391-bb76-11ea-9172-4c72b94353b5
Drupal Security Team reports:
The Drupal core Form API does not properly handle certain form input
from cross-site requests, which can lead to other vulnerabilities.
more... | drupal7
more detail |
2020-06-30 | VuXML ID 2675f0db-baa5-11ea-aa12-80ee73419af3
Ashley Newson reports:
The xrdp-sesman service can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350.
more... | xrdp
more detail |
2020-06-29 | VuXML ID d0be8e1f-b19a-11ea-94aa-b827eb2f57d4
reports:
Improper serialization of MongoDB Server's internal authorization state permits a user with valid credentials to bypass IP source address protection mechanisms following administrative action.
Credit
Discovered by Tony Yesudas.
more... | mongodb36 mongodb40 mongodb42
more detail |
2020-06-28 | VuXML ID 4200d5f5-b985-11ea-b08a-f8b156b6dcc8
Two vulnerabilities were fixed in the upstream repository:
- The bark_noise_hybridmp function allows remote attackers
to cause a denial of service (out-of-bounds access and
application crash) or possibly have unspecified other
impact via a crafted file.
- mapping0_forward does not validate the number of
channels, which allows remote attackers to cause a denial
of service (heap-based buffer overflow or over-read) or
possibly have unspecified other impact via a crafted
file.
more... | libvorbis
more detail |
2020-06-28 | VuXML ID 6190c0cd-b945-11ea-9401-2dcf562daa69
Simon Tatham reports:
[Release 0.74] fixes the following security issues:
- New configuration option to disable PuTTY's default policy of
changing its host key algorithm preferences to prefer keys it
already knows. (There is a theoretical information leak in this
policy.) [CVE-2020-14002]
- In some situations an SSH server could cause PuTTY to access freed
mdmory by pretending to accept an SSH key and then refusing the
actual signature. It can only happen if you're using an SSH agent.
more... | putty putty-gtk2 putty-nogtk
more detail |
2020-06-25 | VuXML ID 09eef008-3b16-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before version 9.5.2, the `install/install.php` endpoint insecurely stores user input into the database as `url_base` and `url_base_api`. These settings are referenced throughout the application and allow for vulnerabilities like Cross-Site Scripting and Insecure Redirection Since authentication is not required to perform these changes,anyone could point these fields at malicious websites or form input in a way to trigger XSS. Leveraging JavaScript it's possible to steal cookies, perform actions as the user, etc. The issue is patched in version 9.5.2.
more... | glpi
more detail |
2020-06-25 | VuXML ID 0ba61fcc-3b38-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before version 9.5.2, there is a SQL Injection in the API's search function. Not only is it possible to break the SQL syntax, but it is also possible to utilise a UNION SELECT query to reflect sensitive information such as the current database version, or database user. The most likely scenario for this vulnerability is with someone who has an API account to the system. The issue is patched in version 9.5.2. A proof-of-concept with technical details is available in the linked advisory.
more... | glpi
more detail |
2020-06-25 | VuXML ID 5acd95db-3b16-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ.
more... | glpi
more detail |
2020-06-25 | VuXML ID 675e5098-3b15-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before version 9.5.2, the pluginimage.send.php endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in /files/. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2.
more... | glpi
more detail |
2020-06-25 | VuXML ID 7f163c81-3b12-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In glpi before 9.5.1, there is a SQL injection for all usages of "Clone" feature. This has been fixed in 9.5.1.
more... | glpi
more detail |
2020-06-25 | VuXML ID b7abdb0f-3b15-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.2
more... | glpi
more detail |
2020-06-24 | VuXML ID 29b13a34-b1d2-11ea-a11c-4437e6ad11c4
mutt 1.14.4 updates:
CVE-2020-14954 - Machine-in-the-middle response injection attack when using STARTTLS with IMAP, POP3, and SMTP
more... | mutt
more detail |
2020-06-24 | VuXML ID 4a8a-8987-11ea-93ef-b42e99a1b9c3
Apple reports:
- CVE-2019-8842: The ippReadIO function may under-read an
extension.
- CVE-2020-3898: The ppdOpen function did not handle invalid UI
constraint. ppdcSource::get_resolution function did not handle
invalid resolution strings. An application may be able to gain
elevated privileges.
more... | cups
more detail |
2020-06-24 | VuXML ID 5b397852-b1d0-11ea-a11c-4437e6ad11c4
mutt 1.14.3 updates:
CVE-2020-14093 - IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.
more... | mutt
more detail |
2020-06-24 | VuXML ID 6a5d15b6-b661-11ea-8015-e09467587c17
Chrome Releases reports:
This update includes 2 security fixes, including:
- [1092308] High CVE-2020-6509: Use after free in extensions.
Reported by Anonymous on 2020-06-08
more... | chromium
more detail |
2020-06-24 | VuXML ID 6bff5ca6-b61a-11ea-aef4-08002728f74c
curl security problems:
CVE-2020-8169: Partial password leak over DNS on HTTP redirect
libcurl can be tricked to prepend a part of the password to the
host name before it resolves it, potentially leaking the partial
password over the network and to the DNS server(s).
libcurl can be given a username and password for HTTP
authentication when requesting an HTTP resource - used for HTTP
Authentication such as Basic, Digest, NTLM and similar. The
credentials are set, either together with CURLOPT_USERPWD or
separately with CURLOPT_USERNAME and CURLOPT_PASSWORD. Important
detail: these strings are given to libcurl as plain C strings and
they are not supposed to be URL encoded.
In addition, libcurl also allows the credentials to be set in the
URL, using the standard RFC 3986 format:
http://user:password@host/path. In this case, the name and password
are URL encoded as that's how they appear in URLs.
If the options are set, they override the credentials set in the
URL.
Internally, this is handled by storing the credentials in the "URL
object" so that there is only a single set of credentials stored
associated with this single URL.
When libcurl handles a relative redirect (as opposed to an
absolute URL redirect) for an HTTP transfer, the server is only
sending a new path to the client and that path is applied on to the
existing URL. That "applying" of the relative path on top of an
absolute URL is done by libcurl first generating a full absolute
URL out of all the components it has, then it applies the redirect
and finally it deconstructs the URL again into its separate
components.
This security vulnerability originates in the fact that curl did
not correctly URL encode the credential data when set using one of
the curl_easy_setopt options described above. This made curl
generate a badly formatted full URL when it would do a redirect and
the final re-parsing of the URL would then go bad and wrongly
consider a part of the password field to belong to the host name.
The wrong host name would then be used in a name resolve lookup,
potentially leaking the host name + partial password in clear text
over the network (if plain DNS was used) and in particular to the
used DNS server(s).
CVE-2020-8177: curl overwrite local file with -J
curl can be tricked by a malicious server to overwrite a local
file when using -J (--remote-header-name) and -i (--include) in the
same command line.
The command line tool offers the -J option that saves a remote
file using the file name present in the Content-Disposition:
response header. curl then refuses to overwrite an existing local
file using the same name, if one already exists in the current
directory.
The -J flag is designed to save a response body, and so it doesn't
work together with -i and there's logic that forbids it. However,
the check is flawed and doesn't properly check for when the options
are used in the reversed order: first using -J and then -i were
mistakenly accepted.
The result of this mistake was that incoming HTTP headers could
overwrite a local file if one existed, as the check to avoid the
local file was done first when body data was received, and due to
the mistake mentioned above, it could already have received and
saved headers by that time.
The saved file would only get response headers added to it, as it
would abort the saving when the first body byte arrives. A
malicious server could however still be made to send back virtually
anything as headers and curl would save them like this, until the
first CRLF-CRLF sequence appears.
(Also note that -J needs to be used in combination with -O to have
any effect.)
more... | curl
more detail |
2020-06-24* | VuXML ID 8b812395-c739-11e8-ab5b-9c5c8e75236a
Joel Esler reports:
- CVE-2018-15378:
- Vulnerability in ClamAV's MEW unpacking feature that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
- Reported by Secunia Research at Flexera.
- Fix for a 2-byte buffer over-read bug in ClamAV&s PDF parsing code.
- CVE-2018-14680:
- An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
- CVE-2018-14681:
- An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.
- CVE-2018-14682:
- An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression. Additionally, 0.100.2 reverted 0.100.1's patch for CVE-2018-14679, and applied libmspack's version of the fix in its place.
more... | clamav
more detail |
2020-06-24 | VuXML ID ce0c8590-b628-11ea-9d28-3c970ee9157c
Apple reports:
- CVE-2019-8842: The ippReadIO function may under-read an
extension.
- CVE-2020-3898: The ppdOpen function did not handle invalid UI
constraint. ppdcSource::get_resolution function did not handle
invalid resolution strings. An application may be able to gain
elevated privileges.
more... | cups
more detail |
2020-06-24* | VuXML ID f04f840d-0840-11ea-8d66-75d3253ef913
CVE list:
GNU libidn2 before 2.2.0 fails to perform the roundtrip checks
specified in RFC3490 Section 4.2 when converting A-labels to U-labels.
This makes it possible in some circumstances for one domain to
impersonate another. By creating a malicious domain that matches a
target domain except for the inclusion of certain punycoded Unicode
characters (that would be discarded when converted first to a Unicode
label and then back to an ASCII label), arbitrary domains can be
impersonated.
more... | libidn2
more detail |
2020-06-24* | VuXML ID f72d98d1-0b7e-11e7-970f-002590263bf5
Marina Glancy reports:
MSA-17-0001: System file inclusion when adding own preset
file in Boost theme
MSA-17-0002: Incorrect sanitation of attributes in forums
MSA-17-0003: PHPMailer vulnerability in no-reply address
MSA-17-0004: XSS in assignment submission page
more... | moodle29 moodle30 moodle31 moodle32
more detail |
2020-06-22 | VuXML ID feb8afdc-b3e5-11ea-9df5-08002728f74c
Ruby on Rails blog:
Rails 6.0.3.2 has been released! This version of Rails contains an
important security patch, and you should upgrade! The release contains
only one patch that addresses CVE-2020-8185.
more... | rubygem-actionpack60
more detail |
2020-06-18 | VuXML ID 75d72e03-b137-11ea-8659-901b0ef719ab
ISC reports:
An assertion check in BIND (that is meant to prevent going beyond
the end of a buffer when processing incoming data) can be
incorrectly triggered by a large response during zone transfer.
more... | bind916
more detail |
2020-06-18 | VuXML ID f00d1873-b138-11ea-8659-901b0ef719ab
ISC reports:
The asterisk character ("*") is allowed in DNS zone files, where
it is most commonly present as a wildcard at a terminal node of
the Domain Name System graph. However, the RFCs do not require
and BIND does not enforce that an asterisk character be present
only at a terminal node.
A problem can occur when an asterisk is present in an empty
non-terminal location within the DNS graph. If such a node exists,
after a series of queries, named can reach an inconsistent state
that results in the failure of an assertion check in rbtdb.c,
followed by the program exiting due to the assertion failure.
more... | bind911 bind916
more detail |
2020-06-18 | VuXML ID f28476f7-b166-11ea-8775-507b9d01076a
lynis update:
This release resolves two security issues
- CVE-2020-13882 - Discovered by Sander Bos, code submission by Katarina Durechova
- CVE-2019-13033 - Discovered by Sander Bos
more... | lynis
more detail |
2020-06-17 | VuXML ID 77896891-b08a-11ea-937b-b42e99a1b9c3
Thomas Guillem reports:
A heap-based buffer overflow in the hxxx_AnnexB_to_xVC function in modules/packetizer/hxxx_nal.c in VideoLAN VLC media player before 3.0.11
allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted H.264 Annex-B video (.avi for example) file.
more... | vlc
more detail |
2020-06-13* | VuXML ID a27b0bb6-84fc-11ea-b5b4-641c67a117d8
Ben Caller and Matt Schwager reports:
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7
through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct
Regular Expression Denial of Service (ReDoS) attacks against a client
because of urllib.request.AbstractBasicAuthHandler catastrophic
backtracking.
more... | python27 python35 python36 python37 python38
more detail |
2020-06-13* | VuXML ID ca595a25-91d8-11ea-b470-080027846a02
Python reports:
An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x
through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as
demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in
the host component of a URL) followed by an HTTP header.
more... | python27 python35 python36 python37 python38
more detail |
2020-06-12 | VuXML ID 11fcfa8f-ac64-11ea-9dab-000d3ab229d6
Node.js reports:
Updates are now available for all supported Node.js release lines for the following issues.
TLS session reuse can lead to host certificate verification bypass (High) (CVE-2020-8172)
The 'session' event could be emitted before the 'secureConnect' event. It should not be, because the
connection may fail to be authorized. If it was saved an authorized connection could be established
later with the session ticket. Note that the https agent caches sessions, so is vulnerable to this.
The 'session' event will now only be emitted after the 'secureConnect' event, and only for authorized
connections.
HTTP/2 Large Settings Frame DoS (Low) (CVE-2020-11080)
Receiving unreasonably large HTTP/2 SETTINGS frames can consume 100% CPU to process all the settings,
blocking all other activities until complete.
The HTTP/2 session frame is limited to 32 settings by default. This can be configured if necessary
using the maxSettings option.
napi_get_value_string_*() allows various kinds of memory corruption (High) (CVE-2020-8174)
Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16()
with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf,
probably overrunning the length of the buffer.
A exploit has not been reported and it may be difficult but the following is suggested:
- All users of LTS Node.js versions should update to the versions announced in this security post.
This will address the issue for any non pre-built add-on.
- Maintainers who support EOL Node.js versions and/or build against a version of Node.js that did not
support N-API internally should update to use the new versions of node-addon-api 1.x and 2.x that
will be released soon after this announcement.
ICU-20958 Prevent SEGV_MAPERR in append (High) (CVE-2020-10531)
An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An
integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend()
function in common/unistr.cpp.
Fix was applied to 10.x in an abundance of caution, even though there is no known way to trigger the
overflow in 10.x.
more... | node node10 node12
more detail |
2020-06-12 | VuXML ID 96fb446d-ac7b-11ea-8b5e-b42e99a1b9c3
LibreOffice reports:
Two flaws were found in LibreOffice:
- CVE-2020-12802: remote graphics contained in docx format retrieved in 'stealth mode'
- CVE-2020-12803: XForms submissions could overwrite local files
more... | libreoffice
more detail |
2020-06-11 | VuXML ID 045e46e8-abe6-11ea-99cb-10bf48e1088e
fklassen on Github reports:
This release fixes the following security issues:
- memory access in do_checksum()
- NULL pointer dereference get_layer4_v6()
- NULL pointer dereference get_ipv6_l4proto()
more... | tcpreplay
more detail |
2020-06-10 | VuXML ID 10a24ce0-ab68-11ea-b9b8-641c67a117d8
Mitre reports:
ZNC 1.8.0 up to 1.8.1-rc1 allows attackers to trigger an application
crash (with a NULL pointer dereference) if echo-message is not enabled
and there is no network.
more... | znc
more detail |
2020-06-10 | VuXML ID 2a3588b4-ab12-11ea-a051-001b217b3468
NPM reports:
Global node_modules Binary Overwrite
Symlink reference outside of node_modules
Arbitrary File Write
more... | npm
more detail |
2020-06-10 | VuXML ID 329ecd60-aaf7-11ea-8659-10bf48e1088e
Malvineous on Github reports:
This release fixes the following security issues:
- buffer overflow in .bmf
- buffer overflow in .dtm
- buffer overflow in .mkj
- buffer overflow in .a2m
- buffer overflow in .rad
- buffer overflow in .mtk
- double free and OOB reads in .u6m
more... | libadplug
more detail |
2020-06-10 | VuXML ID 9f7ae7ea-da93-4f86-b257-ba76707f6d5d
Jon Siwek of Corelight reports:
This release fixes the following security issues:
-
Fix potential stack overflow in NVT analyzer
-
Fix NVT analyzer memory leak from multiple telnet authn name options
-
Fix multiple content-transfer-encoding headers causing a memory leak
-
Fix potential leak of Analyzers added to tree during Analyzer::Done
-
Prevent IP fragment reassembly on packets without minimal IP header
more... | zeek
more detail |
2020-06-09 | VuXML ID 196b31b8-aa9a-11ea-a59a-6451062f0f7a
Adobe reports:
- This update resolves a use-after-free vulnerability that
could lead to arbitrary code execution (CVE-2020-9633).
more... | linux-flashplayer
more detail |
2020-06-09 | VuXML ID 32c92a75-aa71-11ea-92ab-00163e433440
Problem Description:
If the push/pop level of the USB HID state is not restored within
the processing of the same HID item, an invalid memory location may be
used for subsequent HID item processing.
Impact:
An attacker with physical access to a USB port may be able to use a
specially crafted USB device to gain kernel or user-space code execution.
more... | FreeBSD-kernel
more detail |
2020-06-05 | VuXML ID a2caf7bd-a719-11ea-a857-e09467587c17
Chrome Releases reports:
This update includes 5 security fixes. Below, we highlight fixes
that were contributed by external researchers.
- [1082105] High CVE-2020-6493: Use after free in
WebAuthentication. Reported by Anonymous on 2020-05-13
- [1083972] High CVE-2020-6494: Incorrect security UI in payments.
Reported by Juho Nurminen on 2020-05-18
- [1072116] High CVE-2020-6495: Insufficient policy enforcement in
developer tools. Reported by David Erceg on 2020-04-18
- [1085990] High CVE-2020-6496: Use after free in payments.
Reported by Khalil Zhani on 2020-05-24
more... | chromium
more detail |
2020-06-04 | VuXML ID 40bfab16-a68b-11ea-9ea5-001b217b3468
Gitlab reports:
CI Token Access Control
more... | gitlab-ce
more detail |
2020-06-04 | VuXML ID 597d02ce-a66c-11ea-af32-080027846a02
Django security release reports:
CVE-2020-13254: Potential data leakage via malformed memcached keys
In cases where a memcached backend does not perform key validation, passing
malformed cache keys could result in a key collision, and potential data leakage.
In order to avoid this vulnerability, key validation is added to the memcached
cache backends.
CVE-2020-13596: Possible XSS via admin ForeignKeyRawIdWidget
Query parameters for the admin ForeignKeyRawIdWidget were not properly URL
encoded, posing an XSS attack vector. ForeignKeyRawIdWidget now ensures query
parameters are correctly URL encoded.
more... | py36-django22 py36-django30 py37-django22 py37-django30 py38-django22 py38-django30
more detail |
2020-06-04 | VuXML ID ef5b4f5f-a658-11ea-80d7-001cc0382b2f
The GnuTLS project reports:
It was found that GnuTLS 3.6.4 introduced a regression in the TLS
protocol implementation. This caused the TLS server to not securely
construct a session ticket encryption key considering the
application supplied secret, allowing a MitM attacker to bypass
authentication in TLS 1.3 and recover previous conversations in TLS
1.2.
more... | gnutls
more detail |
2020-06-03 | VuXML ID 4bb56d2f-a5b0-11ea-a860-08002728f74c
nghttp2 security advisories:
The overly large HTTP/2 SETTINGS frame payload causes denial of service.
The proof of concept attack involves a malicious client constructing a
SETTINGS frame with a length of 14,400 bytes (2400 individual settings
entries) over and over again. The attack causes the CPU to spike at 100%.
more... | libnghttp2 nghttp2
more detail |
2020-06-03 | VuXML ID ca8327f7-a5a5-11ea-a860-08002728f74c
Changelog:
Remove a ReDoS vulnerability in the header parser (CVE-2020-7663)
more... | rubygem-websocket-extensions
more detail |
2020-05-31 | VuXML ID 1650cee2-a320-11ea-a090-08002734b9ed
The Gitea Team reports for release 1.11.6:
- Fix missing authorization check on pull for public repos of private/limited org (#11656) (#11683)
- Use session for retrieving org teams (#11438) (#11439)
more... | gitea
more detail |
2020-05-29* | VuXML ID f9c5a410-9b4e-11ea-ac3f-6805ca2fa271
PowerDNS Team reports:
CVE-2020-10995: An issue in the DNS protocol has been found that allow malicious parties to use
recursive DNS services to attack third party authoritative name servers. The attack uses a crafted
reply by an authoritative name server to amplify the resulting traffic between the recursive and
other authoritative name servers. Both types of service can suffer degraded performance as an effect.
CVE-2020-12244: An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in
the answer section of a NXDOMAIN response lacking an SOA were not properly validated in
SyncRes::processAnswer. This would allow an attacker in position of man-in-the-middle to send a
NXDOMAIN answer for a name that does exist, bypassing DNSSEC validation.
CVE-2020-10030: An issue has been found in PowerDNS Authoritative Server allowing an attacker
with enough privileges to change the system's hostname to cause disclosure of uninitialized memory
content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does
not null-terminate the returned string if the hostname is larger than the supplied buffer. Linux
systems are not affected because the buffer is always large enough. OpenBSD systems are not affected
because the returned hostname is always null-terminated. Under some conditions this issue can lead
to the writing of one null-byte out-of-bounds on the stack, causing a denial of service or possibly
arbitrary code execution.
more... | powerdns-recursor
more detail |
2020-05-28 | VuXML ID 28481349-7e20-4f80-ae1e-e6bf48d4f17c
The Sane Project reports:
epson2: fixes CVE-2020-12867 (GHSL-2020-075) and several memory management issues found while addressing that CVE
epsonds: addresses out-of-bound memory access issues to fix CVE-2020-12862 (GHSL-2020-082) and CVE-2020-12863 (GHSL-2020-083), addresses a buffer overflow fixing CVE-2020-12865 (GHSL-2020-084) and disables network autodiscovery to mitigate CVE-2020-12866 (GHSL-2020-079), CVE-2020-12861 (GHSL-2020-080) and CVE-2020-12864 (GHSL-2020-081). Note that this backend does not support network scanners to begin with.
magicolor: fixes a floating point exception and uninitialized data read
fixes an overflow in sanei_tcp_read()
more... | sane-backends
more detail |
2020-05-28 | VuXML ID 4e6875a2-a126-11ea-b385-08002728f74c
Kaminari Security Advisories:
There was a vulnerability in versions of Kaminari that would allow an
attacker to inject arbitrary code into pages with pagination links.
The 1.2.1 gem including the patch has already been released.
All past released versions are affected by this vulnerability.
more... | rubygem-kaminari-core
more detail |
2020-05-28 | VuXML ID 669f3fe8-a07a-11ea-b83e-f0def1f5c5a2
The FreeRDP changelog reports 14 CVEs addressed after 2.0.0-rc4
more... | freerdp
more detail |
2020-05-28 | VuXML ID 69cf62a8-a0aa-11ea-9ea5-001b217b3468
Gitlab reports:
User Email Verification Bypass
OAuth Flow Missing Email Verification Checks
Notification Email Verification Bypass
Undisclosed Vulnerability on a Third-Party Rendering Engine
Group Sign-Up Restriction Bypass
Mirror Project Owner Impersonation
Missing Permission Check on Fork Relation Creation
Cross-Site Scripting in Repository Files API
Kubernetes Cluster Token Disclosure
Object Storage File Enumeration
Insecure Authorization Check on Project Deploy Keys
Cross-Site Scripting on Metrics Dashboard
Denial of Service on Custom Dashboards
Client-Side Code Injection through Mermaid Markup
Cross-Site Scripting on Static Site Editor
Disclosure of Amazon EKS Credentials
Denial of Service on Workhorse
more... | gitlab-ce
more detail |
2020-05-26 | VuXML ID 61bc44ce-9f5a-11ea-aff3-f8b156c2bfe9
A vulnerability has been discovered in Sympa web interface
by which attacker can execute arbitrary code with root privileges.
Sympa uses two sorts of setuid wrappers:
- FastCGI wrappers
- newaliases wrapper
The FastCGI wrappers wwsympa-wrapper.fcgi and
sympa_soap_server-wrapper.fcgi were used to make the web
interface running under privileges of a dedicated user.
The newaliases wrapper (sympa_newaliases-wrapper) allows
Sympa to update the alias database with root privileges.
Since these setuid wrappers did not clear environment variables,
if environment variables like PERL5LIB were injected,
forged code might be loaded and executed under privileges of setuid-ed
users.
more... | sympa
more detail |
2020-05-24 | VuXML ID 38c676bd-9def-11ea-a94c-3065ec8fd3ec
Google Chrome Releases reports:
This release includes 38 security fixes, including CVEs
CVE-2020-6465 through CVE-2020-6491.
more... | chromium
more detail |
2020-05-23 | VuXML ID 436d7f93-9cf0-11ea-82b8-4c72b94353b5
Piwigo reports:
Piwigo 2.10.1 is affected by stored XSS
via the Group Name Field to the group_list page.
more... | piwigo
more detail |
2020-05-22 | VuXML ID 676ca486-9c1e-11ea-8b5e-b42e99a1b9c3
The Apache Software Foundation reports:
Under certain circumstances an attacker will be able to trigger remote code execution via deserialization of the file under their control
more... | tomcat-devel tomcat7 tomcat85 tomcat9
more detail |
2020-05-22 | VuXML ID 9908a1cc-35ad-424d-be0b-7e56abd5931a
Javier Moreno discovered a vulnerability in Sympa web
interface that can cause denial of service (DoS) attack.
By submitting requests with malformed parameters, this
flaw allows to create junk files in Sympa's directory
for temporary files. And particularly by tampering token
to prevent CSRF, it allows to originate exessive
notification messages to listmasters.
more... | sympa
more detail |
2020-05-22 | VuXML ID c5ec57a9-9c2b-11ea-82b8-4c72b94353b5
Drupal Security Team reports:
The jQuery project released version 3.5.0, and as part of that,
disclosed two security vulnerabilities that affect all prior versions.
As mentioned in the jQuery blog, both are: ... Security issues in
jQuerys DOM manipulation methods, as in .html(), .append(), and the others.
Security advisories for both of these issues have been published on GitHub.
Drupal 7 has an Open Redirect vulnerability.
For example, a user could be tricked into visiting a specially crafted link
which would redirect them to an arbitrary external URL. The vulnerability is
caused by insufficient validation of the destination query parameter in the
drupal_goto() function.
more... | drupal7 drupal8
more detail |
2020-05-20 | VuXML ID 4d11d37e-9a8d-11ea-b9b8-641c67a117d8
Zabbix reports:
Fixed security vulnerability cve-2020-11800 (remote code execution).
(ZBX-17600)
more... | zabbix3-proxy zabbix3-server
more detail |
2020-05-19 | VuXML ID 85fca718-99f6-11ea-bf1d-08002728f74c
Ruby on Rails blog:
Hi everyone! Rails 5.2.4.3 and 6.0.3.1 have been released! These releases contain important security fixes, so please upgrade when you can.
Both releases contain the following fixes:
CVE-2020-8162: Circumvention of file size limits in ActiveStorage
CVE-2020-8164: Possible Strong Parameters Bypass in ActionPack
CVE-2020-8165: Potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore
CVE-2020-8166: Ability to forge per-form CSRF tokens given a global CSRF token
CVE-2020-8167: CSRF Vulnerability in rails-ujs
more... | rubygem-actionpack52 rubygem-actionpack60 rubygem-actionview52 rubygem-actionview60 rubygem-activestorage52 rubygem-activestorage60 rubygem-activesupport52 rubygem-activesupport60
more detail |
2020-05-18 | VuXML ID 37d106a8-15a4-483e-8247-fcb68b16eaf8
Aki Tuomi reports:
Vulnerability Details:
Sending malformed NOOP command causes crash in submission, submission-login or
lmtp service.
Risk:
Remote attacker can keep submission-login service down, causing denial of
service attack. For lmtp the risk is neglible, as lmtp is usually behind a
trusted MTA.
Steps to reproduce:
Send ``NOOP EE"FY`` to submission port, or similarly malformed command.
Vulnerability Details:
Sending command followed by sufficient number of newlines triggers a
use-after-free bug that might crash submission-login, submission or
lmtp service.
Risk:
Remote attacker can keep submission-login service down, causing denial
of service attack. For lmtp the risk is neglible, as lmtp is usually
behind a trusted MTA.
Steps to reproduce:
This can be currently reproduced with ASAN or Valgrind. Reliable way to
crash has not yet been discovered.
Vulnerability Details:
Sending mail with empty quoted localpart causes submission or lmtp component
to crash.
Risk:
Malicious actor can cause denial of service to mail delivery by repeatedly
sending mails with bad sender or recipient address.
Steps to reproduce:
Send mail with envelope sender or recipient as <""@example.org>.
Workaround:
For submission there is no workaround, but triggering the bug requires valid
credentials.
For lmtp, one can implement sufficient filtering on MTA level to prevent mails
with such addresses from ending up in LMTP delivery.
more... | dovecot
more detail |
2020-05-17* | VuXML ID abc3ef37-95d4-11ea-9004-25fadb81abf4
Tobias Stöckmann reports:
I have discovered a way to trigger an out of boundary write while
parsing a huge json file through a malicious input source. It can be
triggered if an attacker has control over the input stream or if a
huge load during filesystem operations can be triggered.
more... | json-c
more detail |
2020-05-16* | VuXML ID 21d59ea3-8559-11ea-a5e2-d4c9ef517024
Oracle reports:
This Critical Patch Update contains 45 new security patches for
Oracle MySQL. 9 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without
requiring user credentials.
MariaDB reports 4 of these vulnerabilities exist in their software
more... | mariadb101-server mariadb102-server mariadb103-server mariadb104-server mysql56-server mysql57-server mysql80-server percona55-server percona56-server percona57-server
more detail |
2020-05-16 | VuXML ID 6bf55af9-973b-11ea-9f2c-38d547003487
F-Secure reports:
CVE-2020-11651 - Authentication bypass vulnerabilities
The ClearFuncs class processes unauthenticated requests and
unintentionally exposes the _send_pub() method, which can be used to
queue messages directly on the master publish server. Such messages
can be used to trigger minions to run arbitrary commands as root.
The ClearFuncs class also exposes the method _prep_auth_info(),
which returns the "root key" used to authenticate commands from the
local root user on the master server. This "root key" can then be
used to remotely call administrative commands on the master server.
This unintentional exposure provides a remote un-authenticated
attacker with root-equivalent access to the salt master.
CVE-2020-11652 - Directory traversal vulnerabilities
The wheel module contains commands used to read and write files
under specific directory paths. The inputs to these functions are
concatenated with the target directory and the resulting path is not
canonicalized, leading to an escape of the intended path restriction.
The get_token() method of the salt.tokens.localfs class (which is
exposed to unauthenticated requests by the ClearFuncs class) fails
to sanitize the token input parameter which is then used as a
filename, allowing insertion of ".." path elements and thus reading
of files outside of the intended directory. The only restriction is
that the file has to be deserializable by salt.payload.Serial.loads().
more... | py27-salt py32-salt py33-salt py34-salt py35-salt py36-salt py37-salt py38-salt
more detail |
2020-05-16 | VuXML ID ce6db19b-976e-11ea-93c4-08002728f74c
Ruby on Rails blog:
Due to an unfortunate oversight, Rails 4.2.11.2 has a missing constant
error. To address this Rails 4.2.11.3 has been released.
The original announcement for CVE-2020-8163 has a follow-up message
with an updated patch if you?re unable to use the gems.
more... | rubygem-actionview4
more detail |
2020-05-14 | VuXML ID 91ce95d5-cd15-4105-b942-af5ccc7144c1
Micah Snyder reports:
CVE-2020-3327: Fixed a vulnerability in the ARJ archive-parsing module
in ClamAV 0.102.2 that could cause a denial-of-service condition.
Improper bounds checking of an unsigned variable results in an
out-of-bounds read which causes a crash. Special thanks to Daehui Chang
and Fady Othman for helping identify the ARJ parsing vulnerability.
CVE-2020-3341: Fixed a vulnerability in the PDF-parsing module in ClamAV
0.101 - 0.102.2 that could cause a denial-of-service condition. Improper
size checking of a buffer used to initialize AES decryption routines
results in an out-of-bounds read, which may cause a crash. OSS-Fuzz
discovered this vulnerability.
more... | clamav
more detail |
2020-05-13 | VuXML ID 59fabdf2-9549-11ea-9448-08002728f74c
Typo3 News:
CVE-2020-11063: TYPO3-CORE-SA-2020-001: Information Disclosure in
Password Reset
It has been discovered that time-based attacks can be used with the
password reset functionality for backend users. This allows an attacker
to verify whether a backend user account with a given email address
exists or not.
CVE-2020-11064: TYPO3-CORE-SA-2020-002: Cross-Site Scripting in Form
Engine
It has been discovered that HTML placeholder attributes containing
data of other database records are vulnerable to cross-site scripting. A
valid backend user account is needed to exploit this vulnerability.
CVE-2020-11065: TYPO3-CORE-SA-2020-003: Cross-Site Scripting in Link
Handling
It has been discovered that link tags generated by typolink
functionality are vulnerable to cross-site scripting - properties being
assigned as HTML attributes have not been parsed correctly.
CVE-2020-11066: TYPO3-CORE-SA-2020-004: Class destructors causing
side-effects when being unserialized
Calling unserialize() on malicious user-submitted content can result
in the following scenarios:
- trigger deletion of arbitrary directory in file system (if writable
for web server)
- trigger message submission via email using identity of web site
(mail relay)
Another insecure deserialization vulnerability is required to actually
exploit mentioned aspects.
CVE-2020-11067: TYPO3-CORE-SA-2020-005: Insecure Deserialization in
Backend User Settings
It has been discovered that backend user settings (in $BE_USER->uc) are
vulnerable to insecure deserialization. In combination with
vulnerabilities of 3rd party components this can lead to remote code
execution. A valid backend user account is needed to exploit this
vulnerability.
CVE-2020-11069: TYPO3-CORE-SA-2020-006: Same-Site Request Forgery to
Backend User Interface
It has been discovered that the backend user interface and install tool
are vulnerable to same-site request forgery. A backend user can be
tricked into interacting with a malicious resource an attacker
previously managed to upload to the web server - scripts are then
executed with the privileges of the victims? user session.
In a worst case scenario new admin users can be created which can
directly be used by an attacker. The vulnerability is basically a
cross-site request forgery (CSRF) triggered by a cross-site scripting
vulnerability (XSS) - but happens on the same target host - thus, it?
actually a same-site request forgery (SSRF).
Malicious payload such as HTML containing JavaScript might be provided
by either an authenticated backend user or by a non-authenticated user
using a 3rd party extension - e.g. file upload in a contact form with
knowing the target location.
The attacked victim requires an active and valid backend or install
tool user session at the time of the attack to be successful.
more... | typo3-10-php72 typo3-10-php73 typo3-10-php74 typo3-9-php72 typo3-9-php73 typo3-9-php74
more detail |
2020-05-12 | VuXML ID 0bfcae0b-947f-11ea-92ab-00163e433440
Problem Description:
Requests to create cryptography sessions using a MAC did not validate the
user-supplied MAC key length. The cryptodev module allocates a buffer whose
size is this user-suppled length.
Impact:
An unprivileged process can trigger a kernel panic.
more... | FreeBSD-kernel
more detail |
2020-05-12 | VuXML ID 253486f5-947d-11ea-92ab-00163e433440
Problem Description:
The SCTP layer does improper checking when an application tries to update
a shared key. Therefore an unprivileged local user can trigger a use-after-
free situation, for example by specific sequences of updating shared keys and
closing the SCTP association.
Impact:
Triggering the use-after-free situation may result in unintended kernel
behaviour including a kernel panic.
more... | FreeBSD-kernel
more detail |
2020-05-12 | VuXML ID 30ce591c-947b-11ea-92ab-00163e433440
Problem Description:
libalias(3) packet handlers do not properly validate the packet length before
accessing the protocol headers. As a result, if a libalias(3) module does
not properly validate the packet length before accessing the protocol header,
it is possible for an out of bound read or write condition to occur.
Impact:
A malicious attacker could send specially constructed packets that exploit
the lack of validation allowing the attacker to read or write memory either
from the kernel (for the in-kernel NAT implementation) or from the process
space for natd (for the userspace implementation).
more... | FreeBSD-kernel
more detail |
2020-05-12 | VuXML ID 78992249-947c-11ea-92ab-00163e433440
Problem Description:
The FTP packet handler in libalias incorrectly calculates some packet
lengths. This may result in disclosing small amounts of memory from the
kernel (for the in-kernel NAT implementation) or from the process space for
natd (for the userspace implementation).
Impact:
A malicious attacker could send specially constructed packets that exploit the
erroneous calculation allowing the attacker to disclose small amount of memory
either from the kernel (for the in-kernel NAT implementation) or from the
process space for natd (for the userspace implementation).
more... | FreeBSD-kernel
more detail |
2020-05-12 | VuXML ID 9f15c2da-947e-11ea-92ab-00163e433440
Problem Description:
A race condition permitted a data structure in the kernel to be used
after it was freed by the cryptodev module.
Impact:
An unprivileged process can overwrite arbitrary kernel memory.
more... | FreeBSD-kernel
more detail |
2020-05-09 | VuXML ID 452d16bb-920d-11ea-9d20-18a6f7016652
Qutebrowser developers report:
After a certificate error was overridden by the user,
qutebrowser displays the URL as yellow (colors.statusbar.url.warn.fg).
However, when the affected website was subsequently loaded again,
the URL was mistakenly displayed as green (colors.statusbar.url.success_https).
While the user already has seen a certificate error prompt at this point
(or set content.ssl_strict to false which is not recommended),
this could still provide a false sense of security.
more... | qutebrowser
more detail |
2020-05-09 | VuXML ID d222241d-91cc-11ea-82b8-4c72b94353b5
MITRE Corporation reports:
inc/user.class.php in GLPI before 9.4.3 allows XSS via a user picture.
more... | glpi
more detail |
2020-05-07 | VuXML ID 88760f4d-8ef7-11ea-a66d-4b2ef158be83
Mark Sapiro reports:
A content injection vulnerability via the options login page has
been discovered and reported by Vishal Singh.
An issue similar to CVE-2018-13796 exists at different endpoint & param. It can lead to a phishing attack.
(added 2020-05-07) This is essentially the same as
https://bugs.launchpad.net/mailman/+bug/1873722 except the vector is
the private archive login page and the attack only succeeds if the
list's roster visibility (private_roster) setting is 'Anyone'.
more... | mailman mailman-with-htdig
more detail |
2020-05-06 | VuXML ID 1a6b7641-aed2-4ba1-96f4-c282d5b09c37
Jon Siwek of Corelight reports:
This release fixes the following security issues:
-
Fix buffer over-read in Ident analyzer
-
Fix SSL scripting error leading to uninitialized field
access and memory leak
-
Fix POP3 analyzer global buffer over-read
-
Fix potential stack overflows due to use of
Variable-Length-Arrays
more... | zeek
more detail |
2020-05-05 | VuXML ID d5fead4f-8efa-11ea-a5c8-08002728f74c
Wagtail release notes:
CVE-2020-11037: Potential timing attack on password-protected private pages
This release addresses a potential timing attack on pages or documents
that have been protected with a shared password through Wagtail's
"Privacy" controls. This password check is performed through a
character-by-character string comparison, and so an attacker who is
able to measure the time taken by this check to a high degree of
accuracy could potentially use timing differences to gain knowledge of
the password. (This is understood to be feasible on a local network, but
not on the public internet.)
more... | py35-wagtail py36-wagtail py37-wagtail py38-wagtail
more detail |
2020-05-04 | VuXML ID cd864f1a-8e5a-11ea-b5b4-641c67a117d8
Cacti developer reports:
Lack of escaping of color items can lead to XSS exposure.
more... | cacti
more detail |
2020-05-03 | VuXML ID d3f3e818-8d10-11ea-8668-e0d55e2a8bf9
Webin security lab - dbapp security Ltd reports:
The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.
more... | taglib
more detail |
2020-05-01 | VuXML ID e8483115-8b8e-11ea-bdcf-001b217b3468
Gitlab reports:
Path Traversal in NuGet Package Registry
Workhorse Bypass Leads to File Disclosure
OAuth Application Client Secrets Revealed
Code Owners Approval Rules Are Not Updated for Existing Merge Requests When Source Branch Changes
Code Owners Protection Not Enforced from Web UI
Repository Mirror Passwords Exposed To Maintainers
Admin Audit Log Page Denial of Service
Private Project ID Revealed Through Group API
Elasticsearch Credentials Logged to ELK
GitHub Personal Access Token Exposed on Integrations Page
Update Nokogiri dependency
Update OpenSSL Dependency
Update git
more... | gitlab-ce
more detail |
2020-04-29 | VuXML ID 3c7911c9-8a29-11ea-8d8c-005056a311d1
The Samba Team reports:
CVE-2020-10700
A client combining the 'ASQ' and 'Paged Results' LDAP controls can cause a
use-after-free in Samba's AD DC LDAP server.
CVE-2020-10704
A deeply nested filter in an un-authenticated LDAP search can exhaust the
LDAP server's stack memory causing a SIGSEGV.
more... | samba410 samba411 samba412
more detail |
2020-04-29 | VuXML ID 4a10902f-8a48-11ea-8668-e0d55e2a8bf9
VideoLAN reports:
Details
A remote user could:
- Create a specifically crafted image file that could trigger an out of bounds read
- Send a specifically crafter request to the microdns service discovery, potentially triggering various memory management issues
Impact
If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.
While these issues in themselves are most likely to just crash the player, we can't exclude that they could be combined to leak user informations or remotely execute code. ASLR and DEP help reduce the likelyness of code execution, but may be bypassed.
We have not seen exploits performing code execution through these vulnerabilities
CVE-2019-19721 affects VLC 3.0.8 and earlier, and only reads 1 byte out of bound
more... | vlc
more detail |
2020-04-29* | VuXML ID aae8fecf-888e-11ea-9714-08002718de91
Riccardo Schirone (https://github.com/ret2libc) reports:
In FullLoader python/object/new constructor, implemented by
construct_python_object_apply, has support for setting the
state of a deserialized instance through the set_python_instance_state
method. After setting the state, some operations are performed
on the instance to complete its initialization, however it is
possible for an attacker to set the instance' state in such a way
that arbitrary code is executed by the FullLoader.
This patch tries to block such attacks in FullLoader by
preventing set_python_instance_state from setting arbitrar
properties. It implements a blacklist that includes extend method
(called by construct_python_object_apply) and all special
methods (e.g. __set__, __setitem__, etc.).
Users who need special attributes being set in the state of a
deserialized object can still do it through the UnsafeLoader, which
however should not be used on untrusted input. Additionally, they can
subclass FullLoader and redefine state_blacklist_regexp to include the
additional attributes they need, passing the subclassed loader to
yaml.load.
more... | py27-yaml py35-yaml py36-yaml py37-yaml py38-yaml
more detail |
2020-04-28 | VuXML ID c7617931-8985-11ea-93ef-b42e99a1b9c3
Howard Chu reports:
nested filters leads to stack overflow
more... | openldap24-server
more detail |
2020-04-26 | VuXML ID 4c52ec3c-86f3-11ea-b5b4-641c67a117d8
Bleach developers reports:
bleach.clean behavior parsing style attributes could result in a
regular expression denial of service (ReDoS).
Calls to bleach.clean with an allowed tag with an allowed style
attribute are vulnerable to ReDoS. For example, bleach.clean(...,
attributes={'a': ['style']}).
more... | py27-bleach py35-bleach py36-bleach py37-bleach py38-bleach
more detail |
2020-04-23 | VuXML ID 622b5c47-855b-11ea-a5e2-d4c9ef517024
Oracle reports:
This Critical Patch Update contains 45 new security patches for
Oracle MySQL. 9 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without
requiring user credentials.
more... | mysql-connector-c mysql-connector-c++ mysql-connector-java mysql56-client mysql57-client mysql80-client percona55-client percona56-client percona57-client
more detail |
2020-04-23 | VuXML ID afa018d9-8557-11ea-a5e2-d4c9ef517024
Nextcloud reports:
XSS in Files PDF viewer (NC-SA-2020-019)
Missing ownership check on remote wipe endpoint (NC-SA-2020-018)
more... | nextcloud
more detail |
2020-04-22* | VuXML ID 012809ce-83f3-11ea-92ab-00163e433440
Problem Description:
Server or client applications that call the SSL_check_chain()
function during or after a TLS 1.3 handshake may crash due to a NULL
pointer dereference as a result of incorrect handling of the
"signature_algorithms_cert" TLS extension. The crash occurs if an
invalid or unrecognized signature algorithm is received from the
peer.
Impact:
A malicious peer could exploit the NULL pointer dereference crash,
causing a denial of service attack.
more... | FreeBSD openssl
more detail |
2020-04-22 | VuXML ID 67765237-8470-11ea-a283-b42e99a1b9c3
git security advisory reports:
Git uses external "credential helper" programs to store and retrieve passwords or
other credentials from secure storage provided by the operating system. Specially-crafted
URLs that are considered illegal as of the recently published Git versions can cause Git
to send a "blank" pattern to helpers, missing hostname and protocol fields. Many helpers
will interpret this as matching any URL, and will return some unspecified stored password,
leaking the password to an attacker's server.
more... | git git-gui git-lite
more detail |
2020-04-22 | VuXML ID 8d85d600-84a9-11ea-97b9-08002728f74c
Wagtail release notes:
CVE-2020-11001: Possible XSS attack via page revision comparison view
This release addresses a cross-site scripting (XSS) vulnerability on
the page revision comparison view within the Wagtail admin interface. A
user with a limited-permission editor account for the Wagtail admin
could potentially craft a page revision history that, when viewed by a
user with higher privileges, could perform actions with that user
credentials. The vulnerability is not exploitable by an ordinary site
visitor without access to the Wagtail admin.
more... | py35-wagtail py36-wagtail py37-wagtail py38-wagtail
more detail |
2020-04-22 | VuXML ID ced2d47e-8469-11ea-a283-b42e99a1b9c3
git security advisory reports:
Git uses external "credential helper" programs to store and retrieve passwords or
other credentials from secure storage provided by the operating system.
Specially-crafted URLs that contain an encoded newline can inject unintended values
into the credential helper protocol stream, causing the credential helper to retrieve
the password for one server for an HTTP request being made to another
server, resulting in credentials for the former being sent to the
latter.
more... | git git-gui git-lite
more detail |
2020-04-21 | VuXML ID 0f798bd6-8325-11ea-9a78-08002728f74c
NVD reports:
Libntlm through 1.5 relies on a fixed buffer size for
tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse
read and write operations, as demonstrated by a stack-based buffer
over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM
request.
more... | libntlm
more detail |
2020-04-21 | VuXML ID 33edcc56-83f2-11ea-92ab-00163e433440
Problem Description:
Incomplete packet data validation may result in accessing
out-of-bounds memory (CVE-2019-5614) or may access memory after it has
been freed (CVE-2019-15874).
Impact:
Access to out of bounds or freed mbuf data can lead to a kernel panic or
other unpredictable results.
more... | FreeBSD-kernel
more detail |
2020-04-21 | VuXML ID 9fbaefb3-837e-11ea-b5b4-641c67a117d8
Twisted developers reports:
All HTTP clients in twisted.web.client now raise a ValueError when
called with a method and/or URL that contain invalid characters. This
mitigates CVE-2019-12387. Thanks to Alex Brasetvik for reporting this
vulnerability.
The HTTP/2 server implementation now enforces TCP flow control on
control frame messages and times out clients that send invalid data
without reading responses. This closes CVE-2019-9512 (Ping Flood),
CVE-2019-9514 (Reset Flood), and CVE-2019-9515 (Settings Flood). Thanks
to Jonathan Looney and Piotr Sikora.
twisted.web.http was subject to several request smuggling attacks.
Requests with multiple Content-Length headers were allowed
(CVE-2020-10108, thanks to Jake Miller from Bishop Fox and ZeddYu Lu
for reporting this) and now fail with a 400; requests with a
Content-Length header and a Transfer-Encoding header honored the first
header (CVE-2020-10109, thanks to Jake Miller from Bishop Fox for
reporting this) and now fail with a 400; requests whose
Transfer-Encoding header had a value other than "chunked" and
"identity" (thanks to ZeddYu Lu) were allowed and now fail with a 400.
more... | py27-twisted py35-twisted py36-twisted py37-twisted py38-twisted
more detail |
2020-04-19 | VuXML ID 3d7dfd63-823b-11ea-b3a8-240a644dd835
The libssh team reports (originally reported by Yasheng Yang from
Google):
A malicious client or server could crash the counterpart implemented
with libssh AES-CTR ciphers are used and don't get fully initialized. It
will crash when it tries to cleanup the AES-CTR ciphers when closing the
connection.
more... | libssh
more detail |
2020-04-18 | VuXML ID e418b8f0-9abb-420b-a7f1-1d8231b352e2
The WebKitGTK project reports the following vulnerability.
Processing maliciously crafted web content may lead to arbitrary code execution or application crash (denial of service). Description: A memory corruption issue (use-after-free) was addressed with improved memory handling.
more... | webkit2-gtk3
more detail |
2020-04-17 | VuXML ID 0899c0d3-80f2-11ea-bafd-815569f3852d
Borja Tarraso reports:
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and
prior when using the Extract-Zip function from the win_unzip module as the
extracted file(s) are not checked if they belong to the destination folder. An
attacker could take advantage of this flaw by crafting an archive anywhere in
the file system, using a path traversal. This issue is fixed in 2.10.
more... | ansible ansible23 ansible24 ansible25 ansible26 ansible27
more detail |
2020-04-17 | VuXML ID 67dbeeb6-80f4-11ea-bafd-815569f3852d
Borja Tarraso reports:
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5
and prior when a password is set with the argument "password" of svn module,
it is used on svn command line, disclosing to other users within the same
node. An attacker could take advantage by reading the cmdline file from that
particular PID on the procfs.
more... | ansible ansible23 ansible24 ansible25 ansible26 ansible27
more detail |
2020-04-17 | VuXML ID ae2e7871-80f6-11ea-bafd-815569f3852d
Borja Tarraso reports:
A flaw was found in Ansible Engine when using Ansible Vault for editing
encrypted files. When a user executes "ansible-vault edit", another user
on the same computer can read the old and new secret, as it is created in
a temporary file with mkstemp and the returned file descriptor is closed
and the method write_data is called to write the existing secret in the
file. This method will delete the file before recreating it insecurely.
All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
more... | ansible ansible23 ansible24 ansible25 ansible26 ansible27
more detail |
2020-04-17 | VuXML ID e24fd421-8128-11ea-aa57-000ffec73f06
Drupal Security Team reports:
The Drupal project uses the third-party library CKEditor, which has
released a security improvement that is needed to protect some
Drupal configurations.
Vulnerabilities are possible if Drupal is configured to use the
WYSIWYG CKEditor for your site's users. An attacker that can createor
edit content may be able to exploit this Cross Site Scripting (XSS)
vulnerability to target users with access to the WYSIWYG CKEditor,
and this may include site admins with privileged access.
The latest versions of Drupal update CKEditor to 4.14 to mitigate
the vulnerabilities.
more... | drupal8
more detail |
2020-04-16 | VuXML ID 25efe05c-7ffc-11ea-b594-3065ec8fd3ec
Google Chrome Releases reports:
[1067851] Critical CVE-2020-6457: Use after free in speech
recognizer. Reported by Leecraso and Guang Gong of Alpha Lab, Qihoo
360 on 2020-04-04
more... | chromium
more detail |
2020-04-16 | VuXML ID 8604121c-7fc2-11ea-bcac-7781e90b0c8f
Lev Stipakov and Gert Doering report:
There is a time frame between allocating peer-id and initializing data
channel key (which is performed on receiving push request or on async
push-reply) in which the existing peer-id float checks do not work right.
If a "rogue" data channel packet arrives during that time frame from
another address and with same peer-id, this would cause client to float
to that new address.
The net effect of this behaviour is that the VPN session for the
"victim client" is broken. Since the "attacker client" does not have
suitable keys, it can not inject or steal VPN traffic from the other
session. The time window is small and it can not be used to attack
a specific client's session, unless some other way is found to make it
disconnect and reconnect first.
more... | openvpn openvpn-devel openvpn-mbedtls
more detail |
2020-04-15 | VuXML ID 570706ff-7ee0-11ea-bd0b-001b217b3468
Gitlab reports:
NuGet Package and File Disclosure through GitLab Workhorse
Job Artifact Uploads and File Disclosure through GitLab Workhorse
Incorrect membership following group removal
Logging of Praefect tokens
Update Rack dependency
Update OpenSSL dependency
more... | gitlab-ce
more detail |
2020-04-15 | VuXML ID bf1f47c4-7f1b-11ea-bf94-001cc0382b2f
Manuel Pégourié-Gonnard reports:
An attacker with access to precise enough timing and memory access
information (typically an untrusted operating system attacking a
secure enclave such as SGX or the TrustZone secure world) can fully
recover an ECDSA private key after observing a number of signature
operations.
more... | mbedtls
more detail |
2020-04-14 | VuXML ID 5b6bc863-89dc-11ea-af8b-00155d0a0200
RedHat reports:
ceph: secure mode of msgr2 breaks both confidentiality and integrity aspects for long-lived sessions.
ceph: header-splitting in RGW GetObject has a possible XSS.
more... | ceph14
more detail |
2020-04-14 | VuXML ID f59c4c53-c55f-43fe-9920-82b9d1ea9c3d
Jon Siwek of Corelight reports:
This release fixes the following security issue:
-
An attacker can crash Zeek remotely via crafted packet
sequence.
more... | zeek
more detail |
2020-04-12 | VuXML ID 6e3b700a-7ca3-11ea-b594-3065ec8fd3ec
Google Chrome Releases reports:
This updates includes 32 security fixes, including:
- [1019161] High CVE-2020-6454: Use after free in extensions.
