mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-14 03:10:47 +00:00
e14ed8232d
modify tidy.xsl to make it generates manually the xml declaration xsl is not able to generate a list of entity otherwise. Remove copyright form included files, they are redudundant anyway and in the end only the vuln.xml file is distribued with entities expanded Rework a bit the entity declaration in order for the document to look great after expansion (as it did before we introduced the expansion mechanism) All validation are now processed direcly on the flattened file. This is based on a patch from mfechner here Submitted by: mfechner Differential Revision: https://reviews.freebsd.org/D28299
6709 lines
237 KiB
XML
6709 lines
237 KiB
XML
<vuln vid="c3d43001-8064-11e4-801f-0022156e8794">
|
|
<topic>mutt -- denial of service via crafted mail message</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mutt</name>
|
|
<range><ge>1.5.22</ge><lt>1.5.23_7</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>ja-mutt</name>
|
|
<range><ge>1.5.22</ge><lt>1.5.23_7</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>zh-mutt</name>
|
|
<range><ge>1.5.22</ge><lt>1.5.23_7</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>NVD reports:</p>
|
|
<blockquote cite="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9116">
|
|
<p>The write_one_header function in mutt 1.5.23 does not
|
|
properly handle newline characters at the beginning of a
|
|
header, which allows remote attackers to cause a denial of
|
|
service (crash) via a header with an empty body, which
|
|
triggers a heap-based buffer overflow in the mutt_substrdup
|
|
function.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>71334</bid>
|
|
<cvename>CVE-2014-9116</cvename>
|
|
<url>https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771125</url>
|
|
<url>http://dev.mutt.org/trac/ticket/3716</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-11-26</discovery>
|
|
<entry>2014-12-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="4033d826-87dd-11e4-9079-3c970e169bc2">
|
|
<topic>ntp -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ntp</name>
|
|
<name>ntp-devel</name>
|
|
<range><lt>4.2.8</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>CERT reports:</p>
|
|
<blockquote cite="http://www.kb.cert.org/vuls/id/852879">
|
|
<p>The Network Time Protocol (NTP) provides networked
|
|
systems with a way to synchronize time for various
|
|
services and applications. ntpd version 4.2.7 and
|
|
previous versions allow attackers to overflow several
|
|
buffers in a way that may allow malicious code to
|
|
be executed. ntp-keygen prior to version 4.2.7p230
|
|
also uses a non-cryptographic random number generator
|
|
when generating symmetric keys.</p>
|
|
<p>The buffer overflow vulnerabilities in ntpd may
|
|
allow a remote unauthenticated attacker to execute
|
|
arbitrary malicious code with the privilege level
|
|
of the ntpd process. The weak default key and
|
|
non-cryptographic random number generator in
|
|
ntp-keygen may allow an attacker to gain
|
|
information regarding the integrity checking
|
|
and authentication encryption schemes.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-9293</cvename>
|
|
<cvename>CVE-2014-9294</cvename>
|
|
<cvename>CVE-2014-9295</cvename>
|
|
<cvename>CVE-2014-9296</cvename>
|
|
<url>http://www.kb.cert.org/vuls/id/852879</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-12-19</discovery>
|
|
<entry>2014-12-20</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1d567278-87a5-11e4-879c-000c292ee6b8">
|
|
<topic>git -- Arbitrary command execution on case-insensitive filesystems</topic>
|
|
<affects>
|
|
<package>
|
|
<name>git</name>
|
|
<range><lt>2.2.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Git Project reports:</p>
|
|
<blockquote cite="http://article.gmane.org/gmane.linux.kernel/1853266">
|
|
<p>When using a case-insensitive filesystem an attacker can
|
|
craft a malicious Git tree that will cause Git to overwrite
|
|
its own .git/config file when cloning or checking out a
|
|
repository, leading to arbitrary command execution in the
|
|
client machine. If you are a hosting service whose users
|
|
may fetch from your service to Windows or Mac OS X machines,
|
|
you are strongly encouraged to update to protect such users
|
|
who use existing versions of Git.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-9390</cvename>
|
|
<url>https://github.com/blog/1938-git-client-vulnerability-announced</url>
|
|
<url>http://article.gmane.org/gmane.linux.kernel/1853266</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-12-19</discovery>
|
|
<entry>2014-12-19</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0c5cf7c4-856e-11e4-a089-60a44c524f57">
|
|
<topic>otrs -- Incomplete Access Control</topic>
|
|
<affects>
|
|
<package>
|
|
<name>otrs</name>
|
|
<range><gt>3.2.*</gt><lt>3.2.17</lt></range>
|
|
<range><gt>3.3.*</gt><lt>3.3.11</lt></range>
|
|
<range><gt>4.0.*</gt><lt>4.0.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The OTRS project reports:</p>
|
|
<blockquote cite="http://www.otrs.com/security-advisory-2014-06-incomplete-access-control/">
|
|
<p>An attacker with valid OTRS credentials could access and manipulate ticket data
|
|
of other users via the GenericInterface, if a ticket webservice is configured
|
|
and not additionally secured.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.otrs.com/security-advisory-2014-06-incomplete-access-control/</url>
|
|
<cvename>CVE-2014-9324</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-12-16</discovery>
|
|
<entry>2014-12-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f5561ade-846c-11e4-b7a7-20cf30e32f6d">
|
|
<topic>subversion -- DoS vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mod_dav_svn</name>
|
|
<range><ge>1.8.0</ge><lt>1.8.11</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>subversion16</name>
|
|
<range><ge>1.0.0</ge><lt>1.7.19</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>subversion17</name>
|
|
<range><ge>1.0.0</ge><lt>1.7.19</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>subversion</name>
|
|
<range><ge>1.0.0</ge><lt>1.7.19</lt></range>
|
|
<range><ge>1.8.0</ge><lt>1.8.11</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Subversion Project reports:</p>
|
|
<blockquote cite="http://subversion.apache.org/security/">
|
|
<p>Subversion's mod_dav_svn Apache HTTPD server module will crash when it
|
|
receives a REPORT request for some invalid formatted special URIs.</p>
|
|
<p>Subversion's mod_dav_svn Apache HTTPD server module will crash when it
|
|
receives a request for some invalid formatted special URIs.</p>
|
|
<p>We consider this to be a medium risk vulnerability. Repositories which
|
|
allow for anonymous reads will be vulnerable without authentication.
|
|
Unfortunately, no special configuration is required and all mod_dav_svn
|
|
servers are vulnerable.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3580</cvename>
|
|
<cvename>CVE-2014-8108</cvename>
|
|
<url>http://subversion.apache.org/security/CVE-2014-3580-advisory.txt</url>
|
|
<url>http://subversion.apache.org/security/CVE-2014-8108-advisory.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-12-13</discovery>
|
|
<entry>2014-12-15</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="fdf72a0e-8371-11e4-bc20-001636d274f3">
|
|
<topic>NVIDIA UNIX driver -- remote denial of service or arbitrary code execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>nvidia-driver</name>
|
|
<range><lt>340.65</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>nvidia-driver-304</name>
|
|
<range><lt>304.125</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>nvidia-driver-173</name>
|
|
<range><le>173.14.35_3</le></range>
|
|
</package>
|
|
<package>
|
|
<name>nvidia-driver-96</name>
|
|
<range><le>96.43.23_2</le></range>
|
|
</package>
|
|
<package>
|
|
<name>nvidia-driver-71</name>
|
|
<range><le>71.86.15_4</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>NVIDIA Unix security team reports:</p>
|
|
<blockquote cite="http://nvidia.custhelp.com/app/answers/detail/a_id/3610">
|
|
<p>The GLX indirect rendering support supplied on NVIDIA products
|
|
is subject to the recently disclosed X.Org vulnerabilities
|
|
(CVE-2014-8093, CVE-2014-8098) as well as internally identified
|
|
vulnerabilities (CVE-2014-8298).</p>
|
|
<p>Depending on how it is configured, the X server typically runs
|
|
with raised privileges, and listens for GLX indirect rendering
|
|
protocol requests from a local socket and potentially a TCP/IP
|
|
port. The vulnerabilities could be exploited in a way that
|
|
causes the X server to access uninitialized memory or overwrite
|
|
arbitrary memory in the X server process. This can cause a
|
|
denial of service (e.g., an X server segmentation fault), or
|
|
could be exploited to achieve arbitrary code execution.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-8298</cvename>
|
|
<cvename>CVE-2014-8093</cvename>
|
|
<cvename>CVE-2014-8098</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-12-03</discovery>
|
|
<entry>2014-12-14</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ab3e98d9-8175-11e4-907d-d050992ecde8">
|
|
<topic>bind -- denial of service vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bind99</name>
|
|
<name>bind99-base</name>
|
|
<range><lt>9.9.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>bind98</name>
|
|
<name>bind98-base</name>
|
|
<name>bind96</name>
|
|
<name>bind96-base</name>
|
|
<range><gt>0</gt></range>
|
|
</package>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>9.3</ge><lt>9.3_6</lt></range>
|
|
<range><ge>9.2</ge><lt>9.2_16</lt></range>
|
|
<range><ge>9.1</ge><lt>9.1_23</lt></range>
|
|
<range><ge>8.4</ge><lt>8.4_20</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>ISC reports:</p>
|
|
<blockquote cite="https://www.isc.org/blogs/important-security-advisory-posted/">
|
|
<p>We have today posted updated versions of 9.9.6 and 9.10.1
|
|
to address a significant security vulnerability in DNS
|
|
resolution. The flaw was discovered by Florian Maury of
|
|
ANSSI, and applies to any recursive resolver that does not
|
|
support a limit on the number of recursions. [<a href="http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html">CERTFR-2014-AVI-512</a>],
|
|
[USCERT <a href="www.kb.cert.org/vuls/id/264212">VU#264212</a>]</p>
|
|
<p>A flaw in delegation handling could be exploited to put named
|
|
into an infinite loop, in which each lookup of a name server
|
|
triggered additional lookups of more name servers. This has
|
|
been addressed by placing limits on the number of levels of
|
|
recursion named will allow (default 7), and on the number of
|
|
queries that it will send before terminating a recursive query
|
|
(default 50). The recursion depth limit is configured via the
|
|
max-recursion-depth option, and the query limit via the
|
|
max-recursion-queries option. For more information, see the
|
|
security advisory at <a href="https://kb.isc.org/article/AA-01216/">https://kb.isc.org/article/AA-01216/</a>.
|
|
<a href="https://kb.isc.org/article/AA-01216/">[CVE-2014-8500]</a>
|
|
[RT #37580]</p>
|
|
<p>In addition, we have also corrected a potential security
|
|
vulnerability in the GeoIP feature in the 9.10.1 release only.
|
|
For more information on this issue, see the security advisory
|
|
at <a href="https://kb.isc.org/article/AA-01217">https://kb.isc.org/article/AA-01217</a>.
|
|
<a href="https://kb.isc.org/article/AA-01217">[CVE-2014-8680]</a></p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<freebsdsa>SA-14:29.bind</freebsdsa>
|
|
<cvename>CVE-2014-8500</cvename>
|
|
<cvename>CVE-2014-8680</cvename>
|
|
<url>https://www.isc.org/blogs/important-security-advisory-posted/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-12-08</discovery>
|
|
<entry>2014-12-11</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="94268da0-8118-11e4-a180-001999f8d30b">
|
|
<topic>asterisk -- Remote Crash Vulnerability in WebSocket Server</topic>
|
|
<affects>
|
|
<package>
|
|
<name>asterisk11</name>
|
|
<range><lt>11.14.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Asterisk project reports:</p>
|
|
<blockquote cite="http://www.asterisk.org/downloads/security-advisories">
|
|
<p>When handling a WebSocket frame the res_http_websocket
|
|
module dynamically changes the size of the memory used
|
|
to allow the provided payload to fit. If a payload length
|
|
of zero was received the code would incorrectly attempt
|
|
to resize to zero. This operation would succeed and end
|
|
up freeing the memory but be treated as a failure. When
|
|
the session was subsequently torn down this memory would
|
|
get freed yet again causing a crash.</p>
|
|
<p>Users of the WebSocket functionality also did not take
|
|
into account that provided text frames are not guaranteed
|
|
to be NULL terminated. This has been fixed in chan_sip
|
|
and chan_pjsip in the applicable versions.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://downloads.asterisk.org/pub/security/AST-2014-019.html</url>
|
|
<cvename>CVE-2014-9374</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-30</discovery>
|
|
<entry>2014-12-11</entry>
|
|
<modified>2015-01-29</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="27b9b2f0-8081-11e4-b4ca-bcaec565249c">
|
|
<topic>xserver -- multiple issue with X client request handling</topic>
|
|
<affects>
|
|
<package>
|
|
<name>xorg-server</name>
|
|
<range><lt>1.12.4_10,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Alan Coopersmith reports:</p>
|
|
<blockquote cite="http://lists.x.org/archives/xorg-announce/2014-December/002500.html">
|
|
<p>Ilja van Sprundel, a security researcher with IOActive, has
|
|
discovered a large number of issues in the way the X server
|
|
code base handles requests from X clients, and has worked
|
|
with X.Org's security team to analyze, confirm, and fix
|
|
these issues.</p>
|
|
|
|
<p>The vulnerabilities could be exploited to cause the X server
|
|
to access uninitialized memory or overwrite arbitrary memory
|
|
in the X server process. This can cause a denial of service
|
|
(e.g., an X server segmentation fault), or could be exploited
|
|
to achieve arbitrary code execution.</p>
|
|
|
|
<p>The GLX extension to the X Window System allows an X client
|
|
to send X protocol to the X server, to request that the X
|
|
server perform OpenGL rendering on behalf of the X client.
|
|
This is known as "GLX indirect rendering", as opposed to
|
|
"GLX direct rendering" where the X client submits OpenGL
|
|
rendering commands directly to the GPU, bypassing the X
|
|
server and avoiding the X server code for GLX protocol
|
|
handling.</p>
|
|
|
|
<p>Most GLX indirect rendering implementations share some
|
|
common ancestry, dating back to "Sample Implementation"
|
|
code from Silicon Graphics, Inc (SGI), which SGI
|
|
originally commercially licensed to other Unix workstation
|
|
and graphics vendors, and later released as open source, so
|
|
those vulnerabilities may affect other licensees of SGI's
|
|
code base beyond those running code from the X.Org Foundation
|
|
or the XFree86 Project.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://lists.x.org/archives/xorg-announce/2014-December/002500.html</url>
|
|
<cvename>CVE-2014-8091</cvename>
|
|
<cvename>CVE-2014-8092</cvename>
|
|
<cvename>CVE-2014-8093</cvename>
|
|
<cvename>CVE-2014-8094</cvename>
|
|
<cvename>CVE-2014-8095</cvename>
|
|
<cvename>CVE-2014-8096</cvename>
|
|
<cvename>CVE-2014-8097</cvename>
|
|
<cvename>CVE-2014-8098</cvename>
|
|
<cvename>CVE-2014-8099</cvename>
|
|
<cvename>CVE-2014-8100</cvename>
|
|
<cvename>CVE-2014-8101</cvename>
|
|
<cvename>CVE-2014-8102</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-12-09</discovery>
|
|
<entry>2014-12-10</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="10d73529-7f4b-11e4-af66-00215af774f0">
|
|
<topic>unbound -- can be tricked into following an endless series of delegations, this consumes a lot of resources</topic>
|
|
<affects>
|
|
<package>
|
|
<name>unbound</name>
|
|
<range><lt>1.5.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>10.0</ge><lt>10.0_14</lt></range>
|
|
<range><ge>10.1</ge><lt>10.1_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Unbound developer reports:</p>
|
|
<blockquote cite="http://unbound.net/downloads/CVE-2014-8602.txt">
|
|
<p>The resolver can be tricked into following an endless series of
|
|
delegations, this consumes a lot of resources.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://unbound.net/downloads/CVE-2014-8602.txt</url>
|
|
<freebsdsa>SA-14:30.unbound</freebsdsa>
|
|
<cvename>CVE-2014-8602</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-12-08</discovery>
|
|
<entry>2014-12-09</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="567beb1e-7e0a-11e4-b9cc-bcaec565249c">
|
|
<topic>freetype -- Out of bounds stack-based read/write</topic>
|
|
<affects>
|
|
<package>
|
|
<name>freetype2</name>
|
|
<range><lt>2.5.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Werner LEMBERG reports:</p>
|
|
<blockquote cite="http://lists.nongnu.org/archive/html/freetype-announce/2014-12/msg00000.html">
|
|
<p>The fix for CVE-2014-2240 was not 100% complete to fix the issue
|
|
from the CVE completly.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://lists.nongnu.org/archive/html/freetype-announce/2014-12/msg00000.html</url>
|
|
<cvename>CVE-2014-2240</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-12-07</discovery>
|
|
<entry>2014-12-07</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c9c46fbf-7b83-11e4-a96e-6805ca0b3d42">
|
|
<topic>phpMyAdmin -- XSS and DoS vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><ge>4.2.0</ge><lt>4.2.13.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The phpMyAdmin development team reports:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-17.php">
|
|
<p>DoS vulnerability with long passwords.</p>
|
|
<p>With very long passwords it was possible to initiate a
|
|
denial of service attack on phpMyAdmin.</p>
|
|
<p>We consider this vulnerability to be serious.</p>
|
|
<p>This vulnerability can be mitigated by configuring
|
|
throttling in the webserver.</p>
|
|
</blockquote>
|
|
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-18.php">
|
|
<p>XSS vulnerability in redirection mechanism.</p>
|
|
<p>With a crafted URL it was possible to trigger an XSS in
|
|
the redirection mechanism in phpMyAdmin.</p>
|
|
<p>We consider this vulnerability to be non critical.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-17.php</url>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-18.php</url>
|
|
<cvename>CVE-2014-9218</cvename>
|
|
<cvename>CVE-2014-9219</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-12-03</discovery>
|
|
<entry>2014-12-04</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="7ae61870-9dd2-4884-a2f2-f19bb5784d09">
|
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>firefox</name>
|
|
<range><lt>34.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>firefox-esr</name>
|
|
<range><lt>31.3.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox</name>
|
|
<range><lt>34.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-seamonkey</name>
|
|
<range><lt>2.31</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-thunderbird</name>
|
|
<range><lt>31.3.0</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>seamonkey</name>
|
|
<range><lt>2.31</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>thunderbird</name>
|
|
<range><lt>31.3.0</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>libxul</name>
|
|
<range><lt>31.3.0</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>nss</name>
|
|
<range><lt>3.17.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Mozilla Project reports:</p>
|
|
<blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
|
|
<p>ASN.1 DER decoding of lengths is too permissive, allowing
|
|
undetected smuggling of arbitrary data</p>
|
|
<p>MFSA-2014-90 Apple CoreGraphics framework on OS X 10.10
|
|
logging input data to /tmp directory</p>
|
|
<p>MFSA-2014-89 Bad casting from the BasicThebesLayer to
|
|
BasicContainerLayer</p>
|
|
<p>MFSA-2014-88 Buffer overflow while parsing media content</p>
|
|
<p>MFSA-2014-87 Use-after-free during HTML5 parsing</p>
|
|
<p>MFSA-2014-86 CSP leaks redirect data via violation reports</p>
|
|
<p>MFSA-2014-85 XMLHttpRequest crashes with some input streams</p>
|
|
<p>MFSA-2014-84 XBL bindings accessible via improper CSS
|
|
declarations</p>
|
|
<p>MFSA-2014-83 Miscellaneous memory safety hazards (rv:34.0
|
|
/ rv:31.3)</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1587</cvename>
|
|
<cvename>CVE-2014-1588</cvename>
|
|
<cvename>CVE-2014-1589</cvename>
|
|
<cvename>CVE-2014-1590</cvename>
|
|
<cvename>CVE-2014-1591</cvename>
|
|
<cvename>CVE-2014-1592</cvename>
|
|
<cvename>CVE-2014-1593</cvename>
|
|
<cvename>CVE-2014-1594</cvename>
|
|
<cvename>CVE-2014-1595</cvename>
|
|
<cvename>CVE-2014-1569</cvename>
|
|
<url>https://www.mozilla.org/security/advisories/mfsa2014-83</url>
|
|
<url>https://www.mozilla.org/security/advisories/mfsa2014-84</url>
|
|
<url>https://www.mozilla.org/security/advisories/mfsa2014-85</url>
|
|
<url>https://www.mozilla.org/security/advisories/mfsa2014-86</url>
|
|
<url>https://www.mozilla.org/security/advisories/mfsa2014-87</url>
|
|
<url>https://www.mozilla.org/security/advisories/mfsa2014-88</url>
|
|
<url>https://www.mozilla.org/security/advisories/mfsa2014-89</url>
|
|
<url>https://www.mozilla.org/security/advisories/mfsa2014-90</url>
|
|
<url>https://www.mozilla.org/security/advisories/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-12-01</discovery>
|
|
<entry>2014-12-02</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="23ab5c3e-79c3-11e4-8b1e-d050992ecde8">
|
|
<topic>OpenVPN -- denial of service security vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openvpn</name>
|
|
<range><lt>2.0.11</lt></range>
|
|
<range><ge>2.1.0</ge><lt>2.2.3</lt></range>
|
|
<range><ge>2.3.0</ge><lt>2.3.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The OpenVPN project reports:</p>
|
|
<blockquote cite="https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b">
|
|
<p>In late November 2014 Dragana Damjanovic notified OpenVPN
|
|
developers of a critical denial of service security vulnerability
|
|
(CVE-2014-8104). The vulnerability allows an tls-authenticated
|
|
client to crash the server by sending a too-short control channel
|
|
packet to the server. In other words this vulnerability is denial
|
|
of service only.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-8104</cvename>
|
|
<url>https://community.openvpn.net/openvpn/wiki/SecurityAnnouncement-97597e732b</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-12-01</discovery>
|
|
<entry>2014-12-02</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a33addf6-74e6-11e4-a615-f8b156b6dcc8">
|
|
<topic>flac -- Multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>flac</name>
|
|
<range><lt>1.3.0_3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-c6-flac</name>
|
|
<range><lt>1.2.1_3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Erik de Castro Lopo reports:</p>
|
|
<blockquote cite="http://lists.xiph.org/pipermail/flac-dev/2014-November/005226.html">
|
|
<p>Google Security Team member, Michele Spagnuolo, recently
|
|
found two potential problems in the FLAC code base. They are:</p>
|
|
<ul>
|
|
<li>CVE-2014-9028: Heap buffer write overflow.</li>
|
|
<li>CVE-2014-8962: Heap buffer read overflow.</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://git.xiph.org/?p=flac.git;a=commit;h=5b3033a2b355068c11fe637e14ac742d273f076e</url>
|
|
<cvename>CVE-2014-8962</cvename>
|
|
<url>https://git.xiph.org/?p=flac.git;a=commit;h=fcf0ba06ae12ccd7c67cee3c8d948df15f946b85</url>
|
|
<cvename>CVE-2014-9028</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-11-25</discovery>
|
|
<entry>2014-11-25</entry>
|
|
<modified>2015-07-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="7bfd797c-716d-11e4-b008-001999f8d30b">
|
|
<topic>asterisk -- Multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>asterisk11</name>
|
|
<range><lt>11.14.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Asterisk project reports:</p>
|
|
<blockquote cite="http://www.asterisk.org/downloads/security-advisories">
|
|
<p>AST-2014-014 - High call load may result in hung
|
|
channels in ConfBridge.</p>
|
|
<p>AST-2014-017 - Permission escalation through ConfBridge
|
|
actions/dialplan functions.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://downloads.asterisk.org/pub/security/AST-2014-014.html</url>
|
|
<cvename>CVE-2014-8414</cvename>
|
|
<url>http://downloads.asterisk.org/pub/security/AST-2014-017.html</url>
|
|
<cvename>CVE-2014-8417</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-11-21</discovery>
|
|
<entry>2014-11-21</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a92ed304-716c-11e4-b008-001999f8d30b">
|
|
<topic>asterisk -- Multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>asterisk</name>
|
|
<range><lt>1.8.32.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>asterisk11</name>
|
|
<range><lt>11.14.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Asterisk project reports:</p>
|
|
<blockquote cite="https://www.asterisk.org/security">
|
|
<p>AST-2014-012 - Mixed IP address families in access
|
|
control lists may permit unwanted traffic.</p>
|
|
<p>AST-2014-018 - AMI permission escalation through DB
|
|
dialplan function.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://downloads.asterisk.org/pub/security/AST-2014-012.html</url>
|
|
<cvename>CVE-2014-8412</cvename>
|
|
<url>http://downloads.asterisk.org/pub/security/AST-2014-018.html</url>
|
|
<cvename>CVE-2014-8418</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-11-21</discovery>
|
|
<entry>2014-11-21</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a5d4a82a-7153-11e4-88c7-6805ca0b3d42">
|
|
<topic>phpMyAdmin -- XSS and information disclosure vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><ge>4.2.0</ge><lt>4.2.12</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The phpMyAdmin development team reports:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-13.php">
|
|
<ul>
|
|
<li>With a crafted database, table or column name it is
|
|
possible to trigger an XSS attack in the table browse
|
|
page.</li>
|
|
<li>With a crafted ENUM value it is possible to trigger
|
|
XSS attacks in the table print view and zoom search
|
|
pages.</li>
|
|
<li>With a crafted value for font size it is possible to
|
|
trigger an XSS attack in the home page.</li>
|
|
</ul>
|
|
<p>These vulnerabilities can be triggered only by someone
|
|
who is logged in to phpMyAdmin, as the usual token
|
|
protection prevents non-logged-in users from accessing the
|
|
required pages. Moreover, exploitation of the XSS
|
|
vulnerability related to the font size requires forgery of
|
|
the pma_fontsize cookie.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-14.php">
|
|
<p> In the GIS editor feature, a parameter specifying the
|
|
geometry type was not correcly validated, opening the door
|
|
to a local file inclusion attack.</p>
|
|
<p>This vulnerability can be triggered only by someone who
|
|
is logged in to phpMyAdmin, as the usual token protection
|
|
prevents non-logged-in users from accessing the required
|
|
page.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-15.php">
|
|
<p>With a crafted file name it is possible to trigger an
|
|
XSS in the error reporting page.</p>
|
|
<p>This vulnerability can be triggered only by someone who
|
|
is logged in to phpMyAdmin, as the usual token protection
|
|
prevents non-logged-in users from accessing the required
|
|
page.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-16.php">
|
|
<p>In the error reporting feature, a parameter specifying
|
|
the file was not correctly validated, allowing the
|
|
attacker to derive the line count of an arbitrary file</p>
|
|
<p>This vulnerability can be triggered only by someone who
|
|
is logged in to phpMyAdmin, as the usual token protection
|
|
prevents non-logged-in users from accessing the required
|
|
page.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-13.php</url>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-14.php</url>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-15.php</url>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-16.php</url>
|
|
<cvename>CVE-2014-8958</cvename>
|
|
<cvename>CVE-2014-8959</cvename>
|
|
<cvename>CVE-2014-8960</cvename>
|
|
<cvename>CVE-2014-8961</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-11-20</discovery>
|
|
<entry>2014-11-21</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="890b6b22-70fa-11e4-91ae-5453ed2e2b49">
|
|
<topic>kwebkitpart, kde-runtime -- insufficient input validation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>kde-runtime</name>
|
|
<range><lt>4.14.2_2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>kwebkitpart</name>
|
|
<range><lt>1.3.2_4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Albert Aastals Cid reports:</p>
|
|
<blockquote cite="https://www.kde.org/info/security/advisory-20141113-1.txt">
|
|
<p>kwebkitpart and the bookmarks:// io slave were not sanitizing
|
|
input correctly allowing to some javascript being executed on the
|
|
context of the referenced hostname.</p>
|
|
<p>Whilst in most cases, the JavaScript will be executed in an
|
|
untrusted context, with the bookmarks IO slave, it will be executed
|
|
in the context of the referenced hostname. It should however be
|
|
noted that KDE mitigates this risk by attempting to ensure that
|
|
such URLs cannot be embedded directly into Internet hosted
|
|
content.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://www.kde.org/info/security/advisory-20141113-1.txt</url>
|
|
<cvename>CVE-2014-8600</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-11-13</discovery>
|
|
<entry>2014-11-20</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="5a35bc56-7027-11e4-a4a3-001999f8d30b">
|
|
<topic>yii -- Remote arbitrary PHP code execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>yii</name>
|
|
<range><lt>1.1.15</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Yii PHP Framework developers report:</p>
|
|
<blockquote cite="http://www.yiiframework.com/news/78/yii-1-1-15-is-released-security-fix/">
|
|
<p>We are releasing Yii 1.1.15 to fix a security issue
|
|
found in 1.1.14. We urge all 1.1.14 users to upgrade their
|
|
Yii to this latest release. Note that the issue only
|
|
affects 1.1.14. All previous releases are not affected.
