AERAsec - Network Security - Current Security Messages [PDF]

Latest Security Messages - presented by AERAsec.

8 downloads 22 Views 298KB Size

Recommend Stories


Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

Network Security
Happiness doesn't result from what we get, but from what we give. Ben Carson

Network Security
I want to sing like the birds sing, not worrying about who hears or what they think. Rumi

Network & Security
Don't count the days, make the days count. Muhammad Ali

Network Security- Current Status and Future Directions
Learning never exhausts the mind. Leonardo da Vinci

[PDF] Cryptography and Network Security
Never let your sense of morals prevent you from doing what is right. Isaac Asimov

[PDF] Download Network Security Assessment
Goodbyes are only for those who love with their eyes. Because for those who love with heart and soul

[PDF] Cryptography and Network Security
Be grateful for whoever comes, because each has been sent as a guide from beyond. Rumi

PDF Cryptography and Network Security
Just as there is no loss of basic energy in the universe, so no thought or action is without its effects,

Security Issues on Cryptography and Network Security
Those who bring sunshine to the lives of others cannot keep it from themselves. J. M. Barrie

Idea Transcript


After nearly 20 years of security news this service is discontinued. Some reasons are the very high number of vulnerabilities combined with automatically updating systems. So the necessity of this service is depreciated. We hope that you understand this decision. Please visit us also at http://www.tufin.club!



Most of the links lead to the corresponding files at CERT or other organisations. So changes take place immediately, especially which patches should be installed or which changes in the configuration should be made to avoid this vulnerability. Some of the files are transferred by FTP.



By the way: If we're not publishing well-known risks inheritant in any widely used platform or program that doesn't mean this particular platform or program is safe to use!



Here you find our network security search engine!



This is some information you send: Your Browser Mozilla/5.0 (Unknown; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) PhantomJS/2.1.1 Safari/538.1



Your IP address (no reverse DNS resolution) [185.191.229.108] Your referer (filtered or not existing)



Current month, Last month, Last 10 messages, Last 20 messages (index only)



Chosen month 03 / 2015

System: Cisco Topic: Vulnerability in Cisco Videoscape Distribution Suite for Internet Streaming Links: Cisco, CVE-2015-0671, ESB-2015.0819 ID: ae-201503-111

A vulnerability in the DNS subsystem of the Cisco Videoscape Distribution Suite for Internet Streaming (VDS-IS) used by Cisco services routers could allow an unauthenticated, remote attacker to cause a Denial-of-Service (DoS) condition. The vulnerability is due to insufficient validation of specific packets processed by the affected software. Updates are available via the normal support channels.

System: Many Topic: Vulnerabilities in Apache Subversion Links: Apache, Apache, CVE-2015-0248, CVE-2015-0251, ESB-2015.0818 ID: ae-201503-110 Some vulnerabilities have been found in Apache Subversion. They can be exploited by remote and unauthenticated attackers to conduct Denial-of-Service attacks. Users with an existing account might be able to provide misleading information. Updated packages are available.

System: Debian GNU/Linux Topic: Vulnerabilities in wireshark Links: DSA-3210, CVE-2015-2188, CVE-2015-2189, CVE-2015-2191, ESB-2015.0816 ID: ae-201503-109 Wireshark is a widely used tool for analyzing network traffic. Multiple vulnerabilities were discovered in the dissectors/parsers for WCP, pcapng and TNEF, which could result in Denial-ofService. Updated packages are available.

System: Several Topic: Vulnerabilities in IBM Domino LDAP Server Links: IBM swg21700029, CVE-2015-0117, CVE-2015-0134, CVE-2015-0179, ESB-2015.0808 ID: ae-201503-108 IBM Domino could allow a remote attacker to execute arbitrary code on the system, caused by an error in the LDAP server. An attacker could exploit this vulnerability to corrupt memory to execute arbitrary code on the system. IBM Domino is vulnerable to a buffer overflow. An attacker could overflow a buffer and execute arbitrary code on the system administrator privileges or cause the server to crash. Additionally, IBM Notes and Domino NSD could allow an authenticated local user without adminstrative privileges to gain System privilege. Fixes are available and should be applied.

System: Red Hat Enterprise Linux Topic: Vulnerabilities in libxml2, postgresql, kernel-rt, and openssl Links: RHSA-2015-0749, CVE-2014-0191, ESB-2015.0797, RHSA-2015-0750, CVE-2014-8161, CVE-2015-0241, CVE-2015-0243, CVE-2015-0244, ESB-2015.0798, RHSA-2015-0751, CVE-2014-8159, CVE-2015-1421, ESB-2015.0799, RHSA-2015-0752, CVE-2015-0209, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0292, CVE-2015-0293, ESB2015.0800 ID: ae-201503-107 The libxml2 library is a development toolbox providing the implementation of various XML standards. It has been discovered that libxml2 loads external parameter entities even when entity substitution is disabled. A remote attacker able to provide a specially crafted XML file to an application linked against libxml2 could use this flaw to conduct XML External Entity (XXE)attacks, possibly resulting in a Denial-of-Service or an information leak on the system. PostgreSQL is an advanced object-relational database management system (DBMS). Several vulnerabilities have been found that can be exploited by authenticated users. Consequences might be DoS, but also arbitrary code execution as well as access to privileged data. The kernel packages contain the Linux kernel, the core of any Linux operating system. Updates are available for Red Hat Enterprise MRG 2.5, because vulnerabilities have been found that can be exploited by authenticated users to conduct a DoS or to compromise the account of root. Several vulnerabilities have been found in OpenSSL, allowing several attack vectors leading to DoS. Updated packages are available.

System: Microsoft Windows 7 Topic: Vulnerability in HP PCs and Workstations Links: HPSBHF03271, CVE-2015-1170, ESB-2015.0796 ID: ae-201503-106 A potential security vulnerability has been identified with certain HP PCs and workstations running Windows 7 and NVidia Graphics Driver. This vulnerability could be exploited resulting in elevation of privileges. HP has provided NVidia driver updates.

System: Debian GNU/Linux Topic: Vulnerabilities in openLDAP Links: DSA-3209, CVE-2013-4449, CVE-2014-9713, CVE-2015-1545, ESB-2015.0794 ID: ae-201503-105 OpenLDAP is a free implementation of the Lightweight Directory Access Protocol. The default Debian configuration of the directory database allows every users to edit their own attributes. When LDAP directories are used for access control, and this is done using user attributes, an authenticated user can leverage this to gain access to unauthorized resources. Additionally, a Denial-of-Service vulnerability has been found in slapd. When using the deref overlay, providing an empty attribute list in a query makes the daemon crashes. Updated packages are available.

System: Cisco Topic: Vulnerability in Cisco Unified Call Manager Links: Cisco, CVE-2015-0680, ESB-2015.0774 ID: ae-201503-104 A vulnerability in Cisco Unified Call Manager (Cisco Unified CM) could allow an authenticated, remote attacker to retrieve arbitrary files. The vulnerability is due to improper security restrictions by the affected application while handling requests for resources. Updates are available via the normal support channels.