Reported by Leecraso and Guang Gong of Alpha Lab, Qihoo 360 on
2019-10-29
- [1043446] High CVE-2020-6423: Use after free in audio.
Reported by Anonymous on 2020-01-18
- [1059669] High CVE-2020-6455: Out of bounds read in WebSQL.
Reported by Nan Wang(@eternalsakura13) and Guang Gong of Alpha Lab,
Qihoo 360 on 2020-03-09
- [1031479] Medium CVE-2020-6430: Type Confusion in V8.
Reported by Avihay Cohen @ SeraphicAlgorithms on 2019-12-06
- [1040755] Medium CVE-2020-6456: Insufficient validation of
untrusted input in clipboard. Reported by Micha? Bentkowski of
Securitum on 2020-01-10
- [852645] Medium CVE-2020-6431: Insufficient policy
enforcement in full screen. Reported by Luan Herrera (@lbherrera_)
on 2018-06-14
- [965611] Medium CVE-2020-6432: Insufficient policy
enforcement in navigations. Reported by David Erceg on
2019-05-21
- [1043965] Medium CVE-2020-6433: Insufficient policy
enforcement in extensions. Reported by David Erceg on
2020-01-21
- [1048555] Medium CVE-2020-6434: Use after free in devtools.
Reported by HyungSeok Han (DaramG) of Theori on 2020-02-04
- [1032158] Medium CVE-2020-6435: Insufficient policy
enforcement in extensions. Reported by Sergei Glazunov of Google
Project Zero on 2019-12-09
- [1034519] Medium CVE-2020-6436: Use after free in window
management. Reported by Igor Bukanov from Vivaldi on 2019-12-16
- [639173] Low CVE-2020-6437: Inappropriate implementation in
WebView. Reported by Jann Horn on 2016-08-19
- [714617] Low CVE-2020-6438: Insufficient policy enforcement in
extensions. Reported by Ng Yik Phang on 2017-04-24
- [868145] Low CVE-2020-6439: Insufficient policy enforcement in
navigations. Reported by remkoboonstra on 2018-07-26
- [894477] Low CVE-2020-6440: Inappropriate implementation in
extensions. Reported by David Erceg on 2018-10-11
- [959571] Low CVE-2020-6441: Insufficient policy enforcement in
omnibox. Reported by David Erceg on 2019-05-04
- [1013906] Low CVE-2020-6442: Inappropriate implementation in
cache. Reported by B@rMey on 2019-10-12
- [1040080] Low CVE-2020-6443: Insufficient data validation in
developer tools. Reported by @lovasoa (Ophir LOJKINE) on
2020-01-08
- [922882] Low CVE-2020-6444: Uninitialized Use in WebRTC.
Reported by mlfbrown on 2019-01-17
- [933171] Low CVE-2020-6445: Insufficient policy enforcement in
trusted types. Reported by Jun Kokatsu, Microsoft Browser
Vulnerability Research on 2019-02-18
- [933172] Low CVE-2020-6446: Insufficient policy enforcement in
trusted types. Reported by Jun Kokatsu, Microsoft Browser
Vulnerability Research on 2019-02-18
- [991217] Low CVE-2020-6447: Inappropriate implementation in
developer tools. Reported by David Erceg on 2019-08-06
- [1037872] Low CVE-2020-6448: Use after free in V8. Reported by
Guang Gong of Alpha Lab, Qihoo 360 on 2019-12-26
more... | chromium
more detail |
2020-04-07 | VuXML ID 57c1c2ee-7914-11ea-90bf-0800276545c1
The Squid developers reports:
Improper Input Validation issues in HTTP Request
processing (CVE-2020-8449, CVE-2020-8450).
Information Disclosure issue in FTP Gateway
(CVE-2019-12528).
Buffer Overflow issue in ext_lm_group_acl helper
(CVE-2020-8517).
more... | squid
more detail |
2020-04-02* | VuXML ID 40194e1c-6d89-11ea-8082-80ee73419af3
When parsing certain JSON documents, the json gem (including the
one bundled with Ruby) can be coerced into creating arbitrary objects
in the target system.
This is the same issue as CVE-2013-0269. The previous fix was incomplete,
which addressed JSON.parse(user_input), but didn?t address some other
styles of JSON parsing including JSON(user_input) and
JSON.parse(user_input, nil).
See CVE-2013-0269 in detail. Note that the issue was exploitable to
cause a Denial of Service by creating many garbage-uncollectable
Symbol objects, but this kind of attack is no longer valid because
Symbol objects are now garbage-collectable. However, creating arbitrary
bjects may cause severe security consequences depending upon the
application code.
Please update the json gem to version 2.3.0 or later. You can use
gem update json to update it. If you are using bundler, please add
gem "json", ">= 2.3.0" to your Gemfile.
more... | rubygem-json
more detail |
2020-04-02 | VuXML ID 7f829d44-7509-11ea-b47c-589cfc0f81b0
The HAproxy Project reports:
The main driver for this release is that it contains a fix for a serious
vulnerability that was responsibly reported last week by Felix Wilhelm
from Google Project Zero, affecting the HPACK decoder used for HTTP/2.
CVE-2020-11100 was assigned to this issue.
more... | haproxy haproxy18 haproxy19 haproxy21
more detail |
2020-04-02 | VuXML ID 9cb57a06-7517-11ea-b594-3065ec8fd3ec
Google Chrome Releases reports:
This update contains 8 security fixes.
- [1062247] High CVE-2020-6450: Use after free in WebAudio.
Reported by Man Yue Mo of Semmle Security Research Team on
2020-03-17
- [1061018] High CVE-2020-6451: Use after free in WebAudio.
Reported by Man Yue Mo of Semmle Security Research Team on
2020-03-12
- [1059764] High CVE-2020-6452: Heap buffer overflow in media
Reported by asnine on 2020-03-09
- [1066247] Various fixes from internal audits, fuzzing and other
initiatives.
more... | chromium
more detail |
2020-04-02 | VuXML ID b360b120-74b1-11ea-a84a-4c72b94353b5
Apache Team reports:
SECURITY: CVE-2020-1934
mod_proxy_ftp: Use of uninitialized value with malicious backend FTP
server.
SECURITY: CVE-2020-1927
rewrite, core: Set PCRE_DOTALL flag by default to avoid unpredictable
matches and substitutions with encoded line break characters.
The fix for CVE-2019-10098 was not effective.
more... | apache24
more detail |
2020-04-02 | VuXML ID e2b564fc-7462-11ea-af63-38d547003487
The Cacti developers reports:
When guest users have access to realtime graphs, remote code
could be executed (CVE-2020-8813).
Lack of escaping on some pages can lead to XSS exposure
(CVE-2020-7106).
Remote Code Execution due to input validation failure in
Performance Boost Debug Log (CVE-2020-7237).
more... | cacti
more detail |
2020-03-31 | VuXML ID d887b3d9-7366-11ea-b81a-001cc0382b2f
The GnuTLS project reports:
It was found that GnuTLS 3.6.3 introduced a regression in the DTLS
protocol implementation. This caused the DTLS client to not
contribute any randomness to the DTLS negotiation breaking the
security guarantees of the DTLS protocol.
more... | gnutls
more detail |
2020-03-30 | VuXML ID 0309c898-3aed-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before version 9.5.0, the encryption algorithm used is insecure. The security of the data encrypted relies on the password used, if a user sets a weak/predictable password, an attacker could decrypt data. This is fixed in version 9.5.0 by using a more secure encryption library. The library chosen is sodium.
more... | glpi
more detail |
2020-03-30 | VuXML ID 07aecafa-3b12-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI after 0.68.1 and before 9.4.6, multiple reflexive XSS occur in Dropdown endpoints due to an invalid Content-Type. This has been fixed in version 9.4.6.
more... | glpi
more detail |
2020-03-30 | VuXML ID 27a230a2-3b11-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before version 9.4.6 there are multiple related stored XSS vulnerabilities. The package is vulnerable to Stored XSS in the comments of items in the Knowledge base. Adding a comment with content "alert(1)" reproduces the attack. This can be exploited by a user with administrator privileges in the User-Agent field. It can also be exploited by an outside party through the following steps: 1. Create a user with the surname `" onmouseover="alert(document.cookie)` and an empty first name. 2. With this user, create a ticket 3. As an administrator (or other privileged user) open the created ticket 4. On the "last update" field, put your mouse on the name of the user 5. The XSS fires This is fixed in version 9.4.6.
more... | glpi
more detail |
2020-03-30 | VuXML ID 3a63f478-3b10-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection based which is based on a regexp. This is fixed in version 9.4.6.
more... | glpi
more detail |
2020-03-30 | VuXML ID 832fd11b-3b11-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.
more... | glpi
more detail |
2020-03-30 | VuXML ID aec9cbe0-3b0f-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.
more... | glpi
more detail |
2020-03-30 | VuXML ID b3aae7ea-3aef-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI before version 9.4.6, there is a SQL injection vulnerability for all helpdesk instances. Exploiting this vulnerability requires a technician account. This is fixed in version 9.4.6.
more... | glpi
more detail |
2020-03-30 | VuXML ID b64edef7-3b10-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
In GLPI after version 0.83.3 and before version 9.4.6, the CSRF tokens are generated using an insecure algorithm. The implementation uses rand and uniqid and MD5 which does not provide secure values. This is fixed in version 9.4.6.
more... | glpi
more detail |
2020-03-29 | VuXML ID d331f691-71f4-11ea-8bb5-6cc21735f730
The PostgreSQL project reports:
Versions Affected: 9.6 - 12
The ALTER ... DEPENDS ON EXTENSION sub-commands do not perform
authorization checks, which can allow an unprivileged user to drop
any function, procedure, materialized view, index, or trigger under
certain conditions. This attack is possible if an administrator has
installed an extension and an unprivileged user can CREATE, or an
extension owner either executes DROP EXTENSION predictably or can be
convinced to execute DROP EXTENSION.
more... | postgresql10-server postgresql11-server postgresql12-server postgresql96-server
more detail |
2020-03-27 | VuXML ID 090763f6-7030-11ea-93dd-080027846a02
Mediawiki reports:
Security fixes:
T246602:jquery.makeCollapsible allows applying event handler to any CSS
selector.
more... | mediawiki131 mediawiki133 mediawiki134
more detail |
2020-03-26 | VuXML ID 08fba28b-6f9f-11ea-bd0b-001b217b3468
Gitlab reports:
Arbitrary File Read when Moving an Issue
Path Traversal in NPM Package Registry
SSRF on Project Import
External Users Can Create Personal Snippet
Triggers Decription Can be Updated by Other Maintainers in Project
Information Disclosure on Confidential Issues Moved to Private Programs
Potential DoS in Repository Archive Download
Blocked Users Can Still Pull/Push Docker Images
Repository Mirroring not Disabled when Feature not Activated
Vulnerability Feedback Page Was Leaking Information on Vulnerabilities
Stored XSS Vulnerability in Admin Feature
Upload Feature Allowed a User to Read Unauthorized Exported Files
Unauthorized Users Are Able to See CI Metrics
Last Pipeline Status of a Merge Request Leaked
Blind SSRF on FogBugz
Update Nokogiri dependency
more... | gitlab-ce
more detail |
2020-03-25 | VuXML ID 5bf6ed6d-9002-4f43-ad63-458f59e45384
Jenkins Security Advisory:
Description
(High) SECURITY-1774 / CVE-2020-2160
CSRF protection for any URL could be bypassed
(Medium) SECURITY-1781 / CVE-2020-2161
Stored XSS vulnerability in label expression validation
(Medium) SECURITY-1793 / CVE-2020-2162
Stored XSS vulnerability in file parameters
(Medium) SECURITY-1796 / CVE-2020-2163
Stored XSS vulnerability in list view column headers
more... | jenkins jenkins-lts
more detail |
2020-03-25 | VuXML ID 97fcc60a-6ec0-11ea-a84a-4c72b94353b5
phpMyAdmin Team reports:
PMASA-2020-2 SQL injection vulnerability in the user accounts page, particularly when changing a password
PMASA-2020-3 SQL injection vulnerability relating to the search feature
PMASA-2020-4 SQL injection and XSS having to do with displaying results
Removing of the "options" field for the external transformation
more... | phpMyAdmin phpMyAdmin-php72 phpMyAdmin-php73 phpMyAdmin-php74 phpMyAdmin5 phpMyAdmin5-php72 phpMyAdmin5-php73 phpMyAdmin5-php74
more detail |
2020-03-23 | VuXML ID 36def7ba-6d2b-11ea-b115-643150d3111d
Puppetlabs reports:
Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names and class names. Previously, these endpoints were open to the local network.
PE 2018.1.13 & 2019.4.0, Puppet Server 6.9.1 & 5.3.12, and PuppetDB 6.9.1 & 5.2.13 disable trapperkeeper-metrics /v1 metrics API and only allows /v2 access on localhost by default.
more... | puppetdb5 puppetdb6 puppetserver5 puppetserver6
more detail |
2020-03-23 | VuXML ID 77687355-52aa-11ea-b115-643150d3111d
Puppetlabs reports:
Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master.
Puppet 6.13.0 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior.
more... | puppet6
more detail |
2020-03-19 | VuXML ID 0cc7e547-6a0a-11ea-92ab-00163e433440
Problem Description:
Incorrect use of a potentially user-controlled pointer in the kernel
allowed vnet jailed users to panic the system and potentially execute
aribitrary code in the kernel.
Impact:
Users with root level access (or the PRIV_NET_IFCREATE privilege)
can panic the system, or potentially escape the jail or execute
arbitrary code with kernel priviliges.
more... | FreeBSD-kernel
more detail |
2020-03-19 | VuXML ID 0e06013e-6a06-11ea-92ab-00163e433440
Problem Description:
When a TCP server transmits or retransmits a TCP SYN-ACK segment
over IPv6, the Traffic Class field is not initialized. This also
applies to challenge ACK segments, which are sent in response to
received RST segments during the TCP connection setup phase.
Impact:
For each TCP SYN-ACK (or challenge TCP-ACK) segment sent over IPv6,
one byte of kernel memory is transmitted over the network.
more... | FreeBSD-kernel
more detail |
2020-03-19 | VuXML ID 3c10ccdf-6a09-11ea-92ab-00163e433440
Problem Description:
The driver-specific ioctl(2) command handlers in oce(4) failed to
check whether the caller has sufficient privileges to perform the
corresponding operation.
Impact:
The oce(4) handler permits unprivileged users to send passthrough
commands to device firmware.
more... | FreeBSD-kernel
more detail |
2020-03-19 | VuXML ID 6b90acba-6a0a-11ea-92ab-00163e433440
Problem Description:
A missing NUL-termination check for the jail_set(2) configration
option "osrelease" may return more bytes when reading the jail
configuration back with jail_get(2) than were originally set.
Impact:
For jails with a non-default setting of children.max > 0 ("nested
jails") a superuser inside a jail can create a jail and may be able to
read and take advantage of exposed kernel memory.
more... | FreeBSD-kernel
more detail |
2020-03-19 | VuXML ID b2b83761-6a09-11ea-92ab-00163e433440
Problem Description:
The driver-specific ioctl(2) command handlers in ixl(4) failed to
check whether the caller has sufficient privileges to perform the
corresponding operation.
Impact:
The ixl(4) handler permits unprivileged users to trigger updates to
the device's non-volatile memory (NVM).
more... | FreeBSD-kernel
more detail |
2020-03-18 | VuXML ID 3d19c776-68e7-11ea-91db-0050562a4d7b
* ``bleach.clean`` behavior parsing embedded MathML and SVG content
with RCDATA tags did not match browser behavior and could result in
a mutation XSS.
Calls to ``bleach.clean`` with ``strip=False`` and ``math`` or
``svg`` tags and one or more of the RCDATA tags ``script``,
``noscript``, ``style``, ``noframes``, ``iframe``, ``noembed``, or
``xmp`` in the allowed tags whitelist were vulnerable to a mutation
XSS.
* ``bleach.clean`` behavior parsing ``noscript`` tags did not match
browser behavior.
Calls to ``bleach.clean`` allowing ``noscript`` and one or more of
the raw text tags (``title``, ``textarea``, ``script``, ``style``,
``noembed``, ``noframes``, ``iframe``, and ``xmp``) were vulnerable
to a mutation XSS.
more... | py27-bleach py35-bleach py36-bleach py37-bleach py38-bleach
more detail |
2020-03-15 | VuXML ID 4ae135f7-85cd-4c32-ad94-358271b31f7f
Jon Siwek of Corelight reports:
This release addresses the following security issues:
-
Potential Denial of Service due to memory leak in DNS
TSIG message parsing.
-
Potential Denial of Service due to memory leak (or assertion
when compiling with assertions enabled) when receiving a
second SSH KEX message after a first.
-
Potential Denial of Service due to buffer read overflow
and/or memory leaks in Kerberos analyzer. The buffer
read overflow could occur when the Kerberos message
indicates it contains an IPv6 address, but does not send
enough data to parse out a full IPv6 address. A memory
leak could occur when processing KRB_KDC_REQ KRB_KDC_REP
messages for message types that do not match a known/expected
type.
-
Potential Denial of Service when sending many zero-length
SSL/TLS certificate data. Such messages underwent the
full Zeek file analysis treatment which is expensive (and
meaninguless here) compared to how cheaply one can "create"
or otherwise indicate many zero-length contained in an
SSL message.
-
Potential Denial of Service due to buffer read overflow
in SMB transaction data string handling. The length of
strings being parsed from SMB messages was trusted to be
whatever the message claimed instead of the actual length
of data found in the message.
-
Potential Denial of Service due to null pointer dereference
in FTP ADAT Base64 decoding.
-
Potential Denial of Service due buffer read overflow in
FTP analyzer word/whitespace handling. This typically
won't be a problem in most default deployments of Zeek
since the FTP analyzer receives data from a ContentLine
(NVT) support analyzer which first null-terminates the
buffer used for further FTP parsing.
more... | zeek
more detail |
2020-03-13 | VuXML ID c3600a64-64ea-11ea-bdff-e0d55e2a8bf9
Albert Astals Cid:
Okular can be tricked into executing local binaries via specially crafted
PDF files.
This binary execution can require almost no user interaction.
No parameters can be passed to those local binaries.
We have not been able to identify any binary that will cause actual damage,
be it in the hardware or software level, when run without parameters.
We remain relatively confident that for this issue to do any actual damage,
it has to run a binary specially crafted. That binary must have been deployed
to the user system via another method, be it the user downloading it directly
as an email attachment, webpage download, etc. or by the system being already
compromised.
more... | okular
more detail |
2020-03-12 | VuXML ID 1685144e-63ff-11ea-a93a-080027846a02
MITRE CVE reports:
Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4
allows SQL Injection if untrusted data is used as a tolerance parameter
in GIS functions and aggregates on Oracle. By passing a suitably crafted
tolerance to GIS functions and aggregates on Oracle, it was possible to
break escaping and inject malicious SQL.
more... | py27-django111 py35-django111 py35-django22 py36-django111 py36-django22 py36-django30 py37-django111 py37-django22 py37-django30 py38-django111 py38-django22 py38-django30
more detail |
2020-03-12 | VuXML ID 9a09eaa2-6448-11ea-abb7-001b217b3468
Gitlab reports:
Email Confirmation not Required on Sign-up
more... | gitlab-ce
more detail |
2020-03-11 | VuXML ID 1afe9552-5ee3-11ea-9b6d-901b0e934d69
Matrix developers report:
[The 1.11.1] release includes a security fix impacting installations using Single Sign-On (i.e. SAML2 or CAS) for authentication. Administrators of such installations are encouraged to upgrade as soon as possible.
more... | py35-matrix-synapse py36-matrix-synapse py37-matrix-synapse
more detail |
2020-03-09 | VuXML ID 0032400f-624f-11ea-b495-000d3ab229d6
Node.js reports:
Updates are now available for all active Node.js release lines for the following issues.
HTTP request smuggling using malformed Transfer-Encoding header (Critical) (CVE-2019-15605)HTTP request smuggling using malformed Transfer-Encoding header (Critical) (CVE-2019-15605)
Affected Node.js versions can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system.
HTTP header values do not have trailing OWS trimmed (High) (CVE-2019-15606)
Optional whitespace should be trimmed from HTTP header values. Its presence may allow attackers to bypass security checks based on HTTP header values.
Remotely trigger an assertion on a TLS server with a malformed certificate string (High) (CVE-2019-15604)
Connecting to a NodeJS TLS server with a client certificate that has a type 19 string in its subjectAltName will crash the TLS server if it tries to read the peer certificate.
Strict HTTP header parsing (None)
Increase the strictness of HTTP header parsing. There are no known vulnerabilities addressed, but lax HTTP parsing has historically been a source of problems. Some commonly used sites are known to generate invalid HTTP headers, a --insecure-http-parser CLI option or insecureHTTPParser http option can be used if necessary for interoperability, but is not recommended.
more... | node node10 node12
more detail |
2020-03-07 | VuXML ID 8c98e643-6008-11ea-af63-38d547003487
SaltStack reports:
With the Salt NetAPI enabled in addition to having a SSH roster
defined, unauthenticated access is possible when specifying the
client as SSH.
Additionally, when the raw_shell option is specified any arbitrary
command may be run on the Salt master when specifying SSH options.
more... | py27-salt py32-salt py33-salt py34-salt py35-salt py36-salt py37-salt py38-salt
more detail |
2020-03-07 | VuXML ID be088777-6085-11ea-8609-08002731610e
The Gitea Team reports for release 1.11.0:
- Never allow an empty password to validate (#9682) (#9683)
- Prevent redirect to Host (#9678) (#9679)
- Swagger hide search field (#9554)
- Add "search" to reserved usernames (#9063)
- Switch to fomantic-ui (#9374)
- Only serve attachments when linked to issue/release and if accessible by user (#9340)
The Gitea Team reports for release 1.11.2:
- Ensure only own addresses are updated (#10397) (#10399)
- Logout POST action (#10582) (#10585)
- Org action fixes and form cleanup (#10512) (#10514)
- Change action GETs to POST (#10462) (#10464)
- Fix admin notices (#10480) (#10483)
- Change admin dashboard to POST (#10465) (#10466)
- Update markbates/goth (#10444) (#10445)
- Update crypto vendors (#10385) (#10398)
more... | gitea
more detail |
2020-03-06 | VuXML ID 62f2182c-5f7a-11ea-abb7-001b217b3468
Gitlab reports:
Directory Traversal to Arbitrary File Read
Account Takeover Through Expired Link
Server Side Request Forgery Through Deprecated Service
Group Two-Factor Authentication Requirement Bypass
Stored XSS in Merge Request Pages
Stored XSS in Merge Request Submission Form
Stored XSS in File View
Stored XSS in Grafana Integration
Contribution Analytics Exposed to Non-members
Incorrect Access Control in Docker Registry via Deploy Tokens
Denial of Service via Permission Checks
Denial of Service in Design For Public Issue
Incorrect Access Control via LFS Import
Unescaped HTML in Header
Private Merge Request Titles Leaked via Widget
Project Namespace Exposed via Vulnerability Feedback Endpoint
Denial of Service Through Recursive Requests
Project Authorization Not Being Updated
Incorrect Permission Level For Group Invites
Disclosure of Private Group Epic Information
User IP Address Exposed via Badge images
more... | gitlab-ce
more detail |
2020-03-03 | VuXML ID 591a706b-5cdc-11ea-9a0a-206a8a720317
nwtime.org reports:
Three ntp vulnerabilities, Depending on configuration, may have
little impact up to termination of the ntpd process.
NTP Bug 3610: Process_control() should exit earlier on short
packets. On systems that override the default and enable ntpdc
(mode 7) fuzz testing detected that a short packet will cause
ntpd to read uninitialized data.
NTP Bug 3596: An unauthenticated unmonitored ntpd is vulnerable
to attack on IPv4 with highly predictable transmit timestamps. An
off-path attacker who can query time from the victim's ntp which
receives time from an unauthenticated time source must be able to
send from a spoofed IPv4 address of upstream ntp server and and
the victim must be able to process a large number of packets with
the spoofed IPv4 address of the upstream server. After eight or
more successful attacks in a row the attacker can either modify
the victim's clock by a small amount or cause ntpd to terminate.
The attack is especially effective when unusually short poll
intervals have been configured.
NTP Bug 3592: The fix for https://bugs.ntp.org/3445 introduced
a bug such that a ntp can be prevented from initiating a time
volley to its peer resulting in a DoS.
All three NTP bugs may result in DoS or terimation of the ntp
daemon.
more... | FreeBSD ntp ntp-devel
more detail |
2020-03-02 | VuXML ID b66583ae-5aee-4cd5-bb31-b2d397f8b6b3
Librsvg2 developers reports:
Backport the following fixes from 2.46.x:
Librsvg now has limits on the number of loaded XML elements,
and the number of referenced elements within an SVG document. This
is to mitigate malicious SVGs which try to consume all memory, and
those which try to consume an exponential amount of CPU time.
Fix stack exhaustion with circular references in
Fix a denial-of-service condition from exponential explosion
of rendered elements, through nested use of SVG
more... | librsvg2 librsvg2-rust
more detail |
2020-03-02 | VuXML ID d37407bd-5c5f-11ea-bb2a-8c164582fbac
qflb.wu of DBAPPSecurity reports:
Ihe insert_note_steps function in readmidi.c in TiMidity++ 2.14.0
can cause a denial of service(divide-by-zero error and application
crash) via a crafted mid file.
The resample_gauss function in resample.c in TiMidity++ 2.14.0
can cause a denial of service(heap-buffer-overflow) via a crafted
mid file.
The play_midi function in playmidi.c in TiMidity++ 2.14.0 can
cause a denial of service(large loop and CPU consumption) via
a crafted mid file.
more... | timidity++ timidity++-emacs timidity++-gtk timidity++-motif timidity++-slang timidity++-tcltk timidity++-xaw timidity++-xskin
more detail |
2020-02-29 | VuXML ID e59cb761-5ad8-11ea-abb7-001b217b3468
Community reports:
8.1.1 and 8.2.0 users check ENABLE_REMOTE_JMX_OPTS setting
Apache Solr RCE vulnerability due to bad config default
Apache Solr RCE through VelocityResponseWriter
more... | apache-solr
more detail |
2020-02-27* | VuXML ID f0683976-5779-11ea-8a77-1c872ccb1e42
OpenSMTPD developers reports:
An out of bounds read in smtpd allows an attacker to inject arbitrary
commands into the envelope file which are then executed as root.
Separately, missing privilege revocation in smtpctl allows arbitrary
commands to be run with the _smtpq group.
An unprivileged local attacker can read the first line of an arbitrary
file (for example, root's password hash in /etc/master.passwd) or the
entire contents of another user's file (if this file and
/var/spool/smtpd/ are on the same filesystem).
more... | opensmtpd
more detail |
2020-02-24 | VuXML ID 056ea107-5729-11ea-a2f3-001cc0382b2f
Janos Follath reports:
If Mbed TLS is running in an SGX enclave and the adversary has
control of the main operating system, they can launch a side
channel attack to recover the RSA private key when it is being
imported.
The attack only requires access to fine grained measurements to
cache usage. Therefore the attack might be applicable to a scenario
where Mbed TLS is running in TrustZone secure world and the
attacker controls the normal world or possibly when Mbed TLS is
part of a hypervisor and the adversary has full control of a guest
OS.
more... | mbedtls
more detail |
2020-02-24 | VuXML ID 40c75597-574a-11ea-bff8-c85b76ce9b5a
Qualys reports:
.
more... | opensmtpd
more detail |
2020-02-24 | VuXML ID 76f1ce19-5749-11ea-bff8-c85b76ce9b5a
Qualys reports:
We discovered a minor vulnerability in OpenSMTPD, OpenBSD's mail server:
an unprivileged local attacker can read the first line of an arbitrary
file (for example, root's password hash in /etc/master.passwd) or the
entire contents of another user's file (if this file and
/var/spool/smtpd/ are on the same filesystem).
more... | opensmtpd
more detail |
2020-02-24 | VuXML ID b70b880f-5727-11ea-a2f3-001cc0382b2f
Janos Follath reports:
Our bignum implementation is not constant time/constant trace, so
side channel attacks can retrieve the blinded value, factor it (as
it is smaller than RSA keys and not guaranteed to have only large
prime factors), and then, by brute force, recover the key.
more... | mbedtls
more detail |
2020-02-21 | VuXML ID 8e3f1812-54d9-11ea-8d49-d4c9ef517024
The WeeChat project reports:
Buffer overflow when receiving a malformed IRC message 324 (channel
mode). (CVE-2020-8955)
Buffer overflow when a new IRC message 005 is received with longer
nick prefixes.
Crash when receiving a malformed IRC message 352 (WHO).
more... | weechat
more detail |
2020-02-19 | VuXML ID 1cb0af4e-d641-4f99-9432-297a89447a97
The WebKitGTK project reports multiple vulnerabilities.
more... | webkit2-gtk3
more detail |
2020-02-13 | VuXML ID 1ece5591-4ea9-11ea-86f0-001b217b3468
Gitlab reports:
Incorrect membership handling of group sharing feature
more... | gitlab-ce
more detail |
2020-02-13 | VuXML ID 74db0d02-b140-4c32-aac6-1f1e81e1ad30
Aki Tuomi reports:
lib-smtp doesn't handle truncated command parameters properly, resulting
in infinite loop taking 100% CPU for the process. This happens for LMTP
(where it doesn't matter so much) and also for submission-login where
unauthenticated users can trigger it.
Aki also reports:
Snippet generation crashes if:
message is large enough that message-parser returns multiple body
blocks
The first block(s) don't contain the full snippet (e.g. full of
whitespace)
input ends with '>'
more... | dovecot
more detail |
2020-02-12 | VuXML ID 9d6a48a7-4dad-11ea-8a1d-7085c25400ea
Reno Robert reports:
FreeBSD uses a two-process model for running a VM. For booting non-FreeBSD
guests, a modified grub-emu is used (grub-bhyve). Grub-bhyve executes command
from guest grub.cfg file. This is a security problem because grub was never
written to handle inputs from OS as untrusted. In the current design, grub
and guest OS works across trust boundaries. This exposes a grub to untrusted
inputs from guest.
grub-bhyve (emu) is built without SDL graphics support which reduces lot of
gfx attack surface, however font loading code is still accessible. Guest can
provide arbitrary font file, which is parsed by grub-bhyve running as root.
In grub-core/font/font.c, read_section_as_string() allocates
section->length + 1 bytes of memory. However, untrusted
section->length is an unsigned 32-bit number, and the result can
overflow to malloc(0) . This can result in a controlled buffer
overflow via the 'loadfont' command in a guest VM grub2.cfg, eventually leading
to privilege escalation from guest to host.
Reno Robert also reports:
GRUB supports commands to read and write addresses of choice. In
grub-bhyve, these commands provide a way to write to arbitrary virtual
addresses within the grub-bhyve process. This is another way for a guest
grub2.cfg, run by the host, to eventually escalate privileges.
These vulnerabilities are mitigated by disabling the 'loadfont', 'write_dword',
'read_dword', 'inl', 'outl', and other width variants of the same functionality in
grub2-bhyve.
There is also work in progress to sandbox the grub-bhyve utility such that
an escaped guest ends up with nobody:nobody in a Capsium sandbox. It is not
included in 0.40_8.
more... | grub2-bhyve
more detail |
2020-02-11 | VuXML ID 00f30cba-4d23-11ea-86ba-641c67a117d8
Mitre reports:
In libexif, there is a possible out of bounds write due to an integer overflow.
This could lead to remote escalation of privilege in the media content provider
with no additional execution privileges needed. User interaction is needed for
exploitation.
more... | libexif
more detail |
2020-02-11 | VuXML ID d460b640-4cdf-11ea-a59e-6451062f0f7a
Adobe reports:
- This update resolves a type confusion vulnerability that
could lead to arbitrary code execution (CVE-2020-3757).
more... | linux-flashplayer
more detail |
2020-02-09 | VuXML ID c1202de8-4b29-11ea-9673-4c72b94353b5
NGINX Team reports:
NGINX before 1.17.7, with certain error_page configurations, allows HTTP
request smuggling, as demonstrated by the ability of an attacker to read
unauthorized web pages in environments where NGINX is being fronted by a
load balancer.
more... | nginx nginx-devel
more detail |
2020-02-07 | VuXML ID 8b20d716-49df-11ea-9f7b-206a8a720317
Upstream ksh93 maintainer Siteshwar Vashisht reports:
A flaw was found in the way ksh evaluates certain environment
variables. An attacker could use this flaw to override or bypass
environment restrictions to execute shell commands. Services and
applications that allow remote unauthenticated attackers to
provide one of those environment variables could allow them to
exploit this issue remotely.
more... | ksh93 ksh93-devel
more detail |
2020-02-05 | VuXML ID e7bc2b99-485a-11ea-bff9-9c5c8e75236a
Micah Snyder reports:
A denial-of-service (DoS) condition may occur when using the optional
credit card data-loss-prevention (DLP) feature. Improper bounds checking of
an unsigned variable resulted in an out-of-bounds read, which causes a crash.
more... | clamav
more detail |
2020-02-04 | VuXML ID 5a45649a-4777-11ea-bdec-08002728f74c
MITRE CVE reports:
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3
allows SQL Injection if untrusted data is used as a StringAgg delimiter
(e.g., in Django applications that offer downloads of data as a series
of rows with a user-specified column delimiter). By passing a suitably
crafted delimiter to a contrib.postgres.aggregates.StringAgg instance,
it was possible to break escaping and inject malicious SQL.
more... | py27-django111 py35-django111 py35-django22 py36-django111 py36-django22 py36-django30 py37-django111 py37-django22 py37-django30 py38-django111 py38-django22 py38-django30
more detail |
2020-02-02 | VuXML ID 1e7fa41b-f6ca-4fe8-bd46-0e176b42b14f
The libssh team reports:
In an environment where a user is only allowed to copy files and
not to execute applications, it would be possible to pass a location
which contains commands to be executed in additon.
When the libssh SCP client connects to a server, the scp
command, which includes a user-provided path, is executed
on the server-side. In case the library is used in a way
where users can influence the third parameter of
ssh_scp_new(), it would become possible for an attacker to
inject arbitrary commands, leading to a compromise of the
remote target.
more... | libssh
more detail |
2020-02-02* | VuXML ID a6cf65ad-37d2-11ea-a1c7-b499baebfeaf
Oracle reports:
This Critical Patch Update contains 17 new security fixes for
Oracle MySQL. 5 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without
requiring user credentials.
more... | mysql56-server mysql57-server mysql80-server percona55-server percona56-server percona57-server
more detail |
2020-02-02 | VuXML ID cb0183bb-45f6-11ea-a1c7-b499baebfeaf
MariaDB reports:
Difficult to exploit vulnerability allows unauthenticated attacker
with network access via multiple protocols to compromise MySQL Client.
more... | mariadb-connector-c mariadb101-client mariadb101-server mariadb102-client mariadb102-server mariadb103-client mariadb103-server mariadb104-client mariadb104-server mariadb55-client mariadb55-server
more detail |
2020-01-31 | VuXML ID c5bd9068-440f-11ea-9cdb-001b217b3468
Gitlab reports:
Path Traversal to Arbitrary File Read
User Permissions Not Validated in ProjectExportWorker
XSS Vulnerability in File API
Package and File Disclosure through GitLab Workhorse
XSS Vulnerability in Create Groups
Issue and Merge Request Activity Counts Exposed
Email Confirmation Bypass Using AP
Disclosure of Forked Private Project Source Code
Private Project Names Exposed in GraphQL queries
Disclosure of Issues and Merge Requests via Todos
Denial of Service via AsciiDoc
Last Pipeline Status Exposed
Arbitrary Change of Pipeline Status
Grafana Token Displayed in Plaintext
Update excon gem
Update rdoc gem
Update rack-cors gem
Update rubyzip gem
more... | gitlab-ce
more detail |
2020-01-31 | VuXML ID c86bfee3-4441-11ea-8be3-54e1ad3d6335
The Apache SpamAssassin project reports:
A nefarious rule configuration (.cf) files can be configured to
run system commands. This issue is less stealthy and attempts to
exploit the issue will throw warnings.
Thanks to Damian Lukowski at credativ for reporting the issue
ethically. With this bug unpatched, exploits can be injected in a
number of scenarios though doing so remotely is difficult. In
addition to upgrading to SA 3.4.4, we again recommend that users
should only use update channels or 3rd party .cf files from trusted
places.
more... | spamassassin
more detail |
2020-01-30 | VuXML ID b4e5f782-442d-11ea-9ba9-206a8a720317
Todd C. Miller reports:
Sudo's pwfeedback option can be used to provide visual feedback
when the user is inputting their password. For each key press,
an asterisk is printed. This option was added in response to
user confusion over how the standard Password: prompt disables
the echoing of key presses. While pwfeedback is not enabled by
default in the upstream version of sudo, some systems, such as
Linux Mint and Elementary OS, do enable it in their default
sudoers files.
Due to a bug, when the pwfeedback option is enabled in the
sudoers file, a user may be able to trigger a stack-based buffer
overflow. This bug can be triggered even by users not listed in
the sudoers file. There is no impact unless pwfeedback has been
enabled.
more... | sudo
more detail |
2020-01-30 | VuXML ID e3404a6e-4364-11ea-b643-206a8a720317
the Apache Spamassassin project reports:
nefarious rule configuration (.cf) files can be configured to
run system commands similar to CVE-2018-11805. This issue
is less stealthy and attempts to exploit the issue will throw
warnings.
more... | spamassassin
more detail |
2020-01-29 | VuXML ID 08f5c27d-4326-11ea-af8b-00155d0a0200
OpenSMTPD developers report:
An incorrect check allows an attacker to trick mbox delivery
into executing arbitrary commands as root and lmtp delivery
into executing arbitrary commands as an unprivileged user
more... | opensmtpd
more detail |
2020-01-29 | VuXML ID 22b41bc5-4279-11ea-b184-f8b156ac3ff9
Problem Description:
A programming error allows an attacker who can specify a URL with a
username and/or password components to overflow libfetch(3) buffers.
Impact:
An attacker in control of the URL to be fetched (possibly via HTTP
redirect) may cause a heap buffer overflow, resulting in program
misbehavior or malicious code execution.
more... | FreeBSD
more detail |
2020-01-29 | VuXML ID 2af10639-4299-11ea-aab1-98fa9bfec35a
A programming error allows an attacker who can specify a URL with a username
and/or password components to overflow libfetch(3) buffers.
more... | pkg pkg-devel
more detail |
2020-01-29 | VuXML ID 5797c807-4279-11ea-b184-f8b156ac3ff9
Problem Description:
A missing check means that an attacker can reinject an old packet and
it will be accepted and processed by the IPsec endpoint.
Impact:
The impact depends on the higher-level protocols in use over IPsec.
For example, an attacker who can capture and inject packets could
cause an action that was intentionally performed once to be repeated.
more... | FreeBSD-kernel
more detail |
2020-01-29 | VuXML ID 6025d173-4279-11ea-b184-f8b156ac3ff9
Problem Description:
Due to incorrect initialization of a stack data structure, up to 20
bytes of kernel data stored previously stored on the stack will be
exposed to a crashing user process.
Impact:
Sensitive kernel data may be disclosed.
more... | FreeBSD-kernel
more detail |
2020-01-29 | VuXML ID a250539d-d1d4-4591-afd3-c8bdfac335d8
Jenkins Security Advisory:
Description
(High) SECURITY-1682 / CVE-2020-2099
Inbound TCP Agent Protocol/3 authentication bypass
(Medium) SECURITY-1641 / CVE-2020-2100
Jenkins vulnerable to UDP amplification reflection attack
(Medium) SECURITY-1659 / CVE-2020-2101
Non-constant time comparison of inbound TCP agent connection secret
(Medium) SECURITY-1660 / CVE-2020-2102
Non-constant time HMAC comparison
(Medium) SECURITY-1695 / CVE-2020-2103
Diagnostic page exposed session cookies
(Medium) SECURITY-1650 / CVE-2020-2104
Memory usage graphs accessible to anyone with Overall/Read
(Low) SECURITY-1704 / CVE-2020-2105
Jenkins REST APIs vulnerable to clickjacking
(Medium) SECURITY-1680 / CVE-2020-2106
Stored XSS vulnerability in Code Coverage API Plugin
(Medium) SECURITY-1565 / CVE-2020-2107
Fortify Plugin stored credentials in plain text
(High) SECURITY-1719 / CVE-2020-2108
XXE vulnerability in WebSphere Deployer Plugin
more... | jenkins jenkins-lts
more detail |
2020-01-27 | VuXML ID 5f0dd349-40a2-11ea-8d8c-005056a311d1
The Samba Team reports:
CVE-2019-14902
The implementation of ACL inheritance in the Samba AD DC was not complete,
and so absent a 'full-sync' replication, ACLs could get out of sync between
domain controllers.
CVE-2019-14907
When processing untrusted string input Samba can read past the end of the
allocated buffer when printing a "Conversion error" message to the logs.
CVE-2019-19344
During DNS zone scavenging (of expired dynamic entries) there is a read of
memory after it has been freed.
more... | samba410 samba411
more detail |
2020-01-26 | VuXML ID dc8cff4c-4063-11ea-8a94-3497f6939fdd
The WebKitGTK project reports multiple vulnerabilities.
more... | webkit2-gtk3
more detail |
2020-01-24 | VuXML ID 0700e76c-3eb0-11ea-8478-3085a9a95629
Pillow developers report:
This release addresses several security problems, as well as
addressing CVE-2019-19911.
CVE-2019-19911 is regarding FPX images. If an image reports that it
has a large number of bands, a large amount of resources will be
used when trying to process the image. This is fixed by limiting the
number of bands to those usable by Pillow.
Buffer overruns were found when processing an SGI, PCX or FLI image.
Checks have been added to prevent this.
Overflow checks have been added when calculating the size of a
memory block to be reallocated in the processing of a TIFF image.
more... | py27-pillow py35-pillow py36-pillow py37-pillow py38-pillow
more detail |
2020-01-18 | VuXML ID a512a412-3a33-11ea-af63-0800274e5f20
The Gitea Team reports:
- Hide credentials when submitting migration
- Never allow an empty password to validate
- Prevent redirect to Host
- Hide public repos owned by private orgs
more... | gitea
more detail |
2020-01-15 | VuXML ID d2c2c815-3793-11ea-8be3-54e1ad3d6335
Intel reports:
.A potential security vulnerability in Intel(R) Processor Graphics
may allow information disclosure. Intel is releasing software
updates to mitigate this potential vulnerability.
Description: Insufficient control flow in certain data
structures for some Intel(R) Processors with Intel(R) Processor
Graphics may allow an unauthenticated user to potentially enable
information disclosure via local access.
This patch provides mitigation for Gen9 hardware only. Patches
for Gen7 and Gen7.5 will be provided later. Note that Gen8 is not
impacted due to a previously implemented workaround. The mitigation
involves using an existing hardware feature to forcibly clear down
all EU state at each context switch.
more... | drm-current-kmod drm-devel-kmod drm-fbsd11.2-kmod drm-fbsd12.0-kmod
more detail |
2020-01-14 | VuXML ID 2bab995f-36d4-11ea-9dad-002590acae31
Art Manion and Will Dormann report:
By using an older and less-secure form of open(), it is
possible for untrusted template files to cause reads/writes
outside of the template directories. This vulnerability is
a component of the recent Citrix exploit.
more... | p5-Template-Toolkit
more detail |
2020-01-14 | VuXML ID f929b172-369e-11ea-9cdb-001b217b3468
Gitlab reports:
Private objects exposed through project importi
more... | gitlab-ce
more detail |
2020-01-11 | VuXML ID 16aed7b7-344a-11ea-9cdb-001b217b3468
The phpMyAdmin development team reports:
A SQL injection flaw has been discovered in the user accounts page
more... | phpMyAdmin phpMyAdmin-php72 phpMyAdmin-php73 phpMyAdmin-php74 phpMyAdmin5 phpMyAdmin5-php72 phpMyAdmin5-php73 phpMyAdmin5-php74
more detail |
2020-01-08 | VuXML ID 8b61308b-322a-11ea-b34b-1de6fb24355d
Lilith of Cisco Talos reports:
A code execution vulnerability exists in the directory rehashing
functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4
directory can cause an out-of-bounds write on the stack, resulting
in code execution. An attacker can corrupt a partition to trigger
this vulnerability.
Theodore Y. Ts'o reports:
E2fsprogs 1.45.5 [...:] Fix a potential out of bounds write when
checking a maliciously corrupted file system. This is probably not
exploitable on 64-bit platforms, but may be exploitable on 32-bit
binaries depending on how the compiler lays out the stack variables.
(Addresses CVE-2019-5188)
more... | e2fsprogs
more detail |
2020-01-06 | VuXML ID 86224a04-26de-11ea-97f2-001a8c5c04b6
The cacti developers reports:
When viewing graphs, some input variables are not properly checked
(SQL injection possible).
Multiple instances of lib/functions.php are affected by unsafe
deserialization of user-controlled data to populate arrays. An
authenticated attacker could use this to influence object data
values and control actions taken by Cacti or potentially cause
memory corruption in the PHP module.
more... | cacti
more detail |
2020-01-03 | VuXML ID 01bde18a-2e09-11ea-a935-001b217b3468
SO-AND-SO reports:
Group Maintainers Can Update/Delete Group Runners Using API
GraphQL Queries Can Hang the Application
Unauthorized Users Have Access to Milestones of Releases
Private Group Name Revealed Through Protected Tags API
Users Can Publish Reviews on Locked Merge Requests
DoS in the Issue and Commit Comments Pages
Project Name Disclosed Through Unsubscribe Link
Private Project Name Disclosed Through Notification Settings
more... | gitlab-ce
more detail |
2020-01-02 | VuXML ID b3695b08-3b3a-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
GLPI before before version 9.4.6 has a vulnerability involving a default encryption key. GLPIKEY is public and is used on every instance. This means anyone can decrypt sensitive data stored using this key. It is possible to change the key before installing GLPI. But on existing instances, data must be reencrypted with the new key. Problem is we can not know which columns or rows in the database are using that; espcially from plugins. Changing the key without updating data would lend in bad password sent from glpi; but storing them again from the UI will work.
more... | glpi
more detail |
2019-12-29 | VuXML ID 66e4dc99-28b3-11ea-8dde-08002728f74c
National Vulnerability Database:
There's a possible information leak / session hijack vulnerability in
Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12
and 2.0.8. Attackers may be able to find and hijack sessions by using
timing attacks targeting the session id. Session ids are usually stored
and indexed in a database that uses some kind of scheme for speeding up
lookups of that session id. By carefully measuring the amount of time
it takes to look up a session, an attacker may be able to find a valid
session id and hijack the session. The session id itself may be
generated randomly, but the way the session is indexed by the backing
store does not use a secure comparison.
more... | rubygem-rack rubygem-rack16
more detail |
2019-12-29 | VuXML ID e4d9dffb-2a32-11ea-9693-e1b3f6feec79
Cary Phillips reports:
OpenEXR (IlmBase) v2.4.0 fixes the following security vulnerabilities:
- CVE-2018-18444 Issue #351 Out of Memory
- CVE-2018-18443 Issue #350 heap-buffer-overflow
The relevant patches have been backported to the FreeBSD ports.
more... | ilmbase openexr
more detail |
2019-12-26 | VuXML ID 7b97b32e-27c4-11ea-9673-4c72b94353b5
wordpress developers reports:
Four security issues affect WordPress versions 5.3 and earlier; version 5.3.1 fixes them, so youll want to upgrade.
If you havent yet updated to 5.3, there are also updated versions of 5.2 and earlier that fix the security issues.
-Props to Daniel Bachhuber for finding an issue where an unprivileged user could make a post sticky via the REST API.
-Props to Simon Scannell of RIPS Technologies for finding and disclosing an issue where cross-site scripting (XSS)
could be stored in well-crafted links.
-Props to the WordPress.org Security Team for hardening wp_kses_bad_protocol() to ensure that it is aware of the named
colon attribute.
-Props to Nguyen The Duc for discovering a stored XSS vulnerability using block editor content.
more... | de-wordpress fr-wordpress ja-wordpress ru-wordpress wordpress zh_CN-wordpress zh_TW-wordpress
more detail |
2019-12-25 | VuXML ID 1c9178aa-2709-11ea-9673-4c72b94353b5
Typo3 core team reports:
It has been discovered that the output of field validation errors in the Form Framework is vulnerable
to cross-site scripting.
It has been discovered that t3:// URL handling and typolink functionality are vulnerable to cross-site
scripting. Not only regular backend forms are affected but also frontend extensions which use the rendering
with typolink.
It has been discovered that the output table listing in the Files backend module is vulnerable to cross-site
scripting when a file extension contains malicious sequences. Access to the file system of the server - either
directly or through synchronization - is required to exploit the vulnerability.
It has been discovered that the extraction of manually uploaded ZIP archives in Extension Manager is vulnerable
to directory traversal. Admin privileges are required in order to exploit this vulnerability. Since TYPO3 v9 LTS,
System Maintainer privileges are required as well.
Failing to properly escape user submitted content, class QueryGenerator is vulnerable to SQL injection.
Having system extension ext:lowlevel installed and a valid backend user having administrator privileges are
required to exploit this vulnerability.
It has been discovered that classes QueryGenerator and QueryView are vulnerable to insecure deserialization.
Requirements for successfully exploiting this vulnerability (one of the following):
- having system extension ext:lowlevel (Backend Module: DB Check) installed and valid backend user having
administrator privileges
- having system extension ext:sys_action installed and valid backend user having limited privileges
TYPO3 allows to upload files either in the backend user interface as well as in custom developed extensions.
To reduce the possibility to upload potential malicious code TYPO3 uses the fileDenyPattern to deny e.g. user
submitted PHP scripts from being persisted. Besides that it is possible for any editor to upload file assets
using the file module (fileadmin) or changing their avatar image shown in the TYPO3 backend.
Per default TYPO3 allows to upload and store HTML and SVG files as well using the mentioned functionalities.
Custom extension implementations probably would also accept those files when only the fileDenyPattern is evaluated.
Since HTML and SVG files - which might contain executable JavaScript code per W3C standard - could be directly
displayed in web clients, the whole web application is exposed to be vulnerable concerning Cross-Site Scripting.
Currently the following scenarios are known - given an authenticated regular editor is able to upload files using
the TYPO3 backend:
- directly target a potential victim to a known public resource in a URL, e.g. /fileadmin/malicious.svg or
/fileadmin/malicious.html
- using the TypoScript content object ?SVG? (implemented in class ScalableVectorGraphicsContentObject)
having renderMode set to inline for SVG files (available since TYPO3 v9.0)
- custom implementations that directly output and render markup of HTML and SVG files
SVG files that are embedded using an img src=?malicious.svg? tag are not vulnerable since potential
scripts are not executed in these scenarios (see https://www.w3.org/wiki/SVG_Security). The icon API of TYPO3
is not scope of this announcement since SVG icons need to be registered using an individual implementation,
which is not considered as user submitted content.
It has been discovered that request handling in Extbase can be vulnerable to insecure deserialization.
User submitted payload has to be signed with a corresponding HMAC-SHA1 using the sensitive TYPO3 encryptionKey
as secret - invalid or unsigned payload is not deserialized.
However, since sensitive information could have been leaked by accident (e.g. in repositories or in commonly
known and unprotected backup files), there is the possibility that attackers know the private encryptionKey
and are able to calculate the required HMAC-SHA1 to allow a malicious payload to be deserialized.