|
|
Upgrading to this release from 1.1.14 is very safe and
|
|
will not break your existing code.</p>
|
|
<p>The vulnerability is in the CDetailView widget. When
|
|
a Yii application uses this widget and configures the
|
|
"value" property of a CDetailView attribute using end
|
|
user inputs, it may allow attackers to potentially execute
|
|
arbitrary PHP scripts on the server. We are not showing
|
|
how to exploit it here to allow users to upgrade before
|
|
details about the exploit become publicly known. To our
|
|
knowledge the details of this issue are only known to
|
|
core team members.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-4672</cvename>
|
|
<url>http://www.yiiframework.com/news/78/yii-1-1-15-is-released-security-fix</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-03</discovery>
|
|
<entry>2014-11-19</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d395e44f-6f4f-11e4-a444-00262d5ed8ee">
|
|
<topic>chromium -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>chromium</name>
|
|
<range><lt>39.0.2171.65</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>chromium-pulse</name>
|
|
<range><lt>39.0.2171.65</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Google Chrome Releases reports:</p>
|
|
<blockquote cite="http://googlechromereleases.blogspot.nl/2014/11/stable-channel-update_18.html">
|
|
<p>42 security fixes in this release, including:</p>
|
|
<ul>
|
|
<li>[389734] High CVE-2014-7899: Address bar spoofing. Credit to
|
|
Eli Grey.</li>
|
|
<li>[406868] High CVE-2014-7900: Use-after-free in pdfium. Credit
|
|
to Atte Kettunen from OUSPG.</li>
|
|
<li>[413375] High CVE-2014-7901: Integer overflow in pdfium. Credit
|
|
to cloudfuzzer.</li>
|
|
<li>[414504] High CVE-2014-7902: Use-after-free in pdfium. Credit
|
|
to cloudfuzzer.</li>
|
|
<li>[414525] High CVE-2014-7903: Buffer overflow in pdfium. Credit
|
|
to cloudfuzzer.</li>
|
|
<li>[418161] High CVE-2014-7904: Buffer overflow in Skia. Credit to
|
|
Atte Kettunen from OUSPG.</li>
|
|
<li>[421817] High CVE-2014-7905: Flaw allowing navigation to
|
|
intents that do not have the BROWSABLE category. Credit to
|
|
WangTao(neobyte) of Baidu X-Team.</li>
|
|
<li>[423030] High CVE-2014-7906: Use-after-free in pepper plugins.
|
|
Credit to Chen Zhang (demi6od) of the NSFOCUS Security Team.</li>
|
|
<li>[423703] High CVE-2014-0574: Double-free in Flash. Credit to
|
|
biloulehibou.</li>
|
|
<li>[424453] High CVE-2014-7907: Use-after-free in blink. Credit to
|
|
Chen Zhang (demi6od) of the NSFOCUS Security Team.</li>
|
|
<li>[425980] High CVE-2014-7908: Integer overflow in media. Credit
|
|
to Christoph Diehl.</li>
|
|
<li>[391001] Medium CVE-2014-7909: Uninitialized memory read in
|
|
Skia. Credit to miaubiz.</li>
|
|
<li>CVE-2014-7910: Various fixes from internal audits, fuzzing and
|
|
other initiatives.</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0574</cvename>
|
|
<cvename>CVE-2014-7899</cvename>
|
|
<cvename>CVE-2014-7900</cvename>
|
|
<cvename>CVE-2014-7901</cvename>
|
|
<cvename>CVE-2014-7902</cvename>
|
|
<cvename>CVE-2014-7903</cvename>
|
|
<cvename>CVE-2014-7904</cvename>
|
|
<cvename>CVE-2014-7905</cvename>
|
|
<cvename>CVE-2014-7906</cvename>
|
|
<cvename>CVE-2014-7907</cvename>
|
|
<cvename>CVE-2014-7908</cvename>
|
|
<cvename>CVE-2014-7909</cvename>
|
|
<cvename>CVE-2014-7910</cvename>
|
|
<url>http://googlechromereleases.blogspot.nl/2014/11/stable-channel-update_18.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-11-18</discovery>
|
|
<entry>2014-11-18</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="dafa13a8-6e9b-11e4-8ef7-5453ed2e2b49">
|
|
<topic>kde-workspace -- privilege escalation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>kde-workspace</name>
|
|
<range><lt>4.11.13_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>David Edmundson reports:</p>
|
|
<blockquote cite="https://www.kde.org/info/security/advisory-20141106-1.txt">
|
|
<p>KDE workspace configuration module for setting the date and time
|
|
has a helper program which runs as root for performing actions.
|
|
This is secured with polkit.</p>
|
|
<p>This helper takes the name of the ntp utility to run as an
|
|
argument. This allows a hacker to run any arbitrary command as root
|
|
under the guise of updating the time.</p>
|
|
<p>An application can gain root priveledges from an admin user with
|
|
either misleading information or no interaction.</p>
|
|
<p>On some systems the user will be shown a prompt to change the
|
|
time. However, if the system has policykit-desktop-privileges
|
|
installed, the datetime helper will be invoked by an admin user
|
|
without any prompts.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-8651</cvename>
|
|
<mlist>http://seclists.org/oss-sec/2014/q4/520</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-11-06</discovery>
|
|
<entry>2014-11-17</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c1930f45-6982-11e4-80e1-bcaec565249c">
|
|
<topic>dbus -- incomplete fix for CVE-2014-3636 part A</topic>
|
|
<affects>
|
|
<package>
|
|
<name>dbus</name>
|
|
<range><lt>1.8.10</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Simon McVittie reports:</p>
|
|
<blockquote cite="http://lists.freedesktop.org/archives/dbus/2014-November/016395.html">
|
|
<p>The patch issued by the D-Bus maintainers for CVE-2014-3636
|
|
was based on incorrect reasoning, and does not fully prevent
|
|
the attack described as "CVE-2014-3636 part A", which is
|
|
repeated below. Preventing that attack requires raising the
|
|
system dbus-daemon's RLIMIT_NOFILE (ulimit -n) to a higher
|
|
value. CVE-2014-7824 has been allocated for this
|
|
vulnerability.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-7824</cvename>
|
|
<url>http://lists.freedesktop.org/archives/dbus/2014-November/016395.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-11-10</discovery>
|
|
<entry>2014-11-11</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ee7b4f9d-66c8-11e4-9ae1-e8e0b722a85e">
|
|
<topic>wget -- path traversal vulnerability in recursive FTP mode</topic>
|
|
<affects>
|
|
<package>
|
|
<name>wget</name>
|
|
<range><lt>1.16</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>MITRE reports:</p>
|
|
<blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877">
|
|
<p>Absolute path traversal vulnerability in GNU Wget before
|
|
1.16, when recursion is enabled, allows remote FTP servers
|
|
to write to arbitrary files, and consequently execute
|
|
arbitrary code, via a LIST response that references the same
|
|
filename within two entries, one of which indicates that the
|
|
filename is for a symlink. </p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-4877</cvename>
|
|
<certvu>685996</certvu>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-27</discovery>
|
|
<entry>2014-11-08</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0167f5ad-64ea-11e4-98c1-00269ee29e57">
|
|
<topic>Konversation -- out-of-bounds read on a heap-allocated array</topic>
|
|
<affects>
|
|
<package>
|
|
<name>konversation</name>
|
|
<range><lt>1.5.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Konversation developers report:</p>
|
|
<blockquote cite="https://www.kde.org/info/security/advisory-20141104-1.txt">
|
|
<p>Konversation's Blowfish ECB encryption support assumes incoming blocks
|
|
to be the expected 12 bytes. The lack of a sanity-check for the actual
|
|
size can cause a denial of service and an information leak to the local
|
|
user.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-8483</cvename>
|
|
<url>https://www.kde.org/info/security/advisory-20141104-1.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-11-04</discovery>
|
|
<entry>2014-11-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="21ce1840-6107-11e4-9e84-0022156e8794">
|
|
<topic>twiki -- remote Perl code execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>twiki</name>
|
|
<range><lt>5.1.4_1,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>TWiki developers report:</p>
|
|
<blockquote cite="http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2014-7236">
|
|
<p>The debugenableplugins request parameter allows arbitrary
|
|
Perl code execution.</p>
|
|
<p>Using an HTTP GET request towards a TWiki server,
|
|
add a specially crafted debugenableplugins request parameter
|
|
to TWiki's view script (typically port 80/TCP).
|
|
Prior authentication may or may not be necessary.</p>
|
|
<p>A remote attacker can execute arbitrary Perl code
|
|
to view and modify any file the webserver user has access to.</p>
|
|
<p>Example: http://www.example.com/do/view/Main/WebHome?debugenableplugins=BackupRestorePlugin%3bprint("Content-Type:text/html\r\n\r\nVulnerable!")%3bexit</p>
|
|
<p>The TWiki site is vulnerable if you see a page with text
|
|
"Vulnerable!".</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-7236</cvename>
|
|
<url>http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2014-7236</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-09</discovery>
|
|
<entry>2014-10-31</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0dad9114-60cc-11e4-9e84-0022156e8794">
|
|
<topic>jenkins -- slave-originated arbitrary code execution on master servers</topic>
|
|
<affects>
|
|
<package>
|
|
<name>jenkins</name>
|
|
<range><lt>1.587</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>jenkins-lts</name>
|
|
<range><lt>1.580.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Kohsuke Kawaguchi from Jenkins team reports:</p>
|
|
<blockquote cite="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-30">
|
|
<p>Historically, Jenkins master and slaves behaved as if
|
|
they altogether form a single distributed process. This
|
|
means a slave can ask a master to do just about anything
|
|
within the confinement of the operating system, such as
|
|
accessing files on the master or trigger other jobs on
|
|
Jenkins.</p>
|
|
<p>This has increasingly become problematic, as larger
|
|
enterprise deployments have developed more sophisticated
|
|
trust separation model, where the administators of a master
|
|
might take slaves owned by other teams. In such an
|
|
environment, slaves are less trusted than the master.
|
|
Yet the "single distributed process" assumption was not
|
|
communicated well to the users, resulting in vulnerabilities
|
|
in some deployments.</p>
|
|
<p>SECURITY-144 (CVE-2014-3665) introduces a new subsystem
|
|
to address this problem. This feature is off by default for
|
|
compatibility reasons. See Wiki for more details, who should
|
|
turn this on, and implications.</p>
|
|
<p>CVE-2014-3566 is rated high. It only affects
|
|
installations that accept slaves from less trusted
|
|
computers, but this will allow an owner of of such slave to
|
|
mount a remote code execution attack on Jenkins.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3665</cvename>
|
|
<url>https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-30</url>
|
|
<url>https://wiki.jenkins-ci.org/display/JENKINS/Slave+To+Master+Access+Control</url>
|
|
<url>http://www.cloudbees.com/jenkins-security-advisory-2014-10-30</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-30</discovery>
|
|
<entry>2014-10-31</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f8c88d50-5fb3-11e4-81bd-5453ed2e2b49">
|
|
<topic>libssh -- PRNG state reuse on forking servers</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libssh</name>
|
|
<range><lt>0.6.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Aris Adamantiadis reports:</p>
|
|
<blockquote cite="http://www.openwall.com/lists/oss-security/2014/03/05/1">
|
|
<p>When accepting a new connection, the server forks and the
|
|
child process handles the request. The RAND_bytes() function
|
|
of openssl doesn't reset its state after the fork, but
|
|
simply adds the current process id (getpid) to the PRNG
|
|
state, which is not guaranteed to be unique.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0017</cvename>
|
|
<mlist>http://www.openwall.com/lists/oss-security/2014/03/05/1</mlist>
|
|
<url>http://secunia.com/advisories/57407</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-05</discovery>
|
|
<entry>2014-10-29</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d057c5e6-5b20-11e4-bebd-000c2980a9f3">
|
|
<topic>libpurple/pidgin -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libpurple</name>
|
|
<range><lt>2.10.10</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>pidgin</name>
|
|
<range><lt>2.10.10</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The pidgin development team reports:</p>
|
|
<blockquote cite="https://developer.pidgin.im/wiki/ChangeLog">
|
|
<p>.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3694</cvename>
|
|
<cvename>CVE-2014-3697</cvename>
|
|
<cvename>CVE-2014-3696</cvename>
|
|
<cvename>CVE-2014-3695</cvename>
|
|
<cvename>CVE-2014-3698</cvename>
|
|
<url>https://developer.pidgin.im/wiki/ChangeLog</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-22</discovery>
|
|
<entry>2014-10-24</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="25b78f04-59c8-11e4-b711-6805ca0b3d42">
|
|
<topic>phpMyAdmin -- XSS vulnerabilities in SQL debug output and server monitor page.</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><ge>4.2.0</ge><lt>4.2.10.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The phpMyAdmin development team reports:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-12.php">
|
|
<p>With a crafted database or table name it is possible to
|
|
trigger an XSS in SQL debug output when enabled and in
|
|
server monitor page when viewing and analysing executed
|
|
queries.</p>
|
|
<p>This vulnerability can be triggered only by someone who
|
|
is logged in to phpMyAdmin, as the usual token protection
|
|
prevents non-logged-in users from accessing the required
|
|
pages. Moreover, debugging SQL is a developer option which
|
|
is disabled by default and expected to be disabled in
|
|
production environments.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-12.php</url>
|
|
<cvename>CVE-2014-8326</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-21</discovery>
|
|
<entry>2014-10-22</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="76c7a0f5-5928-11e4-adc7-001999f8d30b">
|
|
<topic>asterisk -- Asterisk Susceptibility to POODLE Vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>asterisk</name>
|
|
<range><lt>1.8.31.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>asterisk11</name>
|
|
<range><lt>11.13.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Asterisk project reports:</p>
|
|
<blockquote cite="http://www.asterisk.org/downloads/security-advisories">
|
|
<p>The POODLE vulnerability is described under CVE-2014-3566.
|
|
This advisory describes the Asterisk's project susceptibility
|
|
to this vulnerability.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://downloads.asterisk.org/pub/security/AST-2014-011.html</url>
|
|
<cvename>CVE-2014-3566</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-20</discovery>
|
|
<entry>2014-10-21</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0642b064-56c4-11e4-8b87-bcaec565249c">
|
|
<topic>libxml2 -- Denial of service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libxml2</name>
|
|
<range><lt>2.9.2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-c6-libxml2</name>
|
|
<range><lt>2.7.6_2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-f10-libxml2</name>
|
|
<range><ge>*</ge></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>RedHat reports:</p>
|
|
<blockquote cite="https://rhn.redhat.com/errata/RHSA-2014-1655.html">
|
|
<p>A denial of service flaw was found in libxml2, a library
|
|
providing support to read, modify and write XML and HTML
|
|
files. A remote attacker could provide a specially crafted
|
|
XML file that, when processed by an application using
|
|
libxml2, would lead to excessive CPU consumption (denial of
|
|
service) based on excessive entity substitutions, even if
|
|
entity substitution was disabled, which is the parser default
|
|
behavior.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3660</cvename>
|
|
<url>https://rhn.redhat.com/errata/RHSA-2014-1655.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-16</discovery>
|
|
<entry>2014-10-18</entry>
|
|
<modified>2015-07-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6f825fa4-5560-11e4-a4c3-00a0986f28c4">
|
|
<topic>drupal7 -- SQL injection</topic>
|
|
<affects>
|
|
<package>
|
|
<name>drupal7</name>
|
|
<range><lt>7.32</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Drupal Security Team reports:</p>
|
|
<blockquote cite="https://drupal.org/SA-CORE-2013-003">
|
|
<p>Drupal 7 includes a database abstraction API to ensure that
|
|
queries executed against the database are sanitized to prevent
|
|
SQL injection attacks.
|
|
A vulnerability in this API allows an attacker to send
|
|
specially crafted requests resulting in arbitrary SQL execution.
|
|
Depending on the content of the requests this can lead to
|
|
privilege escalation, arbitrary PHP execution, or other attacks.
|
|
This vulnerability can be exploited by anonymous users.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3704</cvename>
|
|
<url>https://www.drupal.org/SA-CORE-2014-005</url>
|
|
<url>https://www.sektioneins.de/en/blog/14-10-15-drupal-sql-injection-vulnerability.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-15</discovery>
|
|
<entry>2014-10-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="03175e62-5494-11e4-9cc1-bc5ff4fb5e7b">
|
|
<topic>OpenSSL -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openssl</name>
|
|
<range><ge>1.0.1</ge><lt>1.0.1_16</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>mingw32-openssl</name>
|
|
<range><ge>1.0.1</ge><lt>1.0.1j</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-c6-openssl</name>
|
|
<range><lt>1.0.1e_1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>8.4</ge><lt>8.4_17</lt></range>
|
|
<range><ge>9.1</ge><lt>9.1_20</lt></range>
|
|
<range><ge>9.2</ge><lt>9.2_13</lt></range>
|
|
<range><ge>9.3</ge><lt>9.3_3</lt></range>
|
|
<range><ge>10.0</ge><lt>10.0_10</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The OpenSSL Project reports:</p>
|
|
<blockquote cite="https://www.openssl.org/news/secadv_20141015.txt">
|
|
<p>A flaw in the DTLS SRTP extension parsing code allows an
|
|
attacker, who sends a carefully crafted handshake message,
|
|
to cause OpenSSL to fail to free up to 64k of memory causing
|
|
a memory leak. This could be exploited in a Denial Of Service
|
|
attack. This issue affects OpenSSL 1.0.1 server implementations
|
|
for both SSL/TLS and DTLS regardless of whether SRTP is used
|
|
or configured. Implementations of OpenSSL that have been
|
|
compiled with OPENSSL_NO_SRTP defined are not affected.
|
|
[CVE-2014-3513].</p>
|
|
<p>When an OpenSSL SSL/TLS/DTLS server receives a session
|
|
ticket the integrity of that ticket is first verified.
|
|
In the event of a session ticket integrity check failing,
|
|
OpenSSL will fail to free memory causing a memory leak.
|
|
By sending a large number of invalid session tickets an
|
|
attacker could exploit this issue in a Denial Of Service
|
|
attack. [CVE-2014-3567].</p>
|
|
<p>OpenSSL has added support for TLS_FALLBACK_SCSV to allow
|
|
applications to block the ability for a MITM attacker to
|
|
force a protocol downgrade.</p>
|
|
<p>Some client applications (such as browsers) will reconnect
|
|
using a downgraded protocol to work around interoperability
|
|
bugs in older servers. This could be exploited by an active
|
|
man-in-the-middle to downgrade connections to SSL 3.0 even
|
|
if both sides of the connection support higher protocols.