System: Cisco Topic: Vulnerability in Cisco Wireless LAN Controller Links: Cisco, CVE-2015-0679, ESB-2015.0773 ID: ae-201503-103 A vulnerability in the web authentication feature of Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, adjacent attacker to cause a Denial-of-Service (DoS) condition. The vulnerability is due to the improper handling of ill-formed passwords by the web authentication feature used by the affected software. Updates are available via the normal support channels.

System: Several Topic: Vulnerability in Cisco Mobility Services Engine Links: Cisco, CVE-2015-0673, ESB-2015.0772 ID: ae-201503-102 A vulnerability in the Cisco Mobility Services Engine (MSE) could allow an authenticated, remote attacker to gain access to sensitive information. The vulnerability is due to insufficient security restrictions imposed by the affected software. Updates are available via the normal support channels.

System: Cisco Topic: Vulnerability in Cisco ASR 9000 Series Links: Cisco, CVE-2015-0672, ESB-2015.0771 ID: ae-201503-101 A vulnerability in the DHCP process of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause a Denial-of-Service (DoS) condition. The vulnerability is due to improper processing of crafted DHCP messages on a targeted interface of an affected device. Updates are available via the normal support channels.

System: Cisco Topic: Vulnerability in Cisco NX-OS Software Links: Cisco, CVE-2015-0658, ESB-2015.0770 ID: ae-201503-100 A vulnerability in DHCP code used with PowerOn Auto Provisioning (POAP) of Cisco NX-OS could allow an unauthenticated, adjacent attacker to inject arbitrary commands into the Cisco NX-OS device. The vulnerability is due to insufficient input validation of the DHCP options returned as a result of POAP. Updates are available via the normal support channels.

System: Debian GNU/Linux Topic: Vulnerabilities in batik, dulwich, shibboleth-sp2, and freexl Links: DSA-3205, CVE-2015-0250, ESB-2015.0766, DSA-3206, CVE-2014-9706, CVE-2015-0838, ESB-2015.0767, DSA-3207, CVE-2015-2684, ESB-2015.0768, DSA-3208, CVE-2015-2753, CVE-2015-2754, CVE-2015-2776, ESB-2015.0769 ID: ae-201503-099 Batik is a toolkit for processing SVG images. It shows a vulnerability which might allow access to arbitrary files when a crafted SVG file is opened by a user. Two vulnerabilities have been found Dulwich, a Python implementation of the file formats and protocols used by the Git version. It allows writing to files under .git/ when checking out working trees. This could lead to the execution of arbitrary code with the privileges of the user running an application based on Dulwich. Besides this, a buffer overflow in the function apply_delta() when accssing Git objects in pack files might accour. An attacker could take advantage of this flaw to cause the execution of arbitrary code with the privileges of the user running a Git server or client based on Dulwich. A Denial-of-Service (DoS) vulnerability was found in the Shibboleth Service Provider. When processing certain malformed SAML message generated by an authenticated attacker, the daemon could crash. Multiple vulnerabilities in freexl, a library to read Microsoft Excel spreadsheets, which might result in DoS or the execution of arbitrary code if a malformed Excel file is opened. Updated packages are available.

System: Several Topic: Vulnerability in Shibboleth Identity Provider Links: Shibboleth 20150326, ESB-2015.0753 ID: ae-201503-098 An error handling flaw in V3.0.0 and V3.1.0 of the Shibboleth Identity Provider software can lead to heap exhaustion and CPU consumption when connections to the server are interrupted unexpectedly. This flaw is present in the V3 software only, and does not affect the older V2 Identity Provider software. Upgrade to IdP V3.1.1 or greater is recommended.

System: Red Hat Enterprise Linux Topic: Vulnerabilities in ipa / slapi-nis and setroubleshoot Links: RHSA-2015-0728, CVE-2015-0283, CVE-2015-1827, ESB-2015.0751, RHSA-2015-0729, CVE-2015-1815, ESB-2015.0752 ID: ae-201503-097 The Red Hat Identity Management includes the ipa component which provides centrally managed Identity, Policy, and Audit. The slapi-nis component provides NIS Server and Schema Compatibility plug-ins for Directory Server. It was discovered that the IPA extdom Directory Server plug-in doesn't correctly perform memory reallocation when handling user account information. A request for a list of groups for a user that belongs to a large number of groups would cause a Directory Server to crash. The slapi-nis Directory Server plug-in doesn't correctly perform memory reallocation when handling user account information. A request for information about a group with many members, or a request for a user that belongs to a large number of groups, would cause a Directory Server to enter an infinite loop and consume an excessive amount of CPU time. Both means a Denial-of-Service (DoS). The setroubleshoot packages provide tools to help diagnose SELinux problems. It has been that setroubleshoot doesn't sanitize file names supplied in a shell command look-up for RPMs associated with access violation reports. An attacker could use this flaw to escalate their privileges on the system by supplying a specially crafted file to the underlying shell command. Updated packages are available.

System: Red Hat Enterprise Linux 7 Topic: Vulnerabilities in kernel Links: RHSA-2015-0726, RHSA-2015-0727, CVE-2014-8159, CVE-2015-1421, ESB-2015.0750 ID: ae-201503-096 The kernel packages contain the Linux kernel, the core of any Linux operating system. Two new vulnerabilities have been found in the Linux Kernel. Authenticated users might be able to compromise the root account or to conduct a Denial-of-Service (DoS) attack. Updated packages are available.

System: Microsoft Windows Topic: Problem with Digital Certificates Links: MS #3050995, ESB-2015.0745 ID: ae-201503-095 No further comment due to legal reasons.

System: Appliance Topic: Vulnerability in EMC Isilon OneFS Links: ESA-2015-049, CVE-2015-0528, ESB-2015.0744 ID: ae-201503-094 EMC OneFS contains a security fix to address a privilege escalation vulnerability in the RPC daemon. An attacker may potentially exploit this vulnerability by modifying system files to escalate their privileges on the affected system.

System: Cisco Topic: Vulnerabilities in Cisco IOS XE Links: Cisco, Cisco, Cisco, Cisco, Cisco, Cisco, CVE-2015-0635, CVE-2015-0636, CVE-2015-0637, CVE-2015-0638, CVE-2015-0642, CVE-2015-0643, CVE-2015-0646, CVE-2015-0647, CVE-2015-0648, CVE-2015-0649, CVE-2015-0650, ESB-2015.0743 ID: ae-201503-093 Many vulnerabilities have been found and fixed in Cisco IOS XE. Exploiting them is possible for unauthenticated remote attackers to access confidential data or to reach a Denial-ofService.

System: Cisco Topic: Vulnerabilities in Cisco ASR 1000 Series, Cisco ISR 4400 Series and Cisco Cloud Services 1000v Series Routers Links: Cisco, CVE-2015-0639 CVE-2015-0640, CVE-2015-0641, CVE-2015-0644, CVE-2015-0645,, ESB-2015.0742 ID: ae-201503-092 Multiple Vulnerabilities in Cisco IOS XE Software for Cisco ASR 1000 Series, Cisco ISR 4400 Series, and Cisco Cloud Services 1000v Series Routers. They are due to several reasons, e.g. problems in layer 4, IPv6 as well as Common Flow Tables. Exploiting them might allow unauthenticated remote attackers to conduct a Denial-of-Service or to execute arbitrary commands on vulnerable systems. Updates are available via the normal support channels.