Requirements for successfully exploiting this vulnerability (all of the following):
- rendering at least one Extbase plugin in the frontend
- encryptionKey has been leaked (from LocalConfiguration.php or corresponding .env file).
more... | typo3-8 typo3-9
more detail |
2019-12-21 | VuXML ID 3da0352f-2397-11ea-966e-000ffec0b3e1
Drupal Security Team reports:
A visit to install.php can cause cached data to become corrupted.
This could cause a site to be impaired until caches are rebuilt.
Drupal 8 core's file_save_upload() function does not strip the
leading and trailing dot ('.') from filenames, like Drupal 7 did.
Users with the ability to upload files with any extension in
conjunction with contributed modules may be able to use this to
upload system files such as .htaccess in order to bypass protections
afforded by Drupal's default .htaccess file. After this fix,
file_save_upload() now trims leading and trailing dots from filenames.
The Media Library module has a security vulnerability whereby it
doesn't sufficiently restrict access to media items in certain
configurations.
The Drupal project uses the third-party library Archive_Tar, which
has released a security-related feature that impacts some Drupal
configurations. Multiple vulnerabilities are possible if Drupal is
configured to allow .tar, .tar.gz, .bz2 or .tlz file uploads and
processes them. The latest versions of Drupal update Archive_Tar to
1.4.9 to mitigate the file processing vulnerabilities.
more... | drupal7 drupal8
more detail |
2019-12-21 | VuXML ID ad3451b9-23e0-11ea-8b36-f1925a339a82
Ted Y. Ts'o reports:
A maliciously corrupted file systems can trigger buffer overruns in the quota code used by e2fsck.
more... | e2fsprogs
more detail |
2019-12-20 | VuXML ID d778ddb0-2338-11ea-a1c7-b499baebfeaf
The OpenSSL project reports:
rsaz_512_sqr overflow bug on x86_64 (CVE-2019-1551) (Low)
There is an overflow bug in the x64_64 Montgomery squaring procedure
used in exponentiation with 512-bit moduli. No EC algorithms are
affected. Analysis suggests that attacks against 2-prime RSA1024,
3-prime RSA1536, and DSA1024 as a result of this defect would be very
difficult to perform and are not believed likely. Attacks against
DH512 are considered just feasible. However, for an attack the target
would have to re-use the DH512 private key, which is not recommended
anyway. Also applications directly using the low level API BN_mod_exp
may be affected if they use BN_FLG_CONSTTIME.
more... | openssl
more detail |
2019-12-18 | VuXML ID ed8cbad5-21a8-11ea-9b6d-901b0e934d69
Matrix developers report:
The [synapse 1.7.1] release includes several security fixes as well
as a fix to a bug exposed by the security fixes. All previous releases
of Synapse are affected. Administrators are encouraged to upgrade as
soon as possible.
- Fix a bug which could cause room events to be incorrectly authorized
using events from a different room.
- Fix a bug causing responses to the /context client endpoint to not
use the pruned version of the event.
- Fix a cause of state resets in room versions 2 onwards.
more... | py35-matrix-synapse py36-matrix-synapse py37-matrix-synapse
more detail |
2019-12-13 | VuXML ID 70111759-1dae-11ea-966a-206a8a720317
the Apache Spamassassin project reports:
An input validation error of user-supplied input parsing
multipart emails. Specially crafted emails can consume all
resources on the system.
A local user is able to execute arbitrary shell commands
through specially crafted nefarious CF files.
more... | spamassassin
more detail |
2019-12-13 | VuXML ID b7dc4dde-2e48-43f9-967a-c68461537cf2
Aki Tuomi reports
Mail with group address as sender will cause a signal 11 crash in push
notification drivers. Group address as recipient can cause crash in some
drivers.
more... | dovecot
more detail |
2019-12-12 | VuXML ID 1edae47e-1cdd-11ea-8c2a-08002743b791
The Samba Team reports:
CVE-2019-14861:
An authenticated user can crash the DCE/RPC DNS management server by creating records with matching the zone name.
CVE-2019-14870:
The DelegationNotAllowed Kerberos feature restriction was not being applied when processing protocol transition requests (S4U2Self), in the AD DC KDC.
more... | samba410 samba411 samba48
more detail |
2019-12-10 | VuXML ID 21944144-1b90-11ea-a2d4-001b217b3468
Gitlab reports:
Path traversal with potential remote code execution
Disclosure of private code via Elasticsearch integration
Update Git dependency
more... | gitlab-ce
more detail |
2019-12-09 | VuXML ID 22ae307a-1ac4-11ea-b267-001cc0382b2f
Cedric Buissart (Red Hat) reports:
A flaw was found in, ghostscript versions prior to 9.50, in the
.pdf_hook_DSC_Creator procedure where it did not properly secure
its privileged calls, enabling scripts to bypass `-dSAFER`
restrictions. A specially crafted PostScript file could disable
security protection and then have access to the file system, or
execute arbitrary commands.
A flaw was found in all ghostscript versions 9.x before 9.50, in
the .setuserparams2 procedure where it did not properly secure its
privileged calls, enabling scripts to bypass `-dSAFER`
restrictions. A specially crafted PostScript file could disable
security protection and then have access to the file system, or
execute arbitrary commands.
A flaw was found in ghostscript, versions 9.x before 9.50, in the
setsystemparams procedure where it did not properly secure its
privileged calls, enabling scripts to bypass `-dSAFER`
restrictions. A specially crafted PostScript file could disable
security protection and then have access to the file system, or
execute arbitrary commands.
A flaw was found in, ghostscript versions prior to 9.50, in the
.pdfexectoken and other procedures where it did not properly secure
its privileged calls, enabling scripts to bypass `-dSAFER`
restrictions. A specially crafted PostScript file could disable
security protection and then have access to the file system, or
execute arbitrary commands.
more... | ghostscript9-agpl-base ghostscript9-agpl-x11
more detail |
2019-12-06 | VuXML ID ca3fe5b3-185e-11ea-9673-4c72b94353b5
the phpmyadmin team reports:
This security fix is part of an ongoing effort to improve the security of the Designer feature
and is designated PMASA-2019-5. There is also an improvement for how we sanitize git version
information shown on the home page.
more... | phpmyadmin
more detail |
2019-12-04* | VuXML ID ecb7fdec-0b82-11ea-874d-0c9d925bbbc0
Intel reports:
As part of IPU 2019.2, INTEL-SA-00242 advises that insufficient
access control may allow an authenticated user to potentially
enable escalation of privilege via local access.
INTEL-SA-00260 advises that insufficient access control may
allow an authenticated user to potentially enable denial of
service via local access.
more... | drm-current-kmod drm-devel-kmod drm-fbsd11.2-kmod drm-fbsd12.0-kmod
more detail |
2019-12-03 | VuXML ID 4e3fa78b-1577-11ea-b66e-080027bdabe8
Django release reports:
CVE-2019-19118: Privilege escalation in the Django admin.
Since Django 2.1, a Django model admin displaying a parent model with related
model inlines, where the user has view-only permissions to a parent model but
edit permissions to the inline model, would display a read-only view of the parent
model but editable forms for the inline.
Submitting these forms would not allow direct edits to the parent model, but would
trigger the parent model's save() method, and cause pre and post-save signal handlers
to be invoked. This is a privilege escalation as a user who lacks permission to edit
a model should not be able to trigger its save-related signals.
more... | py35-django21 py35-django22 py36-django21 py36-django22 py37-django21 py37-django22 py38-django21 py38-django22
more detail |
2019-11-28 | VuXML ID 4ce7c28a-11ac-11ea-b537-001b217b3468
Gitlab reports:
Unauthorized access to grafana metrics
Update Mattermost dependency
more... | gitlab-ce
more detail |
2019-11-28 | VuXML ID 9c36d41c-11df-11ea-9b6d-901b0e934d69
Matrix developers report:
Clean up local threepids from user on account deactivation.
more... | py35-matrix-synapse py36-matrix-synapse py37-matrix-synapse
more detail |
2019-11-27 | VuXML ID 1aa7a094-1147-11ea-b537-001b217b3468
Gitlab reports:
Path traversal with potential remote code execution
Private objects exposed through project import
Disclosure of notes via Elasticsearch integration
Disclosure of comments via Elasticsearch integration
DNS Rebind SSRF in various chat notifications
Disclosure of vulnerability status in dependency list
Disclosure of commit count in Cycle Analytics
Exposure of related branch names
Tags pushes from blocked users
Branches and Commits exposed to Guest members via integration
IDOR when adding users to protected environments
Former project members able to access repository information
Unauthorized access to grafana metrics
Todos created for former project members
Update Mattermost dependency
Disclosure of AWS secret keys on certain Admin pages
Stored XSS in Group and User profile fields
Forked project information disclosed via Project API
Denial of Service in the issue and commit comment pages
Tokens stored in plaintext
more... | gitlab-ce
more detail |
2019-11-27 | VuXML ID 3e748551-c732-45f6-bd88-928da16f23a8
The WebKitGTK project reports multiple vulnerabilities.
more... | webkit2-gtk3
more detail |
2019-11-26 | VuXML ID 87270ba5-03d3-11ea-b81f-3085a9a95629
NIST reports: (by search in the range 2018/01/01 - 2019/11/10):
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.
more... | py27-urllib3 py35-urllib3 py36-urllib3 py37-urllib3 py38-urllib3
more detail |
2019-11-25 | VuXML ID 6ade62d9-0f62-11ea-9673-4c72b94353b5
Micah Snyder reports:
A Denial-of-Service (DoS) vulnerability may occur when scanning a specially crafted email
file as a result of excessively long scan times. The issue is resolved by implementing
several maximums in parsing MIME messages and by optimizing use of memory allocation.
more... | clamav
more detail |
2019-11-25 | VuXML ID edc0bf7e-05a1-11ea-9dfa-f8b156ac3ff9
Intel discovered a previously published erratum on some Intel
platforms can be exploited by malicious software to potentially cause
a denial of service by triggering a machine check that will crash or
hang the system.
Malicious guest operating systems may be able to crash the host.
more... | FreeBSD-kernel
more detail |
2019-11-25 | VuXML ID fbe10a8a-05a1-11ea-9dfa-f8b156ac3ff9
Starting with version 1.26, the devcpu-data port/package includes
updates and mitigations for the following technical and security
advisories (depending on CPU model).
Intel TSX Updates (TAA) CVE-2019-11135 Voltage Modulation
Vulnerability CVE-2019-11139 MD_CLEAR Operations
CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-11091
TA Indirect Sharing CVE-2017-5715 EGETKEY CVE-2018-12126
CVE-2018-12127 CVE-2018-12130 CVE-2018-11091 JCC SKX102
Erratum
Updated microcode includes mitigations for
CPU issues, but may also cause a performance regression due
to the JCC erratum mitigation. Please visit
http://www.intel.com/benchmarks for further information.
Please visit http://www.intel.com/security for
detailed information on these advisories as well as a list of
CPUs that are affected.
Operating a CPU without the latest microcode may result in erratic or
unpredictable behavior, including system crashes and lock ups.
Certain issues listed in this advisory may result in the leakage of
privileged system information to unprivileged users. Please refer to
the security advisories listed above for detailed information.
more... | FreeBSD-kernel
more detail |
2019-11-23 | VuXML ID ffc80e58-0dcb-11ea-9673-4c72b94353b5
Unbound Security Advisories:
Recent versions of Unbound contain a vulnerability that can cause shell
code execution after receiving a specially crafted answer. This issue
can only be triggered if unbound was compiled with --enable-ipsecmod
support, and ipsecmod is enabled and used in the configuration.
more... | unbound
more detail |
2019-11-22 | VuXML ID 49b61ab6-0d04-11ea-87ca-001999f8d30b
The Asterisk project reports:
A remote authenticated Asterisk Manager Interface (AMI)
user without system authorization could use a specially
crafted Originate AMI request to execute arbitrary system
commands.
more... | asterisk13 asterisk16
more detail |
2019-11-22 | VuXML ID 94c6951a-0d04-11ea-87ca-001999f8d30b
The Asterisk project reports:
If Asterisk receives a re-invite initiating T.38 faxing
and has a port of 0 and no c line in the SDP, a crash
will occur.
more... | asterisk13
more detail |
2019-11-22 | VuXML ID a8d94711-0d03-11ea-87ca-001999f8d30b
The Asterisk project reports:
A SIP request can be sent to Asterisk that can change
a SIP peers IP address. A REGISTER does not need to occur,
and calls can be hijacked as a result. The only thing
that needs to be known is the peers name; authentication
details such as passwords do not need to be known. This
vulnerability is only exploitable when the nat option is
set to the default, or auto_force_rport.
more... | asterisk13 asterisk16
more detail |
2019-11-22 | VuXML ID b12a341a-0932-11ea-bf09-080027e0baa0
The Gitea Team reports:
This release contains five security fixes, so we recommend updating:
- Fix issue with user.fullname
- Ignore mentions for users with no access
- Be more strict with git arguments
- Extract the username and password from the mirror url
- Reserve .well-known username
more... | gitea
more detail |
2019-11-19 | VuXML ID 620685d6-0aa3-11ea-9673-4c72b94353b5
Squid Team reports:
Problem Description: Due to incorrect data management Squid is
vulnerable to a information disclosure when processing HTTP Digest
Authentication.
Severity: Nonce tokens contain the raw byte value of a pointer which sits
within heap memory allocation. This information reduces ASLR protections
and may aid attackers isolating memory areas to target for remote code
execution attacks.
more... | squid
more detail |
2019-11-15 | VuXML ID f59af308-07f3-11ea-8c56-f8b156b6dcc8
Sergey Poznyakoff reports:
This stable release fixes several potential vulnerabilities
CVE-2015-1197: cpio, when using the --no-absolute-filenames
option, allows local users to write to arbitrary files
via a symlink attack on a file in an archive.
CVE-2016-2037: The cpio_safer_name_suffix function in
util.c allows remote attackers to cause a denial of service
(out-of-bounds write) via a crafted cpio file.
CVE-2019-14866: Improper input validation when writing
tar header fields leads to unexpected tar generation.
more... | gcpio
more detail |
2019-11-13 | VuXML ID b48e7b14-052a-11ea-a1de-53b029d2b061
National Vulnerability Database:
CVE-2017-8372: The mad_layer_III function in layer3.c in Underbit MAD
libmad 0.15.1b, if NDEBUG is omitted, allows remote attackers to cause a
denial of service (assertion failure and application exit) via a crafted
audio file.
CVE-2017-8373: The mad_layer_III function in layer3.c in Underbit MAD
libmad 0.15.1b allows remote attackers to cause a denial of service
(heap-based buffer overflow and application crash) or possibly have
unspecified other impact via a crafted audio file.
CVE-2017-8374: The mad_bit_skip function in bit.c in Underbit MAD
libmad 0.15.1b allows remote attackers to cause a denial of service
(heap-based buffer over-read and application crash) via a crafted audio
file.
more... | libmad
more detail |
2019-11-12 | VuXML ID 459df1ba-051c-11ea-9673-4c72b94353b5
wordpress developers reports:
Props to Evan Ricafort for finding an issue where stored XSS (cross-site scripting)
could be added via the Customizer.
rops to J.D. Grimes who found and disclosed a method of viewing unauthenticated posts.
Props to Weston Ruter for finding a way to create a stored XSS to inject Javascript
into style tags.
rops to David Newman for highlighting a method to poison the cache of JSON GET requests
via the Vary: Origin header.
Props to Eugene Kolodenker who found a server-side request forgery in the way that URLs
are validated.
Props to Ben Bidner of the WordPress Security Team who discovered issues related to
referrer validation in the admin.
more... | de-wordpress fr-wordpress ja-wordpress ru-wordpress wordpress zh_CN-wordpress zh_TW-wordpress
more detail |
2019-11-12 | VuXML ID 88d00176-058e-11ea-bd1c-3065ec8fd3ec
Google Chrome Releases reports:
Four security issues were fixed, including:
- [1021723] Various fixes from internal audits, fuzzing and other
initiatives
more... | chromium
more detail |
2019-11-07 | VuXML ID b2f9573a-008c-11ea-9801-10c37b4ac2ea
Sonatype reports:
Several RCE vulnerabilities have been found and corrected in 2.14.15:
CVE-2019-16530: An attacker with elevated privileges can upload a
specially crafted file. That file can contain commands that will
be executed on the system, with the same privileges as the user
running the server.
CVE-2019-15893: A Remote Code Execution vulnerability has been
discovered in Nexus Repository Manager requiring immediate
action. The vulnerability allows for an attacker with
administrative access to NXRM to create repostories that can
grant access to read/execute system data outside the scope of
NXRM.
CVE-2019-5475: A vulnerability has been found that can allow
user's with administrative privileges to run processes on the
target server, that the nxrm os user has access to.
more... | nexus2-oss
more detail |
2019-11-06 | VuXML ID 6a7c2ab0-00dd-11ea-83ce-705a0f828759
The PHP project reports:
The PHP development team announces the immediate availability of PHP 7.3.11. This is a security release which also contains several bug fixes.
The PHP development team announces the immediate availability of PHP 7.2.24. This is a security release which also contains several bug fixes.
The PHP development team announces the immediate availability of PHP 7.1.33. This is a security release which also contains several bug fixes.
more... | php71 php72 php73 php74
more detail |
2019-11-03 | VuXML ID c32285fe-fde4-11e9-9525-000c29c4dc65
Mediawiki reports:
Security fixes:
T230402, CVE-2019-16738 SECURITY: Add permission check for suppressed account
to Special:Redirect.
more... | mediawiki131 mediawiki132 mediawiki133
more detail |
2019-11-02 | VuXML ID 381deebb-f5c9-11e9-9c4f-74d435e60b7c
mitre reports
cdf_read_property_info in cdf.c in file through 5.37 does not
restrict the number of CDF_VECTOR elements, which allows a heap-based
buffer overflow (4-byte out-of-bounds write).
more... | file
more detail |
2019-11-02 | VuXML ID fc91f2ef-fd7b-11e9-a1c7-b499baebfeaf
Oracle reports:
This Critical Patch Update contains 31 new security fixes for
Oracle MySQL. 6 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without
requiring user credentials.
more... | mariadb101-server mariadb102-server mariadb103-server mariadb104-server mariadb55-server mysql56-server mysql57-server mysql80-server percona55-server percona56-server percona57-server
more detail |
2019-10-31 | VuXML ID 92243b6a-5775-4aea-8727-a938058df5ba
The WebKitGTK project reports multiple vulnerabilities.
more... | webkit2-gtk3
more detail |
2019-10-30 | VuXML ID 6eddfa51-fb44-11e9-86e9-001b217b3468
Gitlab reports:
Source branch of a MR could be removed by an unauthorised user
Private group members could be listed
Disclosure of System Notes via Elasticsearch integration
Disclosure of Private Comments via Elasticsearch integration
Confirm existence of private repositories
Private group membership could be disclosed
Disclosure of Project Labels
Disclosure of Private Project Path and Labels
Uncontrolled Resource Consumption due to Nested GraphQL Queries
Improper access control on comments
Sentry Token Access Control
Authorisation check for Project Transfer option
XSS in Wiki Pages Using RDoc
Untrusted Input could be used for Internal Redirect
Access control for protected environments
Private Sub Group path Disclosure
Disclosure of Group Packages List
Private Repository Name Disclosure
more... | gitlab-ce
more detail |
2019-10-30 | VuXML ID fd10aa77-fb5e-11e9-af7b-0800274e5f20
The Gitea Team reports:
When a comment in an issue or PR mentions a user using
@username, the mentioned user receives a mail notification even if
they don't have permission to see the originating repository.
more... | gitea
more detail |
2019-10-29 | VuXML ID 42675046-fa70-11e9-ba4e-901b0e934d69
Matrix developers report:
Make sure that [...] events sent over /send_join, /send_leave, and
/invite, are correctly signed and come from the expected servers.
more... | py35-matrix-synapse py36-matrix-synapse py37-matrix-synapse
more detail |
2019-10-29 | VuXML ID 50a1bbc9-fb80-11e9-9e70-005056a311d1
The samba project reports:
Malicious servers can cause Samba client code to return filenames containing
path separators to calling code.
When the password contains multi-byte (non-ASCII) characters, the check
password script does not receive the full password string.
Users with the "get changes" extended access right can crash the AD DC LDAP
server by requesting an attribute using the range= syntax.
more... | samba410 samba411 samba48
more detail |
2019-10-24 | VuXML ID 2d4076eb-f679-11e9-a87f-a4badb2f4699
Varnish Software reports:
A bug has been discovered in Varnish Cache where we fail to
clear a pointer between the handling of one client requests and the next
on the same connection. This can under specific circumstances lead to
information being leaked from the connection workspace.
more... | varnish6
more detail |
2019-10-24 | VuXML ID 3a1474ba-f646-11e9-b0af-b888e347c638
Todd C. Miller reports:
When sudo is configured to allow a user to run commands as an
arbitrary user via the ALL keyword in a Runas specification, it
is possible to run commands as root by specifying the user ID -1
or 4294967295.
This can be used by a user with sufficient sudo privileges to
run commands as root even if the Runas specification explicitly
disallows root access as long as the ALL keyword is listed first
in the Runas specification.
Log entries for commands run this way will list the target user
as 4294967295 instead of root. In addition, PAM session modules
will not be run for the command.
more... | sudo
more detail |
2019-10-24 | VuXML ID 3c7edc7a-f680-11e9-a87f-a4badb2f4699
Problem Description:
The decompressor used in bzip2 contains a bug which can
lead to an out-of-bounds write when processing a specially
crafted bzip2(1) file.
bzip2recover contains a heap use-after-free bug which
can be triggered when processing a specially crafted bzip2(1)
file.
Impact:
An attacker who can cause maliciously crafted input to
be processed may trigger either of these bugs. The bzip2recover
bug may cause a crash, permitting a denial-of-service. The
bzip2 decompressor bug could potentially be exploited to
execute arbitrary code.
Note that some utilities, including the tar(1) archiver
and the bspatch(1) binary patching utility (used in portsnap(8)
and freebsd-update(8)) decompress bzip2(1)-compressed data
internally; system administrators should assume that their
systems will at some point decompress bzip2(1)-compressed
data even if they never explicitly invoke the bunzip2(1)
utility.
more... | FreeBSD
more detail |
2019-10-24 | VuXML ID 41d2f3e6-f680-11e9-a87f-a4badb2f4699
Problem Description:
The ICMPv6 input path incorrectly handles cases where
an MLDv2 listener query packet is internally fragmented
across multiple mbufs.
Impact:
A remote attacker may be able to cause an out-of-bounds
read or write that may cause the kernel to attempt to access
an unmapped page and subsequently panic.
more... | FreeBSD-kernel
more detail |
2019-10-24 | VuXML ID 45a95fdd-f680-11e9-a87f-a4badb2f4699
Problem Description:
A function extracting the length from type-length-value
encoding is not properly validating the submitted length.
Impact:
A remote user could cause, for example, an out-of-bounds
read, decoding of unrelated data, or trigger a crash of the
software such as bsnmpd resulting in a denial of service.
more... | FreeBSD
more detail |
2019-10-24 | VuXML ID 499b22a3-f680-11e9-a87f-a4badb2f4699
Problem Description:
The e1000 network adapters permit a variety of modifications
to an Ethernet packet when it is being transmitted. These
include the insertion of IP and TCP checksums, insertion
of an Ethernet VLAN header, and TCP segmentation offload
("TSO"). The e1000 device model uses an on-stack buffer to
generate the modified packet header when simulating these
modifications on transmitted packets.
When TCP segmentation offload is requested for a transmitted
packet, the e1000 device model used a guest-provided value
to determine the size of the on-stack buffer without
validation. The subsequent header generation could overflow
an incorrectly sized buffer or indirect a pointer composed
of stack garbage.
Impact:
A misbehaving bhyve guest could overwrite memory in the
bhyve process on the host.
more... | FreeBSD-kernel
more detail |
2019-10-24 | VuXML ID 4d3d4f64-f680-11e9-a87f-a4badb2f4699
Problem Description:
Due do a missing check in the code of m_pulldown(9) data
returned may not be contiguous as requested by the caller.
Impact:
Extra checks in the IPv6 code catch the error condition
and trigger a kernel panic leading to a remote DoS
(denial-of-service) attack with certain Ethernet interfaces.
At this point it is unknown if any other than the IPv6 code
paths can trigger a similar condition.
more... | FreeBSD-kernel
more detail |
2019-10-24 | VuXML ID 5027b62e-f680-11e9-a87f-a4badb2f4699
Problem Description:
The kernel driver for /dev/midistat implements a handler
for read(2). This handler is not thread-safe, and a
multi-threaded program can exploit races in the handler to
cause it to copy out kernel memory outside the boundaries
of midistat's data buffer.
Impact:
The races allow a program to read kernel memory within
a 4GB window centered at midistat's data buffer. The buffer
is allocated each time the device is opened, so an attacker
is not limited to a static 4GB region of memory.
On 32-bit platforms, an attempt to trigger the race may
cause a page fault in kernel mode, leading to a panic.
more... | FreeBSD-kernel
more detail |
2019-10-24 | VuXML ID 53b3474c-f680-11e9-a87f-a4badb2f4699
Problem Description:
System calls operating on file descriptors obtain a
reference to relevant struct file which due to a programming
error was not always put back, which in turn could be used
to overflow the counter of affected struct file.
Impact:
A local user can use this flaw to obtain access to files,
directories, sockets, etc., opened by processes owned by
other users. If obtained struct file represents a directory
from outside of user's jail, it can be used to access files
outside of the jail. If the user in question is a jailed
root they can obtain root privileges on the host system.
more... | FreeBSD-kernel
more detail |
2019-10-23 | VuXML ID a90d040e-f5b0-11e9-acc4-4576b265fda6
GitHub issue:
This issue has been created for public disclosure of an XSS
vulnerability that was responsibly reported by
https://hackerone.com/vxhex
In the Loofah gem, through v2.3.0, unsanitized JavaScript may occur in
sanitized output when a crafted SVG element is republished.
more... | rubygem-loofah
more detail |
2019-10-19 | VuXML ID 9b7491fb-f253-11e9-a50c-000c29c4dc65
Python changelog:
bpo-38243: Escape the server title of xmlrpc.server.DocXMLRPCServer when rendering
the document page as HTML.
bpo-38174: Update vendorized expat library version to 2.2.8, which resolves
CVE-2019-15903.
bpo-37764: Fixes email._header_value_parser.get_unstructured going into an infinite
loop for a specific case in which the email header does not have trailing whitespace,
and the case in which it contains an invalid encoded word.
bpo-37461: Fix an infinite loop when parsing specially crafted email headers.
bpo-34155: Fix parsing of invalid email addresses with more than one @
(e.g. a@b@c.com.) to not return the part before 2nd @ as valid email address.
more... | python37
more detail |
2019-10-15 | VuXML ID 998ca824-ef55-11e9-b81f-3085a9a95629
Mitre reports:
An issue was discovered in Pillow before 6.2.0. When reading specially
crafted invalid image files, the library can either allocate very large
amounts of memory or take an extremely long period of time to process
the image.
more... | py27-pillow py35-pillow py36-pillow py37-pillow
more detail |
2019-10-09 | VuXML ID c360d057-ea8b-11e9-859b-b885849ded8e
mod_perl2 2.0.11 fixes Arbitrary Perl code execution in the context
of the user account via a user-owned .htaccess.
mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary
Perl code by placing it in a user-owned .htaccess file, because
(contrary to the documentation) there is no configuration option
that permits Perl code for the administrator's control of HTTP
request processing without also permitting unprivileged users
to run Perl code in the context of the user account that runs
Apache HTTP Server processes.
more... | ap24-mod_perl2
more detail |
2019-10-06 | VuXML ID 791e8f79-e7d1-11e9-8b31-206a8a720317
Xpdf 4.02 fixes two vulnerabilities. Both fixes have been
backported to 3.04.
An invalid memory access vulnerability in TextPage::findGaps()
in Xpdf 4.01 through a crafted PDF document can cause a
segfault.
An out of bounds write exists in TextPage::findGaps() of
Xpdf 4.01.01
more... | xpdf xpdf3 xpdf4
more detail |
2019-10-03 | VuXML ID 108a4be3-e612-11e9-9963-5f1753e0aca0
Unbound Security Advisories:
Due to an error in parsing NOTIFY queries, it is possible for Unbound
to continue processing malformed queries and may ultimately result in a
pointer dereference in uninitialized memory. This results in a crash of
the Unbound daemon.
more... | unbound
more detail |
2019-10-02 | VuXML ID 0762fa72-e530-11e9-86e9-001b217b3468
Gitlab reports:
Disclosure of Private Code, Merge Requests and Commits via Elasticsearch integration
more... | gitlab-ce
more detail |
2019-10-02 | VuXML ID b17c86b9-e52e-11e9-86e9-001b217b3468
SO-AND-SO reports:
XSS in Markdown Preview Using Mermaid
Bypass Email Verification using Salesforce Authentication
Account Takeover using SAML
Uncontrolled Resource Consumption in Markdown using Mermaid
Disclosure of Private Project Path and Labels
Disclosure of Assignees via Milestones
Disclosure of Project Path via Unsubscribe Link
Disclosure of Project Milestones via Groups
Disclosure of Private System Notes via GraphQL
GIT Command Injection via API
Bypass User Blocking via CI/CD token
IDOR Adding Groups to Protected Environments
Disclosure of Group Membership via Merge Request Approval Rules
Disclosure of Head Pipeline via Blocking Merge Request Feature
Grafana update
more... | gitlab-ce
more detail |
2019-10-02 | VuXML ID ed18aa92-e4f4-11e9-b6fa-3085a9a95629
The cacti developers reports:
In Cacti through 1.2.6, authenticated users may bypass authorization checks
(for viewing a graph) via a direct graph_json.php request with a modified
local_graph_id parameter.
more... | cacti
more detail |
2019-10-02 | VuXML ID f7fcb75c-e537-11e9-863e-b9b7af01ba9e
Ruby news:
This release includes security fixes. Please check the topics below for
details.
CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and
File.fnmatch?
A NUL injection vulnerability of Ruby built-in methods (File.fnmatch
and File.fnmatch?) was found. An attacker who has the control of the
path pattern parameter could exploit this vulnerability to make path
matching pass despite the intention of the program author.
CVE-2019-16201: Regular Expression Denial of Service vulnerability of
WEBrick's Digest access authentication
Regular expression denial of service vulnerability of WEBrick's Digest
authentication module was found. An attacker can exploit this
vulnerability to cause an effective denial of service against a WEBrick
service.
CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)
There is an HTTP response splitting vulnerability in WEBrick bundled
with Ruby.
CVE-2019-16255: A code injection vulnerability of Shell#[] and
Shell#test
A code injection vulnerability of Shell#[] and Shell#test in a standard
library (lib/shell.rb) was found.
more... | ruby
more detail |
2019-09-30 | VuXML ID 273c6c43-e3ad-11e9-8af7-08002720423d
Sicheng Liu of Beijing DBSEC Technology Co., Ltd reports:
Incorrect scoping of kill operations in MongoDB Server's packaged SysV init scripts allow users with write access to the PID file to insert arbitrary PIDs to be killed when the root user stops the MongoDB process via SysV init.
more... | mongodb34 mongodb36 mongodb40
more detail |
2019-09-30 | VuXML ID fd2e0ca8-e3ae-11e9-8af7-08002720423d
Rich Mirch reports:
An unprivileged user or program on Microsoft Windows which can create OpenSSL configuration files in a fixed location may cause utility programs shipped with MongoDB server versions less than 4.0.11, 3.6.14, and 3.4.22 to run attacker defined code as the user running the utility.
more... | mongodb34 mongodb36 mongodb40
more detail |
2019-09-29 | VuXML ID e917caba-e291-11e9-89f1-152fed202bb7
Exim developers team report:
There is a heap overflow in string_vformat().Using a EHLO message, remote code
execution seems to be possible.
more... | exim
more detail |
2019-09-28 | VuXML ID 880bca8f-e201-11e9-8af7-08002720423d
Mitch Wasson of Cisco's Advanced Malware Protection Group reports:
After user deletion in MongoDB Server the improper invalidation of authorization sessions allows an authenticated user's session to persist and become conflated with new accounts, if those accounts reuse the names of deleted ones.
more... | mongodb34 mongodb36 mongodb40
more detail |
2019-09-27 | VuXML ID 81fcc2f9-e15a-11e9-abbf-800dd28b22bd
The Mantis developers report:
CVE-2019-15715: [Admin Required - Post Authentication] Command Execution / Injection Vulnerability
CVE-2019-8331: In Bootstrap before 3.4.1, XSS is possible in the tooltip or popover data-template attribute
Missing integrity hashes for CSS resources from CDNs
more... | mantis-php71 mantis-php72 mantis-php73 mantis-php74
more detail |
2019-09-26 | VuXML ID a92dcc5c-e05c-11e9-b589-10c37b4ac2ea
The Go project reports:
net/http (through net/textproto) used to accept and normalize invalid
HTTP/1.1 headers with a space before the colon, in violation of RFC 7230.
If a Go server is used behind a reverse proxy that accepts and forwards
but doesn't normalize such invalid headers, the reverse proxy and the
server can interpret the headers differently. This can lead to filter
bypasses or request smuggling, the latter if requests from separate clients
are multiplexed onto the same connection by the proxy. Such invalid headers
are now rejected by Go servers, and passed without normalization to Go
client applications.
more... | go go-devel
more detail |
2019-09-25 | VuXML ID 9720bb39-f82a-402f-9fe4-e2c875bdda83
Jenkins Security Advisory:
Description
(Medium) SECURITY-1498 / CVE-2019-10401
Stored XSS vulnerability in expandable textbox form control
(Medium) SECURITY-1525 / CVE-2019-10402
XSS vulnerability in combobox form control
(Medium) SECURITY-1537 (1) / CVE-2019-10403
Stored XSS vulnerability in SCM tag action tooltip
(Medium) SECURITY-1537 (2) / CVE-2019-10404
Stored XSS vulnerability in queue item tooltip
(Medium) SECURITY-1505 / CVE-2019-10405
Diagnostic web page exposed Cookie HTTP header
(Medium) SECURITY-1471 / CVE-2019-10406
XSS vulnerability in Jenkins URL setting
more... | jenkins jenkins-lts
more detail |
2019-09-20 | VuXML ID 20b92374-d62a-11e9-af73-001b217e4ee5
Internet Systems Consortium, Inc. reports:
A packet containing a malformed DUID can cause the kea-dhcp6 server to terminate (CVE-2019-6472) [Medium]
An invalid hostname option can cause the kea-dhcp4 server to terminate (CVE-2019-6473) [Medium]
An oversight when validating incoming client requests can lead to a situation where the Kea server
will exit when trying to restart (CVE-2019-6474) [Medium]
more... | kea
more detail |
2019-09-19 | VuXML ID 1c948fd3-dac0-11e9-81b2-0011d823eebd
Janos Follath reports:
Mbed TLS does not have a constant-time/constant-trace arithmetic
library and uses blinding to protect against side channel
attacks.
In the ECDSA signature routine previous Mbed TLS versions used the
same RNG object for generating the ephemeral key pair and for
generating the blinding values. The deterministic ECDSA function
reused this by passing the RNG object created from the private key
and the message to be signed as prescribed by RFC 6979. This meant
that the same RNG object was used whenever the same message was
signed, rendering the blinding ineffective.
If the victim can be tricked to sign the same message repeatedly,
the private key may be recoverable through side channels.
more... | mbedtls
more detail |
2019-09-17 | VuXML ID 55571619-454e-4769-b1e5-28354659e152
Jon Siwek of Corelight reports:
This is a security patch release to address a potential
Denial of Service vulnerability:
-
The NTLM analyzer did not properly handle AV Pair sequences
that were either empty or unterminated, resulting in
invalid memory access or heap buffer over-read. The NTLM
analyzer is enabled by default and used in the analysis
of SMB, DCE/RPC, and GSSAPI protocols.
more... | bro
more detail |
2019-09-17 | VuXML ID 6856d798-d950-11e9-aae4-f079596b62f9
expat project reports:
Fix heap overflow triggered by
XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber),
and deny internal entities closing the doctype
more... | expat
more detail |
2019-09-16 | VuXML ID c5bd8a25-99a6-11e9-a598-f079596b62f9
expat project reports:
XML names with multiple colons could end up in the
wrong namespace, and take a high amount of RAM and CPU
resources while processing, opening the door to
use for denial-of-service attacks
more... | expat
more detail |
2019-09-14 | VuXML ID 9fb4e57b-d65a-11e9-8a5f-e5c82b486287
curl security problems:
CVE-2019-5481: FTP-KRB double-free
libcurl can be told to use kerberos over FTP to a server, as set with
the CURLOPT_KRBLEVEL option.
During such kerberos FTP data transfer, the server sends data to curl
in blocks with the 32 bit size of each block first and then that amount
of data immediately following.
A malicious or just broken server can claim to send a very large block
and if by doing that it makes curl's subsequent call to realloc() to
fail, curl would then misbehave in the exit path and double-free the
memory.
In practical terms, an up to 4 GB memory area may very well be fine to
allocate on a modern 64 bit system but on 32 bit systems it will fail.
Kerberos FTP is a rarely used protocol with curl. Also, Kerberos
authentication is usually only attempted and used with servers that the
client has a previous association with.
CVE-2019-5482: TFTP small blocksize heap buffer overflow
libcurl contains a heap buffer overflow in the function
(tftp_receive_packet()) that receives data from a TFTP server. It can
call recvfrom() with the default size for the buffer rather than with
the size that was used to allocate it. Thus, the content that might
overwrite the heap memory is controlled by the server.
This flaw is only triggered if the TFTP server sends an OACK without
the BLKSIZE option, when a BLKSIZE smaller than 512 bytes was requested
by the TFTP client. OACK is a TFTP extension and is not used by all
TFTP servers.
Users choosing a smaller block size than default should be rare as the
primary use case for changing the size is to make it larger.
It is rare for users to use TFTP across the Internet. It is most
commonly used within local networks. TFTP as a protocol is always
inherently insecure.
This issue was introduced by the add of the TFTP BLKSIZE option
handling. It was previously incompletely fixed by an almost identical
issue called CVE-2019-5436.
more... | curl
more detail |
2019-09-12 | VuXML ID b2789b2d-d521-11e9-86e9-001b217b3468
Gitlab reports:
Project Template Functionality Could Be Used to Access Restricted Project Data
Security Enhancements in GitLab Pages
more... | gitlab-ce
more detail |
2019-09-11 | VuXML ID 9e0c6f7a-d46d-11e9-a1c7-b499baebfeaf
The OpenSSL project reports:
ECDSA remote timing attack (CVE-2019-1547) [Low]
Fork Protection (CVE-2019-1549) [Low]
(OpenSSL 1.1.1 only)
more... | openssl openssl111
more detail |
2019-09-10 | VuXML ID c6f19fe6-d42a-11e9-b4f9-6451062f0f7a
Adobe reports:
- This update resolves a same origin method execution
vulnerability that could lead to arbitrary code execution
(CVE-2019-8069).
- This update resolves a use-after-free vulnerability that
could lead to arbitrary code execution (CVE-2019-8070).
more... | linux-flashplayer
more detail |
2019-09-07 | VuXML ID 10e1d580-d174-11e9-a87f-a4badb2f4699
Japheth Cleaver reports:
Several buffer overflows were reported by University of
Cambridge Computer Security Incident Response Team.
more... | xymon-server
more detail |
2019-09-07 | VuXML ID a8d87c7a-d1b1-11e9-a616-0992a4564e7c
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe().
A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression.
Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
more... | oniguruma
more detail |
2019-09-06 | VuXML ID 61db9b88-d091-11e9-8d41-97657151f8c2
Exim developers report:
If your Exim server accepts TLS connections, it is vulnerable. This does
not depend on the TLS libray, so both, GnuTLS and OpenSSL are affected.
The vulnerability is exploitable by sending a SNI ending in a
backslash-null sequence during the initial TLS handshake. The exploit
exists as a POC. For more details see the document qualys.mbx
more... | exim
more detail |
2019-09-06 | VuXML ID 7d53d8da-d07a-11e9-8f1a-001999f8d30b
The Asterisk project reports:
When audio frames are given to the audio transcoding
support in Asterisk the number of samples are examined
and as part of this a message is output to indicate that
no samples are present. A change was done to suppress
this message for a particular scenario in which the message
was not relevant. This change assumed that information
about the origin of a frame will always exist when in
reality it may not.
This issue presented itself when an RTP packet containing
no audio (and thus no samples) was received. In a particular
transcoding scenario this audio frame would get turned
into a frame with no origin information. If this new frame
was then given to the audio transcoding support a crash
would occur as no samples and no origin information would
be present. The transcoding scenario requires the genericplc
option to be set to enabled (the default) and a transcoding
path from the source format into signed linear and then
from signed linear into another format.
Note that there may be other scenarios that have not
been found which can cause an audio frame with no origin
to be given to the audio transcoding support and thus
cause a crash.
more... | asterisk13 asterisk16
more detail |
2019-09-06 | VuXML ID 8a9f86de-d080-11e9-9051-4c72b94353b5
wordpress developers reports:
Props to Simon Scannell of RIPS Technologies for finding and disclosing two issues.
The first, a cross-site scripting (XSS) vulnerability found in post previews by contributors.
The second was a cross-site scripting vulnerability in stored comments.
Props to Tim Coen for disclosing an issue where validation and sanitization
of a URL could lead to an open redirect.
Props to Anshul Jain for disclosing reflected cross-site scripting during media uploads.
Props to Zhouyuan Yang of Fortinets FortiGuard Labs who disclosed a vulnerability
for cross-site scripting (XSS) in shortcode previews.
Props to Ian Dunn of the Core Security Team for finding and disclosing a case where
reflected cross-site scripting could be found in the dashboard.
Props to Soroush Dalilifrom NCC Group for disclosing an issue with URL
sanitization that can lead to cross-site scripting (XSS) attacks.
In addition to the above changes, we are also updating jQuery on older versions of WordPress.
This change was added in 5.2.1 and is now being brought to older versions.
more... | de-wordpress fr-wordpress ja-wordpress ru-wordpress wordpress zh_CN-wordpress zh_TW-wordpress
more detail |
2019-09-06 | VuXML ID d94c08d2-d079-11e9-8f1a-001999f8d30b
The Asterisk project reports:
When Asterisk sends a re-invite initiating T.38 faxing,
and the endpoint responds with a declined media stream a
crash will then occur in Asterisk.
more... | asterisk15 asterisk16
more detail |
2019-09-03 | VuXML ID 05463e0a-abd3-4fa4-bd5f-cd5ed132d4c6
Mozilla Foundation reports:
CVE-2019-11751: Malicious code execution through command line parameters
CVE-2019-11746: Use-after-free while manipulating video
CVE-2019-11744: XSS by breaking out of title and textarea elements using innerHTML
CVE-2019-11742: Same-origin policy violation with SVG filters and canvas to steal cross-origin images
CVE-2019-11736: File manipulation and privilege escalation in Mozilla Maintenance Service
CVE-2019-11753: Privilege escalation with Mozilla Maintenance Service in custom Firefox installation location
CVE-2019-11752: Use-after-free while extracting a key value in IndexedDB
CVE-2019-9812: Sandbox escape through Firefox Sync
CVE-2019-11741: Isolate addons.mozilla.org and accounts.firefox.com
CVE-2019-11743: Cross-origin access to unload event attributes
CVE-2019-11748: Persistence of WebRTC permissions in a third party context
CVE-2019-11749: Camera information available without prompting using getUserMedia
CVE-2019-5849: Out-of-bounds read in Skia
CVE-2019-11750: Type confusion in Spidermonkey
CVE-2019-11737: Content security policy directives ignore port and path if host is a wildcard
CVE-2019-11738: Content security policy bypass through hash-based sources in directives
CVE-2019-11747: 'Forget about this site' removes sites from pre-loaded HSTS list
CVE-2019-11734: Memory safety bugs fixed in Firefox 69
CVE-2019-11735: Memory safety bugs fixed in Firefox 69 and Firefox ESR 68.1
CVE-2019-11740: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9
more... | firefox firefox-esr libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2019-09-03 | VuXML ID 145a3e17-cea2-11e9-81e2-005056a311d1
The samba project reports:
On a Samba SMB server for all versions of Samba from 4.9.0 clients are
able to escape outside the share root directory if certain
configuration parameters set in the smb.conf file.
more... | samba410
more detail |
2019-09-03 | VuXML ID ce231189-ce56-11e9-9fa0-0050569f0b83
The Varnish Team reports:
A failure in HTTP/1 parsing can allow a remote attacker to trigger
an assertion in varnish, restarting the daemon and clearing the cache.
more... | varnish6
more detail |
2019-09-02 | VuXML ID c9c6c2f8-cd54-11e9-af89-080027ef1a23
GnuPG reports:
Mitigate an ECDSA timing attack.
more... | libgcrypt
more detail |
2019-08-31* | VuXML ID ed8d5535-ca78-11e9-980b-999ff59c22ea
Ruby news:
There are multiple vulnerabilities about Cross-Site Scripting (XSS) in
jQuery shipped with RDoc which bundled in Ruby. All Ruby users are
recommended to update Ruby to the latest release which includes the
fixed version of RDoc.
The following vulnerabilities have been reported.
CVE-2012-6708
CVE-2015-9251
more... | ruby rubygem-rdoc
more detail |
2019-08-30 | VuXML ID b68cc195-cae7-11e9-86e9-001b217b3468
Gitlab reports:
Kubernetes Integration Server-Side Request Forgery
Server-Side Request Forgery in Jira Integration
Improved Protection Against Credential Stuffing Attacks
Markdown Clientside Resource Exhaustion
Pipeline Status Disclosure
Group Runner Authorization Issue
CI Metrics Disclosure
User IP Disclosed by Embedded Image and Media
Label Description HTML Injection
IDOR in Epic Notes API
Push Rule Bypass
Project Visibility Restriction Bypass
Merge Request Discussion Restriction Bypass
Disclosure of Merge Request IDs
Weak Authentication In Certain Account Actions
Disclosure of Commit Title and Comments
Stored XSS via Markdown
EXIF Geolocation Data Exposure
Multiple SSRF Regressions on Gitaly
Default Branch Name Exposure
Potential Denial of Service via CI Pipelines
Privilege Escalation via Logrotate
more... | gitlab-ce
more detail |
2019-08-30 | VuXML ID e45c3669-caf2-11e9-851a-dcf3aaa3f3ff
The WebKitGTK project reports many vulnerabilities,
including several arbitrary code execution vulnerabilities.
more... | webkit2-gtk3
more detail |
2019-08-28 | VuXML ID 0f31b4e9-c827-11e9-9626-589cfc01894a
Mozilla Foundation reports:
CVE-2019-11733: Stored passwords in 'Saved Logins' can
be copied without master password entry
When a master password is set, it is required to be
entered again before stored passwords can be accessed in the 'Saved
Logins' dialog. It was found that locally stored passwords can be
copied to the clipboard thorough the 'copy password' context menu item
without re-entering the master password if the master password had
been previously entered in the same session, allowing for potential
theft of stored passwords.
more... | cliqz firefox
more detail |
2019-08-28 | VuXML ID 7a7891fc-6318-447a-ba45-31d525ec11a0
Jenkins Security Advisory:
Description
(Medium) SECURITY-1453 / CVE-2019-10383
Stored XSS vulnerability in update center
(High) SECURITY-1491 / CVE-2019-10384
CSRF protection tokens for anonymous users did not expire in some circumstances
more... | jenkins jenkins-lts
more detail |
2019-08-28 | VuXML ID abaaecda-ea16-43e2-bad0-d34a9ac576b1
Aki Tuomi reports:
Vulnerability Details:
IMAP and ManageSieve protocol parsers do not properly handle NUL byte
when scanning data in quoted strings, leading to out of bounds heap
memory writes.
Risk:
This vulnerability allows for out-of-bounds writes to objects stored on
the heap up to 8096 bytes in pre-login phase, and 65536 bytes post-login
phase, allowing sufficiently skilled attacker to perform complicated
attacks that can lead to leaking private information or remote code
execution. Abuse of this bug is very difficult to observe, as it does
not necessarily cause a crash. Attempts to abuse this bug are not
directly evident from logs.
more... | dovecot dovecot-pigeonhole
more detail |
2019-08-25 | VuXML ID 72a5579e-c765-11e9-8052-0028f8d09152
Jonathon Loomey of Netflix reports:
HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion
Recently, a series of DoS attack vulnerabilities have been reported on a broad range of HTTP/2 stacks. Among the vulnerabilities, H2O is exposed to the following:
- CVE-2019-9512 "Ping Flood": The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
- CVE-2019-9514 "Reset Flood": The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both, potentially leading to a denial of service.
- CVE-2019-9515 "Settings Flood": The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
more... | h2o-devel
more detail |
2019-08-25 | VuXML ID 73b1e734-c74e-11e9-8052-0028f8d09152
Jonathon Loomey of Netflix reports:
HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion
Recently, a series of DoS attack vulnerabilities have been reported on a broad range of HTTP/2 stacks. Among the vulnerabilities, H2O is exposed to the following:
- CVE-2019-9512 "Ping Flood": The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
- CVE-2019-9514 "Reset Flood": The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both, potentially leading to a denial of service.
- CVE-2019-9515 "Settings Flood": The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
more... | h2o
more detail |
2019-08-22 | VuXML ID e7392840-c520-11e9-a4ef-0800274e5f20
The Gitea Team reports:
This release contains two security fixes, so we highly recommend updating.
more... | gitea
more detail |
2019-08-21 | VuXML ID c97a940b-c392-11e9-bb38-000d3ab229d6
Node.js reports:
Node.js, as well as many other implementations of HTTP/2, have been found vulnerable to Denial of Service attacks. See https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md for more information.
Updates are now available for all active Node.js release lines, including Linux ARMv6 builds for Node.js 8.x (which had been delayed).
We recommend that all Node.js users upgrade to a version listed below as soon as possible.
Vulnerabilities Fixed
Impact: All versions of Node.js 8 (LTS "Carbon"), Node.js 10 (LTS "Dubnium"), and Node.js 12 (Current) are vulnerable to the following:
- CVE-2019-9511 "Data Dribble": The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
- CVE-2019-9512 "Ping Flood": The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
- CVE-2019-9513 "Resource Loop": The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU, potentially leading to a denial of service.
- CVE-2019-9514 "Reset Flood": The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both, potentially leading to a denial of service.
- CVE-2019-9515 "Settings Flood": The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
- CVE-2019-9516 "0-Length Headers Leak": The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory, potentially leading to a denial of service.
- CVE-2019-9517 "Internal Data Buffering": The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both, potentially leading to a denial of service.
- CVE-2019-9518 "Empty Frames Flood": The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU, potentially leading to a denial of service. (Discovered by Piotr Sikora of Google)
more... | node node10 node8
more detail |
2019-08-21 | VuXML ID dbd1f627-c43b-11e9-a923-9c5c8e75236a
Micah Snyder reports:
- An out of bounds write was possible within ClamAV&s NSIS bzip2 library when attempting decompression in cases where the number of selectors exceeded the max limit set by the library (CVE-2019-12900). The issue has been resolved by respecting that limit.
- The zip bomb vulnerability mitigated in 0.101.3 has been assigned the CVE identifier CVE-2019-12625. Unfortunately, a workaround for the zip-bomb mitigation was immediately identified. To remediate the zip-bomb scan time issue, a scan time limit has been introduced in 0.101.4. This limit now resolves ClamAV's vulnerability to CVE-2019-12625.
more... | clamav clamav-milter
more detail |
2019-08-20 | VuXML ID 795442e7-c355-11e9-8224-5404a68ad561
The VLC project reports:
Security:
* Fix a buffer overflow in the MKV demuxer (CVE-2019-14970)
* Fix a read buffer overflow in the avcodec decoder (CVE-2019-13962)
* Fix a read buffer overflow in the FAAD decoder
* Fix a read buffer overflow in the OGG demuxer (CVE-2019-14437, CVE-2019-14438)
* Fix a read buffer overflow in the ASF demuxer (CVE-2019-14776)
* Fix a use after free in the MKV demuxer (CVE-2019-14777, CVE-2019-14778)
* Fix a use after free in the ASF demuxer (CVE-2019-14533)
* Fix a couple of integer underflows in the MP4 demuxer (CVE-2019-13602)
* Fix a null dereference in the dvdnav demuxer
* Fix a null dereference in the ASF demuxer (CVE-2019-14534)
* Fix a null dereference in the AVI demuxer
* Fix a division by zero in the CAF demuxer (CVE-2019-14498)
* Fix a division by zero in the ASF demuxer (CVE-2019-14535)
more... | vlc
more detail |
2019-08-19 | VuXML ID 56778a31-c2a1-11e9-9051-4c72b94353b5
SO-AND-SO reports:
nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer
Overflow in the dname_concatenate() function in dname.c.
more... | nsd
more detail |
2019-08-18 | VuXML ID d51b52cf-c199-11e9-b13f-001b217b3468
The Git community reports:
A carefully constructed commit object with a very large number
of parents may lead to potential out-of-bounds writes or
potential denial of service.