|
|
SSL 3.0 contains a number of weaknesses including POODLE
|
|
[CVE-2014-3566].</p>
|
|
<p>When OpenSSL is configured with "no-ssl3" as a build option,
|
|
servers could accept and complete a SSL 3.0 handshake, and
|
|
clients could be configured to send them. [CVE-2014-3568].</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<freebsdsa>SA-14:23.openssl</freebsdsa>
|
|
<cvename>CVE-2014-3513</cvename>
|
|
<cvename>CVE-2014-3566</cvename>
|
|
<cvename>CVE-2014-3567</cvename>
|
|
<cvename>CVE-2014-3568</cvename>
|
|
<url>https://www.openssl.org/news/secadv_20141015.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-15</discovery>
|
|
<entry>2014-10-15</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="9c1495ac-8d8c-4789-a0f3-8ca6b476619c">
|
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>firefox</name>
|
|
<range><lt>33.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>firefox-esr</name>
|
|
<range><lt>31.2.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox</name>
|
|
<range><lt>33.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-seamonkey</name>
|
|
<range><lt>2.30</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-thunderbird</name>
|
|
<range><lt>31.2.0</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>seamonkey</name>
|
|
<range><lt>2.30</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>thunderbird</name>
|
|
<range><lt>31.2.0</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>libxul</name>
|
|
<range><lt>31.2.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Mozilla Project reports:</p>
|
|
<blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
|
|
<p>MFSA 2014-74 Miscellaneous memory safety hazards
|
|
(rv:33.0 / rv:31.2)</p>
|
|
<p>MFSA 2014-75 Buffer overflow during CSS manipulation</p>
|
|
<p>MFSA 2014-76 Web Audio memory corruption issues with
|
|
custom waveforms</p>
|
|
<p>MFSA 2014-78 Further uninitialized memory use during GIF</p>
|
|
<p>MFSA 2014-79 Use-after-free interacting with text
|
|
directionality</p>
|
|
<p>MFSA 2014-80 Key pinning bypasses</p>
|
|
<p>MFSA 2014-81 Inconsistent video sharing within iframe</p>
|
|
<p>MFSA 2014-82 Accessing cross-origin objects via the
|
|
Alarms API</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1574</cvename>
|
|
<cvename>CVE-2014-1575</cvename>
|
|
<cvename>CVE-2014-1576</cvename>
|
|
<cvename>CVE-2014-1577</cvename>
|
|
<cvename>CVE-2014-1580</cvename>
|
|
<cvename>CVE-2014-1581</cvename>
|
|
<cvename>CVE-2014-1582</cvename>
|
|
<cvename>CVE-2014-1583</cvename>
|
|
<cvename>CVE-2014-1584</cvename>
|
|
<cvename>CVE-2014-1585</cvename>
|
|
<cvename>CVE-2014-1586</cvename>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-74.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-75.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-76.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-78.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-79.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-80.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-81.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-82.html</url>
|
|
<url>https://www.mozilla.org/security/announce/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-14</discovery>
|
|
<entry>2014-10-14</entry>
|
|
<modified>2015-08-12</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c30c3a2e-4fb1-11e4-b275-14dae9d210b8">
|
|
<topic>foreman-proxy SSL verification issue</topic>
|
|
<affects>
|
|
<package>
|
|
<name>foreman-proxy</name>
|
|
<range><lt>1.6.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Foreman Security reports:</p>
|
|
<blockquote cite="http://projects.theforeman.org/issues/7822">
|
|
<p>The smart proxy when running in an SSL-secured mode permits incoming
|
|
API calls to any endpoint without requiring, or performing any
|
|
verification of an SSL client certificate. This permits any client
|
|
with access to the API to make requests and perform actions
|
|
permitting control of Puppet CA, DHCP, DNS etc.)</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3691</cvename>
|
|
<url>https://groups.google.com/forum/#!topic/foreman-announce/LcjZx25Bl7U</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-05-09</discovery>
|
|
<entry>2014-10-09</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b6587341-4d88-11e4-aef9-20cf30e32f6d">
|
|
<topic>Bugzilla multiple security issues</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bugzilla44</name>
|
|
<range><lt>4.4.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Bugzilla Security Advisory</p>
|
|
<blockquote cite="http://www.bugzilla.org/security/4.0.14/">
|
|
<h5>Unauthorized Account Creation</h5>
|
|
<p>An attacker creating a new Bugzilla account can override certain
|
|
parameters when finalizing the account creation that can lead to the
|
|
user being created with a different email address than originally
|
|
requested. The overridden login name could be automatically added
|
|
to groups based on the group's regular expression setting.</p>
|
|
<h5>Cross-Site Scripting</h5>
|
|
<p>During an audit of the Bugzilla code base, several places
|
|
were found where cross-site scripting exploits could occur which
|
|
could allow an attacker to access sensitive information.</p>
|
|
<h5>Information Leak</h5>
|
|
<p>If a new comment was marked private to the insider group, and a flag
|
|
was set in the same transaction, the comment would be visible to
|
|
flag recipients even if they were not in the insider group.</p>
|
|
<h5>Social Engineering</h5>
|
|
<p>Search results can be exported as a CSV file which can then be
|
|
imported into external spreadsheet programs. Specially formatted
|
|
field values can be interpreted as formulas which can be executed
|
|
and used to attack a user's computer.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1572</cvename>
|
|
<cvename>CVE-2014-1573</cvename>
|
|
<cvename>CVE-2014-1571</cvename>
|
|
<url>https://bugzilla.mozilla.org/show_bug.cgi?id=1074812</url>
|
|
<url>https://bugzilla.mozilla.org/show_bug.cgi?id=1075578</url>
|
|
<url>https://bugzilla.mozilla.org/show_bug.cgi?id=1064140</url>
|
|
<url>https://bugzilla.mozilla.org/show_bug.cgi?id=1054702</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-06</discovery>
|
|
<entry>2014-10-06</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="81e2b308-4a6c-11e4-b711-6805ca0b3d42">
|
|
<topic>rt42 -- vulnerabilities related to shellshock</topic>
|
|
<affects>
|
|
<package>
|
|
<name>rt42</name>
|
|
<range><ge>4.2.0</ge><lt>4.2.8</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Best Practical reports:</p>
|
|
<blockquote cite="http://blog.bestpractical.com/2014/10/security-vulnerability-in-rt-42x-cve-2014-7227.html">
|
|
<p>RT 4.2.0 and above may be vulnerable to arbitrary
|
|
execution of code by way of CVE-2014-7169, CVE-2014-7186,
|
|
CVE-2014-7187, CVE-2014-6277, or CVE-2014-6271 --
|
|
collectively known as "Shellshock." This vulnerability
|
|
requires a privileged user with access to an RT instance
|
|
running with SMIME integration enabled; it applies to both
|
|
mod_perl and fastcgi deployments. If you have already
|
|
taken upgrades to bash to resolve "Shellshock," you are
|
|
protected from this vulnerability in RT, and there is no
|
|
need to apply this patch. This vulnerability has been
|
|
assigned CVE-2014-7227.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://blog.bestpractical.com/2014/10/security-vulnerability-in-rt-42x-cve-2014-7227.html</url>
|
|
<cvename>CVE-2014-7227</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-02</discovery>
|
|
<entry>2014-10-02</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="549a2771-49cc-11e4-ae2c-c80aa9043978">
|
|
<topic>jenkins -- remote execution, privilege escalation, XSS, password exposure, ACL hole, DoS</topic>
|
|
<affects>
|
|
<package>
|
|
<name>jenkins</name>
|
|
<range><lt>1.583</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>jenkins-lts</name>
|
|
<range><lt>1.565.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Jenkins Security Advisory:</p>
|
|
<blockquote cite="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01">
|
|
<p>Please reference CVE/URL list for details</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01</url>
|
|
<cvename>CVE-2014-3661</cvename>
|
|
<cvename>CVE-2014-3662</cvename>
|
|
<cvename>CVE-2014-3663</cvename>
|
|
<cvename>CVE-2014-3664</cvename>
|
|
<cvename>CVE-2014-3680</cvename>
|
|
<cvename>CVE-2014-3681</cvename>
|
|
<cvename>CVE-2014-3666</cvename>
|
|
<cvename>CVE-2014-3667</cvename>
|
|
<cvename>CVE-2013-2186</cvename>
|
|
<cvename>CVE-2014-1869</cvename>
|
|
<cvename>CVE-2014-3678</cvename>
|
|
<cvename>CVE-2014-3679</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-01</discovery>
|
|
<entry>2014-10-01</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="512d1301-49b9-11e4-ae2c-c80aa9043978">
|
|
<topic>bash -- remote code execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bash</name>
|
|
<name>bash-static</name>
|
|
<range><lt>4.3.25_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Note that this is different than the public "Shellshock"
|
|
issue.</p>
|
|
<p>Specially crafted environment variables could lead to remote
|
|
arbitrary code execution. This was fixed in bash 4.3.27, however
|
|
the port was patched with a mitigation in 4.3.25_2.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html</url>
|
|
<cvename>CVE-2014-6277</cvename>
|
|
<cvename>CVE-2014-6278</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-27</discovery>
|
|
<entry>2014-10-01</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="3e8b7f8a-49b0-11e4-b711-6805ca0b3d42">
|
|
<topic>phpMyAdmin -- XSS vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><ge>4.2.0</ge><lt>4.2.9.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The phpMyAdmin development team reports:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-11.php">
|
|
<p>With a crafted ENUM value it is possible to trigger an
|
|
XSS in table search and table structure pages. This
|
|
vulnerability can be triggered only by someone who is
|
|
logged in to phpMyAdmin, as the usual token protection
|
|
prevents non-logged-in users from accessing the required
|
|
pages.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-11.php</url>
|
|
<cvename>CVE-2014-7217</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-10-01</discovery>
|
|
<entry>2014-10-01</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="4a4e9f88-491c-11e4-ae2c-c80aa9043978">
|
|
<topic>bash -- out-of-bounds memory access in parser</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bash</name>
|
|
<name>bash-static</name>
|
|
<range><lt>4.3.27_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>RedHat security team reports:</p>
|
|
<blockquote cite="https://access.redhat.com/security/cve/CVE-2014-7186">
|
|
<p>It was discovered that the fixed-sized redir_stack could be forced
|
|
to overflow in the Bash parser, resulting in memory corruption, and
|
|
possibly leading to arbitrary code execution when evaluating
|
|
untrusted input that would not otherwise be run as code.</p>
|
|
</blockquote>
|
|
<blockquote cite="https://access.redhat.com/security/cve/CVE-2014-7187">
|
|
<p>An off-by-one error was discovered in the way Bash was handling
|
|
deeply nested flow control constructs. Depending on the layout of
|
|
the .bss segment, this could allow arbitrary execution of code that
|
|
would not otherwise be executed by Bash.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://access.redhat.com/security/cve/CVE-2014-7186</url>
|
|
<cvename>CVE-2014-7186</cvename>
|
|
<cvename>CVE-2014-7187</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-25</discovery>
|
|
<entry>2014-10-01</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="8e0e86ff-48b5-11e4-ab80-000c29f6ae42">
|
|
<topic>rsyslog -- remote syslog PRI vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>rsyslog</name>
|
|
<range><lt>7.6.7</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>rsyslog8</name>
|
|
<range><lt>8.4.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The rsyslog project reports:</p>
|
|
<blockquote cite="http://www.rsyslog.com/remote-syslog-pri-vulnerability/">
|
|
<p>potential abort when a message with PRI > 191 was processed
|
|
if the "pri-text" property was used in active templates,
|
|
this could be abused to a remote denial of service from
|
|
permitted senders</p>
|
|
<p>The original fix for CVE-2014-3634 was not adequate.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.rsyslog.com/remote-syslog-pri-vulnerability/</url>
|
|
<cvename>CVE-2014-3634</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-30</discovery>
|
|
<entry>2014-09-30</entry>
|
|
<modified>2014-10-02</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6c083cf8-4830-11e4-ae2c-c80aa9043978">
|
|
<topic>fish -- local privilege escalation and remote code execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>fish</name>
|
|
<range><ge>1.6.0</ge><lt>2.1.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Fish developer David Adam reports:</p>
|
|
<blockquote cite="http://www.openwall.com/lists/oss-security/2014/09/28/8">
|
|
<p>This release fixes a number of local privilege escalation
|
|
vulnerability and one remote code execution vulnerability.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.openwall.com/lists/oss-security/2014/09/28/8</url>
|
|
<cvename>CVE-2014-2905</cvename>
|
|
<url>https://github.com/fish-shell/fish-shell/issues/1436</url>
|
|
<cvename>CVE-2014-2906</cvename>
|
|
<cvename>CVE-2014-3856</cvename>
|
|
<url>https://github.com/fish-shell/fish-shell/issues/1437</url>
|
|
<cvename>CVE-2014-2914</cvename>
|
|
<url>https://github.com/fish-shell/fish-shell/issues/1438</url>
|
|
<cvename>CVE-2014-3219</cvename>
|
|
<url>https://github.com/fish-shell/fish-shell/issues/1440</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-28</discovery>
|
|
<entry>2014-09-29</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ca44b64c-4453-11e4-9ea1-c485083ca99c">
|
|
<topic>Flash player -- Multiple security vulnerabilities in www/linux-*-flashplugin11</topic>
|
|
<affects>
|
|
<package>
|
|
<name>linux-f10-flashplugin</name>
|
|
<range><lt>11.2r202.400</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-c6-flashplugin</name>
|
|
<range><lt>11.2r202.400</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Adobe reports:</p>
|
|
<blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb14-21.html">
|
|
<p>These updates address vulnerabilities that could cause a crash
|
|
and potentially allow an attacker to take control of the affected system.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0547</cvename>
|
|
<cvename>CVE-2014-0548</cvename>
|
|
<cvename>CVE-2014-0549</cvename>
|
|
<cvename>CVE-2014-0550</cvename>
|
|
<cvename>CVE-2014-0551</cvename>
|
|
<cvename>CVE-2014-0552</cvename>
|
|
<cvename>CVE-2014-0553</cvename>
|
|
<cvename>CVE-2014-0554</cvename>
|
|
<cvename>CVE-2014-0555</cvename>
|
|
<cvename>CVE-2014-0556</cvename>
|
|
<cvename>CVE-2014-0557</cvename>
|
|
<cvename>CVE-2014-0559</cvename>
|
|
<url>http://helpx.adobe.com/security/products/flash-player/apsb14-21.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-09</discovery>
|
|
<entry>2014-09-25</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="48108fb0-751c-4cbb-8f33-09239ead4b55">
|
|
<topic>NSS -- RSA Signature Forgery</topic>
|
|
<affects>
|
|
<package>
|
|
<name>linux-firefox</name>
|
|
<range><lt>32.0.3,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-thunderbird</name>
|
|
<range><lt>31.1.2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-seamonkey</name>
|
|
<range><lt>2.29.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>nss</name>
|
|
<range><lt>3.17.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-c6-nss</name>
|
|
<range><lt>3.16.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Mozilla Project reports:</p>
|
|
<blockquote cite="https://www.mozilla.org/security/announce/2014/mfsa2014-73.html">
|
|
<p>Antoine Delignat-Lavaud discovered that NSS is vulnerable
|
|
to a variant of a signature forgery attack previously
|
|
published by Daniel Bleichenbacher. This is due to lenient
|
|
parsing of ASN.1 values involved in a signature and could
|
|
lead to the forging of RSA certificates.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1568</cvename>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-73.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-23</discovery>
|
|
<entry>2014-09-25</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="fb25333d-442f-11e4-98f3-5453ed2e2b49">
|
|
<topic>krfb -- Multiple security issues in bundled libvncserver</topic>
|
|
<affects>
|
|
<package>
|
|
<name>krfb</name>
|
|
<range><lt>4.12.5_4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Martin Sandsmark reports:</p>
|
|
<blockquote cite="http://lists.kde.org/?l=kde-announce&m=141153917319769&w=2">
|
|
<p>krfb 4.14 [and earlier] embeds libvncserver which has had
|
|
several security issues.</p>
|
|
<p>Several remotely exploitable security issues have been
|
|
uncovered in libvncserver, some of which might allow a
|
|
remote authenticated user code execution or application
|
|
crashes.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-6055</cvename>
|
|
<mlist>http://lists.kde.org/?l=kde-announce&m=141153917319769&w=2</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-23</discovery>
|
|
<entry>2014-09-25</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="71ad81da-4414-11e4-a33e-3c970e169bc2">
|
|
<topic>bash -- remote code execution vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bash</name>
|
|
<name>bash-static</name>
|
|
<range><gt>3.0</gt><le>3.0.17</le></range>
|
|
<range><gt>3.1</gt><le>3.1.18</le></range>
|
|
<range><gt>3.2</gt><le>3.2.52</le></range>
|
|
<range><gt>4.0</gt><le>4.0.39</le></range>
|
|
<range><gt>4.1</gt><le>4.1.12</le></range>
|
|
<range><gt>4.2</gt><le>4.2.48</le></range>
|
|
<range><gt>4.3</gt><lt>4.3.25_1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux_base-c6</name>
|
|
<range><lt>6.5_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Chet Ramey reports:</p>
|
|
<blockquote cite="https://lists.gnu.org/archive/html/bug-bash/2014-09/msg00081.html">
|
|
<p>Under certain circumstances, bash will execute user code
|
|
while processing the environment for exported function
|
|
definitions.</p>
|
|
</blockquote>
|
|
<p>The original fix released for CVE-2014-6271 was not adequate. A
|
|
similar vulnerability was discovered and tagged as CVE-2014-7169.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-6271</cvename>
|
|
<cvename>CVE-2014-7169</cvename>
|
|
<url>https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/</url>
|
|
<url>https://lists.gnu.org/archive/html/bug-bash/2014-09/msg00081.html</url>
|
|
<url>http://seclists.org/oss-sec/2014/q3/690</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-24</discovery>
|
|
<entry>2014-09-24</entry>
|
|
<modified>2014-09-25</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e60d9e65-3f6b-11e4-ad16-001999f8d30b">
|
|
<topic>asterisk -- Remotely triggered crash</topic>
|
|
<affects>
|
|
<package>
|
|
<name>asterisk11</name>
|
|
<range><lt>11.12.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Asterisk project reports:</p>
|
|
<blockquote cite="https://www.asterisk.org/security">
|
|
<p>When an out of call message - delivered by either the
|
|
SIP or PJSIP channel driver or the XMPP stack - is handled
|
|
in Asterisk, a crash can occur if the channel servicing
|
|
the message is sent into the ReceiveFax dialplan application
|
|
while using the res_fax_spandsp module.</p>
|
|
<p>Note that this crash does not occur when using the
|
|
res_fax_digium module. While this crash technically
|
|
occurs due to a configuration issue, as attempting to
|
|
receive a fax from a channel driver that only contains
|
|
textual information will never succeed, the likelihood
|
|
of having it occur is sufficiently high as to warrant
|
|
this advisory.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://downloads.asterisk.org/pub/security/AST-2014-010.pdf</url>
|
|
<url>https://issues.asterisk.org/jira/browse/ASTERISK-24301</url>
|
|
<url>https://www.asterisk.org/security</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-05</discovery>
|
|
<entry>2014-09-18</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d3324c55-3f11-11e4-ad16-001999f8d30b">
|
|
<topic>squid -- Buffer overflow in SNMP processing</topic>
|
|
<affects>
|
|
<package>
|
|
<name>squid</name>
|
|
<range><lt>3.4.8</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>squid32</name>
|
|
<range><gt>0</gt></range>
|
|
</package>
|
|
<package>
|
|
<name>squid33</name>
|
|
<range><lt>3.3.13_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The squid-cache project reports:</p>
|
|
<blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2014_3.txt">
|
|
<p>Due to incorrect buffer management Squid can be caused
|
|
by an attacker to write outside its allocated SNMP buffer.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.squid-cache.org/Advisories/SQUID-2014_3.txt</url>
|
|
<cvename>CVE-2014-6270</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-15</discovery>
|
|
<entry>2014-09-18</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="38242d51-3e58-11e4-ac2f-bcaec565249c">
|
|
<topic>dbus -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>dbus</name>
|
|
<range><lt>1.8.8</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Simon McVittie reports:</p>
|
|
<blockquote cite="http://lists.freedesktop.org/archives/dbus/2014-September/016343.html">
|
|
<p>Do not accept an extra fd in the padding of a cmsg message,
|
|
which could lead to a 4-byte heap buffer overrun
|
|
(CVE-2014-3635).</p>
|
|
<p>Reduce default for maximum Unix file descriptors passed per
|
|
message from 1024 to 16, preventing a uid with the default
|
|
maximum number of connections from exhausting the system
|
|
bus' file descriptors under Linux's default rlimit
|
|
(CVE-2014-3636).</p>
|
|
<p>Disconnect connections that still have a fd pending
|
|
unmarshalling after a new configurable limit,
|
|
pending_fd_timeout (defaulting to 150 seconds), removing
|
|
the possibility of creating an abusive connection that
|
|
cannot be disconnected by setting up a circular reference
|
|
to a connection's file descriptor (CVE-2014-3637).</p>
|
|
<p>Reduce default for maximum pending replies per connection
|
|
from 8192 to 128, mitigating an algorithmic complexity
|
|
denial-of-service attack (CVE-2014-3638).</p>
|
|
<p>Reduce default for authentication timeout on the system
|
|
bus from 30 seconds to 5 seconds, avoiding denial of service
|
|
by using up all unauthenticated connection slots; and when
|
|
all unauthenticated connection slots are used up, make new
|
|
connection attempts block instead of disconnecting them
|
|
(CVE-2014-3639).</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3635</cvename>
|
|
<cvename>CVE-2014-3636</cvename>
|
|
<cvename>CVE-2014-3637</cvename>
|
|
<cvename>CVE-2014-3638</cvename>
|
|
<cvename>CVE-2014-3639</cvename>
|
|
<url>http://lists.freedesktop.org/archives/dbus/2014-September/016343.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-16</discovery>
|
|
<entry>2014-09-17</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="77b784bb-3dc6-11e4-b191-f0def16c5c1b">
|
|
<topic>nginx -- inject commands into SSL session vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>nginx</name>
|
|
<range><ge>0.6.0</ge><lt>1.6.2,2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>nginx-devel</name>
|
|
<range><ge>0.5.6</ge><lt>1.7.5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The nginx project reports:</p>
|
|
<blockquote cite="http://mailman.nginx.org/pipermail/nginx-announce/2014/000147.html">
|
|
<p>Security: it was possible to reuse SSL sessions in unrelated contexts
|
|
if a shared SSL session cache or the same TLS session ticket key was
|
|
used for multiple "server" blocks (CVE-2014-3616).</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3616</cvename>
|
|
<url>http://mailman.nginx.org/pipermail/nginx-announce/2014/000147.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-16</discovery>
|
|
<entry>2014-09-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="cc627e6c-3b89-11e4-b629-6805ca0b3d42">
|
|
<topic>phpMyAdmin -- XSRF/CSRF due to DOM based XSS in the micro history feature</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><ge>4.2.0</ge><lt>4.2.8.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The phpMyAdmin development team reports:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-10.php">
|
|
<p>XSRF/CSRF due to DOM based XSS in the micro history feature.</p>
|
|
<p>By deceiving a logged-in user to click on a crafted URL,
|
|
it is possible to perform remote code execution and in some
|
|
cases, create a root account due to a DOM based XSS
|
|
vulnerability in the micro history feature.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-10.php</url>
|
|
<cvename>CVE-2014-6300</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-13</discovery>
|
|
<entry>2014-09-13</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="36858e78-3963-11e4-ad84-000c29f6ae42">
|
|
<topic>security/ossec-hids-* -- root escalation via temp files</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ossec-hids-server</name>
|
|
<name>ossec-hids-client</name>
|
|
<name>ossec-hids-local</name>
|
|
<range><lt>2.8.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>OSSEC reports:</p>
|
|
<blockquote cite="http://www.ossec.net/?p=1135">
|
|
<p>This correction will create the temp file for the hosts deny file
|
|
in /var/ossec and will use mktemp where available to create
|
|
NON-predictable temp file name. In cases where mktemp is not
|
|
available we have written a BAD version of mktemp, but should be a
|
|
little better then just process id.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-5284</cvename>
|
|
<url>http://www.ossec.net/?p=1135</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-09-09</discovery>
|
|
<entry>2014-09-11</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6318b303-3507-11e4-b76c-0011d823eebd">
|
|
<topic>trafficserver -- unspecified vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>trafficserver</name>
|
|
<range><lt>5.0.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Bryan Call reports:</p>
|
|
<blockquote cite="http://mail-archives.apache.org/mod_mbox/trafficserver-users/201407.mbox/%3CBFCEC9C8-1BE9-4DCA-AF9C-B8FE798EEC07@yahoo-inc.com%3E">
|
|
<p>Below is our announcement for the security issue reported to us
|
|
from Yahoo! Japan. All versions of Apache Traffic Server are
|
|
vulnerable. We urge users to upgrade to either 4.2.1.1 or 5.0.1
|
|
immediately.</p>
|
|
<p>This fixes CVE-2014-3525 and limits access to how the health
|
|
checks are performed.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3525</cvename>
|
|
<url>http://mail-archives.apache.org/mod_mbox/trafficserver-users/201407.mbox/%3CBFCEC9C8-1BE9-4DCA-AF9C-B8FE798EEC07@yahoo-inc.com%3E</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-23</discovery>
|
|
<entry>2014-09-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="84203724-296b-11e4-bebd-000c2980a9f3">
|
|
<topic>file -- buffer overruns and missing buffer size tests</topic>
|
|
<affects>
|
|
<package>
|
|
<name>file</name>
|
|
<range><lt>5.19</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Christos Zoulas reports:</p>
|
|
<blockquote cite="http://mx.gw.com/pipermail/file/2014/001553.html">
|
|
<p>A specially crafted file can cause a segmentation fault.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://mx.gw.com/pipermail/file/2014/001553.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-09</discovery>
|
|
<entry>2014-08-21</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="3c5579f7-294a-11e4-99f6-00e0814cab4e">
|
|
<topic>django -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>py27-django</name>
|
|
<range><ge>1.6</ge><lt>1.6.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py27-django15</name>
|
|
<range><ge>1.5</ge><lt>1.5.9</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py27-django14</name>
|
|
<range><ge>1.4</ge><lt>1.4.14</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py32-django</name>
|
|
<range><ge>1.6</ge><lt>1.6.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py32-django15</name>
|
|
<range><ge>1.5</ge><lt>1.5.9</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py33-django</name>
|
|
<range><ge>1.6</ge><lt>1.6.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py33-django15</name>
|
|
<range><ge>1.5</ge><lt>1.5.9</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py34-django</name>
|
|
<range><ge>1.6</ge><lt>1.6.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py34-django15</name>
|
|
<range><ge>1.5</ge><lt>1.5.9</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py27-django-devel</name>
|
|
<range><lt>20140821,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py32-django-devel</name>
|
|
<range><lt>20140821,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py33-django-devel</name>
|
|
<range><lt>20140821,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py34-django-devel</name>
|
|
<range><lt>20140821,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Django project reports:</p>
|
|
<blockquote cite="https://www.djangoproject.com/weblog/2014/aug/20/security/">
|
|
<p>These releases address an issue with reverse() generating external
|
|
URLs; a denial of service involving file uploads; a potential
|
|
session hijacking issue in the remote-user middleware; and a data
|
|
leak in the administrative interface. We encourage all users of
|
|
Django to upgrade as soon as possible.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://www.djangoproject.com/weblog/2014/aug/20/security/</url>
|
|
<cvename>CVE-2014-0480</cvename>
|
|
<cvename>CVE-2014-0481</cvename>
|
|
<cvename>CVE-2014-0482</cvename>
|
|
<cvename>CVE-2014-0483</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-08-20</discovery>
|
|
<entry>2014-08-21</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d2a892b9-2605-11e4-9da0-00a0986f28c4">
|
|
<topic>PHP multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>php53</name>
|
|
<range><lt>5.3.29</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The PHP Team reports:</p>
|
|
<blockquote cite="http://php.net/ChangeLog-5.php#5.3.29">
|
|
<p>insecure temporary file use in the configure script</p>
|
|
<p>unserialize() SPL ArrayObject / SPLObjectStorage Type Confusion
|
|
</p>
|
|
<p>Heap buffer over-read in DateInterval</p>
|
|
<p>fileinfo: cdf_read_short_sector insufficient boundary check</p>
|
|
<p>fileinfo: CDF infinite loop in nelements DoS</p>
|
|
<p>fileinfo: fileinfo: numerous file_printf calls resulting in
|
|
performance degradation)</p>
|
|
<p>Fix potential segfault in dns_check_record()</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-6712</cvename>
|
|
<cvename>CVE-2014-0207</cvename>
|
|
<cvename>CVE-2014-0237</cvename>
|
|
<cvename>CVE-2014-0238</cvename>
|
|
<cvename>CVE-2014-3515</cvename>
|
|
<cvename>CVE-2014-3981</cvename>
|
|
<cvename>CVE-2014-4049</cvename>
|
|
<url>http://php.net/ChangeLog-5.php#5.3.29</url>
|
|
<url>https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-08-14</discovery>
|
|
<entry>2014-08-18</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="fbb01289-2645-11e4-bc44-6805ca0b3d42">
|
|
<topic>phpMyAdmin -- XSS vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><ge>4.2.0</ge><lt>4.2.7.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The phpMyAdmin development team reports:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-8.php">
|
|
<p>Multiple XSS vulnerabilities in browse table, ENUM
|
|
editor, monitor, query charts and table relations pages.</p>
|
|
<p> With a crafted database, table or a primary/unique key
|
|
column name it is possible to trigger an XSS when dropping
|
|
a row from the table. With a crafted column name it is
|
|
possible to trigger an XSS in the ENUM editor dialog. With
|
|
a crafted variable name or a crafted value for unit field
|
|
it is possible to trigger a self-XSS when adding a new
|
|
chart in the monitor page. With a crafted value for x-axis
|
|
label it is possible to trigger a self-XSS in the query
|
|
chart page. With a crafted relation name it is possible to
|
|
trigger an XSS in table relations page.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-9.php">
|
|
<p>XSS in view operations page.</p>
|
|
<p>With a crafted view name it is possible to trigger an
|
|
XSS when dropping the view in view operation page.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-8.php</url>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-9.php</url>
|
|
<cvename>CVE-2014-5273</cvename>
|
|
<cvename>CVE-2014-5274</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-08-17</discovery>
|
|
<entry>2014-08-17</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="69048656-2187-11e4-802c-20cf30e32f6d">
|
|
<topic>serf -- SSL Certificate Null Byte Poisoning</topic>
|
|
<affects>
|
|
<package>
|
|
<name>serf</name>
|
|
<range><lt>1.3.7</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>serf Development list reports:</p>
|
|
<blockquote cite="https://groups.google.com/forum/#!topic/serf-dev/NvgPoK6sFsc">
|
|
<p>Serf provides APIs to retrieve information about a certificate. These
|
|
APIs return the information as NUL terminated strings (commonly called C
|
|
strings). X.509 uses counted length strings which may include a NUL byte.