System: Several Topic: Vulnerability in HP Operations Orchestration Links: HPSBMU03292, CVE-2015-2109, ESB-2015.0732 ID: ae-201503-091 A potential security vulnerability has been identified with HP Operations Orchestration that could result in authentication bypass. HP has provided guidelines to resolve this vulnerability.

System: HP-UX Topic: Many vulnerabilities in Java 8 Links: HPSBUX03219, ESB-2015.0729 ID: ae-201503-090 Many vulnerabilities have been found in Java8 (Java Runtime Environment (JRE) and the Java Developer Kit (JDK)). Updates should be installed immediately.

System: Debian GNU/Linux Topic: Vulnerability in python-django Links: DSA-3204, CVE-2015-2317, ESB-2015.0727 ID: ae-201503-089 python-django is a high-level Python web development framework. It incorrectly handles user-supplied redirect URLs. A remote attacker could use this flaw to perform a Cross-Site Scripting attack. Updated packages are available.

System: Many Topic: Vulnerabilities in Firefox Links: Firefox, CVE-2015-0817, CVE-2015-0818, RHSA-2015-0718, ESB-2015.0725 ID: ae-201503-088 Vulernabilities have been found in the web browser firefox. They allow remote Denial-of-Service (DoS) and possibly remote code execution. So it's recommended to update to Firefox 31.5.3 or later as soon as possible.

System: Microsoft Windows Topic: Vulnerability in EMC Documentum xMS Links: ESA-2015-044, CVE-2015-0527, ESB-2015.0713 ID: ae-201503-087 EMC Documentum xMS contains a security fix to address a sensitive information disclosure vulnerability where Windows Service user credentials may potentially be exposed in plaintext within batch files during provisioning of EMC Documentum Platform or xCelerated Composition Platform (xCP).

System: Debian GNU/Linux Topic: Vulnerabilities in mono and tor Links: DSA-3202, CVE-2015-2318, CVE-2015-2319, CVE-2015-2320, ESB-2015.0703, DSA-3203, ESB-2015.0704 ID: ae-201503-086 Several vulnerabilities have been found in mono, a platform for running and developing applications based on the ECMA/ISO Standards. They affect TLS as well as SSLv2 and encryption weakening. Additionally, several Denial-of-Service issues have been discovered in Tor, a connection-based low-latency anonymous communication system. Updated packages are available.

System: NetBSD Topic: Vulnerabilities in kernel and libevent Links: NetBSD-SA2015-004, ESB-2015.0706, NetBSD-SA2015-005, CVE-2014-6272, ESB-2015.0707 ID: ae-201503-085 Two vulnerabilities have been found in the Kernel of NetBSD, allowing local users a Denial-of-Service (DoS). A DoS is also possible due to a vulnerability in libevent evbuffer API. Updates are available.

System: Debian GNU/Linux Topic: Vulnerabilities in PHP5, xerces-c, and Iceweasel Links: DSA-3198, CVE-2015-2301, CVE-2015-2331, CVE-2015-2348, CVE-2015-2787, DSA-3199, CVE-2015-0252, ESB-2015.0700, DSA-3201, CVE-2015-0817, CVE-2015-0818, ESB-2015.0702 ID: ae-201503-084 PHP is a widely used scripting language. Several vulnerabilities have been found here, allowing Denial-of-Service (DoS) or remote code execution. A DoS vulnerability has been found in xerces-c, a validating XML parser library for C++. The parser mishandles certain kinds of malformed input documents, resulting in a segmentation fault during a parse operation. An unauthenticated attacker could use this flaw to cause an application using the xerces-c library to crash. Debian's version of the Mozilla Firefox web browser also shows some vulnerabilities. The typed array bounds checking in JavaScript just-in-time compilation (JIT) and its management of bounds checking for heap access shows a vulnerability, allowing arbitrary code execution on the local system. Additionally, a method to run arbitrary scripts in a privileged context has been found. Updated packages are available.

System: Cisco Topic: Vulnerability in Cisco IOS Links: Cisco, CVE-2015-0669, ESB-2015.0697 ID: ae-201503-083 A vulnerability in the Autonomic Networking Infrastructure (ANI) feature of Cisco IOS software could allow an unauthenticated, remote attacker to overwrite some configuration values received via ANI. The vulnerability is due to insufficient validation of received Autonomic Networking (AN) messages. Updates are available via the normal support channels.

System: Cisco Topic: Vulnerability in Cisco WebEx Meetings Server Links: Cisco, CVE-2015-0668, ESB-2015.0696 ID: ae-201503-082 A vulnerability in the administration portal page of the Cisco WebEx Meetings Server could allow an unauthenticated, remote attacker to conduct Cross-Site Scripting (XSS) attacks. The vulnerability is due to insufficient validation of user-supplied input submitted to the administration portal page of the affected software. Updates are available via the normal support channels.

System: Cisco Topic: Vulnerability in Cisco Content Services Switch Links: Cisco, CVE-2015-0667, ESB-2015.0689 ID: ae-201503-081 A vulnerability in the Management Interface of the Cisco Content Services Switch (11500) could allow an unauthenticated, remote attacker to gain unauthorized access to other devices on the network. The vulnerability is due to improper handling of SSH packets. Updates are available via the normal support channels.

System: Several Topic: Vulnerability in Cisco AnyConnect Secure Mobility Client Links: Cisco, CVE-2015-0664, ESB-2015.0688 ID: ae-201503-080 A vulnerability in the inter-process communication (IPC) channel of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local attacker to execute arbitrary code. The vulnerability is due to a lack of input sanitization of certain IPC commands. Updates are available via the normal support channels.

System: Microsoft Windows Topic: Vulnerability in IBM Rational ClearCase Links: IBM swg21688450, CVE-2014-6134, ESB-2015.0684 ID: ae-201503-079 IBM ClearCase installer exposes server passwords in memory in clear text so that a local attacker can examine the process and recover the password. The vulnerability only occurs during installation. The solution is to upgrade to Installation Manager 1.8.2 or later and upgrade to a newer fix pack of ClearCase.

System: Apple OS X Topic: Vulnerabilities in OSX Links: APPLE-SA-2015-03-19-1, CVE-2015-1061, CVE-2015-1065, ESB-2015.0679 ID: ae-201503-078 Two vulnerabilities have been found in Apple OS X. Multiple buffer overflows exist in the handling of data during iCloud Keychain recovery. An attacker with a privileged network position may be able to execute arbitrary code on a vulnerable system. A type confusion issue exists in IOSurface's handling of serialized objects. The issue was addressed through additional type checking. Due to this a malicious application may be able to execute arbitrary code with system privileges. These issues are addressed in the Security Update 2015-003.

System: Many Topic: Vulnerabilities in OpenSSL Links: OpenSSL_20150319, ESB-2015.0678 ID: ae-201503-077 Many vulnerabilities have been found in OpenSSL. Exploiting them is possible for unauthenticated remote attackers. Consequences might be access to privileged data as well as providing misleading information and a Denial-of-Service. Please check to use OpenSSL versions 1.0.2a, 1.0.1m, 1.0.0r or 0.9.8zf only.