The ProgramData configuration file is always read for compatibility
with Git for Windows and Portable Git installations. The ProgramData
location is not necessarily writable only by administrators, so we
now ensure that the configuration file is owned by the administrator
or the current user.
more... | libgit2
more detail |
2019-08-18 | VuXML ID d905b219-c1ca-11e9-8c46-0c9d925bbbc0
nvd.nist.gov reports
X.Org xdm 1.1.10, 1.1.11, and possibly other versions,
when performing authentication using certain implementations of
the crypt API function that can return NULL, allows remote
attackers to cause a denial of service (NULL pointer dereference
and crash) by attempting to log into an account whose password
field contains invalid characters, as demonstrated using the crypt
function from glibc 2.17 and later with (1) the "!" character in
the salt portion of a password field or (2) a password that has
been encrypted using DES or MD5 in FIPS-140 mode.
more... | xdm
more detail |
2019-08-17 | VuXML ID caf545f2-c0d9-11e9-9051-4c72b94353b5
SO-AND-SO reports:
SECURITY: CVE-2019-10081
mod_http2: HTTP/2 very early pushes, for example configured with "H2PushResource",
could lead to an overwrite of memory in the pushing request's pool,
leading to crashes. The memory copied is that of the configured push
link header values, not data supplied by the client.
SECURITY: CVE-2019-9517
mod_http2: a malicious client could perform a DoS attack by flooding
a connection with requests and basically never reading responses
on the TCP connection. Depending on h2 worker dimensioning, it was
possible to block those with relatively few connections.
SECURITY: CVE-2019-10098
rewrite, core: Set PCRE_DOTALL flag by default to avoid unpredictable
matches and substitutions with encoded line break characters.
SECURITY: CVE-2019-10092
Remove HTML-escaped URLs from canned error responses to prevent misleading
text/links being displayed via crafted links.
SECURITY: CVE-2019-10097
mod_remoteip: Fix stack buffer overflow and NULL pointer deference
when reading the PROXY protocol header.
CVE-2019-10082
mod_http2: Using fuzzed network input, the http/2 session
handling could be made to read memory after being freed,
during connection shutdown.
more... | apache24
more detail |
2019-08-17 | VuXML ID ece65d3b-c20c-11e9-8af4-bcaec55be5e5
Joe Cooper reports:
I've rolled out Webmin version 1.930 and Usermin version 1.780
for all repositories. This release includes several security
fixes, including one potentially serious one caused by malicious
code inserted into Webmin and Usermin at some point on our build
infrastructure. We're still investigating how and when, but the
exploitable code has never existed in our github repositories, so
we've rebuilt from git source on new infrastructure (and checked
to be sure the result does not contain the malicious code).
I don't have a changelog for these releases yet, but I wanted
to announce them immediately due to the severity of this issue.
To exploit the malicious code, your Webmin installation must have
Webmin -> Webmin Configuration -> Authentication -> Password
expiry policy set to Prompt users with expired passwords to enter
a new one. This option is not set by default, but if it is set,
it allows remote code execution.
This release addresses CVE-2019-15107, which was disclosed
earlier today. It also addresses a handful of XSS issues that we
were notified about, and a bounty was awarded to the researcher
(a different one) who found them.
more... | usermin webmin
more detail |
2019-08-16 | VuXML ID 121fec01-c042-11e9-a73f-b36f5969f162
nghttp2 GitHub releases:
This release fixes CVE-2019-9511 "Data Dribble" and CVE-2019-9513
"Resource Loop" vulnerability in nghttpx and nghttpd. Specially crafted
HTTP/2 frames cause Denial of Service by consuming CPU time. Check out
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
for details. For nghttpx, additionally limiting inbound traffic by
--read-rate and --read-burst options is quite effective against this
kind of attack.
CVE-2019-9511 "Data Dribble": The attacker requests a large amount of
data from a specified resource over multiple streams. They manipulate
window size and stream priority to force the server to queue the data in
1-byte chunks. Depending on how efficiently this data is queued, this
can consume excess CPU, memory, or both, potentially leading to a
denial of service.
CVE-2019-9513 "Ping Flood": The attacker sends continual pings to an
HTTP/2 peer, causing the peer to build an internal queue of responses.
Depending on how efficiently this data is queued, this can consume
excess CPU, memory, or both, potentially leading to a denial of service.
more... | libnghttp2 nghttp2
more detail |
2019-08-16 | VuXML ID 60e991ac-c013-11e9-b662-001cc0382b2f
Apple reports:
- CVE-2019-8696 and CVE-2019-8675: SNMP buffer overflows.
- IPP buffer overflow.
- Memory disclosure in the scheduler.
- DoS issues in the scheduler.
more... | cups
more detail |
2019-08-15 | VuXML ID 41f4baac-bf77-11e9-8d2f-5404a68ad561
The traefik project reports:
Update of dependency to go go1.12.8 resolves potential HTTP/2
denial of service in traefik.
more... | traefik
more detail |
2019-08-15* | VuXML ID 7f7d6412-bae5-11e9-be92-3085a9a95629
Jesse Smith (upstream author of the doas program) reported:
Previous versions of "doas" transferred most environment variables, such
as USER, HOME, and PATH from the original user to the target user.
Passing these variables could cause files in the wrong path or
home directory to be read (or written to), which resulted in potential
security problems.
Many thanks to Sander Bos for reporting this issue and explaining
how it can be exploited.
more... | doas
more detail |
2019-08-14* | VuXML ID 87679fcb-be60-11e9-9051-4c72b94353b5
NGINX Team reports:
Several security issues were identified in nginx HTTP/2
implementation which might cause excessive memory consumption
and CPU usage (CVE-2019-9511, CVE-2019-9513, CVE-2019-9516).
The issues affect nginx compiled with the ngx_http_v2_module (not
compiled by default) if the http2 option of the listen directive
is used in a configuration file.
more... | nginx nginx-devel
more detail |
2019-08-13 | VuXML ID 0569146e-bdef-11e9-bd31-8de4a4470bbb
Nokogiri GitHub release:
A command injection vulnerability in Nokogiri v1.10.3 and earlier
allows commands to be executed in a subprocess by Ruby's Kernel.open
method. Processes are vulnerable only if the undocumented method
Nokogiri::CSS::Tokenizer#load_file is being passed untrusted user input.
This vulnerability appears in code generated by the Rexical gem
versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate
lexical scanner code for parsing CSS queries. The underlying
vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to
this version of Rexical in Nokogiri v1.10.4.
more... | rubygem-nokogiri
more detail |
2019-08-13 | VuXML ID ddd48087-bd86-11e9-b13f-001b217b3468
Gitlab reports:
Insecure Authentication Methods Disabled for Grafana By Default
Multiple Command-Line Flag Injection Vulnerabilities
Insecure Cookie Handling on GitLab Pages
more... | gitlab-ce
more detail |
2019-08-09 | VuXML ID f56669f5-d799-4ff5-9174-64a6d571c451
Jon Siwek of Corelight reports:
This is a security patch release to address potential
Denial of Service vulnerabilities:
-
Null pointer dereference in the RPC analysis code. RPC
analyzers (e.g. MOUNT or NFS) are not enabled in the
default configuration.
-
Signed integer overflow in BinPAC-generated parser code.
The result of this is Undefined Behavior with respect to
the array bounds checking conditions that BinPAC generates,
so it's unpredictable what an optimizing compiler may
actually do under the assumption that signed integer
overlows should never happen. The specific symptom which
lead to finding this issue was with the PE analyzer causing
out-of-memory crashes due to large allocations that were
otherwise prevented when the array bounds checking logic
was changed to prevent any possible signed integer overlow.
more... | bro
more detail |
2019-08-09 | VuXML ID f5f0a640-bae8-11e9-bb3a-001e2a3f778d
The KDE Community has released a security announcement:
The syntax Key[$e]=$(shell command) in *.desktop files, .directory files, and configuration files
(typically found in ~/.config) was an intentional feature of KConfig, to allow flexible configuration.
This could however be abused by malicious people to make the users install such files and get code
executed even without intentional action by the user.
more... | kf5-kconfig
more detail |
2019-08-08 | VuXML ID 9de4c1c1-b9ee-11e9-82aa-6cc21735f730
The PostgreSQL project reports:
Versions Affected: 9.4 - 11
Given a suitable `SECURITY DEFINER` function, an attacker can execute arbitrary
SQL under the identity of the function owner. An attack requires `EXECUTE`
permission on the function, which must itself contain a function call having
inexact argument type match. For example, `length('foo'::varchar)` and
`length('foo')` are inexact, while `length('foo'::text)` is exact.
As part of exploiting this vulnerability, the attacker uses `CREATE DOMAIN`
to create a type in a `pg_temp` schema. The attack pattern and fix are similar
to that for CVE-2007-2138.
Writing `SECURITY DEFINER` functions continues to require following
the considerations noted in the documentation:
https://www.postgresql.org/docs/devel/sql-createfunction.html#SQL-CREATEFUNCTION-SECURITY
Versions Affected: 11
In a database containing hypothetical, user-defined hash equality operators,
an attacker could read arbitrary bytes of server memory. For an attack to
become possible, a superuser would need to create unusual operators.
It is possible for operators not purpose-crafted for attack to have
the properties that enable an attack, but we are not aware of specific examples.
more... | postgresql10-server postgresql11-server postgresql94-server postgresql95-server postgresql96-server
more detail |
2019-08-05 | VuXML ID d3f60db0-3aea-11eb-af2a-080027dbe4b7
MITRE Corporation reports:
GLPI through 9.4.3 is prone to account takeover by abusing the ajax/autocompletion.php autocompletion feature. The lack of correct validation leads to recovery of the token generated via the password reset functionality, and thus an authenticated attacker can set an arbitrary password for any user. This vulnerability can be exploited to take control of admin account. This vulnerability could be also abused to obtain other sensitive fields like API keys or password hashes.
more... | glpi
more detail |
2019-08-03 | VuXML ID 6e65dfea-b614-11e9-a3a2-1506e15611cc
Django release notes:
CVE-2019-14232: Denial-of-service possibility in
django.utils.text.Truncator
If django.utils.text.Truncator's chars() and words() methods were
passed the html=True argument, they were extremely slow to evaluate
certain inputs due to a catastrophic backtracking vulnerability in a
regular expression. The chars() and words() methods are used to
implement the truncatechars_html and truncatewords_html template
filters, which were thus vulnerable
The regular expressions used by Truncator have been simplified in
order to avoid potential backtracking issues. As a consequence, trailing
punctuation may now at times be included in the truncated output.
CVE-2019-14233: Denial-of-service possibility in strip_tags()
Due to the behavior of the underlying HTMLParser,
django.utils.html.strip_tags() would be extremely slow to evaluate
certain inputs containing large sequences of nested incomplete HTML
entities. The strip_tags() method is used to implement the corresponding
striptags template filter, which was thus also vulnerable.
strip_tags() now avoids recursive calls to HTMLParser when progress
removing tags, but necessarily incomplete HTML entities, stops being
made.
Remember that absolutely NO guarantee is provided about the results of
strip_tags() being HTML safe. So NEVER mark safe the result of a
strip_tags() call without escaping it first, for example with
django.utils.html.escape().
CVE-2019-14234: SQL injection possibility in key and index lookups for
JSONField/HStoreField
Key and index lookups for JSONField and key lookups for HStoreField
were subject to SQL injection, using a suitably crafted dictionary,
with dictionary expansion, as the **kwargs passed to QuerySet.filter().
CVE-2019-14235: Potential memory exhaustion in
django.utils.encoding.uri_to_iri()
If passed certain inputs, django.utils.encoding.uri_to_iri() could lead
to significant memory usage due to excessive recursion when
re-percent-encoding invalid UTF-8 octet sequences.
uri_to_iri() now avoids recursion when re-percent-encoding invalid
UTF-8 octet sequences.
more... | py27-django111 py27-django21 py27-django22 py35-django111 py35-django21 py35-django22 py36-django111 py36-django21 py36-django22 py37-django111 py37-django21 py37-django22
more detail |
2019-08-03* | VuXML ID f4d638b9-e6e5-4dbe-8c70-571dbc116174
curl security problems:
CVE-2018-14618: NTLM password overflow via integer overflow
The internal function Curl_ntlm_core_mk_nt_hash multiplies the length
of the password by two (SUM) to figure out how large temporary storage
area to allocate from the heap.
The length value is then subsequently used to iterate over the
password and generate output into the allocated storage buffer. On
systems with a 32 bit size_t, the math to calculate SUM triggers an
integer overflow when the password length exceeds 2GB (2^31 bytes).
This integer overflow usually causes a very small buffer to actually
get allocated instead of the intended very huge one, making the use of
that buffer end up in a heap buffer overflow.
This bug is almost identical to CVE-2017-8816.
more... | curl linux-c7-curl
more detail |
2019-07-31 | VuXML ID 3b2ee737-c12d-11e9-aabc-0800274e5f20
The Gitea Team reports:
This release contains two security fixes, so we highly recommend updating.
more... | gitea
more detail |
2019-07-31 | VuXML ID e7b69694-b3b5-11e9-9bb6-0800274e5f20
The Gitea Team reports:
This version of Gitea contains security fixes that could not be
backported to 1.8. For this reason, we strongly recommend updating.
more... | gitea
more detail |
2019-07-30 | VuXML ID 0d3f99f7-b30c-11e9-a87f-a4badb2f4699
Problem Description:
If a process attempts to transmit rights over a UNIX-domain
socket and an error causes the attempt to fail, references
acquired on the rights are not released and are leaked.
This bug can be used to cause the reference counter to wrap
around and free the corresponding file structure.
Impact:
A local user can exploit the bug to gain root privileges
or escape from a jail.
more... | FreeBSD-kernel
more detail |
2019-07-30 | VuXML ID 14a3b376-b30a-11e9-a87f-a4badb2f4699
Problem Description:
To implement one particular ioctl, the Linux emulation
code used a special interface present in the cd(4) driver
which allows it to copy subchannel information directly to
a kernel address. This interface was erroneously made
accessible to userland, allowing users with read access to
a cd(4) device to arbitrarily overwrite kernel memory when
some media is present in the device.
Impact:
A user in the operator group can make use of this interface
to gain root privileges on a system with a cd(4) device
when some media is present in the device.
more... | FreeBSD-kernel
more detail |
2019-07-30 | VuXML ID 1cd89254-b2db-11e9-8001-001b217b3468
Gitlab reports:
GitHub Integration SSRF
Trigger Token Impersonation
Build Status Disclosure
SSRF Mitigation Bypass
Information Disclosure New Issue ID
IDOR Label Name Enumeration
Persistent XSS Wiki Pages
User Revokation Bypass with Mattermost Integration
Arbitrary File Upload via Import Project Archive
Information Disclosure Vulnerability Feedback
Persistent XSS via Email
Denial Of Service Epic Comments
Email Verification Bypass
Override Merge Request Approval Rules
more... | gitlab-ce
more detail |
2019-07-30* | VuXML ID 2da3cb25-6571-11e9-8e67-206a8a720317
Problem Description:
EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant
(EAP peer) does not to validate the received scalar and element values
in EAP-pwd-Commit messages properly. This could result in attacks that
would be able to complete EAP-pwd authentication exchange without the
attacker having to know the used password.
See
https://w1.fi/security/2019-4/eap-pwd-missing-commit-validation.txt
for a detailed description of the bug.
Impact:
All wpa_supplicant and hostapd versions with EAP-pwd support.
more... | FreeBSD hostapd wpa_supplicant
more detail |
2019-07-30 | VuXML ID 39f6cbff-b30a-11e9-a87f-a4badb2f4699
Problem Description:
Insufficient validation of environment variables in the
telnet client supplied in FreeBSD can lead to stack-based
buffer overflows. A stack- based overflow is present in the
handling of environment variables when connecting via the
telnet client to remote telnet servers.
This issue only affects the telnet client. Inbound telnet
sessions to telnetd(8) are not affected by this issue.
Impact:
These buffer overflows may be triggered when connecting
to a malicious server, or by an active attacker in the
network path between the client and server. Specially crafted
TELNET command sequences may cause the execution of arbitrary
code with the privileges of the user invoking telnet(1).
more... | FreeBSD
more detail |
2019-07-30 | VuXML ID 3d02520d-b309-11e9-a87f-a4badb2f4699
Problem Description:
A bug in the pf(4) IPv6 fragment reassembly logic
incorrectly uses the last extension header offset from the
last received packet instead of from the first packet.
Impact:
Malicious IPv6 packets with different IPv6 extensions
could cause a kernel panic or potentially a filtering rule
bypass.
more... | FreeBSD-kernel
more detail |
2019-07-30 | VuXML ID 5721ae65-b30a-11e9-a87f-a4badb2f4699
Problem Description:
The code which handles a close(2) of a descriptor created
by posix_openpt(2) fails to undo the configuration which
causes SIGIO to be raised. This bug can lead to a
write-after-free of kernel memory.
Impact:
The bug permits malicious code to trigger a write-after-free,
which may be used to gain root privileges or escape a
jail.
more... | FreeBSD-kernel
more detail |
2019-07-30 | VuXML ID 59c5f255-b309-11e9-a87f-a4badb2f4699
Problem Description:
States in pf(4) let ICMP and ICMP6 packets pass if they
have a packet in their payload matching an existing condition.
pf(4) does not check if the outer ICMP or ICMP6 packet has
the same destination IP as the source IP of the inner
protocol packet.
Impact:
A maliciously crafted ICMP/ICMP6 packet could bypass the
packet filter rules and be passed to a host that would
otherwise be unavailable.
more... | FreeBSD-kernel
more detail |
2019-07-30 | VuXML ID 6b856e00-b30a-11e9-a87f-a4badb2f4699
Problem Description:
Due to insufficient initialization of memory copied to
userland in the components listed above small amounts of
kernel memory may be disclosed to userland processes.
Impact:
A user who can invoke 32-bit FreeBSD ioctls may be able
to read the contents of small portions of kernel memory.
Such memory might contain sensitive information, such
as portions of the file cache or terminal buffers. This
information might be directly useful, or it might be leveraged
to obtain elevated privileges in some way; for example, a
terminal buffer might include a user-entered password.
more... | FreeBSD-kernel
more detail |
2019-07-30 | VuXML ID a633651b-b309-11e9-a87f-a4badb2f4699
Problem Description:
On some Intel processors utilizing speculative execution
a local process may be able to infer stale information from
microarchitectural buffers to obtain a memory disclosure.
Impact:
An attacker may be able to read secret data from the
kernel or from a process when executing untrusted code (for
example, in a web browser).
more... | FreeBSD-kernel
more detail |
2019-07-30* | VuXML ID c2576e14-36e2-11e9-9eda-206a8a720317
Network Time Foundation reports:
A crafted malicious authenticated mode 6 (ntpq) packet from a
permitted network address can trigger a NULL pointer dereference,
crashing ntpd.
Note that for this attack to work, the sending
system must be on an address that the target's ntpd accepts mode 6
packets from, and must use a private key that is specifically
listed as being used for mode 6 authorization.
Impact: The ntpd daemon can crash due to the NULL pointer
dereference, causing a denial of service.
Mitigation:
- Use restrict noquery to limit addresses that can send mode 6
queries.
- Limit access to the private controlkey in ntp.keys.
- Upgrade to 4.2.8p13, or later.
more... | FreeBSD ntp
more detail |
2019-07-30 | VuXML ID c294c2e6-b309-11e9-a87f-a4badb2f4699
Problem Description:
While processing acknowledgements, the RACK code uses
several linked lists to maintain state entries. A malicious
attacker can cause the lists to grow unbounded. This can
cause an expensive list traversal on every packet being
processed, leading to resource exhaustion and a denial of
service.
Impact:
An attacker with the ability to send specially crafted
TCP traffic to a victim system can degrade network performance
and/or consume excessive CPU by exploiting the inefficiency
of traversing the potentially very large RACK linked lists
with relatively small bandwidth cost.
more... | FreeBSD-kernel
more detail |
2019-07-30 | VuXML ID deb6e164-b30b-11e9-a87f-a4badb2f4699
Problem Description:
System calls operating on file descriptors obtain a
reference to relevant struct file which due to a programming
error was not always put back, which in turn could be used
to overflow the counter of affected struct file.
Impact:
A local user can use this flaw to obtain access to files,
directories, sockets etc. opened by processes owned by other
users. If obtained struct file represents a directory from
outside of user's jail, it can be used to access files
outside of the jail. If the user in question is a jailed
root they can obtain root privileges on the host system.
more... | FreeBSD-kernel
more detail |
2019-07-30 | VuXML ID edf064fb-b30b-11e9-a87f-a4badb2f4699
Problem Description:
The pci_xhci_device_doorbell() function does not validate
the 'epid' and 'streamid' provided by the guest, leading
to an out-of-bounds read.
Impact:
A misbehaving bhyve guest could crash the system or
access memory that it should not be able to.
more... | FreeBSD-kernel
more detail |
2019-07-30 | VuXML ID f62bba56-b309-11e9-a87f-a4badb2f4699
Problem Description:
With certain inputs, iconv may write beyond the end of
the output buffer.
Impact:
Depending on the way in which iconv is used, an attacker
may be able to create a denial of service, provoke incorrect
program behavior, or induce a remote code execution. iconv
is a libc library function and the nature of possible attacks
will depend on the way in which iconv is used by applications
or daemons.
more... | FreeBSD
more detail |
2019-07-30 | VuXML ID ff82610f-b309-11e9-a87f-a4badb2f4699
Problem Description:
A bug causes up to three bytes of kernel stack memory
to be written to disk as uninitialized directory entry
padding. This data can be viewed by any user with read
access to the directory. Additionally, a malicious user
with write access to a directory can cause up to 254 bytes
of kernel stack memory to be exposed.
Impact:
Some amount of the kernel stack is disclosed and written
out to the filesystem.
more... | FreeBSD-kernel
more detail |
2019-07-28 | VuXML ID 38d2df4d-b143-11e9-87e7-901b0e934d69
Matrix developers report:
The matrix team releases Synapse 1.2.1 as a critical security update. It contains patches relating to redactions and event federation:
- Prevent an attack where a federated server could send redactions for arbitrary events in v1 and v2 rooms.
- Prevent a denial-of-service attack where cycles of redaction events would make Synapse spin infinitely.
- Prevent an attack where users could be joined or parted from public rooms without their consent.
- Fix a vulnerability where a federated server could spoof read-receipts from users on other servers.
- It was possible for a room moderator to send a redaction for an m.room.create event, which would downgrade the room to version 1.
more... | py27-matrix-synapse py35-matrix-synapse py36-matrix-synapse py37-matrix-synapse
more detail |
2019-07-26* | VuXML ID 3e0da406-aece-11e9-8d41-97657151f8c2
Exim team report:
A local or remote attacker can execute programs with root privileges - if you've an unusual configuration.
If your configuration uses the ${sort } expansion for items that can be controlled by an attacker (e.g. $local_part, $domain). The default config, as shipped by the Exim developers, does not contain ${sort }.
The vulnerability is exploitable either remotely or locally and could
be used to execute other programs with root privilege. The ${sort }
expansion re-evaluates its items.
Exim 4.92.1 is not vulnerable.
more... | exim
more detail |
2019-07-23* | VuXML ID 0592f49f-b3b8-4260-b648-d1718762656c
Mozilla Foundation reports:
CVE-2019-9811: Sandbox escape via installation of malicious language pack
CVE-2019-11711: Script injection within domain through inner window reuse
CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects
CVE-2019-11713: Use-after-free with HTTP/2 cached stream
CVE-2019-11714: NeckoChild can trigger crash when accessed off of main thread
CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault
CVE-2019-11715: HTML parsing error can contribute to content XSS
CVE-2019-11716: globalThis not enumerable until accessed
CVE-2019-11717: Caret character improperly escaped in origins
CVE-2019-11718: Activity Stream writes unsanitized content to innerHTML
CVE-2019-11719: Out-of-bounds read when importing curve25519 private key
CVE-2019-11720: Character encoding XSS vulnerability
CVE-2019-11721: Domain spoofing through unicode latin 'kra' character
CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin
CVE-2019-11723: Cookie leakage during add-on fetching across private browsing boundaries
CVE-2019-11724: Retired site input.mozilla.org has remote troubleshooting permissions
CVE-2019-11725: Websocket resources bypass safebrowsing protections
CVE-2019-11727: PKCS#1 v1.5 signatures can be used for TLS 1.3
CVE-2019-11728: Port scanning through Alt-Svc header
CVE-2019-11710: Memory safety bugs fixed in Firefox 68
CVE-2019-11709: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8
more... | firefox firefox-esr libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2019-07-23* | VuXML ID 05da6b56-3e66-4306-9ea3-89fafe939726
Mozilla Foundation reports:
CVE-2019-9790: Use-after-free when removing in-use DOM elements
CVE-2019-9791: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey
CVE-2019-9792: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script
CVE-2019-9793: Improper bounds checks when Spectre mitigations are disabled
CVE-2019-9794: Command line arguments not discarded during execution
CVE-2019-9795: Type-confusion in IonMonkey JIT compiler
CVE-2019-9796: Use-after-free with SMIL animation controller
CVE-2019-9797: Cross-origin theft of images with createImageBitmap
CVE-2019-9798: Library is loaded from world writable APITRACE_LIB location
CVE-2019-9799: Information disclosure via IPC channel messages
CVE-2019-9801: Windows programs that are not 'URL Handlers' are exposed to web content
CVE-2019-9802: Chrome process information leak
CVE-2019-9803: Upgrade-Insecure-Requests incorrectly enforced for same-origin navigation
CVE-2019-9804: Code execution through 'Copy as cURL' in Firefox Developer Tools on macOS
CVE-2019-9805: Potential use of uninitialized memory in Prio
CVE-2019-9806: Denial of service through successive FTP authorization prompts
CVE-2019-9807: Text sent through FTP connection can be incorporated into alert messages
CVE-2019-9809: Denial of service through FTP modal alert error messages
CVE-2019-9808: WebRTC permissions can display incorrect origin with data: and blob: URLs
CVE-2019-9789: Memory safety bugs fixed in Firefox 66
CVE-2019-9788: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6
more... | firefox firefox-esr libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2019-07-23* | VuXML ID 44b6dfbf-4ef7-4d52-ad52-2b1b05d81272
Mozilla Foundation reports:
CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS
CVE-2019-9816: Type confusion with object groups and UnboxedObjects
CVE-2019-9817: Stealing of cross-domain images using canvas
CVE-2019-9818: Use-after-free in crash generation server
CVE-2019-9819: Compartment mismatch with fetch API
CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell
CVE-2019-9821: Use-after-free in AssertWorkerThread
CVE-2019-11691: Use-after-free in XMLHttpRequest
CVE-2019-11692: Use-after-free removing listeners in the event listener manager
CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux
CVE-2019-7317: Use-after-free in png_image_free of libpng library
CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox
CVE-2019-11695: Custom cursor can render over user interface outside of web content
CVE-2019-11696: Java web start .JNLP files are not recognized as executable files for download prompts
CVE-2019-11697: Pressing key combinations can bypass installation prompt delays and install extensions
CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks
CVE-2019-11700: res: protocol can be used to open known local files
CVE-2019-11699: Incorrect domain name highlighting during page navigation
CVE-2019-11701: webcal: protocol default handler loads vulnerable web page
CVE-2019-9814: Memory safety bugs fixed in Firefox 67
CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7
more... | firefox firefox-esr libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2019-07-23* | VuXML ID 7c3a02b9-3273-4426-a0ba-f90fad2ff72e
Mozilla Foundation reports:
CVE-2018-12391: HTTP Live Stream audio data is accessible cross-origin
CVE-2018-12392: Crash with nested event loops
CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript
CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting
CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts
CVE-2018-12397:
CVE-2018-12398: CSP bypass through stylesheet injection in resource URIs
CVE-2018-12399: Spoofing of protocol registration notification bar
CVE-2018-12400: Favicons are cached in private browsing mode on Firefox for Android
CVE-2018-12401: DOS attack through special resource URI parsing
CVE-2018-12402: SameSite cookies leak when pages are explicitly saved
CVE-2018-12403: Mixed content warning is not displayed when HTTPS page loads a favicon over HTTP
CVE-2018-12388: Memory safety bugs fixed in Firefox 63
CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3
more... | firefox firefox-esr libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2019-07-23* | VuXML ID b1f7d52f-fc42-48e8-8403-87d4c9d26229
Mozilla Foundation reports:
CVE-2018-18500: Use-after-free parsing HTML5 stream
CVE-2018-18503: Memory corruption with Audio Buffer
CVE-2018-18504: Memory corruption and out-of-bounds read of texture client buffer
CVE-2018-18505: Privilege escalation through IPC channel messages
CVE-2018-18506: Proxy Auto-Configuration file can define localhost access to be proxied
CVE-2018-18502: Memory safety bugs fixed in Firefox 65
CVE-2018-18501: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5
more... | firefox firefox-esr libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2019-07-23* | VuXML ID c4f39920-781f-4aeb-b6af-17ed566c4272
Mozilla Foundation reports:
CVE-2018-12386: Type confusion in JavaScript
A vulnerability in register allocation in JavaScript can
lead to type confusion, allowing for an arbitrary read and
write. This leads to remote code execution inside the
sandboxed content process when triggered.
CVE-2018-12387:
A vulnerability where the JavaScript JIT compiler inlines
Array.prototype.push with multiple arguments that results
in the stack pointer being off by 8 bytes after a
bailout. This leaks a memory address to the calling
function which can be used as part of an exploit inside
the sandboxed content process.
more... | firefox firefox-esr libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2019-07-23* | VuXML ID d10b49b2-8d02-49e8-afde-0844626317af
Mozilla Foundation reports:
CVE-2018-12407: Buffer overflow with ANGLE library when using VertexBuffer11 module
CVE-2018-17466: Buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
CVE-2018-18492: Use-after-free with select element
CVE-2018-18493: Buffer overflow in accelerated 2D canvas with Skia
CVE-2018-18494: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs
CVE-2018-18495: WebExtension content scripts can be loaded in about: pages
CVE-2018-18496: Embedded feed preview page can be abused for clickjacking
CVE-2018-18497: WebExtensions can load arbitrary URLs through pipe separators
CVE-2018-18498: Integer overflow when calculating buffer sizes for images
CVE-2018-12406: Memory safety bugs fixed in Firefox 64
CVE-2018-12405: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4
more... | firefox firefox-esr libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2019-07-22 | VuXML ID 198e6220-ac8b-11e9-a1c7-b499baebfeaf
Oracle reports:
This Critical Patch Update contains 45 new security fixes for
Oracle MySQL. 4 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without
requiring user credentials.
more... | mariadb101-server mariadb102-server mariadb103-server mariadb104-server mariadb55-server mysql56-server mysql57-server mysql80-server percona55-server percona56-server percona57-server
more detail |
2019-07-21 | VuXML ID 19d648e0-ab69-11e9-bfef-000ffec0b3e1
Drupal Security Team reports:
In Drupal 8.7.4, when the experimental Workspaces module is enabled,
an access bypass condition is created.
This can be mitigated by disabling the Workspaces module. It does
not affect any release other than Drupal 8.7.4.
more... | drupal8
more detail |
2019-07-20 | VuXML ID 5914705c-ab03-11e9-a4f9-080027ac955c
Simon Tatham reports:
Vulnerabilities fixed in this release include:
- A malicious SSH-1 server could trigger a buffer overrun by sending
extremely short RSA keys, or certain bad packet length fields.
Either of these could happen before host key verification, so even
if you trust the server you *intended* to connect to, you would
still be at risk.
(However, the SSH-1 protocol is obsolete, and recent versions of
PuTTY do not try it by default, so you are only at risk if you work
with old servers and have explicitly configured SSH-1.)
- If a malicious process found a way to impersonate Pageant, then it
could cause an integer overflow in any of the SSH client tools
(PuTTY, Plink, PSCP, PSFTP) which accessed the malicious Pageant.
Other security-related bug fixes include:
- The 'trust sigil' system introduced in PuTTY 0.71 to protect
against server spoofing attacks had multiple bugs. Trust sigils
were not turned off after login in the SSH-1 and Rlogin protocols,
and not turned back on if you used the Restart Session command.
Both are now fixed.
more... | putty putty-gtk2 putty-nogtk
more detail |
2019-07-17 | VuXML ID df3db21d-1a4d-4c78-acf7-4639e5a795e0
Jenkins Security Advisory:
Description
(Medium) SECURITY-1424 / CVE-2019-10352
Arbitrary file write vulnerability using file parameter definitions
(High) SECURITY-626 / CVE-2019-10353
CSRF protection tokens did not expire
(Medium) SECURITY-534 / CVE-2019-10354
Unauthorized view fragment access
more... | jenkins jenkins-lts
more detail |
2019-07-16 | VuXML ID 93167bef-9752-11e9-b61c-b885849ded8e
Mitre report:
libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
more... | libxslt
more detail |
2019-07-12 | VuXML ID 818b2bcb-a46f-11e9-bed9-001999f8d30b
The Asterisk project reports:
A specially crafted SIP in-dialog MESSAGE message can cause Asterisk to crash.
more... | asterisk13 asterisk15 asterisk16
more detail |
2019-07-12 | VuXML ID a449c604-a43a-11e9-b422-fcaa147e860e
Python changelog:
bpo-37463: ssl.match_hostname() no longer accepts IPv4 addresses with additional text
after the address and only quad-dotted notation without trailing whitespaces. Some
inet_aton() implementations ignore whitespace and all data after whitespace, e.g.'127.0.0.1
whatever'.
bpo-35907: CVE-2019-9948: Avoid file reading by disallowing local-file:// and
local_file:// URL schemes in URLopener().open() and URLopener().retrieve() of
urllib.request.
bpo-36742: Fixes mishandling of pre-normalization characters in urlsplit().
bpo-30458: Address CVE-2019-9740 by disallowing URL paths with embedded whitespace
or control characters through into the underlying http client request. Such potentially
malicious header injection URLs now cause an http.client.InvalidURL exception to be
raised.
bpo-33529: Prevent fold function used in email header encoding from entering infinite
loop when there are too many non-ASCII characters in a header.
bpo-35755: shutil.which() now uses os.confstr("CS_PATH") if available and if the PATH
environment variable is not set. Remove also the current directory from posixpath.defpath.
On Unix, shutil.which() and the subprocess module no longer search the executable in the
current directory if the PATH environment variable is not set.
more... | python37
more detail |
2019-07-12 | VuXML ID e9d2e981-a46d-11e9-bed9-001999f8d30b
The Asterisk project reports:
When T.38 faxing is done in Asterisk a T.38 reinvite
may be sent to an endpoint to switch it to T.38. If the
endpoint responds with an improperly formatted SDP answer
including both a T.38 UDPTL stream and an audio or video
stream containing only codecs not allowed on the SIP peer
or user a crash will occur. The code incorrectly assumes
that there will be at least one common codec when T.38
is also in the SDP answer.
more... | asterisk13 asterisk15 asterisk16
more detail |
2019-07-09 | VuXML ID 23f65f58-a261-11e9-b444-002590acae31
From the GnuPG 2.2.17 changelog:
gpg: Ignore all key-signatures received from keyservers. This
change is required to mitigate a DoS due to keys flooded with
faked key-signatures.
more... | gnupg
more detail |
2019-07-09* | VuXML ID 39bc2294-ff32-4972-9ecb-b9f40b4ccb74
Mozilla Foundation reports:
CVE-2019-11708: sandbox escape using Prompt:Open
Insufficient vetting of parameters passed with the
Prompt:Open IPC message between child and parent processes
can result in the non-sandboxed parent process opening web
content chosen by a compromised child process. When combined
with additional vulnerabilities this could result in executing
arbitrary code on the user's computer.
more... | firefox firefox-esr waterfox
more detail |
2019-07-08 | VuXML ID 18ed9650-a1d6-11e9-9b17-fcaa147e860e
Python changelog:
bpo-35907: CVE-2019-9948: Avoid file reading by disallowing local-file://
and local_file:// URL schemes in URLopener().open() and URLopener().retrieve()
of urllib.request.
bpo-36742: Fixes mishandling of pre-normalization characters in urlsplit().
bpo-30458: Address CVE-2019-9740 by disallowing URL paths with embedded
whitespace or control characters through into the underlying http client
request. Such potentially malicious header injection URLs now cause an
http.client.InvalidURL exception to be raised.
bpo-36216: Changes urlsplit() to raise ValueError when the URL contains
characters that decompose under IDNA encoding (NFKC-normalization) into
characters that affect how the URL is parsed.
bpo-33529: Prevent fold function used in email header encoding from
entering infinite loop when there are too many non-ASCII characters in
a header.
bpo-35121: Don't send cookies of domain A without Domain attribute to
domain B when domain A is a suffix match of domain B while using a cookiejar
with http.cookiejar.DefaultCookiePolicy policy. Patch by Karthikeyan
Singaravelan.
more... | python36
more detail |
2019-07-07* | VuXML ID 6e58e1e9-2636-413e-9f84-4c0e21143628
libssh2 developers report:
- Defend against possible integer overflows in comp_method_zlib_decomp.
- Defend against writing beyond the end of the payload in _libssh2_transport_read().
- Sanitize padding_length - _libssh2_transport_read().
- This prevents an underflow resulting in a potential out-of-bounds read if a server sends a too-large padding_length, possibly with malicious intent.
- Prevent zero-byte allocation in sftp_packet_read() which could lead to an out-of-bounds read.
- Check the length of data passed to sftp_packet_add() to prevent out-of-bounds reads.
- Add a required_size parameter to sftp_packet_require et. al. to require callers of these functions to handle packets that are too short.
- Additional length checks to prevent out-of-bounds reads and writes in _libssh2_packet_add().
more... | libssh2 linux-c6-libssh2 linux-c7-libssh2
more detail |
2019-07-06 | VuXML ID 3dd46e05-9fb0-11e9-bf65-00012e582166
The WebKitGTK project reports many vulnerabilities,
including several arbitrary code execution vulnerabilities.
more... | webkit2-gtk3
more detail |
2019-07-05 | VuXML ID 3c5a4fe0-9ebb-11e9-9169-fcaa147e860e
Mediawiki reports:
Security fixes:
T197279, CVE-2019-12468: Directly POSTing to Special:ChangeEmail would allow
for bypassing reauthentication, allowing for potential account takeover.
T204729, CVE-2019-12473: Passing invalid titles to the API could cause a DoS
by querying the entire `watchlist` table.
T207603, CVE-2019-12471: Loading user JavaScript from a non-existent account
allows anyone to create the account, and XSS the users' loading that script.
T208881: blacklist CSS var().
T199540, CVE-2019-12472: It is possible to bypass the limits on IP range
blocks (`$wgBlockCIDRLimit`) by using the API.
T212118, CVE-2019-12474: Privileged API responses that include whether a
recent change has been patrolled may be cached publicly.
T209794, CVE-2019-12467: A spammer can use Special:ChangeEmail to send out
spam with no rate limiting or ability to block them.
T25227, CVE-2019-12466: An account can be logged out without using a token(CRRF)
T222036, CVE-2019-12469: Exposed suppressed username or log in Special:EditTags.
T222038, CVE-2019-12470: Exposed suppressed log in RevisionDelete page.
T221739, CVE-2019-11358: Fix potential XSS in jQuery.
more... | mediawiki131 mediawiki132
more detail |
2019-07-03 | VuXML ID 3394bc2b-9da4-11e9-951e-14dae9d5a9d2
SDL_image developers report:
Fixed a number of security issues:
- TALOS-2019-0820
- TALOS-2019-0821
- TALOS-2019-0841
- TALOS-2019-0842
- TALOS-2019-0843
- TALOS-2019-0844
more... | sdl2_image
more detail |
2019-07-03 | VuXML ID 4ea507d1-9da8-11e9-a759-001b217b3468
Gitlab reports:
Ability to Write a Note to a Private Snippet
Recent Pipeline Information Disclosed to Unauthorised Users
Resource Exhaustion Attack
Error Caused by Encoded Characters in Comments
Authorization Issues in GraphQL
Number of Merge Requests was Accessible
Enabling One of the Service Templates Could Cause Resource Depletion
Broken Access Control for the Content of Personal Snippets
Decoding Color Codes Caused Resource Depletion
Merge Request Template Name Disclosure
SSRF Vulnerability in Project GitHub Integration
more... | gitlab-ce
more detail |
2019-07-03 | VuXML ID b79ec16b-9da7-11e9-a0ea-a92fe7db4867
Ettercap GitHub issue:
Etterfilter results in an invalid read of 8 bytes when parsing a crafted file.
more... | ettercap
more detail |
2019-07-01 | VuXML ID 475f952c-9b29-11e9-a8a5-6805ca0b38e8
Irssi reports:
Use after free when sending SASL login to the server found by ilbelkyr. (CWE-416, CWE-825)
more... | irssi
more detail |
2019-07-01 | VuXML ID b805d7b4-9c0c-11e9-97f0-000c29e96db4
Django security releases issued:
When deployed behind a reverse-proxy connecting to Django via HTTPS,
django.http.HttpRequest.scheme would incorrectly detect client requests
made via HTTP as using HTTPS. This entails incorrect results for is_secure(),
and build_absolute_uri(), and that HTTP requests would not be redirected to
HTTPS in accordance with SECURE_SSL_REDIRECT.
more... | py27-django111 py35-django111 py35-django21 py35-django22 py36-django111 py36-django21 py36-django22 py37-django111 py37-django21 py37-django22
more detail |
2019-06-30 | VuXML ID 4b6cb45d-881e-447a-a4e0-c97a954ea758
bzip2 developers reports:
CVE-2016-3189 - Fix use-after-free in bzip2recover (Jakub Martisko)
CVE-2019-12900 - Detect out-of-range nSelectors in corrupted files (Albert Astals Cid). Found through fuzzing karchive.
more... | bzip2
more detail |
2019-06-28 | VuXML ID 5e35cfba-9994-11e9-b07f-df5abf8b84d6
TYPO3 news:
Please read the corresponding Security Advisories for details.
more... | typo3-8-php71 typo3-8-php72 typo3-8-php73 typo3-9-php71 typo3-9-php72 typo3-9-php73
more detail |
2019-06-27 | VuXML ID 245629d4-991e-11e9-82aa-6cc21735f730
The PostgreSQL project reports:
An authenticated user could create a stack-based buffer overflow
by changing their own password to a purpose-crafted value. In addition
to the ability to crash the PostgreSQL server, this could be further
exploited to execute arbitrary code as the PostgreSQL operating system account.
Additionally, a rogue server could send a specifically crafted
message during the SCRAM authentication process and cause a libpq-enabled client
to either crash or execute arbitrary code as the client's operating system account.
This issue is fixed by upgrading and restarting your PostgreSQL
server as well as your libpq installations. All users running
PostgreSQL 10, 11, and 12 beta are encouraged to upgrade as soon as possible.
more... | postgresql10-server postgresql11-server
more detail |
2019-06-22 | VuXML ID 6f15730d-94ea-11e9-a83e-641c67a117d8
Mitre reports:
Modules.cpp in ZNC before 1.7.4-rc1 allows remote authenticated
non-admin users to escalate privileges and execute arbitrary
code by loading a module with a crafted name.
more... | znc
more detail |
2019-06-21 | VuXML ID 1c21f6a3-9415-11e9-95ec-6805ca2fa271
PowerDNS Team reports:
CVE-2019-10162: An issue has been found in PowerDNS Authoritative Server allowing an authorized user to
cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The
issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while
looking up the NS/A/AAAA records it is about to use for an outgoing notify.
CVE-2019-10163: An issue has been found in PowerDNS Authoritative Server allowing a remote, authorized
master server to cause a high CPU load or even prevent any further updates to any slave zone by sending
a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.
more... | powerdns
more detail |
2019-06-21 | VuXML ID 49beb00f-a6e1-4a42-93df-9cb14b4c2bee
Mozilla Foundation reports:
CVE-2019-11707: Type confusion in Array.pop
A type confusion vulnerability can occur when manipulating
JavaScript objects due to issues in Array.pop. This can allow
for an exploitable crash. We are aware of targeted attacks in
the wild abusing this flaw.
CVE-2019-11708: sandbox escape using Prompt:Open
Insufficient vetting of parameters passed with the
Prompt:Open IPC message between child and parent processes can
result in the non-sandboxed parent process opening web content
chosen by a compromised child process. When combined with
additional vulnerabilities this could result in executing
arbitrary code on the user's computer.
more... | thunderbird
more detail |
2019-06-21 | VuXML ID 98f1241f-8c09-4237-ad0d-67fb4158ea7a
Mozilla Foundation reports:
CVE-2019-11703: Heap buffer overflow in icalparser.c
A flaw in Thunderbird's implementation of iCal causes a heap
buffer overflow in parser_get_next_char when processing certain
email messages, resulting in a potentially exploitable crash.
CVE-2019-11704: Heap buffer overflow in icalvalue.c
A flaw in Thunderbird's implementation of iCal causes a heap
buffer overflow in icalmemory_strdup_and_dequote when processing
certain email messages, resulting in a potentially exploitable
crash.
CVE-2019-11705: Stack buffer overflow in icalrecur.c
A flaw in Thunderbird's implementation of iCal causes a stack
buffer overflow in icalrecur_add_bydayrules when processing
certain email messages, resulting in a potentially exploitable
crash.
CVE-2019-11706: Type confusion in icalproperty.c
A flaw in Thunderbird's implementation of iCal causes a type
confusion in icaltimezone_get_vtimezone_properties when
processing certain email messages, resulting in a crash.
more... | thunderbird
more detail |
2019-06-20* | VuXML ID 0cea6e0a-7a39-4dac-b3ec-dbc13d404f76
Mozilla Foundation reports:
CVE-2019-11707: Type confusion in Array.pop
A type confusion vulnerability can occur when
manipulating JavaScript objects due to issues in
Array.pop. This can allow for an exploitable crash. We are
aware of targeted attacks in the wild abusing this flaw.
more... | firefox firefox-esr waterfox
more detail |
2019-06-20 | VuXML ID 5b218581-9372-11e9-8fc4-5404a68ad561
The VLC project reports:
mkv: Fix potential double free
more... | vlc
more detail |
2019-06-20 | VuXML ID f2144530-936f-11e9-8fc4-5404a68ad561
zhangyang reports:
The ReadFrame function in the avi.c file uses a variable i_width_bytes,
which is obtained directly from the file. It is a signed integer.
It does not do a strict check before the memory operation(memmove, memcpy),
which may cause a buffer overflow.
more... | vlc
more detail |
2019-06-17* | VuXML ID 183d700e-ec70-487e-a9c4-632324afa934
cvedetails.com reports:
CVE-2019-7175: In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.
CVE-2019-7395: In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.
CVE-2019-7396: In ImageMagick before 7.0.8-25, a memory leak exists in ReadSIXELImage in coders/sixel.c.
CVE-2019-7397: In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.
CVE-2019-7398: In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c.
CVE-2019-9956: In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file.
CVE-2019-10131: An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.
CVE-2019-10649: In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file.
CVE-2019-10650: In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file.
CVE-2019-10714: LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV.
CVE-2019-11470: The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
CVE-2019-11472: ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
CVE-2019-11597: In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
CVE-2019-11598: In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.
more... | ImageMagick6 ImageMagick6-nox11 ImageMagick7 ImageMagick7-nox11
more detail |
2019-06-16 | VuXML ID 82c07dfa-9016-11e9-af2f-712c38aa3e4c
GraphicsMagick News:
Read "Security Fixes:" section for details.
more... | GraphicsMagick
more detail |
2019-06-16 | VuXML ID 9c9023ff-9057-11e9-b764-00505632d232
NIST reports:
Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.
more... | netatalk3
more detail |
2019-06-15 | VuXML ID d4fc4599-8f75-11e9-8d9f-3065ec8fd3ec
Google Chrome Releases reports:
[961413] High CVE-2019-5842: Use-after-free in Blink. Reported by BUGFENSE Anonymous Bug Bounties https://bugfense.io on 2019-05-09
more... | chromium
more detail |
2019-06-13 | VuXML ID a5681027-8e03-11e9-85f4-6805ca0b3d42
The phpMyAdmin development team reports:
Summary
CSRF vulnerability in login form
Description
A vulnerability was found that allows an attacker to
trigger a CSRF attack against a phpMyAdmin user. The
attacker can trick the user, for instance through a broken
![]() tag pointing at the victim's
phpMyAdmin database, and the attacker can potentially
deliver a payload (such as a specific INSERT or DELETE
statement) through the victim.
Severity
We consider this vulnerability to be severe.
Mitigation factor Only the 'cookie'
auth_type is affected; users can temporary use
phpMyAdmin's http authentication as a workaround.
more... | phpMyAdmin phpMyAdmin-php56 phpMyAdmin-php70 phpMyAdmin-php71 phpMyAdmin-php72
more detail |
2019-06-13 | VuXML ID bbdb9713-8e09-11e9-87bc-002590acae31
Security releases for Vim/NeoVim:
Sandbox escape allows for arbitrary code execution.
more... | neovim vim vim-console vim-tiny
more detail |
2019-06-12 | VuXML ID 13960f55-8d35-11e9-9ba0-4c72b94353b5
mybb Team reports:
High risk: Theme import stylesheet name RCE
High risk: Nested video MyCode persistent XSS
Medium risk: Find Orphaned Attachments reflected XSS
Medium risk: Post edit reflected XSS
Medium risk: Private Messaging folders SQL injection
Low risk: Potential phar deserialization through Upload Path
more... | mybb
more detail |
2019-06-11 | VuXML ID ab099d2c-8c8c-11e9-8ba7-6451062f0f7a
Adobe reports:
- This update resolves a use-after-free vulnerability that
could lead to arbitrary code execution (CVE-2019-7845).
more... | linux-flashplayer
more detail |
2019-06-08 | VuXML ID 9b8a52fc-89c1-11e9-9ba0-4c72b94353b5
Drupal Security Team reports:
CVE-2019-11831: By-passing protection of Phar Stream Wrapper Interceptor.
In order to intercept file invocations like file_exists or stat on compromised Phar archives
the base name has to be determined and checked before allowing to be handled by PHP
Phar stream handling.
The current implementation is vulnerable to path traversal leading to scenarios where the
Phar archive to be assessed is not the actual (compromised) file.
more... | drupal7 drupal8
more detail |
2019-06-06 | VuXML ID 45bea6b5-8855-11e9-8d41-97657151f8c2
Exim team and Qualys report:
We received a report of a possible remote exploit. Currently there is no evidence of an active use of this exploit.
A patch exists already, is being tested, and backported to all
versions we released since (and including) 4.87.
The severity depends on your configuration. It depends on how close to
the standard configuration your Exim runtime configuration is. The
closer the better.
Exim 4.92 is not vulnerable.
more... | exim
more detail |
2019-06-06 | VuXML ID ffc73e87-87f0-11e9-ad56-fcaa147e860e
Django security releases issued:
The clickable "Current URL" link generated by AdminURLFieldWidget displayed the
provided value without validating it as a safe URL. Thus, an unvalidated value stored
in the database, or a value provided as a URL query parameter payload, could result
in an clickable JavaScript link..
jQuery before 3.4.0, mishandles jQuery.extend(true, {}, ...) because of Object.prototype
pollution. If an unsanitized source object contained an enumerable __proto__ property,
it could extend the native Object.prototype.
more... | py27-django111 py35-django111 py35-django21 py35-django22 py36-django111 py36-django21 py36-django22 py37-django111 py37-django21 py37-django22
more detail |
2019-06-03 | VuXML ID 4091069e-860b-11e9-a05f-001b217b3468
Gitlab reports:
Remote Command Execution Vulnerability on Repository Download Feature
Confidential Issue Titles Revealed to Restricted Users on Unsubscribe
Disclosure of Milestone Metadata through the Search API
Private Project Discovery via Comment Links
Metadata of Confidential Issues Disclosed to Restricted Users
Mandatory External Authentication Provider Sign-In Restrictions Bypass
Internal Projects Allowed to Be Created on in Private Groups
Server-Side Request Forgery Through DNS Rebinding
Stored Cross-Site Scripting on Wiki Pages
Stored Cross-Site Scripting on Notes
Repository Password Disclosed on Import Error Page
Protected Branches Restriction Rules Bypass
Stored Cross-Site Scripting Vulnerability on Child Epics
more... | gitlab-ce
more detail |
2019-06-01 | VuXML ID ada8db8a-8471-11e9-8170-0050562a4d7b
Buildbot accepted user-submitted authorization token from OAuth and used
it to authenticate user.