|
|
This means that a library user will interpret any information as ending
|
|
upon seeing this NUL byte and will only see a partial value for that field.
|
|
</p>
|
|
<p>Attackers could exploit this vulnerability to create a certificate that a
|
|
client will accept for a different hostname than the full certificate is
|
|
actually for by embedding a NUL byte in the certificate.</p>
|
|
<p>This can lead to a man-in-the-middle attack. There are no known instances
|
|
of this problem being exploited in the wild and in practice it should be
|
|
difficult to actually exploit this vulnerability.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3504</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-08-06</discovery>
|
|
<entry>2014-08-11</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="83a418cc-2182-11e4-802c-20cf30e32f6d">
|
|
<topic>subversion -- several vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>subversion16</name>
|
|
<range><ge>1.0.0</ge><lt>1.7.18</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>subversion17</name>
|
|
<range><ge>1.0.0</ge><lt>1.7.18</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>subversion</name>
|
|
<range><ge>1.0.0</ge><lt>1.7.18</lt></range>
|
|
<range><ge>1.8.0</ge><lt>1.8.10</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Subversion Project reports:</p>
|
|
<blockquote cite="http://subversion.apache.org/security/CVE-2014-3522-advisory.txt">
|
|
<p>Using the Serf RA layer of Subversion for HTTPS uses the apr_fnmatch API
|
|
to handle matching wildcards in certificate Common Names and Subject
|
|
Alternate Names. However, apr_fnmatch is not designed for this purpose.
|
|
Instead it is designed to behave like common shell globbing. In particular
|
|
this means that '*' is not limited to a single label within a hostname
|
|
(i.e. it will match '.'). But even further apr_fnmatch supports '?' and
|
|
character classes (neither of which are part of the RFCs defining how
|
|
certificate validation works).</p>
|
|
<p>Subversion stores cached credentials by an MD5 hash based on the URL and
|
|
the authentication realm of the server the credentials are cached for.
|
|
MD5 has been shown to be subject to chosen plaintext hash collisions.
|
|
This means it may be possible to generate an authentication realm which
|
|
results in the same MD5 hash for a different URL.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3522</cvename>
|
|
<cvename>CVE-2014-3528</cvename>
|
|
<url>http://subversion.apache.org/security/CVE-2014-3522-advisory.txt</url>
|
|
<url>http://subversion.apache.org/security/CVE-2014-3528-advisory.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-08-06</discovery>
|
|
<entry>2014-08-11</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ad747a01-1fee-11e4-8ff1-f0def16c5c1b">
|
|
<topic>nginx -- inject commands into SSL session vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>nginx</name>
|
|
<range><ge>1.6.0,2</ge><lt>1.6.1,2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>nginx-devel</name>
|
|
<range><ge>1.5.6</ge><lt>1.7.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The nginx project reports:</p>
|
|
<blockquote cite="http://mailman.nginx.org/pipermail/nginx-announce/2014/000144.html">
|
|
<p>Security: pipelined commands were not discarded after STARTTLS
|
|
command in SMTP proxy (CVE-2014-3556); the bug had appeared in 1.5.6.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3556</cvename>
|
|
<url>http://mailman.nginx.org/pipermail/nginx-announce/2014/000144.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-08-05</discovery>
|
|
<entry>2014-08-09</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="8aff07eb-1dbd-11e4-b6ba-3c970e169bc2">
|
|
<topic>OpenSSL -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openssl</name>
|
|
<range><ge>1.0.1</ge><lt>1.0.1_14</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>mingw32-openssl</name>
|
|
<range><ge>1.0.1</ge><lt>1.0.1i</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>8.4</ge><lt>8.4_15</lt></range>
|
|
<range><ge>9.1</ge><lt>9.1_18</lt></range>
|
|
<range><ge>9.2</ge><lt>9.2_11</lt></range>
|
|
<range><ge>9.3</ge><lt>9.3_1</lt></range>
|
|
<range><ge>10.0</ge><lt>10.0_8</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The OpenSSL Project reports:</p>
|
|
<blockquote cite="https://www.openssl.org/news/secadv_20140806.txt">
|
|
<p>A flaw in OBJ_obj2txt may cause pretty printing functions
|
|
such as X509_name_oneline, X509_name_print_ex et al. to leak
|
|
some information from the stack. [CVE-2014-3508]</p>
|
|
<p>The issue affects OpenSSL clients and allows a malicious
|
|
server to crash the client with a null pointer dereference
|
|
(read) by specifying an SRP ciphersuite even though it was
|
|
not properly negotiated with the client. [CVE-2014-5139]</p>
|
|
<p>If a multithreaded client connects to a malicious server
|
|
using a resumed session and the server sends an ec point
|
|
format extension it could write up to 255 bytes to freed
|
|
memory. [CVE-2014-3509]</p>
|
|
<p>An attacker can force an error condition which causes
|
|
openssl to crash whilst processing DTLS packets due to
|
|
memory being freed twice. This can be exploited through
|
|
a Denial of Service attack. [CVE-2014-3505]</p>
|
|
<p>An attacker can force openssl to consume large amounts
|
|
of memory whilst processing DTLS handshake messages.
|
|
This can be exploited through a Denial of Service
|
|
attack. [CVE-2014-3506]</p>
|
|
<p>By sending carefully crafted DTLS packets an attacker
|
|
could cause openssl to leak memory. This can be exploited
|
|
through a Denial of Service attack. [CVE-2014-3507]</p>
|
|
<p>OpenSSL DTLS clients enabling anonymous (EC)DH
|
|
ciphersuites are subject to a denial of service attack.
|
|
A malicious server can crash the client with a null pointer
|
|
dereference (read) by specifying an anonymous (EC)DH
|
|
ciphersuite and sending carefully crafted handshake
|
|
messages. [CVE-2014-3510]</p>
|
|
<p>A flaw in the OpenSSL SSL/TLS server code causes the
|
|
server to negotiate TLS 1.0 instead of higher protocol
|
|
versions when the ClientHello message is badly
|
|
fragmented. This allows a man-in-the-middle attacker
|
|
to force a downgrade to TLS 1.0 even if both the server
|
|
and the client support a higher protocol version, by
|
|
modifying the client's TLS records. [CVE-2014-3511]</p>
|
|
<p>A malicious client or server can send invalid SRP
|
|
parameters and overrun an internal buffer. Only
|
|
applications which are explicitly set up for SRP
|
|
use are affected. [CVE-2014-3512]</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://www.openssl.org/news/secadv_20140806.txt</url>
|
|
<freebsdsa>SA-14:18.openssl</freebsdsa>
|
|
<cvename>CVE-2014-3505</cvename>
|
|
<cvename>CVE-2014-3506</cvename>
|
|
<cvename>CVE-2014-3507</cvename>
|
|
<cvename>CVE-2014-3508</cvename>
|
|
<cvename>CVE-2014-3509</cvename>
|
|
<cvename>CVE-2014-3510</cvename>
|
|
<cvename>CVE-2014-3511</cvename>
|
|
<cvename>CVE-2014-3512</cvename>
|
|
<cvename>CVE-2014-5139</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-08-06</discovery>
|
|
<entry>2014-08-06</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="be5421ab-1b56-11e4-a767-5453ed2e2b49">
|
|
<topic>krfb -- Possible Denial of Service or code execution via integer overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>krfb</name>
|
|
<range><lt>4.12.5_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Albert Aastals Cid reports:</p>
|
|
<blockquote cite="http://lists.kde.org/?l=kde-announce&m=140709940701878&w=2">
|
|
<p>krfb embeds libvncserver which embeds liblzo2, it contains various
|
|
flaws that result in integer overflow problems.</p>
|
|
<p>This potentially allows a malicious application to create a
|
|
possible denial of service or code execution. Due to the need to
|
|
exploit precise details of the target architecture and threading it
|
|
is unlikely that remote code execution can be achieved in
|
|
practice.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-4607</cvename>
|
|
<mlist>http://lists.kde.org/?l=kde-announce&m=140709940701878&w=2</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-08-03</discovery>
|
|
<entry>2014-08-03</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="89ff45e3-1a57-11e4-bebd-000c2980a9f3">
|
|
<topic>samba -- remote code execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>samba4</name>
|
|
<range><ge>4.0.0</ge><lt>4.0.21</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>samba41</name>
|
|
<range><ge>4.1.0</ge><lt>4.1.11</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Samba developers report:</p>
|
|
<blockquote cite="http://www.samba.org/samba/security/CVE-2014-3560">
|
|
<p>A malicious browser can send packets that may overwrite the heap of
|
|
the target nmbd NetBIOS name services daemon. It may be possible to
|
|
use this to generate a remote code execution vulnerability as the
|
|
superuser (root).</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3560</cvename>
|
|
<url>http://www.samba.org/samba/security/CVE-2014-3560</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-31</discovery>
|
|
<entry>2014-08-02</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="90ca3ba5-19e6-11e4-8616-001b3856973b">
|
|
<topic>gpgme -- heap-based buffer overflow in gpgsm status handler</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gpgme</name>
|
|
<range><lt>1.5.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Tomas Trnka reports:</p>
|
|
<blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=1113267">
|
|
<p>Gpgme contains a buffer overflow in the gpgsm status handler
|
|
that could possibly be exploited using a specially crafted certificate.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3564</cvename>
|
|
<url>https://bugzilla.redhat.com/show_bug.cgi?id=1113267</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-25</discovery>
|
|
<entry>2014-08-02</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="2f90556f-18c6-11e4-9cc4-5453ed2e2b49">
|
|
<topic>kdelibs -- KAuth PID Reuse Flaw</topic>
|
|
<affects>
|
|
<package>
|
|
<name>kdelibs</name>
|
|
<range><lt>4.12.5_3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Martin Sandsmark reports:</p>
|
|
<blockquote cite="http://lists.kde.org/?l=kde-announce&m=140674898412923&w=2">
|
|
<p>The KAuth framework uses polkit-1 API which tries to authenticate
|
|
using the requestors PID. This is prone to PID reuse race
|
|
conditions.</p>
|
|
<p>This potentially allows a malicious application to pose as another
|
|
for authentication purposes when executing privileged actions.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-5033</cvename>
|
|
<mlist>http://lists.kde.org/?l=kde-announce&m=140674898412923&w=2</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-30</discovery>
|
|
<entry>2014-07-31</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="31c09848-1829-11e4-bf04-60a44c524f57">
|
|
<topic>tor -- traffic confirmation attack</topic>
|
|
<affects>
|
|
<package>
|
|
<name>tor</name>
|
|
<range><lt>0.2.4.23</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>tor-devel</name>
|
|
<range><lt>0.2.5.6.a</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Tor Project reports:</p>
|
|
<blockquote cite="https://lists.torproject.org/pipermail/tor-announce/2014-July/000094.html">
|
|
<p>Tor before 0.2.4.23 and 0.2.5 before 0.2.5.6-alpha maintains a
|
|
circuit after an inbound RELAY_EARLY cell is received by a client,
|
|
which makes it easier for remote attackers to conduct
|
|
traffic-confirmation attacks by using the pattern of RELAY and
|
|
RELAY_EARLY cells as a means of communicating information about
|
|
hidden service names.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://lists.torproject.org/pipermail/tor-announce/2014-July/000094.html</url>
|
|
<url>https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack</url>
|
|
<cvename>CVE-2014-5117</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-30</discovery>
|
|
<entry>2014-07-30</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="13419364-1685-11e4-bf04-60a44c524f57">
|
|
<topic>i2p -- Multiple Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>i2p</name>
|
|
<range><lt>0.9.14</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The i2p project reports:</p>
|
|
<blockquote cite="http://geti2p.net/en/blog/post/2014/07/26/0.9.14-Release">
|
|
<p>XSS and remote execution vulnerabilities reported by Exodus Intelligence.</p>
|
|
</blockquote>
|
|
<p>Exodus Intelligence reports:</p>
|
|
<blockquote cite="http://blog.exodusintel.com/2014/07/23/silverbullets_and_fairytails/">
|
|
<p>The vulnerability we have found is able to perform remote code
|
|
execution with a specially crafted payload. This payload can be
|
|
customized to unmask a user and show the public IP address in
|
|
which the user connected from within 'a couple of seconds.'</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://blog.exodusintel.com/2014/07/23/silverbullets_and_fairytails/</url>
|
|
<url>http://geti2p.net/en/blog/post/2014/07/26/0.9.14-Release</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-24</discovery>
|
|
<entry>2014-07-28</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="9defb2d6-1404-11e4-8cae-20cf30e32f6d">
|
|
<topic>bugzilla -- Cross Site Request Forgery</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bugzilla44</name>
|
|
<range><lt>4.4.5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>A Bugzilla Security Advisory reports:</h1>
|
|
<blockquote cite="http://www.bugzilla.org/security/4.0.13/">
|
|
<p>Adobe does not properly restrict the SWF file format,
|
|
which allows remote attackers to conduct cross-site
|
|
request forgery (CSRF) attacks against Bugzilla's JSONP
|
|
endpoint, possibly obtaining sensitive bug information,
|
|
via a crafted OBJECT element with SWF content satisfying
|
|
the character-set requirements of a callback API.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1546</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-24</discovery>
|
|
<entry>2014-07-25</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f927e06c-1109-11e4-b090-20cf30e32f6d">
|
|
<topic>apache22 -- several vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>apache22</name>
|
|
<range><gt>2.2.0</gt><lt>2.2.29</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache22-event-mpm</name>
|
|
<range><gt>2.2.0</gt><lt>2.2.29</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache22-itk-mpm</name>
|
|
<range><gt>2.2.0</gt><lt>2.2.29</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache22-peruser-mpm</name>
|
|
<range><gt>2.2.0</gt><lt>2.2.29</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache22-worker-mpm</name>
|
|
<range><gt>2.2.0</gt><lt>2.2.29</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Apache HTTP SERVER PROJECT reports:</p>
|
|
<blockquote cite="http://www.apache.org/dist/httpd/CHANGES_2.2.29">
|
|
<p> mod_deflate: The DEFLATE input filter (inflates request bodies) now
|
|
limits the length and compression ratio of inflated request bodies to
|
|
avoid denial of service via highly compressed bodies. See directives
|
|
DeflateInflateLimitRequestBody, DeflateInflateRatioLimit, and
|
|
DeflateInflateRatioBurst.</p>
|
|
<p>mod_cgid: Fix a denial of service against CGI scripts that do not consume
|
|
stdin that could lead to lingering HTTPD child processes filling up the
|
|
scoreboard and eventually hanging the server. By default, the client I/O
|
|
timeout (Timeout directive) now applies to communication with scripts. The
|
|
CGIDScriptTimeout directive can be used to set a different timeout for
|
|
communication with scripts.</p>
|
|
<p>Fix a race condition in scoreboard handling, which could lead to a heap
|
|
buffer overflow.</p>
|
|
<p>core: HTTP trailers could be used to replace HTTP headers late during
|
|
request processing, potentially undoing or otherwise confusing modules
|
|
that examined or modified request headers earlier. Adds "MergeTrailers"
|
|
directive to restore legacy behavior.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0118</cvename>
|
|
<cvename>CVE-2014-0231</cvename>
|
|
<cvename>CVE-2014-0226</cvename>
|
|
<cvename>CVE-2013-5704</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-19</discovery>
|
|
<entry>2014-07-24</entry>
|
|
<modified>2014-09-03</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="81fc1076-1286-11e4-bebd-000c2980a9f3">
|
|
<topic>tomcat -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>tomcat</name>
|
|
<range><lt>6.0.40</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>tomcat7</name>
|
|
<range><lt>7.0.53</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>tomcat8</name>
|
|
<range><lt>8.0.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Tomcat Security Team reports:</p>
|
|
<blockquote cite="https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.54">
|
|
<p>Tomcat does not properly restrict XSLT stylesheets, which allows
|
|
remote attackers to bypass security-manager restrictions and read
|
|
arbitrary files via a crafted web application that provides an XML
|
|
external entity declaration in conjunction with an entity
|
|
reference, related to an XML External Entity (XXE) issue.</p>
|
|
<p>An integer overflow, when operated behind a reverse proxy, allows
|
|
remote attackers to conduct HTTP request smuggling attacks via a
|
|
crafted Content-Length HTTP header.</p>
|
|
<p>An integer overflow in parseChunkHeader allows remote attackers
|
|
to cause a denial of service (resource consumption) via a malformed
|
|
chunk size in chunked transfer coding of a request during the
|
|
streaming of data.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0096</cvename>
|
|
<cvename>CVE-2014-0099</cvename>
|
|
<cvename>CVE-2014-0075</cvename>
|
|
<url>https://tomcat.apache.org/security-6.html</url>
|
|
<url>https://tomcat.apache.org/security-7.html</url>
|
|
<url>https://tomcat.apache.org/security-8.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-05-23</discovery>
|
|
<entry>2014-07-23</entry>
|
|
<modified>2017-03-18</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="978b0f76-122d-11e4-afe3-bc5ff4fb5e7b">
|
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>firefox</name>
|
|
<range><lt>31.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>firefox-esr</name>
|
|
<range><lt>24.7.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox</name>
|
|
<range><lt>31.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-thunderbird</name>
|
|
<range><lt>24.7.0</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>thunderbird</name>
|
|
<range><lt>24.7.0</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>nss</name>
|
|
<range><lt>3.16.1_2</lt></range>
|
|
<!-- CVE-2014-1544/Bug 963150 -->
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Mozilla Project reports:</p>
|
|
<blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
|
|
<p>MFSA 2014-66 IFRAME sandbox same-origin access through
|
|
redirect</p>
|
|
<p>MFSA 2014-65 Certificate parsing broken by non-standard
|
|
character encoding</p>
|
|
<p>MFSA 2014-64 Crash in Skia library when scaling high
|
|
quality images</p>
|
|
<p>MFSA 2014-63 Use-after-free while when manipulating
|
|
certificates in the trusted cache</p>
|
|
<p>MFSA 2014-62 Exploitable WebGL crash with Cesium
|
|
JavaScript library</p>
|
|
<p>MFSA 2014-61 Use-after-free with FireOnStateChange
|
|
event</p>
|
|
<p>MFSA 2014-60 Toolbar dialog customization event
|
|
spoofing</p>
|
|
<p>MFSA 2014-59 Use-after-free in DirectWrite font
|
|
handling</p>
|
|
<p>MFSA 2014-58 Use-after-free in Web Audio due to
|
|
incorrect control message ordering</p>
|
|
<p>MFSA 2014-57 Buffer overflow during Web Audio
|
|
buffering for playback</p>
|
|
<p>MFSA 2014-56 Miscellaneous memory safety hazards
|
|
(rv:31.0 / rv:24.7)</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1544</cvename>
|
|
<cvename>CVE-2014-1547</cvename>
|
|
<cvename>CVE-2014-1548</cvename>
|
|
<cvename>CVE-2014-1549</cvename>
|
|
<cvename>CVE-2014-1550</cvename>
|
|
<cvename>CVE-2014-1551</cvename>
|
|
<cvename>CVE-2014-1552</cvename>
|
|
<cvename>CVE-2014-1555</cvename>
|
|
<cvename>CVE-2014-1556</cvename>
|
|
<cvename>CVE-2014-1557</cvename>
|
|
<cvename>CVE-2014-1558</cvename>
|
|
<cvename>CVE-2014-1559</cvename>
|
|
<cvename>CVE-2014-1560</cvename>
|
|
<cvename>CVE-2014-1561</cvename>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-56.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-57.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-58.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-59.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-60.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-61.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-62.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-63.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-64.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-65.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-66.html</url>
|
|
<url>https://www.mozilla.org/security/announce/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-22</discovery>
|
|
<entry>2014-07-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ecea9e92-0be5-4931-88da-8772d044972a">
|
|
<topic>mcollective -- cert valication issue</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mcollective</name>
|
|
<range><lt>2.5.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Melissa Stone reports:</p>
|
|
<blockquote cite="https://groups.google.com/forum/#!topic/puppet-announce/cPykqUXMmK4">
|
|
<p>The MCollective aes_security public key plugin does not correctly
|
|
validate certs against the CA. By exploiting this vulnerability
|
|
within a race/initialization window, an attacker with local access
|
|
could initiate an unauthorized MCollective client connection with a
|
|
server, and thus control the mcollective plugins running on that
|
|
server. This vulnerability requires a collective be configured to
|
|
use the aes_security plugin. Puppet Enterprise and open source
|
|
MCollective are not configured to use the plugin and are not
|
|
vulnerable by default.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3251</cvename>
|
|
<url>https://groups.google.com/forum/#!topic/puppet-announce/cPykqUXMmK4</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-09</discovery>
|
|
<entry>2014-07-21</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="904d78b8-0f7e-11e4-8b71-5453ed2e2b49">
|
|
<topic>qt4-imageformats, qt5-gui -- DoS vulnerability in the GIF image handler</topic>
|
|
<affects>
|
|
<package>
|
|
<name>qt4-imageformats</name>
|
|
<range><lt>4.8.6_1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>qt5-gui</name>
|
|
<range><lt>5.2.1_4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Richard J. Moore reports:</p>
|
|
<blockquote cite="http://lists.qt-project.org/pipermail/announce/2014-April/000045.html">
|
|
<p>The builtin GIF decoder in QtGui prior to Qt 5.3 contained a bug
|
|
that would lead to a null pointer dereference when loading certain
|
|
hand crafted corrupt GIF files. This in turn would cause the
|
|
