diff --git a/security/vuxml/vuln/2017.xml b/security/vuxml/vuln/2017.xml index 9e78bc4ba88c..66964ad2a106 100644 --- a/security/vuxml/vuln/2017.xml +++ b/security/vuxml/vuln/2017.xml @@ -1,12791 +1,12791 @@ OTRS -- Multiple vulnerabilities otrs 5.0.26

OTRS reports:

An attacker who is logged into OTRS as an agent can request special URLs from OTRS which can lead to the execution of shell commands with the permissions of the web server user.

An attacker who is logged into OTRS as a customer can use the ticket search form to disclose internal article information of their customer tickets.

An attacker who is logged into OTRS as an agent can manipulate form parameters and execute arbitrary shell commands with the permissions of the OTRS or web server user.

An attacker can send a specially prepared email to an OTRS system. If this system has cookie support disabled, and a logged in agent clicks a link in this email, the session information could be leaked to external systems, allowing the attacker to take over the agent’s session.

CVE-2017-16664 CVE-2017-16854 CVE-2017-16921 ports/224729 https://www.otrs.com/security-advisory-2017-07-security-update-otrs-framework/ https://www.otrs.com/security-advisory-2017-08-security-update-otrs-framework/ https://www.otrs.com/security-advisory-2017-09-security-update-otrs-framework/ https://www.otrs.com/security-advisory-2017-10-security-update-otrs-framework/ 2017-11-21 2017-12-30
The Bouncy Castle Crypto APIs: CVE-2017-13098 ("ROBOT") bouncycastle 1.59 bouncycastle15 1.59

The Legion of the Bouncy Castle reports:

Release: 1.59

CVE-2017-13098 ("ROBOT"), a Bleichenbacher oracle in TLS when RSA key exchange is negotiated. This potentially affected BCJSSE servers and any other TLS servers configured to use JCE for the underlying crypto - note the two TLS implementations using the BC lightweight APIs are not affected by this.

CVE-2017-13098 https://www.bouncycastle.org/releasenotes.html 2017-12-12 2017-12-29
mozilla -- multiple vulnerabilities thunderbird linux-thunderbird 52.5.2

Mozilla Foundation reports:

CVE-2017-7845: Buffer overflow when drawing and validating elements with ANGLE library using Direct 3D 9

CVE-2017-7846: JavaScript Execution via RSS in mailbox:// origin

CVE-2017-7847: Local path string can be leaked from RSS feed

CVE-2017-7848: RSS Feed vulnerable to new line Injection

CVE-2017-7829: Mailsploit part 1: From address with encoded null character is cut off in message header display

CVE-2017-7829 CVE-2017-7845 CVE-2017-7846 CVE-2017-7847 CVE-2017-7848 https://www.mozilla.org/security/advisories/mfsa2017-30/ 2017-12-22 2017-12-25
phpMyAdmin -- XSRF/CSRF vulnerability phpMyAdmin 4.7.04.7.7

The phpMyAdmin team reports:

Description

By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc.

Severity

We consider this vulnerability to be critical.

https://www.phpmyadmin.net/security/PMASA-2017-9/ 2017-12-23 2017-12-23
asterisk -- Crash in PJSIP resource when missing a contact header asterisk13 13.18.5

The Asterisk project reports:

A select set of SIP messages create a dialog in Asterisk. Those SIP messages must contain a contact header. For those messages, if the header was not present and using the PJSIP channel driver, it would cause Asterisk to crash. The severity of this vulnerability is somewhat mitigated if authentication is enabled. If authentication is enabled a user would have to first be authorized before reaching the crash point.

https://downloads.asterisk.org/pub/security/AST-2017-014.html CVE-2017-17850 2017-12-12 2017-12-23
MariaDB -- unspecified vulnerability mariadb101-client 10.1.30 mariadb102-client 10.2.10

The MariaDB project reports:

Fixes for the following security vulnerabilities: CVE-2017-15365

https://mariadb.com/kb/en/library/mariadb-10130-release-notes/ CVE-2017-15365 2017-12-23 2017-12-23
rsync -- multiple vulnerabilities rsync 3.1.23.1.2_7

Jeriko One reports:

The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon.

The recv_files function in receiver.c in the daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, proceeds with certain file metadata updates before checking for a filename in the daemon_filter_list data structure, which allows remote attackers to bypass intended access restrictions.

The daemon in rsync 3.1.2, and 3.1.3-development before 2017-12-03, does not check for fnamecmp filenames in the daemon_filter_list data structure (in the recv_files function in receiver.c) and also does not apply the sanitize_paths protection mechanism to pathnames found in "xname follows" strings (in the read_ndx_and_attrs function in rsync.c), which allows remote attackers to bypass intended access restrictions.

https://www.debian.org/security/2017/dsa-4068 CVE-2017-16548 CVE-2017-17433 CVE-2017-17434 ports/224477 2017-12-17 2017-12-20 2017-12-31
ruby -- Command injection vulnerability in Net::FTP ruby 2.2.0,12.2.9,1 2.3.0,12.3.6,1 2.4.0,12.4.3,1

Etienne Stalmans from the Heroku product security team reports:

There is a command injection vulnerability in Net::FTP bundled with Ruby.

Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the pipe character "|", the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/ CVE-2017-17405 2017-12-14 2017-12-14
rubygem-passenger -- arbitrary file read vulnerability rubygem-passenger 5.0.105.1.11

Phusion reports:

The cPanel Security Team discovered a vulnerability in Passenger that allows users to list the contents of arbitrary files on the system. CVE-2017-16355 has been assigned to this issue.

https://blog.phusion.nl/2017/10/13/passenger-security-advisory-5-1-11/ CVE-2017-16355 2017-10-13 2017-12-18
libXfont -- permission bypass when opening files through symlinks libXfont 1.5.4 libXfont2 2.0.3

the freedesktop.org project reports:

A non-privileged X client can instruct X server running under root to open any file by creating own directory with "fonts.dir", "fonts.alias" or any font file being a symbolic link to any other file in the system. X server will then open it. This can be issue with special files such as /dev/watchdog.

https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=7b377456f95d2ec3ead40f4fb74ea620191f88c8 CVE-2017-16611 2017-11-25 2017-12-17
libXfont -- multiple memory leaks libXfont 1.5.3 libXfont2 2.0.2

The freedesktop.org project reports:

If a pattern contains '?' character, any character in the string is skipped, even if it is '\0'. The rest of the matching then reads invalid memory.

Without the checks a malformed PCF file can cause the library to make atom from random heap memory that was behind the `strings` buffer. This may crash the process or leak information.

https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=d1e670a4a8704b8708e493ab6155589bcd570608 https://cgit.freedesktop.org/xorg/lib/libXfont/commit/?id=672bb944311392e2415b39c0d63b1e1902905bcd CVE-2017-13720 CVE-2017-13722 2017-10-04 2017-12-17
libXcursor -- integer overflow that can lead to heap buffer overflow libXcursor 1.1.15

The freedesktop.org project reports:

It is possible to trigger heap overflows due to an integer overflow while parsing images and a signedness issue while parsing comments.

The integer overflow occurs because the chosen limit 0x10000 for dimensions is too large for 32 bit systems, because each pixel takes 4 bytes. Properly chosen values allow an overflow which in turn will lead to less allocated memory than needed for subsequent reads.

The signedness bug is triggered by reading the length of a comment as unsigned int, but casting it to int when calling the function XcursorCommentCreate. Turning length into a negative value allows the check against XCURSOR_COMMENT_MAX_LEN to pass, and the following addition of sizeof (XcursorComment) + 1 makes it possible to allocate less memory than needed for subsequent reads.

http://seclists.org/oss-sec/2017/q4/339 https://cgit.freedesktop.org/xorg/lib/libXcursor/commit/?id=4794b5dd34688158fb51a2943032569d3780c4b8 CVE-2017-16612 2017-11-28 2017-12-17
global -- gozilla vulnerability global 4.8.66.6.1

MITRE reports:

gozilla.c in GNU GLOBAL 4.8.6 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17531 http://lists.gnu.org/archive/html/info-global/2017-12/msg00001.html CVE-2017-17531 2017-12-11 2017-12-16
jenkins -- Two startup race conditions jenkins 2.95 jenkins-lts 2.89.2

The Jenkins project reports:

A race condition during Jenkins startup could result in the wrong order of execution of commands during initialization.

On Jenkins 2.81 and newer, including LTS 2.89.1, this could in rare cases (we estimate less than 20% of new instances) result in failure to initialize the setup wizard on the first startup.

There is a very short window of time after startup during which Jenkins may no longer show the "Please wait while Jenkins is getting ready to work" message, but Cross-Site Request Forgery (CSRF) protection may not yet be effective.

https://jenkins.io/security/advisory/2017-12-14/ 2017-12-14 2017-12-15
node.js -- Data Confidentiality/Integrity Vulnerability, December 2017 node4 4.8.7 node6 6.12.2 node8 8.9.3 node 9.2.1

Node.js reports:

Data Confidentiality/Integrity Vulnerability - CVE-2017-15896

Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards to the use of SSL_read() due to TLS handshake failure. The result was that an active network attacker could send application data to Node.js using the TLS or HTTP2 modules in a way that bypassed TLS authentication and encryption.

Uninitialized buffer vulnerability - CVE-2017-15897

Node.js had a bug in versions 8.X and 9.X which caused buffers to not be initialized when the encoding for the fill value did not match the encoding specified. For example, 'Buffer.alloc(0x100, "This is not correctly encoded", "hex");' The buffer implementation was updated such that the buffer will be initialized to all zeros in these cases.

Also included in OpenSSL update - CVE 2017-3738

Note that CVE 2017-3738 of OpenSSL-1.0.2 affected Node but it was low severity.

https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/ CVE-2017-15896 CVE-2017-15897 CVE-2017-3738 2017-12-08 2017-12-14
GitLab -- multiple vulnerabilities gitlab 4.2.010.0.6 10.1.010.1.4 10.2.010.2.3

GitLab reports:

User without access to private Wiki can see it on the project page

Matthias Burtscher reported that it was possible for a user to see a private Wiki on the project page without having the corresponding permission.

E-mail address disclosure through member search fields

Hugo Geoffroy reported via HackerOne that it was possible to find out the full e-mail address of any user by brute-forcing the member search field.

Groups API leaks private projects

An internal code review discovered that users were able to list private projects they had no access to by using the Groups API.

Cross-Site Scripting (XSS) possible by editing a comment

Sylvain Heiniger reported via HackerOne that it was possible for arbitrary JavaScript code to be executed when editing a comment.

Issue API allows any user to create a new issue even when issues are restricted or disabled

Mohammad Hasbini reported that any user could create a new issues in a project even when issues were disabled or restricted to team members in the project settings.

https://about.gitlab.com/2017/12/08/gitlab-10-dot-2-dot-4-security-release/ 2017-12-08 2017-12-14
tor -- Use-after-free in onion service v2 tor 0.3.1.9

The Torproject.org reports:

  • TROVE-2017-009: Replay-cache ineffective for v2 onion services
  • TROVE-2017-010: Remote DoS attack against directory authorities
  • TROVE-2017-011: An attacker can make Tor ask for a password
  • TROVE-2017-012: Relays can pick themselves in a circuit path
  • TROVE-2017-013: Use-after-free in onion service v2
https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516 CVE-2017-8819 2017-12-01 2017-12-14
asterisk -- Remote Crash Vulnerability in RTCP Stack asterisk13 13.18.4

The Asterisk project reports:

If a compound RTCP packet is received containing more than one report (for example a Receiver Report and a Sender Report) the RTCP stack will incorrectly store report information outside of allocated memory potentially causing a crash.

https://downloads.asterisk.org/pub/security/AST-2017-012.html 2017-12-12 2017-12-13
libxml2 -- Multiple Issues libxml2 2.9.4

libxml2 developers report:

The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure.

A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.

https://bugzilla.gnome.org/show_bug.cgi?id=775200 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98599 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98556 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98601 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98568 CVE-2017-8872 CVE-2017-9047 CVE-2017-9048 CVE-2017-9049 CVE-2017-9050 2017-05-10 2017-12-13
FreeBSD -- OpenSSL multiple vulnerabilities FreeBSD 11.111.1_6 10.410.4_5 10.310.3_26

Problem Description:

Invoking SSL_read()/SSL_write() while in an error state causes data to be passed without being decrypted/encrypted directly from the SSL/TLS record layer.

In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. [CVE-2017-3737]

There is an overflow bug in the x86_64 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). [CVE-2017-3738] This bug only affects FreeBSD 11.x.

Impact:

Applications with incorrect error handling may inappropriately pass unencrypted data. [CVE-2017-3737]

Mishandling of carry propagation will produce incorrect output, and make it easier for a remote attacker to obtain sensitive private-key information. No EC algorithms are affected and analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely.

Attacks against DH1024 are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. [CVE-2017-3738]

CVE-2016-0701 CVE-2017-3737 CVE-2017-3738 SA-17:12.openssl 2017-12-09 2017-12-10
wireshark -- multiple security issues wireshark 2.2.02.2.10 2.4.02.4.2 wireshark-lite 2.2.02.2.10 2.4.02.4.2 wireshark-qt5 2.2.02.2.10 2.4.02.4.2 tshark 2.2.02.2.10 2.4.02.4.2 tshark-lite 2.2.02.2.10 2.4.02.4.2

wireshark developers reports:

wnpa-sec-2017-47: The IWARP_MPA dissector could crash. (CVE-2017-17084)

wnpa-sec-2017-48: The NetBIOS dissector could crash. Discovered by Kamil Frankowicz. (CVE-2017-17083)

wnpa-sec-2017-49: The CIP Safety dissector could crash. (CVE-2017-17085)

https://www.wireshark.org/security/ https://www.wireshark.org/security/wnpa-sec-2017-47.html https://www.wireshark.org/security/wnpa-sec-2017-48.html https://www.wireshark.org/security/wnpa-sec-2017-49.html CVE-2017-17083 CVE-2017-17084 CVE-2017-17085 2017-11-30 2017-12-10
OpenSSL -- multiple vulnerabilities openssl 1.0.21.0.2n

The OpenSSL project reports:

  • Read/write after SSL object in error state (CVE-2017-3737)
    OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer.
  • rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
    There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701.
https://www.openssl.org/news/secadv/20171207.txt CVE-2017-3737 CVE-2017-3738 2017-12-07 2017-12-07
FreeBSD -- OpenSSL multiple vulnerabilities FreeBSD 11.111.1_5 11.011.0_16 10.410.4_4 10.310.3_25

Problem Description:

If an X.509 certificate has a malformed IPAddressFamily extension, OpenSSL could do a one-byte buffer overread. [CVE-2017-3735]

There is a carry propagating bug in the x86_64 Montgomery squaring procedure. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen. [CVE-2017-3736] This bug only affects FreeBSD 11.x.

Impact:

Application using OpenSSL may display erroneous certificate in text format. [CVE-2017-3735]

Mishandling of carry propagation will produce incorrect output, and make it easier for a remote attacker to obtain sensitive private-key information. No EC algorithms are affected, analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely.

Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. [CVE-2017-3736]

CVE-2017-3735 CVE-2017-3736 SA-17:11.openssl 2017-11-29 2017-12-06
FreeBSD -- Information leak in kldstat(2) FreeBSD-kernel 11.111.1_4 11.011.0_15 10.410.4_3 10.310.3_24

Problem Description:

The kernel does not properly clear the memory of the kld_file_stat structure before filling the data. Since the structure filled by the kernel is allocated on the kernel stack and copied to userspace, a leak of information from the kernel stack is possible.

Impact:

Some bytes from the kernel stack can be observed in userspace.

CVE-2017-1088 SA-17:10.kldstat 2017-11-15 2017-12-06
FreeBSD -- POSIX shm allows jails to access global namespace FreeBSD-kernel 10.410.4_3 10.310.3_24

Problem Description:

Named paths are globally scoped, meaning a process located in one jail can read and modify the content of POSIX shared memory objects created by a process in another jail or the host system.

Impact:

A malicious user that has access to a jailed system is able to abuse shared memory by injecting malicious content in the shared memory region. This memory region might be executed by applications trusting the shared memory, like Squid.

This issue could lead to a Denial of Service or local privilege escalation.

CVE-2017-1087 SA-17:09.shm 2017-11-15 2017-12-06
FreeBSD -- Kernel data leak via ptrace(PT_LWPINFO) FreeBSD-kernel 11.111.1_4 11.011.0_15 10.410.4_3 10.310.3_24

Problem Description:

Not all information in the struct ptrace_lwpinfo is relevant for the state of any thread, and the kernel does not fill the irrelevant bytes or short strings. Since the structure filled by the kernel is allocated on the kernel stack and copied to userspace, a leak of information of the kernel stack of the thread is possible from the debugger.

Impact:

Some bytes from the kernel stack of the thread using ptrace(PT_LWPINFO) call can be observed in userspace.

CVE-2017-1086 SA-17:08.ptrace 2017-11-15 2017-12-06
FreeBSD -- WPA2 protocol vulnerability FreeBSD 11.111.1_2 11.011.0_13 10.410.4_1 10.310.3_22

Problem Description:

A vulnerability was found in how a number of implementations can be triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by replaying a specific frame that is used to manage the keys.

Impact:

Such reinstallation of the encryption key can result in two different types of vulnerabilities: disabling replay protection and significantly reducing the security of encryption to the point of allowing frames to be decrypted or some parts of the keys to be determined by an attacker depending on which cipher is used.

CVE-2017-1307 CVE-2017-1308 SA-17:07.wpa 2017-10-16 2017-12-06
mozilla -- multiple vulnerabilities firefox 57.0,157.0.1,1 56.0.2_11,1 waterfox 56.0.s20171130 seamonkey linux-seamonkey 2.49.2 firefox-esr 52.5.1,1 linux-firefox 52.5.1,2

Mozilla Foundation reports:

CVE-2017-7843: Web worker in Private Browsing mode can write IndexedDB data

CVE-2017-7844: Visited history information leak through SVG image

CVE-2017-7843 CVE-2017-7844 https://www.mozilla.org/security/advisories/mfsa2017-27/ 2017-11-29 2017-12-05
varnish -- information disclosure vulnerability varnish4 4.1.9 varnish5 5.2.1

Varnish reports:

A wrong if statement in the varnishd source code means that synthetic objects in stevedores which over-allocate, may leak up to page size of data from a malloc(3) memory allocation.

https://varnish-cache.org/security/VSV00002.html CVE-2017-8807 2017-11-15 2017-12-02
mybb -- multiple vulnerabilities mybb 1.8.14

mybb Team reports:

High risk: Language file headers RCE

Low risk: Language Pack Properties XSS

https://blog.mybb.com/2017/11/28/mybb-1-8-14-released-security-maintenance-release/ 2017-11-27 2017-12-02
wordpress -- multiple issues wordpress fr-wordpress 4.9.1,1 de-wordpress ja-wordpress ru-wordpress zh-wordpress-zh_CN zh-wordpress-zh_TW 4.9.1

wordpress developers reports:

Use a properly generated hash for the newbloguser key instead of a determinate substring.

Add escaping to the language attributes used on html elements.

Ensure the attributes of enclosures are correctly escaped in RSS and Atom feeds.

Remove the ability to upload JavaScript files for users who do not have the unfiltered_html capability.

https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/ 2017-11-29 2017-12-01
asterisk -- DOS Vulnerability in Asterisk chan_skinny asterisk13 13.18.3

The Asterisk project reports:

If the chan_skinny (AKA SCCP protocol) channel driver is flooded with certain requests it can cause the asterisk process to use excessive amounts of virtual memory eventually causing asterisk to stop processing requests of any kind.

https://downloads.asterisk.org/pub/security/AST-2017-013.html CVE-2017-17090 2017-11-30 2017-12-01 2017-12-13
exim -- remote DoS attack in BDAT processing exim 4.884.89.1

Exim developers team reports:

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function.

https://bugs.exim.org/show_bug.cgi?id=2199 CVE-2017-16944 2017-11-23 2017-11-30
xrdp -- local user can cause a denial of service xrdp-devel 0.9.3,1 0.9.3_1,10.9.4,1

xrdp reports:

The scp_v0s_accept function in the session manager uses an untrusted integer as a write length, which allows local users to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted input stream.

CVE-2017-16927 2017-11-23 2017-11-29
cURL -- Multiple vulnerabilities curl 7.21.07.57.0 linux-c7-curl 7.21.07.29.0_4

The cURL project reports:

  • NTLM buffer overflow via integer overflow (CVE-2017-8816)
    libcurl contains a buffer overrun flaw in the NTLM authentication code. The internal function Curl_ntlm_core_mk_ntlmv2_hash sums up the lengths of the user name + password (= SUM) and multiplies the sum by two (= SIZE) to figure out how large storage to allocate from the heap.
  • FTP wildcard out of bounds read (CVE-2017-8817)
    libcurl contains a read out of bounds flaw in the FTP wildcard function. libcurl's FTP wildcard matching feature, which is enabled with the CURLOPT_WILDCARDMATCH option can use a built-in wildcard function or a user provided one. The built-in wildcard function has a flaw that makes it not detect the end of the pattern string if it ends with an open bracket ([) but instead it will continue reading the heap beyond the end of the URL buffer that holds the wildcard.
  • SSL out of buffer access (CVE-2017-8818)
    libcurl contains an out boundary access flaw in SSL related code. When allocating memory for a connection (the internal struct called connectdata), a certain amount of memory is allocated at the end of the struct to be used for SSL related structs. Those structs are used by the particular SSL library libcurl is built to use. The application can also tell libcurl which specific SSL library to use if it was built to support more than one.
https://curl.haxx.se/changes.html CVE-2017-8816 CVE-2017-8817 CVE-2017-8818 2017-11-29 2017-11-29 2017-12-11
borgbackup -- remote users can override repository restrictions py34-borgbackup py35-borgbackup py36-borgbackup 1.1.01.1.3

BorgBackup reports:

Incorrect implementation of access controls allows remote users to override repository restrictions in Borg servers. A user able to access a remote Borg SSH server is able to circumvent access controls post-authentication. Affected releases: 1.1.0, 1.1.1, 1.1.2. Releases 1.0.x are NOT affected.

CVE-2017-15914 https://github.com/borgbackup/borg/blob/1.1.3/docs/changes.rst#version-113-2017-11-27 2017-11-27 2017-11-29
palemoon -- multiple vulnerabilities palemoon 27.6.2

Pale Moon reports:

CVE-2017-7832: Domain spoofing through use of dotless 'i' character followed by accent markers

CVE-2017-7835: Mixed content blocking incorrectly applies with redirects

CVE-2017-7840: Exported bookmarks do not strip script elements from user-supplied tags

CVE-2017-7832 CVE-2017-7835 CVE-2017-7840 2017-11-14 2017-11-28
exim -- remote code execution, deny of service in BDAT exim 4.884.89_2

Exim team reports:

The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.

https://bugs.exim.org/show_bug.cgi?id=2199 2017-11-23 2017-11-27
mybb -- multiple vulnerabilities mybb 1.8.13

myBB Team reports:

High risk: Installer RCE on configuration file write

High risk: Language file headers RCE

Medium risk: Installer XSS

Medium risk: Mod CP Edit Profile XSS

Low risk: Insufficient moderator permission check in delayed moderation tools

Low risk: Announcements HTML filter bypass

Low risk: Language Pack Properties XSS.

https://blog.mybb.com/2017/11/07/mybb-1-8-13-released-security-maintenance-release/ 2017-11-07 2017-11-24
salt -- multiple vulnerabilities py27-salt py32-salt py33-salt py34-salt py35-salt py36-salt 2016.11.8 2017.7.02017.7.2

SaltStack reports:

Directory traversal vulnerability in minion id validation in SaltStack. Allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID. Credit for discovering the security flaw goes to: Julian Brost (julian@0x4a42.net). NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791.

Remote Denial of Service with a specially crafted authentication request. Credit for discovering the security flaw goes to: Julian Brost (julian@0x4a42.net)

CVE-2017-14695 CVE-2017-14696 https://docs.saltstack.com/en/latest/topics/releases/2017.7.2.html https://docs.saltstack.com/en/2016.11/topics/releases/2016.11.8.html https://github.com/saltstack/salt/commit/80d90307b07b3703428ecbb7c8bb468e28a9ae6d https://github.com/saltstack/salt/commit/5f8b5e1a0f23fe0f2be5b3c3e04199b57a53db5b 2017-10-09 2017-11-23
codeigniter -- input validation bypass codeigniter 3.1.6

The CodeIgniter changelog reports:

Security: Fixed a potential object injection in Cache Library 'apc' driver when save() is used with $raw = TRUE.

https://www.codeigniter.com/user_guide/changelog.html 2017-09-25 2017-11-23
procmail -- Heap-based buffer overflow procmail 3.22_10

MITRE reports:

A remote attacker could use a flaw to cause formail to crash, resulting in a denial of service or data loss.

CVE-2017-16844 https://www.debian.org/security/2017/dsa-4041 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876511 2017-11-16 2017-11-21 2017-12-08
frr -- BGP Mishandled attribute length on Error frr 3.0.2

FRR reports:

BGP Mishandled attribute length on Error

A vulnerability exists in the BGP daemon of FRR where a malformed BGP UPDATE packet can leak information from the BGP daemon and cause a denial of service by crashing the daemon.

CVE-2017-15865 https://frrouting.org/community/security/cve-2017-15865.html 2017-11-08 2017-11-21
cacti -- multiple vulnerabilities cacti 1.1.28

cacti reports:

Changelog

issue#1057: CVE-2017-16641 - Potential vulnerability in RRDtool functions

issue#1066: CVE-2017-16660 in remote_agent.php logging function

issue#1066: CVE-2017-16661 in view log file

issue#1071: CVE-2017-16785 in global_session.php Reflection XSS

CVE-2017-16641 CVE-2017-16660 CVE-2017-16661 CVE-2017-16785 https://sourceforge.net/p/cacti/mailman/message/36122745/ 2017-11-01 2017-11-20
mediawiki -- multiple vulnerabilities mediawiki127 1.27.3 mediawiki128 1.28.2 mediawiki129 1.29.1

mediawiki reports:

security fixes:

T128209: Reflected File Download from api.php. Reported by Abdullah Hussam.

T165846: BotPasswords doesn't throttle login attempts.

T134100: On private wikis, login form shouldn't distinguish between login failure due to bad username and bad password.

T178451: XSS when $wgShowExceptionDetails = false and browser sends non-standard url escaping.

T176247: It's possible to mangle HTML via raw message parameter expansion.

T125163: id attribute on headlines allow raw.

T124404: language converter can be tricked into replacing text inside tags by adding a lot of junk after the rule definition.

T119158: Language converter: unsafe attribute injection via glossary rules.

T180488: api.log contains passwords in plaintext wasn't correctly fixed.