The vulnerability can lead to malicious attackers to authenticate as legitimate users
of a Buildbot instance without knowledge of the victim's login credentials on certain
scenarios.
If an attacker has an application authorized to access data of another user at the
same Identity Provider as the used by the Buildbot instance, then he can acquire a token
to access the data of that user, supply the token to the Buildbot instance and successfully
login as the victim.
more... | py27-buildbot py35-buildbot py36-buildbot py37-buildbot
more detail |
2019-05-31 | VuXML ID 177fa455-48fc-4ded-ba1b-9975caa7f62a
Jon Siwek of Corelight reports:
The following Denial of Service vulnerabilities are addressed:
- Integer type mismatches in BinPAC-generated parser code
and Bro analyzer code may allow for crafted packet data
to cause unintentional code paths in the analysis logic
to be taken due to unsafe integer conversions causing the
parser and analysis logic to each expect different fields
to have been parsed. One such example, reported by Maksim
Shudrak, causes the Kerberos analyzer to dereference a
null pointer. CVE-2019-12175 was assigned for this issue.
- The Kerberos parser allows for several fields to be left
uninitialized, but they were not marked with an &optional
attribute and several usages lacked existence checks.
Crafted packet data could potentially cause an attempt
to access such uninitialized fields, generate a runtime
error/exception, and leak memory. Existence checks and
&optional attributes have been added to the relevent
Kerberos fields.
- BinPAC-generated protocol parsers commonly contain fields
whose length is derived from other packet input, and for
those that allow for incremental parsing, BinPAC did not
impose a limit on how large such a field could grow,
allowing for remotely-controlled packet data to cause
growth of BinPAC's flowbuffer bounded only by the numeric
limit of an unsigned 64-bit integer, leading to memory
exhaustion. There is now a generalized limit for how
large flowbuffers are allowed to grow, tunable by setting
"BinPAC::flowbuffer_capacity_max".
more... | bro
more detail |
2019-05-27 | VuXML ID 10fd731c-8088-11e9-b6ae-001871ec5271
Cyrus IMAP 3.0.10 Release Notes states:
Fixed CVE-2019-11356: buffer overrun in httpd
more... | cyrus-imapd25 cyrus-imapd30
more detail |
2019-05-26 | VuXML ID 36b905ad-7fbb-11e9-8a5f-c85b76ce9b5a
MITRE reports:
An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.
more... | sqlite3
more detail |
2019-05-26* | VuXML ID 3b903bf3-7f94-11e9-8a5f-c85b76ce9b5a
Mitre reports:
An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.
more... | suricata
more detail |
2019-05-26 | VuXML ID 3ba87032-7fbd-11e9-8a5f-c85b76ce9b5a
MITRE:
Serendipity before 2.1.5 has XSS via EXIF data that is mishandled in the templates/2k11/admin/media_choose.tpl Editor Preview feature or the templates/2k11/admin/media_items.tpl Media Library feature.
more... | serendipity
more detail |
2019-05-26* | VuXML ID 8d2af843-7d8e-11e9-8464-c85b76ce9b5a
MITRE reports:
OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
more... | ocaml
more detail |
2019-05-26* | VuXML ID a64aa22f-61ec-11e9-85b9-a4badb296695
Aki Tuomi reports:
* CVE-2019-10691: Trying to login with 8bit username containing
invalid UTF8 input causes auth process to crash if auth policy is
enabled. This could be used rather easily to cause a DoS. Similar
crash also happens during mail delivery when using invalid UTF8 in
From or Subject header when OX push notification driver is used.
more... | dovecot dovecot2
more detail |
2019-05-26* | VuXML ID dd343a2b-7ee7-11e9-a290-8ddc52868fa9
curl security problems:
CVE-2019-5435: Integer overflows in curl_url_set()
libcurl contains two integer overflows in the curl_url_set()
function that if triggered, can lead to a too small buffer
allocation and a subsequent heap buffer overflow.
The flaws only exist on 32 bit architectures and require
excessive string input lengths.
CVE-2019-5436: TFTP receive buffer overflow
libcurl contains a heap buffer overflow in the function
(tftp_receive_packet()) that recevives data from a TFTP server. It
calls recvfrom() with the default size for the buffer rather than
with the size that was used to allocate it. Thus, the content that
might overwrite the heap memory is entirely controlled by the server.
The flaw exists if the user selects to use a "blksize" of 504 or
smaller (default is 512). The smaller size that is used, the larger
the possible overflow becomes.
Users chosing a smaller size than default should be rare as the
primary use case for changing the size is to make it larger.
It is rare for users to use TFTP across the Internet. It is most
commonly used within local networks.
more... | curl
more detail |
2019-05-15 | VuXML ID 37528379-76a8-11e9-a4fd-00012e582166
Sean McArthur reports:
The Rust Programming Language Standard Library 1.34.x
before 1.34.2 contains a stabilized method which, if
overridden, can violate Rust's safety guarantees and
cause memory unsafety. If the Error::type_id method
is overridden then any type can be safely cast to any
other type, causing memory safety vulnerabilities in
safe code (e.g., out-of-bounds write or read). Code
that does not manually implement Error::type_id is
unaffected.
more... | rust
more detail |
2019-05-14 | VuXML ID 793a0072-7822-11e9-81e2-005056a311d1
The samba project reports:
The checksum validation in the S4U2Self handler in the embedded Heimdal KDC
did not first confirm that the checksum was keyed, allowing replacement of the
requested target (client) principal
Authenticated users with write permission can trigger a symlink traversal to write
or detect files outside the Samba share.
more... | samba410 samba46 samba47 samba48 samba49
more detail |
2019-05-14 | VuXML ID a99923a9-768c-11e9-885a-6451062f0f7a
Adobe reports:
- This update resolves a use-after-free vulnerability that
could lead to arbitrary code execution (CVE-2019-7837).
more... | linux-flashplayer
more detail |
2019-05-11 | VuXML ID c2d1693b-73cb-11e9-a1c7-b499baebfeaf
The PHP project reports:
Heap-buffer-overflow in php_ifd_get32s (CVE-2019-11034)
Heap-buffer-overflow in exif_iif_add_value (CVE-2019-11035)
more... | php71-exif php72-exif php73-exif
more detail |
2019-05-09 | VuXML ID 065890c3-725e-11e9-b0e1-6cc21735f730
The PostgreSQL project reports:
PostgreSQL maintains statistics for tables by sampling
data available in columns; this data is consulted during
the query planning process. Prior to this release, a user
able to execute SQL queries with permissions to read a
given column could craft a leaky operator that could
read whatever data had been sampled from that column.
If this happened to include values from rows that the user
is forbidden to see by a row security policy, the user
could effectively bypass the policy. This is fixed by only
allowing a non-leakproof operator to use this data if
there are no relevant row security policies for the table.
more... | postgresql10-server postgresql11-server postgresql95-server postgresql96-server
more detail |
2019-05-09 | VuXML ID e66a5440-7258-11e9-b0e1-6cc21735f730
The PostgreSQL project reports:
Prior to this release, a user running PostgreSQL 11 can read
arbitrary bytes of server memory by executing a purpose-crafted
INSERT statement to a partitioned table.
more... | postgresql11-server
more detail |
2019-05-06 | VuXML ID a1de4ae9-6fda-11e9-9ba0-4c72b94353b5
Gitea Team reports:
This release contains two new security fixes which cannot be backported
to the 1.7.0 branch, so it is recommended to update to this version.
more... | gitea
more detail |
2019-05-05 | VuXML ID 3df5a920-6edc-11e9-a44b-0050562a4d7b
A malicious sender that sets both JPEG and MH,MR,MMR or JBIG in
the same DCS signal or sends a large JPEG page could lead to remote code execution.
more... | hylafax
more detail |
2019-05-01 | VuXML ID 4faac805-6be0-11e9-a685-001b217b3468
Gitlab reports:
Information Disclosure with Limited Scope Token
more... | gitlab-ce
more detail |
2019-04-30 | VuXML ID 3f98ccb3-6b8a-11e9-9b5c-a4badb296695
Aki Tuomi reports:
Submission-login crashes with signal 11 due to null pointer access when authentication is aborted by disconnecting. This can lead to denial-of-service attack by persistent attacker(s).
Aki Tuomi reports:
Submission-login crashes when authentication is started over TLS secured channel and invalid authentication message is sent. This can lead to denial-of-service attack by persistent attacker(s).
more... | dovecot
more detail |
2019-04-29 | VuXML ID 1138b39e-6abb-11e9-a685-001b217b3468
Gitlab reports:
Moving an Issue to Private Repo Leaks Project Namespace
Notification Emails Sent to Restricted Users
Unauthorized Comments on Confidential Issues
Merge Request Approval Count Inflation
Unsanitized Branch Names on New Merge Request Notification Emails
Improper Sanitation of Credentials in Gitaly
more... | gitlab-ce
more detail |
2019-04-26 | VuXML ID 5536ea5f-6814-11e9-a8f7-0050562a4d7b
A CRLF can be injected in Location header of /auth/login and /auth/logout
This is due to lack of input validation in the buildbot redirection code.
It was not found a way to impact Buildbot product own security through
this vulnerability, but it could be used to compromise other sites
hosted on the same domain as Buildbot.
- cookie injection a master domain (ie if your buildbot is on
buildbot.buildbot.net, one can inject a cookie on *.buildbot.net,
which could impact another website hosted in your domain)
- HTTP response splitting and cache poisoning (browser or proxy) are
also typical impact of this vulnerability class, but might be impractical
to exploit.
more... | py27-buildbot py35-buildbot py36-buildbot py37-buildbot
more detail |
2019-04-25 | VuXML ID 2bad8b5d-66fb-11e9-9815-78acc0a3b880
Drupal Security Team reports:
CVE-2019-10909: Escape validation messages in the PHP templating engine.
CVE-2019-10910: Check service IDs are valid.
CVE-2019-10911: Add a separator in the remember me cookie hash.
jQuery 3.4.0 includes a fix for some unintended behavior when using
jQuery.extend(true, {}, ...). If an unsanitized source object contained
an enumerable __proto__ property, it could extend the native Object.prototype.
This fix is included in jQuery 3.4.0, but patch diffs exist to patch previous
jQuery versions.
It's possible that this vulnerability is exploitable with some Drupal modules.
As a precaution, this Drupal security release backports the fix to jQuery.extend(),
without making any other changes to the jQuery version that is included in
Drupal core (3.2.1 for Drupal 8 and 1.4.4 for Drupal 7) or running on the site
via some other module such as jQuery Update.
more... | drupal7 drupal8
more detail |
2019-04-23 | VuXML ID 60129efe-656d-11e9-8e67-206a8a720317
Problem Description:
Potential side channel attacks in the SAE implementations used
by both hostapd and wpa_supplicant (see CVE-2019-9494 and VU#871675).
EAP-pwd uses a similar design for deriving PWE from the password and
while a specific attack against EAP-pwd is not yet known to be tested,
there is no reason to believe that the EAP-pwd implementation would
be immune against the type of cache attack that was identified for the
SAE implementation. Since the EAP-pwd implementation in hostapd (EAP
server) and wpa_supplicant (EAP peer) does not support MODP groups,
the timing attack described against SAE is not applicable for the
EAP-pwd implementation.
See
https://w1.fi/security/2019-2/eap-pwd-side-channel-attack.txt
for a detailed description of the bug.
Impact:
All wpa_supplicant and hostapd versions with EAP-pwd support
(CONFIG_EAP_PWD=y in the build configuration and EAP-pwd being enabled
in the runtime configuration).
more... | FreeBSD hostapd wpa_supplicant
more detail |
2019-04-23 | VuXML ID 7e53f9cc-656d-11e9-8e67-206a8a720317
Problem Description:
Side channel attacks in the SAE implementations used by both
hostapd (AP) and wpa_supplicant (infrastructure BSS station/mesh
station). SAE (Simultaneous Authentication of Equals) is also known
as WPA3-Personal. The discovered side channel attacks may be able to
leak information about the used password based on observable timing
differences and cache access patterns. This might result in full
password recovery when combined with an offline dictionary attack and
if the password is not strong enough to protect against dictionary
attacks.
See
https://w1.fi/security/2019-1/sae-side-channel-attacks.txt
for a detailed description of the bug.
Impact:
All wpa_supplicant and hostapd versions with SAE support
(CONFIG_SAE=y in the build configuration and SAE being enabled in
the runtime configuration).
more... | FreeBSD hostapd wpa_supplicant
more detail |
2019-04-23 | VuXML ID 98b71436-656d-11e9-8e67-206a8a720317
Problem Description:
When hostapd is used to operate an access point with SAE
(Simultaneous Authentication of Equals; also known as WPA3-Personal),
an invalid authentication sequence could result in the hostapd process
terminating due to a NULL pointer dereference when processing SAE
confirm message. This was caused by missing state validation steps
when processing the SAE confirm message in hostapd/AP mode.
See
https://w1.fi/security/2019-3/sae-confirm-missing-state-validation.txt
for a detailed description of the bug.
Impact:
All hostapd versions with SAE support (CONFIG_SAE=y in the build
configuration and SAE being enabled in the runtime configuration).
more... | FreeBSD hostapd wpa_supplicant
more detail |
2019-04-23 | VuXML ID a207bbd8-6572-11e9-8e67-206a8a720317
Problem Description:
EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant
(EAP peer) does not to validate fragmentation reassembly state
properly for a case where an unexpected fragment could be received.
This could result in process termination due to NULL pointer
dereference.
See
https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt
for a detailed description of the bug.
Impact:
All wpa_supplicant and hostapd versions with EAP-pwd support could
suffer a denial of service attack through process termination.
more... | FreeBSD hostapd wpa_supplicant
more detail |
2019-04-23 | VuXML ID f6ea18bb-65b9-11e9-8b31-002590045d9c
pyyaml reports:
the PyYAML.load function could be easily exploited to call any Python
function. That means it could call any system command using os.system()
more... | py27-yaml py35-yaml py36-yaml py37-yaml
more detail |
2019-04-22 | VuXML ID 484d3f5e-653a-11e9-b0e3-1c39475b9f84
Istio reports:
Two security vulnerabilities have recently been identified in the Envoy proxy.
The vulnerabilities are centered on the fact that Envoy did not normalize
HTTP URI paths and did not fully validate HTTP/1.1 header values. These
vulnerabilities impact Istio features that rely on Envoy to enforce any of
authorization, routing, or rate limiting.
more... | istio
more detail |
2019-04-21 | VuXML ID 5ed7102e-6454-11e9-9a3a-001cc0382b2f
Cedric Buissart (Red Hat) reports:
It was found that the superexec operator was available in the
internal dictionary in ghostscript before 9.27. A specially crafted
PostScript file could use this flaw in order to, for example, have
access to the file system outside of the constrains imposed by
-dSAFER.
It was found that the forceput operator could be extracted from
the DefineResource method in ghostscript before 9.27. A specially
crafted PostScript file could use this flaw in order to, for
example, have access to the file system outside of the constrains
imposed by -dSAFER.
more... | ghostscript9-agpl-base ghostscript9-agpl-x11
more detail |
2019-04-19 | VuXML ID fb30db8f-62af-11e9-b0de-001cc0382b2f
The GnuTLS project reports:
- Tavis Ormandy from Google Project Zero found a memory
corruption (double free) vulnerability in the certificate
verification API. Any client or server application that verifies
X.509 certificates with GnuTLS 3.5.8 or later is affected.
- It was found using the TLS fuzzer tools that decoding a
malformed TLS1.3 asynchronous message can cause a server crash
via an invalid pointer access. The issue affects GnuTLS server
applications since 3.6.4.
more... | gnutls
more detail |
2019-04-17 | VuXML ID b747783f-5fb6-11e9-b2ac-08002705f877
The Gitea team reports:
Prevent remote code execution vulnerability with mirror repo URL settings.
more... | gitea
more detail |
2019-04-13 | VuXML ID 4e1997e8-5de0-11e9-b95c-b499baebfeaf
Oracle reports:
Critical Patch Update Oracle MySQL Executive Summary
This Critical Patch Update contains 44 new security fixes for
Oracle MySQL. 3 of these vulnerabilities may be remotely exploitable
without authentication, i.e., may be exploited over a network without
requiring user credentials.
The Oracle MySQL products and versions affected by vulnerabilities
that are fixed in this Critical Patch Update are: MySQL Server, versions
5.6.43 and prior, 5.7.25 and prior, 8.0.15 and prior
Further details will be published by Oracle on 2019-04-16
more... | mariadb101-server mariadb102-server mariadb103-server mariadb55-server mysql56-server mysql57-server mysql80-server percona55-server percona56-server percona57-server
more detail |
2019-04-12 | VuXML ID a737eb11-5cfc-11e9-ab87-8cec4bf8fcfb
Gynvael Coldwind reports:
set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a
file's origin URL in the user.xdg.origin.url metadata attribute
of the extended attributes of the downloaded file, which allows
local users to obtain sensitive information (e.g., credentials
contained in the URL) by reading this attribute, as demonstrated
by getfattr. This also applies to Referer information in the
user.xdg.referrer.url metadata attribute.
more... | wget
more detail |
2019-04-11 | VuXML ID a0602fa0-5c1c-11e9-abd6-001b217b3468
Gitlab reports:
Group Runner Registration Token Exposure
more... | gitlab-ce
more detail |
2019-04-10 | VuXML ID 45d89773-5b64-11e9-80ed-d43d7ef03aa6
Adobe reports:
- This update resolves a use-after-free vulnerability that
could lead to arbitrary code execution (CVE-2019-7096).
- This update resolves an out-of-bounds read vulnerability that
could lead to information disclosure (CVE-2019-7108).
more... | linux-flashplayer
more detail |
2019-04-10 | VuXML ID 8e9c3f5a-715b-4336-8d05-19babef55e9e
Jenkins Security Advisory:
Description
(Medium) SECURITY-1289
Jenkins accepted cached legacy CLI authentication
(Medium) SECURITY-1327
XSS vulnerability in form validation button
more... | jenkins jenkins-lts
more detail |
2019-04-06* | VuXML ID fe7e322f-522d-11e9-98b5-216e512dad89
Jupyter blog:
Login pages tend to take a parameter for redirecting back to a page
after successful login, e.g. /login?next=/notebooks/mynotebook.ipynb, so
that you aren't disrupted too much if you try to visit a page, but have
to authenticate first. An Open Redirect Vulnerability is when a
malicious person crafts a link pointing to the login page of a trusted
site, but setting the "redirect after successful login" parameter to
send the user to their own site, instead of a page on the authenticated
site (the notebook or JupyterHub server), e.g.
/login?next=http://badwebsite.biz. This doesn't necessarily compromise
anything immediately, but it enables phishing if users don't notice
that the domain has changed, e.g. by showing a fake "re-enter your
password" page. Servers generally have to validate the redirect URL to
avoid this. Both JupyterHub and Notebook already do this, but the
validation didn't take into account all possible ways to redirect to
other sites, so some malicious URLs could still be crafted to redirect
away from the server (the above example does not work in any recent
version of either package). Only certain browsers (Chrome and Firefox,
not Safari) could be redirected from the JupyterHub login page, but all
browsers could be redirected away from a standalone notebook server.
more... | py27-notebook py35-notebook py36-notebook py37-notebook
more detail |
2019-04-05 | VuXML ID 84ce26c3-5769-11e9-abd6-001b217b3468
Clamav reports:
An out-of-bounds heap read condition may occur when scanning PDF documents
An out-of-bounds heap read condition may occur when scanning PE files
An out-of-bounds heap write condition may occur when scanning OLE2 files
An out-of-bounds heap read condition may occur when scanning malformed PDF documents
A path-traversal write condition may occur as a result of improper input validation when scanning RAR archives
A use-after-free condition may occur as a result of improper error handling when scanning nested RAR archives
more... | clamav
more detail |
2019-04-02 | VuXML ID cf2105c6-551b-11e9-b95c-b499baebfeaf
The Apache httpd Project reports:
Apache HTTP Server privilege escalation from modules' scripts
(CVE-2019-0211) (important)
mod_auth_digest access control bypass (CVE-2019-0217)
(important)
mod_ssl access control bypass (CVE-2019-0215) (important)
mod_http2, possible crash on late upgrade (CVE-2019-0197) (low)
mod_http2, read-after-free on a string compare (CVE-2019-0196)
(low)
Apache httpd URL normalization inconsistincy (CVE-2019-0220)
(low)
more... | apache24
more detail |
2019-04-02 | VuXML ID da459dbc-5586-11e9-abd6-001b217b3468
Gitlab reports:
DoS potential for regex in CI/CD refs
Related branches visible in issues for guests
Persistent XSS at merge request resolve conflicts
Improper authorization control "move issue"
Guest users of private projects have access to releases
DoS potential on project languages page
Recurity assessment: information exposure through timing discrepancy
Recurity assessment: loginState HMAC issues
Recurity assessment: open redirect
PDF.js vulnerable to CVE-2018-5158
IDOR labels of private projects/groups
EXIF geolocation data not stripped from uploaded images
more... | gitlab-ce
more detail |
2019-04-01 | VuXML ID 6a0129bf-54ad-11e9-987c-1c39475b9f84
Kubernetes.io reports:
A security issue was discovered with the Kubernetes kubectl cp
command that could enable a directory traversal replacing or
deleting files on a user?s workstation.
more... | kubectl
more detail |
2019-03-31 | VuXML ID b22d6d4c-53b9-11e9-9310-28d244aee256
Mitre reports:
ZNC before 1.7.3-rc1 allows an existing remote user to cause a Denial
of Service (crash) via invalid encoding.
more... | znc
more detail |
2019-03-29* | VuXML ID 5efd7a93-2dfb-11e9-9549-e980e869c2e9
NVD reports:
In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the
opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could
leverage this vulnerability to cause a denial of service via a crafted
bmp file.
more... | openjpeg
more detail |
2019-03-28 | VuXML ID 7862213c-5152-11e9-8b26-a4badb296695
Aki Tuomi reports:
Vulnerability Details:
When reading FTS or POP3-UIDL header from dovecot index, the input
buffer size is not bound, and data is copied to target structure causing
stack overflow.
Risk:
This can be used for local root privilege escalation or executing
arbitrary code in dovecot process context. This requires ability to
directly modify dovecot indexes.
Steps to reproduce:
Produce dovecot.index.log entry that creates an FTS header which has
more than 12 bytes of data.
Trigger dovecot indexer-worker or run doveadm index.
Dovecot will crash.
Mitigations:
Since 2.3.0 dovecot has been compiled with stack smash protection, ASLR,
read-only GOT tables and other techniques that make exploiting this bug
much harder.
more... | dovecot
more detail |
2019-03-28* | VuXML ID 94d63fd7-508b-11e9-9ba0-4c72b94353b5
Drupal Security Team reports:
Under certain circumstances the File module/subsystem allows a malicious
user to upload a file that can trigger a cross-site scripting (XSS) vulnerability.
more... | drupal7 drupal8
more detail |
2019-03-27* | VuXML ID d74371d2-4fee-11e9-a5cd-1df8a848de3d
Python Changelog:
bpo-35746: [CVE-2019-5010] Fix a NULL pointer deref in ssl module. The
cert parser did not handle CRL distribution points with empty DP or URI
correctly. A malicious or buggy certificate can result into segfault.
Vulnerability (TALOS-2018-0758) reported by Colin Read and Nicolas Edet
of Cisco.
more... | python27 python35 python36 python37
more detail |
2019-03-22* | VuXML ID 1b6a10e9-4b7b-11e9-9e89-54e1ad3d6335
The freedesktop and x.org project reports:
It was discovered that libXdmcp before 1.1.3 used weak
entropy to generate session keys on platforms without
arc4random_buf() but with getentropy(). On a multi-user system using
xdmcp, a local attacker could potentially use information available
from the process list to brute force the key, allowing them to
hijack other users' sessions.
Please note, that since FreeBSD provides arc4random_buf(), it is
unknown if FreeBSD is affected by this vulnerability
more... | libXdmcp
more detail |
2019-03-21 | VuXML ID 15ee0e93-4bbb-11e9-9ba0-4c72b94353b5
wordpress developers reports:
Hosts can now offer a button for their users to update PHP.
The recommended PHP version used by the Update PHP notice can now be filtered.
more... | de-wordpress fr-wordpress ja-wordpress ru-wordpress wordpress zh_CN-wordpress zh_TW-wordpress
more detail |
2019-03-21 | VuXML ID e0382fde-4bb0-11e9-adcb-001b217b3468
Gitlab reports:
Project Runner Token Exposed Through Issues Quick Actions
more... | gitlab-ce
more detail |
2019-03-20 | VuXML ID 7ba5a3d0-4b18-11e9-adcb-001b217b3468
Gitlab reports:
Public project in a private group makes the group page publicly accessible
more... | gitlab-ce
more detail |
2019-03-20 | VuXML ID a8ba7358-4b02-11e9-9ba0-4c72b94353b5
Gitea Team reports:
Fix potential XSS vulnerability in repository description.
more... | gitea
more detail |
2019-03-19 | VuXML ID 6001cfc6-9f0f-4fae-9b4f-9b8fae001425
PowerDNS developers report:
An issue has been found in PowerDNS Authoritative Server when the HTTP remote backend is used in RESTful mode (without post=1 set), allowing a remote user to cause the HTTP backend to connect to an attacker-specified host instead of the configured one, via a crafted DNS query. This can be used to cause a denial of service by preventing the remote backend from getting a response, content spoofing if the attacker can time its own query so that subsequent queries will use an attacker-controlled HTTP server instead of the configured one, and possibly information disclosure if the Authoritative Server has access to internal servers.
more... | powerdns
more detail |
2019-03-18 | VuXML ID 1396a74a-4997-11e9-b5f1-83edb3f89ba1
Ruby on Rails blog:
Rails 4.2.11.1, 5.0.7.2, 5.1.6.2, 5.2.2.1, and 6.0.0.beta3 have been released! These contain the following important security fixes. It is recommended that users upgrade as soon as possible:
CVE-2019-5418 File Content Disclosure in Action View
CVE-2019-5419 Denial of Service Vulnerability in Action View
more... | rubygem-actionview4 rubygem-actionview5 rubygem-actionview50
more detail |
2019-03-17 | VuXML ID 46e1ece5-48bd-11e9-9c40-080027ac955c
The PuTTY team reports:
New in 0.71:
- Security fixes found by an EU-funded bug bounty programme:
- + a remotely triggerable memory overwrite in RSA key exchange, which can occur before host key verification
- + potential recycling of random numbers used in cryptography
- + on Unix, remotely triggerable buffer overflow in any kind of server-to-client forwarding
- + multiple denial-of-service attacks that can be triggered by writing to the terminal
- Other security enhancements: major rewrite of the crypto code to remove cache and timing side channels.
- User interface changes to protect against fake authentication prompts from a malicious server.
more... | putty putty-gtk2 putty-nogtk
more detail |
2019-03-16 | VuXML ID 72a6e3be-483a-11e9-92d7-f1590402501e
Jupyter notebook Changelog:
5.7.6 contains a security fix for a cross-site inclusion (XSSI)
vulnerability, where files at a known URL could be included in a page
from an unauthorized website if the user is logged into a Jupyter
server. The fix involves setting the X-Content-Type-Options: nosniff
header, and applying CSRF checks previously on all non-GET API requests
to GET requests to API endpoints and the /files/ endpoint.
The attacking page is able to access some contents of files when using
Internet Explorer through script errors, but this has not been
demonstrated with other browsers. A CVE has been requested for this
vulnerability.
more... | py27-notebook py35-notebook py36-notebook py37-notebook
more detail |
2019-03-15 | VuXML ID 27b12d04-4722-11e9-8b7c-b5e01141761f
RubyGems Security Advisories:
CVE-2019-8320: Delete directory using symlink when decompressing tar
CVE-2019-8321: Escape sequence injection vulnerability in 'verbose'
CVE-2019-8322: Escape sequence injection vulnerability in 'gem owner'
CVE-2019-8323: Escape sequence injection vulnerability in API response handling
CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution
CVE-2019-8325: Escape sequence injection vulnerability in errors
more... | ruby23-gems ruby24-gems ruby25-gems
more detail |
2019-03-07* | VuXML ID 7700061f-34f7-11e9-b95c-b499baebfeaf
The OpenSSL project reports:
0-byte record padding oracle (CVE-2019-1559) (Moderate)
If an application encounters a fatal protocol error and then calls
SSL_shutdown() twice (once to send a close_notify, and once to receive
one) then OpenSSL can respond differently to the calling application if
a 0 byte record is received with invalid padding compared to if a 0 byte
record is received with an invalid MAC. If the application then behaves
differently based on that in a way that is detectable to the remote peer,
then this amounts to a padding oracle that could be used to decrypt data.
more... | linux-c6-openssl openssl
more detail |
2019-03-07 | VuXML ID e56f2f7c-410e-11e9-b95c-b499baebfeaf
The OpenSSL project reports:
Low: ChaCha20-Poly1305 with long nonces (CVE-2019-1543)
ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce
input for every encryption operation. RFC 7539 specifies that the nonce
value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce
length and front pads the nonce with 0 bytes if it is less than 12 bytes.
However it also incorrectly allows a nonce to be set of up to 16 bytes.
In this case only the last 12 bytes are significant and any additional
leading bytes are ignored.
more... | openssl111
more detail |
2019-03-06 | VuXML ID 416ca0f4-3fe0-11e9-bbdd-6805ca0b3d42
BestPractical reports:
The version of jQuery used in RT 4.2 and 4.4 has a
Cross-site Scripting (XSS) vulnerability when using
cross-domain Ajax requests. This vulnerability is assigned
CVE-2015-9251. RT
does not use this jQuery feature so it is not directly
vulnerable. jQuery version 1.12 no longer receives official
updates, however a fix was posted with recommendations for
applications to patch locally, so RT will follow this
recommendation and ship with a patched version.
more... | rt42 rt44
more detail |
2019-03-06 | VuXML ID d193aa9f-3f8c-11e9-9a24-6805ca0b38e8
NVD reports:
rssh version 2.3.4 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in allowscp permission that can result in Local command execution. This attack appear to be exploitable via An authorized SSH user with the allowscp permission.
Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.
more... | rssh
more detail |
2019-03-05 | VuXML ID 11292460-3f2f-11e9-adcb-001b217b3468
Gitlab reports:
Arbitrary file read via MergeRequestDiff
CSRF add Kubernetes cluster integration
Blind SSRF in prometheus integration
Merge request information disclosure
IDOR milestone name information disclosure
Burndown chart information disclosure
Private merge request titles in public project information disclosure
Private namespace disclosure in email notification when issue is moved
Milestone name disclosure
Issue board name disclosure
NPM automatic package referencer
Path traversal snippet mover
Information disclosure repo existence
Issue DoS via Mermaid
Privilege escalation impersonate user
more... | gitlab-ce
more detail |
2019-03-05 | VuXML ID 526d9642-3ae7-11e9-a669-8c164582fbac
NVD reports:
slixmpp version before commit 7cd73b594e8122dddf847953fcfc85ab4d316416
contains an incorrect Access Control vulnerability in XEP-0223 plugin
(Persistent Storage of Private Data via PubSub) options profile, used
for the configuration of default access model that can result in
all of the contacts of the victim can see private data having been
published to a PEP node. This attack appears to be exploitable
if the user of this library publishes any private data on PEP,
the node isn't configured to be private. This vulnerability appears
to have been fixed in commit 7cd73b594e8122dddf847953fcfc85ab4d316416
which is included in slixmpp 1.4.2.
more... | py35-slixmpp py36-slixmpp py37-slixmpp
more detail |
2019-03-05 | VuXML ID a3e24de7-3f0c-11e9-87d1-00012e582166
Everardo reports:
gunicorn version 19.4.5 contains a CWE-113: Improper
Neutralization of CRLF Sequences in HTTP Headers vulnerability
in process_headers function in gunicorn/http/wsgi.py
that can result in an attacker causing the server to
return arbitrary HTTP headers.
more... | py27-gunicorn py35-gunicorn py36-gunicorn py37-gunicorn
more detail |
2019-03-04* | VuXML ID 395ed9d5-3cca-11e9-9ba0-4c72b94353b5
mybb Team reports:
Medium risk: Reset Password reflected XSS
Medium risk: ModCP Profile Editor username reflected XSS
Low risk: Predictable CSRF token for guest users
Low risk: ACP Stylesheet Properties XSS
Low risk: Reset Password username enumeration via email
more... | mybb
more detail |
2019-03-03 | VuXML ID b71d7193-3c54-11e9-a3f9-00155d006b02
Node.js reports:
Updates are now available for all active Node.js release lines. In addition to fixes for security flaws in Node.js, they also include upgrades of Node.js 6 and 8 to OpenSSL 1.0.2r which contains a fix for a moderate severity security vulnerability.
For these releases, we have decided to withhold the fix for the Misinterpretation of Input (CWE-115) flaw mentioned in the original announcement. This flaw is very low severity and we are not satisfied that we had a complete and stable fix ready for release. We will be seeking to address this flaw via alternate mechanisms in the near future. In addition, we have introduced an additional CVE for a change in Node.js 6 that we have decided to classify as a Denial of Service (CWE-400) flaw.
We recommend that all Node.js users upgrade to a version listed below as soon as possible.
OpenSSL: 0-byte record padding oracle (CVE-2019-1559)
OpenSSL 1.0.2r contains a fix for CVE-2019-1559 and is included in the releases for Node.js versions 6 and 8 only. Node.js 10 and 11 are not impacted by this vulnerability as they use newer versions of OpenSSL which do not contain the flaw.
Under certain circumstances, a TLS server can be forced to respond differently to a client if a zero-byte record is received with an invalid padding compared to a zero-byte record with an invalid MAC. This can be used as the basis of a padding oracle attack to decrypt data.
Only TLS connections using certain ciphersuites executing under certain conditions are exploitable. We are currently unable to determine whether the use of OpenSSL in Node.js exposes this vulnerability. We are taking a cautionary approach and recommend the same for users. For more information, see the advisory and a detailed write-up by the reporters of the vulnerability.
more... | node node10 node6 node8
more detail |
2019-03-01 | VuXML ID be0e3817-3bfe-11e9-9cd6-001999f8d30b
The Asterisk project reports:
When Asterisk makes an outgoing call, a very specific
SDP protocol violation by the remote party can cause
Asterisk to crash.
more... | asterisk15 asterisk16
more detail |
2019-02-24 | VuXML ID e3aacd6d-3d01-434c-9330-bc9efd40350f
The Webkitgtk project reports:
CVE-2019-6212 - Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling.
CVE-2019-6215 - Processing maliciously crafted web content may lead to arbitrary code execution. A type confusion issue was addressed with improved memory handling.
CVE-2019-6216 - Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling.
CVE-2019-6217 - Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling.
CVE-2019-6226 - Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling.
CVE-2019-6227 - Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling.
CVE-2019-6229 - Processing maliciously crafted web content may lead to universal cross site scripting. A logic issue was addressed with improved validation.
CVE-2019-6233 - Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling.
CVE-2019-6234 - Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling.
more... | webkit-gtk2 webkit-gtk3 webkit2-gtk3
more detail |
2019-02-22 | VuXML ID 3e2c9b63-223c-4575-af5c-816acb14e445
- Fix memory corruption in process_bitmap_data - CVE-2018-8794
- Fix remote code execution in process_bitmap_data - CVE-2018-8795
- Fix remote code execution in process_plane - CVE-2018-8797
- Fix Denial of Service in mcs_recv_connect_response - CVE-2018-20175
- Fix Denial of Service in mcs_parse_domain_params - CVE-2018-20175
- Fix Denial of Service in sec_parse_crypt_info - CVE-2018-20176
- Fix Denial of Service in sec_recv - CVE-2018-20176
- Fix minor information leak in rdpdr_process - CVE-2018-8791
- Fix Denial of Service in cssp_read_tsrequest - CVE-2018-8792
- Fix remote code execution in cssp_read_tsrequest - CVE-2018-8793
- Fix Denial of Service in process_bitmap_data - CVE-2018-8796
- Fix minor information leak in rdpsnd_process_ping - CVE-2018-8798
- Fix Denial of Service in process_secondary_order - CVE-2018-8799
- Fix remote code execution in in ui_clip_handle_data - CVE-2018-8800
- Fix major information leak in ui_clip_handle_data - CVE-2018-20174
- Fix memory corruption in rdp_in_unistr - CVE-2018-20177
- Fix Denial of Service in process_demand_active - CVE-2018-20178
- Fix remote code execution in lspci_process - CVE-2018-20179
- Fix remote code execution in rdpsnddbg_process - CVE-2018-20180
- Fix remote code execution in seamless_process - CVE-2018-20181
- Fix remote code execution in seamless_process_line - CVE-2018-20182
more... | rdesktop
more detail |
2019-02-21 | VuXML ID 002b4b05-35dd-11e9-94a8-000ffec0b3e1
Drupal Security Team
Some field types do not properly sanitize data from non-form sources.
This can lead to arbitrary PHP code execution in some cases..
more... | drupal8
more detail |
2019-02-15 | VuXML ID f0416fb5-3130-11e9-a5ba-e0d55e883e26
msmtp developers report:
In msmtp 1.8.2, when tls_trust_file has its default configuration,
certificate-verification results are not properly checked.
more... | msmtp
more detail |
2019-02-13 | VuXML ID 18211552-f650-4d86-ba4f-e6d5cbfcdbeb
Mozilla Foundation reports:
CVE-2018-18356: Use-after-free in Skia
CVE-2019-5785: Integer overflow in Skia
CVE-2018-18511: Cross-origin theft of images with ImageBitmapRenderingContext
more... | firefox firefox-esr thunderbird
more detail |
2019-02-12 | VuXML ID de11a8fb-2eda-11e9-8fb5-6451062f0f7a
Adobe reports:
- This update resolves an out-of-bounds vulnerability that
could lead to information disclosure (CVE-2019-7090).
more... | linux-flashplayer
more detail |
2019-02-11* | VuXML ID 11dc3890-0e64-11e8-99b0-d017c2987f9a
OpenJPEG reports:
Multiple vulnerabilities have been found in OpenJPEG, the
opensource JPEG 2000 codec. Please consult the CVE list for further
details.
CVE-2017-17479 and CVE-2017-17480 were fixed in r477112.
CVE-2018-5785 was fixed in r480624.
CVE-2018-6616 was fixed in r489415.
more... | openjpeg
more detail |
2019-02-11 | VuXML ID 683c714d-2d91-11e9-bf3e-a4badb2f4699
Problem Description:
The callee-save registers are used by kernel and for
some of them (%r8, %r10, and for non-PTI configurations,
%r9) the content is not sanitized before return from syscalls,
potentially leaking sensitive information.
Impact:
Typically an address of some kernel data structure used
in the syscall implementation, is exposed.
more... | FreeBSD-kernel
more detail |
2019-02-11 | VuXML ID 86c89abf-2d91-11e9-bf3e-a4badb2f4699
Problem Description:
FreeBSD 12.0 attempts to handle the case where the
receiving process does not provide a sufficiently large
buffer for an incoming control message containing rights.
In particular, to avoid leaking the corresponding descriptors
into the receiving process' descriptor table, the kernel
handles the truncation case by closing descriptors referenced
by the discarded message.
The code which performs this operation failed to release
a reference obtained on the file corresponding to a received
right. This bug can be used to cause the reference counter
to wrap around and free the file structure.
Impact:
A local user can exploit the bug to gain root privileges
or escape from a jail.
more... | FreeBSD-kernel
more detail |
2019-02-10 | VuXML ID e8bcac84-2d5c-11e9-9a74-e0d55e2a8bf9
Albert Astals Cid reports:
KAuth allows to pass parameters with arbitrary types to helpers running as root over DBus.
Certain types can cause crashes and trigger decoding arbitrary images with dynamically loaded plugin
more... | kf5-kauth
more detail |
2019-02-08 | VuXML ID c95836a0-2b3b-11e9-9838-8c164567ca3c
unit security problems:
CVE-2019-7401: a head memory buffer overflow might have
been caused in the router process by a specially crafted
request, potentially resulting in a segmentation fault
or other unspecified behavior.
more... | unit
more detail |
2019-02-07 | VuXML ID 714b033a-2b09-11e9-8bc3-610fd6e6cd05
curl security problems:
CVE-2018-16890: NTLM type-2 out-of-bounds buffer read
libcurl contains a heap buffer out-of-bounds read flaw.
The function handling incoming NTLM type-2 messages
(lib/vauth/ntlm.c:ntlm_decode_type2_target) does not validate incoming
data correctly and is subject to an integer overflow vulnerability.
Using that overflow, a malicious or broken NTLM server could trick
libcurl to accept a bad length + offset combination that would lead to a
buffer read out-of-bounds.
CVE-2019-3822: NTLMv2 type-3 header stack buffer overflow
libcurl contains a stack based buffer overflow vulnerability.
The function creating an outgoing NTLM type-3 header
(lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()), generates the
request HTTP header contents based on previously received data. The
check that exists to prevent the local buffer from getting overflowed is
implemented wrongly (using unsigned math) and as such it does not
prevent the overflow from happening.
This output data can grow larger than the local buffer if very large
"nt response" data is extracted from a previous NTLMv2 header provided
by the malicious or broken HTTP server.
Such a "large value" needs to be around 1000 bytes or more. The actual
payload data copied to the target buffer comes from the NTLMv2 type-2
response header.
CVE-2019-3823: SMTP end-of-response out-of-bounds read
libcurl contains a heap out-of-bounds read in the code handling the
end-of-response for SMTP.
If the buffer passed to smtp_endofresp() isn't NUL terminated and
contains no character ending the parsed number, and len is set to 5,
then the strtol() call reads beyond the allocated buffer. The read
contents will not be returned to the caller.
more... | curl
more detail |
2019-02-06 | VuXML ID 43ee6c1d-29ee-11e9-82a1-001b217b3468
Gitlab reports:
Leak of Confidential Issue and Merge Request Titles
Persistent XSS in User Status
more... | gitlab-ce
more detail |
2019-02-05 | VuXML ID 1340fcc1-2953-11e9-bc44-a4badb296695
Aki Tuomi (Open-Xchange Oy) reports:
Normally Dovecot is configured to authenticate
imap/pop3/managesieve/submission clients using regular username/password
combination. Some installations have also required clients to present a
trusted SSL certificate on top of that. It's also possible to configure
Dovecot to take the username from the certificate instead of from the
user provided authentication. It's also possible to avoid having a
password at all, only trusting the SSL certificate.
If the provided trusted SSL certificate is missing the username field,
Dovecot should be failing the authentication. However, the earlier
versions will take the username from the user provided authentication
fields (e.g. LOGIN command). If there is no additional password
verification, this allows the attacker to login as anyone else in the
system.
This affects only installations using:
auth_ssl_require_client_cert = yes
auth_ssl_username_from_cert = yes
Attacker must also have access to a valid trusted certificate without
the ssl_cert_username_field in it. The default is commonName, which
almost certainly exists in all certificates. This could happen for
example if ssl_cert_username_field is a field that normally doesn't
exist, and attacker has access to a web server's certificate (and key),
which is signed with the same CA.
Attack can be migitated by having the certificates with proper Extended
Key Usage, such as 'TLS Web Server' and 'TLS Web Server Client'.
Also, ssl_cert_username_field setting was ignored with external SMTP
AUTH, because none of the MTAs (Postfix, Exim) currently send the
cert_username field. This may have allowed users with trusted
certificate to specify any username in the authentication. This does not
apply to Dovecot Submission service.
more... | dovecot
more detail |
2019-02-02 | VuXML ID 5d8c0876-2716-11e9-9446-b7f8544ce15c
Typo3 news:
Please read the corresponding Security Advisories for details.
more... | typo3-8-php71 typo3-8-php72 typo3-8-php73 typo3-9-php71 typo3-9-php72 typo3-9-php73
more detail |
2019-02-01 | VuXML ID 41c1cd6f-2645-11e9-b5f1-080027fee39c
Gitea Team reports:
Disable redirect for i18n
Only allow local login if password is non-empty
Fix go-get URL generation
more... | gitea
more detail |
2019-01-31 | VuXML ID 22b90fe6-258e-11e9-9c8d-6805ca0b3d42
Best PRactical Solutions reports:
0.06 2019-01-02
- Changes to address CVE-2018-18898 which could allow DDoS-type attacks.
Thanks to Lukas Kramer for reporting the issue and Alex Vandiver for
contributing fixes.
- Fix pathological backtracking for unkown regex
- Fix pathological backtracking in obs-phrase(i.e. obs-display-name)
- Fix pathological backtracking in cfws, quoted strings
more... | p5-Email-Address-List
more detail |
2019-01-31 | VuXML ID 467b7cbe-257d-11e9-8573-001b217b3468
Gitlab reports:
Remote Command Execution via GitLab Pages
Covert Redirect to Steal GitHub/Bitbucket Tokens
Remote Mirror Branches Leaked by Git Transfer Refs
Denial of Service with Markdown
Guests Can View List of Group Merge Requests
Guest Can View Merge Request Titles via System Notes
Persistent XSS via KaTeX
Emails Sent to Unauthorized Users
Hyperlink Injection in Notification Emails
Unauthorized Access to LFS Objects
Trigger Token Exposure
Upgrade Rails to 5.0.7.1 and 4.2.11
Contributed Project Information Visible in Private Profile
Imported Project Retains Prior Visibility Setting
Error disclosure on Project Import
Persistent XSS in User Status
Last Commit Status Leaked to Guest Users
Mitigations for IDN Homograph and RTLO Attacks
Access to Internal Wiki When External Wiki Enabled
User Can Comment on Locked Project Issues
Unauthorized Reaction Emojis by Guest Users
User Retains Project Role After Removal from Private Group
GitHub Token Leaked to Maintainers
Unauthenticated Blind SSRF in Jira Integration
Unauthorized Access to Group Membership
Validate SAML Response in Group SAML SSO
more... | gitlab-ce
more detail |
2019-01-30 | VuXML ID 181beef6-2482-11e9-b4a3-00155d006b02
Mihály Mészáros reports:
We made 4.5.1.0 release public today that fixes many vulnerabilities.
It fix the following vulnerabilities:
- CVE-2018-4056
- CVE-2018-4058
- CVE-2018-4059
They will be exposed very soon..
more... | turnserver
more detail |
2019-01-27 | VuXML ID 111aefca-2213-11e9-9c8d-6805ca0b3d42
The phpMyAdmin development team reports:
Summary
Arbitrary file read vulnerability
Description
When AllowArbitraryServer configuration set
to true , with the use of a rogue MySQL server,
an attacker can read any file on the server that the web
server's user can access.
phpMyadmin attempts to block the use of LOAD DATA
INFILE , but due to a bug in PHP,
this check is not honored. Additionally, when using the
'mysql' extension, mysql.allow_local_infile
is enabled by default. Both of these conditions allow the
attack to occur.
Severity
We consider this vulnerability to be critical.
Mitigation factor
This attack can be mitigated by setting the
`AllowArbitraryServer` configuration directive to false
(which is the default value).
Affected Versions
phpMyAdmin versions from at least 4.0 through 4.8.4 are
affected
Summary
SQL injection in Designer feature
Description
A vulnerability was reported where a specially crafted
username can be used to trigger an SQL injection attack
through the designer feature.
Severity
We consider this vulnerability to be serious.
Affected Versions
phpMyAdmin versions from 4.5.0 through 4.8.4 are affected
more... | phpMyAdmin phpMyAdmin-php56 phpMyAdmin-php70 phpMyAdmin-php71 phpMyAdmin-php72
more detail |
2019-01-27* | VuXML ID 50ad9a9a-1e28-11e9-98d7-0050562a4d7b
The Requests package before 2.20.0 for Python sends an HTTP Authorization header
to an http URI upon receiving a same-hostname https-to-http redirect, which makes
it easier for remote attackers to discover credentials by sniffing the network.
more... | py27-requests py35-requests py36-requests py37-requests
more detail |
2019-01-27 | VuXML ID d3d02d3a-2242-11e9-b95c-b499baebfeaf
Oracle reports:
Please reference CVE/URL list for details
Not all listed CVE's are present in all versions/flavors
more... | mariadb100-server mariadb101-server mariadb102-server mariadb103-server mariadb55-server mysql55-server mysql56-server mysql57-server mysql80-server percona55-server percona56-server percona57-server
more detail |
2019-01-27 | VuXML ID d8e7e854-17fa-11e9-bef6-6805ca2fa271
botan2 developers reports:
A timing side channel during ECC key generation could leak information about the
high bits of the secret scalar. Such information allows an attacker to perform a
brute force attack on the key somewhat more efficiently than they would otherwise.
Found by Ján Jan?ár using ECTester.
Bug introduced in 1.11.20, fixed in 2.9.0
more... | botan2
more detail |
2019-01-26 | VuXML ID 7f6146aa-2157-11e9-9ba0-4c72b94353b5
Gitea Team reports:
Do not display the raw OpenID error in the UI
When redirecting clean the path to avoid redirecting to external site
Prevent DeleteFilePost doing arbitrary deletion
more... | gitea
more detail |
2019-01-26 | VuXML ID 8e48365a-214d-11e9-9f8a-0050562a4d7b
A vulnerability has been found that would allow attackers to direct a peer to
jump to and execute from an address indicated by the attacker.
This issue has been present since v4.2.0. Older releases are not affected.
NOTE: The attacker needs to know in advance valid addresses in the peer's
memory to jump to, so measures like ASLR are effective mitigations.
NOTE: this attack can only take place after authentication, so peers behind
CURVE/GSSAPI are not vulnerable to unauthenticated attackers.
more... | libzmq4
more detail |
2019-01-23 | VuXML ID 4af3241d-1f0c-11e9-b4bd-d43d7eed0ce2
Subversion project reports:
Malicious SVN clients can trigger a crash in mod_dav_svn by omitting
the root path from a recursive directory listing request.
more... | mod_dav_svn
more detail |
2019-01-23 | VuXML ID eb888ce5-1f19-11e9-be05-4c72b94353b5
The Apache httpd Project reports:
SECURITY: CVE-2018-17199
mod_session: mod_session_cookie does not respect expiry time allowing
sessions to be reused.
SECURITY: CVE-2019-0190
mod_ssl: Fix infinite loop triggered by a client-initiated
renegotiation in TLSv1.2 (or earlier) with OpenSSL 1.1.1 and
later. PR 63052.
SECURITY: CVE-2018-17189
mod_http2: fixes a DoS attack vector. By sending slow request bodies
to resources not consuming them, httpd cleanup code occupies a server
thread unnecessarily. This was changed to an immediate stream reset
which discards all stream state and incoming data.
more... | apache24
more detail |
2019-01-22 | VuXML ID 40d92cc5-1e2b-11e9-bef6-6805ca2fa271
PowerDNS Team reports:
CVE-2019-3806: An issue has been found in PowerDNS Recursor where Lua hooks are
not properly applied to queries received over TCP in some specific combination of
settings, possibly bypassing security policies enforced using Lua.
When the recursor is configured to run with more than one thread (threads=X) and to
do the distribution of incoming queries to the worker threads itself
(pdns-distributes-queries=yes), the Lua script is not properly loaded in the thread
handling incoming TCP queries, causing the Lua hooks to not be properly applied.
CVE-2019-3807: An issue has been found in PowerDNS Recursor where records in the
answer section of responses received from authoritative servers with the AA flag not
set were not properly validated, allowing an attacker to bypass DNSSEC validation.
more... | powerdns-recursor
more detail |
2019-01-20 | VuXML ID 6aa398d0-1c4d-11e9-96dd-a4badb296695
JSST reports:
Inadequate escaping in mod_banners leads to a stored XSS vulnerability.
Inadequate escaping in com_contact leads to a stored XSS vulnerability
Inadequate checks at the Global Configuration Text Filter settings allowed a stored XSS.
Inadequate checks at the Global Configuration helpurl settings allowed a stored XSS.
more... | joomla3
more detail |
2019-01-19 | VuXML ID e00ed3d9-1c27-11e9-a257-000ffec0b3e1
Drupal Security Team reports:
A remote code execution vulnerability exists in PHP's built-in
phar stream wrapper when performing file operations on an untrusted phar:// URI.
Some Drupal code (core, contrib, and custom) may be performing file operations on
insufficiently validated user input, thereby being exposed to this vulnerability.