System: Appliance Topic: Vulnerabilities in Fortinet products Links: Fortinet FG-IR-15-005, CVE-2014-8616, CVE-2014-8617, CVE-2014-8618, CVE-2015-1880, ESB-2015.0670 ID: ae-201503-076 Vulnerabilities have been found in Fortinet FortiGate, FortiMail as well as FortiADC D models. Attackers micht be able to to execute arbitrary scripts in the context of an authenticated user's browser session by carrying out Cross-Site Scripting attacks. Upgrades should be done to mitigate these problems.

System: Several Topic: Vulnerability in Drupal Core Links: Drupal SA-CORE-2015-001, ESB-2015.0669, DSA-3200, ESB-2015.0701 ID: ae-201503-075 A vulnerability has been discovered in Drupal, a fully-featured content management framework. Password reset URLs can be forged under certain circumstances, allowing an attacker to gain access to another user's account without knowing the account's password. Updated packages are available.

System: Debian GNU/Linux Topic: Vulnerabilities in PHP5 and file Links: DSA-3195, CVE-2014-9705, CVE-2015-0231, CVE-2015-0232, CVE-2015-0273, CVE-2015-2305, ESB-2015.0667, DSA-3196, CVE-2014-9653, ESB-2015.0668 ID: ae-201503-074 Several vulnerabilities have been found in PHP5, a widely used language. Unauthenticated attackers might be able to execute arbitrary code or conduct a Denial-of-Service (DoS) remotely. Besides this, file's ELF parser is suspectible to DoS. Updated packages are available.

System: Red Hat Enterprise Linux Topic: Vulnerabilities in FreeType, PostgreSQL, and unzip Links: RHSA-2015-0696, ESB-2015.0663, RHSA-2015-0699, ESB-2015.0665, RHSA-2015-0700, ESB-2015.0666 ID: ae-201503-073 FreeType is a font engine that can open and manage font files. It shows several vulnerabilities allowing Integer Overflows during handling MAC Fonts. Working with other fonts might also allow attacks like remote code execution or Denial-of-Service (DoS). PostgreSQL is an object-relational database management system (DBMS). Several vulnerabilities can be exploited by authenticated users to access confidential data, execution of code or DoS. The unzip utility allows extraction of zip files. Several buffer overflows might allow remote code execution or DoS. Updated packages are available.

System: Microsoft Windows Topic: Vulnerability in FortiNet Single Sign On (FSSO) Links: Fortinet FG-IR-15-006, CVE-2015-2281, ESB-2015.0671 ID: ae-201503-072 Prior to build 164, the Windows version of FSSO can be remotely exploited to run arbitrary code over the TCP/8000 port without being authenticated. This code execution is done in the context of the FSSO collectoragent.exe process. So this update should be deployed immediately.

System: Apple OS X Topic: Vulnerabilities in Safari Links: APPLE-SA-2015-03-17-1, ESB-2015-0659 ID: ae-201503-071 Safari is the web browser used in Apple OSX. Safari 8.0.4, Safari 7.1.4, and Safari 6.2.4 are available. These new versions fix many vulnerabilities that might allow remote code execution or remote Denial-of-Service. So an upgrade should be carried out as soon as possible.

System: Debian GNU/Linux Topic: Vulnerabilities in tcpdump and libxfont Links: DSA-3193, CVE-2015-0261, CVE-2015-2153, CVE-2015-2154, CVE-2015-2155, ESB-2015.0654, DSA-3194, CVE-2015-1802, CVE-2015-1803, CVE-2015-1804, ESB-2015.0655 ID: ae-201503-070 Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These vulnerabilities might result in Denial-of-Service (application crash) or, potentially, execution of arbitrary code. Multiple issues have been found in libxfont's code to process BDF fonts, which might result in privilege escalation. Updated packages are available.

System: Red Hat Enterprise Linux Server 6 Topic: Vulnerabilities in kernel-rt/kernel Links: RHSA-2015-0694, CVE-2014-7822, CVE-2014-8086, CVE-2014-8172, CVE-2014-8173, CVE-2015-0274, ESB-2015.0651, RHSA-2015-0695, CVE-2013-2596, CVE-2014-5471, CVE-2014-5472, CVE-2014-7841, CVE-2014-8159, ESB-2015.0652 ID: ae-201503-069 The kernel packages contain the Linux kernel, the core of any Linux operating system. Several vulnerabilities have been found in the Linux Kernel. Users with a local account might be able to compromise the root account or to conduct a Denial-of-Service (DoS) attack. Besides this, unauthenticated remote attackers might also be able to conduct a DoS. Updated packages are available.

System: Debian GNU/Linux Topic: Vulnerability in checkpw Links: DSA-3192, CVE-2015-0885, ESB-2015.0650 ID: ae-201503-068 It has been reported that checkpw, a password authentication program, has a flaw in processing account names which contain double dashes. A remote attacker can use this flaw to cause a Denial-of-Service (infinite loop). Updated packages are available.

System: Linux Topic: Vulnerability in Citrix products Links: CTX200391, CVE-2015-0235, ESB-2015.0649 ID: ae-201503-067 A vulnerability has been recently disclosed in the glibc gethostbyname() function. This issue could potentially allow an attacker to inject code into a process that calls the vulnerable function. The issue is known as the GHOST vulnerability and affects Citrix products also. Updates are available.

System: Microsoft Windows Topic: Vulnerabilities in IBM Notes Links: IBM swg21698994, CVE-2014-9495, CVE-2015-0973, ESB-2015.0643 ID: ae-201503-066 Libpng used in IBM Notes is vulnerable to a heap-based buffer overflow, caused by improper bounds checking when decompressing the IDAT_data. A local attacker could overflow a buffer and execute arbitrary code on the system or cause a Denial-of-Service (DoS). A remote attacker could exploit this vulnerability using IDAT data with a large width to overflow a buffer and execute arbitrary code on the system or cause also a DoS. Fix Packs are available.

System: Xen Topic: Vulnerability in quemu Links: Xen-119, CVE-2015-2152, ESB-2015.0625 ID: ae-201503-065 When instantiating an emulated VGA device for an x86 HVM guest qemu will by default enable a backend to expose that device. So attackers with an existing account might be able to access an emulated VGA graphics backend. Patches are available.

System: Several Topic: Vulnerability in Xen Links: Xen-120, CVE-2015-2150, ESB-2015.0620 ID: ae-201503-064 Guests are currently permitted to modify all of the (writable) bits in the PCI command register of devices passed through to them. Under specific conditions, users with an existing account might be able to conduct a Denial-of-Service. Patches are available.

System: Cisco / VMware ESX Server Topic: Vulnerability in Cisco TelePresence Server Links: Cisco, CVE-2015-0660, ESB-2015.0619 ID: ae-201503-063 An issue in Cisco Virtual TelePresence Server Software could allow an authenticated, local attacker to access the shell of the underlying operating system with the privilege level of the root user. The issue is due to an undocumented privilege access through the serial connection, which is available via the vSphere controller. Updates are available via the normal support channels.