application loading these hand crafted GIFs to crash.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0190</cvename>
|
|
<bid>67087</bid>
|
|
<mlist>http://lists.qt-project.org/pipermail/announce/2014-April/000045.html</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-04-24</discovery>
|
|
<entry>2014-07-19</entry>
|
|
<modified>2014-07-21</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="4364e1f1-0f44-11e4-b090-20cf30e32f6d">
|
|
<topic>apache24 -- several vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>apache24</name>
|
|
<range><lt>2.4.10</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Apache HTTP SERVER PROJECT reports:</h1>
|
|
<blockquote cite="http://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/CHANGES?view=markup&pathrev=1610737">
|
|
<p>mod_proxy: Fix crash in Connection header handling which allowed a
|
|
denial of service attack against a reverse proxy with a threaded MPM.</p>
|
|
<p>Fix a race condition in scoreboard handling, which could lead to a
|
|
heap buffer overflow.</p>
|
|
<p>mod_deflate: The DEFLATE input filter (inflates request bodies) now
|
|
limits the length and compression ratio of inflated request bodies to avoid
|
|
denial of sevice via highly compressed bodies. See directives
|
|
DeflateInflateLimitRequestBody, DeflateInflateRatioLimit,
|
|
and DeflateInflateRatioBurst.</p>
|
|
<p>mod_cgid: Fix a denial of service against CGI scripts that do
|
|
not consume stdin that could lead to lingering HTTPD child processes
|
|
filling up the scoreboard and eventually hanging the server. By
|
|
default, the client I/O timeout (Timeout directive) now applies to
|
|
communication with scripts. The CGIDScriptTimeout directive can be
|
|
used to set a different timeout for communication with scripts.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0117</cvename>
|
|
<cvename>CVE-2014-3523</cvename>
|
|
<cvename>CVE-2014-0226</cvename>
|
|
<cvename>CVE-2014-0118</cvename>
|
|
<cvename>CVE-2014-0231</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-15</discovery>
|
|
<entry>2014-07-19</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="3f09ca29-0e48-11e4-b17a-6805ca0b3d42">
|
|
<topic>phpMyAdmin -- multiple XSS vulnerabilities, missing validation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><ge>4.2.0</ge><lt>4.2.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The phpMyAdmin development team reports:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-4.php">
|
|
<p>Self-XSS due to unescaped HTML output in database
|
|
structure page.</p>
|
|
<p>With a crafted table comment, it is possible to trigger
|
|
an XSS in database structure page.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-5.php">
|
|
<p>Self-XSS due to unescaped HTML output in database
|
|
triggers page.</p>
|
|
<p>When navigating into the database triggers page, it is
|
|
possible to trigger an XSS with a crafted trigger
|
|
name.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-6.php">
|
|
<p>Multiple XSS in AJAX confirmation messages.</p>
|
|
<p>With a crafted column name it is possible to trigger an
|
|
XSS when dropping the column in table structure page. With
|
|
a crafted table name it is possible to trigger an XSS when
|
|
dropping or truncating the table in table operations
|
|
page.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-7.php">
|
|
<p>Access for an unprivileged user to MySQL user list.</p>
|
|
<p>An unpriviledged user could view the MySQL user list and
|
|
manipulate the tabs displayed in phpMyAdmin for them.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-4954</cvename>
|
|
<cvename>CVE-2014-4955</cvename>
|
|
<cvename>CVE-2014-4986</cvename>
|
|
<cvename>CVE-2014-4987</cvename>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-4.php</url>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-5.php</url>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-6.php</url>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-7.php</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-18</discovery>
|
|
<entry>2014-07-18</entry>
|
|
<modified>2014-07-20</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="4a114331-0d24-11e4-8dd2-5453ed2e2b49">
|
|
<topic>kdelibs4 -- KMail/KIO POP3 SSL Man-in-the-middle Flaw</topic>
|
|
<affects>
|
|
<package>
|
|
<name>kdelibs</name>
|
|
<range><ge>4.10.95</ge><lt>4.12.5_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Richard J. Moore reports:</p>
|
|
<blockquote cite="http://www.kde.org/info/security/advisory-20140618-1.txt">
|
|
<p>The POP3 kioslave used by KMail will accept invalid
|
|
certificates without presenting a dialog to the user due a
|
|
bug that leads to an inability to display the dialog
|
|
combined with an error in the way the result is checked.</p>
|
|
<p>This flaw allows an active attacker to perform MITM
|
|
attacks against the ioslave which could result in the leakage of
|
|
sensitive data such as the authentication details and the contents of
|
|
emails.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3494</cvename>
|
|
<bid>68113</bid>
|
|
<mlist>http://lists.kde.org/?l=kde-announce&m=140312275318160&w=2</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-17</discovery>
|
|
<entry>2014-07-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ff98087f-0a8f-11e4-b00b-5453ed2e2b49">
|
|
<topic>postfixadmin -- SQL injection vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>postfixadmin</name>
|
|
<range><lt>2.3.7</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Thijs Kinkhorst reports:</p>
|
|
<blockquote cite="http://www.openwall.com/lists/oss-security/2014/03/26/6">
|
|
<p>Postfixadmin has an SQL injection vulnerability. This
|
|
vulnerability is only exploitable by authenticated users able to
|
|
create new aliases.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-2655</cvename>
|
|
<bid>66455</bid>
|
|
<freebsdpr>ports/189248</freebsdpr>
|
|
<mlist>http://www.openwall.com/lists/oss-security/2014/03/26/6</mlist>
|
|
<url>https://www.debian.org/security/2014/dsa-2889</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-28</discovery>
|
|
<entry>2014-07-13</entry>
|
|
<modified>2015-09-28</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e6a7636a-02d0-11e4-88b6-080027671656">
|
|
<topic>dbus -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>dbus</name>
|
|
<range><lt>1.8.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Simon McVittie reports:</p>
|
|
<blockquote cite="http://lists.freedesktop.org/archives/dbus/2014-July/016235.html">
|
|
<p>Alban Crequy at Collabora Ltd. discovered a bug in dbus-daemon's
|
|
support for file descriptor passing. A malicious process could
|
|
force system services or user applications to be disconnected
|
|
from the D-Bus system bus by sending them a message containing
|
|
a file descriptor, then causing that file descriptor to exceed
|
|
the kernel's maximum recursion depth (itself introduced to fix
|
|
a DoS) before dbus-daemon forwards the message to the victim
|
|
process. Most services and applications exit when disconnected
|
|
from the system bus, leading to a denial of service.</p>
|
|
<p>Additionally, Alban discovered that bug fd.o#79694, a bug
|
|
previously reported by Alejandro Martínez Suárez which was n
|
|
believed to be security flaw, could be used for a similar denial
|
|
of service, by causing dbus-daemon to attempt to forward invalid
|
|
file descriptors to a victim process when file descriptors become
|
|
associated with the wrong message.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3532</cvename>
|
|
<cvename>CVE-2014-3533</cvename>
|
|
<url>http://lists.freedesktop.org/archives/dbus/2014-July/016235.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-07-02</discovery>
|
|
<entry>2014-07-03</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="17dfd984-feba-11e3-b938-5404a68ad561">
|
|
<topic>mencoder -- potential buffer overrun when processing malicious lzo compressed input</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mencoder</name>
|
|
<range><lt>1.1.r20140418_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Michael Niedermayer and Luca Barbato report in upstream ffmpeg:</p>
|
|
<blockquote>
|
|
<p>avutil/lzo: Fix integer overflow</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ccda51b14c0fcae2fad73a24872dce75a7964996</url>
|
|
<url>http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d6af26c55c1ea30f85a7d9edbc373f53be1743ee</url>
|
|
<cvename>CVE-2014-4610</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-24</discovery>
|
|
<entry>2014-06-28</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="9ab3a22c-feb8-11e3-b938-5404a68ad561">
|
|
<topic>mplayer -- potential buffer overrun when processing malicious lzo compressed input</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mplayer</name>
|
|
<range><lt>1.1.r20140418_3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Michael Niedermayer and Luca Barbato report in upstream ffmpeg:</p>
|
|
<blockquote>
|
|
<p>avutil/lzo: Fix integer overflow</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ccda51b14c0fcae2fad73a24872dce75a7964996</url>
|
|
<url>http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d6af26c55c1ea30f85a7d9edbc373f53be1743ee</url>
|
|
<cvename>CVE-2014-4610</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-24</discovery>
|
|
<entry>2014-06-28</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d1f5e12a-fd5a-11e3-a108-080027ef73ec">
|
|
<topic>LZO -- potential buffer overrun when processing malicious input data</topic>
|
|
<affects>
|
|
<package>
|
|
<name>lzo2</name>
|
|
<range><lt>2.07</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>busybox</name>
|
|
<range><lt>1.22.1_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Markus Franz Xaver Johannes Oberhumer reports, in the package's NEWS file:</p>
|
|
<blockquote>
|
|
<p>Fixed a potential integer overflow condition in the "safe"
|
|
decompressor variants which could result in a possible buffer
|
|
overrun when processing maliciously crafted compressed input
|
|
data.</p>
|
|
|
|
<p>As this issue only affects 32-bit systems and also can only happen
|
|
if you use uncommonly huge buffer sizes where you have to decompress
|
|
more than 16 MiB (2^24 bytes) compressed bytes within a single
|
|
function call, the practical implications are limited.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.oberhumer.com/opensource/lzo/download/lzo-2.07.tar.gz</url>
|
|
<cvename>CVE-2014-4608</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-25</discovery>
|
|
<entry>2014-06-26</entry>
|
|
<modified>2015-01-06</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1c840eb9-fb32-11e3-866e-b499baab0cbe">
|
|
<topic>gnupg -- possible DoS using garbled compressed data packets</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gnupg1</name>
|
|
<range><lt>1.4.17</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>gnupg</name>
|
|
<range><lt>2.0.24</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Werner Koch reports:</p>
|
|
<blockquote cite="http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html">
|
|
<p>This release includes a *security fix* to stop
|
|
a possible DoS using garbled compressed data packets which can be used
|
|
to put gpg into an infinite loop.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html</url>
|
|
<url>http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-23</discovery>
|
|
<entry>2014-06-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6ad309d9-fb03-11e3-bebd-000c2980a9f3">
|
|
<topic>samba -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>samba36</name>
|
|
<range><lt>3.6.24</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>samba4</name>
|
|
<range><lt>4.0.19</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>samba41</name>
|
|
<range><lt>4.1.9</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The samba project reports:</p>
|
|
<blockquote cite="https://www.samba.org/samba/history/">
|
|
<p>A malformed packet can cause the nmbd server to loop the CPU and
|
|
prevent any further NetBIOS name service.</p>
|
|
<p>Valid unicode path names stored on disk can cause smbd to
|
|
crash if an authenticated client attempts to read them
|
|
using a non-unicode request.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0244</cvename>
|
|
<cvename>CVE-2014-3493</cvename>
|
|
<url>https://www.samba.org/samba/security/CVE-2014-0244</url>
|
|
<url>https://www.samba.org/samba/security/CVE-2014-3493</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-23</discovery>
|
|
<entry>2014-06-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c4892644-f8c6-11e3-9f45-6805ca0b3d42">
|
|
<topic>phpMyAdmin -- two XSS vulnerabilities due to unescaped db/table names</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><ge>4.1.0</ge><lt>4.2.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The phpMyAdmin development team reports:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-2.php">
|
|
<p>Self-XSS due to unescaped HTML output in recent/favorite
|
|
tables navigation.</p>
|
|
|
|
<p>When marking a crafted database or table name as
|
|
favorite or having it in recent tables, it is possible to
|
|
trigger an XSS.</p>
|
|
|
|
|
|
<p>This vulnerability can be triggered only by someone who
|
|
logged in to phpMyAdmin, as the usual token protection
|
|
prevents non-logged-in users from accessing the required
|
|
form.</p>
|
|
|
|
</blockquote>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-3.php">
|
|
<p>Self-XSS due to unescaped HTML output in navigation items
|
|
hiding feature.</p>
|
|
|
|
<p>When hiding or unhiding a crafted table name in the
|
|
navigation, it is possible to trigger an XSS.</p>
|
|
|
|
<p>This vulnerability can be triggered only by someone who
|
|
logged in to phpMyAdmin, as the usual token protection
|
|
prevents non-logged-in users from accessing the required
|
|
form.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-4348</cvename>
|
|
<cvename>CVE-2014-4349</cvename>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-2.php</url>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-3.php</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-20</discovery>
|
|
<entry>2014-06-20</entry>
|
|
<modified>2014-06-24</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0981958a-f733-11e3-8276-071f1604ef8a">
|
|
<topic>iodined -- authentication bypass</topic>
|
|
<affects>
|
|
<package>
|
|
<name>iodine</name>
|
|
<range><lt>0.7.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Erik Ekman of the iodine project reports:</p>
|
|
<blockquote cite="https://github.com/yarrick/iodine/commit/b715be5cf3978fbe589b03b09c9398d0d791f850">
|
|
<p>The client could bypass the password check by continuing after
|
|
getting error from the server and guessing the network parameters.
|
|
The server would still accept the rest of the setup and also network
|
|
traffic.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://github.com/yarrick/iodine/commit/b715be5cf3978fbe589b03b09c9398d0d791f850</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-16</discovery>
|
|
<entry>2014-06-18</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f109b02f-f5a4-11e3-82e9-00a098b18457">
|
|
<topic>asterisk -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>asterisk11</name>
|
|
<range><lt>11.10.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>asterisk18</name>
|
|
<range><lt>1.8.28.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Asterisk project reports:</p>
|
|
<blockquote cite="https://www.asterisk.org/security">
|
|
<p>Asterisk Manager User Unauthorized Shell Access. Manager users can
|
|
execute arbitrary shell commands with the MixMonitor manager action.
|
|
Asterisk does not require system class authorization for a manager
|
|
user to use the MixMonitor action, so any manager user who is
|
|
permitted to use manager commands can potentially execute shell
|
|
commands as the user executing the Asterisk process.</p>
|
|
<p>Exhaustion of Allowed Concurrent HTTP Connections. Establishing a
|
|
TCP or TLS connection to the configured HTTP or HTTPS port
|
|
respectively in http.conf and then not sending or completing a HTTP
|
|
request will tie up a HTTP session. By doing this repeatedly until the
|
|
maximum number of open HTTP sessions is reached, legitimate requests
|
|
are blocked.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-4046</cvename>
|
|
<cvename>CVE-2014-4047</cvename>
|
|
<url>http://downloads.asterisk.org/pub/security/AST-2014-006.pdf</url>
|
|
<url>http://downloads.asterisk.org/pub/security/AST-2014-007.pdf</url>
|
|
<url>https://www.asterisk.org/security</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-12</discovery>
|
|
<entry>2014-06-17</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="52bbc7e8-f13c-11e3-bc09-bcaec565249c">
|
|
<topic>dbus -- local DoS</topic>
|
|
<affects>
|
|
<package>
|
|
<name>dbus</name>
|
|
<range><ge>1.8.0</ge><lt>1.8.4</lt></range>
|
|
<range><lt>1.6.20</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Simon MvVittie reports:</p>
|
|
<blockquote cite="http://lists.freedesktop.org/archives/dbus/2014-June/016220.html">
|
|
<p>Alban Crequy at Collabora Ltd. discovered and fixed a
|
|
denial-of-service flaw in dbus-daemon, part of the reference
|
|
implementation of D-Bus. Additionally, in highly unusual
|
|
environments the same flaw could lead to a side channel between
|
|
processes that should not be able to communicate.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3477</cvename>
|
|
<url>http://lists.freedesktop.org/archives/dbus/2014-June/016220.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-10</discovery>
|
|
<entry>2014-06-14</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="888a0262-f0d9-11e3-ba0c-b4b52fce4ce8">
|
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>firefox</name>
|
|
<range><lt>30.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>firefox-esr</name>
|
|
<range><lt>24.6.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>seamonkey</name>
|
|
<range><lt>2.26.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox</name>
|
|
<range><lt>30.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-seamonkey</name>
|
|
<range><lt>2.26.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-thunderbird</name>
|
|
<range><lt>24.6.0</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>nspr</name>
|
|
<range><lt>4.10.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>thunderbird</name>
|
|
<range><lt>24.6.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Mozilla Project reports:</p>
|
|
<blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
|
|
<p>MFSA 2014-48 Miscellaneous memory safety hazards
|
|
(rv:30.0 / rv:24.6)</p>
|
|
<p>MFSA 2014-49 Use-after-free and out of bounds
|
|
issues found using Address Sanitizer</p>
|
|
<p>MFSA 2014-51 Use-after-free in Event Listener
|
|
Manager</p>
|
|
<p>MFSA 2014-52 Use-after-free with SMIL Animation
|
|
Controller</p>
|
|
<p>MFSA 2014-53 Buffer overflow in Web Audio Speex
|
|
resampler</p>
|
|
<p>MFSA 2014-54 Buffer overflow in Gamepad API</p>
|
|
<p>MFSA 2014-55 Out of bounds write in NSPR</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1533</cvename>
|
|
<cvename>CVE-2014-1534</cvename>
|
|
<cvename>CVE-2014-1536</cvename>
|
|
<cvename>CVE-2014-1537</cvename>
|
|
<cvename>CVE-2014-1540</cvename>
|
|
<cvename>CVE-2014-1541</cvename>
|
|
<cvename>CVE-2014-1542</cvename>
|
|
<cvename>CVE-2014-1543</cvename>
|
|
<cvename>CVE-2014-1545</cvename>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-48.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-49.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-51.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-52.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-53.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-54.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-55.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-10</discovery>
|
|
<entry>2014-06-10</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="5ac53801-ec2e-11e3-9cf3-3c970e169bc2">
|
|
<topic>OpenSSL -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openssl</name>
|
|
<range><ge>1.0.1</ge><lt>1.0.1_13</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>mingw32-openssl</name>
|
|
<range><ge>1.0.1</ge><lt>1.0.1h</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>8.0</ge><lt>8.4_12</lt></range>
|
|
<range><ge>9.1</ge><lt>9.1_15</lt></range>
|
|
<range><ge>9.2</ge><lt>9.2_8</lt></range>
|
|
<range><ge>10.0</ge><lt>10.0_5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The OpenSSL Project reports:</p>
|
|
<blockquote cite="http://www.openssl.org/news/secadv_20140605.txt">
|
|
<p>An attacker using a carefully crafted handshake can force
|
|
the use of weak keying material in OpenSSL SSL/TLS clients
|
|
and servers. This can be exploited by a Man-in-the-middle
|
|
(MITM) attack where the attacker can decrypt and modify
|
|
traffic from the attacked client and server. [CVE-2014-0224]</p>
|
|
<p>By sending an invalid DTLS handshake to an OpenSSL DTLS
|
|
client the code can be made to recurse eventually crashing
|
|
in a DoS attack. [CVE-2014-0221]</p>
|
|
<p>A buffer overrun attack can be triggered by sending invalid
|
|
DTLS fragments to an OpenSSL DTLS client or server. This is
|
|
potentially exploitable to run arbitrary code on a vulnerable
|
|
client or server. [CVE-2014-0195]</p>
|
|
<p>OpenSSL TLS clients enabling anonymous ECDH ciphersuites are
|
|
subject to a denial of service attack. [CVE-2014-3470]</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0195</cvename>
|
|
<cvename>CVE-2014-0221</cvename>
|
|
<cvename>CVE-2014-0224</cvename>
|
|
<cvename>CVE-2014-3470</cvename>
|
|
<freebsdsa>SA-14:14.openssl</freebsdsa>
|
|
<url>http://www.openssl.org/news/secadv_20140605.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-06-05</discovery>
|
|
<entry>2014-06-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="9733c480-ebff-11e3-970b-206a8a720317">
|
|
<topic>gnutls -- client-side memory corruption</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gnutls</name>
|
|
<range><lt>2.12.23_6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>GnuTLS project reports:</p>
|
|
<blockquote cite="www.gnutls.org/security.html#GNUTLS-SA-2014-3">
|
|
<p>This vulnerability affects the client side of the gnutls library.
|
|
A server that sends a specially crafted ServerHello could corrupt
|
|
the memory of a requesting client.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3466</cvename>
|
|
<url>http://www.gnutls.org/security.html#GNUTLS-SA-2014-3</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-05-14</discovery>
|
|
<entry>2014-06-04</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="027af74d-eb56-11e3-9032-000c2980a9f3">
|
|
<topic>gnutls -- client-side memory corruption</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gnutls3</name>
|
|
<range><ge>3.1</ge><lt>3.1.25</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>GnuTLS project reports:</p>
|
|
<blockquote cite="www.gnutls.org/security.html#GNUTLS-SA-2014-3">
|
|
<p>This vulnerability affects the client side of the gnutls library.