This vulnerability is mitigated by the fact that such code paths typically require
access to an administrative permission or an atypical configuration.
more... | drupal7 drupal8
more detail |
2019-01-18 | VuXML ID 2a8b79c3-1b6e-11e9-8cf4-1c39475b9f84
Helm security notice
A specially crafted chart may be able to unpack content into locations on
the filesystem outside of the chart's path, potentially
overwriting existing files.
more... | helm
more detail |
2019-01-17 | VuXML ID ff50192c-19eb-11e9-8573-001b217b3468
Gitlab reports:
Arbitrary repo read in Gitlab project import
more... | gitlab-ce
more detail |
2019-01-16 | VuXML ID debf6353-5753-4e9a-b710-a83ecdd743de
Jenkins Security Advisory:
Description
(High) SECURITY-868
Administrators could persist access to Jenkins using crafted 'Remember me' cookie
(Medium) SECURITY-901
Deleting a user in an external security realm did not invalidate their session or 'Remember me' cookie
more... | jenkins jenkins-lts
more detail |
2019-01-15 | VuXML ID 383931ba-1818-11e9-92ea-448a5b29e8a9
Matrix developers report:
The matrix team announces the availablility of synapse security releases 0.34.0.1 and 0.34.1.1, fixing CVE-2019-5885.
more... | py27-matrix-synapse py35-matrix-synapse py36-matrix-synapse py37-matrix-synapse
more detail |
2019-01-10 | VuXML ID d38bbb79-14f3-11e9-9ce2-28d244aee256
Irssi reports:
Use after free when hidden lines were expired from the scroll
buffer. It may affect the stability of Irssi. (CWE-417, CWE-825)
more... | irssi
more detail |
2019-01-06 | VuXML ID 63e36475-119f-11e9-aba7-080027fee39c
The Gitea project reports:
Security
- Prevent DeleteFilePost doing arbitrary deletion
more... | gitea
more detail |
2019-01-06 | VuXML ID 924bd4f8-11e7-11e9-9fe8-5404a68ad561
Upstream project reports:
Out-of-bounds read in uriParse*Ex* for incomplete URIs with IPv6
addresses with embedded IPv4 address, e.g. "//[::44.1";
mitigated if passed parameter afterLast points to readable memory
containing a '\0' byte.
more... | uriparser
more detail |
2019-01-05 | VuXML ID 3e41c1a6-10bc-11e9-bd85-fcaa147e860e
Django security releases issued reports:
An attacker could craft a malicious URL that could make spoofed content
appear on the default page generated by the django.views.defaults.page_not_found()
view.
more... | py27-django111 py35-django111 py35-django20 py35-django21 py36-django111 py36-django20 py36-django21 py37-django111 py37-django20 py37-django21
more detail |
2019-01-05 | VuXML ID 546d4dd4-10ea-11e9-b407-080027ef1a23
Google Chrome Releases reports:
43 security fixes in this release, including:
- High CVE-2018-17480: Out of bounds write in V8
- High CVE-2018-17481: Use after free in PDFium
- High CVE-2018-18335: Heap buffer overflow in Skia
- High CVE-2018-18336: Use after free in PDFium
- High CVE-2018-18337: Use after free in Blink
- High CVE-2018-18338: Heap buffer overflow in Canvas
- High CVE-2018-18339: Use after free in WebAudio
- High CVE-2018-18340: Use after free in MediaRecorder
- High CVE-2018-18341: Heap buffer overflow in Blink
- High CVE-2018-18342: Out of bounds write in V8
- High CVE-2018-18343: Use after free in Skia
- High CVE-2018-18344: Inappropriate implementation in Extensions
- High To be allocated: Multiple issues in SQLite via WebSQL
- Medium CVE-2018-18345: Inappropriate implementation in Site Isolation
- Medium CVE-2018-18346: Incorrect security UI in Blink
- Medium CVE-2018-18347: Inappropriate implementation in Navigation
- Medium CVE-2018-18348: Inappropriate implementation in Omnibox
- Medium CVE-2018-18349: Insufficient policy enforcement in Blink
- Medium CVE-2018-18350: Insufficient policy enforcement in Blink
- Medium CVE-2018-18351: Insufficient policy enforcement in Navigation
- Medium CVE-2018-18352: Inappropriate implementation in Media
- Medium CVE-2018-18353: Inappropriate implementation in Network Authentication
- Medium CVE-2018-18354: Insufficient data validation in Shell Integration
- Medium CVE-2018-18355: Insufficient policy enforcement in URL Formatter
- Medium CVE-2018-18356: Use after free in Skia
- Medium CVE-2018-18357: Insufficient policy enforcement in URL Formatter
- Medium CVE-2018-18358: Insufficient policy enforcement in Proxy
- Medium CVE-2018-18359: Out of bounds read in V8
- Low To be allocated: Inappropriate implementation in PDFium
- Low To be allocated: Use after free in Extensions
- Low To be allocated: Inappropriate implementation in Navigation
- Low To be allocated: Inappropriate implementation in Navigation
- Low To be allocated: Insufficient policy enforcement in Navigation
- Low To be allocated: Insufficient policy enforcement in URL Formatter
- Medium To be allocated: Insufficient policy enforcement in Payments
- Various fixes from internal audits, fuzzing and other initiatives
more... | chromium
more detail |
2019-01-05 | VuXML ID 720590df-10eb-11e9-b407-080027ef1a23
Google Chrome Releases reports:
1 security fix contributed by external researches:
- High CVE-2018-17481: Use after free in PDFium
more... | chromium
more detail |
2019-01-02 | VuXML ID b2f4ab91-0e6b-11e9-8700-001b217b3468
Gitlab reports:
Source code disclosure merge request diff
Todos improper access control
URL rel attribute not set
Persistent XSS Autocompletion
SSRF repository mirroring
CI job token LFS error message disclosure
Secret CI variable exposure
Guest user CI job disclosure
Persistent XSS label reference
Persistent XSS wiki in IE browser
SSRF in project imports with LFS
Improper access control CI/CD settings
Missing authorization control merge requests
Improper access control branches and tags
Missing authentication for Prometheus alert endpoint
more... | gitlab-ce
more detail |
2018-12-26 | VuXML ID f8fe2905-0918-11e9-a550-00262d164c21
rpm4 reports:
Regression in -setperms, -setugids and -restore
Note that this update can not automatically fix possible damage
done by using -setperms, -setugids or -restore with rpm 4.14.2, it
merely fixes the functionlity itself. Any damage needs to be
investigated and fixed manually, such as using -verify and -restore
or reinstalling packages.
more... | rpm4
more detail |
2018-12-22 | VuXML ID 70b774a8-05bc-11e9-87ad-001b217b3468
Gitlab reports:
Arbitrary File read in Gitlab project import
more... | gitlab-ce
more detail |
2018-12-21 | VuXML ID 29d34524-0542-11e9-a444-080027fee39c
The Gitea project reports:
Security
- Sanitize uploaded file names
- HTMLEncode user added text
more... | gitea
more detail |
2018-12-20 | VuXML ID 4f8665d0-0465-11e9-b77a-6cc21735f730
The Shibboleth Consortium reports:
SAML messages, assertions, and metadata all commonly contain
date/time information in a standard XML format.
Invalid formatted data in such fields cause an exception of a type
that was not handled properly in the V3 software and causes a crash
(usually to the shibd daemon process, but possibly to Apache in rare
cases). Note that the crash occurs prior to evaluation of a message's
authenticity, so can be exploited by an untrusted attacker.
The problem is believed to be specific to the V3 software and would
not cause a crash in the older, now unsupported, V2 software.
more... | shibboleth-sp
more detail |
2018-12-20 | VuXML ID b80f039d-579e-4b82-95ad-b534a709f220
Bro Network security Monitor reports:
Bro 2.6.1 updates the embedded SQLite to version 3.26.0
to address the "Magellan" remote code execution vulnerability.
The stock Bro configuration/scripts don't use SQLite by
default, but custom user scripts/packages may.
more... | bro
more detail |
2018-12-19 | VuXML ID fa6a4a69-03d1-11e9-be12-a4badb2f4699
Problem Description:
Due to insufficient validation of network-provided data
it may be possible for a malicious attacker to craft a bootp
packet which could cause a stack buffer overflow.
Impact:
It is possible that the buffer overflow could lead to a
Denial of Service or remote code execution.
more... | FreeBSD
more detail |
2018-12-15 | VuXML ID 4b98613c-0078-11e9-b05b-00e04c1ea73d
wordpress developers reports:
WordPress versions 5.0 and earlier are affected by the following bugs, which are
fixed in version 5.0.1. Updated versions of WordPress 4.9 and older releases are
also available, for users who have not yet updated to 5.0.
Karim El Ouerghemmi discovered that authors could alter meta data to delete files
that they weren?t authorized to.
Simon Scannell of RIPS Technologies discovered that authors could create posts of
unauthorized post types with specially crafted input.
Sam Thomas discovered that contributors could craft meta data in a way that resulted
in PHP object injection.
Tim Coen discovered that contributors could edit new comments from higher-privileged
users, potentially leading to a cross-site scripting vulnerability.
Tim Coen also discovered that specially crafted URL inputs could lead to a cross-site
scripting vulnerability in some circumstances. WordPress itself was not affected,
but plugins could be in some situations.
Team Yoast discovered that the user activation screen could be indexed by search
engines in some uncommon configurations, leading to exposure of email addresses,
and in some rare cases, default generated passwords.
Tim Coen and Slavco discovered that authors on Apache-hosted sites could upload
specifically crafted files that bypass MIME verification, leading to a cross-site
scripting vulnerability.
more... | de-wordpress fr-wordpress ja-wordpress ru-wordpress wordpress zh_CN-wordpress zh_TW-wordpress
more detail |
2018-12-14 | VuXML ID 293f40a0-ffa1-11e8-b258-0011d823eebd
Janos Follath reports:
An attacker who can run code on the same machine that is
performing an RSA decryption can potentially recover the plaintext
through a Bleichenbacher-like oracle.
more... | mbedtls
more detail |
2018-12-14 | VuXML ID 757e6ee8-ff91-11e8-a148-001b217b3468
Gitlab reports:
Arbitrary File read in GitLab project import with Git LFS
more... | gitlab-ce
more detail |
2018-12-14 | VuXML ID bab29816-ff93-11e8-b05b-00e04c1ea73d
Typo3 core team reports:
CKEditor 4.11 fixes an XSS vulnerability in the HTML parser reported by maxarr.
The vulnerability stemmed from the fact that it was possible to execute XSS inside
the CKEditor source area after persuading the victim to: (i) switch CKEditor to
source mode, then (ii) paste a specially crafted HTML code, prepared by the attacker,
into the opened CKEditor source area, and (iii) switch back to WYSIWYG mode.
Although this is an unlikely scenario, we recommend to upgrade to the latest editor version.
Failing to properly encode user input, online media asset rendering
(*.youtube and *.vimeo files) is vulnerable to cross-site scripting. A valid backend user
account or write access on the server system (e.g. SFTP) is needed in order to exploit this
vulnerability.
Failing to properly encode user input, notifications shown in modal windows in the TYPO3
backend are vulnerable to cross-site scripting. A valid backend user account is needed in
order to exploit this vulnerability.
Failing to properly encode user input, login status display is vulnerable to cross-site
scripting in the website frontend. A valid user account is needed in order to exploit this
vulnerability - either a backend user or a frontend user having the possibility to modify
their user profile.
Template patterns that are affected are:
- ###FEUSER_[fieldName]### using system extension felogin
- for regular frontend rendering
(pattern can be defined individually using TypoScript setting
config.USERNAME_substToken)
It has been discovered that cookies created in the Install Tool are not hardened to be
submitted only via HTTP. In combination with other vulnerabilities such as cross-site
scripting it can lead to hijacking an active and valid session in the Install Tool.
The Install Tool exposes the current TYPO3 version number to non-authenticated users.
Online Media Asset Handling (*.youtube and *.vimeo files) in the TYPO3 backend is vulnerable
to denial of service. Putting large files with according file extensions results in high
consumption of system resources. This can lead to exceeding limits of the current PHP process
which results in a dysfunctional backend component. A valid backend user account or write
access on the server system (e.g. SFTP) is needed in order to exploit this vulnerability.
TYPO3?s built-in record registration functionality (aka ?basic shopping cart?) using recs
URL parameters is vulnerable to denial of service. Failing to properly ensure that anonymous
user sessions are valid, attackers can use this vulnerability in order to create an arbitrary
amount of individual session-data records in the database.
more... | typo3-8 typo3-9
more detail |
2018-12-13 | VuXML ID 1999a215-fc6b-11e8-8a95-ac1f6b67e138
Apache CouchDB PMC reports:
Database Administrator could achieve privilege escalation to
the account that CouchDB runs under, by abusing insufficient validation
in the HTTP API, escaping security controls implemented in previous
releases.
more... | couchdb couchdb2
more detail |
2018-12-12 | VuXML ID ed10ed3f-fddc-11e8-94cf-6805ca0b3d42
The phpMyAdmin development team reports:
Summary
Local file inclusion through transformation feature
Description
A flaw has been found where an attacker can exploit
phpMyAdmin to leak the contents of a local file. The
attacker must have access to the phpMyAdmin Configuration
Storage tables, although these can easily be created in any
database to which the attacker has access. An attacker must
have valid credentials to log in to phpMyAdmin; this
vulnerability does not allow an attacker to circumvent the
login system.
Severity
We consider this vulnerability to be severe.
Summary
XSRF/CSRF vulnerability in phpMyAdmin
Description
By deceiving a user to click on a crafted URL, it is
possible to perform harmful SQL operations such as renaming
databases, creating new tables/routines, deleting designer
pages, adding/deleting users, updating user passwords,
killing SQL processes, etc.
Severity
We consider this vulnerability to be of moderate severity.
Summary
XSS vulnerability in navigation tree
Description
A Cross-Site Scripting vulnerability was found in the
navigation tree, where an attacker can deliver a payload to
a user through a specially-crafted database/table name.
Severity
We consider this attack to be of moderate severity.
Mitigation factor
The stored XSS vulnerabilities can be triggered only by
someone who logged in to phpMyAdmin, as the usual token
protection prevents non-logged-in users from accessing the
required forms.
more... | phpMyAdmin phpMyAdmin-php56 phpMyAdmin-php70 phpMyAdmin-php71 phpMyAdmin-php72
more detail |
2018-12-10 | VuXML ID 268a4289-fc84-11e8-be12-a4badb2f4699
Problem Description:
Insufficient and improper checking in the NFS server
code could cause a denial of service or possibly remote
code execution via a specially crafted network packet.
Impact:
A remote attacker could cause the NFS server to crash,
resulting in a denial of service, or possibly execute
arbitrary code on the server.
more... | FreeBSD
more detail |
2018-12-10 | VuXML ID 2a86f45a-fc3c-11e8-a414-00155d006b02
Node.js reports:
Updates are now available for all active Node.js release lines. These include fixes for the vulnerabilities identified in the initial announcement. They also include upgrades of Node.js 6 and 8 to OpenSSL 1.0.2q, and upgrades of Node.js 10 and 11 to OpenSSL 1.1.0j.
We recommend that all Node.js users upgrade to a version listed below as soon as possible.
Debugger port 5858 listens on any interface by default (CVE-2018-12120)
All versions of Node.js 6 are vulnerable and the severity is HIGH. When the debugger is enabled with node --debug or node debug , it listens to port 5858 on all interfaces by default. This may allow remote computers to attach to the debug port and evaluate arbitrary JavaScript. The default interface is now localhost. It has always been possible to start the debugger on a specific interface, such as node --debug=localhost . The debugger was removed in Node.js 8 and replaced with the inspector, so no versions from 8 and later are vulnerable.
Denial of Service with large HTTP headers (CVE-2018-12121)
All versions of 6 and later are vulnerable and the severity is HIGH. By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.
The total size of HTTP headers received by Node.js now must not exceed 8192 bytes.
"Slowloris" HTTP Denial of Service (CVE-2018-12122)
All versions of Node.js 6 and later are vulnerable and the severity is LOW. An attacker can cause a Denial of Service (DoS) by sending headers very slowly keeping HTTP or HTTPS connections and associated resources alive for a long period of time. Attack potential is mitigated by the use of a load balancer or other proxy layer.
A timeout of 40 seconds now applies to servers receiving HTTP headers. This value can be adjusted with server.headersTimeout . Where headers are not completely received within this period, the socket is destroyed on the next received chunk. In conjunction with server.setTimeout() , this aids in protecting against excessive resource retention and possible Denial of Service.
Hostname spoofing in URL parser for javascript protocol (CVE-2018-12123)
All versions of Node.js 6 and later are vulnerable and the severity is LOW. If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case "javascript:" (e.g. "javAscript:") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.
HTTP request splitting (CVE-2018-12116)
Node.js 6 and 8 are vulnerable and the severity is MEDIUM. If Node.js can be convinced to use unsanitized user-provided Unicode data for the path option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.
OpenSSL Timing vulnerability in ECDSA signature generation (CVE-2018-0735)
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side-channel attack. An attacker could use variations in the signing algorithm to recover the private key.
OpenSSL Timing vulnerability in DSA signature generation (CVE-2018-0734)
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side-channel attack. An attacker could use variations in the signing algorithm to recover the private key.
OpenSSL Microarchitecture timing vulnerability in ECC scalar multiplication (CVE-2018-5407)
OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has been shown to be vulnerable to a microarchitecture timing side-channel attack. An attacker with sufficient access to mount local timing attacks during ECDSA signature generation could recover the private key.
more... | node node10 node6 node8
more detail |
2018-12-10 | VuXML ID 32498c8f-fc84-11e8-be12-a4badb2f4699
Problem Description:
Insufficient bounds checking in one of the device models
provided by bhyve(8) can permit a guest operating system
to overwrite memory in the bhyve(8) processing possibly
permitting arbitary code execution.
Impact:
A guest OS using a firmware image can cause the bhyve
process to crash, or possibly execute arbitrary code on the
host as root.
more... | FreeBSD
more detail |
2018-12-09 | VuXML ID f6d6308a-f2ec-11e8-b005-6805ca2fa271
powerdns Team reports:
CVE-2018-16855: An issue has been found in PowerDNS Recursor where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash. When the PowerDNS Recursor is run inside a supervisor like supervisord or systemd, a crash will lead to an automatic restart, limiting the impact to a somewhat degraded service.
more... | powerdns-recursor
more detail |
2018-12-08 | VuXML ID 0e8f496a-b498-11e8-bdcf-74d435e60b7c
mitre.org Reports:
The SSH server implementation of AsyncSSH before 1.12.1 does not properly check
whether authentication is completed before processing other requests
A customized SSH client can simply skip the authentication step.
more... | py-asyncssh
more detail |
2018-12-06 | VuXML ID 49cbe200-f92a-11e8-a89d-d43d7ef03aa6
Adobe reports:
- This update resolves a use-after-free vulnerability that
could lead to arbitrary code execution (CVE-2018-15982).
- This update resolves an insecure library loading vulnerability that
could lead to privilege escalation (CVE-2018-15983).
more... | linux-flashplayer
more detail |
2018-12-06 | VuXML ID 9d3428d4-f98c-11e8-a148-001b217b3468
Gitlab reports:
Directory Traversal in Templates API
more... | gitlab-ce
more detail |
2018-12-05 | VuXML ID 3aa27226-f86f-11e8-a085-3497f683cb16
Jenkins Security Advisory:
Description
(Critical) SECURITY-595
Code execution through crafted URLs
(Medium) SECURITY-904
Forced migration of user records
(Medium) SECURITY-1072
Workspace browser allowed accessing files outside the workspace
(Medium) SECURITY-1193
Potential denial of service through cron expression form validation
more... | jenkins jenkins-lts
more detail |
2018-12-03 | VuXML ID 889e35f4-f6a0-11e8-82dc-fcaa147e860e
moodle reports:
The login form is not protected by a token to prevent login cross-site
request forgery.
more... | moodle31 moodle33 moodle34 moodle35
more detail |
2018-12-02 | VuXML ID 3563fae5-f60c-11e8-b513-5404a68ad561
The upstream project reports:
* Fixed: Out-of-bounds write in uriComposeQuery* and uriComposeQueryEx*
Commit 864f5d4c127def386dd5cc926ad96934b297f04e
Thanks to Google Autofuzz team for the report!
* Fixed: Detect integer overflow in uriComposeQuery* and uriComposeQueryEx*
Commit f76275d4a91b28d687250525d3a0c5509bbd666f
Thanks to Google Autofuzz team for the report!
* Fixed: Protect uriResetUri* against acting on NULL input
Commit f58c25069cf4a986fe17a80c5b38687e31feb539
more... | uriparser
more detail |
2018-12-02 | VuXML ID f96044a2-7df9-414b-9f6b-6e5b85d06c86
Ruby on Rails blog:
Rails 4.2.11, 5.0.7.1, 5.1.6.1 and 5.2.1.1 have been released! These
contain the following important security fixes, and it is recommended
that users upgrade as soon as possible
CVE-2018-16476 Broken Access Control vulnerability in Active Job:
Carefully crafted user input can cause Active Job to deserialize it
using GlobalId and allow an attacker to have access to information that
they should not have.
more... | rubygem-activejob4 rubygem-activejob5 rubygem-activejob50
more detail |
2018-11-28 | VuXML ID 22bc5327-f33f-11e8-be46-0019dbb15b3f
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP
PUTs enabled (e.g. via setting the readonly initialisation
parameter of the Default to false) it was possible to upload a
JSP file to the server via a specially crafted request. This
JSP could then be requested and any code it contained would be
executed by the server.
more... | payara
more detail |
2018-11-28 | VuXML ID 8a4aba2d-f33e-11e8-9416-001b217b3468
Gitlab reports:
View Names of Private Groups
Persistent XSS in Environments
SSRF in Prometheus integration
Unauthorized Promotion of Milestones
Exposure of Confidential Issue Title
Persisent XSS in Markdown Fields via Mermaid Script
Persistent XSS in Markdown Fields via Unrecognized HTML Tags
Symlink Race Condition in Pages
Unauthorized Changes by Guest User in Issues
Unauthorized Comments on Locked Issues
Improper Enforcement of Token Scope
CRLF Injection in Project Mirroring
XSS in OAuth Authorization
SSRF in Webhooks
Send Email on Email Address Change
Workhorse Logs Contained Tokens
Unauthorized Publishing of Draft Comments
Guest Can Set Weight of a New Issue
Disclosure of Private Group's Members and Milestones
Persisent XSS in Operations
Reporter Can View Operations Page
more... | gitlab-ce
more detail |
2018-11-28 | VuXML ID 93f8e0ff-f33d-11e8-be46-0019dbb15b3f
FasterXML jackson-databind before 2.8.11.1 and 2.9.x before
2.9.5 allows unauthenticated remote code execution because of
an incomplete fix for the CVE-2017-7525 deserialization flaw.
This is exploitable by sending maliciously crafted JSON input
to the readValue method of the ObjectMapper, bypassing a
blacklist that is ineffective if the c3p0 libraries are
available in the classpath.
more... | payara
more detail |
2018-11-28 | VuXML ID c7b1af20-f34f-11e8-9cde-e0d55e2a8bf9
Albert Astals Cid reports:
messagelib is the library used by KMail to display emails.
messagelib by default displays emails as plain text, but gives the user
an option to "Prefer HTML to plain text" in the settings and if that option
is not enabled there is way to enable HTML display when an email contains HTML.
Some HTML emails can trick messagelib into opening a new browser window when
displaying said email as HTML.
This happens even if the option to allow the HTML emails to access
remote servers is disabled in KMail settings.
This means that the owners of the servers referred in the email can see
in their access logs your IP address.
more... | messagelib
more detail |
2018-11-28 | VuXML ID d70c9e18-f340-11e8-be46-0019dbb15b3f
Apache Commons FileUpload before 1.3.3
DiskFileItem File Manipulation Remote Code Execution.
Vulnerability in the Oracle GlassFish Server component of
Oracle Fusion Middleware (subcomponent: Administration).
Supported versions that are affected are 3.0.1 and 3.1.2.
Easily exploitable vulnerability allows low privileged attacker
with logon to the infrastructure where Oracle GlassFish Server
executes to compromise Oracle GlassFish Server. Successful
attacks of this vulnerability can result in unauthorized read
access to a subset of Oracle GlassFish Server accessible data.
CVSS v3.0 Base Score 3.3 (Confidentiality impacts).
Vulnerability in the Oracle GlassFish Server component of Oracle
Fusion Middleware (subcomponent: Core). Supported versions that
are affected are 2.1.1, 3.0.1 and 3.1.2. Easily exploitable
vulnerability allows unauthenticated attacker with network access
via SMTP to compromise Oracle GlassFish Server. Successful
attacks require human interaction from a person other than the
attacker. Successful attacks of this vulnerability can result in
unauthorized update, insert or delete access to some of Oracle
GlassFish Server accessible data. CVSS v3.0 Base Score 4.3
(Integrity impacts).
Vulnerability in the Oracle GlassFish Server component of
Oracle Fusion Middleware (subcomponent: Security). Supported
versions that are affected are 2.1.1, 3.0.1 and 3.1.2.
Easily exploitable vulnerability allows unauthenticated attacker
with network access via LDAP to compromise Oracle GlassFish Server.
Successful attacks of this vulnerability can result in unauthorized
update, insert or delete access to some of Oracle GlassFish Server
accessible data as well as unauthorized read access to a subset of
Oracle GlassFish Server accessible data and unauthorized ability
to cause a partial denial of service (partial DOS) of Oracle
GlassFish Server. CVSS v3.0 Base Score 7.3 (Confidentiality,
Integrity and Availability impacts).
Vulnerability in the Oracle GlassFish Server component of Oracle
Fusion Middleware (subcomponent: Security). Supported versions that
are affected are 2.1.1, 3.0.1 and 3.1.2. Easily exploitable
vulnerability allows unauthenticated attacker with network access
via HTTP to compromise Oracle GlassFish Server. Successful attacks
of this vulnerability can result in unauthorized update, insert or
delete access to some of Oracle GlassFish Server accessible data as
well as unauthorized read access to a subset of Oracle GlassFish
Server accessible data and unauthorized ability to cause a partial
denial of service (partial DOS) of Oracle GlassFish Server.
CVSS v3.0 Base Score 7.3 (Confidentiality, Integrity and
Availability impacts).
Vulnerability in the Oracle GlassFish Server component of Oracle
Fusion Middleware (subcomponent: Security). Supported versions that
are affected are 2.1.1, 3.0.1 and 3.1.2. Difficult to exploit
vulnerability allows unauthenticated attacker with network access
via multiple protocols to compromise Oracle GlassFish Server. While
the vulnerability is in Oracle GlassFish Server, attacks may
significantly impact additional products. Successful attacks of this
vulnerability can result in takeover of Oracle GlassFish Server.
CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and
Availability impacts).
more... | payara
more detail |
2018-11-23* | VuXML ID b036faba-edd8-11e8-b3b7-00e04c1ea73d
SO-AND-SO reports:
CVE-2018-19296:Fix potential object injection vulnerability.
more... | phpmailer phpmailer6
more detail |
2018-11-22* | VuXML ID ec49f6b5-ee39-11e8-b2f4-74d435b63d51
The PHP team reports:
imap_open allows to run arbitrary shell commands via mailbox parameter.
more... | php56-imap php70-imap php71-imap php72-imap php73-imap
more detail |
2018-11-20 | VuXML ID 8f128c72-ecf9-11e8-aa00-6451062f0f7a
Adobe reports:
- This update resolves a type confusion vulnerability that
could lead to arbitrary code execution (CVE-2018-15981).
more... | linux-flashplayer
more detail |
2018-11-20 | VuXML ID d889d32c-ecd9-11e8-9416-001b217b3468
Gitlab reports:
Persistent XSS Autocompletion
Unauthorized service template creation
more... | gitlab-ce
more detail |
2018-11-19 | VuXML ID 0aee2f13-ec1d-11e8-8c92-6805ca2fa271
PowerDNS Team reports:
CVE-2018-10851: An issue has been found in PowerDNS Authoritative Server allowing
an authorized user to cause a memory leak by inserting a specially crafted record
in a zone under their control, then sending a DNS query for that record. The issue
is due to the fact that some memory is allocated before the parsing and is not
always properly released if the record is malformed. When the PowerDNS
Authoritative Server is run inside the guardian (--guardian), or inside a
supervisor like supervisord or systemd, an out-of-memory crash will lead to an
automatic restart, limiting the impact to a somewhat degraded service.
CVE-2018-14626: An issue has been found in PowerDNS Authoritative Server allowing
a remote user to craft a DNS query that will cause an answer without DNSSEC
records to be inserted into the packet cache and be returned to clients asking for
DNSSEC records, thus hiding the presence of DNSSEC signatures for a specific qname
and qtype. For a DNSSEC-signed domain, this means that DNSSEC validating clients
will consider the answer to be bogus until it expires from the packet cache,
leading to a denial of service.
more... | powerdns
more detail |
2018-11-19* | VuXML ID e9aa0e4c-ea8b-11e8-a5b7-00e04c1ea73d
powerdns Team reports:
CVE-2018-10851: An issue has been found in PowerDNS Recursor allowing
a malicious authoritative server to cause a memory leak by sending specially
crafted records. The issue is due to the fact that some memory is allocated
before the parsing and is not always properly released if the record is malformed.
When the PowerDNS Recursor is run inside a supervisor like supervisord or systemd,
an out-of-memory crash will lead to an automatic restart, limiting the impact to
a somewhat degraded service.
CVE-2018-14626: An issue has been found in PowerDNS Recursor allowing a remote
user to craft a DNS query that will cause an answer without DNSSEC records to be
inserted into the packet cache and be returned to clients asking for DNSSEC
records, thus hiding the presence of DNSSEC signatures for a specific qname and
qtype. For a DNSSEC-signed domain, this means that clients performing DNSSEC
validation by themselves might consider the answer to be bogus until it expires
from the packet cache, leading to a denial of service.
CVE-2018-14644: An issue has been found in PowerDNS Recursor where a remote attacker
sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached
as failing DNSSEC validation. It only arises if the parent zone is signed, and all
the authoritative servers for that parent zone answer with FORMERR to a query for at
least one of the meta-types. As a result, subsequent queries from clients requesting
DNSSEC validation will be answered with a ServFail.
more... | powerdns-recursor powerdns-recursor40
more detail |
2018-11-14 | VuXML ID c6fb2734-e835-11e8-b14b-001999f8d30b
The Asterisk project reports:
There is a buffer overflow vulnerability in dns_srv
and dns_naptr functions of Asterisk that allows an attacker
to crash Asterisk via a specially crafted DNS SRV or NAPTR
response. The attackers request causes Asterisk to segfault
and crash.
more... | asterisk15 asterisk16
more detail |
2018-11-13 | VuXML ID b69292e8-e798-11e8-ae07-6451062f0f7a
Adobe reports:
- This update resolves a out-of-bounds vulnerability that
could lead to information disclosure (CVE-2018-15978).
more... | linux-flashplayer
more detail |
2018-11-12 | VuXML ID 1460aa25-e6ab-11e8-a733-e0d55e2a8bf9
Albert Astals Cid reports:
Various KDE applications share a plugin system to create thumbnails
of various file types for displaying in file managers, file dialogs, etc.
kio-extras contains a thumbnailer plugin for HTML files.
The HTML thumbnailer was incorrectly accessing some content of
remote URLs listed in HTML files. This meant that the owners of the servers
referred in HTML files in your system could have seen in their access logs
your IP address every time the thumbnailer tried to create the thumbnail.
The HTML thumbnailer has been removed in upcoming KDE Applications 18.12.0
because it was actually not creating thumbnails for files at all.
more... | kio-extras
more detail |
2018-11-12 | VuXML ID 6f170cf2-e6b7-11e8-a9a8-b499baebfeaf
The OpenSSL project reports:
Microarchitecture timing vulnerability in ECC scalar
multiplication. Severity: Low
OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has
been shown to be vulnerable to a microarchitecture timing side channel
attack. An attacker with sufficient access to mount local timing
attacks during ECDSA signature generation could recover the private
key.
more... | openssl
more detail |
2018-11-11* | VuXML ID 791841a3-d484-4878-8909-92ef9ce424f4
NVD reports:
An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.
A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
more... | patch
more detail |
2018-11-10* | VuXML ID 238ae7de-dba2-11e8-b713-b499baebfeaf
The OpenSSL project reports:
Timing vulnerability in ECDSA signature generation
(CVE-2018-0735): The OpenSSL ECDSA signature algorithm has been
shown to be vulnerable to a timing side channel attack. An
attacker could use variations in the signing algorithm to
recover the private key (Low).
Timing vulnerability in DSA signature generation (CVE-2018-0734):
Avoid a timing attack that leaks information via a side channel
that triggers when a BN is resized. Increasing the size of the
BNs prior to doing anything with them suppresses the attack (Low).
more... | libressl libressl-devel openssl-devel openssl111
more detail |
2018-11-09 | VuXML ID 92a6efd0-e40d-11e8-ada4-408d5cf35399
Lighttpd Project reports:
Security fixes for Lighttpd:
more... | lighttpd
more detail |
2018-11-08 | VuXML ID 1c27a706-e3aa-11e8-b77a-6cc21735f730
The PostgreSQL project reports:
CVE-2018-16850: SQL injection in pg_upgrade and pg_dump,
via CREATE TRIGGER ... REFERENCING.
Using a purpose-crafted trigger definition, an attacker can run
arbitrary SQL statements with superuser privileges when a superuser
runs pg_upgrade on the database or during a pg_dump dump/restore
cycle. This attack requires a CREATE privilege on some non-temporary
schema or a TRIGGER privilege on a table. This is exploitable in the
default PostgreSQL configuration, where all users have CREATE
privilege on public schema.
more... | postgresql10-server postgresql93-server postgresql94-server postgresql95-server postgresql96-server
more detail |
2018-11-08* | VuXML ID ec5072b0-d43a-11e8-a6d2-b499baebfeaf
Oracle reports:
Please reference CVE/URL list for details
more... | mariadb100-server mariadb101-server mariadb102-server mariadb103-server mariadb55-server mysql55-server mysql56-server mysql57-server mysql80-server percona55-server percona56-server percona57-server
more detail |
2018-11-06 | VuXML ID 84ca56be-e1de-11e8-bcfd-00e04c1ea73d
NGINX Team reports:
Two security issues were identified in nginx HTTP/2 implementation,
which might cause excessive memory consumption (CVE-2018-16843)
and CPU usage (CVE-2018-16844).
The issues affect nginx compiled with the ngx_http_v2_module (not
compiled by default) if the "http2" option of the "listen" directive is
used in a configuration file.
A security issue was identified in the ngx_http_mp4_module, which might
allow an attacker to cause infinite loop in a worker process, cause a
worker process crash, or might result in worker process memory
isclosure by using a specially crafted mp4 file (CVE-2018-16845).
The issue only affects nginx if it is built with the ngx_http_mp4_module
(the module is not built by default) and the "mp4" directive is used in
the configuration file. Further, the attack is only possible if an
attacker is able to trigger processing of a specially crafted mp4 file
with the ngx_http_mp4_module.
more... | nginx nginx-devel
more detail |
2018-11-04* | VuXML ID 140a14b5-d615-11e8-b3cb-00e04c1ea73d
Drupal Security Team reports:
he path module allows users with the 'administer paths' to create pretty URLs
for content. In certain circumstances the user can enter a particular path that
triggers an open redirect to a malicious url.The issue is mitigated by the fact
that the user needs the administer paths permission to exploit.
When sending email some variables were not being sanitized for shell arguments,
which could lead to remote code execution.
more... | drupal7 drupal8
more detail |
2018-11-01 | VuXML ID 36a2a89e-7ee1-4ea4-ae22-7ca38019c8d0
GitHub issue:
This issue has been created for public disclosure of an XSS
vulnerability that was responsibly reported (independently) by Shubham
Pathak and @yasinS (Yasin Soliman).
In the Loofah gem, through v2.2.2, unsanitized JavaScript may occur in
sanitized output when a crafted SVG element is republished.
more... | rubygem-loofah
more detail |
2018-11-01 | VuXML ID b51d9e83-de08-11e8-9416-001b217b3468
SO-AND-SO reports:
SSRF in Kubernetes integration
more... | gitlab-ce
more detail |
2018-11-01 | VuXML ID deb4f633-de1d-11e8-a9fb-080027f43a02
The Gitea project reports:
[This release] contains crit[i]cal security fix for vulnerability
that could potentially allow for authorized users to do remote code
ex[e]cution.
more... | gitea
more detail |
2018-11-01 | VuXML ID e0ab1773-07c1-46c6-9170-4c5e81c00927
curl security problems:
CVE-2018-16839: SASL password overflow via integer overflow
libcurl contains a buffer overrun in the SASL authentication code.
The internal function Curl_auth_create_plain_message fails to
correctly verify that the passed in lengths for name and password
aren't too long, then calculates a buffer size to allocate.
On systems with a 32 bit size_t, the math to calculate the buffer size
triggers an integer overflow when the user name length exceeds 2GB
(2^31 bytes). This integer overflow usually causes a very small buffer
to actually get allocated instead of the intended very huge one, making
the use of that buffer end up in a heap buffer overflow.
This bug is very similar to CVE-2017-14618.
It affects curl 7.33.0 to 7.61.1.
CVE-2018-16840: use-after-free in handle close
libcurl contains a heap use-after-free flaw in code related to closing
an easy handle.
When closing and cleaning up an "easy" handle in the Curl_close()
function, the library code first frees a struct (without nulling the
pointer) and might then subsequently erroneously write to a struct
field within that already freed struct.
It affects curl 7.59.0 to 7.61.1.
CVE-2018-16842: warning message out-of-buffer read
curl contains a heap out of buffer read vulnerability.
The command line tool has a generic function for displaying warning
and informational messages to stderr for various situations. For
example if an unknown command line argument is used, or passed to it in
a "config" file.
This display function formats the output to wrap at 80 columns. The
wrap logic is however flawed, so if a single word in the message is
itself longer than 80 bytes the buffer arithmetic calculates the
remainder wrong and will end up reading behind the end of the buffer.
This could lead to information disclosure or crash.
This vulnerability could lead to a security issue if used in this or
similar situations:
1. a server somewhere uses the curl command line to run something
2. if it fails, it shows stderr to the user
3. the server takes user input for parts of its command line input
4. user provides something overly long that triggers this crash
5. the stderr output may now contain user memory contents that wasn't
meant to be available
It affects curl 7.14.1 to 7.61.1.
more... | curl
more detail |
2018-10-29 | VuXML ID b9591212-dba7-11e8-9416-001b217b3468
Gitlab reports:
RCE in Gitlab Wiki API
SSRF in Hipchat integration
Cleartext storage of personal access tokens
Information exposure through stack trace error message
Persistent XSS autocomplete
Information exposure in stored browser history
Information exposure when replying to issues through email
Persistent XSS in License Management and Security Reports
Metrics information disclosure in Prometheus integration
Unauthorized changes to a protected branch's access levels
more... | gitlab-ce
more detail |
2018-10-28 | VuXML ID fa194483-dabd-11e8-bf39-5404a68ad561
Talos reports:
An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality
of the LIVE555 RTSP server library. A specially crafted packet can cause a stack-based buffer
overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.
more... | liveMedia
more detail |
2018-10-27 | VuXML ID 4f7c6af3-6a2c-4ead-8453-04e509688d45
SaltStack reports:
Remote command execution and incorrect access control when using
salt-api.
Directory traversal vulnerability when using salt-api. Allows an
attacker to determine what files exist on a server when querying
/run or /events.
more... | py27-salt py32-salt py33-salt py34-salt py35-salt py36-salt py37-salt
more detail |
2018-10-26 | VuXML ID 33c384f3-5af6-4662-9741-0acb21c7e499
Jef Poskanzer reports:
Prior versions allowed remote users to read arbitrary files in some circumstances.
more... | mini_httpd
more detail |
2018-10-20 | VuXML ID afc60484-0652-440e-b01a-5ef814747f06
Ruby news:
CVE-2018-16395: OpenSSL::X509::Name equality check does not work
correctly
An instance of OpenSSL::X509::Name contains entities such as CN, C and
so on. Some two instances of OpenSSL::X509::Name are equal only when
all entities are exactly equal. However, there is a bug that the
equality check is not correct if the value of an entity of the
argument (right-hand side) starts with the value of the receiver
(left-hand side). So, if a malicious X.509 certificate is passed to
compare with an existing certificate, there is a possibility to be
judged incorrectly that they are equal.
CVE-2018-16396: Tainted flags are not propagated in Array#pack and
String#unpack with some directives
Array#pack method converts the receiver's contents into a string with
specified format. If the receiver contains some tainted objects, the
returned string also should be tainted. String#unpack method which
converts the receiver into an array also should propagate its tainted
flag to the objects contained in the returned array. But, with B, b, H
and h directives, the tainted flags are not propagated. So, if a script
processes unreliable inputs by Array#pack and/or String#unpack with
these directives and checks the reliability with tainted flags, the
check might be wrong.
more... | ruby
more detail |
2018-10-19 | VuXML ID 44864c84-d3b8-11e8-b3cb-00e04c1ea73d
Matomo reports:
Several XSS issues have been fixed thanks to the great work of security
researchers who responsible disclosed issues to us.
more... | matomo
more detail |
2018-10-17 | VuXML ID 2383767c-d224-11e8-9623-a4badb2f4699
gladiac reports:
libssh versions 0.6 and above have an authentication bypass
vulnerability in the server code. By presenting the server an
SSH2_MSG_USERAUTH_SUCCESS message in place of the
SSH2_MSG_USERAUTH_REQUEST message which the server would expect to
initiate authentication, the attacker could successfully authentciate
without any credentials.
more... | libssh
more detail |
2018-10-15 | VuXML ID 8c08ab4c-d06c-11e8-b35c-001b217b3468
The Git community reports:
Multiple vulnerabilities.
more... | libgit2
more detail |
2018-10-11 | VuXML ID 3350275d-cd5a-11e8-a7be-3497f683cb16
Jenkins Security Advisory:
Description
(Low) SECURITY-867
Path traversal vulnerability in Stapler allowed accessing internal data
(Medium) SECURITY-1074
Arbitrary file write vulnerability using file parameter definitions
(Medium) SECURITY-1129
Reflected XSS vulnerability
(Medium) SECURITY-1162
Ephemeral user record was created on some invalid authentication attempts
(Medium) SECURITY-1128
Ephemeral user record creation
(Medium) SECURITY-1158
Session fixation vulnerability on user signup
(Medium) SECURITY-765
Failures to process form submission data could result in secrets being displayed or written to logs
more... | jenkins jenkins-lts
more detail |
2018-10-11 | VuXML ID 4c11b51e-cd8d-11e8-b0cb-a0f3c100ae18
The Tox project blog reports:
A memory leak bug was discovered in Toxcore that can be triggered remotely to
exhaust one?s system memory, resulting in a denial of service attack.
The bug is present in the TCP Server module of Toxcore and therefore it
affects mostly bootstrap nodes. Regular Tox clients generally have the
TCP Server functionality disabled by default, leaving them unaffected.
more... | toxcore
more detail |
2018-10-11 | VuXML ID cb539d4e-cd68-11e8-8819-00e04c1ea73d
Gitea project reports:
CSRF Vulnerability on API.
Enforce token on api routes.
more... | gitea
more detail |
2018-10-09 | VuXML ID a4eb38ea-cc06-11e8-ada4-408d5cf35399
tinc-vpn.org reports:
The authentication protocol allows an oracle attack that could
potentially be exploited.
If a man-in-the-middle has intercepted the TCP connection it
might be able to force plaintext UDP packets between two nodes for up to
a PingInterval period.
more... | tinc tinc-devel
more detail |
2018-10-05 | VuXML ID 23413442-c8ea-11e8-b35c-001b217b3468
Gitlab reports:
Merge request information disclosure
Private project namespace information disclosure
Gitlab Flavored Markdown API information disclosure
more... | gitlab-ce
more detail |
2018-10-03 | VuXML ID 004d8c23-c710-11e8-98c7-000c29434208
Django release notes:
CVE-2018-16984: Password hash disclosure to "view only" admin users
If an admin user has the change permission to the user model, only part
of the password hash is displayed in the change form. Admin users with the
view (but not change) permission to the user model were displayed the entire
hash. While it's typically infeasible to reverse a strong password hash, if
your site uses weaker password hashing algorithms such as MD5 or SHA1, it
could be a problem.
more... | py34-django21 py35-django21 py36-django21 py37-django21
more detail |
2018-10-01 | VuXML ID 065b3b72-c5ab-11e8-9ae2-001b217b3468
Gitlab reports:
SSRF GCP access token disclosure
Persistent XSS on issue details
Diff formatter DoS in Sidekiq jobs
Confidential information disclosure in events API endpoint
validate_localhost function in url_blocker.rb could be bypassed
Slack integration CSRF Oauth2
GRPC::Unknown logging token disclosure
IDOR merge request approvals
Persistent XSS package.json
Persistent XSS merge request project import
more... | gitlab-ce
more detail |
2018-10-01 | VuXML ID 5a757a31-f98e-4bd4-8a85-f1c0f3409769
libpango in Pango 1.40.8 through 1.42.3, as used in hexchat and other products, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted text with invalid Unicode sequences.
more... | pango
more detail |
2018-09-30 | VuXML ID 01018916-c47c-11e8-8b07-00e04c1ea73d
Serendipity reports:
Security: Fix XSS for pagination, when multi-category selection is used.
more... | serendipity
more detail |
2018-09-29 | VuXML ID 40a844bf-c430-11e8-96dc-000743165db0
Bitcoin Core reports:
CVE-2018-17144, a fix for which was released on September 18th in Bitcoin Core versions 0.16.3 and 0.17.0rc4, includes both a Denial of Service component and a critical inflation vulnerability. It was originally reported to several developers working on Bitcoin Core, as well as projects supporting other cryptocurrencies, including ABC and Unlimited on September 17th as a Denial of Service bug only, however we quickly determined that the issue was also an inflation vulnerability with the same root cause and fix.
more... | bitcoin bitcoin-daemon
more detail |
2018-09-26 | VuXML ID 613193a0-c1b4-11e8-ae2d-54e1ad3d6335
the Apache Spamassassin project reports:
In Apache SpamAssassin, using HTML::Parser, we setup an object and
hook into the begin and end tag event handlers In both cases, the
"open" event is immediately followed by a "close" event - even if
the tag *does not* close in the HTML being parsed.
Because of this, we are missing the "text" event to deal with
the object normally. This can cause carefully crafted emails that
might take more scan time than expected leading to a Denial of
Service.
Fix a reliance on "." in @INC in one configuration script. Whether
this can be exploited in any way is uncertain.
Fix a potential Remote Code Execution bug with the PDFInfo plugin.
Thanks to cPanel Security Team for their report of this issue.
Fourth, this release fixes a local user code injection in the
meta rule syntax. Thanks again to cPanel Security Team for their
report of this issue.
more... | spamassassin
more detail |
2018-09-26 | VuXML ID bad59128-c188-11e8-9d40-f0def10dca57
shadowm reports:
A severe bug was found in the game client which could allow a malicious user to execute arbitrary code through the Lua engine by using specially-crafted code in add-ons, saves, replays, or networked games. This issue affects all platforms and all existing releases since Wesnoth version 1.7.0.
Users of all previous version should upgrade immediately.
more... | wesnoth
more detail |
2018-09-26 | VuXML ID e182c076-c189-11e8-a6d2-b499baebfeaf
The Apache httpd project reports:
low: DoS for HTTP/2 connections by continuous SETTINGS
By sending continous SETTINGS frames of maximum size an ongoing
HTTP/2 connection could be kept busy and would never time out. This
can be abused for a DoS on the server. This only affect a server
that has enabled the h2 protocol.
more... | apache24
more detail |
2018-09-25 | VuXML ID 6bf71117-c0c9-11e8-b760-6023b685b1ee
Brian Carpenter reports:
Reflected XSS in view_filters_page.php via core/filter_form_api.php
more... | mantis-php56 mantis-php70 mantis-php71 mantis-php72
more detail |
2018-09-22 | VuXML ID 2d6de6a8-fb78-4149-aeda-77fc8f140f06
MITRE reports:
An authentication bypass flaw was found in the smart_proxy_dynflow
component used by Foreman. A malicious attacker can use this flaw to
remotely execute arbitrary commands on machines managed by vulnerable
Foreman instances, in a highly privileged context.
more... | rubygem-smart_proxy_dynflow
more detail |
2018-09-22 | VuXML ID be1aada2-be6c-11e8-8fc6-000c29434208
Mediawiki reports:
Security fixes:
T169545: $wgRateLimits entry for 'user' overrides 'newbie'.
T194605: BotPasswords can bypass CentralAuth's account lock.
T187638: When a log event is (partially) hidden Special:Redirect/logid
can link to the incorrect log and reveal hidden
T193237: Special:BotPasswords should require reauthenticate.
more... | mediawiki127 mediawiki129 mediawiki130 mediawiki131
more detail |
2018-09-21 | VuXML ID 3284d948-140c-4a3e-aa76-3b440e2006a8
The Mozilla Foundation reports:
A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used.
more... | firefox firefox-esr
more detail |
2018-09-21 | VuXML ID 77f67b46-bd75-11e8-81b6-001999f8d30b
The Asterisk project reports:
There is a stack overflow vulnerability in the
res_http_websocket.so module of Asterisk that allows an
attacker to crash Asterisk via a specially crafted HTTP
request to upgrade the connection to a websocket. The
attackers request causes Asterisk to run out of stack
space and crash.
As a workaround disable HTTP websocket access by not
loading the res_http_websocket.so module.
more... | asterisk13 asterisk15
more detail |
2018-09-18 | VuXML ID 074cb225-bb2d-11e8-90e1-fcaa147e860e
moodle reports:
Moodle XML import of ddwtos could lead to intentional remote code
execution
QuickForm library remote code vulnerability (upstream)
Boost theme - blog search GET parameter insufficiently filtered
more... | moodle31 moodle33 moodle34 moodle35
more detail |
2018-09-15 | VuXML ID bf2b9c56-b93e-11e8-b2a8-a4badb296695
JSST reports: Multiple low-priority Vulnerabilities
Inadequate checks in the InputFilter class could allow specifically prepared PHAR files to pass the upload filter.
Inadequate output filtering on the user profile page could lead to a stored XSS attack.
Inadequate checks regarding disabled fields can lead to an ACL violation.
more... | joomla3
more detail |
2018-09-15* | VuXML ID c96d416a-eae7-4d5d-bc84-40deca9329fb
Mozilla Foundation reports:
CVE-2018-12377: Use-after-free in refresh driver timers
CVE-2018-12378: Use-after-free in IndexedDB
CVE-2018-12379: Out-of-bounds write with malicious MAR file
CVE-2017-16541: Proxy bypass using automount and autofs
CVE-2018-12381: Dragging and dropping Outlook email message results in page navigation
CVE-2018-12382: Addressbar spoofing with javascript URI on Firefox for Android
CVE-2018-12383: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords
CVE-2018-12375: Memory safety bugs fixed in Firefox 62
CVE-2018-12376: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2
more... | firefox firefox-esr libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2018-09-13 | VuXML ID ab38d9f8-b787-11e8-8e7a-00e04c1ea73d
mybb Team reports:
High risk: Email field SQL Injection.
Medium risk: Video MyCode Persistent XSS in Visual Editor.
Low risk: Insufficient permission check in User CP?s attachment management.
Low risk: Insufficient email address verification.
more... | mybb
more detail |
2018-09-12 | VuXML ID a67c122a-b693-11e8-ac58-a4badb2f4699
Problem Description:
Insufficient validation was performed in the ELF header
parser, and malformed or otherwise invalid ELF binaries
were not rejected as they should be.
Impact:
Execution of a malicious ELF binary may result in a
kernel crash or may disclose kernel memory.
more... | FreeBSD-kernel
more detail |
2018-09-11 | VuXML ID 337960ec-b5dc-11e8-ac58-a4badb2f4699
Chris reports:
The XML parsing engine for Plex Media Server's SSDP/UPNP
functionality is vulnerable to an XML External Entity
Processing (XXE) attack. Unauthenticated attackers on the same LAN can
use this vulnerability to:
- Access arbitrary files from the filesystem with the same permission as
the user account running Plex.
- Initiate SMB connections to capture NetNTLM challenge/response and
crack to clear-text password.