System: Debian GNU/Linux Topic: Vulnerabilities in NSS, ICU, Freetype, libav, putty, and GnuTLS Links: DSA-3186, CVE-2014-1569, ESB-2015.0612, DSA-3187, CVE-2013-1569, CVE-2013-2383, CVE-2013-2384, CVE-2013-2419, CVE-2014-6585, CVE-2014-6591, CVE-2014-7923, CVE-20147926, CVE-2014-7940, CVE-2014-9654, ESB-2015.0613, DSA-3188, CVE-2013-9656, CVE-2013-9657, CVE-2013-9658, CVE-2013-9660, CVE-2014-9661, CVE-2014-9663, CVE-2014-9664, CVE-20149666, CVE-2014-9670, CVE-2014-9669, CVE-2013-9670, CVE-2013-9671, CVE-2013-9672, CVE-2013-9673, CVE-2014-9675, ESB-2015.0614, DSA-3189, CVE-2013-7933, CVE-2013-8543, CVE-2013-8544, CVE-2013-8547, CVE-2014-8548, CVE-2014-9604, ESB-2015.0615, DSA-3190, CVE-2015-2157, ESB-2015.0616, DSA-3191, CVE-2015-0282, CVE-2015-0294, ESB-2015.0617 ID: ae-201503-062 It was discovered that the Mozilla Network Security Service library (nss) incorrectly handles certain ASN.1 lengths. Several vulnerabilities were discovered in the International Components for Unicode (ICU) library, allowing unauthenticated remote attackers several attacks like e.g. remote code execution or Denial-of-Service (DoS). Many vulnerabilities in Freetype might allow the same attacks, but require user interaction. Several security issues have been corrected in multiple demuxers and decoders of the libav multimedia library allowing the same attacks. It has been discovered that the Putty SSH clients fails to wipe out unused sensitive memory. GnuTLS26, the library for implementing TLS and SSL protocols, allows access to privileged data due to problems with the RSA PKCS#1 signature Algorithm as well as checking signatures. Updated packages are available.

System: Several Topic: Vulnerabilities in Adobe Flash Player Links: APSB15-05, ESB-2015.0611, RHSA-2015-0697, ESB-2015.0653 ID: ae-201503-061 Adobe has released security updates for Adobe Flash Player for Windows, Macintosh and Linux. These updates address 11 vulnerabilities that could potentially allow an attacker to take control of the affected system. So these updates are strongly recommended.

System: Several Topic: Vulnerabilities in HP ArcSight Enterprise Security Manager and Logger Links: HPSBGN03249, CVE-2014-7884, CVE-2014-7885, ESB-2015.0604 ID: ae-201503-060 Some potential security vulnerabilities have been identified with HP ArcSight Enterprise Security Manager (ESM) and HP ArcSight Logger. These vulnerabilities could be exploited remotely resulting in multiple vulnerabilities. Updates are available.

System: Debian GNU/Linux Topic: Vulnerabilities in Movable Type, GnuPG, and libgcrypt Links: DSA-3183, CVE-2013-2184, CVE-2014-9057, CVE-2015-1592, ESB-2015.0601, DSA-3184, CVE-2014-3591, CVE-2015-0837, CVE-2015-1606, ESB-2015.0602, DSA-3185, CVE-2014-3591, CVE-2015-0837, ESB-2015.0603 ID: ae-201503-059 Multiple vulnerabilities have been discovered in Movable Type, a blogging system. They can be exploited by unauthenticated remote attackers to execute arbitrary code on a vulnerable system. GnuPG is the GNU Privacy Guard used for encryption while libcrypt delivers routines for encryption in a library. It has been found out that the Elgamal decryption routine as well as the routine mpi_powm() are sucseptible to a side-channel attack. Additionally, there is a problem in GnuPG regarding the code parsing the keyring. Updated packages are available.

System: Microsoft Windows / VMware ESX Server Topic: Vulnerabilities in EMC Secure Remote Services Virtual Edition Links: ESA-2015-040, CVE-2015-0235, CVE-2015-0524, CVE-2015-0525, ESB-2015.0598 ID: ae-201503-058 EMC Secure Remote Services Virtual Edition (ESRS VE) contains multiple vulnerabilities that may potentially be exploited by attackers to compromise the affected system. Patches are available.

System: Microsoft Windows Topic: Vulnerabilities in RSA Certificate Manager and RSA Registration Manager Links: ESA-2015-014, CVE-2015-0231, CVE-2015-0521, CVE-2015-0522, CVE-2015-0523, ESB-2015.0599 ID: ae-201503-057 RSA Certificate Manager (RCM) / Registration Manager (RRM) may be susceptible to the some vulnerabilities. They affect the Apache HTTP Server before 2.4.10 and other components. Exploiting them might allow Cross-Site Scrpting attacks as well as Denial-of-Service. New product versions address these vulnerabilities.

System: Citrix XenServer Topic: Vulnerabilities in Xen Links: CTX200484, CVE-2015-2044, CVE-2015-2045, CVE-2015-2151, ESB-2015.0596 ID: ae-201503-056 A number of security vulnerabilities have been identified in Citrix XenServer. These vulnerabilities could, if exploited, allow unprivileged code in a guest to corrupt the host or other guests and also allow privileged code within a guest to read data potentially belonging to the hypervisor or other guests. Updates are available.

System: Microsoft Windows Topic: Vulnerabilities in SCADA Engine BACnet OPS Server Links: ICSA-15-069-03, CVE-2015-0979, CVE-2015-0980, CVE-2015-0981, ESB-2015.0593 ID: ae-201503-055 Three vulnerabilities have been identified in the SCADA Engine BACnet OPC Server application. Remote and unauthenticated attackers might be able to exploit them remotely for Denial-ofService or arbitrary code execution. SCADA Engine has produced a new software version that mitigates these vulnerabilities.

System: Cisco Topic: Vulnerability in Cisco Intrusion Prevention System (IPS) Links: Cisco, CVE-2015-0654, ESB-2015.0584 ID: ae-201503-054 The Cisco Intrusion Prevention System (IPS) Software has a vulnerability within the SSL/TLS subsystem utilized by the web management interface which could allow an unauthenticated, remote attacker to cause a Denial-of-Service (DoS) condition. Updates are available via the normal support channels.

System: Debian GNU/Linux Topic: Vulnerability in libssh2 Links: DSA-3182, CVE-2015-1782, ESB-2015.0582 ID: ae-201503-053 In libssh2, a SSH2 client-side library, a vulnerability has been found. It reading and using the SSH_MSG_KEXINIT packet without doing sufficient range checks when negotiating a new SSH session with a remote server. An attacker could man-in-the-middle a real server and cause a client using the libssh2 library to crash (Denial-of-Service) or otherwise read and use unintended memory areas in this process. Updated packages are available.

System: Many Topic: Vulnerabilities in SSL/TLS Links: FREAK attack, smacktls, 243585 ID: ae-201503-052 Some implementations of SSL/TLS accept export-grade (512-bit or smaller) RSA keys even when not specifically requesting export grade ciphers. This can occur when a MiTM attacker asks for export grade ciphers on behalf of a client, and the client insecurely accepts the export grade key. The attacker can then factor the weak RSA key and use this key to decrypt other data necessary to generate the session key. The attacker can then decrypt data in the session. Vendors are currently working on patches to address this issue.