T180231: composer.json has require-dev versions of PHPUnit with known security issues. Reported by Tom Hutchison.

CVE-2017-8808 CVE-2017-8809 CVE-2017-8810 CVE-2017-8811 CVE-2017-8812 CVE-2017-8814 CVE-2017-8815 CVE-2017-0361 CVE-2017-9841 https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html 2017-11-14 2017-11-19
Flash Player -- multiple vulnerabilities linux-flashplayer 27.0.0.187

Adobe reports:

  • These updates resolve out-of-bounds read vulnerabilities that could lead to remote code execution (CVE-2017-3112, CVE-2017-3114, CVE-2017-11213).
  • These updates resolve use after free vulnerabilities that could lead to remote code execution (CVE-2017-11215, CVE-2017-11225).
CVE-2017-3112 CVE-2017-3114 CVE-2017-11213 CVE-2017-11215 CVE-2017-11225 https://helpx.adobe.com/security/products/flash-player/apsb17-33.html 2017-11-14 2017-11-16
shibboleth2-sp -- "Dynamic" metadata provider plugin issue shibboleth2-sp 2.6.1

The Internet2 community reports:

The Shibboleth Service Provider software includes a MetadataProvider plugin with the plugin type "Dynamic" to obtain metadata on demand from a query server, in place of the more typical mode of downloading aggregates separately containing all of the metadata to load.

All the plugin types rely on MetadataFilter plugins to perform critical security checks such as signature verification, enforcement of validity periods, and other checks specific to deployments.

Due to a coding error, the "Dynamic" plugin fails to configure itself with the filters provided to it and thus omits whatever checks they are intended to perform, which will typically leave deployments vulnerable to active attacks involving the substitution of metadata if the network path to the query service is compromised.

http://shibboleth.internet2.edu/secadv/secadv_20171115.txt 2017-11-15 2017-11-15
mozilla -- multiple vulnerabilities firefox 56.0.2_10,1 seamonkey linux-seamonkey 2.49.2 firefox-esr 52.5.0,1 linux-firefox 52.5.0,2 libxul thunderbird linux-thunderbird 52.5.0

Mozilla Foundation reports:

CVE-2017-7828: Use-after-free of PressShell while restyling layout

CVE-2017-7830: Cross-origin URL information leak through Resource Timing API

CVE-2017-7831: Information disclosure of exposed properties on JavaScript proxy objects

CVE-2017-7832: Domain spoofing through use of dotless 'i' character followed by accent markers

CVE-2017-7833: Domain spoofing with Arabic and Indic vowel marker characters

CVE-2017-7834: data: URLs opened in new tabs bypass CSP protections

CVE-2017-7835: Mixed content blocking incorrectly applies with redirects

CVE-2017-7836: Pingsender dynamically loads libcurl on Linux and OS X

CVE-2017-7837: SVG loaded as <img> can use meta tags to set cookies

CVE-2017-7838: Failure of individual decoding of labels in international domain names triggers punycode display of entire IDN

CVE-2017-7839: Control characters before javascript: URLs defeats self-XSS prevention mechanism

CVE-2017-7840: Exported bookmarks do not strip script elements from user-supplied tags

CVE-2017-7842: Referrer Policy is not always respected for <link> elements

CVE-2017-7827: Memory safety bugs fixed in Firefox 57

CVE-2017-7826: Memory safety bugs fixed in Firefox 57 and Firefox ESR 52.5

CVE-2017-7826 CVE-2017-7827 CVE-2017-7828 CVE-2017-7830 CVE-2017-7831 CVE-2017-7832 CVE-2017-7833 CVE-2017-7834 CVE-2017-7835 CVE-2017-7836 CVE-2017-7837 CVE-2017-7838 CVE-2017-7839 CVE-2017-7840 CVE-2017-7842 https://www.mozilla.org/security/advisories/mfsa2017-24/ https://www.mozilla.org/security/advisories/mfsa2017-25/ 2017-11-14 2017-11-14
rubygem-geminabox -- XSS vulnerabilities rubygem-geminabox 0.13.10

NVD reports:

Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the "homepage" value of a ".gemspec" file, related to views/gem.erb and views/index.erb.

https://nvd.nist.gov/vuln/detail/CVE-2017-16792 CVE-2017-16792 2017-11-13 2017-11-13
konversation -- crash in IRC message parsing konversation 1.7.3

KDE reports:

Konversation has support for colors in IRC messages. Any malicious user connected to the same IRC network can send a carefully crafted message that will crash the Konversation user client.

CVE-2017-15923 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15923 https://www.kde.org/info/security/advisory-20171112-1.txt 2017-10-27 2017-11-12
roundcube -- file disclosure vulnerability roundcube 1.3.3,1

MITRE reports:

Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session.

https://github.com/roundcube/roundcubemail/issues/6026 https://roundcube.net/news/2017/11/08/security-updates-1.3.3-1.2.7-and-1.1.10 CVE-2017-16651 ports/223557 2017-11-06 2017-11-11 2017-12-31
chromium -- multiple vulnerabilities chromium 62.0.3202.89

Google Chrome Releases reports:

2 security fixes in this release, including:

  • [777728] Critical CVE-2017-15398: Stack buffer overflow in QUIC. Reported by Ned Williamson on 2017-10-24
  • [776677] High CVE-2017-15399: Use after free in V8. Reported by Zhao Qixun of Qihoo 360 Vulcan Team on 2017-10-20
CVE-2017-15398 CVE-2017-15399 https://chromereleases.googleblog.com/2017/11/stable-channel-update-for-desktop.html 2017-11-06 2017-11-10
PostgreSQL vulnerabilities postgresql92-server 9.2.09.2.24 postgresql93-server 9.3.09.3.20 postgresql94-server 9.4.09.4.15 postgresql95-server 9.5.09.5.10 postgresql96-server 9.6.09.6.6 postgresql10-server 10.010.1

The PostgreSQL project reports:

  • CVE-2017-15098: Memory disclosure in JSON functions
  • CVE-2017-15099: INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privileges
CVE-2017-15099 CVE-2017-15098 2017-10-10 2017-11-09
jenkins -- multiple issues jenkins 2.89 jenkins-lts 2.73.3

Jenkins developers report:

Jenkins stores metadata related to people, which encompasses actual user accounts, as well as users appearing in SCM, in directories corresponding to the user ID on disk. These directories used the user ID for their name without additional escaping. This potentially resulted in a number of problems.

Autocompletion suggestions for text fields were not escaped, resulting in a persisted cross-site scripting vulnerability if the source for the suggestions allowed specifying text that includes HTML metacharacters like less-than and greater-than characters.

https://jenkins.io/security/advisory/2017-11-08/ 2017-11-08 2017-11-09
asterisk -- Memory/File Descriptor/RTP leak in pjsip session resource asterisk13 13.5.013.18.1

The Asterisk project reports:

A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. This then leads to file descriptors and RTP ports being leaked as well.

https://downloads.asterisk.org/pub/security/AST-2017-011.html CVE-2017-16672 2017-10-15 2017-11-09 2017-12-13
asterisk -- Buffer overflow in CDR's set user asterisk13 13.18.1

The Asterisk project reports:

No size checking is done when setting the user field for Party B on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. The earlier AST-2017-001 advisory for the CDR user field overflow was for the Party A buffer.

https://downloads.asterisk.org/pub/security/AST-2017-010.html CVE-2017-16671 2017-10-09 2017-11-09 2017-12-13
asterisk -- Buffer overflow in pjproject header parsing can cause crash in Asterisk asterisk13 13.18.1 pjsip 2.7.1 pjsip-extsrtp 2.7.1

The Asterisk project reports:

By carefully crafting invalid values in the Cseq and the Via header port, pjprojects packet parsing code can create strings larger than the buffer allocated to hold them. This will usually cause Asterisk to crash immediately. The packets do not have to be authenticated.

https://downloads.asterisk.org/pub/security/AST-2017-009.html 2017-10-05 2017-11-09 2017-11-15
OpenSSL -- Multiple vulnerabilities openssl 1.0.2m,1 openssl-devel 1.1.0g

The OpenSSL project reports:

bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)
Severity: Moderate
There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline.

Malformed X.509 IPAddressFamily could cause OOB read (CVE-2017-3735)
Severity: Low
This issue was previously announced in security advisory https://www.openssl.org/news/secadv/20170828.txt, but the fix has not previously been included in a release due to its low severity.

https://www.openssl.org/news/secadv/20171102.txt CVE-2017-3735 CVE-2017-3736 2017-11-02 2017-11-02
wordpress -- multiple issues wordpress 4.8.3,1

wordpress developers reports:

WordPress versions 4.8.2 and earlier are affected by an issue where $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection (SQLi). WordPress core is not directly vulnerable to this issue, but we've added hardening to prevent plugins and themes from accidentally causing a vulnerability.

https://wordpress.org/news/2017/10/wordpress-4-8-3-security-release/ 2017-10-31 2017-11-01
wireshark -- multiple security issues wireshark 2.2.02.2.9 2.4.02.4.1

wireshark developers reports:

In Wireshark 2.4.0 to 2.4.1, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by adding decrements.

In Wireshark 2.4.0 to 2.4.1, the RTSP dissector could crash. This was addressed in epan/dissectors/packet-rtsp.c by correcting the scope of a variable.

In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length.

In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level.

In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the MBIM dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-mbim.c by changing the memory-allocation approach.

http://www.securityfocus.com/bid/101227 http://www.securityfocus.com/bid/101228 http://www.securityfocus.com/bid/101229 http://www.securityfocus.com/bid/101235 http://www.securityfocus.com/bid/101240 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14049 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14056 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14068 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14077 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14080 https://code.wireshark.org/review/23470 https://code.wireshark.org/review/23537 https://code.wireshark.org/review/23591 https://code.wireshark.org/review/23635 https://code.wireshark.org/review/23663 https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=3689dc1db36037436b1616715f9a3f888fc9a0f6 https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=625bab309d9dd21db2d8ae2aa3511810d32842a8 https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=8dbb21dfde14221dab09b6b9c7719b9067c1f06e https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=afb9ff7982971aba6e42472de0db4c1bedfc641b https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=e27870eaa6efa1c2dac08aa41a67fe9f0839e6e0 https://www.wireshark.org/security/wnpa-sec-2017-42.html https://www.wireshark.org/security/wnpa-sec-2017-43.html https://www.wireshark.org/security/wnpa-sec-2017-44.html https://www.wireshark.org/security/wnpa-sec-2017-45.html https://www.wireshark.org/security/wnpa-sec-2017-46.html CVE-2017-15189 CVE-2017-15190 CVE-2017-15191 CVE-2017-15192 CVE-2017-15193 2017-10-10 2017-10-30
PHP -- denial of service attack php56 5.6.32 php70 7.0.25 php71 7.1.11

The PHP project reports:

The PHP development team announces the immediate availability of PHP 5.6.32. This is a security release. Several security bugs were fixed in this release. All PHP 5.6 users are encouraged to upgrade to this version.

The PHP development team announces the immediate availability of PHP 7.0.25. This is a security release. Several security bugs were fixed in this release. All PHP 7.0 users are encouraged to upgrade to this version.

The PHP development team announces the immediate availability of PHP 7.1.11. This is a bugfix release, with several bug fixes included. All PHP 7.1 users are encouraged to upgrade to this version.

http://php.net/archive/2017.php#id2017-10-26-3 http://php.net/archive/2017.php#id2017-10-26-1 http://php.net/archive/2017.php#id2017-10-27-1 CVE-2016-1283 2017-10-26 2017-10-30 2017-11-14
chromium -- Stack overflow in V8 chromium 62.0.3202.75

Google Chrome Releases reports:

2 security fixes in this release, including:

  • [770452] High CVE-2017-15396: Stack overflow in V8. Reported by Yuan Deng of Ant-financial Light-Year Security Lab on 2017-09-30
  • [770450] Medium CVE-2017-15406: Stack overflow in V8. Reported by Yuan Deng of Ant-financial Light-Year Security Lab on 2017-09-30
CVE-2017-15396 CVE-2017-15406 https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop_26.html 2017-10-26 2017-10-28 2018-01-23
wget -- Heap overflow in HTTP protocol handling wget 1.19.2

Antti Levomäki, Christian Jalio, Joonas Pihlaja:

Wget contains two vulnerabilities, a stack overflow and a heap overflow, in the handling of HTTP chunked encoding. By convincing a user to download a specific link over HTTP, an attacker may be able to execute arbitrary code with the privileges of the user.

http://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba CVE-2017-13090 2017-10-20 2017-10-27
wget -- Stack overflow in HTTP protocol handling wget 1.19.2

Antti Levomäki, Christian Jalio, Joonas Pihlaja:

Wget contains two vulnerabilities, a stack overflow and a heap overflow, in the handling of HTTP chunked encoding. By convincing a user to download a specific link over HTTP, an attacker may be able to execute arbitrary code with the privileges of the user.

http://git.savannah.gnu.org/cgit/wget.git/commit/?id=d892291fb8ace4c3b734ea5125770989c215df3f CVE-2017-13089 2017-10-20 2017-10-27
Node.js -- remote DOS security vulnerability node 8.8.0 node6 6.10.26.11.5 node4 4.8.24.8.5

Node.js reports:

Node.js was susceptible to a remote DoS attack due to a change that came in as part of zlib v1.2.9. In zlib v1.2.9 8 became an invalid value for the windowBits parameter and Node's zlib module will crash or throw an exception (depending on the version)

https://nodejs.org/en/blog/vulnerability/oct-2017-dos/ CVE-2017-14919 2017-10-17 2017-10-25
GitLab -- multiple vulnerabilities gitlab 2.8.09.4.6 9.5.09.5.8 10.0.010.0.3

GitLab reports:

Cross-Site Scripting (XSS) vulnerability in the Markdown sanitization filter

Yasin Soliman via HackerOne reported a Cross-Site Scripting (XSS) vulnerability in the GitLab markdown sanitization filter. The sanitization filter was not properly stripping invalid characters from URL schemes and was therefore vulnerable to persistent XSS attacks anywhere Markdown was supported.

Cross-Site Scripting (XSS) vulnerability in search bar

Josh Unger reported a Cross-Site Scripting (XSS) vulnerability in the issue search bar. Usernames were not being properly HTML escaped inside the author filter would could allow arbitrary script execution.

Open redirect in repository git redirects

Eric Rafaloff via HackerOne reported that GitLab was vulnerable to an open redirect vulnerability when redirecting requests for repository names that include the git extension. GitLab was not properly removing dangerous parameters from the params field before redirecting which could allow an attacker to redirect users to arbitrary hosts.

Username changes could leave repositories behind

An internal code review discovered that a bug in the code that moves repositories during a username change could potentially leave behind projects, allowing an attacker who knows the previous username to potentially steal the contents of repositories on instances that are not configured with hashed namespaces.

https://about.gitlab.com/2017/10/17/gitlab-10-dot-0-dot-4-security-release/ 2017-10-17 2017-10-25
Apache OpenOffice -- multiple vulnerabilities apache-openoffice 4.1.4 apache-openoffice-devel 4.2.1810071_1,4

The Apache Openofffice project reports:

CVE-2017-3157: Arbitrary file disclosure in Calc and Writer

By exploiting the way OpenOffice renders embedded objects, an attacker could craft a document that allows reading in a file from the user's filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to sent the document back to the attacker.

The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back.

CVE-2017-9806: Out-of-Bounds Write in Writer's WW8Fonts Constructor

A vulnerability in the OpenOffice Writer DOC file parser, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.

CVE-2017-12607: Out-of-Bounds Write in Impress' PPT Filter

A vulnerability in OpenOffice's PPT file parser, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.

CVE-2017-12608: Out-of-Bounds Write in Writer's ImportOldFormatStyles

A vulnerability in OpenOffice Writer DOC file parser, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.

https://www.openoffice.org/security/cves/CVE-2017-3157.html https://www.openoffice.org/security/cves/CVE-2017-9806.html https://www.openoffice.org/security/cves/CVE-2017-12607.html https://www.openoffice.org/security/cves/CVE-2017-12608.html CVE-2017-3157 CVE-2017-9806 CVE-2017-12607 CVE-2017-12608 2016-09-11 2017-10-24 2017-10-26
cURL -- out of bounds read curl 7.207.56.1

The cURL project reports:

libcurl contains a buffer overrun flaw in the IMAP handler.
An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function.
libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.

https://curl.haxx.se/docs/adv_20171023.html CVE-2017-1000257 2017-10-23 2017-10-23
h2o -- DoS in workers h2o 2.2.3

Frederik Deweerdt reports:

Multiple Denial-of-Service vulnerabilities exist in h2o workers - see references for full details.

CVE-2017-10868: Worker processes may crash when receiving a request with invalid framing.

CVE-2017-10869: The stack may overflow when proxying huge requests.

CVE-2017-10868 CVE-2017-10869 https://github.com/h2o/h2o/issues/1459 https://github.com/h2o/h2o/issues/1460 https://github.com/h2o/h2o/releases/tag/v2.2.3 2017-07-19 2017-10-17
irssi -- multiple vulnerabilities irssi 1.0.5,1

Irssi reports:

When installing themes with unterminated colour formatting sequences, Irssi may access data beyond the end of the string.

While waiting for the channel synchronisation, Irssi may incorrectly fail to remove destroyed channels from the query list, resulting in use after free conditions when updating the state later on.

Certain incorrectly formatted DCC CTCP messages could cause NULL pointer dereference.

Overlong nicks or targets may result in a NULL pointer dereference while splitting the message.

In certain cases Irssi may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string.

https://irssi.org/security/irssi_sa_2017_10.txt CVE-2017-15721 CVE-2017-15722 CVE-2017-15723 CVE-2017-15227 CVE-2017-15228 ports/223169 2017-10-10 2017-10-22 2017-12-31
chromium -- multiple vulnerabilities chromium 62.0.3202.62

Google Chrome Releases reports:

35 security fixes in this release, including:

  • [762930] High CVE-2017-5124: UXSS with MHTML. Reported by Anonymous on 2017-09-07
  • [749147] High CVE-2017-5125: Heap overflow in Skia. Reported by Anonymous on 2017-07-26
  • [760455] High CVE-2017-5126: Use after free in PDFium. Reported by Luat Nguyen on KeenLab, Tencent on 2017-08-30
  • [765384] High CVE-2017-5127: Use after free in PDFium. Reported by Luat Nguyen on KeenLab, Tencent on 2017-09-14
  • [765469] High CVE-2017-5128: Heap overflow in WebGL. Reported by Omair on 2017-09-14
  • [765495] High CVE-2017-5129: Use after free in WebAudio. Reported by Omair on 2017-09-15
  • [718858] High CVE-2017-5132: Incorrect stack manipulation in WebAssembly. Reported by Gaurav Dewan of Adobe Systems India Pvt. Ltd. on 2017-05-05
  • [722079] High CVE-2017-5130: Heap overflow in libxml2. Reported by Pranjal Jumde on 2017-05-14
  • [744109] Medium CVE-2017-5131: Out of bounds write in Skia. Reported by Anonymous on 2017-07-16
  • [762106] Medium CVE-2017-5133: Out of bounds write in Skia. Reported by Aleksandar Nikolic of Cisco Talos on 2017-09-05
  • [752003] Medium CVE-2017-15386: UI spoofing in Blink. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-08-03
  • [756040] Medium CVE-2017-15387: Content security bypass. Reported by Jun Kokatsu on 2017-08-16
  • [756563] Medium CVE-2017-15388: Out of bounds read in Skia. Reported by Kushal Arvind Shah of Fortinet's FortiGuard Labs on 2017-08-17
  • [739621] Medium CVE-2017-15389: URL spoofing in Omnibox. Reported by xisigr of Tencent's Xuanwu Lab on 2017-07-06
  • [750239] Medium CVE-2017-15390: URL spoofing in Omnibox. Reported by Haosheng Wang on 2017-07-28
  • [598265] Low CVE-2017-15391: Extension limitation bypass in Extensions. Reported by Joao Lucas Melo Brasio on 2016-03-28
  • [714401] Low CVE-2017-15392: Incorrect registry key handling in PlatformIntegration. Reported by Xiaoyin Liu on 2017-04-22
  • [732751] Low CVE-2017-15393: Referrer leak in Devtools. Reported by Svyat Mitin on 2017-06-13
  • [745580] Low CVE-2017-15394: URL spoofing in extensions UI. Reported by Sam on 2017-07-18
  • [759457] Low CVE-2017-15395: Null pointer dereference in ImageCapture. Reported by Johannes Bergman on 2017-08-28
  • [775550] Various fixes from internal audits, fuzzing and other initiatives
CVE-2017-5124 CVE-2017-5125 CVE-2017-5126 CVE-2017-5127 CVE-2017-5128 CVE-2017-5129 CVE-2017-5132 CVE-2017-5130 CVE-2017-5131 CVE-2017-5133 CVE-2017-15386 CVE-2017-15387 CVE-2017-15388 CVE-2017-15389 CVE-2017-15390 CVE-2017-15391 CVE-2017-15392 CVE-2017-15393 CVE-2017-15394 CVE-2017-15395 https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html 2017-10-17 2017-10-21
cacti -- Cross Site Scripting issue cacti 1.1.26

cacti developers report:

The file include/global_session.php in Cacti 1.1.25 has XSS related to (1) the URI or (2) the refresh page.

http://www.securitytracker.com/id/1039569 https://github.com/Cacti/cacti/commit/93f661d8adcfa6618b11522cdab30e97bada33fd https://github.com/Cacti/cacti/issues/1010 CVE-2017-15194 2017-10-10 2017-10-19
arj -- multiple vulnerabilities arj 3.10.22_5

Several vulnerabilities: symlink directory traversal, absolute path directory traversal and buffer overflow were discovered in the arj archiver.

CVE-2015-0556 CVE-2015-0557 CVE-2015-2782 2015-04-08 2017-10-19
krb5 -- Multiple vulnerabilities krb5 1.14.6 1.151.15.2 krb5-devel 1.14.6 1.151.15.2 krb5-115 1.15.2 krb5-114 1.14.6 krb5-113 1.14.6

MIT reports:

CVE-2017-11368:

In MIT krb5 1.7 and later, an authenticated attacker can cause an assertion failure in krb5kdc by sending an invalid S4U2Self or S4U2Proxy request.

CVE-2017-11462:

RFC 2744 permits a GSS-API implementation to delete an existing security context on a second or subsequent call to gss_init_sec_context() or gss_accept_sec_context() if the call results in an error. This API behavior has been found to be dangerous, leading to the possibility of memory errors in some callers. For safety, GSS-API implementations should instead preserve existing security contexts on error until the caller deletes them.

All versions of MIT krb5 prior to this change may delete acceptor contexts on error. Versions 1.13.4 through 1.13.7, 1.14.1 through 1.14.5, and 1.15 through 1.15.1 may also delete initiator contexts on error.

https://nvd.nist.gov/vuln/detail/CVE-2017-11368 https://krbdev.mit.edu/rt/Ticket/Display.html?id=8599 https://github.com/krb5/krb5/commit/ffb35baac6981f9e8914f8f3bffd37f284b85970 https://nvd.nist.gov/vuln/detail/CVE-2017-11462 https://krbdev.mit.edu/rt/Ticket/Display.html?id=8598 https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf CVE-2017-11368 CVE-2017-11462 2017-07-14 2017-10-18
MySQL -- multiple vulnerabilities mariadb55-server 5.5.58 mariadb100-server 10.0.33 mariadb101-server 10.1.29 mariadb102-server 10.2.10 mysql55-server 5.5.58 mysql56-server 5.6.38 mysql57-server 5.7.20 percona55-server 5.5.58 percona56-server 5.6.38 percona57-server 5.7.20

Oracle reports:

Please reference CVE/URL list for details

http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixMSQL CVE-2017-10155 CVE-2017-10379 CVE-2017-10384 CVE-2017-10276 CVE-2017-10167 CVE-2017-10378 CVE-2017-10277 CVE-2017-10203 CVE-2017-10283 CVE-2017-10313 CVE-2017-10296 CVE-2017-10311 CVE-2017-10320 CVE-2017-10314 CVE-2017-10227 CVE-2017-10279 CVE-2017-10294 CVE-2017-10165 CVE-2017-10284 CVE-2017-10286 CVE-2017-10268 CVE-2017-10365 2017-10-18 2017-10-18 2017-12-23
xorg-server -- Multiple Issues xorg-server 1.18.4_6,1 1.19.0,11.19.3,1

xorg-server developers reports:

In the X.Org X server before 2017-06-19, a user authenticated to an X Session could crash or execute code in the context of the X Server by exploiting a stack overflow in the endianness conversion of X Events.

Uninitialized data in endianness conversion in the XEvent handling of the X.Org X Server before 2017-06-19 allowed authenticated malicious users to access potentially privileged data from the X server.

http://www.securityfocus.com/bid/99546 https://bugzilla.suse.com/show_bug.cgi?id=1035283 https://cgit.freedesktop.org/xorg/xserver/commit/?id=215f894965df5fb0bb45b107d84524e700d2073c https://cgit.freedesktop.org/xorg/xserver/commit/?id=8caed4df36b1f802b4992edcfd282cbeeec35d9d https://cgit.freedesktop.org/xorg/xserver/commit/?id=ba336b24052122b136486961c82deac76bbde455 http://www.securityfocus.com/bid/99543 https://bugzilla.suse.com/show_bug.cgi?id=1035283 https://cgit.freedesktop.org/xorg/xserver/commit/?id=05442de962d3dc624f79fc1a00eca3ffc5489ced CVE-2017-10971 CVE-2017-10972 2017-07-06 2017-10-17 2018-05-20
Flash Player -- Remote code execution linux-flashplayer 27.0.0.170

Adobe reports:

  • This update resolves a type confusion vulnerability that could lead to remote code execution (CVE-2017-11292).
CVE-2017-11292 https://helpx.adobe.com/security/products/flash-player/apsb17-32.html 2017-10-16 2017-10-17
WPA packet number reuse with replayed messages and key reinstallation wpa_supplicant 2.6_1 hostapd 2.6

wpa_supplicant developers report:

A vulnerability was found in how a number of implementations can be triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by replaying a specific frame that is used to manage the keys.

http://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt https://www.kb.cert.org/vuls/id/228519 CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 2017-10-16 2017-10-16
mercurial -- multiple issues mercurial 4.3

mercurial developers reports:

Mercurial prior to version 4.3 is vulnerable to a missing symlink check that can malicious repositories to modify files outside the repository

Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks.

http://www.securityfocus.com/bid/100290 https://security.gentoo.org/glsa/201709-18 https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.3_.2F_4.3.1_.282017-08-10.29 http://www.securityfocus.com/bid/100290 https://security.gentoo.org/glsa/201709-18 https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.3_.2F_4.3.1_.282017-08-10.29 CVE-2017-1000115 CVE-2017-1000116 2017-10-05 2017-10-16
Multiple exploitable heap-based buffer overflow vulnerabilities exists in FreeXL 1.0.3 freexl 1.0.4

Cisco TALOS reports:

An exploitable heap based buffer overflow vulnerability exists in the read_biff_next_record function of FreeXL 1.0.3. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trigger this vulnerability.