|
|
A server that sends a specially crafted ServerHello could corrupt
|
|
the memory of a requesting client.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-3466</cvename>
|
|
<url>http://www.gnutls.org/security.html#GNUTLS-SA-2014-3</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-05-14</discovery>
|
|
<entry>2014-06-03</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="77e2e631-e742-11e3-9a25-5404a6a6412c">
|
|
<topic>mumble -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mumble</name>
|
|
<range><ge>1.2.0</ge><lt>1.2.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Mumble reports:</p>
|
|
<blockquote cite="http://blog.mumble.info/mumble-1-2-6/">
|
|
<p>SVG images with local file references could trigger client DoS</p>
|
|
<p>The Mumble client did not properly HTML-escape some external strings
|
|
before using them in a rich-text (HTML) context.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://mumble.info/security/Mumble-SA-2014-005.txt</url>
|
|
<url>http://mumble.info/security/Mumble-SA-2014-006.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-04-16</discovery>
|
|
<entry>2014-05-29</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c2c8c84b-e734-11e3-9a25-5404a6a6412c">
|
|
<topic>mumble -- NULL pointer dereference and heap-based buffer overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mumble</name>
|
|
<range><ge>1.2.4</ge><le>1.2.4_6</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Mumble reports:</p>
|
|
<blockquote cite="http://blog.mumble.info/mumble-1-2-5/">
|
|
<p>A malformed Opus voice packet sent to a Mumble client could trigger
|
|
a NULL pointer dereference or an out-of-bounds array access.</p>
|
|
<p>A malformed Opus voice packet sent to a Mumble client could trigger a
|
|
heap-based buffer overflow.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0044</cvename>
|
|
<cvename>CVE-2014-0045</cvename>
|
|
<url>http://mumble.info/security/Mumble-SA-2014-001.txt</url>
|
|
<url>http://mumble.info/security/Mumble-SA-2014-002.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-01-25</discovery>
|
|
<entry>2014-05-29</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f99a4686-e694-11e3-9032-000c2980a9f3">
|
|
<cancelled/>
|
|
</vuln>
|
|
|
|
<vuln vid="688e73a2-e514-11e3-a52a-98fc11cdc4f5">
|
|
<topic>linux-flashplugin -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>linux-f10-flashplugin</name>
|
|
<range><lt>11.2r202.359</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Adobe reports:</p>
|
|
<blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb14-14.html">
|
|
<p>These updates address vulnerabilities that could cause a crash
|
|
and potentially allow an attacker to take control of the affected system.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0510</cvename>
|
|
<cvename>CVE-2014-0516</cvename>
|
|
<cvename>CVE-2014-0517</cvename>
|
|
<cvename>CVE-2014-0518</cvename>
|
|
<cvename>CVE-2014-0519</cvename>
|
|
<cvename>CVE-2014-0520</cvename>
|
|
<url>https://helpx.adobe.com/security/products/flash-player/apsb14-14.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-13</discovery>
|
|
<entry>2014-05-26</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="02db20d7-e34a-11e3-bd92-bcaec565249c">
|
|
<topic>openjpeg -- Multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openjpeg</name>
|
|
<range><lt>1.5.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Openjpeg release notes report:</p>
|
|
<blockquote cite="http://openjpeg.googlecode.com/svn/tags/version.1.5.1/NEWS">
|
|
<p>That CVE-2012-3535 and CVE-2012-3358 are fixed in the 1.5.1
|
|
release.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://openjpeg.googlecode.com/svn/tags/version.1.5.2/NEWS">
|
|
<p>That CVE-2013-4289, CVE-2013-4290, CVE-2013-1447, CVE-2013-6045,
|
|
CVE-2013-6052, CVE-2013-6054, CVE-2013-6053, CVE-2013-6887,
|
|
where fixed in the 1.5.2 release.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2012-3358</cvename>
|
|
<cvename>CVE-2012-3535</cvename>
|
|
<cvename>CVE-2013-1447</cvename>
|
|
<cvename>CVE-2013-4289</cvename>
|
|
<cvename>CVE-2013-4290</cvename>
|
|
<cvename>CVE-2013-6045</cvename>
|
|
<cvename>CVE-2013-6052</cvename>
|
|
<cvename>CVE-2013-6053</cvename>
|
|
<cvename>CVE-2013-6054</cvename>
|
|
<cvename>CVE-2013-6887</cvename>
|
|
<url>http://openjpeg.googlecode.com/svn/tags/version.1.5.1/NEWS</url>
|
|
<url>http://openjpeg.googlecode.com/svn/tags/version.1.5.2/NEWS</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2012-05-13</discovery>
|
|
<entry>2014-05-24</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b060ee50-daba-11e3-99f2-bcaec565249c">
|
|
<topic>libXfont -- X Font Service Protocol and Font metadata file handling issues</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libXfont</name>
|
|
<range><lt>1.4.7_3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-c6-xorg-libs</name>
|
|
<range><lt>7.4_2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-f10-xorg-libs</name>
|
|
<range><ge>*</ge></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Alan Coopersmith reports:</p>
|
|
<blockquote cite="http://lists.x.org/archives/xorg-announce/2014-May/002431.html">
|
|
<p>Ilja van Sprundel, a security researcher with IOActive, has
|
|
discovered several issues in the way the libXfont library
|
|
handles the responses it receives from xfs servers, and has
|
|
worked with X.Org's security team to analyze, confirm, and fix
|
|
these issues.</p>
|
|
<p>Most of these issues stem from libXfont trusting the font server
|
|
to send valid protocol data, and not verifying that the values
|
|
will not overflow or cause other damage. This code is commonly
|
|
called from the X server when an X Font Server is active in the
|
|
font path, so may be running in a setuid-root process depending
|
|
on the X server in use. Exploits of this path could be used by
|
|
a local, authenticated user to attempt to raise privileges; or
|
|
by a remote attacker who can control the font server to attempt
|
|
to execute code with the privileges of the X server.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0209</cvename>
|
|
<cvename>CVE-2014-0210</cvename>
|
|
<cvename>CVE-2014-0211</cvename>
|
|
<url>http://lists.x.org/archives/xorg-announce/2014-May/002431.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-05-13</discovery>
|
|
<entry>2014-05-13</entry>
|
|
<modified>2015-07-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="e7bb3885-da40-11e3-9ecb-2c4138874f7d">
|
|
<topic>libxml2 -- lack of end-of-document check DoS</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libxml2</name>
|
|
<range><lt>2.9.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-c6-libxml2</name>
|
|
<range><lt>2.7.6_2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-f10-libxml2</name>
|
|
<range><ge>*</ge></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>CVE MITRE reports:</p>
|
|
<blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877">
|
|
<p>parser.c in libxml2 before 2.9.0, as used in Google
|
|
Chrome before 28.0.1500.71 and other products, allows remote
|
|
attackers to cause a denial of service (out-of-bounds read)
|
|
via a document that ends abruptly, related to the lack of
|
|
certain checks for the XML_PARSER_EOF state.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-2877</cvename>
|
|
<url>https://git.gnome.org/browse/libxml2/tag/?id=CVE-2013-2877</url>
|
|
<url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877</url>
|
|
<url>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2877</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-04-11</discovery>
|
|
<entry>2013-07-10</entry>
|
|
<modified>2015-07-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="efdd0edc-da3d-11e3-9ecb-2c4138874f7d">
|
|
<topic>libxml2 -- entity substitution DoS</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libxml2</name>
|
|
<range><lt>2.9.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-c6-libxml2</name>
|
|
<range><lt>2.7.6_2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-f10-libxml2</name>
|
|
<range><ge>*</ge></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Stefan Cornelius reports:</p>
|
|
<blockquote cite="http://www.openwall.com/lists/oss-security/2014/05/06/4">
|
|
<p>It was discovered that libxml2, a library providing
|
|
support to read, modify and write XML files, incorrectly
|
|
performs entity substitution in the doctype prolog, even if
|
|
the application using libxml2 disabled any entity
|
|
substitution. A remote attacker could provide a
|
|
specially-crafted XML file that, when processed, would lead
|
|
to the exhaustion of CPU and memory resources or file
|
|
descriptors.</p>
|
|
<p>This issue was discovered by Daniel Berrange of Red Hat.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0191</cvename>
|
|
<url>http://www.openwall.com/lists/oss-security/2014/05/06/4</url>
|
|
<url>https://git.gnome.org/browse/libxml2/tag/?id=CVE-2014-0191</url>
|
|
<url>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-12-03</discovery>
|
|
<entry>2014-05-06</entry>
|
|
<modified>2015-07-15</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1959e847-d4f0-11e3-84b0-0018fe623f2b">
|
|
<topic>OpenSSL -- NULL pointer dereference / DoS</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openssl</name>
|
|
<range><ge>1.0.1</ge><lt>1.0.1_12</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>10.0</ge><lt>10.0_3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>OpenBSD and David Ramos reports:</p>
|
|
<blockquote cite="http://www.openwall.com/lists/oss-security/2014/05/02/5">
|
|
<p>Applications that use SSL_MODE_RELEASE_BUFFERS, such as nginx/apache,
|
|
are prone to a race condition which may allow a remote attacker to
|
|
crash the current service.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.openwall.com/lists/oss-security/2014/05/02/5</url>
|
|
<url>https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321</url>
|
|
<freebsdsa>SA-14:10.openssl</freebsdsa>
|
|
<cvename>CVE-2014-0198</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-05-02</discovery>
|
|
<entry>2014-05-03</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="89709e58-d497-11e3-a3d5-5453ed2e2b49">
|
|
<topic>qt4-xml -- XML Entity Expansion Denial of Service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>qt4-xml</name>
|
|
<range><lt>4.8.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Richard J. Moore reports:</p>
|
|
<blockquote cite="http://lists.qt-project.org/pipermail/announce/2013-December/000036.html">
|
|
<p>QXmlSimpleReader in Qt versions prior to 5.2 supports
|
|
expansion of internal entities in XML documents without
|
|
placing restrictions to ensure the document does not cause
|
|
excessive memory usage. If an application using this API
|
|
processes untrusted data then the application may use
|
|
unexpected amounts of memory if a malicious document is
|
|
processed.</p>
|
|
<p>It is possible to construct XML documents using internal
|
|
entities that consume large amounts of memory and other
|
|
resources to process, this is known as the 'Billion Laughs'
|
|
attack. Qt versions prior to 5.2 did not offer protection
|
|
against this issue.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-4549</cvename>
|
|
<url>http://lists.qt-project.org/pipermail/announce/2013-December/000036.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-12-05</discovery>
|
|
<entry>2014-05-05</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6fb521b0-d388-11e3-a790-000c2980a9f3">
|
|
<topic>strongswan -- Remote Authentication Bypass</topic>
|
|
<affects>
|
|
<package>
|
|
<name>strongswan</name>
|
|
<range><lt>5.1.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>strongSwan developers report:</p>
|
|
<blockquote cite="www.strongswan.org/blog/2014/04/14/strongswan-authentication-bypass-vulnerability-(cve-2014-2338).html">
|
|
<p>Remote attackers are able to bypass authentication by rekeying an
|
|
IKE_SA during (1) initiation or (2) re-authentication, which
|
|
triggers the IKE_SA state to be set to established.</p>
|
|
<p>Only installations that actively initiate or re-authenticate IKEv2
|
|
IKE_SAs are affected.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-2338</cvename>
|
|
<url>http://www.strongswan.org/blog/2014/04/14/strongswan-authentication-bypass-vulnerability-%28cve-2014-2338%29.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-12</discovery>
|
|
<entry>2014-05-04</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="670d732a-cdd4-11e3-aac2-0022fb6fcf92">
|
|
<topic>mohawk -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mohawk</name>
|
|
<range><lt>2.0.12</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The mohawk project reports:</p>
|
|
<blockquote cite="http://fossil.bsdsx.fr/mohawk/tktview?name=1707f0e351">
|
|
<p>Segfault when parsing malformed / unescaped url, coredump when setting syslog facility.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://fossil.bsdsx.fr/mohawk/tktview?name=1707f0e351</url>
|
|
<url>http://fossil.bsdsx.fr/mohawk/tktview?name=1c7565019e</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-04-10</discovery>
|
|
<entry>2014-04-30</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="985d4d6c-cfbd-11e3-a003-b4b52fce4ce8">
|
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>firefox</name>
|
|
<range><lt>29.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>firefox-esr</name>
|
|
<range><lt>24.5.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox</name>
|
|
<range><lt>29.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-seamonkey</name>
|
|
<range><lt>2.26</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-thunderbird</name>
|
|
<range><lt>24.5.0</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>seamonkey</name>
|
|
<range><lt>2.26</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>thunderbird</name>
|
|
<range><lt>24.5.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Mozilla Project reports:</p>
|
|
<blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
|
|
<p>MFSA 2014-34 Miscellaneous memory safety hazards
|
|
(rv:29.0 / rv:24.5)</p>
|
|
<p>MFSA 2014-35 Privilege escalation through Mozilla Maintenance
|
|
Service Installer</p>
|
|
<p>MFSA 2014-36 Web Audio memory corruption issues</p>
|
|
<p>MFSA 2014-37 Out of bounds read while decoding JPG images</p>
|
|
<p>MFSA 2014-38 Buffer overflow when using non-XBL object as
|
|
XBL</p>
|
|
<p>MFSA 2014-39 Use-after-free in the Text Track Manager
|
|
for HTML video</p>
|
|
<p>MFSA 2014-41 Out-of-bounds write in Cairo</p>
|
|
<p>MFSA 2014-42 Privilege escalation through Web Notification
|
|
API</p>
|
|
<p>MFSA 2014-43 Cross-site scripting (XSS) using history
|
|
navigations</p>
|
|
<p>MFSA 2014-44 Use-after-free in imgLoader while resizing
|
|
images</p>
|
|
<p>MFSA 2014-45 Incorrect IDNA domain name matching for
|
|
wildcard certificates</p>
|
|
<p>MFSA 2014-46 Use-after-free in nsHostResolve</p>
|
|
<p>MFSA 2014-47 Debugger can bypass XrayWrappers
|
|
with JavaScript</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1492</cvename>
|
|
<cvename>CVE-2014-1518</cvename>
|
|
<cvename>CVE-2014-1519</cvename>
|
|
<cvename>CVE-2014-1520</cvename>
|
|
<cvename>CVE-2014-1522</cvename>
|
|
<cvename>CVE-2014-1523</cvename>
|
|
<cvename>CVE-2014-1524</cvename>
|
|
<cvename>CVE-2014-1525</cvename>
|
|
<cvename>CVE-2014-1526</cvename>
|
|
<cvename>CVE-2014-1527</cvename>
|
|
<cvename>CVE-2014-1528</cvename>
|
|
<cvename>CVE-2014-1529</cvename>
|
|
<cvename>CVE-2014-1530</cvename>
|
|
<cvename>CVE-2014-1531</cvename>
|
|
<cvename>CVE-2014-1532</cvename>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-34.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-35.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-36.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-37.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-38.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-39.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-41.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-42.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-43.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-44.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-45.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-46.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-47.html</url>
|
|
<url>http://www.mozilla.org/security/known-vulnerabilities/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-04-29</discovery>
|
|
<entry>2014-04-29</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="59e72db2-cae6-11e3-8420-00e0814cab4e">
|
|
<topic>django -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>py26-django</name>
|
|
<range><ge>1.6</ge><lt>1.6.3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py27-django</name>
|
|
<range><ge>1.6</ge><lt>1.6.3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py31-django</name>
|
|
<range><ge>1.6</ge><lt>1.6.3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py32-django</name>
|
|
<range><ge>1.6</ge><lt>1.6.3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py33-django</name>
|
|
<range><ge>1.6</ge><lt>1.6.3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py34-django</name>
|
|
<range><ge>1.6</ge><lt>1.6.3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py26-django15</name>
|
|
<range><ge>1.5</ge><lt>1.5.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py27-django15</name>
|
|
<range><ge>1.5</ge><lt>1.5.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py31-django15</name>
|
|
<range><ge>1.5</ge><lt>1.5.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py32-django15</name>
|
|
<range><ge>1.5</ge><lt>1.5.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py33-django15</name>
|
|
<range><ge>1.5</ge><lt>1.5.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py34-django15</name>
|
|
<range><ge>1.5</ge><lt>1.5.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py26-django14</name>
|
|
<range><ge>1.4</ge><lt>1.4.11</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py27-django14</name>
|
|
<range><ge>1.4</ge><lt>1.4.11</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py31-django14</name>
|
|
<range><ge>1.4</ge><lt>1.4.11</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py32-django14</name>
|
|
<range><ge>1.4</ge><lt>1.4.11</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py33-django14</name>
|
|
<range><ge>1.4</ge><lt>1.4.11</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py34-django14</name>
|
|
<range><ge>1.4</ge><lt>1.4.11</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py26-django-devel</name>
|
|
<range><lt>20140423,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>py27-django-devel</name>
|
|
<range><lt>20140423,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Django project reports:</p>
|
|
<blockquote cite="https://www.djangoproject.com/weblog/2014/apr/21/security/">
|
|
<p>These releases address an unexpected code-execution issue, a
|
|
caching issue which can expose CSRF tokens and a MySQL typecasting
|
|
issue. While these issues present limited risk and may not affect
|
|
all Django users, we encourage all users to evaluate their own
|
|
risk and upgrade as soon as possible.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://www.djangoproject.com/weblog/2014/apr/21/security/</url>
|
|
<cvename>CVE-2014-0472</cvename>
|
|
<cvename>CVE-2014-0473</cvename>
|
|
<cvename>CVE-2014-0474</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-04-21</discovery>
|
|
<entry>2014-04-23</entry>
|
|
<modified>2014-04-30</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0b8d7194-ca88-11e3-9d8d-c80aa9043978">
|
|
<topic>OpenSSL -- Remote Data Injection / DoS</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openssl</name>
|
|
<range><ge>1.0.1</ge><lt>1.0.1_11</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>mingw32-openssl</name>
|
|
<range><ge>1.0.1</ge><le>1.0.1g</le></range>
|
|
</package>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>10.0</ge><lt>10.0_2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Applications that use SSL_MODE_RELEASE_BUFFERS, such as nginx, are
|
|
prone to a race condition which may allow a remote attacker to
|
|
inject random data into other connections.</p>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://rt.openssl.org/Ticket/Display.html?id=2167</url>
|
|
<url>http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse</url>
|
|
<freebsdsa>SA-14:09.openssl</freebsdsa>
|
|
<cvename>CVE-2010-5298</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2010-02-09</discovery>
|
|
<entry>2014-04-23</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="608ed765-c700-11e3-848c-20cf30e32f6d">
|
|
<topic>bugzilla -- Cross-Site Request Forgery</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bugzilla40</name>
|
|
<range><ge>2.0.0</ge><lt>4.4.3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>bugzilla42</name>
|
|
<range><ge>2.0.0</ge><lt>4.4.3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>bugzilla44</name>
|
|
<range><ge>2.0.0</ge><lt>4.4.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>A Bugzilla Security Advisory reports:</h1>
|
|
<blockquote cite="http://www.bugzilla.org/security/4.0.11/">
|
|
<p>The login form had no CSRF protection, meaning that
|
|
an attacker could force the victim to log in using the
|
|
attacker's credentials. If the victim then reports a new
|
|
security sensitive bug, the attacker would get immediate
|
|
access to this bug.</p>
|
|
<p>
|
|
Due to changes involved in the Bugzilla API, this fix is
|
|
not backported to the 4.0 and 4.2 branches, meaning that
|
|
Bugzilla 4.0.12 and older, and 4.2.8 and older, will
|
|
remain vulnerable to this issue.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1517</cvename>
|
|
<url>https://bugzilla.mozilla.org/show_bug.cgi?id=713926</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-04-17</discovery>
|
|
<entry>2014-04-18</entry>
|
|
<modified>2014-04-18</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="60bfa396-c702-11e3-848c-20cf30e32f6d">
|
|
<topic>bugzilla -- Social Engineering</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bugzilla40</name>
|
|
<range><ge>2.0.0</ge><lt>4.0.12</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>bugzilla42</name>
|
|
<range><ge>4.1.1</ge><lt>4.2.8</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>bugzilla44</name>
|
|
<range><ge>4.4.0</ge><lt>4.4.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>A Bugzilla Security Advisory reports:</h1>
|
|
<blockquote cite="http://www.bugzilla.org/security/4.0.11/">
|
|
<p>Dangerous control characters can be inserted into
|
|
Bugzilla, notably into bug comments. If the text, which
|
|
may look safe, is copied into a terminal such as xterm or
|
|
gnome-terminal, then unexpected commands could be executed
|
|
on the local machine.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://bugzilla.mozilla.org/show_bug.cgi?id=968576</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-04-17</discovery>
|
|
<entry>2014-04-18</entry>
|
|
<modified>2014-04-18</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="abad20bf-c1b4-11e3-a5ac-001b21614864">
|
|
<topic>OpenLDAP -- incorrect handling of NULL in certificate Common Name</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openldap24-client</name>
|
|
<range><lt>2.4.18</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-f10-openldap</name>
|
|
<range><lt>2.4.18</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Jan Lieskovsky reports:</p>
|
|
<blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-3767">
|
|
<p>OpenLDAP does not properly handle a '\0' character in a domain name
|
|
in the subject's Common Name (CN) field of an X.509 certificate,
|
|
which allows man-in-the-middle attackers to spoof arbitrary SSL
|
|
servers via a crafted certificate issued by a legitimate
|
|
Certification Authority</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2009-3767</cvename>
|
|
<url>https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-3767</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2009-08-07</discovery>
|
|
<entry>2014-04-11</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="9aecb94c-c1ad-11e3-a5ac-001b21614864">
|
|
<topic>cURL -- inappropriate GSSAPI delegation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>curl</name>
|
|
<range><ge>7.10.6</ge><le>7.21.6</le></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-f10-curl</name>
|
|
<range><ge>7.10.6</ge><le>7.21.6</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>cURL reports:</p>
|
|
<blockquote cite="http://curl.haxx.se/docs/adv_20110623.html">
|
|
<p>When doing GSSAPI authentication, libcurl unconditionally performs
|
|
credential delegation. This hands the server a copy of the client's
|
|
security credentials, allowing the server to impersonate the client
|
|
to any other using the same GSSAPI mechanism.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2011-2192</cvename>
|
|
<url>http://curl.haxx.se/docs/adv_20110623.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2011-06-23</discovery>
|
|
<entry>2014-04-11</entry>
|
|
<modified>2014-04-30</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="77bb0541-c1aa-11e3-a5ac-001b21614864">
|
|
<topic>dbus-glib -- privledge escalation</topic>
|
|
<affects>
|
|
<package>
|
|
<name>dbus-glib</name>
|
|
<range><lt>0.100.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-f10-dbus-glib</name>
|
|
<range><lt>0.100.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Sebastian Krahmer reports:</p>
|
|
<blockquote cite="https://bugs.freedesktop.org/show_bug.cgi?id=60916">
|
|
<p>A privilege escalation flaw was found in the way dbus-glib, the
|
|
D-Bus add-on library to integrate the standard D-Bus library with
|
|
the GLib thread abstraction and main loop, performed filtering of
|
|
the message sender (message source subject), when the
|
|
NameOwnerChanged signal was received. A local attacker could use
|
|
this flaw to escalate their privileges.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-0292</cvename>
|
|
<url>https://bugs.freedesktop.org/show_bug.cgi?id=60916</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-02-15</discovery>
|
|
<entry>2014-04-11</entry>
|
|
<modified>2014-04-30</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="bf7912f5-c1a8-11e3-a5ac-001b21614864">
|
|
<topic>nas -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>nas</name>
|
|
<range><lt>1.9.4</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-f10-nas-libs</name>
|
|
<range><lt>1.9.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Hamid Zamani reports:</p>
|
|
<blockquote cite="http://radscan.com/pipermail/nas/2013-August/001270.html">
|
|
<p>multiple security problems (buffer overflows, format string
|
|
vulnerabilities and missing input sanitising), which could lead to
|
|
the execution of arbitrary code.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-4256</cvename>
|
|
<cvename>CVE-2013-4257</cvename>
|
|
<cvename>CVE-2013-4258</cvename>
|
|
<url>http://radscan.com/pipermail/nas/2013-August/001270.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-08-07</discovery>
|
|
<entry>2014-04-11</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="09f47c51-c1a6-11e3-a5ac-001b21614864">
|
|
<topic>libaudiofile -- heap-based overflow in Microsoft ADPCM compression module</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libaudiofile</name>
|
|
<range><lt>0.2.7</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-f10-libaudiofile</name>
|
|
<range><lt>0.2.7</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Debian reports:</p>
|
|
<blockquote cite="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510205">
|
|
<p>Heap-based buffer overflow in msadpcm.c in libaudiofile in audiofile
|
|
0.2.6 allows context-dependent attackers to cause a denial of service
|
|
(application crash) or possibly execute arbitrary code via a crafted
|
|
WAV file.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0159</cvename>
|
|
<url>https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510205</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2008-12-30</discovery>
|
|
<entry>2014-04-11</entry>
|
|
<modified>2014-04-30</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="972837fc-c304-11e3-8758-00262d5ed8ee">
|
|
<topic>ChaSen -- buffer overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>chasen-base</name>
|
|
<range><lt>2.4.5</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>chasen</name>
|
|
<range><lt>2.4.5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>JVN iPedia reports:</p>
|
|
<blockquote cite="http://jvn.jp/en/jp/JVN16901583/index.html">
|
|
<p>ChaSen provided by Nara Institute of Science and Technology is a
|
|
software for morphologically analyzing Japanese. ChaSen contains an
|
|
issue when reading in strings, which may lead to a buffer
|
|
overflow.</p>
|
|
<p>An arbitrary script may be executed by an attacker with access to
|
|
a system that is running a product listed in "Products
|
|
Affected."</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2011-4000</cvename>
|
|
<url>http://jvn.jp/en/jp/JVN16901583/index.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2011-11-08</discovery>
|
|
<entry>2014-04-13</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="7ccd4def-c1be-11e3-9d09-000c2980a9f3">
|
|
<topic>OpenSSL -- Local Information Disclosure</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openssl</name>
|
|
<range><ge>1.0.1</ge><lt>1.0.1_10</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>mingw32-openssl</name>
|
|
<range><ge>1.0.1</ge><lt>1.0.1g</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>8.3</ge><lt>8.3_15</lt></range>
|
|
<range><ge>8.4</ge><lt>8.4_8</lt></range>
|
|
<range><ge>9.1</ge><lt>9.1_11</lt></range>
|
|
<range><ge>9.2</ge><lt>9.2_4</lt></range>
|
|
<range><ge>10.0</ge><lt>10.0_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>OpenSSL reports:</p>
|
|
<blockquote cite="https://www.openssl.org/news/vulnerabilities.html#2014-0076">
|
|
<p>A flaw in the implementation of Montgomery Ladder Approach would
|
|
create a side-channel that leaks sensitive timing information.</p>
|
|
<p>A local attacker might be able to snoop a signing process and
|
|
might recover the signing key from it.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0076</cvename>
|
|
<freebsdsa>SA-14:06.openssl</freebsdsa>
|
|
<url>https://www.openssl.org/news/vulnerabilities.html#2014-0076</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-04-07</discovery>
|
|
<entry>2014-04-11</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c0c31b27-bff3-11e3-9d09-000c2980a9f3">
|
|
<topic>openafs -- Denial of Service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openafs</name>
|
|
<range><ge>1.4.8</ge><lt>1.6.7</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The OpenAFS development team reports:</p>
|
|
<blockquote cite="http://openafs.org/security/OPENAFS-SA-2014-001.txt">
|
|
<p>An attacker with the ability to connect to an OpenAFS fileserver can
|
|
trigger a buffer overflow, crashing the server.</p>
|
|
<p>The buffer overflow can be triggered by sending an unauthenticated
|
|
request for file server statistical information.</p>
|
|
<p>Clients are not affected.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0159</cvename>
|
|
<url>http://openafs.org/security/OPENAFS-SA-2014-001.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-04-09</discovery>
|
|
<entry>2014-04-09</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="5631ae98-be9e-11e3-b5e3-c80aa9043978">
|
|
<topic>OpenSSL -- Remote Information Disclosure</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openssl</name>
|
|
<range><ge>1.0.1</ge><lt>1.0.1_10</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>mingw32-openssl</name>
|
|
<range><ge>1.0.1</ge><lt>1.0.1g</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>10.0</ge><lt>10.0_1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>OpenSSL Reports:</p>
|
|
<blockquote cite="https://www.openssl.org/news/secadv_20140407.txt">
|
|
<p>A missing bounds check in the handling of the TLS heartbeat extension can be
|
|
used to reveal up to 64k of memory to a connected client or server.</p>
|
|
<p>Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately
|
|
upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.heartbleed.com">
|
|
<p>The bug allows anyone on the Internet to read the memory of the
|
|
systems protected by the vulnerable versions of the OpenSSL software.