System: Cisco Topic: Vulnerability in Cisco TelePresence VCS, Expressway and Telepresence Conductor Links: Cisco, CVE-2015-0652, CVE-2015-0653, ESB-2015.0583 ID: ae-201503-051 Cisco TelePresence Video Communication Server (VCS), Cisco Expressway and Cisco TelePresence Conductor contain two vulnerabilities. These are a vulnerability in SDP Media Description which might allow a reload of the system, meaning a Denial-of-Service. Additionally, there is a vulnerbility that might allow an attacker to bypass authentication and log in to the system with the privileges of an administrator. Updates are available via the normal support channels.

System: Red Hat Enterprise Linux 6 Topic: Vulnerabilities in kernel Links: RHSA-2015-0674, CVE-2014-3601, CVE-2014-7822, CVE-2014-8159, CVE-2014-8160, CVE-2014-8369, ESB-2015.0581 ID: ae-201503-050 The kernel packages contain the Linux kernel, the core of any Linux operating system. Several vulnerabilities have been found in the Linux Kernel. Users with a local account might be able to compromise the root account or to conduct a Denial-of-Service (DoS) attack. Besides this, unauthenticated remote attackers might also be able to gain unauthorised access. Updated packages are available.

System: Apple OS X Topic: Vulnerabilities in OS X Links: APPLE-SA-2015-03-09-3, ESB-2015.0579 ID: ae-201503-049 For OS X the Security Update 2015-002 is available. It addresses several vulnerabilities. They can be exploited by unauthenticated remote attackers several attack vectors like e.g. access to privileged data, execute arbitrary code or Denial-of-Service. So this update is recommended.

System: Debian GNU/Linux Topic: Vulnerability in mod-gnutls Links: DSA-3177, CVE-2015-2091, ESB-2015.0568 ID: ae-201503-048 Mod-gnutls is an Apache module providing SSL and TLS encryption with GnuTLS. Here, a bug causes the server's client verify mode not to be considered at all, in case the directory's configuration was unset. Clients with invalid certificates were then able to leverage this flaw in order to get access to that directory. Updated packages are available.

System: Apple OS X Topic: Vulnerabilities in Xcode Links: APPLE-SA-2015-03-09-4, ESB-2015.0552 ID: ae-201503-047 Xcode 6.2 is available and addresses several vulnerabilities that might allow unauthenticated remote attackers several attack vectors like e.g. access to privileged data or Denial-ofService.

System: Cisco Topic: Vulnerability in Cisco IOS Software and Cisco IOS XE Software Links: Cisco, CVE-2015-0598, ESB-2015.0550 ID: ae-201503-046 A vulnerability in RADIUS functions of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause the Cisco IOS device to reload. The vulnerability is due to incorrect processing of RADIUS Accept packets with crafted IPv6 attribute value pairs. Updates are available via the normal support channels.

System: Mandriva Linux Topic: Vulnerabilities in RPM Links: MGASA-2014-0529, CVE-2013-6435, CVE-2014-8118, ESB-2015.0549 ID: ae-201503-045 Some vulnerabilities have been found in RPM. They might allow unauthenticated remote attackers to execute arbitrary code on vulnerable systems. A Denial-of-Service is possible, too. Upgrades address these issues.

System: Several Topic: Vulnerabilities in IBM Notes and Domino Links: IBM swg21698222, ESB-2015.0545 ID: ae-201503-044 Several vulnerabilities have been found in IBM Notes and Domino. They are located in the IBM Java SDK and can be fixed now, because IBM has integrated the Oracle January 2015 Critical Patch Update in fixes now.

System: Apple iOS Topic: Vulnerabilities in Apple TV Links: APPLE-SA-2015-03-09-2, ESB-2015.0544 ID: ae-201503-043 AppleTV 7.1 is now available and addresses several vulnerabilites that might allow several attack vectors like e.g. local code execution, file creation or remotely access to privileged data. So this update is recommended.

System: Microsoft Windows Topic: Vulnerability in Schannel Links: MS #3046015, MS15-031, CVE-2015-1637, ESB-2015.0528, ESB-2015.0567 ID: ae-201503-042 No further comment due to legal reasons.

System: Microsoft Windows Topic: Vulnerability in Microsoft Windows Remote Desktop Protocol Links: MS15-030, CVE-2015-0079, ESB-2015.0566 ID: ae-201503-041 No further comment due to legal reasons.

System: Microsoft Windows Topic: Vulnerability in Microsoft Windows Photo Decoder Links: MS15-029, CVE-2015-0076, ESB-2015.0565 ID: ae-201503-040 No further comment due to legal reasons.

System: Microsoft Windows Topic: Vulnerability in Microsoft Windows Task Scheduler Links: MS15-028, CVE-2015-0084, ESB-2015.0564 ID: ae-201503-039 No further comment due to legal reasons.

System: Microsoft Windows Topic: Vulnerability in Microsoft Windows NETLOGON Links: MS15-027, CVE-2015-0005, ESB-2015.0563 ID: ae-201503-038 No further comment due to legal reasons.

System: Microsoft Windows Topic: Vulnerabilities in Microsoft Exchange Server Links: MS15-026, CVE-2015-1628, CVE-2015-1629, CVE-2015-1630, CVE-2015-1631, CVE-2015-1632, ESB-2015.0562 ID: ae-201503-037 No further comment due to legal reasons.

System: Microsoft Windows Topic: Vulnerabilities in Microsoft Windows Kernel Links: MS15-025, CVE-2015-0073, CVE-2015-0075, ESB-2015.0561 ID: ae-201503-036 No further comment due to legal reasons.

System: Microsoft Windows Topic: Vulnerability in Microsoft Windows regarding PNG Links: MS15-024, CVE-2015-0080, ESB-2015.0560 ID: ae-201503-035 No further comment due to legal reasons.

System: Microsoft Windows Topic: Vulnerabilities in Microsoft Windows Kernel-Mode Driver Links: MS15-023, CVE-2015-0077, CVE-2015-0078, CVE-2015-0094, CVE-2015-0095, ESB-2015.0559 ID: ae-201503-034 No further comment due to legal reasons.

System: Microsoft Windows Topic: Vulnerabilities in Microsoft Office Links: MS15-022, CVE-2015-0085, CVE-2015-0086, CVE-2015-0097, CVE-2015-1633, CVE-2015-1636, ESB-2015.0558 ID: ae-201503-033 No further comment due to legal reasons.

System: Microsoft Windows Topic: Vulnerabilities in Adobe Font Driver Links: MS15-021, CVE-2015-0074, CVE-2015-0087, CVE-2015-0088, CVE-2015-0089, CVE-2015-0090, CVE-2015-0091, CVE-2015-0092, CVE-20150093, ESB-2015.0557 ID: ae-201503-032 No further comment due to legal reasons.

System: Microsoft Windows Topic: Vulnerabilities in Microsoft Windows Links: MS15-020, CVE-2015-0081, CVE-2015-0096, ESB-2015.0556 ID: ae-201503-031 No further comment due to legal reasons.