An exploitable heap-based buffer overflow vulnerability exists in the read_legacy_biff function of FreeXL 1.0.3. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trigger this vulnerability.

https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0430 CVE-2017-2923 https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0431 CVE-2017-2924 2017-09-11 2017-10-13
FFmpeg -- multiple vulnerabilities ffmpeg 3.3.4 mythtv mythtv-frontend 29.1,1

FFmpeg security reports:

Multiple vulnerabilities have been fixed in FFmpeg 3.3.4. Please refer to the CVE list for details.

https://www.ffmpeg.org/security.html CVE-2017-14054 CVE-2017-14055 CVE-2017-14056 CVE-2017-14057 CVE-2017-14058 CVE-2017-14059 CVE-2017-14169 CVE-2017-14170 CVE-2017-14171 CVE-2017-14222 CVE-2017-14223 CVE-2017-14225 CVE-2017-14767 2017-09-11 2017-10-12 2018-03-25
- xorg-server -- multiple vulnabilities + xorg-server -- multiple vulnerabilities xephyr 1.18.4_5,1 xorg-dmx 1.18.4_5,1 xorg-nestserver 1.19.1_2,2 xorg-server 1.18.4_5,1 xorg-vfbserver 1.19.1_2,1 xwayland 1.19.1_2

Adam Jackson reports:

One regression fix since 1.19.4 (mea culpa), and fixes for CVEs 2017-12176 through 2017-12187.

https://lists.x.org/archives/xorg-announce/2017-October/002814.html CVE-2017-12176 CVE-2017-12177 CVE-2017-12178 CVE-2017-12179 CVE-2017-12180 CVE-2017-12181 CVE-2017-12182 CVE-2017-12183 CVE-2017-12184 CVE-2017-12185 CVE-2017-12186 CVE-2017-12187 2017-10-12 2017-10-13
solr -- Code execution via entity expansion apache-solr 5.16.6.1 7.0.07.1

Solr developers report:

Lucene XML parser does not explicitly prohibit doctype declaration and expansion of external entities which leads to arbitrary HTTP requests to the local SOLR instance and to bypass all firewall restrictions.

Solr "RunExecutableListener" class can be used to execute arbitrary commands on specific events, for example after each update query. The problem is that such listener can be enabled with any parameters just by using Config API with add-listener command.

http://lucene.472066.n3.nabble.com/Re-Several-critical-vulnerabilities-discovered-in-Apache-Solr-XXE-amp-RCE-td4358308.html https://marc.info/?l=apache-announce&m=150786685013286 CVE-2017-12629 2017-10-13 2017-10-13 2017-10-16
jenkins -- multiple issues jenkins 2.83 jenkins-lts 2.73.1

jenkins developers report:

A total of 11 issues are reported, please see reference URL for details.

https://jenkins.io/security/advisory/2017-10-11/ 2017-10-11 2017-10-13
xen-kernel -- multiple vulnerabilities xen-kernel 4.7.2_6

The Xen project reports multiple vulnerabilities.

http://xenbits.xen.org/xsa/advisory-237.html http://xenbits.xen.org/xsa/advisory-238.html http://xenbits.xen.org/xsa/advisory-239.html http://xenbits.xen.org/xsa/advisory-240.html http://xenbits.xen.org/xsa/advisory-241.html http://xenbits.xen.org/xsa/advisory-242.html http://xenbits.xen.org/xsa/advisory-243.html http://xenbits.xen.org/xsa/advisory-244.html 2017-10-12 2017-10-12
nss -- Use-after-free in TLS 1.2 generating handshake hashes nss 3.323.32.1 3.283.28.6 linux-c6-nss 3.283.28.4_2 linux-c7-nss 3.283.28.4_2

Mozilla reports:

During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash.

https://www.mozilla.org/en-US/security/advisories/mfsa2017-21/#CVE-2017-7805 https://hg.mozilla.org/projects/nss/rev/2d7b65b72290 https://hg.mozilla.org/projects/nss/rev/d3865e2957d0 CVE-2017-7805 2017-08-04 2017-10-12 2018-01-29
osip -- Improper Restriction of Operations within the Bounds of a Memory Buffer libosip2 5.0.0

osip developers reports:

In libosip2 in GNU oSIP 4.1.0 and 5.0.0, a malformed SIP message can lead to a heap buffer overflow in the msg_osip_body_parse() function defined in osipparser2/osip_message_parse.c, resulting in a remote DoS.

http://www.securityfocus.com/bid/97644 https://savannah.gnu.org/support/index.php?109265 CVE-2017-7853 2017-04-13 2017-10-11
ncurses -- multiple issues ncurses 6.0

ncurses developers reports:

There are multiple illegal address access issues and an infinite loop issue. Please refer to the CVE list for details.

https://bugzilla.redhat.com/show_bug.cgi?id=1484274 https://bugzilla.redhat.com/show_bug.cgi?id=1484276 https://bugzilla.redhat.com/show_bug.cgi?id=1484284 https://bugzilla.redhat.com/show_bug.cgi?id=1484285 https://bugzilla.redhat.com/show_bug.cgi?id=1484287 https://bugzilla.redhat.com/show_bug.cgi?id=1484290 https://bugzilla.redhat.com/show_bug.cgi?id=1484291 CVE-2017-13728 CVE-2017-13729 CVE-2017-13730 CVE-2017-13731 CVE-2017-13732 CVE-2017-13733 CVE-2017-13734 2017-08-29 2017-10-11
Python 2.7 -- multiple vulnerabilities python27 2.7.14

Python reports:

Multiple vulnerabilities have been fixed in Python 2.7.14. Please refer to the CVE list for details.

https://raw.githubusercontent.com/python/cpython/84471935ed2f62b8c5758fd544c7d37076fe0fa5/Misc/NEWS CVE-2012-0876 CVE-2016-0718 CVE-2016-4472 CVE-2016-5300 CVE-2016-9063 CVE-2017-9233 2017-08-26 2017-10-11
node -- access to unintended files node 8.5.08.6.0

node developers report:

Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to ".." handling was incompatible with the pathname validation used by unspecified community modules.

http://www.securityfocus.com/bid/101056 CVE-2017-14849 2017-09-27 2017-10-10
zookeeper -- Denial Of Service zookeeper 3.4.10

zookeeper developers report:

Two four letter word commands "wchp/wchc" are CPU intensive and could cause spike of CPU utilization on Apache ZooKeeper server if abused, which leads to the server unable to serve legitimate client requests. Apache ZooKeeper thru version 3.4.9 and 3.5.2 suffer from this issue, fixed in 3.4.10, 3.5.3, and later.

https://lists.apache.org/thread.html/58170aeb7a681d462b7fa31cae81110cbb749d2dc83c5736a0bb8370@%3Cdev.zookeeper.apache.org%3E CVE-2017-5637 2017-10-09 2017-10-10
libtiff -- Improper Input Validation libtiff 4.0.8

libtiff developers report:

There is a reachable assertion abort in the function TIFFWriteDirectoryTagSubifd() in LibTIFF 4.0.8, related to tif_dirwrite.c and a SubIFD tag. A crafted input will lead to a remote denial of service attack.

There is a reachable assertion abort in the function TIFFWriteDirectorySec() in LibTIFF 4.0.8, related to tif_dirwrite.c and a SubIFD tag. A crafted input will lead to a remote denial of service attack.

http://bugzilla.maptools.org/show_bug.cgi?id=2727 http://bugzilla.maptools.org/show_bug.cgi?id=2728 http://www.securityfocus.com/bid/100524 CVE-2017-13726 CVE-2017-13727 2017-08-29 2017-10-10
rubygems -- deserialization vulnerability ruby22-gems ruby23-gems ruby24-gems 2.6.14

oss-security mailing list:

There is a possible unsafe object desrialization vulnerability in RubyGems. It is possible for YAML deserialization of gem specifications to bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

http://www.openwall.com/lists/oss-security/2017/10/10/2 http://blog.rubygems.org/2017/10/09/2.6.14-released.html CVE-2017-0903 2017-10-09 2017-10-10
- xorg-server -- multiple vulnabilities + xorg-server -- multiple vulnerabilities xephyr 1.18.4_4,1 xorg-dmx 1.18.4_4,1 xorg-nestserver 1.19.1_1,2 xorg-server 1.18.4_4,1 xorg-vfbserver 1.19.1_1,1 xwayland 1.19.1_1

Alan Coopersmith reports:

X.Org thanks Michal Srb of SuSE for finding these issues and bringing them to our attention, Julien Cristau of Debian for getting the fixes integrated, and Adam Jackson of Red Hat for publishing the release.

https://lists.x.org/archives/xorg-announce/2017-October/002809.html CVE-2017-13721 CVE-2017-13723 2017-10-04 2017-10-09
tomcat -- Remote Code Execution tomcat 7.0.07.0.81 8.0.08.0.46 8.5.08.5.22 9.0.09.0.1

tomcat developers reports:

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

http://www.securityfocus.com/bid/100954 https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E CVE-2017-12617 2017-10-04 2017-10-06
cURL -- out of bounds read curl 7.56.0

The cURL project reports:

FTP PWD response parser out of bounds read

libcurl may read outside of a heap allocated buffer when doing FTP.

When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the PWD command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses.

Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path.

A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault.

https://curl.haxx.se/docs/adv_20171004.html CVE-2017-1000254 2017-10-04 2017-10-04
FreeBSD -- OpenSSH Denial of Service vulnerability FreeBSD 11.111.1_1 11.011.0_12 10.310.3_21

Problem Description:

There is no limit on the password length.

Impact:

A remote attacker may be able to cause an affected SSH server to use excessive amount of CPU by sending very long passwords, when PasswordAuthentication is enabled by the system administrator.

CVE-2016-6515 SA-17:06.openssh 2017-08-10 2017-10-03
FreeBSD -- heimdal KDC-REP service name validation vulnerability FreeBSD 11.011.0_11 10.310.3_20

Problem Description:

There is a programming error in the Heimdal implementation that used an unauthenticated, plain-text version of the KDC-REP service name found in a ticket.

Impact:

An attacker who has control of the network between a client and the service it talks to will be able to impersonate the service, allowing a successful man-in-the-middle (MITM) attack that circumvents the mutual authentication.

CVE-2017-1110 SA-17:05.heimdal 2017-07-12 2017-10-03
dnsmasq -- multiple vulnerabilities dnsmasq 2.78,1 dnsmasq-devel 2.78

Google Project Zero reports:

  • CVE-2017-14491: Heap based overflow (2 bytes). Before 2.76 and this commit overflow was unrestricted.
  • CVE-2017-14492: Heap based overflow.
  • CVE-2017-14493: Stack Based overflow.
  • CVE-2017-14494: Information Leak
  • CVE-2017-14495: Lack of free()
  • CVE-2017-14496: Invalid boundary checks. Integer underflow leading to a huge memcpy.
  • CVE-2017-13704: Crash on large DNS query
https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 CVE-2017-14494 CVE-2017-14495 CVE-2017-14496 CVE-2017-13704 2017-10-02 2017-10-02
phpmyfaq -- multiple issues phpmyfaq 2.9.8

phpmyfaq developers report:

Cross-site scripting (XSS) vulnerability in inc/PMF/Faq.php in phpMyFAQ through 2.9.8 allows remote attackers to inject arbitrary web script or HTML via the Questions field in an "Add New FAQ" action.

Cross-site scripting (XSS) vulnerability in phpMyFAQ through 2.9.8 allows remote attackers to inject arbitrary web script or HTML via the "Title of your FAQ" field in the Configuration Module.

https://www.exploit-db.com/exploits/42761/ https://github.com/thorsten/phpMyFAQ/commit/30b0025e19bd95ba28f4eff4d259671e7bb6bb86 CVE-2017-14618 CVE-2017-14619 2017-09-20 2017-09-29
wordpress -- multiple issues wordpress 4.8.2

wordpress developers report:

Before version 4.8.2, WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.

Before version 4.8.2, WordPress allowed a Cross-Site scripting attack in the template list view via a crafted template name.

Before version 4.8.2, WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.

Before version 4.8.2, WordPress allowed Cross-Site scripting in the plugin editor via a crafted plugin name.

Before version 4.8.2, WordPress allowed a Directory Traversal attack in the Customizer component via a crafted theme filename.

Before version 4.8.2, WordPress was vulnerable to cross-site scripting in oEmbed discovery.

Before version 4.8.2, WordPress was vulnerable to a cross-site scripting attack via shortcodes in the TinyMCE visual editor.

http://www.securityfocus.com/bid/100912 https://wordpress.org/news/2017/09/wordpress-4-8-2-security-and-maintenance-release/ https://core.trac.wordpress.org/changeset/41393 https://core.trac.wordpress.org/changeset/41395 https://core.trac.wordpress.org/changeset/41397 https://core.trac.wordpress.org/changeset/41412 https://core.trac.wordpress.org/changeset/41448 https://core.trac.wordpress.org/changeset/41457 https://wpvulndb.com/vulnerabilities/8911 https://wpvulndb.com/vulnerabilities/8912 https://wpvulndb.com/vulnerabilities/8913 https://wpvulndb.com/vulnerabilities/8914 CVE-2017-14718 CVE-2017-14719 CVE-2017-14720 CVE-2017-14721 CVE-2017-14722 CVE-2017-14724 CVE-2017-14726 2017-09-23 2017-09-29
mozilla -- multiple vulnerabilities firefox 56.0,1 seamonkey linux-seamonkey 2.49.1 firefox-esr 52.4.0,1 linux-firefox 52.4.0,2 libxul thunderbird linux-thunderbird 52.4.0

Mozilla Foundation reports:

CVE-2017-7793: Use-after-free with Fetch API

CVE-2017-7817: Firefox for Android address bar spoofing through fullscreen mode

CVE-2017-7818: Use-after-free during ARIA array manipulation

CVE-2017-7819: Use-after-free while resizing images in design mode

CVE-2017-7824: Buffer overflow when drawing and validating elements with ANGLE

CVE-2017-7805: Use-after-free in TLS 1.2 generating handshake hashes

CVE-2017-7812: Drag and drop of malicious page content to the tab bar can open locally stored files

CVE-2017-7814: Blob and data URLs bypass phishing and malware protection warnings

CVE-2017-7813: Integer truncation in the JavaScript parser

CVE-2017-7825: OS X fonts render some Tibetan and Arabic unicode characters as spaces

CVE-2017-7815: Spoofing attack with modal dialogs on non-e10s installations

CVE-2017-7816: WebExtensions can load about: URLs in extension UI

CVE-2017-7821: WebExtensions can download and open non-executable files without user interaction

CVE-2017-7823: CSP sandbox directive did not create a unique origin

CVE-2017-7822: WebCrypto allows AES-GCM with 0-length IV

CVE-2017-7820: Xray wrapper bypass with new tab and web console

CVE-2017-7811: Memory safety bugs fixed in Firefox 56

CVE-2017-7810: Memory safety bugs fixed in Firefox 56 and Firefox ESR 52.4

CVE-2017-7793 CVE-2017-7805 CVE-2017-7810 CVE-2017-7811 CVE-2017-7812 CVE-2017-7813 CVE-2017-7814 CVE-2017-7815 CVE-2017-7816 CVE-2017-7817 CVE-2017-7818 CVE-2017-7819 CVE-2017-7820 CVE-2017-7821 CVE-2017-7822 CVE-2017-7823 CVE-2017-7824 CVE-2017-7825 https://www.mozilla.org/en-US/security/advisories/mfsa2017-21/ https://www.mozilla.org/en-US/security/advisories/mfsa2017-22/ 2017-09-28 2017-09-29 2017-10-03
sam2p -- multiple issues sam2p 0.49.3,1

sam2p developers report:

In sam2p 0.49.3, a heap-based buffer overflow exists in the pcxLoadImage24 function of the file in_pcx.cpp.

In sam2p 0.49.3, the in_xpm_reader function in in_xpm.cpp has an integer signedness error, leading to a crash when writing to an out-of-bounds array element.

In sam2p 0.49.3, an integer overflow exists in the pcxLoadImage24 function of the file in_pcx.cpp, leading to an invalid write operation.

In sam2p 0.49.3, the pcxLoadRaster function in in_pcx.cpp has an integer signedness error leading to a heap-based buffer overflow.

Because of an integer overflow in sam2p 0.49.3, a loop executes 0xffffffff times, ending with an invalid read of size 1 in the Image::Indexed::sortPal function in image.cpp. However, this also causes memory corruption because of an attempted write to the invalid d[0xfffffffe] array element.

In sam2p 0.49.3, there is an invalid read of size 2 in the parse_rgb function in in_xpm.cpp. However, this can also cause a write to an illegal address.

https://github.com/pts/sam2p/issues/14 CVE-2017-14628 CVE-2017-14629 CVE-2017-14630 CVE-2017-14631 CVE-2017-14636 CVE-2017-14637 2017-09-21 2017-09-28
libraw -- Out-of-bounds Read libraw 0.18.4

libraw developers report:

In LibRaw through 0.18.4, an out of bounds read flaw related to kodak_65000_load_raw has been reported in dcraw/dcraw.c and internal/dcraw_common.cpp. An attacker could possibly exploit this flaw to disclose potentially sensitive memory or cause an application crash.

https://github.com/LibRaw/LibRaw/commit/d13e8f6d1e987b7491182040a188c16a395f1d21 https://github.com/LibRaw/LibRaw/issues/101 CVE-2017-14608 2017-09-20 2017-09-28
OpenVPN -- out-of-bounds write in legacy key-method 1 openvpn-polarssl 2.3.18 openvpn-mbedtls 2.4.02.4.4 openvpn 2.4.02.4.4 2.3.18

Steffan Karger reports:

The bounds check in read_key() was performed after using the value, instead of before. If 'key-method 1' is used, this allowed an attacker to send a malformed packet to trigger a stack buffer overflow. [...]

Note that 'key-method 1' has been replaced by 'key method 2' as the default in OpenVPN 2.0 (released on 2005-04-17), and explicitly deprecated in 2.4 and marked for removal in 2.5. This should limit the amount of users impacted by this issue.

https://community.openvpn.net/openvpn/wiki/CVE-2017-12166 https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg15492.html CVE-2017-12166 2017-09-21 2017-09-27
ImageMagick -- denial of service via a crafted font file ImageMagick7 7.0.7.4 ImageMagick7-nox11 7.0.7.4 ImageMagick 6.9.8.9_1 ImageMagick-nox11 6.9.8.9_1

MITRE reports:

The ReadCAPTIONImage function in coders/caption.c in ImageMagick allows remote attackers to cause a denial of service (infinite loop) via a crafted font file.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14741 https://github.com/ImageMagick/ImageMagick/issues/771 https://github.com/ImageMagick/ImageMagick/commit/7d8e14899c562157c7760a77fc91625a27cb596f https://github.com/ImageMagick/ImageMagick/commit/bb11d07139efe0f5e4ce0e4afda32abdbe82fa9d CVE-2017-14741 2017-09-21 2017-09-26
libofx -- exploitable buffer overflow libofx 0.9.11_1

Talos developers report:

An exploitable buffer overflow vulnerability exists in the tag parsing functionality of LibOFX 0.9.11. A specially crafted OFX file can cause a write out of bounds resulting in a buffer overflow on the stack. An attacker can construct a malicious OFX file to trigger this vulnerability.

http://www.securityfocus.com/bid/100828 https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0317 CVE-2017-2816 2017-09-13 2017-09-27
sugarcrm -- multiple vulnerabilities sugarcrm 6.5.26

sugarcrm developers report:

An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). Several areas have been identified in the Documents and Emails module that could allow an authenticated user to perform SQL injection, as demonstrated by a backslash character at the end of a bean_id to modules/Emails/DetailView.php. An attacker could exploit these vulnerabilities by sending a crafted SQL request to the affected areas. An exploit could allow the attacker to modify the SQL database. Proper SQL escaping has been added to prevent such exploits.

An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). A remote file inclusion has been identified in the Connectors module allowing authenticated users to include remotely accessible system files via a query string. Proper input validation has been added to mitigate this issue.

An issue was discovered in SugarCRM before 7.7.2.3, 7.8.x before 7.8.2.2, and 7.9.x before 7.9.2.0 (and Sugar Community Edition 6.5.26). The WebToLeadCapture functionality is found vulnerable to unauthenticated cross-site scripting (XSS) attacks. This attack vector is mitigated by proper validating the redirect URL values being passed along.

https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities/ https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2017-006/ https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities/ https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2017-007/ https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities/ https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2017-008/ CVE-2017-14508 CVE-2017-14509 CVE-2017-14510 2017-09-17 2017-09-26
libzip -- denial of service libzip 1.1.13_1

libzip developers report:

The _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0 mishandles EOCD records, which allows remote attackers to cause a denial of service (memory allocation failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive.

https://blogs.gentoo.org/ago/2017/09/01/libzip-memory-allocation-failure-in-_zip_cdir_grow-zip_dirent-c/ https://github.com/nih-at/libzip/commit/9b46957ec98d85a572e9ef98301247f39338a3b5 CVE-2017-14107 2017-09-01 2017-09-27
libbson -- Denial of Service libbson 1.8.0

mongodb developers report:

In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c.

http://www.securityfocus.com/bid/100825 https://bugzilla.redhat.com/show_bug.cgi?id=1489355 https://bugzilla.redhat.com/show_bug.cgi?id=1489356 https://bugzilla.redhat.com/show_bug.cgi?id=1489362 CVE-2017-14227 2017-09-09 2017-09-26
tcpdump -- multiple vulnerabilities tcpdump 4.9.2

tcpdump developers report:

Too many issues to detail, see CVE references for details.

CVE-2017-11541 CVE-2017-11542 CVE-2017-11543 CVE-2017-12893 CVE-2017-12894 CVE-2017-12895 CVE-2017-12896 CVE-2017-12897 CVE-2017-12898 CVE-2017-12899 CVE-2017-12900 CVE-2017-12901 CVE-2017-12902 CVE-2017-12985 CVE-2017-12986 CVE-2017-12987 CVE-2017-12988 CVE-2017-12989 CVE-2017-12990 CVE-2017-12991 CVE-2017-12992 CVE-2017-12993 CVE-2017-12994 CVE-2017-12995 CVE-2017-12996 CVE-2017-12997 CVE-2017-12998 CVE-2017-12999 CVE-2017-13000 CVE-2017-13001 CVE-2017-13002 CVE-2017-13003 CVE-2017-13004 CVE-2017-13005 CVE-2017-13006 CVE-2017-13007 CVE-2017-13008 CVE-2017-13009 CVE-2017-13010 CVE-2017-13011 CVE-2017-13012 CVE-2017-13013 CVE-2017-13014 CVE-2017-13015 CVE-2017-13016 CVE-2017-13017 CVE-2017-13018 CVE-2017-13019 CVE-2017-13020 CVE-2017-13021 CVE-2017-13022 CVE-2017-13023 CVE-2017-13024 CVE-2017-13025 CVE-2017-13026 CVE-2017-13027 CVE-2017-13028 CVE-2017-13029 CVE-2017-13030 CVE-2017-13031 CVE-2017-13032 CVE-2017-13033 CVE-2017-13034 CVE-2017-13035 CVE-2017-13036 CVE-2017-13037 CVE-2017-13038 CVE-2017-13039 CVE-2017-13040 CVE-2017-13041 CVE-2017-13042 CVE-2017-13043 CVE-2017-13044 CVE-2017-13045 CVE-2017-13046 CVE-2017-13047 CVE-2017-13048 CVE-2017-13049 CVE-2017-13050 CVE-2017-13051 CVE-2017-13052 CVE-2017-13053 CVE-2017-13054 CVE-2017-13055 CVE-2017-13687 CVE-2017-13688 CVE-2017-13689 CVE-2017-13690 CVE-2017-13725 2017-07-22 2017-09-26
libraw -- buffer overflow libraw 0.18.4

libraw developers report:

LibRaw before 0.18.4 has a heap-based Buffer Overflow in the processCanonCameraInfo function via a crafted file.

http://www.securityfocus.com/bid/100866 https://github.com/LibRaw/LibRaw/issues/100 CVE-2017-14348 2017-09-12 2017-09-26
libraw -- denial of service and remote code execution libraw 0.18.3

libraw developers report:

A Stack-based Buffer Overflow was discovered in xtrans_interpolate in internal/dcraw_common.cpp in LibRaw before 0.18.3. It could allow a remote denial of service or code execution attack.

https://github.com/LibRaw/LibRaw/issues/99 CVE-2017-14265 2017-09-11 2017-09-26
libgd -- Denial of servica via double free libgd 2.2.5

libgd developers report:

Double free vulnerability in the gdImagePngPtr function in libgd2 before 2.2.5 allows remote attackers to cause a denial of service via vectors related to a palette with no colors.

http://www.debian.org/security/2017/dsa-3961 https://github.com/libgd/libgd/issues/381 https://github.com/libgd/libgd/releases/tag/gd-2.2.5 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N2BLXX7KNRE7ZVQAKGTHHWS33CUCXVUP/ CVE-2017-6362 2017-09-07 2017-09-26
php-gd and gd -- Buffer over-read into uninitialized memory libgd 2.2.5 php70-gd 7.0.21 php71-gd 7.1.7

PHP developers report:

The GIF decoding function gdImageCreateFromGifCtx in gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.31 and 7.x before 7.1.7, does not zero colorMap arrays before use. A specially crafted GIF image could use the uninitialized tables to read ~700 bytes from the top of the stack, potentially disclosing sensitive information.

https://bugs.php.net/bug.php?id=74435 CVE-2017-7890 2017-08-02 2017-09-26
ledger -- multiple vulnerabilities ledger 3.1.1

Talos reports:

An exploitable buffer overflow vulnerability exists in the tag parsing functionality of Ledger-CLI 3.1.1. A specially crafted journal file can cause an integer underflow resulting in code execution. An attacker can construct a malicious journal file to trigger this vulnerability.