- Initiate SMB connections to relay NetNTLM challenge/response and
achieve Remote Command Execution in Windows domains.
more... | plexmediaserver plexmediaserver-plexpass
more detail |
2018-09-11 | VuXML ID db2acdac-b5a7-11e8-8f6f-00e04c1ea73d
mybb Team reports:
High risk: Image MyCode ?alt? attribute persistent XSS.
Medium risk: RSS Atom 1.0 item title persistent XSS.
more... | mybb
more detail |
2018-09-11 | VuXML ID f00acdec-b59f-11e8-805d-001e2a3f778d
MITRE reports:
An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session.
The default configuration of SDDM on FreeBSD is not affected, since it has ReuseSession=false.
more... | sddm
more detail |
2018-09-11 | VuXML ID f9d73a20-b5f0-11e8-b1da-6451062f0f7a
Adobe reports:
- This update resolves a privilege escalation vulnerability that
could lead to information disclosure (CVE-2018-15967).
more... | linux-flashplayer
more detail |
2018-09-11 | VuXML ID fe818607-b5ff-11e8-856b-485b3931c969
MITRE reports:
Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the
configuration and secret if authentication is missing and the API's port
is publicly reachable.
more... | traefik
more detail |
2018-09-05 | VuXML ID 7c750960-b129-11e8-9fcd-080027f43a02
The Gitea project reports:
[Privacy] Gitea leaks hidden email addresses #4417
A fix has been implemented in Gitea 1.5.1.
more... | gitea
more detail |
2018-09-04 | VuXML ID 30c0f878-b03e-11e8-be8a-0011d823eebd
CERT reports:
Ghostscript contains an optional -dSAFER option, which is supposed
to prevent unsafe PostScript operations. Multiple PostScript
operations bypass the protections provided by -dSAFER, which can
allow an attacker to execute arbitrary commands with arbitrary
arguments. This vulnerability can also be exploited in applications
that leverage Ghostscript, such as ImageMagick, GraphicsMagick,
evince, Okular, Nautilus, and others.
Exploit code for this vulnerability is publicly available.
more... | ghostscript9-agpl-base ghostscript9-agpl-x11
more detail |
2018-08-31 | VuXML ID 1f8d5806-ac51-11e8-9cb6-10c37b4ac2ea
Grafana Labs reports:
On the 20th of August at 1800 CEST we were contacted about a
potential security issue with the ?remember me? cookie Grafana
sets upon login. The issue targeted users without a local Grafana
password (LDAP & OAuth users) and enabled a potential attacker
to generate a valid cookie knowing only a username.
All installations which use the Grafana LDAP or OAuth
authentication features must be upgraded as soon as possible. If
you cannot upgrade, you should switch authentication mechanisms
or put additional protections in front of Grafana such as a
reverse proxy.
more... | grafana2 grafana3 grafana4 grafana5
more detail |
2018-08-30 | VuXML ID ffeb25d0-ac94-11e8-ab15-d8cb8abf62dd
Gitlab reports:
Persistent XSS in Pipeline Tooltip
GitLab.com GCP Endpoints Exposure
Persistent XSS in Merge Request Changes View
Sensitive Data Disclosure in Sidekiq Logs
Missing CSRF in System Hooks
Orphaned Upload Files Exposure
Missing Authorization Control API Repository Storage
more... | gitlab-ce
more detail |
2018-08-29 | VuXML ID d0be41fe-2a20-4633-b057-4e8b25c41780
Corelight reports:
Bro 2.5.5 primarily addresses security issues:
- Fix array bounds checking in BinPAC: for arrays
that are fields within a record, the bounds check
was based on a pointer to the start of the record
rather than the start of the array field, potentially
resulting in a buffer over-read.
- Fix SMTP command string comparisons: the number
of bytes compared was based on the user-supplied
string length and can lead to incorrect matches.
e.g. giving a command of "X" incorrectly matched
"X-ANONYMOUSTLS" (and an empty commands match
anything).
Address potential vectors for Denial of Service:
- "Weird" events are now generally suppressed/sampled
by default according to some tunable parameters.
- Improved handling of empty lines in several text
protocol analyzers that can cause performance issues
when seen in long sequences.
- Add `smtp_excessive_pending_cmds' weird which
serves as a notification for when the "pending
command" queue has reached an upper limit and been
cleared to prevent one from attempting to slowly
exhaust memory.
more... | bro
more detail |
2018-08-25 | VuXML ID 0904e81f-a89d-11e8-afbb-bc5ff4f77b71
Node.js reports:
OpenSSL: Client DoS due to large DH parameter
This fixes a potential denial of service (DoS) attack
against client connections by a malicious server. During a TLS
communication handshake, where both client and server agree to
use a cipher-suite using DH or DHE (Diffie-Hellman, in both
ephemeral and non-ephemeral modes), a malicious server can
send a very large prime value to the client. Because this has
been unbounded in OpenSSL, the client can be forced to spend
an unreasonably long period of time to generate a key,
potentially causing a denial of service.
OpenSSL: ECDSA key extraction via local side-channel
Attackers with access to observe cache-timing may be able
to extract DSA or ECDSA private keys by causing the victim to
create several signatures and watching responses. This flaw
does not have a CVE due to OpenSSL policy to not assign itself
CVEs for local-only vulnerabilities that are more academic
than practical. This vulnerability was discovered by Keegan
Ryan at NCC Group and impacts many cryptographic libraries
including OpenSSL.
Unintentional exposure of uninitialized memory
Only Node.js 10 is impacted by this flaw.
Node.js TSC member Nikita Skovoroda discovered an argument
processing flaw that causes Buffer.alloc() to return
uninitialized memory. This method is intended to be safe and
only return initialized, or cleared, memory. The third
argument specifying encoding can be passed as a number, this
is misinterpreted by Buffer's internal "fill" method as the
start to a fill operation. This flaw may be abused where
Buffer.alloc() arguments are derived from user input to return
uncleared memory blocks that may contain sensitive
information.
Out of bounds (OOB) write
Node.js TSC member Nikita Skovoroda discovered an OOB write
in Buffer that can be used to write to memory outside of a
Buffer's memory space. This can corrupt unrelated Buffer
objects or cause the Node.js process to crash.
When used with UCS-2 encoding (recognized by Node.js under
the names 'ucs2', 'ucs-2', 'utf16le' and 'utf-16le'),
Buffer#write() can be abused to write outside of the bounds of
a single Buffer. Writes that start from the second-to-last
position of a buffer cause a miscalculation of the maximum
length of the input bytes to be written.
more... | node node6 node8
more detail |
2018-08-24* | VuXML ID 0822a4cf-9318-11e8-8d88-00e04c1ea73d
mantis reports:
Teun Beijers reported a cross-site scripting (XSS) vulnerability in
the Edit Filter page which allows execution of arbitrary code
(if CSP settings permit it) when displaying a filter with a crafted
name. Prevent the attack by sanitizing the filter name before display.
Ömer C?tak, Security Researcher at Netsparker, reported this
vulnerability, allowing remote attackers to inject arbitrary code
(if CSP settings permit it) through a crafted PATH_INFO on
view_filters_page.php. Prevent the attack by sanitizing the output
of $_SERVER['PHP_SELF'] before display.
more... | mantis
more detail |
2018-08-23 | VuXML ID 2a92555f-a6f8-11e8-8acd-10c37b4ac2ea
NIST reports:
The put_chars function in html_r.c in Twibright Links 2.14 allows
remote attackers to cause a denial of service (buffer over-read)
via a crafted HTML file.
more... | links
more detail |
2018-08-22 | VuXML ID 2310b814-a652-11e8-805b-a4badb2f4699
Problem Description:
On certain Intel 64-bit x86 systems there is a period
of time during terminal fault handling where the CPU may
use speculative execution to try to load data. The CPU may
speculatively access the level 1 data cache (L1D). Data
which would otherwise be protected may then be determined
by using side channel methods.
This issue affects bhyve on FreeBSD/amd64 systems.
Impact:
An attacker executing user code, or kernel code inside
of a virtual machine, may be able to read secret data from
the kernel or from another virtual machine.
more... | FreeBSD-kernel
more detail |
2018-08-22 | VuXML ID 359e1548-a652-11e8-805b-a4badb2f4699
Problem Description:
A researcher has notified us of a DoS attack applicable
to another operating system. While FreeBSD may not be
vulnerable to that exact attack, we have identified several
places where inadequate DoS protection could allow an
attacker to consume system resources.
It is not necessary that the attacker be able to establish
two-way communication to carry out these attacks. These
attacks impact both IPv4 and IPv6 fragment reassembly.
Impact:
In the worst case, an attacker could send a stream of
crafted fragments with a low packet rate which would consume
a substantial amount of CPU.
Other attack vectors allow an attacker to send a stream
of crafted fragments which could consume a large amount of
CPU or all available mbuf clusters on the system.
These attacks could temporarily render a system unreachable
through network interfaces or temporarily render a system
unresponsive. The effects of the attack should clear within
60 seconds after the attack stops.
more... | FreeBSD-kernel
more detail |
2018-08-22 | VuXML ID 45671c0e-a652-11e8-805b-a4badb2f4699
Problem Description:
When using WPA2, EAPOL-Key frames with the Encrypted
flag and without the MIC flag set, the data field was
decrypted first without verifying the MIC. When the dta
field was encrypted using RC4, for example, when negotiating
TKIP as a pairwise cipher, the unauthenticated but decrypted
data was subsequently processed. This opened wpa_supplicant(8)
to abuse by decryption and recovery of sensitive information
contained in EAPOL-Key messages.
See
https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt
for a detailed description of the bug.
Impact:
All users of the WPA2 TKIP pairwise cipher are vulnerable
to information, for example, the group key.
more... | FreeBSD
more detail |
2018-08-22 | VuXML ID 9e205ef5-a649-11e8-b1f6-6805ca0b3d42
The phpMyAdmin development team reports:
Description
A Cross-Site Scripting vulnerability was found in the
file import feature, where an attacker can deliver a payload
to a user through importing a specially-crafted file.
Severity
We consider this attack to be of moderate severity.
more... | phpMyAdmin phpMyAdmin-php56 phpMyAdmin-php70 phpMyAdmin-php71 phpMyAdmin-php72
more detail |
2018-08-22 | VuXML ID e53a908d-a645-11e8-8acd-10c37b4ac2ea
bluecatli (Tencent's Xuanwu Lab) reports:
The function isValidRedirect in gogs/routes/user/auth.go is used in login action to validate if url is on the same site.
If the Location header startswith /\, it will be transformed to // by browsers.
more... | gogs
more detail |
2018-08-22 | VuXML ID fe99d3ca-a63a-11e8-a7c6-54e1ad3d6335
The freedesktop.org project reports:
The functions XGetFontPath, XListExtensions, and XListFonts are
vulnerable to an off-by-one override on malicious server responses.
The server replies consist of chunks consisting of a length byte
followed by actual string, which is not NUL-terminated.
While parsing the response, the length byte is overridden with '\0',
thus the memory area can be used as storage of C strings later on.
To be able to NUL-terminate the last string, the buffer is reserved
with an additional byte of space. For a boundary check, the variable
chend (end of ch) was introduced, pointing at the end of the buffer
which ch initially points to. Unfortunately there is a difference
in handling "the end of ch". While chend points at the first byte
that must not be written to, the for-loop uses chend as the last
byte that can be written to. Therefore, an off-by-one can occur.
The length value is interpreted as signed char on many systems
(depending on default signedness of char), which can lead to an out
of boundary write up to 128 bytes in front of the allocated storage,
but limited to NUL byte(s).
If the server sends a reply in which even the first string would
overflow the transmitted bytes, list[0] (or flist[0]) will be set to
NULL and a count of 0 is returned. If the resulting list is freed
with XFreeExtensionList or XFreeFontPath later on, the first Xfree
call is turned into Xfree (NULL-1) which will most likely trigger a
segmentation fault. Casting the length value to unsigned char fixes
the problem and allows string values with up to 255 characters.
more... | libX11
more detail |
2018-08-17 | VuXML ID 7762d7ad-2e38-41d2-9785-c51f653ba8bd
botan2 developers report:
A side channel in the ECDSA signature operation could allow a local attacker to recover the secret key. Found by Keegan Ryan of NCC Group.
Bug introduced in 2.5.0, fixed in 2.7.0. The 1.10 branch is not affected.
more... | botan2
more detail |
2018-08-15 | VuXML ID 6905f05f-a0c9-11e8-8335-8c164535ad80
Jenkins Security Advisory:
Description
(Low) SECURITY-637
Jenkins allowed deserialization of URL objects with host components
(Medium) SECURITY-672
Ephemeral user record was created on some invalid authentication attempts
(Medium) SECURITY-790
Cron expression form validation could enter infinite loop, potentially resulting in denial of service
(Low) SECURITY-996
"Remember me" cookie was evaluated even if that feature is disabled
(Medium) SECURITY-1071
Unauthorized users could access agent logs
(Low) SECURITY-1076
Unauthorized users could cancel scheduled restarts initiated from the update center
more... | jenkins jenkins-lts
more detail |
2018-08-14 | VuXML ID 54976998-f248-11e8-81e2-005056a311d1
The samba project reports:
All versions of Samba from 4.0.0 onwards are vulnerable to infinite
query recursion caused by CNAME loops. Any dns record can be added via
ldap by an unprivileged user using the ldbadd tool, so this is a
security issue.
When configured to accept smart-card authentication, Samba's KDC will call
talloc_free() twice on the same memory if the principal in a validly signed
certificate does not match the principal in the AS-REQ.
During the processing of an LDAP search before Samba's AD DC returns
the LDAP entries to the client, the entries are cached in a single
memory object with a maximum size of 256MB. When this size is
reached, the Samba process providing the LDAP service will follow the
NULL pointer, terminating the process.
During the processing of an DNS zone in the DNS management DCE/RPC server,
the internal DNS server or the Samba DLZ plugin for BIND9, if the
DSPROPERTY_ZONE_MASTER_SERVERS property or DSPROPERTY_ZONE_SCAVENGING_SERVERS
property is set, the server will follow a NULL pointer and terminate
A user in a Samba AD domain can crash the KDC when Samba is built in the
non-default MIT Kerberos configuration.
AD DC Configurations watching for bad passwords (to restrict brute forcing
of passwords) in a window of more than 3 minutes may not watch for bad
passwords at all.
more... | samba46 samba47 samba48 samba49
more detail |
2018-08-14 | VuXML ID 6bedc863-9fbe-11e8-945f-206a8a720317
SO-AND-SO reports:
A vulnerability was found in how wpa_supplicant processes
EAPOL-Key frames. It is possible for an attacker to modify
the frame in a way that makes wpa_supplicant decrypt the Key
Data field without requiring a valid MIC value in the frame,
i.e., without the frame being authenticated. This has a
potential issue in the case where WPA2/RSN style of EAPOL-Key
construction is used with TKIP negotiated as the pairwise
cipher. It should be noted that WPA2 is not supposed to be
used with TKIP as the pairwise cipher. Instead, CCMP is
expected to be used and with that pairwise cipher, this
vulnerability is not applicable in practice.
When TKIP is negotiated as the pairwise cipher, the EAPOL-Key
Key Data field is encrypted using RC4. This vulnerability
allows unauthenticated EAPOL-Key frames to be processed and
due to the RC4 design, this makes it possible for an attacker
to modify the plaintext version of the Key Data field with
bitwise XOR operations without knowing the contents. This can
be used to cause a denial of service attack by modifying
GTK/IGTK on the station (without the attacker learning any of
the keys) which would prevent the station from accepting
received group-addressed frames. Furthermore, this might be
abused by making wpa_supplicant act as a decryption oracle to
try to recover some of the Key Data payload (GTK/IGTK) to get
knowledge of the group encryption keys.
Full recovery of the group encryption keys requires multiple
attempts (128 connection attempts per octet) and each attempt
results in disconnection due to a failure to complete the 4-way
handshake. These failures can result in the AP/network getting
disabled temporarily or even permanently (requiring user action
to re-enable) which may make it impractical to perform the
attack to recover the keys before the AP has already changes
the group keys. By default, wpa_supplicant is enforcing at
minimum a ten second wait time between each failed connection
attempt, i.e., over 20 minutes waiting to recover each octet
while hostapd AP implementation uses 10 minute default for GTK
rekeying when using TKIP. With such timing behavior, practical
attack would need large number of impacted stations to be
trying to connect to the same AP to be able to recover
sufficient information from the GTK to be able to determine
the key before it gets changed.
more... | FreeBSD wpa_supplicant
more detail |
2018-08-14 | VuXML ID 98b603c8-9ff3-11e8-ad63-6451062f0f7a
Adobe reports:
- This update resolves out-of-bounds read vulnerabilities that
could lead to information disclosure (CVE-2018-12824,
CVE-2018-12826, CVE-2018-12827).
- This update resolves a security bypass vulnerability that
could lead to security mitigation bypass (CVE-2018-12825).
- This update resolves a component vulnerability that
could lead to privilege escalation (CVE-2018-12828).
more... | linux-flashplayer
more detail |
2018-08-14 | VuXML ID c4e9a427-9fc2-11e8-802a-000c29a1e3ec
The samba project reports:
Samba releases 4.7.0 to 4.8.3 (inclusive) contain an error which
allows authentication using NTLMv1 over an SMB1 transport (either
directory or via NETLOGON SamLogon calls from a member server), even
when NTLMv1 is explicitly disabled on the server.
Missing input sanitization checks on some of the input parameters to
LDB database layer cause the LDAP server and DNS server to crash when
following a NULL pointer.
Samba releases 3.2.0 to 4.8.3 (inclusive) contain an error in
libsmbclient that could allow a malicious server to overwrite
client heap memory by returning an extra long filename in a directory
listing.
Missing database output checks on the returned directory attributes
from the LDB database layer cause the DsCrackNames call in the DRSUAPI
server to crash when following a NULL pointer.
All versions of the Samba Active Directory LDAP server from 4.0.0
onwards are vulnerable to the disclosure of confidential attribute
values, both of attributes where the schema SEARCH_FLAG_CONFIDENTIAL
(0x80) searchFlags bit and where an explicit Access Control Entry has
been specified on the ntSecurityDescriptor.
more... | samba46 samba47 samba48
more detail |
2018-08-12 | VuXML ID 5a771686-9e33-11e8-8b2d-9cf7a8059466
CHICKEN reports:
- CVE-2017-6949: Unchecked malloc() call in SRFI-4
constructors when allocating in non-GC memory, resulting
in potential 1-word buffer overrun and/or segfault
- CVE-2017-9334: "length" crashes on improper lists
- CVE-2017-11343: The randomization factor of the symbol
table was set before the random seed was set, causing it
to have a fixed value on many platforms
more... | chicken
more detail |
2018-08-12 | VuXML ID bcf56a42-9df8-11e8-afb0-589cfc0f81b0
The Gitea project reports:
TOTP passcodes can be reused.
more... | gitea
more detail |
2018-08-11 | VuXML ID e714b7d2-39f6-4992-9f48-e6b2f5f949df
GraphicsMagick News:
Fix heap write overflow of PrimitiveInfo and PointInfo arrays. This is
another manefestation of CVE-2016-2317, which should finally be fixed
correctly due to active detection/correction of pending overflow rather
than using estimation.
more... | GraphicsMagick
more detail |
2018-08-10 | VuXML ID 96eab874-9c79-11e8-b34b-6cc21735f730
The PostgreSQL project reports:
CVE-2018-10915: Certain host connection parameters defeat
client-side security defenses
libpq, the client connection API for PostgreSQL that is also used
by other connection libraries, had an internal issue where it did not
reset all of its connection state variables when attempting to
reconnect. In particular, the state variable that determined whether
or not a password is needed for a connection would not be reset, which
could allow users of features requiring libpq, such as the "dblink" or
"postgres_fdw" extensions, to login to servers they should not be able
to access.
CVE-2018-10925: Memory disclosure and missing authorization in
`INSERT ... ON CONFLICT DO UPDATE`
An attacker able to issue CREATE TABLE can read arbitrary bytes of
server memory using an upsert (`INSERT ... ON CONFLICT DO UPDATE`)
query. By default, any user can exploit that. A user that has
specific INSERT privileges and an UPDATE privilege on at least one
column in a given table can also update other columns using a view and
an upsert query.
more... | postgresql10-server postgresql93-server postgresql94-server postgresql95-server postgresql96-server
more detail |
2018-08-10 | VuXML ID f4876dd4-9ca8-11e8-aa17-0011d823eebd
Simon Butcher reports:
- When using a CBC based ciphersuite, a remote attacker can
partially recover the plaintext.
- When using a CBC based ciphersuite, an attacker with the
ability to execute arbitrary code on the machine under attack
can partially recover the plaintext by use of cache based
side-channels.
more... | mbedtls
more detail |
2018-08-08 | VuXML ID 909be51b-9b3b-11e8-add2-b499baebfeaf
Oracle reports:
Multiple vulnerabilities have been disclosed by Oracle without
further detail. CVSS scores 7.1 - 2.7
more... | mariadb100-server mariadb101-server mariadb102-server mariadb103-server mariadb55-server mysql55-server mysql56-server mysql57-server mysql80-server percona55-server percona56-server percona57-server
more detail |
2018-08-08 | VuXML ID 9b19b6df-a4be-11e8-9366-0028f8d09152
Apache CouchDB PMC reports:
Database Administrator could achieve privilege escalation to
the account that CouchDB runs under, by abusing insufficient validation
in the HTTP API, escaping security controls implemented in previous
releases.
more... | couchdb
more detail |
2018-08-07 | VuXML ID 5786185a-9a43-11e8-b34b-6cc21735f730
The shibboleth project reports:
SAML messages, assertions, and metadata all commonly make use of the
XML Signature KeyInfo construct, which expresses information about
keys and certificates used in signing or encrypting XML.
The Apache Santuario XML Security for C++ library contained code
paths at risk of dereferencing null pointers when processing various
kinds of malformed KeyInfo hints typically found in signed or
encrypted XML. The usual effect is a crash, and in the case of the
Shibboleth SP software, a crash in the shibd daemon, which prevents
access to protected resources until the daemon is restarted.
more... | apache-xml-security-c
more detail |
2018-08-06 | VuXML ID 3c2eea8c-99bf-11e8-8bee-a4badb2f4699
Problem Description:
One of the data structures that holds TCP segments uses
an inefficient algorithm to reassemble the data. This causes
the CPU time spent on segment processing to grow linearly
with the number of segments in the reassembly queue.
Impact:
An attacker who has the ability to send TCP traffic to
a victim system can degrade the victim system's network
performance and/or consume excessive CPU by exploiting the
inefficiency of TCP reassembly handling, with relatively
small bandwidth cost.
more... | FreeBSD-kernel
more detail |
2018-08-06 | VuXML ID 9e2d0dcf-9926-11e8-a92d-0050562a4d7b
The Python Cryptographic Authority (PyCA) project reports:
finalize_with_tag() allowed tag truncation by default which can allow tag forgery in some cases. The method now enforces the min_tag_length provided to the GCM constructor
more... | py27-cryptography py34-cryptography py35-cryptography py36-cryptography py37-cryptography
more detail |
2018-08-04 | VuXML ID 06c4a79b-981d-11e8-b460-9c5c8e75236a
Jann Horn reports:
cgit_clone_objects in CGit before 1.2.1 has a directory traversal vulnerability when `enable-http-clone=1` is not turned off, as demonstrated by a cgit/cgit.cgi/git/objects/?path=../ request.
more... | cgit
more detail |
2018-08-03* | VuXML ID e309a2c7-598b-4fa6-a398-bc72fbd1d167
NVD reports:
Doorkeeper version 4.2.0 and later contains a Incorrect Access Control
vulnerability in Token revocation API's authorized method that can
result in Access tokens are not revoked for public OAuth apps, leaking
access until expiry.
more... | rubygem-doorkeeper rubygem-doorkeeper-rails5 rubygem-doorkeeper-rails50 rubygem-doorkeeper43
more detail |
2018-07-31 | VuXML ID b4f0ad36-94a5-11e8-9007-080027ac955c
Mark Sapiro reports:
A URL with a very long text listname such as
http://www.example.com/mailman/listinfo/This_is_a_long_string_with_some_phishing_text
will echo the text in the "No such list" error response. This can be used to make a potential victim think the phishing text comes from a trusted site.
This issue was discovered by Hammad Qureshi.
more... | ja-mailman mailman mailman-with-htdig
more detail |
2018-07-31 | VuXML ID ca05d9da-ac1d-4113-8a05-ffe9cd0d6160
Sinatra blog:
Sinatra had a critical vulnerability since v2.0.0. The purpose of this
release is to fix CVE-2018-11627.
The vulnerability is that XSS can be executed by using illegal parameters.
more... | rubygem-sinatra
more detail |
2018-07-28* | VuXML ID 3849e28f-8693-11e8-9610-9c5c8e75236a
Peter Wu reports:
curl might overflow a heap based memory buffer when sending data over SMTP and using a reduced read buffer.
more... | curl
more detail |
2018-07-27 | VuXML ID 07d04eef-d8e2-11e6-a071-001e67f15f5a
lshell reports:
The autocomplete feature allows users to list directories, while they do not have access to those paths (issue #109).
more... | lshell
more detail |
2018-07-27 | VuXML ID 2da838f9-9168-11e8-8c75-d8cb8abf62dd
Gitlab reports:
Markdown DoS
Information Disclosure Prometheus Metrics
CSRF in System Hooks
Persistent XSS Pipeline Tooltip
Persistent XSS in Branch Name via Web IDE
Persistent XSS in Branch Name via Web IDE
more... | gitlab-ce
more detail |
2018-07-27 | VuXML ID 5ccbb2f8-c798-11e7-a633-009c02a2ab30
MITRE reports:
Multiple vulnerabilities have been found in FFmpeg. Please refer
to CVE list for details.
Note: CVE-2017-15186 and CVE-2017-15672 affect only the 3.3 branch
before 3.3.5, CVE-2017-16840 and CVE-2017-17081 have been fixed
in 3.4.1. They're listed here for completeness of the record.
more... | ffmpeg
more detail |
2018-07-27 | VuXML ID b9c525d9-9198-11e8-beba-080027ef1a23
Google Chrome Releases reports:
42 security fixes in this release, including:
- [850350] High CVE-2018-6153: Stack buffer overflow in Skia. Reported by Zhen Zhou of NSFOCUS Security Team on 2018-06-07
- [848914] High CVE-2018-6154: Heap buffer overflow in WebGL. Reported by Omair on 2018-06-01
- [842265] High CVE-2018-6155: Use after free in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2018-05-11
- [841962] High CVE-2018-6156: Heap buffer overflow in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2018-05-10
- [840536] High CVE-2018-6157: Type confusion in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2018-05-07
- [812667] Medium CVE-2018-6150: Cross origin information disclosure in Service Workers. Reported by Rob Wu on 2018-02-15
- [805905] Medium CVE-2018-6151: Bad cast in DevTools. Reported by Rob Wu on 2018-01-25
- [805445] Medium CVE-2018-6152: Local file write in DevTools. Reported by Rob Wu on 2018-01-24
- [841280] Medium CVE-2018-6158: Use after free in Blink. Reported by Zhe Jin, Luyao Liu from Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd on 2018-05-09
- [837275] Medium CVE-2018-6159: Same origin policy bypass in ServiceWorker. Reported by Jun Kokatsu (@shhnjk) on 2018-04-26
- [839822] Medium CVE-2018-6160: URL spoof in Chrome on iOS. Reported by evi1m0 of Bilibili Security Team on 2018-05-04
- [826552] Medium CVE-2018-6161: Same origin policy bypass in WebAudio. Reported by Jun Kokatsu (@shhnjk) on 2018-03-27
- [804123] Medium CVE-2018-6162: Heap buffer overflow in WebGL. Reported by Omair on 2018-01-21
- [849398] Medium CVE-2018-6163: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-06-04
- [848786] Medium CVE-2018-6164: Same origin policy bypass in ServiceWorker. Reported by Jun Kokatsu (@shhnjk) on 2018-06-01
- [847718] Medium CVE-2018-6165: URL spoof in Omnibox. Reported by evi1m0 of Bilibili Security Team on 2018-05-30
- [835554] Medium CVE-2018-6166: URL spoof in Omnibox. Reported by Lnyas Zhang on 2018-04-21
- [833143] Medium CVE-2018-6167: URL spoof in Omnibox. Reported by Lnyas Zhang on 2018-04-15
- [828265] Medium CVE-2018-6168: CORS bypass in Blink. Reported by Gunes Acar and Danny Y. Huang of Princeton University, Frank Li of UC Berkeley on 2018-04-03
- [394518] Medium CVE-2018-6169: Permissions bypass in extension installation. Reported by Sam P on 2014-07-16
- [862059] Medium CVE-2018-6170: Type confusion in PDFium. Reported by Anonymous on 2018-07-10
- [851799] Medium CVE-2018-6171: Use after free in WebBluetooth. Reported by amazon@mimetics.ca on 2018-06-12
- [847242] Medium CVE-2018-6172: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-05-28
- [836885] Medium CVE-2018-6173: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-04-25
- [835299] Medium CVE-2018-6174: Integer overflow in SwiftShader. Reported by Mark Brand of Google Project Zero on 2018-04-20
- [826019] Medium CVE-2018-6175: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-03-26
- [666824] Medium CVE-2018-6176: Local user privilege escalation in Extensions. Reported by Jann Horn of Google Project Zero on 2016-11-18
- [826187] Low CVE-2018-6177: Cross origin information leak in Blink. Reported by Ron Masas (Imperva) on 2018-03-27
- [823194] Low CVE-2018-6178: UI spoof in Extensions. Reported by Khalil Zhani on 2018-03-19
- [816685] Low CVE-2018-6179: Local file information leak in Extensions. Reported by Anonymous on 2018-02-26
- [797461] Low CVE-2018-6044: Request privilege escalation in Extensions. Reported by Wob Wu on 2017-12-23
- [791324] Low CVE-2018-4117: Cross origin information leak in Blink. Reported by AhsanEjaz - @AhsanEjazA on 2017-12-03
- [866821] Various fixes from internal audits, fuzzing and other initiatives
more... | chromium
more detail |
2018-07-27 | VuXML ID bfda2d80-0858-11e8-ad5c-0021ccb9e74d
GNOME reports:
CVE-2017-17786 Out of bounds read / heap overflow in tga importer / function bgr2rgb.part.1
more... | gimp
more detail |
2018-07-27 | VuXML ID e97a8852-32dd-4291-ba4d-92711daff056
bleach developer reports:
Attributes that have URI values weren't properly sanitized if the
values contained character entities. Using character entities, it
was possible to construct a URI value with a scheme that was not
allowed that would slide through unsanitized.
This security issue was introduced in Bleach 2.1. Anyone using
Bleach 2.1 is highly encouraged to upgrade.
more... | py27-bleach py36-bleach
more detail |
2018-07-27 | VuXML ID f353525a-d8b8-11e6-a071-001e67f15f5a
lshell reports:
It is possible to escape lshell if an allowed command can execute an arbitrary non allowed one (issue #122).
Inappropriate parsing of commands can lead to arbitrary command execution (issue #147, #149, #151).
more... | lshell
more detail |
2018-07-26 | VuXML ID 38fec4bd-90f7-11e8-aafb-1c39475b9f84
libvips reports:
A buffer overflow was found and fixed in the libvips code
more... | vips
more detail |
2018-07-24* | VuXML ID c82ecac5-6e3f-11e8-8777-b499baebfeaf
The OpenSSL project reports:
During key agreement in a TLS handshake using a DH(E) based
ciphersuite a malicious server can send a very large prime value
to the client. This will cause the client to spend an unreasonably
long period of time generating a key for this prime resulting in a
hang until the client has finished. This could be exploited in a
Denial Of Service attack.
more... | libressl libressl-devel openssl openssl-devel
more detail |
2018-07-24 | VuXML ID efe43d2b-8f35-11e8-b9e8-dcfe074bd614
MITRE reports:
bsixel 1.8.1 has a memory leak in sixel_decoder_decode in
decoder.c, image_buffer_resize in fromsixel.c, sixel_decode_raw in
fromsixel.c and sixel_allocator_new in allocator.c
more... | libsixel
more detail |
2018-07-21 | VuXML ID dc57ad48-ecbb-439b-a4d0-5869be47684e
Mitre reports:
VideoLAN VLC media player 2.2.x is prone to a use after free
vulnerability which an attacker can leverage to execute arbitrary
code via crafted MKV files. Failed exploit attempts will likely
result in denial of service conditions.
more... | vlc vlc-qt4
more detail |
2018-07-19 | VuXML ID fe12ef83-8b47-11e8-96cc-001a4a7ec6be
NeoMutt report:
Description
CVE-2018-14349NO Response Heap Overflow
CVE-2018-14350INTERNALDATE Stack Overflow
CVE-2018-14351STATUS Literal Length relative write
CVE-2018-14352imap_quote_string off-by-one stack overflow
CVE-2018-14353imap_quote_string int underflow
CVE-2018-14354imap_subscribe Remote Code Execution
CVE-2018-14355STATUS mailbox header cache directory traversal
CVE-2018-14356POP empty UID NULL deref
CVE-2018-14357LSUB Remote Code Execution
CVE-2018-14358RFC822.SIZE Stack Overflow
CVE-2018-14359base64 decode Stack Overflow
CVE-2018-14360NNTP Group Stack Overflow
CVE-2018-14361NNTP Write 1 where via GROUP response
CVE-2018-14362POP Message Cache Directory Traversal
CVE-2018-14363NNTP Header Cache Directory Traversal
more... | mutt mutt14 neomutt
more detail |
2018-07-18 | VuXML ID 20a1881e-8a9e-11e8-bddf-d017c2ca229d
Jenkins Security Advisory:
Description
(High) SECURITY-897 / CVE-2018-1999001
Users without Overall/Read permission can have Jenkins reset parts of global configuration on the next restart
(High) SECURITY-914 / CVE-2018-1999002
Arbitrary file read vulnerability
(Medium) SECURITY-891 / CVE-2018-1999003
Unauthorized users could cancel queued builds
(Medium) SECURITY-892 / CVE-2018-1999004
Unauthorized users could initiate and abort agent launches
(Medium) SECURITY-944 / CVE-2018-1999005
Stored XSS vulnerability
(Medium) SECURITY-925 / CVE-2018-1999006
Unauthorized users are able to determine when a plugin was extracted from its JPI package
(Medium) SECURITY-390 / CVE-2018-1999007
XSS vulnerability in Stapler debug mode
more... | jenkins jenkins-lts
more detail |
2018-07-18 | VuXML ID 8b1a50ab-8a8e-11e8-add2-b499baebfeaf
The Apache project reports:
- DoS for HTTP/2 connections by crafted requests
(CVE-2018-1333). By specially crafting HTTP/2 requests, workers
would be allocated 60 seconds longer than necessary, leading to
worker exhaustion and a denial of service. (low)
- mod_md, DoS via Coredumps on specially crafted requests
(CVE-2018-8011). By specially crafting HTTP requests, the mod_md
challenge handler would dereference a NULL pointer and cause the
child process to segfault. This could be used to DoS the server.
(moderate)
more... | apache24
more detail |
2018-07-18 | VuXML ID 8fc615cc-8a66-11e8-8c75-d8cb8abf62dd
Gitlab reports:
Remote Code Execution Vulnerability in GitLab Projects Import
more... | gitlab gitlab-ce
more detail |
2018-07-18 | VuXML ID c6d1a8a6-8a91-11e8-be4d-005056925db4
Mitre reports:
ZNC before 1.7.1-rc1 does not properly validate untrusted lines
coming from the network, allowing a non-admin user to escalate his
privilege and inject rogue values into znc.conf.
ZNC before 1.7.1-rc1 is prone to a path traversal flaw via ../ in
a web skin name to access files outside of the intended skins
directories.
more... | znc
more detail |
2018-07-17 | VuXML ID a2f35081-8a02-11e8-8fa5-4437e6ad11c4
Kevin J. McCarthy reports:
Fixes a remote code injection vulnerability when "subscribing"
to an IMAP mailbox, either via $imap_check_subscribed, or via the
function in the browser menu. Mutt was generating a
"mailboxes" command and sending that along to the muttrc parser.
However, it was not escaping "`", which executes code and inserts
the result. This would allow a malicious IMAP server to execute
arbitrary code (for $imap_check_subscribed).
Fixes POP body caching path traversal vulnerability.
Fixes IMAP header caching path traversal vulnerability.
CVE-2018-14349 - NO Response Heap Overflow
CVE-2018-14350 - INTERNALDATE Stack Overflow
CVE-2018-14351 - STATUS Literal Length relative write
CVE-2018-14352 - imap_quote_string off-by-one stack overflow
CVE-2018-14353 - imap_quote_string int underflow
CVE-2018-14354 - imap_subscribe Remote Code Execution
CVE-2018-14355 - STATUS mailbox header cache directory traversal
CVE-2018-14356 - POP empty UID NULL deref
CVE-2018-14357 - LSUB Remote Code Execution
CVE-2018-14358 - RFC822.SIZE Stack Overflow
CVE-2018-14359 - base64 decode Stack Overflow
CVE-2018-14362 - POP Message Cache Directory Traversal
more... | mutt
more detail |
2018-07-17 | VuXML ID ef013039-89cd-11e8-84e9-00e04c1ea73d
Typo3 core team reports:
It has been discovered that TYPO3?s Salted Password system extension (which is a mandatory system component)
is vulnerable to Authentication Bypass when using hashing methods which are related by PHP class inheritance.
In standard TYPO3 core distributions stored passwords using the blowfish hashing algorithm can be overridden
when using MD5 as the default hashing algorithm by just knowing a valid username.
Per default the Portable PHP hashing algorithm (PHPass) is used which is not vulnerable.
Phar files (formerly known as "PHP archives") can act als self extracting archives which leads to the fact
that source code is executed when Phar files are invoked. The Phar file format is not limited to be stored
with a dedicated file extension - "bundle.phar" would be valid as well as "bundle.txt" would be. This way,
Phar files can be obfuscated as image or text file which would not be denied from being uploaded and persisted
to a TYPO3 installation. Due to a missing sanitization of user input, those Phar files can be invoked by
manipulated URLs in TYPO3 backend forms. A valid backend user account is needed to exploit this vulnerability.
In theory the attack vector would be possible in the TYPO3 frontend as well, however no functional exploit
has been identified so far.
Failing to properly dissociate system related configuration from user generated configuration,
the Form Framework (system extension "form") is vulnerable to SQL injection and Privilege Escalation.
Basically instructions can be persisted to a form definition file that were not configured to be modified -
this applies to definitions managed using the form editor module as well as direct file upload using the regular
file list module. A valid backend user account as well as having system extension form activated are needed
in order to exploit this vulnerability.
It has been discovered that the Form Framework (system extension "form") is vulnerable to Insecure Deserialization
when being used with the additional PHP PECL package ?yaml?, which is capable of unserializing YAML contents
to PHP objects. A valid backend user account as well as having PHP setting "yaml.decode_php" enabled is needed
to exploit this vulnerability.
more... | typo3-7 typo3-8
more detail |
2018-07-15 | VuXML ID fe93803c-883f-11e8-9f0c-001b216d295b
The Legion of the Bouncy Castle reports:
Release 1.60 is now available for download.
CVE-2018-1000180: issue around primality tests for RSA key pair
generation if done using only the low-level API.
CVE-2018-1000613: lack of class checking in deserialization
of XMSS/XMSS^MT private keys with BDS state information.
more... | bouncycastle15 puppetserver puppetserver5 puppetserver6
more detail |
2018-07-14 | VuXML ID bd6cf187-8710-11e8-833d-18a6f7016652
qutebrowser team reports:
Due to a CSRF vulnerability affecting the qute://settings page,
it was possible for websites to modify qutebrowser settings.
Via settings like editor.command, this possibly allowed websites
to execute arbitrary code.
more... | qutebrowser
more detail |
2018-07-11* | VuXML ID 2dde5a56-6ab1-11e8-b639-6451062f0f7a
Adobe reports:
- This update resolves a type confusion vulnerability that
could lead to arbitrary code execution (CVE-2018-4945).
- This update resolves an integer overflow vulnerability that
could lead to information disclosure (CVE-2018-5000).
- This update resolves an out-of-bounds read vulnerability that
could lead to information disclosure (CVE-2018-5001).
- This update resolves a stack-based buffer overflow vulnerability that
could lead to arbitrary code execution (CVE-2018-5002).
more... | linux-flashplayer
more detail |
2018-07-11 | VuXML ID 3c9b7698-84da-11e8-8c75-d8cb8abf62dd
The Git community reports:
Out-of-bounds reads when reading objects from a packfile
more... | libgit2
more detail |
2018-07-11* | VuXML ID 5c6f7482-3ced-11e8-b157-6451062f0f7a
Adobe reports:
- This update resolves a use-after-free vulnerability that
could lead to remote code execution (CVE-2018-4932).
- This update resolves out-of-bounds read vulnerabilities that
could lead to information disclosure (CVE-2018-4933,
CVE-2018-4934).
- This update resolves out-of-bounds write vulnerabilities that
could lead to remote code execution (CVE-2018-4935,
CVE-2018-4937).
- This update resolves a heap overflow vulnerability that
could lead to information disclosure (CVE-2018-4936).
more... | linux-flashplayer
more detail |
2018-07-11 | VuXML ID e78732b2-8528-11e8-9c42-6451062f0f7a
Adobe reports:
- This update resolves an out-of-bounds read vulnerability that
could lead to information disclosure (CVE-2018-5008).
- This update resolves a type confusion vulnerability that
could lead to arbitrary code execution (CVE-2018-5007).
more... | linux-flashplayer
more detail |
2018-07-10 | VuXML ID 1e54d140-8493-11e8-a795-0028f8d09152
Apache CouchDB PMC reports:
Database Administrator could achieve privilege escalation to
the account that CouchDB runs under, by abusing insufficient validation
in the HTTP API, escaping security controls implemented in previous
releases.
more... | couchdb
more detail |
2018-07-09 | VuXML ID d1e9d8c5-839b-11e8-9610-9c5c8e75236a
Joel Esler reports:
3 security fixes in this release:
- CVE-2017-16932: Vulnerability in libxml2 dependency (affects ClamAV on Windows only).
- CVE-2018-0360: HWP integer overflow, infinite loop vulnerability. Reported by Secunia Research at Flexera.
- CVE-2018-0361: ClamAV PDF object length check, unreasonably long time to parse relatively small file. Report
ed by aCaB.
more... | clamav
more detail |
2018-07-08 | VuXML ID 4740174c-82bb-11e8-a29a-00e04c1ea73d
wordpressdevelopers reports:
Taxonomy: Improve cache handling for term queries.
Posts, Post Types: Clear post password cookie when logging out.
Widgets: Allow basic HTML tags in sidebar descriptions on Widgets admin screen.
Community Events Dashboard: Always show the nearest WordCamp if one is coming up, even if there are multiple Meetups happening first.
Privacy: Make sure default privacy policy content does not cause a fatal error when flushing rewrite rules outside of the admin context.
more... | de-wordpress fr-wordpress ja-wordpress ru-wordpress wordpress zh_CN-wordpress zh_TW-wordpress
more detail |
2018-07-07 | VuXML ID bfd5d004-81d4-11e8-a29a-00e04c1ea73d
mybb Team reports:
High risk: Image and URL MyCode Persistent XSS
Medium risk: Multipage Reflected XSS
Low risk: ACP logs XSS
Low risk: Arbitrary file deletion via ACP?s Settings
Low risk: Login CSRF
Low risk: Non-video content embedding via Video MyCode
more... | mybb
more detail |
2018-07-07* | VuXML ID cd81806c-26e7-4d4a-8425-02724a2f48af
Mozilla Foundation reports:
CVE-2018-12359: Buffer overflow using computed size of canvas element
CVE-2018-12360: Use-after-free when using focus()
CVE-2018-12361: Integer overflow in SwizzleData
CVE-2018-12358: Same-origin bypass using service worker and redirection
CVE-2018-12362: Integer overflow in SSSE3 scaler
CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
CVE-2018-12363: Use-after-free when appending DOM nodes
CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
CVE-2018-12365: Compromised IPC child process can list local filenames
CVE-2018-12371: Integer overflow in Skia library during edge builder allocation
CVE-2018-12366: Invalid data handling during QCMS transformations
CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming
CVE-2018-12368: No warning when opening executable SettingContent-ms files
CVE-2018-12369: WebExtension security permission checks bypassed by embedded experiments
CVE-2018-12370: SameSite cookie protections bypassed when exiting Reader View
CVE-2018-5186: Memory safety bugs fixed in Firefox 61
CVE-2018-5187: Memory safety bugs fixed in Firefox 60 and Firefox ESR 60.1
CVE-2018-5188: Memory safety bugs fixed in Firefox 60, Firefox ESR 60.1, and Firefox ESR 52.9
more... | firefox firefox-esr libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2018-07-06 | VuXML ID 7764b219-8148-11e8-aa4d-000e0cd7b374
NIST reports (by search in the range 2017/01/01 - 2018/07/06):
17 security fixes in this release:
- Heap-based buffer overflow in the __zzip_get32 function in fetch.c.
- Heap-based buffer overflow in the __zzip_get64 function in fetch.c.
- Heap-based buffer overflow in the zzip_mem_entry_extra_block function
in memdisk.c.
- The zzip_mem_entry_new function in memdisk.c allows remote attackers
to cause a denial of service (out-of-bounds read and crash) via a
crafted ZIP file.
- The prescan_entry function in fseeko.c allows remote attackers to cause
a denial of service (NULL pointer dereference and crash) via crafted
ZIP file.
- The zzip_mem_entry_new function in memdisk.c cause a NULL pointer
dereference and crash via a crafted ZIP file.
- seeko.c cause a denial of service (assertion failure and crash) via a
crafted ZIP file.
- A segmentation fault caused by invalid memory access in the
zzip_disk_fread function because the size variable is not validated
against the amount of file->stored data.
- A memory alignment error and bus error in the __zzip_fetch_disk_trailer
function of zzip/zip.c.
- A bus error caused by loading of a misaligned address in the
zzip_disk_findfirst function.
- An uncontrolled memory allocation and a crash in the __zzip_parse_root_directory
function.
- An invalid memory address dereference was discovered in zzip_disk_fread
in mmapped.c.
- A memory leak triggered in the function zzip_mem_disk_new in
memdisk.c.
more... | zziplib
more detail |
2018-07-05 | VuXML ID e375ff3f-7fec-11e8-8088-28d244aee256
Mitre reports:
An integer overflow during the parsing of XML using the Expat library.
XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat
XML Parser Library) allows attackers to put the parser in an infinite
loop using a malformed external entity definition from an external DTD.
more... | expat libwww
more detail |
2018-07-03 | VuXML ID ce39379f-7eb7-11e8-ab03-00bd7f19ff09
Marlies Ruck reports:
Fix heap buffer overflow while trying to emit access log
- see references for full details.
CVE-2018-0608: Buffer overflow in H2O version 2.2.4 and
earlier allows remote attackers to execute arbitrary code or
cause a denial of service (DoS) via unspecified vectors.
more... | h2o
more detail |
2018-07-01 | VuXML ID c1630aa3-7970-11e8-8634-dcfe074bd614
MITRE reports:
SQLite databases whose schema is corrupted using a CREATE TABLE AS
statement could cause a NULL pointer dereference, related to build.c
and prepare.c.
more... | upp
more detail |
2018-06-25 | VuXML ID 739948e3-78bf-11e8-b23c-080027ac955c
Mark Sapiro reports:
Existing protections against malicious listowners injecting evil
scripts into listinfo pages have had a few more checks added.
A few more error messages have had their values HTML escaped.
The hash generated when SUBSCRIBE_FORM_SECRET is set could have been
the same as one generated at the same time for a different list and
IP address.
more... | ja-mailman mailman mailman-with-htdig
more detail |
2018-06-25 | VuXML ID b950a83b-789e-11e8-8545-d8cb8abf62dd
Gitlab reports:
Wiki XSS
Sanitize gem updates
XSS in url_for(params)
Content injection via username
Activity feed publicly displaying internal project names
Persistent XSS in charts
more... | gitlab
more detail |
2018-06-22 | VuXML ID 17cb6ff3-7670-11e8-8854-6805ca0b3d42
The phpMyAdmin development team reports:
Summary
XSS in Designer feature
Description
A Cross-Site Scripting vulnerability was found in the
Designer feature, where an attacker can deliver a
payload to a user through a specially-crafted database
name.
Severity
We consider this attack to be of moderate severity.
Summary
File inclusion and remote code execution attack
Description
A flaw has been discovered where an attacker can include
(view and potentially execute) files on the server.
The vulnerability comes from a portion of code where
pages are redirected and loaded within phpMyAdmin, and an
improper test for whitelisted pages.
An attacker must be authenticated, except in these
situations:
- $cfg['AllowArbitraryServer'] = true: attacker can
specify any host he/she is already in control of, and
execute arbitrary code on phpMyAdmin
- $cfg['ServerDefault'] = 0: this bypasses the login and
runs the vulnerable code without any authentication
Severity
We consider this to be severe. Mitigation
factor Configuring PHP with a restrictive
`open_basedir` can greatly restrict an attacker's ability to
view files on the server. Vulnerable systems should not be
run with the phpMyAdmin directives
$cfg['AllowArbitraryServer'] = true or $cfg['ServerDefault']
= 0
more... | phpmyadmin
more detail |
2018-06-21 | VuXML ID 4e07d94f-75a5-11e8-85d1-a4badb2f4699
Problem Description:
A subset of Intel processors can allow a local thread
to infer data from another thread through a speculative
execution side channel when Lazy FPU state restore is
used.
Impact:
Any local thread can potentially read FPU state information
from other threads running on the host. This could include
cryptographic keys when the AES-NI CPU feature is present.
more... | FreeBSD-kernel
more detail |
2018-06-18 | VuXML ID 25f73c47-68a8-4a30-9cbc-1ca5eea4d6ba
GraphicsMagick reports:
Multiple vulnerabilities have been found in GraphicsMagick 1.3.26
or earlier. Please refer to the CVE list for details.
more... | GraphicsMagick
more detail |
2018-06-16 | VuXML ID 3a66cb69-716f-11e8-be54-3085a9a47796
SchedMD reports:
Insecure handling of user_name and gid fields (CVE-2018-10995)
While fixes are only available for the supported 17.02 and 17.11
releases, it is believed that similar vulnerabilities do affect past
versions as well. The only resolution is to upgrade Slurm to a fixed
release.
more... | slurm-wlm
more detail |
2018-06-15 | VuXML ID 45b8e2eb-7056-11e8-8fab-63ca6e0e13a2
Node.js reports:
Denial of Service Vulnerability in HTTP/2 (CVE-2018-7161)
All versions of 8.x and later are vulnerable and the severity is
HIGH. An attacker can cause a denial of service (DoS) by causing a
node server providing an http2 server to crash. This can be
accomplished by interacting with the http2 server in a manner that
triggers a cleanup bug where objects are used in native code after
they are no longer available. This has been addressed by updating
the http2 implementation. Thanks to Jordan Zebor at F5 Networks for
reporting this issue.
Denial of Service, nghttp2 dependency (CVE-2018-1000168)
All versions of 9.x and later are vulnerable and the severity is
HIGH. Under certain conditions, a malicious client can trigger an
uninitialized read (and a subsequent segfault) by sending a
malformed ALTSVC frame. This has been addressed through an by
updating nghttp2.
Denial of Service Vulnerability in TLS (CVE-2018-7162)
All versions of 9.x and later are vulnerable and the severity is
HIGH. An attacker can cause a denial of service (DoS) by causing a
node process which provides an http server supporting TLS server to
crash. This can be accomplished by sending duplicate/unexpected
messages during the handshake. This vulnerability has been addressed
by updating the TLS implementation. Thanks to Jordan Zebor at F5
Networks all of his help investigating this issue with the Node.js
team.
Memory exhaustion DoS on v9.x (CVE-2018-7164)
Versions 9.7.0 and later are vulnerable and the severity is MEDIUM.
A bug introduced in 9.7.0 increases the memory consumed when reading
from the network into JavaScript using the net.Socket object
directly as a stream. An attacker could use this cause a denial of
service by sending tiny chunks of data in short succession. This
vulnerability was restored by reverting to the prior behaviour.
Calls to Buffer.fill() and/or Buffer.alloc() may hang (CVE-2018-7167)
Calling Buffer.fill() or Buffer.alloc() with some parameters can
lead to a hang which could result in a Denial of Service. In order
to address this vulnerability, the implementations of Buffer.alloc()
and Buffer.fill() were updated so that they zero fill instead of
hanging in these cases.
more... | node node6 node8
more detail |
2018-06-14 | VuXML ID 53eb9e1e-7014-11e8-8b1f-3065ec8fd3ec
Jason A. Donenfeld reports:
Markus Brinkmann discovered that [the] parsing of gpg command line
output with regexes isn't anchored to the beginning of the line,
which means an attacker can generate a malicious key that simply has
the verification string as part of its username.