System: Microsoft Windows Topic: Vulnerability in VBScript Links: MS15-019, CVE-2015-0032, ESB-2015.0555 ID: ae-201503-030 No further comment due to legal reasons.

System: Microsoft Windows Topic: Several vulnerabilities in Microsoft Internet Explorer Links: MS15-018, CVE-2015-0032, CVE-2015-0056, CVE-2015-0072, CVE-2015-0099, CVE-2015-0100, CVE-2015-1622, CVE-2015-1623, CVE-20151624, CVE-2015-1625, CVE-2015-1626, CVE-2015-1634, ESB-2015.0554 ID: ae-201503-029 No further comment due to legal reasons.

System: Apple iOS Topic: Vulnerabilities in Apple iOS Links: APPLE-SA-2015-03-09-1, ESB-2015.0540 ID: ae-201503-028 Apple iOS 8.2 is available, fixing several vulnerabilites that might allow several attack vectors like e.g. remote code execution, remote Denial-of-Service or access to privileged data. So this update is recommended.

System: Several Topic: Vulnerability in Xen Links: Xen-121, Xen-122, CVE-2015-2044, CVE-2015-2045, ESB-2015.0538, DSA-3181, ESB-2015.0569 ID: ae-201503-027 Emulation routines in the hypervisor dealing with certain system devices check whether the access size by the guest is a supported one. When the access size is unsupported these routines fail to set the data to be returned to the guest for read accesses, so that hypervisor stack contents are copied into the destination of the operation, thus becoming visible to the guest. This might mean access to sensitive data. Patches are available.

System: Cisco Topic: Vulnerability in Cisco IOS XR Links: Cisco, CVE-2015-0661, ESB-2015.0537 ID: ae-201503-026 A vulnerability in Simple Network Management Protocol version 2 (SNMPv2) processing of Cisco IOS XR Software could allow an authenticated, remote attacker to cause a reload of the SNMP daemon (snmpd) process on an affected device. The vulnerability is due to improper parsing of a malformed SNMPv2 packet. Updates are available via the normal support channels.

System: Cisco Topic: Vulnerability in Cisco IOS XE Software Links: Cisco, CVE-2015-0659, ESB-2015.0536 ID: ae-201503-025 A vulnerability in the Autonomic Networking Infrastructure (ANI) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to cause an affected device to form an adjacency with itself. The vulnerability is due to insufficient data validation. Updates are available via the normal support channels.

System: Red Hat Enterprise Linux Topic: Vulnerability in GNOME Shell Links: RHSA-2015-0535, CVE-2014-7300, ESB-2015.0532 ID: ae-201503-024 It was found that the GNOME shell doesn't disable the Print Screen key when the screen is locked. This could allow an attacker with physical access to a system with a locked screen to crash the screen-locking application by creating a large amount of screenshots. Updates are available.

System: Red Hat Enterprise Linux 7 Topic: Vulnerabilities in libvirt Links: RHSA-2015-0323, CVE-2014-8136, CVE-2015-0236, ESB-2015-0529 ID: ae-201503-023 The libvirt library is a C API for managing and interacting with the virtualization capabilities of Linux. It was found that QEMU's qemuDomainMigratePerform() and qemuDomainMigrateFinish2() functions don't correctly perform a domain unlock on a failed ACL check. A remote attacker able to establish a connection to libvirtd could use this flaw to lock a domain of a more privileged user, causing a Denial-of-Service. Besides this, it was discovered that the virDomainSnapshotGetXMLDesc() and virDomainSaveImageGetXMLDesc() functions don't sufficiently limit the usage of the VIR_DOMAIN_XML_SECURE flag when fine-grained ACLs were enabled. A remote attacker able to establish a connection to libvirtd could use this flaw to obtain certain sensitive information from the domain XML file. Updated packages are available.

System: Several Topic: Vulnerabilities in IBM Rational Team Concert Links: IBM swg21698253, CVE-2015-0122, CVE-2015-0123, ESB-2015.0521 ID: ae-201503-022 IBM Rational Team Concert is vulnerable to stored Cross-Site Scripting, caused by improper validation of user supplied input. Fixes are available.

System: Red Hat Enterprise Linux Topic: Vulnerabilities in LibreOffice Links: RHSA-2015-0377, CVE-2014-0247, CVE-2014-3575, CVE-2014-3693, ESB-2015.0515 ID: ae-201503-021 LibreOffice is an open source, community-developed office productivity suite. It was found that LibreOffice documents executed macros unconditionally, without user approval, when these documents were opened using LibreOffice. An attacker could use this flaw to execute arbitrary code as the user running LibreOffice by embedding malicious VBA scripts in the document as macros. A flaw in the OLE (Object Linking and Embedding) generation in LibreOffice has been found. An attacker could use this flaw to embed malicious OLE code in a LibreOffice document, allowing for arbitrary code execution. Additionally, an use-after-free flaw was found in the "Remote Control" capabilities of the LibreOffice Impress application. An attacker could use this flaw to remotely execute code with the permissions of the user running LibreOffice Impress. Updated packages are available.

System: Several Topic: Vulnerabilities in hivex Links: RHSA-2015-0301, CVE-2014-9273, ESB-2015.0519 ID: ae-201503-020 Hive files are undocumented binary files that Windows uses to store the Windows Registry on disk. Hivex is a library that can read and write to these files. It has been found that hivex tries to read beyond its allocated buffer when reading a hive file with a very small size or with a truncated or improperly formatted content. An attacker able to supply a specially crafted hive file to an application using the hivex library could possibly use this flaw to execute arbitrary code with the privileges of the user running that application. Updated packages are available.

System: Red Hat Enterprise Linux 7 Topic: Vulnerabilities in glibc Links: RHSA-2015-0327, CVE-2014-6040, CVE-2014-8121, ESB-2015.0516 ID: ae-201503-019 The glibc packages provide the standard C libraries (libc) and more. Two vulnerabilities could allow remote unauthenticated attackers to conduct a Denial-of-Service. Updates are available.

System: Microsoft Windows Topic: Vulnerabilities in HP Point of Sale PCs Links: HPSBHF03279, ESB-2015.0513 ID: ae-201503-018 Several potential security vulnerabilities have been identified with certain HP Point of Sale PCs Running Windows with OLE Point of Sale (OPOS) Drivers. These vulnerabilities could be remotely exploited resulting in execution of code. Updates are available.

System: Red Hat Enterprise Linux Topic: Vulnerabilities in chromium-browser Links: RHSA-2015-0627, ESB-2015.0506 ID: ae-201503-017 Chromium is an open-source web browser. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium. Updated packages are available.

System: Red Hat Enterprise Linux 7 Topic: Vulnerabilities in kernel Links: RHSA-2015-0290, CVE-2014-3690, CVE-2014-3940, CVE-2014-7825, CVE-2014-7826, CVE-2014-8086, CVE-2014-8160, CVE-2014-8172, CVE2014-8173, CVE-2014-8709, CVE-2014-8884, CVE-2015-0274, ESB-2015.0503 ID: ae-201503-016 The kernel packages contain the Linux kernel, the core of any Linux operating system. Several vulnerabilities have been found in the Linux Kernel. Users of the console might be able to compromise the root account or to conduct a Denial-of-Service (DoS) attack. Besides this, unauthenticated remote attackers might also be able to conduct a DoS or to gain unauthorised access. Updated packages are available.