An exploitable use-after-free vulnerability exists in the account parsing component of the Ledger-CLI 3.1.1. A specially crafted ledger file can cause a use-after-free vulnerability resulting in arbitrary code execution. An attacker can convince a user to load a journal file to trigger this vulnerability.

http://www.securityfocus.com/bid/100543 https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0303 http://www.securityfocus.com/bid/100546 https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0304 CVE-2017-2808 CVE-2017-2807 2017-09-05 2017-09-26
aacplusenc -- denial of service aacplusenc 0.17.5_2

Gentoo developers report:

DeleteBitBuffer in libbitbuf/bitbuffer.c in mp4tools aacplusenc 0.17.5 allows remote attackers to cause a denial of service (invalid memory write, SEGV on unknown address 0x000000000030, and application crash) or possibly have unspecified other impact via a crafted .wav file, aka a NULL pointer dereference.

https://blogs.gentoo.org/ago/2017/09/07/aacplusenc-null-pointer-dereference-in-deletebitbuffer-bitbuffer-c/ https://github.com/teknoraver/aacplusenc/issues/1 CVE-2017-14181 2017-09-07 2017-09-25
ansible -- information disclosure flaw ansible 2.2.3

ansible developers report:

Ansible versions 2.2.3 and earlier are vulnerable to an information disclosure flaw due to the interaction of call back plugins and the no_log directive where the information may not be sanitized properly.

https://github.com/ansible/ansible/issues/22505 CVE-2017-7473 2017-07-21 2017-09-25
weechat -- crash in logger plugin weechat 1.9.1

WeeChat reports:

security problem: a crash can happen in logger plugin when converting date/time specifiers in file mask.

https://weechat.org/news/98/20170923-Version-1.9.1-security-release/ CVE-2017-14727 2017-09-23 2017-09-25
perl -- multiple vulnerabilities perl5 5.24.05.24.3 5.26.05.26.1

SO-AND-SO reports:

CVE-2017-12814: $ENV{$key} stack buffer overflow on Windows

A possible stack buffer overflow in the %ENV code on Windows has been fixed by removing the buffer completely since it was superfluous anyway.

CVE-2017-12837: Heap buffer overflow in regular expression compiler

Compiling certain regular expression patterns with the case-insensitive modifier could cause a heap buffer overflow and crash perl. This has now been fixed.

CVE-2017-12883: Buffer over-read in regular expression parser

For certain types of syntax error in a regular expression pattern, the error message could either contain the contents of a random, possibly large, chunk of memory, or could crash perl. This has now been fixed.

https://metacpan.org/changes/release/SHAY/perl-5.24.3 https://metacpan.org/changes/release/SHAY/perl-5.26.1 CVE-2017-12814 CVE-2017-12837 CVE-2017-12883 2017-09-19 2017-09-24
chromium -- multiple vulnerabilities chromium 61.0.3163.100

Google Chrome releases reports:

3 security fixes in this release, including:

  • [765433] High CVE-2017-5121: Out-of-bounds access in V8. Reported by Jordan Rabet, Microsoft Offensive Security Research and Microsoft ChakraCore team on 2017-09-14
  • [752423] High CVE-2017-5122: Out-of-bounds access in V8. Reported by Choongwoo Han of Naver Corporation on 2017-08-04
  • [767508] Various fixes from internal audits, fuzzing and other initiatives
CVE-2017-5121 CVE-2017-5122 https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop_21.html 2017-09-21 2017-09-22
asterisk -- RTP/RTCP information leak asterisk11 11.25.3 asterisk13 13.17.2

The Asterisk project reports:

This is a follow up advisory to AST-2017-005.

Insufficient RTCP packet validation could allow reading stale buffer contents and when combined with the "nat" and "symmetric_rtp" options allow redirecting where Asterisk sends the next RTCP report.

The RTP stream qualification to learn the source address of media always accepted the first RTP packet as the new source and allowed what AST-2017-005 was mitigating. The intent was to qualify a series of packets before accepting the new source address.

The RTP/RTCP stack will now validate RTCP packets before processing them.

https://downloads.asterisk.org/pub/security/AST-2017-008.html CVE-2017-14099 2017-09-01 2017-09-19
ruby -- multiple vulnerabilities ruby 2.2.02.2.8 2.3.02.3.5 2.4.02.4.2

Ruby blog:

CVE-2017-0898: Buffer underrun vulnerability in Kernel.sprintf

If a malicious format string which contains a precious specifier (*) is passed and a huge minus value is also passed to the specifier, buffer underrun may be caused. In such situation, the result may contains heap, or the Ruby interpreter may crash.

CVE-2017-10784: Escape sequence injection vulnerability in the Basic authentication of WEBrick

When using the Basic authentication of WEBrick, clients can pass an arbitrary string as the user name. WEBrick outputs the passed user name intact to its log, then an attacker can inject malicious escape sequences to the log and dangerous control characters may be executed on a victim’s terminal emulator.

This vulnerability is similar to a vulnerability already fixed, but it had not been fixed in the Basic authentication.

CVE-2017-14033: Buffer underrun vulnerability in OpenSSL ASN1 decode

If a malicious string is passed to the decode method of OpenSSL::ASN1, buffer underrun may be caused and the Ruby interpreter may crash.

CVE-2017-14064: Heap exposure vulnerability in generating JSON

The generate method of JSON module optionally accepts an instance of JSON::Ext::Generator::State class. If a malicious instance is passed, the result may include contents of heap.

https://www.ruby-lang.org/en/security/ https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/ https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/ https://www.ruby-lang.org/en/news/2017/09/14/openssl-asn1-buffer-underrun-cve-2017-14033/ https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/ CVE-2017-0898 CVE-2017-10784 CVE-2017-14033 CVE-2017-14064 2017-09-14 2017-09-19
rubygem-geminabox -- XSS & CSRF vulnerabilities rubygem-geminabox 0.13.8

Gem in a box XSS vulenrability - CVE-2017-14506:

Malicious attacker create GEM file with crafted homepage value (gem.homepage in .gemspec file) includes XSS payload.

The attacker access geminabox system and uploads the gem file (or uses CSRF/SSRF attack to do so).

From now on, any user access Geminabox web server, executes the malicious XSS payload, that will delete any gems on the server, and won't let users use the geminabox anymore. (make victim's browser crash or redirect them to other hosts).

https://baraktawily.blogspot.com/2017/09/gem-in-box-xss-vulenrability-cve-2017.html CVE-2017-14506 CVE-2017-14683 2017-09-18 2017-09-19 2017-09-27
Apache -- HTTP OPTIONS method can leak server memory apache24 2.4.27_1 apache22 2.2.34_1

The Fuzzing Project reports:

Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.

https://nvd.nist.gov/vuln/detail/CVE-2017-9798 CVE-2017-9798 2017-09-18 2017-09-19
GitLab -- multiple vulnerabilities gitlab 1.0.09.3.10 9.4.09.4.5 9.5.09.5.3

GitLab reports:

Please reference CVE/URL list for details

https://about.gitlab.com/2017/09/07/gitlab-9-dot-5-dot-4-security-release/ CVE-2017-5029 CVE-2016-4738 2017-09-07 2017-09-14
Flash Player -- multiple vulnerabilities linux-flashplayer 27.0.0.130

Adobe reports:

  • These updates resolve memory corruption vulnerabilities that could lead to remote code execution (CVE-2017-11281, CVE-2017-11282).
CVE-2017-11281 CVE-2017-11282 https://helpx.adobe.com/security/products/flash-player/apsb17-28.html 2017-09-12 2017-09-12
emacs -- enriched text remote code execution vulnerability emacs25 emacs-nox11 25.3,3 emacs-devel 26.0.50.20170912,2

Paul Eggert reports:

Charles A. Roelli has found a security flaw in the enriched mode in GNU Emacs.

When Emacs renders MIME text/enriched data (Internet RFC 1896), it is vulnerable to arbitrary code execution. Since Emacs-based mail clients decode "Content-Type: text/enriched", this code is exploitable remotely. This bug affects GNU Emacs versions 19.29 through 25.2.

http://seclists.org/oss-sec/2017/q3/422 https://bugs.gnu.org/28350 2017-09-04 2017-09-12 2017-09-13
cyrus-imapd -- broken "other users" behaviour cyrus-imapd30 3.0.03.0.4

Cyrus IMAP 3.0.4 Release Notes states:

Fixed Issue #2132: Broken "Other Users" behaviour

CVE-2017-14230 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14230 2017-09-07 2017-09-10
Django -- possible XSS in traceback section of technical 500 debug page py27-django110 py34-django110 py35-django110 py36-django110 1.10.8 py27-django111 py34-django111 py35-django111 py36-django111 1.11.5

Django blog:

In older versions, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with DEBUG = True (which makes this page accessible) in your production settings.

CVE-2017-12794 https://www.djangoproject.com/weblog/2017/sep/05/security-releases/ 2017-09-05 2017-09-06
chromium -- multiple vulnerabilities chromium 61.0.3163.79

Google Chrome releases reports:

22 security fixes in this release, including:

  • [737023] High CVE-2017-5111: Use after free in PDFium. Reported by Luat Nguyen on KeenLab, Tencent on 2017-06-27
  • [740603] High CVE-2017-5112: Heap buffer overflow in WebGL. Reported by Tobias Klein on 2017-07-10
  • [747043] High CVE-2017-5113: Heap buffer overflow in Skia. Reported by Anonymous on 2017-07-20
  • [752829] High CVE-2017-5114: Memory lifecycle issue in PDFium. Reported by Ke Liu of Tencent's Xuanwu LAB on 2017-08-07
  • [744584] High CVE-2017-5115: Type confusion in V8. Reported by Marco Giovannini on 2017-07-17
  • [759624] High CVE-2017-5116: Type confusion in V8. Reported by Anonymous on 2017-08-28
  • [739190] Medium CVE-2017-5117: Use of uninitialized value in Skia. Reported by Tobias Klein on 2017-07-04
  • [747847] Medium CVE-2017-5118: Bypass of Content Security Policy in Blink. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-07-24
  • [725127] Medium CVE-2017-5119: Use of uninitialized value in Skia. Reported by Anonymous on 2017-05-22
  • [718676] Low CVE-2017-5120: Potential HTTPS downgrade during redirect navigation. Reported by Xiaoyin Liu on 2017-05-05
  • [762099] Various fixes from internal audits, fuzzing and other initiatives
CVE-2017-5111 CVE-2017-5112 CVE-2017-5113 CVE-2017-5114 CVE-2017-5115 CVE-2017-5116 CVE-2017-5117 CVE-2017-5118 CVE-2017-5119 CVE-2017-5120 https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html 2017-09-05 2017-09-06
gdk-pixbuf -- multiple vulnerabilities gtk-pixbuf2 2.36.7

TALOS reports:

  • An exploitable integer overflow vulnerability exists in the tiff_image_parse functionality.

  • An exploitable heap-overflow vulnerability exists in the gdk_pixbuf__jpeg_image_load_increment functionality.

http://blog.talosintelligence.com/2017/08/vuln-spotlight-multiple-gdk.html CVE-2017-2862 CVE-2017-2870 2017-08-30 2017-09-01
asterisk -- Remote Crash Vulerability in res_pjsip asterisk13 13.17.1

The Asterisk project reports:

A carefully crafted URI in a From, To or Contact header could cause Asterisk to crash.

https://downloads.asterisk.org/pub/security/AST-2017-007.html CVE-2017-14098 2017-08-31 2017-09-01
asterisk -- Unauthorized data disclosure and shell access command injection in app_minivm asterisk11 11.25.2 asterisk13 13.17.1

The Asterisk project reports:

AST-2017-005 - A change was made to the strict RTP support in the RTP stack to better tolerate late media when a reinvite occurs. When combined with the symmetric RTP support this introduced an avenue where media could be hijacked. Instead of only learning a new address when expected the new code allowed a new source address to be learned at all times.

AST-2017-006 - The app_minivm module has an "externnotify" program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection.

https://downloads.asterisk.org/pub/security/AST-2017-005.html CVE-2017-14099 https://downloads.asterisk.org/pub/security/AST-2017-006.html CVE-2017-14100 2017-08-31 2017-09-01
libgcrypt -- side-channel attack vulnerability libgcrypt 1.8.1

GnuPG reports:

Mitigate a local side-channel attack on Curve25519 dubbed "May the Fourth Be With You".

CVE-2017-0379 https://eprint.iacr.org/2017/806 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0379 2017-08-27 2017-08-30
rubygems -- multiple vulnerabilities ruby22-gems ruby23-gems ruby24-gems 2.6.13

Official blog of RubyGems reports:

The following vulnerabilities have been reported: a DNS request hijacking vulnerability, an ANSI escape sequence vulnerability, a DoS vulnerability in the query command, and a vulnerability in the gem installer that allowed a malicious gem to overwrite arbitrary files.

https://www.ruby-lang.org/en/news/2017/08/29/multiple-vulnerabilities-in-rubygems/ 2017-08-29 2017-08-29
kanboard -- multiple privilege escalation vulnerabilities kanboard 1.0.46

chbi reports:

an authenticated standard user could reset the password of another user (including admin) by altering form data.

https://kanboard.net/news/version-1.0.46 CVE-2017-12850 CVE-2017-12851 2017-08-15 2017-08-26
poppler -- multiple denial of service issues poppler 0.56.0

Poppler developers report:

Poppler is prone to a stack-based buffer-overflow vulnerability.

Successful exploits may allow attackers to crash the affected application, resulting in denial-of-service condition. Due to the nature of this issue, arbitrary code execution may be possible but this has not been confirmed.

http://www.securityfocus.com/bid/99241/discuss CVE-2017-9865 CVE-2017-9775 2017-06-21 2017-08-24
phpmailer -- XSS in code example and default exeception handler phpmailer 5.2.24

PHPMailer reports:

Fix XSS vulnerability in one of the code examples, CVE-2017-11503. The code_generator.phps example did not filter user input prior to output. This file is distributed with a .phps extension, so it it not normally executable unless it is explicitly renamed, so it is safe by default. There was also an undisclosed potential XSS vulnerability in the default exception handler (unused by default). Patches for both issues kindly provided by Patrick Monnerat of the Fedora Project.

https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.24 CVE-2017-11503 2017-07-27 2017-08-23
salt -- Maliciously crafted minion IDs can cause unwanted directory traversals on the Salt-master py27-salt py32-salt py33-salt py34-salt py35-salt py36-salt 2016.11.7 2017.7.02017.7.1

SaltStack reports:

Correct a flaw in minion id validation which could allow certain minions to authenticate to a master despite not having the correct credentials. To exploit the vulnerability, an attacker must create a salt-minion with an ID containing characters that will cause a directory traversal. Credit for discovering the security flaw goes to: Vernhk@qq.com

CVE-2017-12791 https://docs.saltstack.com/en/latest/topics/releases/2017.7.1.html https://docs.saltstack.com/en/latest/topics/releases/2016.11.7.html 2017-08-16 2017-08-22
dnsdist -- multiple vulnerabilities dnsdist 1.2.0

PowerDNS Security Advisory reports:

The first issue can lead to a denial of service on 32-bit if a backend sends crafted answers, and the second to an alteration of dnsdist's ACL if the API is enabled, writable and an authenticated user is tricked into visiting a crafted website.

CVE-2016-7069 CVE-2017-7557 https://dnsdist.org/security-advisories/index.html 2017-08-21 2017-08-22
evince and atril -- command injection vulnerability in CBT handler evince 3.24.0 evince-lite 3.24.0 atril 1.18.1 1.19.01.19.1 atril-lite 1.18.1 1.19.01.19.1

GNOME reports:

The comic book backend in evince 3.24.0 (and earlier) is vulnerable to a command injection bug that can be used to execute arbitrary commands when a CBT file is opened.

The same vulnerability affects atril, the Evince fork.

https://bugzilla.gnome.org/show_bug.cgi?id=784630 https://github.com/mate-desktop/atril/issues/257 CVE-2017-1000083 2017-07-06 2017-07-13
SquirrelMail -- post-authentication remote code execution squirrelmail 20170705

SquirrelMail developers report:

SquirrelMail 1.4.22 (and other versions before 20170427_0200-SVN) allows post-authentication remote code execution via a sendmail.cf file that is mishandled in a popen call. It's possible to exploit this vulnerability to execute arbitrary shell commands on the remote server.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7692 2017-04-19 2017-08-22
pspp -- multiple vulnerabilities pspp 1.0.1

CVE Details reports:

  • There is an Integer overflow in the hash_int function of the libpspp library in GNU PSPP 0.10.5-pre2 (CVE-2017-10791).
  • There is a NULL Pointer Dereference in the function ll_insert() of the libpspp library in GNU PSPP 0.10.5-pre2 (CVE-2017-10792).
  • There is an illegal address access in the function output_hex() in data/data-out.c of the libpspp library in GNU PSPP 0.11.0 that will lead to remote denial of service (CVE-2017-12958).
  • There is a reachable assertion abort in the function dict_add_mrset() in data/dictionary.c of the libpspp library in GNU PSPP 0.11.0 that will lead to a remote denial of service attack (CVE-2017-12959).
  • There is a reachable assertion abort in the function dict_rename_var() in data/dictionary.c of the libpspp library in GNU PSPP 0.11.0 that will lead to remote denial of service (CVE-2017-12960).
  • There is an assertion abort in the function parse_attributes() in data/sys-file-reader.c of the libpspp library in GNU PSPP 0.11.0 that will lead to remote denial of service (CVE-2017-12961).
CVE-2017-10791 CVE-2017-10792 CVE-2017-12958 CVE-2017-12959 CVE-2017-12960 CVE-2017-12961 https://www.cvedetails.com/vulnerability-list/vendor_id-72/product_id-38732/year-2017/GNU-Pspp.html 2017-08-18 2017-08-22 2017-08-30
drupal -- Drupal Core - Multiple Vulnerabilities drupal8 8.3.7

Drupal Security Team:

CVE-2017-6923: Views - Access Bypass - Moderately Critical

CVE-2017-6924: REST API can bypass comment approval - Access Bypass - Moderately Critica

CVE-2017-6925: Entity access bypass for entities that do not have UUIDs or have protected revisions - Access Bypass - Critical

CVE-2017-6923 CVE-2017-6924 CVE-2017-6925 2017-08-16 2017-08-19
libsoup -- stack based buffer overflow libsoup 2.52.2_1

Tobias Mueller reports:

libsoup is susceptible to a stack based buffer overflow attack when using chunked encoding. Regardless of libsoup being used as a server or client.

http://seclists.org/oss-sec/2017/q3/304 CVE-2017-2885 2017-08-17 2017-08-17 2017-08-20
Zabbix -- Remote code execution zabbix2-server zabbix2-proxy 2.0.20 zabbix22-server zabbix22-proxy 2.2.19 zabbix3-server zabbix3-proxy 3.0.10 zabbix32-server zabbix32-proxy 3.2.7

mitre reports:

An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.

CVE-2017-2824 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824 https://support.zabbix.com/browse/ZBX-12349 2017-07-05 2017-08-16
Supervisord -- An authenticated client can run arbitrary shell commands via malicious XML-RPC requests py27-supervisor 3.3.3,1

mnaberez reports:

supervisord can be configured to run an HTTP server on a TCP socket and/or a Unix domain socket. The HTTP server is how supervisorctl communicates with supervisord. If an HTTP server has been enabled, it will always serve both HTML pages and an XML-RPC interface. A vulnerability has been found where an authenticated client can send a malicious XML-RPC request to supervisord that will run arbitrary shell commands on the server. The commands will be run as the same user as supervisord. Depending on how supervisord has been configured, this may be root.

This vulnerability can only be exploited by an authenticated client or if supervisord has been configured to run an HTTP server without authentication. If authentication has not been enabled, supervisord will log a message at the critical level every time it starts.

http://supervisord.org/changes.html https://github.com/Supervisor/supervisor/issues/964#issuecomment-317551606 CVE-2017-11610 2017-07-24 2017-08-15
FreeRadius -- Multiple vulnerabilities freeradius3 3.0.15

Guido Vranken reports:

Multiple vulnerabilities found via fuzzing: FR-GV-201 (v2,v3) Read / write overflow in make_secret() FR-GV-202 (v2) Write overflow in rad_coalesce() FR-GV-203 (v2) DHCP - Memory leak in decode_tlv() FR-GV-204 (v2) DHCP - Memory leak in fr_dhcp_decode() FR-GV-205 (v2) DHCP - Buffer over-read in fr_dhcp_decode_options() FR-GV-206 (v2,v3) DHCP - Read overflow when decoding option 63 FR-GV-207 (v2) Zero-length malloc in data2vp() FR-GV-301 (v3) Write overflow in data2vp_wimax() FR-GV-302 (v3) Infinite loop and memory exhaustion with 'concat' attributes FR-GV-303 (v3) DHCP - Infinite read in dhcp_attr2vp() FR-GV-304 (v3) DHCP - Buffer over-read in fr_dhcp_decode_suboptions() FR-GV-305 (v3) Decode 'signed' attributes correctly FR-AD-001 (v2,v3) Use strncmp() instead of memcmp() for string data FR-AD-002 (v3) String lifetime issues in rlm_python FR-AD-003 (v3) Incorrect statement length passed into sqlite3_prepare

http://freeradius.org/security/fuzzer-2017.html 2017-06-17 2017-08-14
Mercurial -- multiple vulnerabilities mercurial 4.3

Mercurial Release Notes:

CVE-2017-1000115

Mercurial's symlink auditing was incomplete prior to 4.3, and could be abused to write to files outside the repository.

CVE-2017-1000116

Mercurial was not sanitizing hostnames passed to ssh, allowing shell injection attacks on clients by specifying a hostname starting with -oProxyCommand. This is also present in Git (CVE-2017-1000117) and Subversion (CVE-2017-9800), so please patch those tools as well if you have them installed.

https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.3_.2F_4.3.1_.282017-08-10.29 CVE-2017-1000115 CVE-2017-1000116 2017-08-10 2017-08-12
subversion -- Arbitrary code execution vulnerability subversion 1.9.01.9.6 subversion18 1.0.01.8.18 subversion-static 1.0.01.8.18 1.9.01.9.6

subversion team reports:

A Subversion client sometimes connects to URLs provided by the repository. This happens in two primary cases: during 'checkout', 'export', 'update', and 'switch', when the tree being downloaded contains svn:externals properties; and when using 'svnsync sync' with one URL argument.

A maliciously constructed svn+ssh:// URL would cause Subversion clients to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server.

The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.

An exploit has been tested.

http://subversion.apache.org/security/CVE-2017-9800-advisory.txt 2017-08-10 2017-08-11
GitLab -- two vulnerabilities gitlab 7.9.08.17.8 9.0.09.0.12 9.1.09.1.9 9.2.09.2.9 9.3.09.3.9 9.4.09.4.3

GitLab reports:

Remote Command Execution in git client

An external code review performed by Recurity-Labs identified a remote command execution vulnerability in git that could be exploited via the "Repo by URL" import option in GitLab. The command line git client was not properly escaping command line arguments in URLs using the SSH protocol before invoking the SSH client. A specially crafted URL could be used to execute arbitrary shell commands on the GitLab server.
To fully patch this vulnerability two fixes were needed. The Omnibus versions of GitLab contain a patched git client. For source users who may still be running an older version of git, GitLab now also blocks import URLs containing invalid host and usernames.
This issue has been assigned CVE-2017-12426.

Improper sanitization of GitLab export files on import

GitLab versions 8.13.3, 8.12.8, 8.11.10, 8.10.13, and 8.9.12 contained a patch for a critical directory traversal vulnerability in the GitLab export feature that could be exploited by including symlinks in the export file and then re-importing it to a GitLab instance. This vulnerability was patched by checking for and removing symlinks in these files on import.
Recurity-Labs also determined that this fix did not properly remove symlinks for hidden files. Though not as dangerous as the original vulnerability hidden file symlinks could still be used to steal copies of git repositories belonging to other users if the path to the git repository was known by the attacker. An updated fix has been included in these releases that properly removes all symlinks.
This import option was not made available to non-admin users until GitLab 8.13.0.

https://about.gitlab.com/2017/08/10/gitlab-9-dot-4-dot-4-released/ CVE-2017-12426 2017-08-10 2017-08-11
PostgreSQL vulnerabilities postgresql92-server 9.2.09.2.22 postgresql93-server 9.3.09.3.18 postgresql94-server 9.4.09.4.13 postgresql95-server 9.5.09.5.8 postgresql96-server 9.6.09.6.4

The PostgreSQL project reports:

  • CVE-2017-7546: Empty password accepted in some authentication methods
  • CVE-2017-7547: The "pg_user_mappings" catalog view discloses passwords to users lacking server privileges
  • CVE-2017-7548: lo_put() function ignores ACLs
CVE-2017-7546 CVE-2017-7547 CVE-2017-7548 2017-08-10 2017-08-10
Flash Player -- multiple vulnerabilities linux-flashplayer 26.0.0.151

Adobe reports:

  • These updates resolve security bypass vulnerability that could lead to information disclosure (CVE-2017-3085).
  • These updates resolve type confusion vulnerability that could lead to remote code execution (CVE-2017-3106).
CVE-2017-3085 CVE-2017-3106 https://helpx.adobe.com/security/products/flash-player/apsb17-23.html 2017-08-08 2017-08-10
cURL -- multiple vulnerabilities curl 7.55.0

The cURL project reports:

  • FILE buffer read out of bounds
  • TFTP sends more than buffer size
  • URL globbing out of bounds read
https://curl.haxx.se/docs/security.html CVE-2017-1000099 CVE-2017-1000100 CVE-2017-1000101 2017-08-09 2017-08-09
Axis2 -- Security vulnerability on dependency Apache Commons FileUpload axis2 1.7.6

Apache Axis2 reports:

The commons-fileupload dependency has been updated to a version that fixes CVE-2016-1000031 (AXIS2-5853).

http://axis.apache.org/axis2/java/core/release-notes/1.7.6.html https://issues.apache.org/jira/browse/AXIS2-5853 https://issues.apache.org/jira/browse/FILEUPLOAD-279 CVE-2016-1000031 2016-11-14 2017-08-09
mozilla -- multiple vulnerabilities firefox 55.0,1 seamonkey linux-seamonkey 2.49.1 firefox-esr 52.3.0,1 linux-firefox 52.3.0,2 libxul thunderbird linux-thunderbird 52.3.0

Mozilla Foundation reports:

Please reference CVE/URL list for details

CVE-2017-7753 CVE-2017-7779 CVE-2017-7780 CVE-2017-7781 CVE-2017-7782 CVE-2017-7783 CVE-2017-7784 CVE-2017-7785 CVE-2017-7786 CVE-2017-7787 CVE-2017-7788 CVE-2017-7789 CVE-2017-7790 CVE-2017-7791 CVE-2017-7792 CVE-2017-7794 CVE-2017-7796 CVE-2017-7797 CVE-2017-7798 CVE-2017-7799 CVE-2017-7800 CVE-2017-7801 CVE-2017-7802 CVE-2017-7803 CVE-2017-7804 CVE-2017-7806 CVE-2017-7807 CVE-2017-7808 https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/ 2017-08-08 2017-08-08
sqlite3 -- heap-buffer overflow sqlite3 3.20.0

Google reports:

A heap-buffer overflow (sometimes a crash) can arise when running a SQL request on malformed sqlite3 databases.

https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937 CVE-2017-10989 2017-08-08 2017-08-08 2017-09-19
Varnish -- Denial of service vulnerability varnish4 4.0.14.0.5 4.1.04.1.8 varnish5 5.0.1 5.1.05.1.3

phk reports:

A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert.

https://varnish-cache.org/security/VSV00001.html 2017-08-02 2017-08-02
chromium -- multiple vulnerabilities chromium chromium-pulse 60.0.3112.78

Google Chrome releases reports:

40 security fixes in this release

Please reference CVE/URL list for details

CVE-2017-5091 CVE-2017-5092 CVE-2017-5093 CVE-2017-5094 CVE-2017-5095 CVE-2017-5096 CVE-2017-5097 CVE-2017-5098 CVE-2017-5099 CVE-2017-5100 CVE-2017-5101 CVE-2017-5102 CVE-2017-5103 CVE-2017-5104 CVE-2017-7000 CVE-2017-5105 CVE-2017-5106 CVE-2017-5107 CVE-2017-5108 CVE-2017-5109 CVE-2017-5110 https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html 2017-07-25 2017-08-01
Cacti -- Cross-site scripting (XSS) vulnerability in auth_profile.php cacti 1.1.13

kimiizhang reports:

Cross-site scripting (XSS) vulnerability in auth_profile.php in Cacti 1.1.13 allows remote authenticated users to inject arbitrary web script or HTML via specially crafted HTTP Referer headers.

https://github.com/Cacti/cacti/issues/867 https://www.cacti.net/release_notes.php?version=1.1.14 CVE-2017-11691 2017-07-20 2017-07-29
proftpd -- user chroot escape vulnerability proftpd 1.3.5e

NVD reports:

ProFTPD ... controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks control by replacing a path component (other than the last one) with a symbolic link.

http://bugs.proftpd.org/show_bug.cgi?id=4295 CVE-2017-7418 2017-03-06 2017-07-27
jabberd -- authentication bypass vulnerability jabberd 2.6.1

SecurityFocus reports:

JabberD is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks.