|
|
This compromises the secret keys used to identify the service
|
|
providers and to encrypt the traffic, the names and passwords of the
|
|
users and the actual content. This allows attackers to eavesdrop
|
|
communications, steal data directly from the services and users and
|
|
to impersonate services and users.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.freebsd.org/security/advisories/FreeBSD-SA-14:06.openssl.asc">
|
|
<p>The code used to handle the Heartbeat Extension does not do
|
|
sufficient boundary checks on record length, which allows reading
|
|
beyond the actual payload.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0160</cvename>
|
|
<freebsdsa>SA-14:06.openssl</freebsdsa>
|
|
<url>https://www.openssl.org/news/secadv_20140407.txt</url>
|
|
<url>https://www.openssl.org/news/vulnerabilities.html#2014-0076</url>
|
|
<url>http://www.heartbleed.com</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-04-07</discovery>
|
|
<entry>2014-04-07</entry>
|
|
<modified>2014-04-11</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ffa7c6e4-bb29-11e3-8136-60a44c524f57">
|
|
<topic>otrs -- Clickjacking issue</topic>
|
|
<affects>
|
|
<package>
|
|
<name>otrs</name>
|
|
<range><lt>3.1.21</lt></range>
|
|
<range><gt>3.2.*</gt><lt>3.2.16</lt></range>
|
|
<range><gt>3.3.*</gt><lt>3.3.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The OTRS Project reports:</p>
|
|
<blockquote cite="http://www.otrs.com/security-advisory-2014-05-clickjacking-issue/">
|
|
<p>An attacker could embed OTRS in a hidden iframe tag of another
|
|
page, tricking the user into clicking links in OTRS.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.w3.org/1999/xhtml</url>
|
|
<cvename>CVE-2014-2554</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-04-01</discovery>
|
|
<entry>2014-04-03</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="580cc46b-bb1e-11e3-b144-2c4138874f7d">
|
|
<topic>LibYAML input sanitization errors</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libyaml</name>
|
|
<range><lt>0.1.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>mingw32-libyaml</name>
|
|
<range><lt>0.1.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>oCERT reports:</p>
|
|
<blockquote cite="http://www.ocert.org/advisories/ocert-2014-003.html">
|
|
<p>The LibYAML project is an open source YAML 1.1 parser and
|
|
emitter written in C.</p>
|
|
<p>The library is affected by a heap-based buffer overflow
|
|
which can lead to arbitrary code execution. The
|
|
vulnerability is caused by lack of proper expansion for the
|
|
string passed to the yaml_parser_scan_uri_escapes()
|
|
function.</p>
|
|
<p>A specially crafted YAML file, with a long sequence of
|
|
percent-encoded characters in a URL, can be used to trigger
|
|
the overflow.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-2525</cvename>
|
|
<url>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-11</discovery>
|
|
<entry>2014-03-26</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="4e95eb4e-b737-11e3-87cd-f0def10dca57">
|
|
<topic>Icinga -- buffer overflow in classic web interface</topic>
|
|
<affects>
|
|
<package>
|
|
<name>icinga</name>
|
|
<range><lt>1.11.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Icinga Team reports:</p>
|
|
<blockquote cite="https://git.icinga.org/?p=icinga-core.git;a=commitdiff;h=73285093b71a5551abdaab0a042d3d6bae093b0d">
|
|
<p>Wrong strlen check against MAX_INPUT_BUFFER without taking '\0' into account [...]</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-2386</cvename>
|
|
<url>http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2386</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-02-18</discovery>
|
|
<entry>2014-03-29</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="7e61a839-b714-11e3-8195-001966155bea">
|
|
<topic>file -- out-of-bounds access in search rules with offsets from input file</topic>
|
|
<affects>
|
|
<package>
|
|
<name>file</name>
|
|
<range><lt>5.18</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Aaron Reffett reports:</p>
|
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2270">
|
|
<p>softmagic.c in file ... and libmagic allows context-dependent
|
|
attackers to cause a denial of service (out-of-bounds memory access and
|
|
crash) via crafted offsets in the softmagic of a PE executable.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-2270</cvename>
|
|
<url>http://bugs.gw.com/view.php?id=31</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-12-20</discovery>
|
|
<entry>2014-03-29</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="9fa1a0ac-b2e0-11e3-bb07-6cf0490a8c18">
|
|
<topic>Joomla! -- Core - Multiple Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>joomla2</name>
|
|
<range><ge>2.5.*</ge><le>2.5.18</le></range>
|
|
</package>
|
|
<package>
|
|
<name>joomla3</name>
|
|
<range><ge>3.0.*</ge><le>3.2.2</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The JSST and the Joomla! Security Center report:</p>
|
|
<blockquote cite="http://developer.joomla.org/security/578-20140301-core-sql-injection.html">
|
|
<h2>[20140301] - Core - SQL Injection</h2>
|
|
<p>Inadequate escaping leads to SQL injection vulnerability.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://developer.joomla.org/security/579-20140302-core-xss-vulnerability.html">
|
|
<h2>[20140302] - Core - XSS Vulnerability</h2>
|
|
<p>Inadequate escaping leads to XSS vulnerability in com_contact.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://developer.joomla.org/security/580-20140303-core-xss-vulnerability.html">
|
|
<h2>[20140303] - Core - XSS Vulnerability</h2>
|
|
<p>Inadequate escaping leads to XSS vulnerability.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://developer.joomla.org/security/581-20140304-core-unauthorised-logins.html">
|
|
<h2>[20140304] - Core - Unauthorised Logins</h2>
|
|
<p>Inadequate checking allowed unauthorised logins via GMail authentication.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://developer.joomla.org/security/578-20140301-core-sql-injection.html</url>
|
|
<url>http://developer.joomla.org/security/579-20140302-core-xss-vulnerability.html</url>
|
|
<url>http://developer.joomla.org/security/580-20140303-core-xss-vulnerability.html</url>
|
|
<url>http://developer.joomla.org/security/581-20140304-core-unauthorised-logins.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-01</discovery>
|
|
<entry>2014-03-23</entry>
|
|
<modified>2014-04-30</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="36f9ac43-b2ac-11e3-8752-080027ef73ec">
|
|
<topic>mail/trojita -- may leak mail contents (not user credentials) over unencrypted connection</topic>
|
|
<affects>
|
|
<package>
|
|
<name>trojita</name>
|
|
<range><lt>0.4.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Jan Kundrát reports:</p>
|
|
<blockquote cite="http://jkt.flaska.net/blog/Trojita_0_4_1__a_security_update_for_CVE_2014_2567.html">
|
|
<p>An SSL stripping vulnerability was discovered in Trojitá, a fast Qt
|
|
IMAP e-mail client. User's credentials are never leaked, but if a
|
|
user tries to send an e-mail, the automatic saving into the "sent"
|
|
or "draft" folders could happen over a plaintext connection even if
|
|
the user's preferences specify STARTTLS as a requirement.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-2567</cvename>
|
|
<url>http://jkt.flaska.net/blog/Trojita_0_4_1__a_security_update_for_CVE_2014_2567.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-20</discovery>
|
|
<entry>2014-03-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="da4b89ad-b28f-11e3-99ca-f0def16c5c1b">
|
|
<topic>nginx-devel -- SPDY heap buffer overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>nginx-devel</name>
|
|
<range><ge>1.3.15</ge><lt>1.5.12</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The nginx project reports:</p>
|
|
<blockquote cite="http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html">
|
|
<p>A bug in the experimental SPDY implementation in nginx was found, which
|
|
might allow an attacker to cause a heap memory buffer overflow in a
|
|
worker process by using a specially crafted request, potentially
|
|
resulting in arbitrary code execution (CVE-2014-0133).</p>
|
|
|
|
<p>The problem affects nginx 1.3.15 - 1.5.11, compiled with the
|
|
ngx_http_spdy_module module (which is not compiled by default) and
|
|
without --with-debug configure option, if the "spdy" option of the
|
|
"listen" directive is used in a configuration file.</p>
|
|
|
|
<p>The problem is fixed in nginx 1.5.12, 1.4.7.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0133</cvename>
|
|
<url>http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-18</discovery>
|
|
<entry>2014-03-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="fc28df92-b233-11e3-99ca-f0def16c5c1b">
|
|
<topic>nginx -- SPDY heap buffer overflow</topic>
|
|
<affects>
|
|
<package>
|
|
<name>nginx</name>
|
|
<range><lt>1.4.7</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The nginx project reports:</p>
|
|
<blockquote cite="http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html">
|
|
<p>A bug in the experimental SPDY implementation in nginx was found, which
|
|
might allow an attacker to cause a heap memory buffer overflow in a
|
|
worker process by using a specially crafted request, potentially
|
|
resulting in arbitrary code execution (CVE-2014-0133).</p>
|
|
|
|
<p>The problem affects nginx 1.3.15 - 1.5.11, compiled with the
|
|
ngx_http_spdy_module module (which is not compiled by default) and
|
|
without --with-debug configure option, if the "spdy" option of the
|
|
"listen" directive is used in a configuration file.</p>
|
|
|
|
<p>The problem is fixed in nginx 1.5.12, 1.4.7.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0133</cvename>
|
|
<url>http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-18</discovery>
|
|
<entry>2014-03-23</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="91ecb546-b1e6-11e3-980f-20cf30e32f6d">
|
|
<topic>apache -- several vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>apache24</name>
|
|
<range><gt>2.4.0</gt><lt>2.4.9</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache22</name>
|
|
<range><gt>2.2.0</gt><lt>2.2.27</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache22-event-mpm</name>
|
|
<range><gt>2.2.0</gt><lt>2.2.27</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache22-itk-mpm</name>
|
|
<range><gt>2.2.0</gt><lt>2.2.27</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache22-peruser-mpm</name>
|
|
<range><gt>2.2.0</gt><lt>2.2.27</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>apache22-worker-mpm</name>
|
|
<range><gt>2.2.0</gt><lt>2.2.27</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<h1>Apache HTTP SERVER PROJECT reports:</h1>
|
|
<blockquote cite="http://www.apache.org/dist/httpd/CHANGES_2.2.27">
|
|
<p>Clean up cookie logging with fewer redundant string parsing passes.
|
|
Log only cookies with a value assignment. Prevents segfaults when
|
|
logging truncated cookies.</p>
|
|
<p>mod_dav: Keep track of length of cdata properly when removing leading
|
|
spaces. Eliminates a potential denial of service from specifically
|
|
crafted DAV WRITE requests.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0098</cvename>
|
|
<cvename>CVE-2013-6438</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-02-25</discovery>
|
|
<entry>2014-03-22</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="610de647-af8d-11e3-a25b-b4b52fce4ce8">
|
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>firefox</name>
|
|
<range><lt>28.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>firefox-esr</name>
|
|
<range><lt>24.4.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox</name>
|
|
<range><lt>28.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-seamonkey</name>
|
|
<range><lt>2.25</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-thunderbird</name>
|
|
<range><lt>24.4.0</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>seamonkey</name>
|
|
<range><lt>2.25</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>thunderbird</name>
|
|
<range><lt>24.4.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Mozilla Project reports:</p>
|
|
<blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
|
|
<p>MFSA 2014-15 Miscellaneous memory safety hazards
|
|
(rv:28.0 / rv:24.4)</p>
|
|
<p>MFSA 2014-16 Files extracted during updates are not always
|
|
read only</p>
|
|
<p>MFSA 2014-17 Out of bounds read during WAV file decoding</p>
|
|
<p>MFSA 2014-18 crypto.generateCRMFRequest does not validate
|
|
type of key</p>
|
|
<p>MFSA 2014-19 Spoofing attack on WebRTC permission prompt</p>
|
|
<p>MFSA 2014-20 onbeforeunload and Javascript navigation DOS</p>
|
|
<p>MFSA 2014-21 Local file access via Open Link in new tab</p>
|
|
<p>MFSA 2014-22 WebGL content injection from one domain to
|
|
rendering in another</p>
|
|
<p>MFSA 2014-23 Content Security Policy for data: documents
|
|
not preserved by session restore</p>
|
|
<p>MFSA 2014-24 Android Crash Reporter open to manipulation</p>
|
|
<p>MFSA 2014-25 Firefox OS DeviceStorageFile object vulnerable
|
|
to relative path escape</p>
|
|
<p>MFSA 2014-26 Information disclosure through polygon
|
|
rendering in MathML</p>
|
|
<p>MFSA 2014-27 Memory corruption in Cairo during PDF font
|
|
rendering</p>
|
|
<p>MFSA 2014-28 SVG filters information disclosure through
|
|
feDisplacementMap</p>
|
|
<p>MFSA 2014-29 Privilege escalation using WebIDL-implemented
|
|
APIs</p>
|
|
<p>MFSA 2014-30 Use-after-free in TypeObject</p>
|
|
<p>MFSA 2014-31 Out-of-bounds read/write through neutering
|
|
ArrayBuffer objects</p>
|
|
<p>MFSA 2014-32 Out-of-bounds write through TypedArrayObject
|
|
after neutering</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1493</cvename>
|
|
<cvename>CVE-2014-1494</cvename>
|
|
<cvename>CVE-2014-1496</cvename>
|
|
<cvename>CVE-2014-1497</cvename>
|
|
<cvename>CVE-2014-1498</cvename>
|
|
<cvename>CVE-2014-1499</cvename>
|
|
<cvename>CVE-2014-1500</cvename>
|
|
<cvename>CVE-2014-1501</cvename>
|
|
<cvename>CVE-2014-1502</cvename>
|
|
<cvename>CVE-2014-1504</cvename>
|
|
<cvename>CVE-2014-1505</cvename>
|
|
<cvename>CVE-2014-1506</cvename>
|
|
<cvename>CVE-2014-1507</cvename>
|
|
<cvename>CVE-2014-1508</cvename>
|
|
<cvename>CVE-2014-1509</cvename>
|
|
<cvename>CVE-2014-1510</cvename>
|
|
<cvename>CVE-2014-1511</cvename>
|
|
<cvename>CVE-2014-1512</cvename>
|
|
<cvename>CVE-2014-1513</cvename>
|
|
<cvename>CVE-2014-1514</cvename>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-15.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-16.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-17.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-18.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-19.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-20.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-21.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-22.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-23.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-24.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-25.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-26.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-27.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-28.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-29.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-30.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-31.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-32.html</url>
|
|
<url>http://www.mozilla.org/security/known-vulnerabilities/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-19</discovery>
|
|
<entry>2014-03-19</entry>
|
|
<modified>2014-03-20</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="eb426e82-ab68-11e3-9d09-000c2980a9f3">
|
|
<topic>mutt -- denial of service, potential remote code execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>mutt</name>
|
|
<range><lt>1.5.23</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Beatrice Torracca and Evgeni Golov report:</p>
|
|
<blockquote cite="http://www.securityfocus.com/archive/1/531431">
|
|
<p>A buffer overflow has been discovered that could result in
|
|
denial of service or potential execution of arbitrary code.</p>
|
|
<p>This condition can be triggered by malformed RFC2047 header
|
|
lines</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0467</cvename>
|
|
<url>http://packetstormsecurity.com/files/cve/CVE-2014-0467</url>
|
|
<url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-12</discovery>
|
|
<entry>2014-03-14</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="777d7b9e-ab02-11e3-841e-60a44c524f57">
|
|
<topic>wemux -- read-only can be bypassed</topic>
|
|
<affects>
|
|
<package>
|
|
<name>wemux</name>
|
|
<range><lt>3.2.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>JonApps reports:</p>
|
|
<blockquote cite="https://github.com/zolrath/wemux/issues/36">
|
|
<p>The read-only mode can be bypassed and any command sent to bash session</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://github.com/zolrath/wemux/issues/36</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-12-24</discovery>
|
|
<entry>2014-03-13</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="03e48bf5-a96d-11e3-a556-3c970e169bc2">
|
|
<topic>samba -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>samba34</name>
|
|
<range><gt>0</gt></range>
|
|
</package>
|
|
<package>
|
|
<name>samba35</name>
|
|
<range><gt>0</gt></range>
|
|
</package>
|
|
<package>
|
|
<name>samba36</name>
|
|
<range><gt>3.6.*</gt><lt>3.6.23</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>samba4</name>
|
|
<range><gt>4.0.*</gt><lt>4.0.16</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>samba41</name>
|
|
<range><gt>4.1.*</gt><lt>4.1.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Samba project reports:</p>
|
|
<blockquote cite="http://www.samba.org/samba/security/CVE-2013-4496">
|
|
<p>In Samba's SAMR server we neglect to ensure that attempted
|
|
password changes will update the bad password count, nor set
|
|
the lockout flags. This would allow a user unlimited attempts
|
|
against the password by simply calling ChangePasswordUser2
|
|
repeatedly.</p>
|
|
<p>This is available without any other authentication.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.samba.org/samba/security/CVE-2013-6442">
|
|
<p>smbcacls can remove a file or directory ACL by mistake.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-4496</cvename>
|
|
<cvename>CVE-2013-6442</cvename>
|
|
<url>http://www.samba.org/samba/security/CVE-2013-4496</url>
|
|
<url>http://www.samba.org/samba/security/CVE-2013-6442</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-11</discovery>
|
|
<entry>2014-03-11</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="03159886-a8a3-11e3-8f36-0025905a4771">
|
|
<topic>asterisk -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>asterisk11</name>
|
|
<range><lt>11.8.1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>asterisk18</name>
|
|
<range><lt>1.8.26.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Asterisk project reports:</p>
|
|
<blockquote cite="https://www.asterisk.org/security">
|
|
<p>Stack Overflow in HTTP Processing of Cookie Headers. Sending a HTTP
|
|
request that is handled by Asterisk with a large number of Cookie
|
|
headers could overflow the stack. You could even exhaust memory if you
|
|
sent an unlimited number of headers in the request.</p>
|
|
<p>Denial of Service Through File Descriptor Exhaustion with chan_sip
|
|
Session-Timers. An attacker can use all available file descriptors
|
|
using SIP INVITE requests. Asterisk will respond with code 400, 420,
|
|
or 422 for INVITEs meeting this criteria.
|
|
Each INVITE meeting these conditions will leak a channel and several
|
|
file descriptors. The file descriptors cannot be released without
|
|
restarting Asterisk which may allow intrusion detection systems to be
|
|
bypassed by sending the requests slowly.</p>
|
|
<p>Remote Crash Vulnerability in PJSIP channel driver. A remotely
|
|
exploitable crash vulnerability exists in the PJSIP channel driver if
|
|
the "qualify_frequency" configuration option is enabled on an AOR and
|
|
the remote SIP server challenges for authentication of the resulting
|
|
OPTIONS request. The response handling code wrongly assumes that a
|
|
PJSIP endpoint will always be associated with an outgoing request which
|
|
is incorrect.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-2286</cvename>
|
|
<cvename>CVE-2014-2287</cvename>
|
|
<cvename>CVE-2014-2288</cvename>
|
|
<url>http://downloads.asterisk.org/pub/security/AST-2014-001.pdf</url>
|
|
<url>http://downloads.asterisk.org/pub/security/AST-2014-002.pdf</url>
|
|
<url>http://downloads.asterisk.org/pub/security/AST-2014-003.pdf</url>
|
|
<url>https://www.asterisk.org/security</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-10</discovery>
|
|
<entry>2014-03-10</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1a0de610-a761-11e3-95fe-bcaec565249c">
|
|
<topic>freetype2 -- Out of bounds read/write</topic>
|
|
<affects>
|
|
<package>
|
|
<name>freetype2</name>
|
|
<range><lt>2.5.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Mateusz Jurczyk reports:</p>
|
|
<blockquote cite="http://savannah.nongnu.org/bugs/?41697">
|
|
<p>Out of bounds stack-based read/write in
|
|
cf2_hintmap_build.</p>
|
|
<p>This is a critical vulnerability in the CFF Rasterizer
|
|
code recently contributed by Adobe, leading to potential
|
|
arbitrary code execution in the context of the FreeType2
|
|
library client.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://savannah.nongnu.org/bugs/?41697</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-02-25</discovery>
|
|
<entry>2014-03-09</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="20e23b65-a52e-11e3-ae3a-00224d7c32a2">
|
|
<topic>xmms -- Integer Overflow And Underflow Vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>xmms</name>
|
|
<range><le>1.2.11_20</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Secunia reports:</p>
|
|
<blockquote cite="http://secunia.com/secunia_research/2007-47/advisory/">
|
|
<p>Secunia Research has discovered two vulnerabilities in XMMS, which can
|
|
be exploited by malicious people to compromise a user's system.</p>
|
|
|
|
<p>1) An integer underflow error exists in the processing of skin bitmap
|
|
images. This can be exploited to cause a stack-based buffer overflow
|
|
via specially crafted skin images containing manipulated header
|
|
information.</p>
|
|
|
|
<p>Successful exploitation allows execution of arbitrary code.</p>
|
|
|
|
<p>2) An integer overflow error exists in the processing of skin bitmap
|
|
images. This can be exploited to cause memory corruption via specially
|
|
crafted skin images containing manipulated header information.</p>
|
|
|
|
<p>Successful exploitation may allow the execution of arbitrary code.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2007-0653</cvename>
|
|
<cvename>CVE-2007-0654</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2007-02-06</discovery>
|
|
<entry>2014-03-06</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="89db3b31-a4c3-11e3-978f-f0def16c5c1b">
|
|
<topic>nginx -- SPDY memory corruption</topic>
|
|
<affects>
|
|
<package>
|
|
<name>nginx-devel</name>
|
|
<range><eq>1.5.10</eq></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The nginx project reports:</p>
|
|
<blockquote cite="http://mailman.nginx.org/pipermail/nginx-announce/2014/000132.html">
|
|
<p>A bug in the experimental SPDY implementation in nginx 1.5.10 was found,
|
|
which might allow an attacker to corrupt worker process memory by using
|
|
a specially crafted request, potentially resulting in arbitrary code
|
|
execution (CVE-2014-0088).</p>
|
|
|
|
<p>The problem only affects nginx 1.5.10 on 32-bit platforms, compiled with
|
|
the ngx_http_spdy_module module (which is not compiled by default), if
|
|
the "spdy" option of the "listen" directive is used in a configuration
|
|
file.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0088</cvename>
|
|
<url>http://mailman.nginx.org/pipermail/nginx-announce/2014/000132.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-04</discovery>
|
|
<entry>2014-03-06</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="f645aa90-a3e8-11e3-a422-3c970e169bc2">
|
|
<topic>gnutls -- multiple certificate verification issues</topic>
|
|
<affects>
|
|
<package>
|
|
<name>gnutls</name>
|
|
<range><lt>2.12.23_4</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-f10-gnutls</name>
|
|
<range><lt>2.12.23_4</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>gnutls-devel</name>
|
|
<range><lt>3.1.22</lt></range>
|
|
<range><gt>3.2.0</gt><lt>3.2.12</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>gnutls3</name>
|
|
<range><lt>3.1.22</lt></range>
|
|
<range><gt>3.2.0</gt><lt>3.2.12</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>GnuTLS project reports:</p>
|
|
<blockquote cite="http://www.gnutls.org/security.html#GNUTLS-SA-2014-2">
|
|
<p>A vulnerability was discovered that affects the
|
|
certificate verification functions of all gnutls
|
|
versions. A specially crafted certificate could
|
|
bypass certificate validation checks. The
|
|
vulnerability was discovered during an audit of
|
|
GnuTLS for Red Hat.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.gnutls.org/security.html#GNUTLS-SA-2014-1">
|
|
<p>Suman Jana reported a vulnerability that affects
|
|
the certificate verification functions of
|
|
gnutls 2.11.5 and later versions. A version 1
|
|
intermediate certificate will be considered as
|
|
a CA certificate by default (something that
|
|
deviates from the documented behavior).</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0092</cvename>
|
|
<cvename>CVE-2014-1959</cvename>
|
|
<url>http://www.gnutls.org/security.html#GNUTLS-SA-2014-1</url>
|
|
<url>http://www.gnutls.org/security.html#GNUTLS-SA-2014-2</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-03-03</discovery>
|
|
<entry>2014-03-04</entry>
|
|
<modified>2014-04-30</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="815dbcf9-a2d6-11e3-8088-002590860428">
|
|
<topic>file -- denial of service</topic>
|
|
<affects>
|
|
<package>
|
|
<name>file</name>
|
|
<range><lt>5.17</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Fine Free file project reports:</p>
|
|
<blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943">
|
|
<p>file before 5.17 allows context-dependent attackers to
|
|
cause a denial of service (infinite recursion, CPU consumption, and
|
|
crash) via a crafted indirect offset value in the magic of a file.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1943</cvename>
|
|
<mlist>http://mx.gw.com/pipermail/file/2014/001327.html</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-02-16</discovery>
|
|
<entry>2014-03-03</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="8e5e6d42-a0fa-11e3-b09a-080027f2d077">
|
|
<topic>Python -- buffer overflow in socket.recvfrom_into()</topic>
|
|
<affects>
|
|
<package>
|
|
<name>python27</name>
|
|
<range><le>2.7.6_3</le></range>
|
|
</package>
|
|
<package>
|
|
<name>python31</name>
|
|
<range><le>3.1.5_10</le></range>
|
|
</package>
|
|
<package>
|
|
<name>python32</name>
|
|
<range><le>3.2.5_7</le></range>
|
|
</package>
|
|
<package>
|
|
<name>python33</name>
|
|
<range><le>3.3.3_2</le></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Vincent Danen via Red Hat Issue Tracker reports:</p>
|
|
<blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=1062370">
|
|
<p>A vulnerability was reported in Python's socket module, due to a
|
|
boundary error within the sock_recvfrom_into() function, which could be
|
|
exploited to cause a buffer overflow. This could be used to crash a
|
|
Python application that uses the socket.recvfrom_info() function or,
|
|
possibly, execute arbitrary code with the permissions of the user
|
|
running vulnerable Python code.</p>
|
|
|
|
<p>This vulnerable function, socket.recvfrom_into(), was introduced in
|
|
Python 2.5. Earlier versions are not affected by this flaw.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<bid>65379</bid>
|
|
<cvename>CVE-2014-1912</cvename>
|
|
<mlist>https://mail.python.org/pipermail/python-dev/2014-February/132758.html</mlist>
|
|
<url>http://bugs.python.org/issue20246</url>
|
|
<url>https://bugzilla.redhat.com/show_bug.cgi?id=1062370</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-01-14</discovery>
|
|
<entry>2014-03-01</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1839f78c-9f2b-11e3-980f-20cf30e32f6d">
|
|
<topic>subversion -- mod_dav_svn vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>subversion</name>
|
|
<range><ge>1.3.0</ge><lt>1.7.16</lt></range>
|
|
<range><ge>1.8.0</ge><lt>1.8.8</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>subversion16</name>
|
|
<range><ge>1.3.0</ge><lt>1.7.16</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>subversion17</name>
|
|
<range><ge>1.3.0</ge><lt>1.7.16</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Subversion Project reports:</p>
|
|
<blockquote cite="http://subversion.apache.org/security/">
|
|
<p>Subversion's mod_dav_svn Apache HTTPD server module will crash when it
|
|
receives an OPTIONS request against the server root and Subversion is
|
|
configured to handle the server root and SVNListParentPath is on.
|
|
This can lead to a DoS. There are no known instances of this
|
|
problem being exploited in the wild, but the details of how to exploit
|
|
it have been disclosed on the Subversion development mailing list.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>CVE-2014-0032</url>
|
|
<url>https://subversion.apache.org/security/CVE-2014-0032-advisory.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-01-10</discovery>
|
|
<entry>2014-02-26</entry>
|
|
<modified>2014-04-30</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="70b72a52-9e54-11e3-babe-60a44c524f57">
|
|
<topic>otrs -- XSS Issue</topic>
|
|
<affects>
|
|
<package>
|
|
<name>otrs</name>
|
|
<range><lt>3.1.20</lt></range>
|
|
<range><gt>3.2.*</gt><lt>3.2.15</lt></range>
|
|
<range><gt>3.3.*</gt><lt>3.3.5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The OTRS Project reports:</p>
|
|
<blockquote cite="https://www.otrs.com/security-advisory-2014-03-xss-issue/">
|
|
<p>An attacker could send a specially prepared HTML email to OTRS. If
|
|
he can then trick an agent into following a special link to display this email,
|
|
JavaScript code would be executed.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://www.otrs.com/security-advisory-2014-03-xss-issue/</url>
|
|
<cvename>CVE-2014-1695</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-02-25</discovery>
|
|
<entry>2014-02-25</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="42d42090-9a4d-11e3-b029-08002798f6ff">
|
|
<topic>PostgreSQL -- multiple privilege issues</topic>
|
|
<affects>
|
|
<package>
|
|
<name>postgresql-server</name>
|
|
<range><lt>8.4.20</lt></range>
|
|
<range><ge>9.0.0</ge><lt>9.0.16</lt></range>
|
|
<range><ge>9.1.0</ge><lt>9.1.12</lt></range>
|
|
<range><ge>9.2.0</ge><lt>9.2.7</lt></range>
|
|
<range><ge>9.3.0</ge><lt>9.3.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>PostgreSQL Project reports:</p>
|
|
<blockquote cite="http://www.postgresql.org/about/news/1506/">
|
|
<p>This update fixes CVE-2014-0060, in which PostgreSQL did not
|
|
properly enforce the WITH ADMIN OPTION permission for ROLE management.