System: Cisco Topic: Vulnerability in Cisco IOS XR Links: Cisco, CVE-2015-0657, ESB-2015.0502 ID: ae-201503-015 A vulnerability in RSVP processing of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a reload of the RSVP process on an affected device. The vulnerability is due to improper parsing of a malformed RSVP packet. Updates are available via the normal support channels.

System: Microsoft Windows Topic: Vulnerability in Cisco Secure Access Control Server (ACS) Links: Cisco, CVE-2014-2130, ESB-2015.0500 ID: ae-201503-014 A vulnerability in Cisco Secure Access Control Server (ACS) may allow authenticated, remote attackers to render the ACS web interface unreachable and to execute arbitrary code on the server with the privileges of the web server. The vulnerability is due to a default Tomcat administration web interface, included unintentionally. Updates are available via the normal support channels.

System: Red Hat Enterprise Linux 7 Topic: Vulnerabilities in OpenSSH Links: HPSBUX03188, CVE-2014-2653, CVE-2014-9278, ESB-2015-0512 ID: ae-201503-013 OpenSSH is OpenBSD's SSH (Secure Shell) protocol implementation. Potential security vulnerabilities have been identified running OpenSSH. These vulnerabilities could be exploited remotely to create a Denial-of-Service (DoS) and other attack vectors. Red Hat has provided software updates to address these issues.

System: Cisco Topic: Vulnerability in strong>Cisco IOS Links: Cisco, CVE-2015-0607, ESB-2015.0499 ID: ae-201503-012 A vulnerability in the Authentication Proxy feature of Cisco IOS Software could allow a remote attacker to bypass the authentication. The vulnerability is due to the incorrect processing of unsupported Authentication, Authorization, and Accounting (AAA) return codes from the AAA feature by the Authentication Proxy. Updates are available via the normal support channels.

System: Some Topic: Vulnerability in phpMyAdmin Links: PMASA-2015-1, CVE-2015-2206, ESB.20145.0497 ID: ae-201503-011 PhpMyAdmin is a free tool for a web based administration of MySQL databases. It's vulnerable to the BREACH attack, so with a large number of requests it's possible to carry out a Cross-Site Request Forgery attack. An upgrade to the latest versions of phpMyAdmin is recommended.

System: Appliance Topic: Vulnerability in F5 Products Links: F5 sol16196, CVE-2014-6031, ESB-2015.0494 ID: ae-201503-010 A vulnerability in F5 products has been found, leading to a Denial-of-Service. It can be exploited by authenticated administrative users only. Updated versions are available.

System: Appliance Topic: Vulnerability in Cisco Network Analysis Module Links: Cisco, CVE-2015-0656, ESB-2015.0493 ID: ae-201503-009 A vulnerability in the login page of the Cisco Network Analysis Module (NAM) could allow an unauthenticated, remote attacker to conduct a Cross-Site Scripting (XSS) attack. The vulnerability is due to insufficient input validation. Updates are available via the normal support channels.

System: Appliance Topic: Vulnerability in Fortinet FortiMail Links: Fortinet FG-IR-15-007, CVE-2015-0204, ESB-2015.0491 ID: ae-201503-008 FREAK is an attack on SSL/TLS, which allows "Man in the Middle" attackers to decipher and alter HTTPS connections between a server supporting "export-grade" cipher suites and a vulnerable client. It consists in downgrading the connection's encryption from "strong" RSA to "export-grade" RSA, by leveraging a vulnerability on the client side. The "export-grade" encryption is weak enough to be broken by the attacker, who can then decipher and alter the connection. Fortinet has published a workaround how to configure FortiMail correctly.

System: Unix Topic: Vulnerability in Symantec NetBackup OpsCenter Server Links: SYM15-003, CVE-2015-1483, ESB-2015.0490 ID: ae-201503-007 It has been found that a javascript injection in the optional Symantec NetBackup OpsCenter advanced monitoring, alerting, and reporting application is possible. The application fails to properly filter/sanitize incoming javascript input, which could potentially allow injection and execution of specifically formatted content. Successful exploitation could potentially result in data loss or corruption, Denial-of-Service or complete compromise of the OpsCenter application. Updates are available.

System: Red Hat Enterprise Linux Topic: Vulnerability in foreman-proxy Links: RHSA-2015-0287, RHSA-2015-0288, CVE-2014-3691, ESB-2015.0487 ID: ae-201503-006 The foreman-proxy package provides a RESTful API to manage DNS, DHCP, TFTP, and Puppet settings, and can be used as part of Foreman. It was discovered that foreman-proxy, when running in SSL-secured mode, doesn't correctly verify SSL client certificates. This could permit any client with access to the API to make requests and perform actions otherwise restricted. Updates are available.

System: Red Hat Enterprise Linux Server 6 Topic: Vulnerabilities in kernel Links: RHSA-2015-0284, RHSA-2015-0286, CVE-2013-4483, CVE-2014-3185, CVE-2014-3611, CVE-2014-3645, CVE-2014-3646, CVE-2014-7841, CVE2014-8160, ESB-2015.0485 ID: ae-201503-005 The kernel packages contain the Linux kernel, the core of any Linux operating system. Several vulnerabilities have been found in the Linux Kernel. Users of the console might be able to compromise the root account. Besides this, unauthenticated remote attackers might be able to conduct a Denial-of-Service or to gain unauthorised access. Updated packages are available.

System: Debian GNU/Linux Topic: Vulnerabilities in icedove Links: DSA-3179, ESB-2015.0483 ID: ae-201503-004 Multiple security issues have been found in Icedove, Debian's version of the Mozilla Thunderbird mail and news client. Since they also allow critical attacks like e.g. remote code execution, access to confidential data as well as Denial-of-Service, an update is strongly recommended.

System: Android / Apple iOS Topic: Vulnerabilities in Fortinet FortiClient Links: Fortinet FG-IR-15-004, CVE-2015-1453, CVE-2015-1569, CVE-2015-1570, ESB-2015.0484 ID: ae-201503-003 Android and iOS FortiClient don't check the validity of server certificates. Android only FortiClient uses a hardcoded encryption key which has been published now. Upgrades address these issues.

System: Several Topic: Vulnerabilities in ShareLaTeX Links: ShareLaTeX, CVE-2015-0933, CVE-2015-0934, VU #302668 ID: ae-201503-002 ShareLaTeX is a server-based software allowing group collaboration on LaTeX documents. ShareLaTeX prior to version 0.1.3 has been found to be vulnerable to command injections and information disclosure. So an update to at least this version is recommended.

System: Debian GNU/Linux Topic: Vulnerability in unace Links: DSA-3178, CVE-2015-2063, ESB-2015.0479 ID: ae-201503-001 It has been discovered that unace, an utility to extract, test and view .ace archives, contains an integer overflow leading to a buffer overflow. If a user or automated system is tricked into processing a specially crafted ace archive, an attacker could cause a Denial-of-Service by application crash or, possibly, execute arbitrary code. Updated packages are available.

(c) 2000-2017 AERAsec Network Services and Security GmbH

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.