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867032 http://www.securityfocus.com/bid/99511 CVE-2017-10807 2017-07-03 2017-07-26
webkit2-gtk3 -- multiple vulnerabilities webkit2-gtk3 2.16.6

The Webkit gtk team reports:

Please reference CVE/URL list for details

https://webkitgtk.org/security/WSA-2017-0006.html CVE-2017-7006 CVE-2017-7011 CVE-2017-7012 CVE-2017-7018 CVE-2017-7019 CVE-2017-7020 CVE-2017-7030 CVE-2017-7034 CVE-2017-7037 CVE-2017-7038 CVE-2017-7039 CVE-2017-7040 CVE-2017-7041 CVE-2017-7042 CVE-2017-7043 CVE-2017-7046 CVE-2017-7048 CVE-2017-7049 CVE-2017-7052 CVE-2017-7055 CVE-2017-7056 CVE-2017-7059 CVE-2017-7061 CVE-2017-7064 2017-07-24 2017-07-25 2018-03-28
gsoap -- remote code execution via via overflow gsoap 2.8.47

Senrio reports:

Genivia gSOAP is prone to a stack-based buffer-overflow vulnerability because it fails to properly bounds check user-supplied data before copying it into an insufficiently sized buffer.

A remote attacker may exploit this issue to execute arbitrary code in the context of the affected device. Failed attempts will likely cause a denial-of-service condition.

http://www.securityfocus.com/bid/99868/discuss http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions http://blog.senr.io/devilsivy.html https://www.genivia.com/advisory.html#Security_advisory:_CVE-2017-9765_bug_in_certain_versions_of_gSOAP_2.7_up_to_2.8.47_%28June_21,_2017%29 https://www.genivia.com/changelog.html#Version_2.8.48_upd_%2806/21/2017%29 CVE-2017-9765 2017-07-18 2017-07-25
GitLab -- Various security issues gitlab 8.0.08.17.6 9.0.09.0.10 9.1.09.1.7 9.2.09.2.7 9.3.09.3.7

GitLab reports:

Please reference CVE/URL list for details

https://about.gitlab.com/2017/07/19/gitlab-9-dot-3-dot-8-released/ CVE-2017-11438 2017-07-20 2017-07-20 2017-08-15
MySQL -- multiple vulnerabilities mariadb55-server 5.5.57 mariadb100-server 10.0.32 mariadb101-server 10.1.26 mariadb102-server 10.2.6 mysql55-server 5.5.57 mysql56-server 5.6.37 mysql57-server 5.7.19 percona55-server 5.5.57 percona56-server 5.6.37 percona57-server 5.7.19

Oracle reports:

Please reference CVE/URL list for details

http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixMSQL CVE-2017-3529 CVE-2017-3633 CVE-2017-3634 CVE-2017-3635 CVE-2017-3636 CVE-2017-3637 CVE-2017-3638 CVE-2017-3639 CVE-2017-3640 CVE-2017-3641 CVE-2017-3642 CVE-2017-3643 CVE-2017-3644 CVE-2017-3645 CVE-2017-3646 CVE-2017-3647 CVE-2017-3648 CVE-2017-3649 CVE-2017-3650 CVE-2017-3651 CVE-2017-3652 CVE-2017-3653 2017-07-19 2017-07-19 2017-08-12
collectd5 -- Denial of service by sending a signed network packet to a server which is not set up to check signatures collectd5 5.7.2

marcinguy reports:

After sending this payload, collectd seems to be entering endless while() loop in packet_parse consuming high CPU resources, possibly crash/gets killed after a while.

https://github.com/collectd/collectd/issues/2174 CVE-2017-7401 2017-02-13 2017-07-19
strongswan -- multiple vulnerabilities strongswan 4.4.05.5.2

strongSwan security team reports:

  • RSA public keys passed to the gmp plugin aren't validated sufficiently before attempting signature verification, so that invalid input might lead to a floating point exception. [CVE-2017-9022]
  • ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when parsing X.509 certificates with extensions that use such types. This could lead to infinite looping of the thread parsing a specifically crafted certificate.
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9022).html CVE-2017-9022 https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9023).html CVE-2017-9023 2017-05-30 2017-07-19
Cacti -- Cross-site scripting (XSS) vulnerability in link.php cacti 1.0.01.1.13

kimiizhang reports:

Cross-site scripting (XSS) vulnerability in link.php in Cacti
1.1.12 allows remote anonymous users to inject arbitrary web
script or HTML via the id parameter.

https://github.com/Cacti/cacti/issues/838 https://www.cacti.net/release_notes.php?version=1.1.13 CVE-2017-10970 2017-07-05 2017-07-17
Apache httpd -- multiple vulnerabilities apache24 2.4.27

The Apache httpd project reports:

important: Read after free in mod_http2 (CVE-2017-9789)
When under stress, closing many connections, the HTTP/2 handling code would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.

important: Uninitialized memory reflection in mod_auth_digest (CVE-2017-9788)
The value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments. by mod_auth_digest.
Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault.

https://httpd.apache.org/security/vulnerabilities_24.html CVE-2017-9789 CVE-2017-9788 2017-07-11 2017-07-13
Flash Player -- multiple vulnerabilities linux-flashplayer 26.0.0.137

Adobe reports:

  • These updates resolve security bypass vulnerability that could lead to information disclosure (CVE-2017-3080).
  • These updates resolve memory corruption vulnerability that could lead to remote code execution (CVE-2017-3099).
  • These updates resolve memory corruption vulnerability that could lead to memory address disclosure (CVE-2017-3100).
CVE-2017-3080 CVE-2017-3099 CVE-2017-3100 https://helpx.adobe.com/security/products/flash-player/apsb17-21.html 2017-07-11 2017-07-13
samba -- Orpheus Lyre mutual authentication validation bypass samba42 4.2.15 samba43 4.3.14 samba44 4.4.15 samba45 4.5.12 samba46 4.6.6

The samba project reports:

A MITM attacker may impersonate a trusted server and thus gain elevated access to the domain by returning malicious replication or authorization data.

https://www.samba.org/samba/security/CVE-2017-11103.html CVE-2017-11103 2017-07-12 2017-07-12
node.js -- multiple vulnerabilities node 8.1.4 node4 4.8.4 node6 6.11.1

Updates are now available for all active Node.js release lines as well as the 7.x line. These include the fix for the high severity vulnerability identified in the initial announcement, one additional lower priority Node.js vulnerability in the 4.x release line, as well as some lower priority fixes for Node.js dependencies across the current release lines.

Constant Hashtable Seeds (CVE pending)

Node.js was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup. Thanks to Jann Horn of Google Project Zero for reporting this vulnerability.

This is a high severity vulnerability and applies to all active release lines (4.x, 6.x, 8.x) as well as the 7.x line.

http.get with numeric authorization options creates uninitialized buffers

Application code that allows the auth field of the options object used with http.get() to be set to a number can result in an uninitialized buffer being created/used as the authentication string.

This is a low severity defect and only applies to the 4.x release line.

https://nodejs.org/en/blog/vulnerability/july-2017-security-releases/ 2017-06-27 2017-07-12
nginx -- a specially crafted request might result in an integer overflow nginx 0.5.61.12.1,2 nginx-devel 0.5.61.13.3

Maxim Dounin reports:

A security issue was identified in nginx range filter. A specially crafted request might result in an integer overflow and incorrect processing of ranges, potentially resulting in sensitive information leak (CVE-2017-7529).

http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html CVE-2017-7529 2017-07-11 2017-07-11
codeigniter -- input validation bypass codeigniter 3.1.5

The CodeIgniter changelog reports:

Form Validation Library rule valid_email could be bypassed if idn_to_ascii() is available.

https://www.codeigniter.com/user_guide/changelog.html 2017-06-19 2017-07-08
irssi -- multiple vulnerabilities irssi 1.0.4,1

irssi reports:

When receiving messages with invalid time stamps, Irssi would try to dereference a NULL pointer.

While updating the internal nick list, Irssi may incorrectly use the GHashTable interface and free the nick while updating it. This will then result in use-after-free conditions on each access of the hash table.

https://irssi.org/security/irssi_sa_2017_07.txt CVE-2017-10965 CVE-2017-10966 ports/220544 2017-07-05 2017-07-08
oniguruma -- multiple vulnerabilities libevhtp 1.2.14 oniguruma4 4.7.2 oniguruma5 5.9.7 oniguruma6 6.4.0 php56-mbstring 5.6.31 php70-mbstring 7.0.21 php71-mbstring 7.1.7

the PHP project reports:

  • A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer (CVE-2017-9224).
  • A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption (CVE-2017-9226).
  • A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer (CVE-2017-9227).
  • A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption (CVE-2017-9228).
  • A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition (CVE-2017-9228).
http://php.net/ChangeLog-7.php CVE-2017-9224 CVE-2017-9226 CVE-2017-9227 CVE-2017-9228 CVE-2017-9228 2017-07-06 2017-07-07 2018-01-04
drupal -- Drupal Core - Multiple Vulnerabilities drupal7 7.56 drupal8 8.3.4

Drupal Security Team Reports:

CVE-2017-6920: PECL YAML parser unsafe object handling.

CVE-2017-6921: File REST resource does not properly validate

CVE-2017-6922: Files uploaded by anonymous users into a private file system can be accessed by other anonymous users.

CVE-2017-6920 CVE-2017-6921 CVE-2017-6922 2017-06-21 2017-07-06
Dropbear -- two vulnerabilities dropbear 2017.75

Matt Johnston reports:

Fix double-free in server TCP listener cleanup A double-free in the server could be triggered by an authenticated user if dropbear is running with -a (Allow connections to forwarded ports from any host) This could potentially allow arbitrary code execution as root by an authenticated user.

Fix information disclosure with ~/.ssh/authorized_keys symlink. Dropbear parsed authorized_keys as root, even if it were a symlink. The fix is to switch to user permissions when opening authorized_keys.

https://matt.ucc.asn.au/dropbear/CHANGES CVE-2017-9078 CVE-2017-9079 2017-05-18 2017-07-03
smarty3 -- shell injection in math smarty3 3.1.30

The smarty project reports:

bugfix {math} shell injection vulnerability

https://github.com/smarty-php/smarty/blob/v3.1.30/change_log.txt 2016-07-19 2017-07-03
libgcrypt -- side-channel attack on RSA secret keys libgcrypt 1.7.8

GnuPG reports:

Mitigate a flush+reload side-channel attack on RSA secret keys dubbed "Sliding right into disaster".

CVE-2017-7526 https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html 2017-06-29 2017-06-30
GitLab -- Various security issues gitlab 4.0.09.0.9 9.1.09.1.6 9.2.09.2.4

GitLab reports:

Please reference CVE/URL list for details

https://about.gitlab.com/2017/06/07/gitlab-9-dot-2-dot-5-security-release/ 2017-06-07 2017-06-30
tor -- security regression tor 0.3.0.9 tor-devel 0.3.1.4.a

The Tor Project reports:

Tor 0.3.0.9 fixes a path selection bug that would allow a client to use a guard that was in the same network family as a chosen exit relay. This is a security regression; all clients running earlier versions of 0.3.0.x or 0.3.1.x should upgrade to 0.3.0.9 or 0.3.1.4-alpha.

https://blog.torproject.org/blog/tor-0309-released-security-update-clients https://blog.torproject.org/blog/tor-0314-alpha-released-security-update-clients https://lists.torproject.org/pipermail/tor-announce/2017-June/000133.html CVE-2017-0377 2017-06-29 2017-06-30
exim -- Privilege escalation via multiple memory leaks exim 4.89_1

Qualsys reports:

Exim supports the use of multiple "-p" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000369 2017-06-19 2017-06-21
pear-Horde_Image -- DoS vulnerability pear-Horde_Image 2.3.02.5.0

Michael J Rubinsky reports:

The second vulnerability (CVE-2017-9773) is a DOS vulnerability. This only affects Horde installations that do not have a configured image handling backend, and thus use the "Null" image driver. It is exploitable by a logged in user clicking on a maliciously crafted URL.

https://lists.horde.org/archives/announce/2017/001234.html CVE-2017-9773 2017-06-21 2017-06-21
pear-Horde_Image -- remote code execution vulnerability pear-Horde_Image 2.0.02.5.0

Michael J Rubinsky reports:

The fist vulnerability (CVE-2017-9774) is a Remote Code Execution vulnerability and is exploitable by a logged in user sending a maliciously crafted GET request to the Horde server.

https://lists.horde.org/archives/announce/2017/001234.html CVE-2017-9774 2017-06-21 2017-06-21
OpenVPN -- several vulnerabilities openvpn 2.3.17 2.4.02.4.3 openvpn-mbedtls 2.4.3 openvpn-polarssl 2.3.17

Samuli Seppänen reports:

In May/June 2017 Guido Vranken threw a fuzzer at OpenVPN 2.4.2. In the process he found several vulnerabilities and reported them to the OpenVPN project. [...] The first releases to have these fixes are OpenVPN 2.4.3 and 2.3.17.

This is a list of fixed important vulnerabilities:

  • Remotely-triggerable ASSERT() on malformed IPv6 packet
  • Pre-authentication remote crash/information disclosure for clients
  • Potential double-free in --x509-alt-username
  • Remote-triggerable memory leaks
  • Post-authentication remote DoS when using the --x509-track option
  • Null-pointer dereference in establish_http_proxy_passthru()
https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243 CVE-2017-7508 CVE-2017-7512 CVE-2017-7520 CVE-2017-7521 CVE-2017-7522 2017-05-19 2017-06-21
Apache httpd -- several vulnerabilities apache22 2.2.33 apache24 2.4.26

The Apache httpd project reports:

  • ap_get_basic_auth_pw() Authentication Bypass (CVE-2017-3167):
    Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
  • mod_ssl Null Pointer Dereference (CVE-2017-3169):
    mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
  • mod_http2 Null Pointer Dereference (CVE-2017-7659):
    A maliciously constructed HTTP/2 request could cause mod_http2 to dereference a NULL pointer and crash the server process.
  • ap_find_token() Buffer Overread (CVE-2017-7668):
    The HTTP strict parsing changes added in 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
  • mod_mime Buffer Overread (CVE-2017-7679):
    mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/security/vulnerabilities_22.html CVE-2017-3167 CVE-2017-3169 CVE-2017-7659 CVE-2017-7668 CVE-2017-7679 2017-06-20 2017-06-20
chromium -- multiple vulnerabilities chromium chromium-pulse 59.0.3071.104

Google Chrome releases reports:

5 security fixes in this release, including:

  • [725032] High CVE-2017-5087: Sandbox Escape in IndexedDB. Reported by Ned Williamson on 2017-05-22
  • [729991] High CVE-2017-5088: Out of bounds read in V8. Reported by Xiling Gong of Tencent Security Platform Department on 2017-06-06
  • [714196] Medium CVE-2017-5089: Domain spoofing in Omnibox. Reported by Michal Bentkowski on 2017-04-21
  • [732498] Various fixes from internal audits, fuzzing and other initiatives
CVE-2017-5087 CVE-2017-5088 CVE-2017-5089 https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop_15.html 2017-06-15 2017-06-16
cURL -- URL file scheme drive letter buffer overflow curl 7.53.07.54.1

cURL security advisory:

When libcurl is given either

1. a file: URL that doesn't use two slashes following the colon, or

2. is told that file is the default scheme to use for URLs without scheme

... and the given path starts with a drive letter and libcurl is built for Windows or DOS, then libcurl would copy the path with a wrong offset, so that the end of the given path would write beyond the malloc buffer. Up to seven bytes too much.

We are not aware of any exploit of this flaw.

CVE-2017-9502 https://curl.haxx.se/docs/adv_20170614.html 2017-06-14 2017-06-15
rt and dependent modules -- multiple security vulnerabilities rt42 4.2.04.2.13_1 rt44 4.4.04.4.1_1 p5-RT-Authen-ExternalAuth 0.90.27

BestPractical reports:

Please reference CVE/URL list for details

http://lists.bestpractical.com/pipermail/rt-announce/2017-June/000297.html CVE-2015-7686 CVE-2016-6127 CVE-2017-5361 CVE-2017-5943 CVE-2017-5944 2017-06-15 2017-06-15
Flash Player -- multiple vulnerabilities linux-flashplayer 26.0.0.126

Adobe reports:

  • These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2017-3075, CVE-2017-3081, CVE-2017-3083, CVE-2017-3084).
  • These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2017-3076, CVE-2017-3077, CVE-2017-3078, CVE-2017-3079, CVE-2017-3082).
CVE-2017-3075 CVE-2017-3076 CVE-2017-3077 CVE-2017-3078 CVE-2017-3079 CVE-2017-3081 CVE-2017-3082 CVE-2017-3083 CVE-2017-3084 https://helpx.adobe.com/security/products/flash-player/apsb17-17.html 2017-06-13 2017-06-15
mozilla -- multiple vulnerabilities firefox 54.0,1 seamonkey linux-seamonkey 2.49.1 firefox-esr 52.2.0,1 linux-firefox 52.2.0,2 libxul thunderbird linux-thunderbird 52.2.0

Mozilla Foundation reports:

Please reference CVE/URL list for details

CVE-2017-5470 CVE-2017-5471 CVE-2017-5472 CVE-2017-7749 CVE-2017-7750 CVE-2017-7751 CVE-2017-7752 CVE-2017-7754 CVE-2017-7755 CVE-2017-7756 CVE-2017-7757 CVE-2017-7758 CVE-2017-7759 CVE-2017-7760 CVE-2017-7761 CVE-2017-7762 CVE-2017-7763 CVE-2017-7764 CVE-2017-7765 CVE-2017-7766 CVE-2017-7767 CVE-2017-7768 CVE-2017-7778 https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/ https://www.mozilla.org/en-US/security/advisories/mfsa2017-16/ 2017-06-13 2017-06-13 2017-09-19
roundcube -- arbitrary password resets roundcube 1.2.5,1

Roundcube reports:

Roundcube Webmail allows arbitrary password resets by authenticated users. The problem is caused by an improperly restricted exec call in the virtualmin and sasl drivers of the password plugin.

https://roundcube.net/news/2017/04/28/security-updates-1.2.5-1.1.9-and-1.0.11 CVE-2017-8114 2017-04-28 2017-06-09
GnuTLS -- Denial of service vulnerability gnutls 3.5.13

The GnuTLS project reports:

It was found using the TLS fuzzer tools that decoding a status response TLS extension with valid contents could lead to a crash due to a null pointer dereference. The issue affects GnuTLS server applications.

https://gnutls.org/security.html#GNUTLS-SA-2017-4 2017-06-07 2017-06-08
irssi -- remote DoS irssi 1.0.3

Joseph Bisch reports:

When receiving a DCC message without source nick/host, Irssi would attempt to dereference a NULL pointer.

When receiving certain incorrectly quoted DCC files, Irssi would try to find the terminating quote one byte before the allocated memory.

CVE-2017-9468 CVE-2017-9469 https://irssi.org/security/irssi_sa_2017_06.txt 2017-06-06 2017-06-08
chromium -- multiple vulnerabilities chromium chromium-pulse 59.0.3071.86

Google Chrome releases reports:

30 security fixes in this release

Please reference CVE/URL list for details

CVE-2017-5070 CVE-2017-5071 CVE-2017-5072 CVE-2017-5073 CVE-2017-5074 CVE-2017-5075 CVE-2017-5086 CVE-2017-5076 CVE-2017-5077 CVE-2017-5078 CVE-2017-5079 CVE-2017-5080 CVE-2017-5081 CVE-2017-5082 CVE-2017-5083 CVE-2017-5085 https://chromereleases.googleblog.com/2017/06/stable-channel-update-for-desktop.html 2017-06-05 2017-06-06
ansible -- Input validation flaw in jinja2 templating system ansible 2.3.1

RedHat security team reports:

An input validation flaw was found in Ansible, where it fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, result in code execution.

https://access.redhat.com/security/cve/cve-2017-7481 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7481 2017-05-09 2017-06-02
duo -- Two-factor authentication bypass duo 1.9.21

The duo security team reports:

An untrusted user may be able to set the http_proxy variable to an invalid address. If this happens, this will trigger the configured 'failmode' behavior, which defaults to safe. Safe mode causes the authentication to report a success.

https://duo.com/labs/psa/duo-psa-2017-002 2017-05-19 2017-06-01
FreeRADIUS -- TLS resumption authentication bypass freeradius freeradius2 freeradius3 3.0.14

Stefan Winter reports:

The TLS session cache in FreeRADIUS before 3.0.14 fails to reliably prevent resumption of an unauthenticated session, which allows remote attackers (such as malicious 802.1X supplicants) to bypass authentication via PEAP or TTLS.

CVE-2017-9148 http://freeradius.org/security.html http://seclists.org/oss-sec/2017/q2/342 http://www.securityfocus.com/bid/98734 2017-02-03 2017-06-01
heimdal -- bypass of capath policy heimdal 7.1.0_3

Viktor Dukhovni reports:

Commit f469fc6 (2010-10-02) inadvertently caused the previous hop realm to not be added to the transit path of issued tickets. This may, in some cases, enable bypass of capath policy in Heimdal versions 1.5 through 7.2. Note, this may break sites that rely on the bug. With the bug some incomplete [capaths] worked, that should not have. These may now break authentication in some cross-realm configurations. (CVE-2017-6594)

CVE-2017-6594 ports/219657 2017-04-13 2017-05-31
FreeBSD -- ipfilter(4) fragment handling panic FreeBSD-kernel 11.011.0_10 10.310.3_19

Problem Description:

ipfilter(4), capable of stateful packet inspection, using the "keep state" or "keep frags" rule options, will not only maintain the state of connections, such as TCP streams or UDP communication, it also maintains the state of fragmented packets. When a packet fragments are received they are cached in a hash table (and linked list). When a fragment is received it is compared with fragments already cached in the hash table for a match. If it does not match the new entry is used to create a new entry in the hash table. If on the other hand it does match, unfortunately the wrong entry is freed, the entry in the hash table. This results in use after free panic (and for a brief moment prior to the panic a memory leak due to the wrong entry being freed).

Impact:

Carefully feeding fragments that are allowed to pass by an ipfilter(4) firewall can be used to cause a panic followed by reboot loop denial of service attack.

CVE-2017-1081 SA-17:04.ipfilter 2017-04-27 2017-05-26
FreeBSD -- Multiple vulnerabilities of ntp FreeBSD 11.011.0_9 10.310.3_18

Problem Description:

A vulnerability was discovered in the NTP server's parsing of configuration directives. [CVE-2017-6464]

A vulnerability was found in NTP, in the parsing of packets from the DPTS Clock. [CVE-2017-6462]

A vulnerability was discovered in the NTP server's parsing of configuration directives. [CVE-2017-6463]

A vulnerability was found in NTP, affecting the origin timestamp check function. [CVE-2016-9042]

Impact:

A remote, authenticated attacker could cause ntpd to crash by sending a crafted message. [CVE-2017-6463, CVE-2017-6464]

A malicious device could send crafted messages, causing ntpd to crash. [CVE-2017-6462]

An attacker able to spoof messages from all of the configured peers could send crafted packets to ntpd, causing later replies from those peers to be discarded, resulting in denial of service. [CVE-2016-9042]

CVE-2016-9042 CVE-2017-6462 CVE-2017-6463 CVE-2017-6464 SA-17:03.ntp 2017-04-12 2017-05-26
vlc -- remote code execution via crafted subtitles vlc 2.2.6,4 vlc-qt4 2.2.6,4

Check Point research team reports:

Remote code execution via crafted subtitles

http://blog.checkpoint.com/2017/05/23/hacked-in-translation/ 2017-05-23 2017-05-26
OpenEXR -- multiple remote code execution and denial of service vulnerabilities OpenEXR 2.2.1

Brandon Perry reports:

[There] is a zip file of EXR images that cause segmentation faults in the OpenEXR library (tested against 2.2.0).