|
|
Before this fix, any member of a ROLE was able to grant others access
|
|
to the same ROLE regardless if the member was given the WITH ADMIN
|
|
OPTION permission. It also fixes multiple privilege escalation issues,
|
|
including: CVE-2014-0061, CVE-2014-0062, CVE-2014-0063, CVE-2014-0064,
|
|
CVE-2014-0065, and CVE-2014-0066. More information on these issues can
|
|
be found on our security page and the security issue detail wiki page.
|
|
</p>
|
|
<p>
|
|
With this release, we are also alerting users to a known security hole
|
|
that allows other users on the same machine to gain access to an
|
|
operating system account while it is doing "make check":
|
|
CVE-2014-0067. "Make check" is normally part of building PostgreSQL
|
|
from source code. As it is not possible to fix this issue without
|
|
causing significant issues to our testing infrastructure, a patch will
|
|
be released separately and publicly. Until then, users are strongly
|
|
advised not to run "make check" on machines where untrusted users have
|
|
accounts.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0060</cvename>
|
|
<cvename>CVE-2014-0061</cvename>
|
|
<cvename>CVE-2014-0062</cvename>
|
|
<cvename>CVE-2014-0063</cvename>
|
|
<cvename>CVE-2014-0064</cvename>
|
|
<cvename>CVE-2014-0065</cvename>
|
|
<cvename>CVE-2014-0066</cvename>
|
|
<cvename>CVE-2014-0067</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-02-20</discovery>
|
|
<entry>2014-02-20</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="0871d18b-9638-11e3-a371-6805ca0b3d42">
|
|
<topic>phpMyAdmin -- Self-XSS due to unescaped HTML output in import.</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpMyAdmin</name>
|
|
<range><ge>3.3.1</ge><lt>4.1.7</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The phpMyAdmin development team reports:</p>
|
|
<blockquote cite="http://www.phpmyadmin.net/home_page/security/PMASA-2014-1.php">
|
|
<p> When importing a file with crafted filename, it is
|
|
possible to trigger an XSS. We consider this vulnerability
|
|
to be non critical.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.phpmyadmin.net/home_page/security/PMASA-2014-1.php</url>
|
|
<cvename>CVE-2014-1879</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-02-15</discovery>
|
|
<entry>2014-02-15</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="3e0507c6-9614-11e3-b3a5-00e0814cab4e">
|
|
<topic>jenkins -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>jenkins</name>
|
|
<range><lt>1.551</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>jenkins-lts</name>
|
|
<range><lt>1.532.2</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Jenkins Security Advisory reports:</p>
|
|
<blockquote cite="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14">
|
|
<p>This advisory announces multiple security vulnerabilities that
|
|
were found in Jenkins core.</p>
|
|
<p>Please reference CVE/URL list for details</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-14</url>
|
|
<cvename>CVE-2013-5573</cvename>
|
|
<cvename>CVE-2013-7285</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-02-14</discovery>
|
|
<entry>2014-02-15</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="90b27045-9530-11e3-9d09-000c2980a9f3">
|
|
<topic>lighttpd -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>lighttpd</name>
|
|
<range><lt>1.4.34</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>lighttpd security advisories report:</p>
|
|
<blockquote cite="http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt">
|
|
<p>It is possible to inadvertantly enable vulnerable ciphers when using
|
|
ssl.cipher-list.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_02.txt">
|
|
<p>In certain cases setuid() and similar can fail, potentially triggering
|
|
lighttpd to restart running as root.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_03.txt">
|
|
<p>If FAMMonitorDirectory fails, the memory intended to store the context is
|
|
released; some lines below the "version" compoment of that context is read.
|
|
Reading invalid data doesn't matter, but the memory access could trigger a
|
|
segfault.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt</url>
|
|
<url>http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_02.txt</url>
|
|
<url>http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_03.txt</url>
|
|
<cvename>CVE-2013-4508</cvename>
|
|
<cvename>CVE-2013-4559</cvename>
|
|
<cvename>CVE-2013-4560</cvename>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-11-28</discovery>
|
|
<entry>2014-02-14</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="4dd575b8-8f82-11e3-bb11-0025905a4771">
|
|
<topic>phpmyfaq -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>phpmyfaq</name>
|
|
<range><lt>2.8.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The phpMyFAQ team reports:</p>
|
|
<blockquote cite="http://www.phpmyfaq.de/advisory_2014-02-04.php">
|
|
<p> An arbitrary script may be executed on the user's Internet
|
|
Explorer when using an older version of the browser. If a user views
|
|
a malicious page while logged in, settings may be changed
|
|
unintentionally.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0813</cvename>
|
|
<cvename>CVE-2014-0814</cvename>
|
|
<url>http://www.phpmyfaq.de/advisory_2014-02-04.php</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-02-04</discovery>
|
|
<entry>2014-02-06</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="b7a7576d-8e0a-11e3-9976-9c4e36909cc0">
|
|
<topic>linux-flashplugin -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>linux-f10-flashplugin</name>
|
|
<range><lt>11.2r202.336</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Adobe reports:</p>
|
|
<blockquote cite="http://www.adobe.com/support/security/bulletins/apsb14-04.html">
|
|
<p>These updates address vulnerabilities that could cause a crash
|
|
and potentially allow an attacker to take control of the affected system.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0497</cvename>
|
|
<url>http://www.adobe.com/support/security/bulletins/apsb14-04.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-02-04</discovery>
|
|
<entry>2014-02-04</entry>
|
|
<modified>2014-02-05</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="1753f0ff-8dd5-11e3-9b45-b4b52fce4ce8">
|
|
<topic>mozilla -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>firefox</name>
|
|
<range><gt>25.0,1</gt><lt>27.0,1</lt></range>
|
|
<range><lt>24.3.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-firefox</name>
|
|
<range><lt>27.0,1</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-seamonkey</name>
|
|
<range><lt>2.24</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>linux-thunderbird</name>
|
|
<range><lt>24.3.0</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>seamonkey</name>
|
|
<range><lt>2.24</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>thunderbird</name>
|
|
<range><lt>24.3.0</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The Mozilla Project reports:</p>
|
|
<blockquote cite="http://www.mozilla.org/security/known-vulnerabilities/">
|
|
<p>MFSA 2014-01 Miscellaneous memory safety hazards
|
|
(rv:27.0 / rv:24.3)</p>
|
|
<p>MFSA 2014-02 Clone protected content with XBL scopes</p>
|
|
<p>MFSA 2014-03 UI selection timeout missing on download
|
|
prompts</p>
|
|
<p>MFSA 2014-04 Incorrect use of discarded images by
|
|
RasterImage</p>
|
|
<p>MFSA 2014-05 Information disclosure with *FromPoint on
|
|
iframes</p>
|
|
<p>MFSA 2014-06 Profile path leaks to Android system log</p>
|
|
<p>MFSA 2014-07 XSLT stylesheets treated as styles in Content
|
|
Security Policy</p>
|
|
<p>MFSA 2014-08 Use-after-free with imgRequestProxy and image
|
|
proccessing</p>
|
|
<p>MFSA 2014-09 Cross-origin information leak through web
|
|
workers</p>
|
|
<p>MFSA 2014-10 Firefox default start page UI content invokable
|
|
by script</p>
|
|
<p>MFSA 2014-11 Crash when using web workers with asm.js</p>
|
|
<p>MFSA 2014-12 NSS ticket handling issues</p>
|
|
<p>MFSA 2014-13 Inconsistent JavaScript handling of access to
|
|
Window objects</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1477</cvename>
|
|
<cvename>CVE-2014-1478</cvename>
|
|
<cvename>CVE-2014-1479</cvename>
|
|
<cvename>CVE-2014-1480</cvename>
|
|
<cvename>CVE-2014-1481</cvename>
|
|
<cvename>CVE-2014-1482</cvename>
|
|
<cvename>CVE-2014-1483</cvename>
|
|
<cvename>CVE-2014-1484</cvename>
|
|
<cvename>CVE-2014-1485</cvename>
|
|
<cvename>CVE-2014-1486</cvename>
|
|
<cvename>CVE-2014-1487</cvename>
|
|
<cvename>CVE-2014-1488</cvename>
|
|
<cvename>CVE-2014-1489</cvename>
|
|
<cvename>CVE-2014-1490</cvename>
|
|
<cvename>CVE-2014-1491</cvename>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-01.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-02.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-03.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-04.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-05.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-06.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-07.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-08.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-09.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-10.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-11.html</url>
|
|
<url>https://www.mozilla.org/security/announce/2014/mfsa2014-12.html</url>
|
|
<url>http://www.mozilla.org/security/known-vulnerabilities/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-02-04</discovery>
|
|
<entry>2014-02-04</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="111f1f84-1d14-4ff2-a9ea-cf07119c0d3b">
|
|
<topic>libyaml heap overflow resulting in possible code execution</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libyaml</name>
|
|
<range><lt>0.1.4_3</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>pkg</name>
|
|
<range><lt>1.2.6</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>pkg-devel</name>
|
|
<range><lt>1.2.6</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>libyaml was prone to a heap overflow that could result in
|
|
arbitrary code execution. Pkg uses libyaml to parse
|
|
the package manifests in some cases. Pkg also used libyaml
|
|
to parse the remote repository until 1.2.</p>
|
|
<p>RedHat Product Security Team reports on libyaml:</p>
|
|
<blockquote cite="https://bugzilla.redhat.com/show_bug.cgi?id=1033990">
|
|
<p>A heap-based buffer overflow flaw was found in the way libyaml
|
|
parsed YAML tags. A remote attacker could provide a
|
|
specially-crafted YAML document that, when parsed by an application
|
|
using libyaml, would cause the application to crash or, potentially,
|
|
execute arbitrary code with the privileges of the user running the
|
|
application.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-6393</cvename>
|
|
<url>https://bugzilla.redhat.com/show_bug.cgi?id=1033990</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-11-24</discovery>
|
|
<entry>2014-02-01</entry>
|
|
<modified>2014-02-01</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="a4c9e12d-88b7-11e3-8ada-10bf48e1088e">
|
|
<topic>socat -- buffer overflow with data from command line</topic>
|
|
<affects>
|
|
<package>
|
|
<name>socat</name>
|
|
<range><lt>1.7.2.3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Florian Weimer of the Red Hat Product Security Team reports:</p>
|
|
<blockquote cite="http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt">
|
|
<p>Due to a missing check during assembly of the HTTP request line a long
|
|
target server name in the PROXY-CONNECT address can cause a stack buffer
|
|
overrun. Exploitation requires that the attacker is able to provide the
|
|
target server name to the PROXY-CONNECT address in the command line.
|
|
This can happen for example in scripts that receive data from untrusted
|
|
sources.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0019</cvename>
|
|
<url>http://www.dest-unreach.org/socat/contrib/socat-secadv5.txt</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-01-24</discovery>
|
|
<entry>2014-01-29</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c7b5d72b-886a-11e3-9533-60a44c524f57">
|
|
<topic>otrs -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>otrs</name>
|
|
<range><lt>3.1.19</lt></range>
|
|
<range><gt>3.2.*</gt><lt>3.2.14</lt></range>
|
|
<range><gt>3.3.*</gt><lt>3.3.4</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The OTRS Project reports:</p>
|
|
<blockquote cite="https://www.otrs.com/security-advisory-2014-02-sql-injection-issue/">
|
|
<p>SQL injection issue</p>
|
|
</blockquote>
|
|
<blockquote cite="https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface/">
|
|
<p>An attacker that managed to take over the session of a logged in customer
|
|
could create tickets and/or send follow-ups to existing tickets due to
|
|
missing challenge token checks.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1471</cvename>
|
|
<url>https://www.otrs.com/security-advisory-2014-02-sql-injection-issue/</url>
|
|
<url>https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-01-28</discovery>
|
|
<entry>2014-01-28</entry>
|
|
<modified>2014-02-06</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="080c5370-886a-11e3-9533-60a44c524f57">
|
|
<cancelled superseded="c7b5d72b-886a-11e3-9533-60a44c524f57"/>
|
|
</vuln>
|
|
|
|
<vuln vid="d1dfc4c7-8791-11e3-a371-6805ca0b3d42">
|
|
<topic>rt42 -- denial-of-service attack via the email gateway</topic>
|
|
<affects>
|
|
<package>
|
|
<name>rt42</name>
|
|
<range><ge>4.2</ge><lt>4.2.1_3</lt></range>
|
|
<range><ge>4.2.2</ge><lt>4.2.2_2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>p5-Email-Address-List</name>
|
|
<range><lt>0.02</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>The RT development team reports:</p>
|
|
<blockquote cite="http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html">
|
|
<p>Versions of RT between 4.2.0 and 4.2.2 (inclusive) are
|
|
vulnerable to a denial-of-service attack via the email
|
|
gateway; any installation which accepts mail from untrusted
|
|
sources is vulnerable, regardless of the permissions
|
|
configuration inside RT. This vulnerability is assigned
|
|
CVE-2014-1474.</p>
|
|
<p>This vulnerability is caused by poor parsing performance
|
|
in the Email::Address::List module, which RT depends on. We
|
|
recommend that affected users upgrade their version of
|
|
Email::Address::List to v0.02 or above, which resolves the
|
|
issue. Due to a communications mishap, the release on CPAN
|
|
will temporarily appear as "unauthorized," and the
|
|
command-line cpan client will hence not install it. We
|
|
expect this to be resolved shortly; in the meantime, the
|
|
release is also available from our server.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-1474</cvename>
|
|
<url>http://blog.bestpractical.com/2014/01/security-vulnerability-in-rt-42.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-01-27</discovery>
|
|
<entry>2014-01-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="efa663eb-8754-11e3-9a47-00163e1ed244">
|
|
<topic>strongswan -- multiple DoS vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>strongswan</name>
|
|
<range><lt>5.1.1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>strongSwan Project reports:</p>
|
|
<blockquote cite="http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6076%29.html">
|
|
<p>A DoS vulnerability triggered by crafted IKEv1 fragmentation
|
|
payloads was discovered in strongSwan's IKE daemon charon. All
|
|
versions since 5.0.2 are affected.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6075%29.html">
|
|
<p>A DoS vulnerability and potential authorization bypass triggered
|
|
by a crafted ID_DER_ASN1_DN ID payload was discovered in strongSwan.
|
|
All versions since 4.3.3 are affected.</p>
|
|
</blockquote>
|
|
<blockquote cite="http://www.strongswan.org/blog/2013/08/01/strongswan-denial-of-service-vulnerability-%28cve-2013-5018%29.html">
|
|
<p>A DoS vulnerability in strongSwan was discovered, which is
|
|
triggered by XAuth usernames and EAP identities in versions
|
|
5.0.3 and 5.0.4.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-5018</cvename>
|
|
<cvename>CVE-2013-6075</cvename>
|
|
<cvename>CVE-2013-6076</cvename>
|
|
<url>http://www.strongswan.org/blog/2013/08/01/strongswan-denial-of-service-vulnerability-%28cve-2013-5018%29.html</url>
|
|
<url>http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6075%29.html</url>
|
|
<url>http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6076%29.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-11-01</discovery>
|
|
<entry>2014-01-27</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="d9dbe6e8-84da-11e3-98bd-080027f2d077">
|
|
<topic>varnish -- DoS vulnerability in Varnish HTTP cache</topic>
|
|
<affects>
|
|
<package>
|
|
<name>varnish</name>
|
|
<range><lt>3.0.5</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Varnish Cache Project reports:</p>
|
|
<blockquote cite="https://www.varnish-cache.org/lists/pipermail/varnish-announce/2013-October/000686.html">
|
|
<p>If Varnish receives a certain illegal request, and the subroutine
|
|
'vcl_error{}' restarts the request, the varnishd worker process
|
|
will crash with an assert.
|
|
</p>
|
|
<p>The varnishd management process will restart the worker process, but
|
|
there will be a brief interruption of service and the cache will be
|
|
emptied, causing more traffic to go to the backend.
|
|
</p>
|
|
<p>We are releasing this advisory because restarting from vcl_error{} is
|
|
both fairly common and documented.</p>
|
|
<p>This is purely a denial of service vulnerability, there is no risk of
|
|
privilege escalation.</p>
|
|
<p>Workaround</p>
|
|
<p>Insert this at the top of your VCL file:</p>
|
|
<pre>
|
|
sub vcl_error {
|
|
if (obj.status == 400 || obj.status == 413) {
|
|
return(deliver);
|
|
}
|
|
}
|
|
|
|
Or add this test at the top of your existing vcl_error{}.
|
|
</pre>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-4484</cvename>
|
|
<mlist>https://www.varnish-cache.org/lists/pipermail/varnish-announce/2013-October/000686.html</mlist>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-10-30</discovery>
|
|
<entry>2014-01-25</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="c0ef849e-84ac-11e3-bec4-9c4e36909cc0">
|
|
<topic>linux-flashplugin -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>linux-f10-flashplugin</name>
|
|
<range><lt>11.2r202.335</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Adobe reports:</p>
|
|
<blockquote cite="http://helpx.adobe.com/security/products/flash-player/apsb14-02.html">
|
|
<p>These updates address vulnerabilities that could cause a crash
|
|
and potentially allow an attacker to take control of the affected system.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0491</cvename>
|
|
<cvename>CVE-2014-0492</cvename>
|
|
<url>http://helpx.adobe.com/security/products/flash-player/apsb14-02.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-01-14</discovery>
|
|
<entry>2014-01-24</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="6d08fa63-83bf-11e3-bdba-080027ef73ec">
|
|
<topic>HTMLDOC -- buffer overflow issues when reading AFM files and parsing page sizes</topic>
|
|
<affects>
|
|
<package>
|
|
<name>htmldoc</name>
|
|
<range><lt>1.8.28</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Michael Sweet reports:</p>
|
|
<blockquote cite="http://www.msweet.org/projects.php?Z1">
|
|
<p>HTMLDOC 1.8.28 fixes some known security issues and
|
|
formatting bugs. Changes include:</p>
|
|
<ul>
|
|
<li>SECURITY: Fixed three buffer overflow issues when
|
|
reading AFM files and parsing page sizes.</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<url>http://www.msweet.org/projects.php?Z1</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-01-06</discovery>
|
|
<entry>2014-01-22</entry>
|
|
<modified>2014-01-23</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="81f1fdc2-7ec7-11e3-a6c6-00163e1ed244">
|
|
<topic>virtualbox-ose -- local vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>virtualbox-ose</name>
|
|
<range><lt>4.2.22</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Oracle reports:</p>
|
|
<blockquote cite="http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html">
|
|
<p>Unspecified vulnerability in the Oracle VM VirtualBox
|
|
component in Oracle Virtualization VirtualBox prior to
|
|
3.2.20, 4.0.22, 4.1.30, 4.2.22, and 4.3.6 allows local
|
|
users to affect confidentiality, integrity, and availability
|
|
via unknown vectors related to Core.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-5892</cvename>
|
|
<url>http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-01-15</discovery>
|
|
<entry>2014-01-16</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="3d95c9a7-7d5c-11e3-a8c1-206a8a720317">
|
|
<topic>ntpd DRDoS / Amplification Attack using ntpdc monlist command</topic>
|
|
<affects>
|
|
<package>
|
|
<name>ntp</name>
|
|
<range><lt>4.2.7p26</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>8.3</ge><lt>8.3_14</lt></range>
|
|
<range><ge>8.4</ge><lt>8.4_7</lt></range>
|
|
<range><ge>9.1</ge><lt>9.1_10</lt></range>
|
|
<range><ge>9.2</ge><lt>9.2_3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>ntp.org reports:</p>
|
|
<blockquote cite="http://support.ntp.org/bin/view/Main/SecurityNotice#DRDoS_Amplification_Attack_using">
|
|
<p>Unrestricted access to the monlist feature in
|
|
ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote
|
|
attackers to cause a denial of service (traffic
|
|
amplification) via forged (1) REQ_MON_GETLIST or (2)
|
|
REQ_MON_GETLIST_1 requests, as exploited in the wild in
|
|
December 2013</p>
|
|
<p>Use noquery to your default restrictions to block all
|
|
status queries.</p>
|
|
<p>Use disable monitor to disable the ``ntpdc -c monlist''
|
|
command while still allowing other status queries.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-5211</cvename>
|
|
<freebsdsa>SA-14:02.ntpd</freebsdsa>
|
|
<url>http://support.ntp.org/bin/view/Main/SecurityNotice#DRDoS_Amplification_Attack_using</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-01-01</discovery>
|
|
<entry>2014-01-14</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="ba04a373-7d20-11e3-8992-00132034b086">
|
|
<topic>nagios -- denial of service vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>nagios</name>
|
|
<range><lt>3.5.1_3</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>Eric Stanley reports:</p>
|
|
<blockquote cite="http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/">
|
|
<p>Most CGIs previously incremented the input variable counter twice
|
|
when it encountered a long key value. This could cause the CGI to
|
|
read past the end of the list of CGI variables.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-7108</cvename>
|
|
<cvename>CVE-2013-7205</cvename>
|
|
<url>http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/</url>
|
|
<url>https://bugzilla.redhat.com/show_bug.cgi?id=1046113</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-12-20</discovery>
|
|
<entry>2014-01-14</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="cb252f01-7c43-11e3-b0a6-005056a37f68">
|
|
<topic>bind -- denial of service vulnerability</topic>
|
|
<affects>
|
|
<package>
|
|
<name>bind99</name>
|
|
<range><lt>9.9.4.2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>bind99-base</name>
|
|
<range><lt>9.9.4.2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>bind98</name>
|
|
<range><lt>9.8.6.2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>bind98-base</name>
|
|
<range><lt>9.8.6.2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>bind96</name>
|
|
<range><lt>9.6.3.2.ESV.R10.2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>bind96-base</name>
|
|
<range><lt>9.6.3.2.ESV.R10.2</lt></range>
|
|
</package>
|
|
<package>
|
|
<name>FreeBSD</name>
|
|
<range><ge>9.2</ge><lt>9.2_3</lt></range>
|
|
<range><ge>9.1</ge><lt>9.1_10</lt></range>
|
|
<range><ge>8.4</ge><lt>8.4_7</lt></range>
|
|
<range><ge>8.3</ge><lt>8.3_14</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>ISC reports:</p>
|
|
<blockquote cite="https://kb.isc.org/article/AA-01078/74/">
|
|
<p>Because of a defect in handling queries for NSEC3-signed zones,
|
|
BIND can crash with an "INSIST" failure in name.c when processing
|
|
queries possessing certain properties. By exploiting this defect
|
|
an attacker deliberately constructing a query with the right
|
|
properties could achieve denial of service against an authoritative
|
|
nameserver serving NSEC3-signed zones.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2014-0591</cvename>
|
|
<freebsdsa>SA-14:04.bind</freebsdsa>
|
|
<url>https://kb.isc.org/article/AA-01078/74/</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-01-08</discovery>
|
|
<entry>2014-01-13</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="28c575fa-784e-11e3-8249-001cc0380077">
|
|
<topic>libXfont -- Stack buffer overflow in parsing of BDF font files in libXfont</topic>
|
|
<affects>
|
|
<package>
|
|
<name>libXfont</name>
|
|
<range><lt>1.4.7,1</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>freedesktop.org reports:</p>
|
|
<blockquote cite="http://lists.x.org/archives/xorg-announce/2014-January/002389.html">
|
|
<p>A BDF font file containing a longer than expected string can cause
|
|
a buffer overflow on the stack. Testing in X servers built with
|
|
Stack Protector restulted in an immediate crash when reading a
|
|
user-proveded specially crafted font.</p>
|
|
<p>As libXfont is used to read user-specified font files in all X
|
|
servers distributed by X.Org, including the Xorg server which is
|
|
often run with root privileges or as setuid-root in order to access
|
|
hardware, this bug may lead to an unprivileged user acquiring root
|
|
privileges in some systems.</p>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<cvename>CVE-2013-6462</cvename>
|
|
<url>http://lists.x.org/archives/xorg-announce/2014-January/002389.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2013-12-24</discovery>
|
|
<entry>2014-01-08</entry>
|
|
</dates>
|
|
</vuln>
|
|
|
|
<vuln vid="5aaa257e-772d-11e3-a65a-3c970e169bc2">
|
|
<topic>openssl -- multiple vulnerabilities</topic>
|
|
<affects>
|
|
<package>
|
|
<name>openssl</name>
|
|
<range><lt>1.0.1_9</lt></range>
|
|
</package>
|
|
</affects>
|
|
<description>
|
|
<body xmlns="http://www.w3.org/1999/xhtml">
|
|
<p>OpenSSL development team reports:</p>
|
|
<blockquote cite="http://www.openssl.org/news/openssl-1.0.1-notes.html">
|
|
<p>Major changes between OpenSSL 1.0.1e and OpenSSL 1.0.1f [6 Jan 2014]:</p>
|
|
<ul>
|
|
<li>Fix for TLS record tampering bug [CVE-2013-4353]</li>
|
|
<li>Fix for TLS version checking bug [CVE-2013-6449]</li>
|
|
<li>Fix for DTLS retransmission bug [CVE-2013-6450]</li>
|
|
</ul>
|
|
</blockquote>
|
|
</body>
|
|
</description>
|
|
<references>
|
|
<freebsdsa>SA-14:03.openssl</freebsdsa>
|
|
<cvename>CVE-2013-4353</cvename>
|
|
<cvename>CVE-2013-6449</cvename>
|
|
<cvename>CVE-2013-6450</cvename>
|
|
<url>http://www.openssl.org/news/openssl-1.0.1-notes.html</url>
|
|
</references>
|
|
<dates>
|
|
<discovery>2014-01-06</discovery>
|
|
<entry>2014-01-06</entry>
|
|
<modified>2016-08-09</modified>
|
|
</dates>
|
|
</vuln>
|