This has a number of nasty consequences:
- an attacker who manages to write into your ~/.password-store
and also inject a malicious key into your keyring can replace
your .gpg-id key and have your passwords encrypted under
additional keys;
- if you have extensions enabled (disabled by default), an
attacker who manages to write into your ~/.password-store and
also inject a malicious key into your keyring can replace your
extensions and hence execute code.
more... | password-store
more detail |
2018-06-14* | VuXML ID 9b5162de-6f39-11e8-818e-e8e0b747a45a
GnuPG reports:
Mitigate a local side-channel attack on ECDSA signature as described in the white paper "Return on the Hidden Number Problem".
more... | libgcrypt
more detail |
2018-06-12* | VuXML ID 933654ce-17b8-11e8-90b8-001999f8d30b
The Asterisk project reports:
AST-2018-004 - When processing a SUBSCRIBE request the
res_pjsip_pubsub module stores the accepted formats present
in the Accept headers of the request. This code did not
limit the number of headers it processed despite having
a fixed limit of 32. If more than 32 Accept headers were
present the code would write outside of its memory and
cause a crash.
AST-2018-005 - A crash occurs when a number of
authenticated INVITE messages are sent over TCP or TLS
and then the connection is suddenly closed. This issue
leads to a segmentation fault.
more... | asterisk13
more detail |
2018-06-11 | VuXML ID 0137167b-6dca-11e8-a671-001999f8d30b
The Asterisk project reports:
When endpoint specific ACL rules block a SIP request
they respond with a 403 forbidden. However, if an endpoint
is not identified then a 401 unauthorized response is
sent. This vulnerability just discloses which requests
hit a defined endpoint. The ACL rules cannot be bypassed
to gain access to the disclosed endpoints.
more... | asterisk13 asterisk15
more detail |
2018-06-11 | VuXML ID f14ce57f-6dc8-11e8-a671-001999f8d30b
The Asterisk project reports:
When connected to Asterisk via TCP/TLS if the client
abruptly disconnects, or sends a specially crafted message
then Asterisk gets caught in an infinite loop while trying
to read the data stream. Thus rendering the system as
unusable.
more... | asterisk15
more detail |
2018-06-10 | VuXML ID 4cb49a23-6c89-11e8-8b33-e8e0b747a45a
Google Chrome Releases reports:
1 security fix contributed by external researchers:
- [845961] High CVE-2018-6148: Incorrect handling of CSP header. Reported by Michal Bentkowski on 2018-05-23
more... | chromium
more detail |
2018-06-08 | VuXML ID 7da0417f-6b24-11e8-84cc-002590acae31
GnuPG reports:
GnuPG did not sanitize input file names, which may then be output to
the terminal. This could allow terminal control sequences or fake
status messages to be injected into the output.
more... | gnupg gnupg1
more detail |
2018-06-08 | VuXML ID e3e68fe8-d9cb-4ba8-b09c-9e3a28588eb7
The Mozilla Foundation reports:
A heap buffer overflow can occur in the Skia library when
rasterizing paths using a maliciously crafted SVG file
with anti-aliasing turned off. This results in a
potentially exploitable crash.
more... | firefox firefox-esr linux-seamonkey seamonkey waterfox
more detail |
2018-06-06 | VuXML ID 2f4fd3aa-32f8-4116-92f2-68f05398348e
Corelight reports:
Bro 2.5.4 primarily fixes security issues
Multiple fixes and improvements to BinPAC generated code related to array parsing, with potential impact to all Bro's BinPAC-generated analyzers in the form of buffer over-reads or other invalid memory accesses depending on whether a particular analyzer incorrectly assumed that the evaulated-array-length expression is actually the number of elements that were parsed out from the input.
The NCP analyzer (not enabled by default and also updated to actually work with newer Bro APIs in the release) performed a memory allocation based directly on a field in the input packet and using signed integer storage. This could result in a signed integer overflow and memory allocations of negative or very large size, leading to a crash or memory exhaustion. The new NCP::max_frame_size tuning option now limits the maximum amount of memory that can be allocated.
more... | bro
more detail |
2018-06-05 | VuXML ID 5a1589ad-68f9-11e8-83f5-d8cb8abf62dd
The Git community reports:
Insufficient validation of submodule names
more... | libgit2 py-pygit2
more detail |
2018-06-02 | VuXML ID c7a135f4-66a4-11e8-9e63-3085a9a47796
The Git community reports:
- In affected versions of Git, code to sanity-check pathnames on
NTFS can result in reading out-of-bounds memory.
- In affected versions of Git, remote code execution can
occur. With a crafted .gitmodules file, a malicious project can
execute an arbitrary script on a machine that runs "git clone
--recurse-submodules" because submodule "names" are obtained from
this file, and then appended to $GIT_DIR/modules, leading to
directory traversal with "../" in a name. Finally, post-checkout
hooks from a submodule are executed, bypassing the intended design
in which hooks are not obtained from a remote server.
more... | git git-lite
more detail |
2018-05-31 | VuXML ID 7fc3e827-64a5-11e8-aedb-00224d821998
strongSwan security team reports:
- A denial-of-service vulnerability in the IKEv2 key derivation was fixed
if the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as
PRF (which is not FIPS-compliant). So this should only affect very specific setups,
but in such configurations all strongSwan versions since 5.0.1 may be affected.
- A denial-of-service vulnerability in the stroke plugin was fixed.
When reading a message from the socket the plugin did not check the received length.
Unless a group is configured, root privileges are required to access that socket,
so in the default configuration this shouldn't be an issue, but all strongSwan versions may be affected.
more... | strongswan
more detail |
2018-05-31 | VuXML ID 9557dc72-64da-11e8-bc32-d8cb8abf62dd
GitLab reports:
Removing public deploy keys regression
Users can update their password without entering current password
Persistent XSS - Selecting users as allowed merge request approvers
Persistent XSS - Multiple locations of user selection drop downs
include directive in .gitlab-ci.yml allows SSRF requests
Permissions issue in Merge Requests Create Service
Arbitrary assignment of project fields using "Import project"
more... | gitlab
more detail |
2018-05-30 | VuXML ID 427b0f58-644c-11e8-9e1b-e8e0b747a45a
Google Chrome Releases reports:
34 security fixes in this release, including:
- [835639] High CVE-2018-6123: Use after free in Blink. Reported by Looben Yang on 2018-04-22
- [840320] High CVE-2018-6124: Type confusion in Blink. Reported by Guang Gong of Alpha Team, Qihoo 360 on 2018-05-07
- [818592] High CVE-2018-6125: Overly permissive policy in WebUSB. Reported by Yubico, Inc on 2018-03-05
- [844457] High CVE-2018-6126: Heap buffer overflow in Skia. Reported by Ivan Fratric of Google Project Zero on 2018-05-18
- [842990] High CVE-2018-6127: Use after free in indexedDB. Reported by Looben Yang on 2018-05-15
- [841105] High CVE-2018-6128: uXSS in Chrome on iOS. Reported by Tomasz Bojarski on 2018-05-09
- [838672] High CVE-2018-6129: Out of bounds memory access in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2018-05-01
- [838402] High CVE-2018-6130: Out of bounds memory access in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2018-04-30
- [826434] High CVE-2018-6131: Incorrect mutability protection in WebAssembly. Reported by Natalie Silvanovich of Google Project Zero on 2018-03-27
- [839960] Medium CVE-2018-6132: Use of uninitialized memory in WebRTC. Reported by Ronald E. Crane on 2018-05-04
- [817247] Medium CVE-2018-6133: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-28
- [797465] Medium CVE-2018-6134: Referrer Policy bypass in Blink. Reported by Jun Kokatsu (@shhnjk) on 2017-12-23
- [823353] Medium CVE-2018-6135: UI spoofing in Blink. Reported by Jasper Rebane on 2018-03-19
- [831943] Medium CVE-2018-6136: Out of bounds memory access in V8. Reported by Peter Wong on 2018-04-12
- [835589] Medium CVE-2018-6137: Leak of visited status of page in Blink. Reported by Michael Smith (spinda.net) on 2018-04-21
- [810220] Medium CVE-2018-6138: Overly permissive policy in Extensions. Reported by Francois Lajeunesse-Robert on 2018-02-08
- [805224] Medium CVE-2018-6139: Restrictions bypass in the debugger extension API. Reported by Rob Wu on 2018-01-24
- [798222] Medium CVE-2018-6140: Restrictions bypass in the debugger extension API. Reported by Rob Wu on 2018-01-01
- [796107] Medium CVE-2018-6141: Heap buffer overflow in Skia. Reported by Yangkang (@dnpushme) and Wanglu of Qihoo360 Qex Team on 2017-12-19
- [837939] Medium CVE-2018-6142: Out of bounds memory access in V8. Reported by Choongwoo Han of Naver Corporation on 2018-04-28
- [843022] Medium CVE-2018-6143: Out of bounds memory access in V8. Reported by Guang Gong of Alpha Team, Qihoo 360 on 2018-05-15
- [828049] Low CVE-2018-6144: Out of bounds memory access in PDFium. Reported by pdknsk on 2018-04-02
- [805924] Low CVE-2018-6145: Incorrect escaping of MathML in Blink. Reported by Masato Kinugawa on 2018-01-25
- [818133] Low CVE-2018-6147: Password fields not taking advantage of OS protections in Views. Reported by Michail Pishchagin (Yandex) on 2018-03-02
- [847542] Various fixes from internal audits, fuzzing and other initiatives
more... | chromium
more detail |
2018-05-21 | VuXML ID 94599fe0-5ca3-11e8-8be1-d05099c0ae8c
ISC reports:
An error in zone database reference counting can
lead to an assertion failure if a server which is
running an affected version of BIND attempts
several transfers of a slave zone in quick
succession.
A problem with the implementation of the new
serve-stale feature in BIND 9.12 can lead to
an assertion failure in rbtdb.c, even when
stale-answer-enable is off. Additionally,
problematic interaction between the serve-stale
feature and NSEC aggressive negative caching can
in some cases cause undesirable behavior from named,
such as a recursion loop or excessive logging.
more... | bind912
more detail |
2018-05-20* | VuXML ID ab881a74-c016-4e6d-9f7d-68c8e7cedafb
xorg-server developers reports:
In the X.Org X server before 2017-06-19, a user authenticated to
an X Session could crash or execute code in the context of the X
Server by exploiting a stack overflow in the endianness conversion
of X Events.
Uninitialized data in endianness conversion in the XEvent handling
of the X.Org X Server before 2017-06-19 allowed authenticated
malicious users to access potentially privileged data from the X
server.
more... | xorg-server
more detail |
2018-05-16 | VuXML ID 04fe6c8d-2a34-4009-a81e-e7a7e759b5d2
cURL security problems:
CVE-2018-1000300: FTP shutdown response buffer overflow
curl might overflow a heap based memory buffer when closing down an
FTP connection with very long server command replies.
When doing FTP transfers, curl keeps a spare "closure handle" around
internally that will be used when an FTP connection gets shut down
since the original curl easy handle is then already removed.
FTP server response data that gets cached from the original transfer
might then be larger than the default buffer size (16 KB) allocated in
the "closure handle", which can lead to a buffer overwrite. The
contents and size of that overwrite is controllable by the server.
This situation was detected by an assert() in the code, but that was
of course only preventing bad stuff in debug builds. This bug is very
unlikely to trigger with non-malicious servers.
We are not aware of any exploit of this flaw.
CVE-2018-1000301: RTSP bad headers buffer over-read
curl can be tricked into reading data beyond the end of a heap based
buffer used to store downloaded content.
When servers send RTSP responses back to curl, the data starts out
with a set of headers. curl parses that data to separate it into a
number of headers to deal with those appropriately and to find the end
of the headers that signal the start of the "body" part.
The function that splits up the response into headers is called
Curl_http_readwrite_headers() and in situations where it can't find a
single header in the buffer, it might end up leaving a pointer pointing
into the buffer instead of to the start of the buffer which then later
on may lead to an out of buffer read when code assumes that pointer
points to a full buffer size worth of memory to use.
This could potentially lead to information leakage but most likely a
crash/denial of service for applications if a server triggers this flaw.
We are not aware of any exploit of this flaw.
more... | curl
more detail |
2018-05-11 | VuXML ID 50210bc1-54ef-11e8-95d9-9c5c8e75236a
Sebastian Ramacher reports:
A stack-based buffer over-read in the ParseRiffHeaderConfig function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service attack or possibly have unspecified other impact via a maliciously crafted RF64 file.
The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.
The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file.
Thuan Pham reports:
An issue was discovered in WavPack 5.1.0 and earlier. The WAV parser component contains a vulnerability that allows writing to memory because ParseRiffHeaderConfig in riff.c does not reject multiple format chunks.
An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks.
An issue was discovered in WavPack 5.1.0 and earlier for WAV input. Out-of-bounds writes can occur because ParseRiffHeaderConfig in riff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
more... | wavpack
more detail |
2018-05-11 | VuXML ID e457978b-5484-11e8-9b85-54ee754af08e
Google Chrome Releases reports:
4 security fixes in this release:
- [835887] Critical: Chain leading to sandbox escape.
Reported by Anonymous on 2018-04-23
- [836858] High CVE-2018-6121: Privilege Escalation in extensions
- [836141] High CVE-2018-6122: Type confusion in V8
- [833721] High CVE-2018-6120: Heap buffer overflow in PDFium.
Reported by Zhou Aiting(@zhouat1) of Qihoo 360 Vulcan Team on 2018-04-17
- [841841] Various fixes from internal audits, fuzzing and other initiatives
more... | chromium
more detail |
2018-05-10 | VuXML ID 06ab7724-0fd7-427e-a5ce-fe436302b10c
Jenkins developers report:
The agent to master security subsystem ensures that the Jenkins
master is protected from maliciously configured agents. A path
traversal vulnerability allowed agents to escape whitelisted
directories to read and write to files they should not be able to
access.
Black Duck Hub Plugin's API endpoint was affected by an XML
External Entity (XXE) processing vulnerability. This allowed an
attacker with Overall/Read access to have Jenkins parse a maliciously
crafted file that uses external entities for extraction of secrets
from the Jenkins master, server-side request forgery, or
denial-of-service attacks.
Several other lower severity issues were reported, see reference
url for details.
more... | jenkins jenkins-lts
more detail |
2018-05-09 | VuXML ID 5aefc41e-d304-4ec8-8c82-824f84f08244
Mozilla Foundation reports:
CVE-2018-5183: Backport critical security fixes in Skia
CVE-2018-5154: Use-after-free with SVG animations and clip paths
CVE-2018-5155: Use-after-free with SVG animations and text paths
CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files
CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer
CVE-2018-5159: Integer overflow and out-of-bounds write in Skia
CVE-2018-5160: Uninitialized memory use by WebRTC encoder
CVE-2018-5152: WebExtensions information leak through webRequest API
CVE-2018-5153: Out-of-bounds read in mixed content websocket messages
CVE-2018-5163: Replacing cached data in JavaScript Start-up Bytecode Cache
CVE-2018-5164: CSP not applied to all multipart content sent with multipart/x-mixed-replace
CVE-2018-5166: WebExtension host permission bypass through filterReponseData
CVE-2018-5167: Improper linkification of chrome: and javascript: content in web console and JavaScript debugger
CVE-2018-5168: Lightweight themes can be installed without user interaction
CVE-2018-5169: Dragging and dropping link text onto home button can set home page to include chrome pages
CVE-2018-5172: Pasted script from clipboard can run in the Live Bookmarks page or PDF viewer
CVE-2018-5173: File name spoofing of Downloads panel with Unicode characters
CVE-2018-5174: Windows Defender SmartScreen UI runs with less secure behavior for downloaded files in Windows 10 April 2018 Update
CVE-2018-5175: Universal CSP bypass on sites using strict-dynamic in their policies
CVE-2018-5176: JSON Viewer script injection
CVE-2018-5177: Buffer overflow in XSLT during number formatting
CVE-2018-5165: Checkbox for enabling Flash protected mode is inverted in 32-bit Firefox
CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension
CVE-2018-5180: heap-use-after-free in mozilla::WebGLContext::DrawElementsInstanced
CVE-2018-5181: Local file can be displayed in noopener tab through drag and drop of hyperlink
CVE-2018-5182: Local file can be displayed from hyperlink dragged and dropped on addressbar
CVE-2018-5151: Memory safety bugs fixed in Firefox 60
CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8
more... | firefox firefox-esr libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2018-05-09 | VuXML ID 9558d49c-534c-11e8-8177-d43d7ef03aa6
Adobe reports:
- This update resolves a type confusion vulnerability that
could lead to arbitrary code execution (CVE-2018-4944).
more... | linux-flashplayer
more detail |
2018-05-08 | VuXML ID 521ce804-52fd-11e8-9123-a4badb2f4699
Problem Description:
The MOV SS and POP SS instructions inhibit debug exceptions
until the instruction boundary following the next instruction.
If that instruction is a system call or similar instruction
that transfers control to the operating system, the debug
exception will be handled in the kernel context instead of
the user context.
Impact:
An authenticated local attacker may be able to read
sensitive data in kernel memory, control low-level operating
system functions, or may panic the system.
more... | FreeBSD-kernel
more detail |
2018-05-08 | VuXML ID 7b5a8e3b-52cc-11e8-8c7a-9c5c8e75236a
Harry Sintonen of F-Secure Corporation reports:
GNU Wget is susceptible to a malicious web server injecting arbitrary cookies to the cookie jar file.
more... | wget
more detail |
2018-05-06 | VuXML ID 5af6378b-bd88-4997-bccc-b9ba2daecdd2
A specially crafted REGISTER message with a malformed branch or
From tag triggers an off-by-one heap-based buffer overflow in the
tmx_check_pretran function in modules/tmx/tmx_pretran.c
more... | kamailio
more detail |
2018-05-05 | VuXML ID 8719b935-8bae-41ad-92ba-3c826f651219
python release notes:
Multiple vulnerabilities has been fixed in this release. Please refer to the CVE list for details.
more... | python27
more detail |
2018-05-04 | VuXML ID 83a548b5-4fa5-11e8-9a8e-001e2a3f778d
The KDE Community reports:
kwallet-pam was doing file writing and permission changing
as root that with correct timing and use of carefully
crafted symbolic links could allow a non privileged user
to become the owner of any file on the system.
more... | plasma5-kwallet-pam
more detail |
2018-05-03 | VuXML ID 89ca6f7d-4f00-11e8-9b1d-00e04c1ea73d
Drupal Security Team reports:
A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x.
This potentially allows attackers to exploit multiple attack vectors on a Drupal site,
which could result in the site being compromised. This vulnerability is related to
Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002.
Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.
more... | drupal7 drupal8
more detail |
2018-05-01 | VuXML ID 9dfe61c8-4d15-11e8-8f2f-d8cb8abf62dd
GitLab reports:
Persistent XSS in Move Issue using project namespace
Download Archive allowing unauthorized private repo access
Mattermost Updates
more... | gitlab
more detail |
2018-04-30 | VuXML ID 006bee4e-4c49-11e8-9c32-54ee754af08e
Google Chrome Releases reports:
3 security fixes in this release:
- [831963] Critical CVE-2018-6118: Use after free in Media Cache. Reported by Ned Williamson on 2018-04-12
- [837635] Various fixes from internal audits, fuzzing and other initiatives
more... | chromium
more detail |
2018-04-26 | VuXML ID 499f6b41-58db-4f98-b8e7-da8c18985eda
Gentoo reports:
quasselcore: corruption of heap metadata caused by qdatastream
leading to preauth remote code execution.
- Severity: high, by default the server port is publicly open
and the address can be requested using the /WHOIS command of IRC
protocol.
- Description: In Qdatastream protocol each object is prepended
with 4 bytes for the object size, this can be used to trigger
allocation errors.
quasselcore DDOS
- Severity: low, only impacts unconfigured quasselcore
instances.
- Description: A login attempt causes a NULL pointer dereference
when the database is not initialized.
more... | quassel quassel-core
more detail |
2018-04-24 | VuXML ID 36ff7a74-47b1-11e8-a7d6-54e1ad544088
Google Chrome Releases reports:
62 security fixes in this release:
- [826626] Critical CVE-2018-6085: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-28
- [827492] Critical CVE-2018-6086: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-30
- [813876] High CVE-2018-6087: Use after free in WebAssembly. Reported by Anonymous on 2018-02-20
- [822091] High CVE-2018-6088: Use after free in PDFium. Reported by Anonymous on 2018-03-15
- [808838] High CVE-2018-6089: Same origin policy bypass in Service Worker. Reported by Rob Wu on 2018-02-04
- [820913] High CVE-2018-6090: Heap buffer overflow in Skia. Reported by ZhanJia Song on 2018-03-12
- [771933] High CVE-2018-6091: Incorrect handling of plug-ins by Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-10-05
- [819869] High CVE-2018-6092: Integer overflow in WebAssembly. Reported by Natalie Silvanovich of Google Project Zero on 2018-03-08
- [780435] Medium CVE-2018-6093: Same origin bypass in Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-11-01
- [633030] Medium CVE-2018-6094: Exploit hardening regression in Oilpan. Reported by Chris Rohlf on 2016-08-01
- [637098] Medium CVE-2018-6095: Lack of meaningful user interaction requirement before file upload. Reported by Abdulrahman Alqabandi (@qab) on 2016-08-11
- [776418] Medium CVE-2018-6096: Fullscreen UI spoof. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-19
- [806162] Medium CVE-2018-6097: Fullscreen UI spoof. Reported by xisigr of Tencent's Xuanwu Lab on 2018-01-26
- [798892] Medium CVE-2018-6098: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-01-03
- [808825] Medium CVE-2018-6099: CORS bypass in ServiceWorker. Reported by Jun Kokatsu (@shhnjk) on 2018-02-03
- [811117] Medium CVE-2018-6100: URL spoof in Omnibox. Reported by Lnyas Zhang on 2018-02-11
- [813540] Medium CVE-2018-6101: Insufficient protection of remote debugging prototol in DevTools . Reported by Rob Wu on 2018-02-19
- [813814] Medium CVE-2018-6102: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-20
- [816033] Medium CVE-2018-6103: UI spoof in Permissions. Reported by Khalil Zhani on 2018-02-24
- [820068] Medium CVE-2018-6104: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-03-08
- [803571] Medium CVE-2018-6105: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-01-18
- [805729] Medium CVE-2018-6106: Incorrect handling of promises in V8. Reported by lokihardt of Google Project Zero on 2018-01-25
- [808316] Medium CVE-2018-6107: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-02
- [816769] Medium CVE-2018-6108: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-27
- [710190] Low CVE-2018-6109: Incorrect handling of files by FileAPI. Reported by Dominik Weber (@DoWeb_) on 2017-04-10
- [777737] Low CVE-2018-6110: Incorrect handling of plaintext files via file:// . Reported by Wenxiang Qian (aka blastxiang) on 2017-10-24
- [780694] Low CVE-2018-6111: Heap-use-after-free in DevTools. Reported by Khalil Zhani on 2017-11-02
- [798096] Low CVE-2018-6112: Incorrect URL handling in DevTools. Reported by Rob Wu on 2017-12-29
- [805900] Low CVE-2018-6113: URL spoof in Navigation. Reported by Khalil Zhani on 2018-01-25
- [811691] Low CVE-2018-6114: CSP bypass. Reported by Lnyas Zhang on 2018-02-13
- [819809] Low CVE-2018-6115: SmartScreen bypass in downloads. Reported by James Feher on 2018-03-07
- [822266] Low CVE-2018-6116: Incorrect low memory handling in WebAssembly. Reported by Jin from Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd. on 2018-03-15
- [822465] Low CVE-2018-6117: Confusing autofill settings. Reported by Spencer Dailey on 2018-03-15
- [822424] Low CVE-2018-6084: Incorrect use of Distributed Objects in Google Software Updater on MacOS. Reported by Ian Beer of Google Project Zero on 2018-03-15
more... | chromium
more detail |
2018-04-23 | VuXML ID d8382a69-4728-11e8-ba83-0011d823eebd
Simon Butcher reports:
- Defend against Bellcore glitch attacks by verifying the results
of RSA private key operations.
- Fix implementation of the truncated HMAC extension. The
previous implementation allowed an offline 2^80 brute force
attack on the HMAC key of a single, uninterrupted connection
(with no resumption of the session).
- Reject CRLs containing unsupported critical extensions. Found
by Falko Strenzke and Evangelos Karatsiolis.
- Fix a buffer overread in ssl_parse_server_key_exchange() that
could cause a crash on invalid input.
- Fix a buffer overread in ssl_parse_server_psk_hint() that could
cause a crash on invalid input.
more... | mbedtls polarssl13
more detail |
2018-04-21 | VuXML ID 57aec168-453e-11e8-8777-b499baebfeaf
Oracle reports:
MySQL Multiple Flaws Let Remote Authenticated Users Access and
Modify Data, Remote and Local Users Deny Service, and Local Users
Access Data and Gain Elevated Privileges
- A local user can exploit a flaw in the Replication component
to gain elevated privileges [CVE-2018-2755].
- A remote authenticated user can exploit a flaw in the GIS
Extension component to cause denial of service conditions
[CVE-2018-2805].
- A remote authenticated user can exploit a flaw in the InnoDB
component to cause denial of service conditions [CVE-2018-2782,
CVE-2018-2784, CVE-2018-2819].
- A remote authenticated user can exploit a flaw in the Security
Privileges component to cause denial of service conditions
[CVE-2018-2758, CVE-2018-2818].
- A remote authenticated user can exploit a flaw in the DDL
component to cause denial of service conditions
[CVE-2018-2817].
- A remote authenticated user can exploit a flaw in the Optimizer
component to cause denial of service conditions [CVE-2018-2775,
CVE-2018-2778, CVE-2018-2779, CVE-2018-2780, CVE-2018-2781,
CVE-2018-2816].
- A remote user can exploit a flaw in the Client programs
component to cause denial of service conditions [CVE-2018-2761,
CVE-2018-2773].
- A remote authenticated user can exploit a flaw in the InnoDB
component to partially modify data and cause denial of service
conditions [CVE-2018-2786, CVE-2018-2787].
- A remote authenticated user can exploit a flaw in the Optimizer
component to partially modify data and cause denial of service
conditions [CVE-2018-2812].
- A local user can exploit a flaw in the Cluster ndbcluster/plugin
component to cause denial of service conditions [CVE-2018-2877].
- A remote authenticated user can exploit a flaw in the InnoDB
component to cause denial of service conditions [CVE-2018-2759,
CVE-2018-2766, CVE-2018-2777, CVE-2018-2810].
- A remote authenticated user can exploit a flaw in the DML
component to cause denial of service conditions [CVE-2018-2839].
- A remote authenticated user can exploit a flaw in the
Performance Schema component to cause denial of service conditions
[CVE-2018-2846].
- A remote authenticated user can exploit a flaw in the Pluggable
Auth component to cause denial of service conditions
[CVE-2018-2769].
- A remote authenticated user can exploit a flaw in the Group
Replication GCS component to cause denial of service conditions
[CVE-2018-2776].
- A local user can exploit a flaw in the Connection component to
cause denial of service conditions [CVE-2018-2762].
- A remote authenticated user can exploit a flaw in the Locking
component to cause denial of service conditions [CVE-2018-2771].
- A remote authenticated user can exploit a flaw in the DDL
component to partially access data [CVE-2018-2813].
more... | mariadb100-server mariadb101-server mariadb102-server mariadb55-server mysql55-server mysql56-server mysql57-server percona55-server percona56-server percona57-server
more detail |
2018-04-20 | VuXML ID be38245e-44d9-11e8-a292-00e04c1ea73d
wordpress developers reports:
Don't treat localhost as same host by default.
Use safe redirects when redirecting the login page if SSL is forced.
Make sure the version string is correctly escaped for use in generator tags.
more... | de-wordpress fr-wordpress ja-wordpress wordpress zh_CN-wordpress zh_TW-wordpress
more detail |
2018-04-19 | VuXML ID 33174280-43fa-11e8-aad5-6cf0497db129
The Drupal security team reports:
CKEditor, a third-party JavaScript library included in Drupal
core, has fixed a cross-site scripting (XSS) vulnerability. The
vulnerability stemmed from the fact that it was possible to execute
XSS inside CKEditor when using the image2 plugin (which Drupal 8
core also uses).
more... | drupal8
more detail |
2018-04-19 | VuXML ID ac7da39b-4405-11e8-afbe-6805ca0b3d42
The phpMyAdmin development team reports:
Summary
CSRF vulnerability allowing arbitrary SQL execution
Description
By deceiving a user to click on a crafted URL, it is
possible for an attacker to execute arbitrary SQL
commands.
Severity
We consider this vulnerability to be critical.
more... | phpmyadmin
more detail |
2018-04-16 | VuXML ID 8f353420-4197-11e8-8777-b499baebfeaf
The OpenSSL project reports:
The OpenSSL RSA Key generation algorithm has been shown to be
vulnerable to a cache timing side channel attack. An attacker
with sufficient access to mount cache timing attacks during the
RSA key generation process could recover the private key.
more... | openssl openssl-devel
more detail |
2018-04-16 | VuXML ID a9e466e8-4144-11e8-a292-00e04c1ea73d
Drupal Security Team reports:
CVE-2018-7600: Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6,
and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because
of an issue affecting multiple subsystems with default or common module configurations.
more... | drupal7
more detail |
2018-04-15 | VuXML ID 41c96ffd-29a6-4dcc-9a88-65f5038fa6eb
perldelta:
CVE-2018-6797: heap-buffer-overflow (WRITE of size 1) in S_regatom
(regcomp.c)
A crafted regular expression could cause a heap buffer write overflow,
with control over the bytes written. [perl #132227]
CVE-2018-6798: Heap-buffer-overflow in Perl__byte_dump_string (utf8.c)
Matching a crafted locale dependent regular expression could cause a
heap buffer read overflow and potentially information disclosure. [perl
#132063]
CVE-2018-6913: heap-buffer-overflow in S_pack_rec
pack() could cause a heap buffer write overflow with a large item
count. [perl #131844]
more... | perl5
more detail |
2018-04-14* | VuXML ID 5b1631dc-eafd-11e6-9ac1-a4badb2f4699
TALOS reports:
An exploitable out-of-bounds write vulnerability exists in
the XMP image handling functionality of the FreeImage library.
more... | freeimage
more detail |
2018-04-14 | VuXML ID 974a6d32-3fda-11e8-aea4-001b216d295b
Robert Foggia via NetBSD GNATS reports:
The ipsec-tools racoon daemon contains a remotely exploitable computational
complexity attack when parsing and storing isakmp fragments. The implementation
permits a remote attacker to exhaust computational resources on the remote endpoint
by repeatedly sending isakmp fragment packets in a particular order such that
the worst-case computational complexity is realized in the algorithm utilized
to determine if reassembly of the fragments can take place.
more... | ipsec-tools
more detail |
2018-04-13 | VuXML ID 1fccb25e-8451-438c-a2b9-6a021e4d7a31
nghttp2 blog:
If ALTSVC frame is received by libnghttp2 and it is larger than it can
accept, the pointer field which points to ALTSVC frame payload is left
NULL. Later libnghttp2 attempts to access another field through the
pointer, and gets segmentation fault.
ALTSVC frame is defined by RFC 7838.
The largest frame size libnghttp2 accept is by default 16384 bytes.
Receiving ALTSVC frame is disabled by default. Application has to
enable it explicitly by calling
nghttp2_option_set_builtin_recv_extension_type(opt, NGHTTP2_ALTSVC).
Transmission of ALTSVC is always enabled, and it does not cause this
vulnerability.
ALTSVC frame is expected to be sent by server, and received by client
as defined in RFC 7838.
Client and server are both affected by this vulnerability if the
reception of ALTSVC frame is enabled. As written earlier, it is useless
to enable reception of ALTSVC frame on server side. So, server is
generally safe unless application accidentally enabled the reception of
ALTSVC frame.
more... | libnghttp2 nghttp2
more detail |
2018-04-13 | VuXML ID 48894ca9-3e6f-11e8-92f0-f0def167eeea
Upstream reports:
This update primarily fixes a recently discovered IMAP-cmd-injection
vulnerability caused by insufficient input validation within
the archive plugin.
Details about the vulnerability are published under CVE-2018-9846.
more... | roundcube
more detail |
2018-04-12 | VuXML ID aaba17aa-782e-4843-8a79-7756cfa2bf89
Jenkins developers report:
The Jenkins CLI sent different error responses for commands with
view and agent arguments depending on the existence of the specified
views or agents to unauthorized users. This allowed attackers to
determine whether views or agents with specified names exist.
The Jenkins CLI now returns the same error messages to unauthorized
users independent of the existence of specified view or agent
names
Some JavaScript confirmation dialogs included the item name in an
unsafe manner, resulting in a possible cross-site scripting
vulnerability exploitable by users with permission to create or
configure items.
JavaScript confirmation dialogs that include the item name now
properly escape it, so it can be safely displayed.
more... | jenkins jenkins-lts
more detail |
2018-04-07* | VuXML ID dc0c201c-31da-11e8-ac53-d8cb8abf62dd
GitLab reports:
SSRF in services and web hooks
There were multiple server-side request forgery issues in the Services feature.
An attacker could make requests to servers within the same network of the GitLab
instance. This could lead to information disclosure, authentication bypass, or
potentially code execution. This issue has been assigned
CVE-2018-8801.
Gitlab Auth0 integration issue
There was an issue with the GitLab omniauth-auth0 configuration
which resulted in the Auth0 integration signing in the wrong users.
more... | gitlab
more detail |
2018-04-05 | VuXML ID 085a087b-3897-11e8-ac53-d8cb8abf62dd
GitLab reports:
Confidential issue comments in Slack, Mattermost, and webhook integrations.
Persistent XSS in milestones data-milestone-id.
Persistent XSS in filename of merge request.
more... | gitlab
more detail |
2018-04-05 | VuXML ID a5cf3ecd-38db-11e8-8b7f-a4badb2f469b
Problem Description:
Insufficient validation of user-provided font parameters
can result in an integer overflow, leading to the use of
arbitrary kernel memory as glyph data. Characters that
reference this data can be displayed on the screen, effectively
disclosing kernel memory.
Impact:
Unprivileged users may be able to access privileged
kernel data.
Such memory might contain sensitive information, such
as portions of the file cache or terminal buffers. This
information might be directly useful, or it might be leveraged
to obtain elevated privileges in some way; for example, a
terminal buffer might include a user-entered password.
more... | FreeBSD-kernel
more detail |
2018-04-05 | VuXML ID c0c5afef-38db-11e8-8b7f-a4badb2f469b
Problem Description:
The length field of the option header does not count the
size of the option header itself. This causes a problem
when the length is zero, the count is then incremented by
zero, which causes an infinite loop.
In addition there are pointer/offset mistakes in the
handling of IPv4 options.
Impact:
A remote attacker who is able to send an arbitrary packet,
could cause the remote target machine to crash.
more... | FreeBSD-kernel
more detail |
2018-03-31* | VuXML ID 23f59689-0152-42d3-9ade-1658d6380567
The Mozilla Foundation reports:
CVE-2018-5148: Use-after-free in compositor
A use-after-free vulnerability can occur in the
compositor during certain graphics operations when a raw
pointer is used instead of a reference counted one. This
results in a potentially exploitable crash.
more... | firefox firefox-esr libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2018-03-31* | VuXML ID 7943794f-707f-4e31-9fea-3bbf1ddcedc1
The Mozilla Foundation reports:
CVE-2018-5146: Out of bounds memory write in libvorbis
An out of bounds memory write while processing Vorbis
audio data was reported through the Pwn2Own contest.
CVE-2018-5147: Out of bounds memory write in libtremor
The libtremor library has the same flaw as
CVE-2018-5146. This library is used by Firefox in place of
libvorbis on Android and ARM platforms.
more... | firefox firefox-esr libtremor libvorbis libxul linux-firefox linux-seamonkey linux-thunderbird seamonkey thunderbird waterfox
more detail |
2018-03-31 | VuXML ID cdb4d962-34f9-11e8-92db-080027907385
moodle reports:
Unauthenticated users can trigger custom messages to admin via
paypal enrol script.
Suspended users with OAuth 2 authentication method can still log in to
the site.
more... | moodle31 moodle32 moodle33 moodle34
more detail |
2018-03-29 | VuXML ID eb69bcf2-18ef-4aa2-bb0c-83b263364089
Ruby news:
CVE-2017-17742: HTTP response splitting in WEBrick
If a script accepts an external input and outputs it without
modification as a part of HTTP responses, an attacker can use newline
characters to deceive the clients that the HTTP response header is
stopped at there, and can inject fake HTTP responses after the newline
characters to show malicious contents to the clients.
CVE-2018-6914: Unintentional file and directory creation with
directory traversal in tempfile and tmpdir
Dir.mktmpdir method introduced by tmpdir library accepts the prefix
and the suffix of the directory which is created as the first parameter.
The prefix can contain relative directory specifiers "../", so this
method can be used to target any directory. So, if a script accepts an
external input as the prefix, and the targeted directory has
inappropriate permissions or the ruby process has inappropriate
privileges, the attacker can create a directory or a file at any
directory.
CVE-2018-8777: DoS by large request in WEBrick
If an attacker sends a large request which contains huge HTTP headers,
WEBrick try to process it on memory, so the request causes the
out-of-memory DoS attack.
CVE-2018-8778: Buffer under-read in String#unpack
String#unpack receives format specifiers as its parameter, and can
be specified the position of parsing the data by the specifier @. If a
big number is passed with @, the number is treated as the negative
value, and out-of-buffer read is occurred. So, if a script accepts an
external input as the argument of String#unpack, the attacker can read
data on heaps.
CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in
UNIXServer and UNIXSocket
UNIXServer.open accepts the path of the socket to be created at the
first parameter. If the path contains NUL (\0) bytes, this method
recognize that the path is completed before the NUL bytes. So, if a
script accepts an external input as the argument of this method, the
attacker can make the socket file in the unintentional path. And,
UNIXSocket.open also accepts the path of the socket to be created at
the first parameter without checking NUL bytes like UNIXServer.open.
So, if a script accepts an external input as the argument of this
method, the attacker can accepts the socket file in the unintentional
path.
CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte
in Dir
Dir.open, Dir.new, Dir.entries and Dir.empty? accept the path of the
target directory as their parameter. If the parameter contains NUL (\0)
bytes, these methods recognize that the path is completed before the
NUL bytes. So, if a script accepts an external input as the argument of
these methods, the attacker can make the unintentional directory
traversal.
more... | ruby
more detail |
2018-03-28* | VuXML ID 0f66b901-715c-11e7-ad1f-bcaec565249c
The Webkit gtk team reports:
Please reference CVE/URL list for details
more... | webkit2-gtk3
more detail |
2018-03-28* | VuXML ID 1ce95bc7-3278-11e8-b527-00012e582166
The WebKit team reports many vulnerabilities.
Please reference the CVE/URL list for details.
more... | webkit2-gtk3
more detail |
2018-03-28* | VuXML ID 5a9bbb6e-32d3-11e8-a769-6daaba161086
Node.js reports:
Node.js Inspector DNS rebinding vulnerability (CVE-2018-7160)
Node.js 6.x and later include a debugger protocol (also known as "inspector") that can be activated by the --inspect and related command line flags. This debugger service was vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution.
'path' module regular expression denial of service (CVE-2018-7158)
The 'path' module in the Node.js 4.x release line contains a potential regular expression denial of service (ReDoS) vector. The code in question was replaced in Node.js 6.x and later so this vulnerability only impacts all versions of Node.js 4.x.
Spaces in HTTP Content-Length header values are ignored (CVE-2018-7159)
The HTTP parser in all current versions of Node.js ignores spaces in the Content-Length header, allowing input such as Content-Length: 1 2 to be interpreted as having a value of 12. The HTTP specification does not allow for spaces in the Content-Length value and the Node.js HTTP parser has been brought into line on this particular difference.
more... | node node4 node6 node8
more detail |
2018-03-27 | VuXML ID 3ae21918-31e3-11e8-927b-e8e0b747a45a
Google Chrome Releases reports:
1 security fix in this release, including:
- [823553] Various fixes from internal audits, fuzzing and other initiatives
more... | chromium
more detail |
2018-03-27 | VuXML ID b7cff5a9-31cc-11e8-8f07-b499baebfeaf
The OpenSSL project reports:
- Constructed ASN.1 types with a recursive definition could
exceed the stack (CVE-2018-0739)
Constructed ASN.1 types with a recursive definition (such as can be
found in PKCS7) could eventually exceed the stack given malicious input
with excessive recursion. This could result in a Denial Of Service
attack. There are no such structures used within SSL/TLS that come from
untrusted sources so this is considered safe.
- rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
There is an overflow bug in the AVX2 Montgomery multiplication
procedure used in exponentiation with 1024-bit moduli. This only
affects processors that support the AVX2 but not ADX extensions
like Intel Haswell (4th generation).
more... | openssl openssl-devel
more detail |
2018-03-27* | VuXML ID f38187e7-2f6e-11e8-8f07-b499baebfeaf
The Apache httpd reports:
Out of bound write in mod_authnz_ldap with AuthLDAPCharsetConfig
enabled (CVE-2017-15710)
mod_session: CGI-like applications that intend to read from
mod_session's 'SessionEnv ON' could be fooled into reading
user-supplied data instead. (CVE-2018-1283)
mod_cache_socache: Fix request headers parsing to avoid a possible
crash with specially crafted input data. (CVE-2018-1303)
core: Possible crash with excessively long HTTP request headers.
Impractical to exploit with a production build and production
LogLevel. (CVE-2018-1301)
core: Configure the regular expression engine to match '$' to the
end of the input string only, excluding matching the end of any
embedded newline characters. Behavior can be changed with new
directive 'RegexDefaultOptions'. (CVE-2017-15715)
mod_auth_digest: Fix generation of nonce values to prevent replay
attacks across servers using a common Digest domain. This change
may cause problems if used with round robin load balancers.
(CVE-2018-1312)
mod_http2: Potential crash w/ mod_http2. (CVE-2018-1302)
more... | apache22 apache24
more detail |
2018-03-25* | VuXML ID 3d950687-b4c9-4a86-8478-c56743547af8
NVD reports:
The decode_ihdr_chunk function in libavcodec/pngdec.c in
FFmpeg before 2.7.2 does not enforce uniqueness of the IHDR
(aka image header) chunk in a PNG image, which allows remote
attackers to cause a denial of service (out-of-bounds array
access) or possibly have unspecified other impact via a
crafted image with two or more of these chunks.
Multiple integer underflows in the ff_mjpeg_decode_frame
function in libavcodec/mjpegdec.c in FFmpeg before 2.7.2
allow remote attackers to cause a denial of service
(out-of-bounds array access) or possibly have unspecified
other impact via crafted MJPEG data.
The ff_sbr_apply function in libavcodec/aacsbr.c in
FFmpeg before 2.7.2 does not check for a matching AAC frame
syntax element before proceeding with Spectral Band
Replication calculations, which allows remote attackers to
cause a denial of service (out-of-bounds array access) or
possibly have unspecified other impact via crafted AAC
data.
The ff_mpv_common_init function in libavcodec/mpegvideo.c
in FFmpeg before 2.7.2 does not properly maintain the
encoding context, which allows remote attackers to cause a
denial of service (invalid pointer access) or possibly have
unspecified other impact via crafted MPEG data.
The destroy_buffers function in libavcodec/sanm.c in
FFmpeg before 2.7.2 does not properly maintain height and
width values in the video context, which allows remote
attackers to cause a denial of service (segmentation
violation and application crash) or possibly have
unspecified other impact via crafted LucasArts Smush video
data.
The allocate_buffers function in libavcodec/alac.c in
FFmpeg before 2.7.2 does not initialize certain context
data, which allows remote attackers to cause a denial of
service (segmentation violation) or possibly have
unspecified other impact via crafted Apple Lossless Audio
Codec (ALAC) data.
The sws_init_context function in libswscale/utils.c in
FFmpeg before 2.7.2 does not initialize certain pixbuf data
structures, which allows remote attackers to cause a denial
of service (segmentation violation) or possibly have
unspecified other impact via crafted video data.
The ff_frame_thread_init function in
libavcodec/pthread_frame.c in FFmpeg before 2.7.2 mishandles
certain memory-allocation failures, which allows remote
attackers to cause a denial of service (invalid pointer
access) or possibly have unspecified other impact via a
crafted file, as demonstrated by an AVI file.
The ff_rv34_decode_init_thread_copy function in
libavcodec/rv34.c in FFmpeg before 2.7.2 does not initialize
certain structure members, which allows remote attackers to
cause a denial of service (invalid pointer access) or
possibly have unspecified other impact via crafted (1) RV30
or (2) RV40 RealVideo data.
more... | avidemux avidemux2 avidemux26 ffmpeg ffmpeg-011 ffmpeg-devel ffmpeg0 ffmpeg1 ffmpeg2 ffmpeg23 ffmpeg24 ffmpeg25 ffmpeg26 gstreamer-ffmpeg gstreamer1-libav handbrake kodi libav mencoder mplayer mythtv mythtv-frontend plexhometheater
more detail |
2018-03-25* | VuXML ID 4bae544d-06a3-4352-938c-b3bcbca89298
NVD reports:
The ff_dwt_decode function in libavcodec/jpeg2000dwt.c in
FFmpeg before 2.8.4 does not validate the number of
decomposition levels before proceeding with Discrete Wavelet
Transform decoding, which allows remote attackers to cause a
denial of service (out-of-bounds array access) or possibly
have unspecified other impact via crafted JPEG 2000
data.
The ff_get_buffer function in libavcodec/utils.c in
FFmpeg before 2.8.4 preserves width and height values after
a failure, which allows remote attackers to cause a denial
of service (out-of-bounds array access) or possibly have
unspecified other impact via a crafted .mov file.
more... | avidemux avidemux2 avidemux26 ffmpeg ffmpeg-011 ffmpeg-devel ffmpeg0 ffmpeg1 ffmpeg2 ffmpeg23 ffmpeg24 ffmpeg25 ffmpeg26 gstreamer-ffmpeg handbrake kodi libav mencoder mplayer mythtv mythtv-frontend plexhometheater
more detail |
2018-03-25* | VuXML ID 7f9b696f-f11b-11e6-b50e-5404a68ad561
FFmpeg security reports:
FFmpeg 3.2.4 fixes the following vulnerabilities:
CVE-2017-5024, CVE-2017-5025
more... | ffmpeg mythtv mythtv-frontend
more detail |
2018-03-25* | VuXML ID 80c66af0-d1c5-449e-bd31-63b12525ff88
NVD reports:
The msrle_decode_pal4 function in msrledec.c in Libav
before 10.7 and 11.x before 11.4 and FFmpeg before 2.0.7,
2.2.x before 2.2.15, 2.4.x before 2.4.8, 2.5.x before 2.5.6,
and 2.6.x before 2.6.2 allows remote attackers to have
unspecified impact via a crafted image, related to a pixel
pointer, which triggers an out-of-bounds array access.
more... | avidemux avidemux26 ffmpeg ffmpeg1 ffmpeg23 ffmpeg24 ffmpeg25 ffmpeg26 gstreamer1-libav handbrake kodi libav mencoder mplayer mythtv mythtv-frontend
more detail |
2018-03-25* | VuXML ID b0da85af-21a3-4c15-a137-fe9e4bc86002
NVD reports:
The update_dimensions function in libavcodec/vp8.c in
FFmpeg through 2.8.1, as used in Google Chrome before
46.0.2490.71 and other products, relies on a
coefficient-partition count during multi-threaded operation,
which allows remote attackers to cause a denial of service
(race condition and memory corruption) or possibly have
unspecified other impact via a crafted WebM file.
The ljpeg_decode_yuv_scan function in
libavcodec/mjpegdec.c in FFmpeg before 2.8.2 omits certain
width and height checks, which allows remote attackers to
cause a denial of service (out-of-bounds array access) or
possibly have unspecified other impact via crafted MJPEG
data.
The ff_hevc_parse_sps function in libavcodec/hevc_ps.c in
FFmpeg before 2.8.2 does not validate the Chroma Format
Indicator, which allows remote attackers to cause a denial
of service (out-of-bounds array access) or possibly have
unspecified other impact via crafted High Efficiency Video
Coding (HEVC) data.
The decode_uncompressed function in libavcodec/faxcompr.c
in FFmpeg before 2.8.2 does not validate uncompressed runs,
which allows remote attackers to cause a denial of service
(out-of-bounds array access) or possibly have unspecified
other impact via crafted CCITT FAX data.
The init_tile function in libavcodec/jpeg2000dec.c in
FFmpeg before 2.8.2 does not enforce minimum-value and
maximum-value constraints on tile coordinates, which allows
remote attackers to cause a denial of service (out-of-bounds
array access) or possibly have unspecified other impact via
crafted JPEG 2000 data.
The jpeg2000_read_main_headers function in
libavcodec/jpeg2000dec.c in FFmpeg before 2.6.5, 2.7.x
before 2.7.3, and 2.8.x through 2.8.2 does not enforce
uniqueness of the SIZ marker in a JPEG 2000 image, which
allows remote attackers to cause a denial of service
(out-of-bounds heap-memory access) or possibly have
unspecified other impact via a crafted image with two or
more of these markers.
Integer overflow in the ff_ivi_init_planes function in
libavcodec/ivi.c in FFmpeg before 2.6.5, 2.7.x before 2.7.3,
and 2.8.x through 2.8.2 allows remote attackers to cause a
denial of service (out-of-bounds heap-memory access) or
possibly have unspecified other impact via crafted image
dimensions in Indeo Video Interactive data.
The smka_decode_frame function in libavcodec/smacker.c in
FFmpeg before 2.6.5, 2.7.x before 2.7.3, and 2.8.x through
2.8.2 does not verify that the data size is consistent with
the number of channels, which allows remote attackers to
cause a denial of service (out-of-bounds array access) or
possibly have unspecified other impact via crafted Smacker
data.
more... | avidemux avidemux2 avidemux26 ffmpeg ffmpeg-011 ffmpeg-devel ffmpeg0 ffmpeg1 ffmpeg2 ffmpeg23 ffmpeg24 ffmpeg25 ffmpeg26 gstreamer-ffmpeg handbrake kodi libav mencoder mplayer mythtv mythtv-frontend plexhometheater
more detail |
2018-03-25* | VuXML ID da434a78-e342-4d9a-87e2-7497e5f117ba
NVD reports:
Use-after-free vulnerability in the ff_h264_free_tables
function in libavcodec/h264.c in FFmpeg before 2.3.6 allows
remote attackers to cause a denial of service or possibly
have unspecified other impact via crafted H.264 data in an
MP4 file, as demonstrated by an HTML VIDEO element that
references H.264 data.
more... | ffmpeg ffmpeg1 ffmpeg23 ffmpeg24 ffmpeg25 gstreamer1-libav handbrake libav mythtv mythtv-frontend
more detail |
2018-03-25* | VuXML ID ed73829d-af6d-11e7-a633-009c02a2ab30
FFmpeg security reports:
Multiple vulnerabilities have been fixed in FFmpeg 3.3.4. Please refer to the CVE list for details.
more... | ffmpeg mythtv mythtv-frontend
more detail |
2018-03-24 | VuXML ID 81946ace-6961-4488-a164-22d58ebc8d66
OSS-Security list:
There is a possible XSS vulnerability in rails-html-sanitizer. The gem
allows non-whitelisted attributes to be present in sanitized output
when input with specially-crafted HTML fragments, and these attributes
can lead to an XSS attack on target applications.
This issue is similar to CVE-2018-8048 in Loofah.
more... | rubygem-rails-html-sanitizer
more detail |
2018-03-24 | VuXML ID d50a50a2-2f3e-11e8-86f8-00e04c1ea73d
mybb Team reports:
Medium risk: Tasks Local File Inclusion
Medium risk: Forum Password Check Bypass
Low risk: Admin Permissions Group Title XSS
Low risk: Attachment types file extension XSS
Low risk: Moderator Tools XSS
Low risk: Security Questions XSS
Low risk: Settings Management XSS
Low risk: Templates Set Name XSS
Low risk: Usergroup Promotions XSS
Low risk: Warning Types XSS
more... | mybb
more detail |
2018-03-22 | VuXML ID 6d52bda1-2e54-11e8-a68f-485b3931c969
MITRE reports:
SQLite databases whose schema is corrupted using |