  • CVE-2017-9110 In OpenEXR 2.2.0, an invalid read of size 2 in the hufDecode function in ImfHuf.cpp could cause the application to crash.
  • CVE-2017-9111 In OpenEXR 2.2.0, an invalid write of size 8 in the storeSSE function in ImfOptimizedPixelReading.h could cause the application to crash or execute arbitrary code.
  • CVE-2017-9112 In OpenEXR 2.2.0, an invalid read of size 1 in the getBits function in ImfHuf.cpp could cause the application to crash.
  • CVE-2017-9113 In OpenEXR 2.2.0, an invalid write of size 1 in the bufferedReadPixels function in ImfInputFile.cpp could cause the application to crash or execute arbitrary code.
  • CVE-2017-9114 In OpenEXR 2.2.0, an invalid read of size 1 in the refill function in ImfFastHuf.cpp could cause the application to crash.
  • CVE-2017-9115 In OpenEXR 2.2.0, an invalid write of size 2 in the = operator function in half.h could cause the application to crash or execute arbitrary code.
  • CVE-2017-9116 In OpenEXR 2.2.0, an invalid read of size 1 in the uncompress function in ImfZip.cpp could cause the application to crash.
http://www.openwall.com/lists/oss-security/2017/05/12/5 CVE-2017-9110 CVE-2017-9111 CVE-2017-9112 CVE-2017-9113 CVE-2017-9114 CVE-2017-9115 CVE-2017-9116 https://github.com/openexr/openexr/issues/232 2017-01-12 2017-05-25
ImageMagick -- multiple vulnerabilities ImageMagick ImageMagick-nox11 6.9.6.4_2,1 6.9.7.0,16.9.8.8,1 ImageMagick7 ImageMagick7-nox11 7.0.5.9

Please reference CVE/URL list for details

https://nvd.nist.gov/vuln/search/results?query=ImageMagick CVE-2017-5506 CVE-2017-5507 CVE-2017-5508 CVE-2017-5509 CVE-2017-5510 CVE-2017-5511 CVE-2017-6497 CVE-2017-6498 CVE-2017-6499 CVE-2017-6500 CVE-2017-6501 CVE-2017-6502 CVE-2017-7275 CVE-2017-7606 CVE-2017-7619 CVE-2017-7941 CVE-2017-7942 CVE-2017-7943 CVE-2017-8343 CVE-2017-8344 CVE-2017-8345 CVE-2017-8346 CVE-2017-8347 CVE-2017-8348 CVE-2017-8349 CVE-2017-8350 CVE-2017-8351 CVE-2017-8352 CVE-2017-8353 CVE-2017-8354 CVE-2017-8355 CVE-2017-8356 CVE-2017-8357 CVE-2017-8765 CVE-2017-8830 CVE-2017-9141 CVE-2017-9142 CVE-2017-9143 CVE-2017-9144 2017-03-05 2017-05-25 2017-05-29
samba -- remote code execution vulnerability samba42 4.2.15 samba43 4.3.14 samba44 4.4.14 samba45 4.5.10 samba46 4.6.4

The samba project reports:

Remote code execution from a writable share.

All versions of Samba from 3.5.0 onwards are vulnerable to a remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.

https://www.samba.org/samba/security/CVE-2017-7494.html CVE-2017-7494 2017-05-24 2017-05-24
NVIDIA UNIX driver -- multiple vulnerabilities in the kernel mode layer handler nvidia-driver 375.66

NVIDIA Unix security team reports:

NVIDIA GPU Display Driver contains vulnerabilities in the kernel mode layer handler where not correctly validated user input, NULL pointer dereference, and incorrect access control may lead to denial of service or potential escalation of privileges.

CVE-2017-0350 CVE-2017-0351 CVE-2017-0352 http://nvidia.custhelp.com/app/answers/detail/a_id/4462 2017-05-15 2017-05-23
miniupnpc -- integer signedness error miniupnpc 2.0.20170509

Tintinweb reports:

An integer signedness error was found in miniupnp's miniwget allowing an unauthenticated remote entity typically located on the local network segment to trigger a heap corruption or an access violation in miniupnp's http response parser when processing a specially crafted chunked-encoded response to a request for the xml root description url.

CVE-2017-8798 https://github.com/tintinweb/pub/tree/master/pocs/cve-2017-8798 2017-05-09 2017-05-22
Wordpress -- multiple vulnerabilities wordpress fr-wordpress 4.7.5,1 de-wordpress ja-wordpress ru-wordpress zh-wordpress-zh_CN zh-wordpress-zh_TW 4.7.5

WordPress versions 4.7.4 and earlier are affected by six security issues

  • Insufficient redirect validation in the HTTP class.
  • Improper handling of post meta data values in the XML-RPC API.
  • Lack of capability checks for post meta data in the XML-RPC API.
  • A Cross Site Request Forgery (CRSF) vulnerability was discovered in the filesystem credentials dialog.
  • A cross-site scripting (XSS) vulnerability was discovered related to the Customizer.
https://wordpress.org/news/2017/05/wordpress-4-7-5/ 2017-05-16 2017-05-21
asterisk -- Memory exhaustion on short SCCP packets asterisk13 13.15.1

The Asterisk project reports:

A remote memory exhaustion can be triggered by sending an SCCP packet to Asterisk system with "chan_skinny" enabled that is larger than the length of the SCCP header but smaller than the packet length specified in the header. The loop that reads the rest of the packet doesn't detect that the call to read() returned end-of-file before the expected number of bytes and continues infinitely. The "partial data" message logging in that tight loop causes Asterisk to exhaust all available memory.

http://downloads.asterisk.org/pub/security/AST-2017-004.html 2017-04-13 2017-05-19
asterisk -- Buffer Overrun in PJSIP transaction layer asterisk13 13.15.1 pjsip 2.6_1 pjsip-extsrtp 2.6_1

The Asterisk project reports:

A remote crash can be triggered by sending a SIP packet to Asterisk with a specially crafted CSeq header and a Via header with no branch parameter. The issue is that the PJSIP RFC 2543 transaction key generation algorithm does not allocate a large enough buffer. By overrunning the buffer, the memory allocation table becomes corrupted, leading to an eventual crash.

The multi-part body parser in PJSIP contains a logical error that can make certain multi-part body parts attempt to read memory from outside the allowed boundaries. A specially-crafted packet can trigger these invalid reads and potentially induce a crash.

This issues is in PJSIP, and so the issue can be fixed without performing an upgrade of Asterisk at all. However, we are releasing a new version of Asterisk with the bundled PJProject updated to include the fix.

If you are running Asterisk with chan_sip, this issue does not affect you.

http://downloads.asterisk.org/pub/security/AST-2017-002.html http://downloads.asterisk.org/pub/security/AST-2017-003.html 2017-04-12 2017-05-19
Joomla3 -- SQL Injection joomla3 3.7.0

JSST reports:

Inadequate filtering of request data leads to a SQL Injection vulnerability.

CVE-2017-8917 https://developer.joomla.org/security-centre/692-20170501-core-sql-injection.html 2017-05-11 2017-05-18
gitlab -- Various security issues gitlab 6.6.08.17.5 9.0.09.0.6 9.1.09.1.2

GitLab reports:

Please reference CVE/URL list for details

https://about.gitlab.com/2017/05/08/gitlab-9-dot-1-dot-3-security-release/ 2017-05-08 2017-05-18 2017-05-30
gitlab -- Various security issues gitlab 8.7.08.15.7 8.16.08.16.7 8.17.08.17.3

GitLab reports:

Information Disclosure in Issue and Merge Request Trackers

During an internal code review a critical vulnerability in the GitLab Issue and Merge Request trackers was discovered. This vulnerability could allow a user with access to assign ownership of an issue or merge request to another user to disclose that user's private token, email token, email address, and encrypted OTP secret. Reporter-level access to a GitLab project is required to exploit this flaw.

SSRF when importing a project from a Repo by URL

GitLab instances that have enabled project imports using "Repo by URL" were vulnerable to Server-Side Request Forgery attacks. By specifying a project import URL of localhost an attacker could target services that are bound to the local interface of the server. These services often do not require authentication. Depending on the service an attacker might be able craft an attack using the project import request URL.

Links in Environments tab vulnerable to tabnabbing

edio via HackerOne reported that user-configured Environment links include target=_blank but do not also include rel: noopener noreferrer. Anyone clicking on these links may therefore be subjected to tabnabbing attacks where a link back to the requesting page is maintained and can be manipulated by the target server.

Accounts with email set to "Do not show on profile" have addresses exposed in public atom feed

Several GitLab users reported that even with "Do not show on profile" configured for their email addresses those addresses were still being leaked in Atom feeds if they commented on a public project.

CVE-2017-0882 https://about.gitlab.com/2017/03/20/gitlab-8-dot-17-dot-4-security-release/ 2017-03-20 2017-05-18 2017-05-30
freetype2 -- buffer overflows freetype2 2.8

Werner Lemberg reports:

CVE-2017-8105, CVE-2017-8287: Older FreeType versions have out-of-bounds writes caused by heap-based buffer overflows related to Type 1 fonts.

http://lists.nongnu.org/archive/html/freetype-announce/2017-05/msg00000.html CVE-2017-8105 CVE-2017-8287 2017-05-17 2017-05-17
OpenVPN -- two remote denial-of-service vulnerabilities openvpn 2.3.15 2.4.02.4.2 openvpn23 2.3.15 openvpn-mbedtls 2.4.02.4.2 openvpn-polarssl 2.3.15 openvpn23-polarssl 2.3.15

Samuli Seppänen reports:

OpenVPN v2.4.0 was audited for security vulnerabilities independently by Quarkslabs (funded by OSTIF) and Cryptography Engineering (funded by Private Internet Access) between December 2016 and April 2017. The primary findings were two remote denial-of-service vulnerabilities. Fixes to them have been backported to v2.3.15.

An authenticated client can do the 'three way handshake' (P_HARD_RESET, P_HARD_RESET, P_CONTROL), where the P_CONTROL packet is the first that is allowed to carry payload. If that payload is too big, the OpenVPN server process will stop running due to an ASSERT() exception. That is also the reason why servers using tls-auth/tls-crypt are protected against this attack - the P_CONTROL packet is only accepted if it contains the session ID we specified, with a valid HMAC (challenge-response). (CVE-2017-7478)

An authenticated client can cause the server's the packet-id counter to roll over, which would lead the server process to hit an ASSERT() and stop running. To make the server hit the ASSERT(), the client must first cause the server to send it 2^32 packets (at least 196 GB).

https://openvpn.net/index.php/open-source/downloads.html CVE-2017-7478 CVE-2017-7479 https://community.openvpn.net/openvpn/wiki/QuarkslabAndCryptographyEngineerAudits https://ostif.org/?p=870&preview=true https://www.privateinternetaccess.com/blog/2017/05/openvpn-2-4-2-fixes-critical-issues-discovered-openvpn-audit-reports/ 2017-05-10 2017-05-11
PostgreSQL vulnerabilities postgresql92-client 9.2.09.2.20 postgresql93-client 9.3.09.3.16 postgresql94-client 9.4.09.4.11 postgresql95-client 9.5.09.5.6 postgresql96-client 9.6.09.6.2 postgresql92-server 9.2.09.2.20 postgresql93-server 9.3.09.3.16 postgresql94-server 9.4.09.4.11 postgresql95-server 9.5.09.5.6 postgresql96-server 9.6.09.6.2

The PostgreSQL project reports:

Security Fixes nested CASE expressions + database and role names with embedded special characters

  • CVE-2017-7484: selectivity estimators bypass SELECT privilege checks.
  • CVE-2017-7485: libpq ignores PGREQUIRESSL environment variable
  • CVE-2017-7486: pg_user_mappings view discloses foreign server passwords. This applies to new databases, see the release notes for the procedure to apply the fix to an existing database.
CVE-2016-5423 CVE-2016-5424 2017-05-11 2017-05-11
kauth: Local privilege escalation kdelibs 4.14.30_4 kf5-kauth 5.33.0_1

Albert Astals Cid reports:

KAuth contains a logic flaw in which the service invoking dbus is not properly checked. This allows spoofing the identity of the caller and with some carefully crafted calls can lead to gaining root from an unprivileged account.

CVE-2017-8422 http://www.openwall.com/lists/oss-security/2017/05/10/3 https://www.kde.org/info/security/advisory-20170510-1.txt 2017-05-10 2017-05-10
libetpan -- null dereference vulnerability in MIME parsing component libetpan 1.8

rwhitworth reports:

I was using American Fuzzy Lop (afl-fuzz) to fuzz input to the mime-parse test program. Is fixing these crashes something you're interested in? The input files can be found here: https://github.com/rwhitworth/libetpan-fuzz/. The files can be executed as ./mime-parse id_filename to cause seg faults.

CVE-2017-8825 http://cve.circl.lu/cve/CVE-2017-8825 2017-04-29 2017-05-09
chromium -- race condition vulnerability chromium 58.0.3029.96

Google Chrome Releases reports:

1 security fix in this release:

CVE-2017-5068 https://chromereleases.googleblog.com/2017/05/stable-channel-update-for-desktop.html 2017-05-02 2017-05-03
dovecot -- Dovecot DoS when passdb dict was used for authentication dovecot dovecot2 2.2.25_62.2.29

Timo Sirainen reports:

passdb/userdb dict: Don't double-expand %variables in keys. If dict was used as the authentication passdb, using specially crafted %variables in the username could be used to cause DoS.

CVE-2017-2669 https://dovecot.org/list/dovecot-news/2017-April/000341.html https://dovecot.org/list/dovecot-news/2017-April/000342.html 2016-12-01 2017-04-30
LibreSSL -- TLS verification vulnerability libressl 2.5.12.5.3_1 libressl-devel 2.5.12.5.3_1

Jakub Jirutka reports:

LibreSSL 2.5.1 to 2.5.3 lacks TLS certificate verification if SSL_get_verify_result is relied upon for a later check of a verification result, in a use case where a user-provided verification callback returns 1, as demonstrated by acceptance of invalid certificates by nginx.

http://seclists.org/oss-sec/2017/q2/145 https://github.com/libressl-portable/portable/issues/307 CVE-2017-8301 2017-04-27 2017-04-28
jenkins -- multiple vulnerabilities jenkins 2.57 jenkins-lts 2.46.2

Jenkins Security Advisory:

Description

SECURITY-412 through SECURITY-420 / CVE-2017-1000356

CSRF: Multiple vulnerabilities

SECURITY-429 / CVE-2017-1000353

CLI: Unauthenticated remote code execution

SECURITY-466 / CVE-2017-1000354

CLI: Login command allowed impersonating any Jenkins user

SECURITY-503 / CVE-2017-1000355

XStream: Java crash when trying to instantiate void/Void

CVE-2017-1000356 CVE-2017-1000353 CVE-2017-1000354 CVE-2017-1000355 https://jenkins.io/security/advisory/2017-04-26/ 2017-04-26 2017-04-27
codeigniter -- multiple vulnerabilities codeigniter 3.1.4

The CodeIgniter changelog reports:

Fixed a header injection vulnerability in common function set_status_header() under Apache (thanks to Guillermo Caminer from Flowgate).

Fixed byte-safety issues in Encrypt Library (DEPRECATED) when mbstring.func_overload is enabled.

Fixed byte-safety issues in Encryption Library when mbstring.func_overload is enabled.

Fixed byte-safety issues in compatibility functions password_hash(), hash_pbkdf2() when mbstring.func_overload is enabled.

Updated Encrypt Library (DEPRECATED) to call mcrypt_create_iv() with MCRYPT_DEV_URANDOM.

https://www.codeigniter.com/user_guide/changelog.html 2017-03-23 2017-04-25
weechat -- multiple vulnerabilities weechat 1.7.1

Common Vulnerabilities and Exposures:

WeeChat before 1.7.1 allows a remote crash by sending a filename via DCC to the IRC plugin. This occurs in the irc_ctcp_dcc_filename_without_quotes function during quote removal, with a buffer overflow.

https://weechat.org/download/security/ CVE-2017-8073 2017-04-23 2017-04-24
drupal8 -- Drupal Core - Critical - Access Bypass drupal8 8.3.1

Drupal Security Team Reports:

CVE-2017-6919: Access bypass

CVE-2017-6919 2017-04-19 2017-04-21
chromium -- multiple vulnerabilities chromium chromium-pulse 58.0.3029.81

Google Chrome Releases reports:

29 security fixes in this release, including:

  • [695826] High CVE-2017-5057: Type confusion in PDFium. Credit to Guang Gong of Alpha Team, Qihoo 360
  • [694382] High CVE-2017-5058: Heap use after free in Print Preview. Credit to Khalil Zhani
  • [684684] High CVE-2017-5059: Type confusion in Blink. Credit to SkyLined working with Trend Micro's Zero Day Initiative
  • [683314] Medium CVE-2017-5060: URL spoofing in Omnibox. Credit to Xudong Zheng
  • [672847] Medium CVE-2017-5061: URL spoofing in Omnibox. Credit to Haosheng Wang (@gnehsoah)
  • [702896] Medium CVE-2017-5062: Use after free in Chrome Apps. Credit to anonymous
  • [700836] Medium CVE-2017-5063: Heap overflow in Skia. Credit to Sweetchip
  • [693974] Medium CVE-2017-5064: Use after free in Blink. Credit to Wadih Matar
  • [704560] Medium CVE-2017-5065: Incorrect UI in Blink. Credit to Khalil Zhani
  • [690821] Medium CVE-2017-5066: Incorrect signature handing in Networking. Credit to Prof. Zhenhua Duan, Prof. Cong Tian, and Ph.D candidate Chu Chen (ICTT, Xidian University)
  • [648117] Medium CVE-2017-5067: URL spoofing in Omnibox. Credit to Khalil Zhani
  • [691726] Low CVE-2017-5069: Cross-origin bypass in Blink. Credit to Michael Reizelman
  • [713205] Various fixes from internal audits, fuzzing and other initiatives
CVE-2017-5057 CVE-2017-5058 CVE-2017-5059 CVE-2017-5060 CVE-2017-5061 CVE-2017-5062 CVE-2017-5063 CVE-2017-5064 CVE-2017-5065 CVE-2017-5066 CVE-2017-5067 CVE-2017-5069 https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html 2017-04-19 2017-04-21
icu -- multiple vulnerabilities icu 58.2_2,1 linux-c6-icu linux-c7-icu 59.0

NVD reports:

International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_setNativeIndex* function.

International Components for Unicode (ICU) for C/C++ before 2017-02-13 has an out-of-bounds write caused by a heap-based buffer overflow related to the utf8TextAccess function in common/utext.cpp and the utext_moveIndex32* function.

CVE-2017-7867 CVE-2017-7868 http://bugs.icu-project.org/trac/changeset/39671 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=437 2017-01-21 2017-04-20 2017-05-04
tiff -- multiple vulnerabilities tiff linux-f8-tiff linux-f10-tiff linux-c6-tiff linux-c7-tiff 4.0.8

NVD reports:

Please reference CVE/URL list for details

CVE-2017-5225 CVE-2017-7592 CVE-2017-7593 CVE-2017-7594 CVE-2017-7595 CVE-2017-7596 CVE-2017-7597 CVE-2017-7598 CVE-2017-7599 CVE-2017-7600 CVE-2017-7601 CVE-2017-7602 https://github.com/vadz/libtiff/commit/5c080298d59e https://github.com/vadz/libtiff/commit/48780b4fcc42 https://github.com/vadz/libtiff/commit/d60332057b95 https://github.com/vadz/libtiff/commit/2ea32f7372b6 https://github.com/vadz/libtiff/commit/8283e4d1b7e5 https://github.com/vadz/libtiff/commit/47f2fb61a3a6 https://github.com/vadz/libtiff/commit/3cfd62d77c2a https://github.com/vadz/libtiff/commit/3144e57770c1 https://github.com/vadz/libtiff/commit/0a76a8c765c7 https://github.com/vadz/libtiff/commit/66e7bd595209 2017-04-01 2017-04-20
libsamplerate -- multiple vulnerabilities libsamplerate linux-c6-libsamplerate linux-c7-libsamplerate 0.1.9

NVD reports:

In libsamplerate before 0.1.9, a buffer over-read occurs in the calc_output_single function in src_sinc.c via a crafted audio file.

CVE-2017-7697 https://github.com/erikd/libsamplerate/commit/c3b66186656d 2017-04-11 2017-04-20
libsndfile -- multiple vulnerabilities libsndfile linux-c6-libsndfile linux-c7-libsndfile 1.0.28_2

NVD reports:

In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.

In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.

In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with write memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.

In libsndfile before 1.0.28, an error in the "flac_buffer_copy()" function (flac.c) can be exploited to cause a segmentation violation (with read memory access) via a specially crafted FLAC file during a resample attempt, a similar issue to CVE-2017-7585.

CVE-2017-7585 CVE-2017-7586 CVE-2017-7741 CVE-2017-7742 https://github.com/erikd/libsndfile/commit/60b234301adf https://github.com/erikd/libsndfile/commit/708e996c87c5 https://github.com/erikd/libsndfile/commit/f457b7b5ecfe https://github.com/erikd/libsndfile/commit/60b234301adf 2017-04-07 2017-04-20
cURL -- TLS session resumption client cert bypass (again) curl 7.52.07.54.0

cURL security advisory:

libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate).

libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster.

This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range.

CVE-2017-7468 https://curl.haxx.se/docs/adv_20170419.html 2017-04-19 2017-04-20
graphite2 -- out-of-bounds write with malicious font graphite2 1.3.9_1 linux-c7-graphite2 1.3.10

Mozilla Foundation reports:

An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products.

CVE-2017-5436 https://github.com/silnrsi/graphite/commit/1ce331d5548b 2017-04-19 2017-04-19 2017-04-20
libevent -- multiple vulnerabilities libevent libevent2 linux-c6-libevent2 linux-c7-libevent 2.1.6

Debian Security reports:

CVE-2016-10195: The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read.

CVE-2016-10196: Stack-based buffer overflow in the evutil_parse_sockaddr_port function in evutil.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (segmentation fault) via vectors involving a long string in brackets in the ip_as_string argument.

CVE-2016-10197: The search_make_new function in evdns.c in libevent before 2.1.6-beta allows attackers to cause a denial of service (out-of-bounds read) via an empty hostname.

CVE-2016-10195 CVE-2016-10196 CVE-2016-10197 http://www.openwall.com/lists/oss-security/2017/01/31/17 https://github.com/libevent/libevent/issues/317 https://github.com/libevent/libevent/issues/318 https://github.com/libevent/libevent/issues/332 https://github.com/libevent/libevent/issues/335 2017-01-31 2017-04-19
NSS -- multiple vulnerabilities nss linux-f10-nss linux-c6-nss linux-c7-nss 3.303.30.1 3.293.29.5 3.223.28.4 3.21.4

Mozilla Foundation reports:

An out-of-bounds write during Base64 decoding operation in the Network Security Services (NSS) library due to insufficient memory being allocated to the buffer. This results in a potentially exploitable crash. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.29.5.

A flaw in DRBG number generation within the Network Security Services (NSS) library where the internal state V does not correctly carry bits over. The NSS library has been updated to fix this issue to address this issue and Firefox 53 has been updated with NSS version 3.29.5.

CVE-2017-5461 CVE-2017-5462 https://hg.mozilla.org/projects/nss/rev/99a86619eac9 https://hg.mozilla.org/projects/nss/rev/e126381a3c29 2017-03-17 2017-04-19
mozilla -- multiple vulnerabilities firefox 53.0_2,1 seamonkey linux-seamonkey 2.49.1 firefox-esr 46.0,152.1.0_2,1 45.9.0,1 linux-firefox 46.0,252.1.0,2 45.9.0,2 libxul 46.052.1.0 45.9.0 thunderbird linux-thunderbird 46.052.1.0 45.9.0

Mozilla Foundation reports:

Please reference CVE/URL list for details

CVE-2017-5433 CVE-2017-5435 CVE-2017-5436 CVE-2017-5461 CVE-2017-5459 CVE-2017-5466 CVE-2017-5434 CVE-2017-5432 CVE-2017-5460 CVE-2017-5438 CVE-2017-5439 CVE-2017-5440 CVE-2017-5441 CVE-2017-5442 CVE-2017-5464 CVE-2017-5443 CVE-2017-5444 CVE-2017-5446 CVE-2017-5447 CVE-2017-5465 CVE-2017-5448 CVE-2017-5437 CVE-2017-5454 CVE-2017-5455 CVE-2017-5456 CVE-2017-5469 CVE-2017-5445 CVE-2017-5449 CVE-2017-5450 CVE-2017-5451 CVE-2017-5462 CVE-2017-5463 CVE-2017-5467 CVE-2017-5452 CVE-2017-5453 CVE-2017-5458 CVE-2017-5468 CVE-2017-5430 CVE-2017-5429 https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/ https://www.mozilla.org/en-US/security/advisories/mfsa2017-11/ https://www.mozilla.org/en-US/security/advisories/mfsa2017-12/ 2017-04-19 2017-04-19 2017-09-19
MySQL -- multiple vulnerabilities mariadb55-server 5.5.55 mariadb100-server 10.0.31 mariadb101-server 10.1.23 mysql55-server 5.5.55 mysql56-server 5.6.36 mysql57-server 5.7.18

Oracle reports:

This Critical Patch Update contains 39 new security fixes for Oracle MySQL. 11 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.

http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html CVE-2017-3308 CVE-2017-3309 CVE-2017-3450 CVE-2017-3599 CVE-2017-3329 CVE-2017-3600 CVE-2017-3331 CVE-2017-3453 CVE-2017-3452 CVE-2017-3454 CVE-2017-3455 CVE-2017-3305 CVE-2017-3460 CVE-2017-3456 CVE-2017-3458 CVE-2017-3457 CVE-2017-3459 CVE-2017-3463 CVE-2017-3462 CVE-2017-3461 CVE-2017-3464 CVE-2017-3465 CVE-2017-3467 CVE-2017-3468 2017-04-19 2017-04-19
BIND -- multiple vulnerabilities bind99 9.9.9P8 bind910 9.10.4P8 bind911 9.11.0P5 bind9-devel 9.12.0.a.2017.03.25

ISC reports:

A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate.

An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met.

Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which records occurred in an unusual order.

named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc.

A regression introduced in a recent feature change has created a situation under which some versions of named can be caused to exit with a REQUIRE assertion failure if they are sent a null command string.

CVE-2017-3136 CVE-2017-3137 CVE-2017-3138 https://kb.isc.org/article/AA-01465/0 https://kb.isc.org/article/AA-01466/0 https://kb.isc.org/article/AA-01471/0 2017-04-12 2017-04-13 2017-04-13
id Tech 3 -- remote code execution vulnerability ioquake3 1.36_16 ioquake3-devel g2930 iourbanterror 4.3.2,1 openarena 0.8.8.s1910_3,1

The content auto-download of id Tech 3 can be used to deliver maliciously crafted content, that triggers downloading of further content and loading and executing it as native code with user credentials. This affects ioquake3, ioUrbanTerror, OpenArena, the original Quake 3 Arena and other forks.

CVE-2017-6903 https://ioquake3.org/2017/03/13/important-security-update-please-update-ioquake3-immediately/ 2017-03-14 2017-04-07
xen-kernel -- broken check in memory_exchange() permits PV guest breakout xen-kernel 4.7.2_1

The Xen Project reports:

The XSA-29 fix introduced an insufficient check on XENMEM_exchange input, allowing the caller to drive hypervisor memory accesses outside of the guest provided input/output arrays.

A malicious or buggy 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks.

CVE-2017-7228 https://xenbits.xen.org/xsa/advisory-212.html 2017-04-04 2017-04-06
cURL -- potential memory disclosure curl 6.57.53.1_1

The cURL project reports:

There were two bugs in curl's parser for the command line option --write-out (or -w for short) that would skip the end of string zero byte if the string ended in a % (percent) or \ (backslash), and it would read beyond that buffer in the heap memory and it could then potentially output pieces of that memory to the terminal or the target file etc..

This flaw only exists in the command line tool.

We are not aware of any exploit of this flaw.

https://curl.haxx.se/docs/adv_20170403.html CVE-2017-7407 2017-04-03 2017-04-05 2017-04-06
django -- multiple vulnerabilities py27-django py33-django py34-django py35-django py36-django 1.8.18 py27-django18 py33-django18 py34-django18 py35-django18 py36-django18 1.8.18 py27-django19 py33-django19 py34-django19 py35-django19 py36-django19 1.9.13 py27-django110 py33-django110 py34-django110 py35-django110 py36-django110 1.10.7

Django team reports:

These release addresses two security issues detailed below. We encourage all users of Django to upgrade as soon as possible.

  • Open redirect and possible XSS attack via user-supplied numeric redirect URLs
  • Open redirect vulnerability in django.views.static.serve()
https://www.djangoproject.com/weblog/2017/apr/04/security-releases/ CVE-2017-7233 CVE-2017-7234 2017-04-04 2017-04-04
asterisk -- Buffer overflow in CDR's set user asterisk13 13.14.1

The Asterisk project reports:

No size checking is done when setting the user field on a CDR. Thus, it is possible for someone to use an arbitrarily large string and write past the end of the user field storage buffer. This allows the possibility of remote code injection.

http://downloads.asterisk.org/pub/security/AST-2017-001.html https://issues.asterisk.org/jira/browse/ASTERISK-26897 2017-03-27 2017-04-04
NVIDIA UNIX driver -- multiple vulnerabilities in the kernel mode layer handler nvidia-driver 375.39 nvidia-driver-340 340.102 nvidia-driver-304 304.135

NVIDIA Unix security team reports:

NVIDIA GPU Display Driver contains vulnerabilities in the kernel mode layer handler where multiple integer overflows, improper access control, and improper validation of a user input may cause a denial of service or potential escalation of privileges.

CVE-2017-0309 CVE-2017-0310 CVE-2017-0311 CVE-2017-0318 CVE-2017-0321 http://nvidia.custhelp.com/app/answers/detail/a_id/4398 2017-02-14 2017-04-04
chromium -- multiple vulnerabilities chromium chromium-npapi chromium-pulse 57.0.2987.133

Google Chrome Releases reports:

5 security fixes in this release, including:

  • [698622] Critical CVE-2017-5055: Use after free in printing. Credit to Wadih Matar
  • [699166] High CVE-2017-5054: Heap buffer overflow in V8. Credit to Nicolas Trippar of Zimperium zLabs
  • [662767] High CVE-2017-5052: Bad cast in Blink. Credit to JeongHoon Shin
  • [705445] High CVE-2017-5056: Use after free in Blink. Credit to anonymous
  • [702058] High CVE-2017-5053: Out of bounds memory access in V8. Credit to Team Sniper (Keen Lab and PC Mgr) reported through ZDI (ZDI-CAN-4587)
CVE-2017-5055 CVE-2017-5054 CVE-2017-5052 CVE-2017-5056 CVE-2017-5053 https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop_29.html 2017-03-29 2017-03-30
xen-tools -- xenstore denial of service via repeated update xen-tools 4.7.2_1

The Xen Project reports:

Unprivileged guests may be able to stall progress of the control domain or driver domain, possibly leading to a Denial of Service (DoS) of the entire host.

http://xenbits.xen.org/xsa/advisory-206.html 2017-03-28 2017-03-30
phpMyAdmin -- bypass 'no password' restriction phpMyAdmin 4.7.0

The phpMyAdmin team reports:

Summary

Bypass $cfg['Servers'][$i]['AllowNoPassword']

Description

A vulnerability was discovered where the restrictions caused by $cfg['Servers'][$i]['AllowNoPassword'] = false are bypassed under certain PHP versions. This can allow the login of users who have no password set even if the administrator has set $cfg['Servers'][$i]['AllowNoPassword'] to false (which is also the default).

This behavior depends on the PHP version used (it seems PHP 5 is affected, while PHP 7.0 is not).

Severity

We consider this vulnerability to be of moderate severity.

Mitigation factor

Set a password for all users.

https://www.phpmyadmin.net/security/PMASA-2017-8/ 2017-03-28 2017-03-29
samba -- symlink race allows access outside share definition samba36 3.6.03.6.25_4 samba4 4.0.04.0.26 samba41 4.1.04.1.23 samba42 4.2.04.2.14 samba43 4.3.04.3.13 samba44 4.4.04.4.12 samba45 4.5.04.5.7 samba46 4.6.04.6.1

Samba team reports:

A time-of-check, time-of-use race condition can allow clients to access non-exported parts of the file system via symlinks.

https://www.samba.org/samba/security/CVE-2017-2619.html CVE-2017-2619 2017-03-23 2017-03-24
xen-tools -- Cirrus VGA Heap overflow via display refresh xen-tools 4.7.2

The Xen Project reports:

A privileged user within the guest VM can cause a heap overflow in the device model process, potentially escalating their privileges to that of the device model process.

CVE-2016-9603 http://xenbits.xen.org/xsa/advisory-211.html 2017-03-14 2017-03-23
irssi -- use-after-free potential code execution irssi 0.8.21,11.0.2,1

The irssi project reports:

Use after free while producing list of netjoins (CWE-416). This issue was found and reported to us by APic. This issue usually leads to segmentation faults. Targeted code execution should be difficult.

https://irssi.org/security/irssi_sa_2017_03.txt CVE-2017-7191 2017-03-11 2017-03-18
mysql -- denial of service vulnerability mariadb55-client 5.5.54 mariadb100-client 10.0.30 mariadb101-client 10.1.22 mysql55-client 5.5.54 mysql56-client 5.6.21 mysql57-client 5.7.5

Openwall reports:

C client library for MySQL (libmysqlclient.so) has use-after-free defect which can cause crash of applications using that MySQL client.

http://www.openwall.com/lists/oss-security/2017/02/11/11 CVE-2017-3302 2017-01-27 2017-03-18
firefox -- integer overflow in createImageBitmap() firefox 52.0.1,1

The Mozilla Foundation reports:

An integer overflow in createImageBitmap() was reported through the Pwn2Own contest. The fix for this vulnerability disables the experimental extensions to the createImageBitmap API. This function runs in the content sandbox, requiring a second vulnerability to compromise a user's computer.

CVE-2017-5428 https://www.mozilla.org/security/advisories/mfsa2017-08/ 2017-03-17 2017-03-18
moodle -- multiple vulnerabilities moodle29 2.9.9 moodle30 3.0.9 moodle31 3.1.5 moodle32 3.2.2

Marina Glancy reports:

In addition to a number of bug fixes and small improvements, security vulnerabilities have been discovered and fixed. We highly recommend that you upgrade your sites as soon as possible. Upgrading should be very straightforward. As per our usual policy, admins of all registered Moodle sites will be notified of security issue details directly via email and we'll publish details more widely in a week.

https://moodle.org/news/#p1408104 2017-03-13 2017-03-18
moodle -- multiple vulnerabilities moodle29 2.9.9 moodle30 3.0.8 moodle31 3.1.4 moodle32 3.2.1

Marina Glancy reports:

  • MSA-17-0001: System file inclusion when adding own preset file in Boost theme

  • MSA-17-0002: Incorrect sanitation of attributes in forums

  • MSA-17-0003: PHPMailer vulnerability in no-reply address

  • MSA-17-0004: XSS in assignment submission page

CVE-2017-2576 CVE-2017-2578 CVE-2016-10045 https://moodle.org/security/ 2017-01-17 2017-03-18 2020-06-24
drupal8 -- multiple vulnerabilities drupal8 8.2.7

Drupal Security Team reports:

CVE-2017-6377: Editor module incorrectly checks access to inline private files

CVE-2017-6379: Some admin paths were not protected with a CSRF token

CVE-2017-6381: Remote code execution

CVE-2017-6377 CVE-2017-6379 CVE-2017-6381 https://www.drupal.org/SA-2017-001 2017-03-15 2017-03-17
PuTTY -- integer overflow permits memory overwrite by forwarded ssh-agent connections putty 0.68

Simon G. Tatham reports:

Many versions of PuTTY prior to 0.68 have a heap-corrupting integer overflow bug in the ssh_agent_channel_data function which processes messages sent by remote SSH clients to a forwarded agent connection. [...]

This bug is only exploitable at all if you have enabled SSH agent forwarding, which is turned off by default. Moreover, an attacker able to exploit this bug would have to have already be able to connect to the Unix-domain socket representing the forwarded agent connection. Since any attacker with that capability would necessarily already be able to generate signatures with your agent's stored private keys, you should in normal circumstances be defended against this vulnerability by the same precautions you and your operating system were already taking to prevent untrusted people from accessing your SSH agent.

http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html CVE-2017-6542 2017-01-29 2017-03-16
Flash Player -- multiple vulnerabilities linux-flashplayer 25.0.0.127

Adobe reports:

  • These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2017-2997).
  • These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2017-2998, CVE-2017-2999).
  • These updates resolve a random number generator vulnerability used for constant blinding that could lead to information disclosure (CVE-2017-3000).
  • These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2017-3001, CVE-2017-3002, CVE-2017-3003).
CVE-2017-2997 CVE-2017-2998 CVE-2017-2999 CVE-2017-3000 CVE-2017-3001 CVE-2017-3002 CVE-2017-3003 https://helpx.adobe.com/security/products/flash-player/apsb17-07.html 2017-03-14 2017-03-16
mbed TLS (PolarSSL) -- multiple vulnerabilities mbedtls 2.4.2 polarssl13 1.3.19

Janos Follath reports:

  • If a malicious peer supplies a certificate with a specially crafted secp224k1 public key, then an attacker can cause the server or client to attempt to free block of memory held on stack. Depending on the platform, this could result in a Denial of Service (client crash) or potentially could be exploited to allow remote code execution with the same privileges as the host application.
  • If the client and the server both support MD5 and the client can be tricked to authenticate to a malicious server, then the malicious server can impersonate the client. To launch this man in the middle attack, the adversary has to compute a chosen-prefix MD5 collision in real time. This is very expensive computationally, but can be practical. Depending on the platform, this could result in a Denial of Service (client crash) or potentially could be exploited to allow remote code execution with the same privileges as the host application.
  • A bug in the logic of the parsing of a PEM encoded Certificate Revocation List in mbedtls_x509_crl_parse() can result in an infinite loop. In versions before 1.3.10 the same bug results in an infinite recursion stack overflow that usually crashes the application. Methods and means of acquiring the CRLs is not part of the TLS handshake and in the strict TLS setting this vulnerability cannot be triggered remotely. The vulnerability cannot be triggered unless the application explicitly calls mbedtls_x509_crl_parse() or mbedtls_x509_crl_parse_file()on a PEM formatted CRL of untrusted origin. In which case the vulnerability can be exploited to launch a denial of service attack against the application.
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-01 2017-03-11 2017-03-12
chromium -- multiple vulnerabilities chromium chromium-npapi chromium-pulse 57.0.2987.98

Google Chrome Releases reports:

36 security fixes in this release

Please reference CVE/URL list for details

CVE-2017-5030 CVE-2017-5031 CVE-2017-5032 CVE-2017-5029 CVE-2017-5034 CVE-2017-5035 CVE-2017-5036 CVE-2017-5037 CVE-2017-5039 CVE-2017-5040 CVE-2017-5041 CVE-2017-5033 CVE-2017-5042 CVE-2017-5038 CVE-2017-5043 CVE-2017-5044 CVE-2017-5045 CVE-2017-5046 https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html 2017-03-09 2017-03-12
Several Security Defects in the Bouncy Castle Crypto APIs bouncycastle15 1.511.56

The Legion of the Bouncy Castle reports:

Release: 1.56

2.1.4 Security Related Changes and CVE's Addressed by this Release: (multiple)

ports/215507 https://www.bouncycastle.org/releasenotes.html 2016-12-23 2017-03-12
kde-runtime -- kdesu: displayed command truncated by unicode string terminator kde-runtime 4.14.3_5

Albert Aastals Cid reports:

A maliciously crafted command line for kdesu can result in the user only seeing part of the commands that will actually get executed as super user.

CVE-2016-7787 http://www.openwall.com/lists/oss-security/2016/09/29/7 https://www.kde.org/info/security/advisory-20160930-1.txt 2016-09-30 2017-03-11
kdepimlibs -- directory traversal on KTNEF kdepimlibs 4.14.10_7

Albert Aastals Cid reports:

A directory traversal issue was found in KTNEF which can be exploited by tricking a user into opening a malicious winmail.dat file. The issue allows to write files with the permission of the user opening the winmail.dat file during extraction.

https://www.kde.org/info/security/advisory-20170227-1.txt 2017-02-27 2017-03-11
kio: Information Leak when accessing https when using a malicious PAC file kdelibs 4.14.29_10 kf5-kio 5.31.0_1

Albert Astals Cid reports:

Using a malicious PAC file, and then using exfiltration methods in the PAC function FindProxyForURL() enables the attacker to expose full https URLs.

This is a security issue since https URLs may contain sensitive information in the URL authentication part (user:password@host), and in the path and the query (e.g. access tokens).

This attack can be carried out remotely (over the LAN) since proxy settings allow "Detect Proxy Configuration Automatically". This setting uses WPAD to retrieve the PAC file, and an attacker who has access to the victim's LAN can interfere with the WPAD protocols (DHCP/DNS+HTTP) and inject his/her own malicious PAC instead of the legitimate one.

https://www.kde.org/info/security/advisory-20170228-1.txt 2017-02-28 2017-03-11
wordpress -- multiple vulnerabilities wordpress 4.7.3,1 de-wordpress ja-wordpress ru-wordpress zh-wordpress-zh_CN zh-wordpress-zh_TW 4.7.3

WordPress versions 4.7.2 and earlier are affected by six security issues.

  • Cross-site scripting (XSS) via media file metadata.
  • Control characters can trick redirect URL validation.
  • Unintended files can be deleted by administrators using the plugin deletion functionality.
  • Cross-site scripting (XSS) via video URL in YouTube embeds.
  • Cross-site scripting (XSS) via taxonomy term names.
  • Cross-site request forgery (CSRF) in Press This leading to excessive use of server resources.
http://www.openwall.com/lists/oss-security/2017/03/07/3 https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/ 2017-03-07 2017-03-07
mozilla -- multiple vulnerabilities firefox 52.0_1,1 seamonkey linux-seamonkey 2.49 firefox-esr 46.0,152.0,1 45.8.0_1,1 linux-firefox 46.0,252.0,2 45.8.0_1,2 libxul 46.052.0 45.8.0_1 thunderbird linux-thunderbird 46.052.0 45.8.0

Mozilla Foundation reports:

Please reference CVE/URL list for details

CVE-2017-5400 CVE-2017-5401 CVE-2017-5402 CVE-2017-5403 CVE-2017-5404 CVE-2017-5406 CVE-2017-5407 CVE-2017-5410 CVE-2017-5411 CVE-2017-5409 CVE-2017-5408 CVE-2017-5412 CVE-2017-5413 CVE-2017-5414 CVE-2017-5415 CVE-2017-5416 CVE-2017-5417 CVE-2017-5425 CVE-2017-5426 CVE-2017-5427 CVE-2017-5418 CVE-2017-5419 CVE-2017-5420 CVE-2017-5405 CVE-2017-5421 CVE-2017-5422 CVE-2017-5399 CVE-2017-5398 https://www.mozilla.org/security/advisories/mfsa2017-05/ https://www.mozilla.org/security/advisories/mfsa2017-06/ 2017-03-07 2017-03-07
codeigniter -- multiple vulnerabilities codeigniter 3.1.3

The CodeIgniter changelog reports:

Fixed an XSS vulnerability in Security Library method xss_clean().

Fixed a possible file inclusion vulnerability in Loader Library method vars().

Fixed a possible remote code execution vulnerability in the Email Library when ‘mail’ or ‘sendmail’ are used (thanks to Paul Buonopane from NamePros).

Added protection against timing side-channel attacks in Security Library method csrf_verify().

Added protection against BREACH attacks targeting the CSRF token field generated by Form Helper function form_open().

https://www.codeigniter.com/user_guide/changelog.html 2017-01-09 2017-03-05
ikiwiki -- authentication bypass vulnerability ikiwiki 3.20170111

ikiwiki reports:

The ikiwiki maintainers discovered further flaws similar to CVE-2016-9646 in the passwordauth plugin's use of CGI::FormBuilder, with a more serious impact:

An attacker who can log in to a site with a password can log in as a different and potentially more privileged user.

An attacker who can create a new account can set arbitrary fields in the user database for that account

CVE-2017-0356 https://ikiwiki.info/security/#index48h2 2017-01-11 2017-03-05
ikiwiki -- multiple vulnerabilities ikiwiki 3.20161229

Mitre reports:

ikiwiki 3.20161219 does not properly check if a revision changes the access permissions for a page on sites with the git and recentchanges plugins and the CGI interface enabled, which allows remote attackers to revert certain changes by leveraging permissions to change the page before the revision was made.

When CGI::FormBuilder->field("foo") is called in list context (and in particular in the arguments to a subroutine that takes named arguments), it can return zero or more values for foo from the CGI request, rather than the expected single value. This breaks the usual Perl parsing convention for named arguments, similar to CVE-2014-1572 in Bugzilla (which was caused by a similar API design issue in CGI.pm).

CVE-2016-10026 CVE-2016-9645 CVE-2016-9646 https://ikiwiki.info/security/#index46h2 https://ikiwiki.info/security/#index47h2 2016-12-19 2017-03-05
potrace -- multiple memory failure potrace 1.13

potrace reports:

CVE-2016-8685: invalid memory access in findnext

CVE-2016-8686: memory allocation failure

https://sourceforge.net/p/potrace/news/2017/02/potrace-114-released/ CVE-2016-8685 CVE-2016-8686 2016-10-15 2017-02-28
MPD -- buffer overflows in http output musicpd 0.20.5

The MPD project reports:

httpd: fix two buffer overflows in IcyMetaData length calculation

http://git.musicpd.org/cgit/master/mpd.git/plain/NEWS?h=v0.20.5 2017-02-18 2017-02-26
cURL -- ocsp status validation error curl 7.52.07.53.0

The cURL project reports:

SSL_VERIFYSTATUS ignored
curl and libcurl support "OCSP stapling", also known as the TLS Certificate Status Request extension (using the CURLOPT_SSL_VERIFYSTATUS option). When telling curl to use this feature, it uses that TLS extension to ask for a fresh proof of the server's certificate's validity. If the server doesn't support the extension, or fails to provide said proof, curl is expected to return an error.
Due to a coding mistake, the code that checks for a test success or failure, ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. Contrary to how it used to function and contrary to how this feature is documented to work.
This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality.

https://curl.haxx.se/docs/adv_20170222.html CVE-2017-2629 2017-02-22 2017-02-22
xen-tools -- cirrus_bitblt_cputovideo does not check if memory region is safe xen-tools 4.7.1_4

The Xen Project reports:

In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo fails to check whether the specified memory region is safe. A malicious guest administrator can cause an out of bounds memory write, very likely exploitable as a privilege escalation.

CVE-2017-2620 http://xenbits.xen.org/xsa/advisory-209.html 2017-02-21 2017-02-22
fbsdmon -- information disclosure vulnerability fbsdmon 0

Alan Somers reports:

The web site used by this port, http://fbsdmon.org, has been taken over by cybersquatters. That means that users are sending their system info to an unknown party.

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=217099 2017-02-14 2017-02-21
wavpack -- multiple invalid memory reads wavpack 5.1.0

David Bryant reports:

global buffer overread in read_code / read_words.c

heap out of bounds read in WriteCaffHeader / caff.c

heap out of bounds read in unreorder_channels / wvunpack.c

heap oob read in read_new_config_info / open_utils.c

http://www.openwall.com/lists/oss-security/2017/01/23/4 CVE-2016-10169 CVE-2016-10170 CVE-2016-10171 CVE-2016-10172 https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc 2017-01-21 2017-02-18
optipng -- multiple vulnerabilities optipng 0.7.6

ifread.c in gif2png, as used in OptiPNG before 0.7.6, allows remote attackers to cause a denial of service (uninitialized memory read) via a crafted GIF file.

The bmp_read_rows function in pngxtern/pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (invalid memory write and crash) via a series of delta escapes in a crafted BMP image.

Heap-based buffer overflow in the bmp_read_rows function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file.

Off-by-one error in the bmp_rle4_fread function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file, which triggers a heap-based buffer overflow.

CVE-2015-7802 CVE-2016-2191 CVE-2016-3981 CVE-2016-3982 2015-10-09 2017-02-16
openssl -- crash on handshake openssl-devel 1.1.0e

The OpenSSL project reports:

Severity: High
During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL to crash (dependent on ciphersuite). Both clients and servers are affected.
This issue does not affect OpenSSL version 1.0.2.

https://www.openssl.org/news/secadv/20170216.txt CVE-2017-3733 2017-02-16 2017-02-16
diffoscope -- arbitrary file write py34-diffoscope py35-diffoscope py36-diffoscope 6776

Ximin Luo reports:

[v67] introduced a security hole where diffoscope may write to arbitrary locations on disk depending on the contents of an untrusted archive.

CVE-2017-0359 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854723 2017-02-09 2017-02-14 2017-02-16
ffmpeg -- heap overflow in lavf/mov.c ffmpeg 3.2.4,1 mythtv mythtv-frontend 29.1,1

FFmpeg security reports:

FFmpeg 3.2.4 fixes the following vulnerabilities: CVE-2017-5024, CVE-2017-5025

CVE-2017-5024 https://www.ffmpeg.org/security.html https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html CVE-2017-5025 https://www.ffmpeg.org/security.html https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html 2017-01-25 2017-02-12 2018-03-25
gtk-vnc -- bounds checking vulnerabilities gtk-vnc 0.7.0

Daniel P. Berrange reports:

CVE-2017-5884 - fix bounds checking for RRE, hextile and copyrect encodings

CVE-2017-5885 - fix color map index bounds checking.

https://mail.gnome.org/archives/ftp-release-list/2017-February/msg00015.html CVE-2017-5884 CVE-2017-5885 2017-02-09 2017-02-11
xen-tools -- oob access in cirrus bitblt copy xen-tools 4.7.1_2

The Xen Project reports:

When doing bitblt copy backwards, qemu should negate the blit width. This avoids an oob access before the start of video memory.

A malicious guest administrator can cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation.

CVE-2017-2615 http://xenbits.xen.org/xsa/advisory-208.html 2017-02-10 2017-02-11
tiff -- multiple vulnerabilities tiff 4.0.7 linux-c6-libtiff linux-c6-tiff 3.9.4_5 linux-c7-libtiff linux-c7-tiff 4.0.3_3

libtiff project reports:

Multiple flaws have been discovered in libtiff library and utilities.

http://simplesystems.org/libtiff/v4.0.7.html CVE-2016-9533 CVE-2016-9534 CVE-2016-9535 CVE-2015-8870 CVE-2016-5652 CVE-2016-9540 CVE-2016-9537 CVE-2016-9536 2016-11-19 2017-02-06
mantis -- XSS vulnerability mantis 1.2.19

wdollman reports:

The value of the view_type parameter on the view_all_bug_page.php page is not encoded before being displayed on the page.

https://mantisbt.org/bugs/view.php?id=21611 CVE-2016-6837 ports/216662 2016-08-15 2017-02-04
guile2 -- multiple vulnerabilities guile2 2.0.13

Ludovic Courtès reports:

The REPL server is vulnerable to the HTTP inter-protocol attack

The ‘mkdir’ procedure of GNU Guile, an implementation of the Scheme programming language, temporarily changed the process’ umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions.

http://www.openwall.com/lists/oss-security/2016/10/11/1 http://www.openwall.com/lists/oss-security/2016/10/12/2 CVE-2016-8605 CVE-2016-8606 ports/216663 2016-10-12 2017-02-04
chicken -- multiple vulnerabilities chicken 4.12,1

Peter Bex reports:

A buffer overflow error was found in the POSIX unit's procedures process-execute and process-spawn.

Additionally, a memory leak existed in this code, which would be triggered when an error is raised during argument and environment processing.

Irregex versions before 0.9.6 contain a resource exhaustion vulnerability: when compiling deeply nested regexes containing the "+" operator due to exponential expansion behaviour.

http://lists.nongnu.org/archive/html/chicken-announce/2016-08/msg00001.html CVE-2016-6830 CVE-2016-6831 CVE-2016-9954 ports/216661 2016-08-12 2017-02-04 2017-03-05
libebml -- multiple vulnerabilities libebml 1.3.3

Mortiz Bunkus reports:

Multiple invalid memory accesses vulnerabilities.

https://lists.matroska.org/pipermail/matroska-users/2015-October/006985.html CVE-2015-8789 CVE-2015-8790 CVE-2015-8791 ports/216659 2015-10-20 2017-02-04
freeimage -- code execution vulnerability freeimage 3.16.0_4

TALOS reports:

An exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library.

http://www.talosintelligence.com/reports/TALOS-2016-0189/ CVE-2016-5684 ports/216657 2016-10-03 2017-02-04 2018-04-14
shotwell -- failure to encrypt authentication shotwell 0.24.5

Jens Georg reports:

I have just released Shotwell 0.24.5 and 0.25.4 which turn on HTTPS encryption all over the publishing plugins.

Users using Tumblr and Yandex.Fotki publishing are strongly advised to change their passwords and reauthenticate Shotwell to those services after upgrade.

Users of Picasa and Youtube publishing are strongly advised to reauthenticate (Log out and back in) Shotwell to those services after upgrade.

https://mail.gnome.org/archives/shotwell-list/2017-January/msg00048.html 2017-01-31 2017-02-01
jenkins -- multiple vulnerabilities jenkins 2.44 jenkins-lts 2.32.2

Jenkins Security Advisory:

Please reference CVE/URL list for details

CVE-2017-2598 CVE-2017-2599 CVE-2017-2600 CVE-2011-4969 CVE-2017-2601 CVE-2015-0886 CVE-2017-2602 CVE-2017-2603 CVE-2017-2604 CVE-2017-2605 CVE-2017-2606 CVE-2017-2607 CVE-2017-2608 CVE-2017-2609 CVE-2017-2610 CVE-2017-2611 CVE-2017-2612 CVE-2017-2613 https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2017-02-01 2017-02-01 2017-02-01
wordpress -- multiple vulnerabilities wordpress 4.7.2,1 de-wordpress ja-wordpress ru-wordpress zh-wordpress-zh_CN zh-wordpress-zh_TW 4.7.2

Aaron D. Campbell reports:

WordPress versions 4.7.1 and earlier are affected by three security issues:

  • The user interface for assigning taxonomy terms in Press This is shown to users who do not have permissions to use it.
  • WP_Query is vulnerable to a SQL injection (SQLi) when passing unsafe data. WordPress core is not directly vulnerable to this issue, but we’ve added hardening to prevent plugins and themes from accidentally causing a vulnerability.
  • A cross-site scripting (XSS) vulnerability was discovered in the posts list table.
  • An unauthenticated privilege escalation vulnerability was discovered in a REST API endpoint.
CVE-2017-5610 CVE-2017-5611 CVE-2017-5612 http://www.openwall.com/lists/oss-security/2017/01/28/5 https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/ https://make.wordpress.org/core/2017/02/01/disclosure-of-additional-security-fix-in-wordpress-4-7-2/ 2017-01-26 2017-01-29
nfsen -- remote command execution nfsen 1.3.7

Peter Haag reports:

A remote attacker with access to the web interface to execute arbitrary commands on the host operating system.

https://sourceforge.net/p/nfsen/mailman/message/35623845/ 2017-01-24 2017-01-27
chromium -- multiple vulnerabilities chromium chromium-npapi chromium-pulse 56.0.2924.76

Google Chrome Releases reports:

51 security fixes in this release

Please reference CVE/URL list for details

CVE-2017-5007 CVE-2017-5006 CVE-2017-5008 CVE-2017-5010 CVE-2017-5011 CVE-2017-5009 CVE-2017-5012 CVE-2017-5013 CVE-2017-5014 CVE-2017-5015 CVE-2017-5019 CVE-2017-5016 CVE-2017-5017 CVE-2017-5018 CVE-2017-2020 CVE-2017-2021 CVE-2017-2022 CVE-2017-2023 CVE-2017-2024 CVE-2017-2025 CVE-2017-2026 https://chromereleases.googleblog.com/2017/01/stable-channel-update-for-desktop.html 2017-01-25 2017-01-26
OpenSSL -- multiple vulnerabilities openssl 1.0.2k,1 openssl-devel 1.1.0d linux-c6-openssl 1.0.1e_13 linux-c7-openssl-libs 1.0.1e_3 FreeBSD 11.011.0_8 10.310.3_17

The OpenSSL project reports:

  • Truncated packet could crash via OOB read (CVE-2017-3731)
  • Bad (EC)DHE parameters cause a client crash (CVE-2017-3730)
  • BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)
  • Montgomery multiplication may produce incorrect results (CVE-2016-7055)
https://www.openssl.org/news/secadv/20170126.txt CVE-2016-7055 CVE-2017-3730 CVE-2017-3731 CVE-2017-3732 SA-17:02.openssl 2017-01-26 2017-01-26 2017-05-26
mozilla -- multiple vulnerabilities firefox 51.0_1,1 seamonkey linux-seamonkey 2.48 firefox-esr 45.7.0,1 linux-firefox 45.7.0,2 libxul thunderbird linux-thunderbird 45.7.0

Mozilla Foundation reports:

Please reference CVE/URL list for details

CVE-2017-5373 CVE-2017-5374 CVE-2017-5375 CVE-2017-5376 CVE-2017-5377 CVE-2017-5378 CVE-2017-5379 CVE-2017-5380 CVE-2017-5381 CVE-2017-5382 CVE-2017-5383 CVE-2017-5384 CVE-2017-5385 CVE-2017-5386 CVE-2017-5387 CVE-2017-5388 CVE-2017-5389 CVE-2017-5390 CVE-2017-5391 CVE-2017-5392 CVE-2017-5393 CVE-2017-5394 CVE-2017-5395 CVE-2017-5396 https://www.mozilla.org/security/advisories/mfsa2017-01/ https://www.mozilla.org/security/advisories/mfsa2017-02/ 2017-01-24 2017-01-24
phpMyAdmin -- Multiple vulnerabilities phpMyAdmin 4.6.04.6.6

The phpMyAdmin development team reports:

Open redirect

php-gettext code execution

DOS vulnerability in table editing

CSS injection in themes

Cookie attribute injection attack

SSRF in replication

DOS in replication status

https://www.phpmyadmin.net/security/PMASA-2017-1 https://www.phpmyadmin.net/security/PMASA-2017-2 https://www.phpmyadmin.net/security/PMASA-2017-3 https://www.phpmyadmin.net/security/PMASA-2017-4 https://www.phpmyadmin.net/security/PMASA-2017-5 https://www.phpmyadmin.net/security/PMASA-2017-6 https://www.phpmyadmin.net/security/PMASA-2017-7 CVE-2015-8980 2017-01-24 2017-01-24
Intel(R) NVMUpdate -- Intel(R) Ethernet Controller X710/XL710 NVM Security Vulnerability intel-nvmupdate 5.05

Intel Corporation reports:

A security vulnerability in the Intel(R) Ethernet Controller X710 and Intel(R) Ethernet Controller XL710 family of products (Fortville) has been found in the Non-Volatile Flash Memory (NVM) image.

https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00063&languageid=en-fr CVE-2016-8106 2017-01-09 2017-01-23
PHP -- undisclosed vulnerabilities php56 5.6.30 php70 7.0.15

The PHP project reports:

The PHP development team announces the immediate availability of PHP 7.0.15. This is a security release. Several security bugs were fixed in this release.

The PHP development team announces the immediate availability of PHP 5.6.30. This is a security release. Several security bugs were fixed in this release.

http://php.net/archive/2017.php#id2017-01-19-2 http://php.net/archive/2017.php#id2017-01-19-3 2017-01-19 2017-01-19 2017-01-20
icoutils -- check_offset overflow on 64-bit systems icoutils 0.31.1

Choongwoo Han reports:

An exploitable crash exists in the wrestool utility on 64-bit systems where the result of subtracting two pointers exceeds the size of int.

CVE-2017-5208 CVE-2017-5331 CVE-2017-5332 CVE-2017-5333 http://seclists.org/oss-sec/2017/q1/38 2017-01-03 2017-01-19
mysql -- multiple vulnerabilities mariadb55-server 5.5.54 mariadb100-server 10.0.30 mariadb101-server 10.1.22 mysql55-server 5.5.54 mysql56-server 5.6.35 mysql57-server 5.7.17

Oracle reports:

No further details have been provided in the Critical Patch Update

http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixMSQL CVE-2016-8318 CVE-2017-3312 CVE-2017-3258 CVE-2017-3273 CVE-2017-3244 CVE-2017-3257 CVE-2017-3238 CVE-2017-3256 CVE-2017-3291 CVE-2017-3265 CVE-2017-3251 CVE-2017-3313 CVE-2017-3243 CVE-2016-8327 CVE-2017-3317 CVE-2017-3318 CVE-2017-3319 CVE-2017-3320 2017-01-18 2017-01-18 2017-03-14
powerdns -- multiple vulnerabilities powerdns 3.4.11 4.0.04.0.2 powerdns-recursor 3.7.4 4.0.04.0.4

PowerDNS reports:

2016-02: Crafted queries can cause abnormal CPU usage

2016-03: Denial of service via the web server

2016-04: Insufficient validation of TSIG signatures

2016-05: Crafted zone record can cause a denial of service

CVE-2016-7068 CVE-2016-7072 CVE-2016-7073 CVE-2016-7074 CVE-2016-2120 ports/216135 ports/216136 https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/ https://doc.powerdns.com/md/security/powerdns-advisory-2016-03/ https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/ https://doc.powerdns.com/md/security/powerdns-advisory-2016-05/ https://blog.powerdns.com/2017/01/13/powerdns-authoritative-server-4-0-2-released/ https://blog.powerdns.com/2017/01/13/powerdns-recursor-4-0-4-released/ 2016-12-15 2017-01-18
groovy -- remote execution of untrusted code/DoS vulnerability groovy 1.7.02.4.8

The Apache Groovy project reports:

When an application with Groovy on classpath uses standard Java serialization mechanisms, e.g. to communicate between servers or to store local data, it is possible for an attacker to bake a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability. This is similar to CVE-2015-3253 but this exploit involves extra wrapping of objects and catching of exceptions which are now safe guarded against.

CVE-2016-6814 http://groovy-lang.org/security.html 2016-09-20 2017-01-15
RabbitMQ -- Authentication vulnerability rabbitmq 3.0.03.5.8 3.6.03.6.6

Pivotal.io reports:

MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.

CVE-2016-9877 https://pivotal.io/security/cve-2016-9877 https://github.com/rabbitmq/rabbitmq-server/releases/tag/rabbitmq_v3_6_6 2016-12-06 2017-01-15
wordpress -- multiple vulnerabilities wordpress 4.7.1,1 de-wordpress ja-wordpress ru-wordpress zh-wordpress-zh_CN zh-wordpress-zh_TW 4.7.1

Aaron D. Campbell reports:

WordPress versions 4.7 and earlier are affected by eight security issues...

CVE-2017-5487 CVE-2017-5488 CVE-2017-5489 CVE-2017-5490 CVE-2017-5491 CVE-2017-5492 CVE-2017-5493 http://www.openwall.com/lists/oss-security/2017/01/14/6 https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/ 2017-01-11 2017-01-15
mysql -- multiple vulnerabilities mysql57-client mysql57-server 5.7.15

Oracle reports:

Local security vulnerability in 'Server: Packaging' sub component.

93617 CVE-2016-5625 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html 2016-10-18 2017-01-14 2017-01-15
MySQL -- multiple vulnerabilities mariadb55-client mariadb55-server 5.5.52 mariadb100-client mariadb100-server 10.0.28 mariadb101-client mariadb101-server 10.1.18 mysql55-client mysql55-server 5.5.52 mysql56-client mysql56-server 5.6.33 mysql57-client mysql57-server 5.7.15 percona55-client percona55-server 5.5.51.38.2 percona56-client percona56-server 5.6.32.78.1

The MySQL project reports:

  • CVE-2016-3492: Remote security vulnerability in 'Server: Optimizer' sub component.
  • CVE-2016-5616, CVE-2016-6663: Race condition allows local users with certain permissions to gain privileges by leveraging use of my_copystat by REPAIR TABLE to repair a MyISAM table.
  • CVE-2016-5617, CVE-2016-6664: mysqld_safe, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.
  • CVE-2016-5624: Remote security vulnerability in 'Server: DML' sub component.
  • CVE-2016-5626: Remote security vulnerability in 'Server: GIS' sub component.
  • CVE-2016-5629: Remote security vulnerability in 'Server: Federated' sub component.
  • CVE-2016-8283: Remote security vulnerability in 'Server: Types' sub component.
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixMSQL https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/ https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/ CVE-2016-3492 CVE-2016-5616 CVE-2016-5617 CVE-2016-5624 CVE-2016-5626 CVE-2016-5629 CVE-2016-6663 CVE-2016-6664 CVE-2016-8283 2016-09-13 2017-01-14
Ansible -- Command execution on Ansible controller from host ansible 1.9.6_12.2.0.0_2

Computest reports:

Computest found and exploited several issues that allow a compromised host to execute commands on the Ansible controller and thus gain access to other hosts controlled by that controller.

CVE-2016-9587 https://www.computest.nl/advisories/CT-2017-0109_Ansible.txt https://lwn.net/Articles/711357/ 2017-01-09 2017-01-12
phpmailer -- Remote Code Execution phpmailer 5.2.22 tt-rss 2017.01.16

SecurityFocus reports:

PHPMailer is prone to an local information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.

http://www.securityfocus.com/bid/95328/discuss CVE-2017-5223 2017-01-10 2017-01-12
BIND -- multiple vulnerabilities bind99 9.9.9P5 bind910 9.10.4P5 bind911 9.11.0P2 bind9-devel 9.12.0.a.2016.12.28 FreeBSD 9.310.0

ISC reports:

A malformed query response received by a recursive server in response to a query of RTYPE ANY could trigger an assertion failure while named is attempting to add the RRs in the query response to the cache.

Depending on the type of query and the EDNS options in the query they receive, DNSSEC-enabled authoritative servers are expected to include RRSIG and other RRsets in their responses to recursive servers. DNSSEC-validating servers will also make specific queries for DS and other RRsets. Whether DNSSEC-validating or not, an error in processing malformed query responses that contain DNSSEC-related RRsets that are inconsistent with other RRsets in the same query response can trigger an assertion failure. Although the combination of properties which triggers the assertion should not occur in normal traffic, it is potentially possible for the assertion to be triggered deliberately by an attacker sending a specially-constructed answer.

An unusually-formed answer containing a DS resource record could trigger an assertion failure. While the combination of properties which triggers the assertion should not occur in normal traffic, it is potentially possible for the assertion to be triggered deliberately by an attacker sending a specially-constructed answer having the required properties.

An error in handling certain queries can cause an assertion failure when a server is using the nxdomain-redirect feature to cover a zone for which it is also providing authoritative service. A vulnerable server could be intentionally stopped by an attacker if it was using a configuration that met the criteria for the vulnerability and if the attacker could cause it to accept a query that possessed the required attributes.

CVE-2016-9131 CVE-2016-9147 CVE-2016-9444 CVE-2016-9778 https://kb.isc.org/article/AA-01439/0 https://kb.isc.org/article/AA-01440/0 https://kb.isc.org/article/AA-01441/0 https://kb.isc.org/article/AA-01442/0 2017-01-11 2017-01-12
FreeBSD -- OpenSSH multiple vulnerabilities openssh-portable 7.3.p1_5,1 FreeBSD 11.011.0_7 10.310.3_16

Problem Description:

The ssh-agent(1) agent supports loading a PKCS#11 module from outside a trusted whitelist. An attacker can request loading of a PKCS#11 module across forwarded agent-socket. [CVE-2016-10009]

When privilege separation is disabled, forwarded Unix domain sockets would be created by sshd(8) with the privileges of 'root' instead of the authenticated user. [CVE-2016-10010]

Impact:

A remote attacker who have control of a forwarded agent-socket on a remote system and have the ability to write files on the system running ssh-agent(1) agent can run arbitrary code under the same user credential. Because the attacker must already have some control on both systems, it is relatively hard to exploit this vulnerability in a practical attack. [CVE-2016-10009]

When privilege separation is disabled (on FreeBSD, privilege separation is enabled by default and has to be explicitly disabled), an authenticated attacker can potentially gain root privileges on systems running OpenSSH server. [CVE-2016-10010]

CVE-2016-10009 CVE-2016-10010 SA-17:01.openssh 2017-01-11 2017-01-11 2017-01-13
openssl -- timing attack vulnerability openssl 1.0.2 libressl 2.4.4_1 libressl-devel 2.5.0_1

Cesar Pereida Garcia reports:

The signing function in crypto/ecdsa/ecdsa_ossl.c in certain OpenSSL versions and forks is vulnerable to timing attacks when signing with the standardized elliptic curve P-256 despite featuring constant-time curve operations and modular inversion. A software defect omits setting the BN_FLG_CONSTTIME flag for nonces, failing to take a secure code path in the BN_mod_inverse method and therefore resulting in a cache-timing attack vulnerability.
A malicious user with local access can recover ECDSA P-256 private keys.

http://seclists.org/oss-sec/2017/q1/52 CVE-2016-7056 2017-01-10 2017-01-11 2017-01-11
flash -- multiple vulnerabilities linux-flashplayer 24.0.0.194

Adobe reports:

These updates resolve a security bypass vulnerability that could lead to information disclosure (CVE-2017-2938).

These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2017-2932, CVE-2017-2936, CVE-2017-2937).

These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2017-2927, CVE-2017-2933, CVE-2017-2934, CVE-2017-2935).

These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2017-2925, CVE-2017-2926, CVE-2017-2928, CVE-2017-2930, CVE-2017-2931).

CVE-2017-2925 CVE-2017-2926 CVE-2017-2927 CVE-2017-2928 CVE-2017-2930 CVE-2017-2931 CVE-2017-2932 CVE-2017-2933 CVE-2017-2934 CVE-2017-2935 CVE-2017-2936 CVE-2017-2937 CVE-2017-2938 https://helpx.adobe.com/security/products/flash-player/apsb17-02.html 2017-01-10 2017-01-11
moinmoin -- XSS vulnerabilities moinmoin 1.9.9

Thomas Waldmann reports:

  • fix XSS in AttachFile view (multifile related) CVE-2016-7148

  • fix XSS in GUI editor's attachment dialogue CVE-2016-7146

  • fix XSS in GUI editor's link dialogue CVE-2016-9119

http://hg.moinmo.in/moin/1.9/file/1.9.9/docs/CHANGES CVE-2016-7148 CVE-2016-7146 CVE-2016-9119 ports/214937 2016-10-31 2017-01-09
libvncserver -- multiple buffer overflows libvncserver 0.9.11

libvnc server reports:

Two unrelated buffer overflows can be used by a malicious server to overwrite parts of the heap and crash the client (or possibly execute arbitrary code).

https://github.com/LibVNC/libvncserver/pull/137 CVE-2016-9941 CVE-2016-9942 ports/215805 2016-11-24 2017-01-09
libdwarf -- multiple vulnerabilities libdwarf 20161124

Christian Rebischke reports:

libdwarf is vulnerable to multiple issues including arbitrary code execution, information disclosure and denial of service.

https://lwn.net/Articles/708092/ CVE-2016-5027 CVE-2016-5028 CVE-2016-5029 CVE-2016-5030 CVE-2016-5031 CVE-2016-5032 CVE-2016-5033 CVE-2016-5035 CVE-2016-5037 CVE-2016-5040 CVE-2016-5041 CVE-2016-5043 CVE-2016-5044 CVE-2016-7510 CVE-2016-7511 CVE-2016-8679 CVE-2016-8680 CVE-2016-8681 CVE-2016-9275 CVE-2016-9276 CVE-2016-9480 CVE-2016-9558 2016-12-04 2017-01-09
lynx -- multiple vulnerabilities lynx 2.8.8.2_5,1

Oracle reports:

Lynx is vulnerable to POODLE by still supporting vulnerable version of SSL. Lynx is also vulnerable to URL attacks by incorrectly parsing hostnames ending with an '?'.

https://hg.java.net/hg/solaris-userland~gate/file/bc5351dcb9ac/components/lynx/patches/02-init-openssl.patch https://hg.java.net/hg/solaris-userland~gate/file/0a979060f73b/components/lynx/patches/05-fix-CVE-2016-9179.patch CVE-2014-3566 CVE-2016-9179 ports/215464 2016-10-26 2017-01-09
hdf5 -- multiple vulnerabilities hdf5 1.10.0 hdf5-18 1.8.18

Talos Security reports:

  • CVE-2016-4330 (TALOS-2016-0176) - HDF5 Group libhdf5 H5T_ARRAY Code Execution Vulnerability

  • CVE-2016-4331 (TALOS-2016-0177) - HDF5 Group libhdf5 H5Z_NBIT Code Execution Vulnerability

  • CVE-2016-4332 (TALOS-2016-0178) - HDF5 Group libhdf5 Shareable Message Type Code Execution Vulnerability

  • CVE-2016-4333 (TALOS-2016-0179) - HDF5 Group libhdf5 H5T_COMPOUND Code Execution Vulnerability

http://blog.talosintel.com/2016/11/hdf5-vulns.html CVE-2016-4330 CVE-2016-4331 CVE-2016-4332 CVE-2016-4333 2016-11-17 2017-01-09
End of Life Ports py27-django16 py33-django16 py34-django16 py35-django16 0 drupal6 0

These packages have reached End of Life status and/or have been removed from the Ports Tree. They may contain undocumented security issues. Please take caution and find alternative software as soon as possible.

ports/211975 2017-01-06 2017-01-06
Use-After-Free Vulnerability in pcsc-lite pcsc-lite 1.6.01.8.20

Peter Wu on Openwall mailing-list reports:

The issue allows a local attacker to cause a Denial of Service, but can potentially result in Privilege Escalation since the daemon is running as root. while any local user can connect to the Unix socket. Fixed by patch which is released with hpcsc-lite 1.8.20.

CVE-2016-10109 http://www.openwall.com/lists/oss-security/2017/01/03/2 2017-01-03 2017-01-06 2017-01-10
GnuTLS -- Memory corruption vulnerabilities gnutls 3.5.8

The GnuTLS project reports:

  • It was found using the OSS-FUZZ fuzzer infrastructure that decoding a specially crafted OpenPGP certificate could lead to heap and stack overflows. (GNUTLS-SA-2017-2)
  • It was found using the OSS-FUZZ fuzzer infrastructure that decoding a specially crafted X.509 certificate with Proxy Certificate Information extension present could lead to a double free. (GNUTLS-SA-2017-1)
http://www.gnutls.org/news.html#2017-01-09 http://www.gnutls.org/security.html#GNUTLS-SA-2017-2 http://www.gnutls.org/security.html#GNUTLS-SA-2017-1 2017-01-09 2017-01-09
tomcat -- information disclosure vulnerability tomcat 6.0.49 tomcat7 7.0.74 tomcat8 8.0.40

The Apache Software Foundation reports:

Important: Information Disclosure CVE-2016-8745

CVE-2016-8745 ports/215865 http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49 http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74 http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40 2017-01-05 2017-01-07 2017-03-18
tomcat -- multiple vulnerabilities tomcat 6.0.48 tomcat7 7.0.73 tomcat8 8.0.39

The Apache Software Foundation reports:

Important: Remote Code Execution CVE-2016-8735

Important: Information Disclosure CVE-2016-6816

CVE-2016-8735 CVE-2016-6816 ports/214599 http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48 http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73 http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39 2016-11-22 2017-01-07 2017-03-18
tomcat -- multiple vulnerabilities tomcat 6.0.47 tomcat7 7.0.72 tomcat8 8.0.37

The Apache Software Foundation reports:

Low: Unrestricted Access to Global Resources CVE-2016-6797

Low: Security Manager Bypass CVE-2016-6796

Low: System Property Disclosure CVE-2016-6794

Low: Security Manager Bypass CVE-2016-5018

Low: Timing Attack CVE-2016-0762

CVE-2016-6797 CVE-2016-6796 CVE-2016-6794 CVE-2016-5018 CVE-2016-0762 http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47 http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72 http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37 2016-10-27 2017-01-07 2017-03-18
Irssi -- multiple vulnerabilities irssi 0.8.21

Irssi reports:

Five vulnerabilities have been located in Irssi

  • A NULL pointer dereference in the nickcmp function found by Joseph Bisch. (CWE-690)
  • Use after free when receiving invalid nick message (Issue #466, CWE-146)
  • Out of bounds read in certain incomplete control codes found by Joseph Bisch. (CWE-126)
  • Out of bounds read in certain incomplete character sequences found by Hanno Böck and independently by J. Bisch. (CWE-126)
  • Out of bounds read when Printing the value '%['. Found by Hanno Böck. (CWE-126)

These issues may result in denial of service (remote crash).

CVE-2017-5193 CVE-2017-5194 CVE-2017-5195 CVE-2017-5196 CVE-2017-5356 ports/215800 https://irssi.org/security/irssi_sa_2017_01.txt 2017-01-03 2017-01-05 2017-01-15
codeigniter -- multiple vulnerabilities codeigniter 3.1.2

The CodeIgniter changelog reports:

Fixed a number of new vulnerabilities in Security Library method xss_clean().

https://www.codeigniter.com/user_guide/changelog.html 2016-10-28 2017-01-06
codeigniter -- multiple vulnerabilities codeigniter 3.1.0

The CodeIgniter changelog reports:

Fixed an SQL injection in the ‘odbc’ database driver.

Updated set_realpath() Path Helper function to filter-out php:// wrapper inputs.

https://www.codeigniter.com/user_guide/changelog.html 2016-07-26 2017-01-06
w3m -- multiple vulnerabilities w3m w3m-img ja-w3m ja-w3m-img 0.5.3.20170102

Multiple remote code execution and denial of service conditions present.

http://seclists.org/oss-sec/2016/q4/452 http://seclists.org/oss-sec/2016/q4/516 CVE-2016-9422 CVE-2016-9423 CVE-2016-9424 CVE-2016-9425 CVE-2016-9426 CVE-2016-9428 CVE-2016-9429 CVE-2016-9430 CVE-2016-9431 CVE-2016-9432 CVE-2016-9433 CVE-2016-9434 CVE-2016-9435 CVE-2016-9436 CVE-2016-9437 CVE-2016-9438 CVE-2016-9439 CVE-2016-9440 CVE-2016-9441 CVE-2016-9442 CVE-2016-9443 CVE-2016-9622 CVE-2016-9623 CVE-2016-9624 CVE-2016-9625 CVE-2016-9626 CVE-2016-9627 CVE-2016-9628 CVE-2016-9629 CVE-2016-9630 CVE-2016-9631 CVE-2016-9632 CVE-2016-9633 2016-11-03 2017-01-01 2017-01-09
diff --git a/security/vuxml/vuln/2019.xml b/security/vuxml/vuln/2019.xml index c506c424fb6b..bbb8785ae92e 100644 --- a/security/vuxml/vuln/2019.xml +++ b/security/vuxml/vuln/2019.xml @@ -1,11375 +1,11375 @@ rack -- information leak / session hijack vulnerability rubygem-rack 2.0.02.0.8,3 rubygem-rack16 1.6.01.6.12

National Vulnerability Database:

There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.

https://nvd.nist.gov/vuln/detail/CVE-2019-16782 https://github.com/rack/rack/blob/master/CHANGELOG.md CVE-2019-16782 2019-12-08 2019-12-29
OpenEXR -- heap buffer overflow, and out-of-memory bugs ilmbase 2.3.0_4 openexr 2.3.0_3

Cary Phillips reports:

OpenEXR (IlmBase) v2.4.0 fixes the following security vulnerabilities:

  • CVE-2018-18444 Issue #351 Out of Memory
  • CVE-2018-18443 Issue #350 heap-buffer-overflow

The relevant patches have been backported to the FreeBSD ports.

https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.0 https://github.com/AcademySoftwareFoundation/openexr/issues/350 https://github.com/AcademySoftwareFoundation/openexr/issues/351 CVE-2018-18443 CVE-2018-18444 2018-10-17 2019-12-29
wordpress -- multiple issues wordpress fr-wordpress 5.3.1,1 de-wordpress zh_CN-wordpress zh_TW-wordpress ja-wordpress ru-wordpress 5.3.1

wordpress developers reports:

Four security issues affect WordPress versions 5.3 and earlier; version 5.3.1 fixes them, so youll want to upgrade. If you havent yet updated to 5.3, there are also updated versions of 5.2 and earlier that fix the security issues. -Props to Daniel Bachhuber for finding an issue where an unprivileged user could make a post sticky via the REST API. -Props to Simon Scannell of RIPS Technologies for finding and disclosing an issue where cross-site scripting (XSS) could be stored in well-crafted links. -Props to the WordPress.org Security Team for hardening wp_kses_bad_protocol() to ensure that it is aware of the named colon attribute. -Props to Nguyen The Duc for discovering a stored XSS vulnerability using block editor content.

https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/ 2019-12-13 2019-12-26
typo3 -- multiple vulnerabilities typo3-8 8.7.30 typo3-9 9.5.13

Typo3 core team reports:

It has been discovered that the output of field validation errors in the Form Framework is vulnerable to cross-site scripting.

It has been discovered that t3:// URL handling and typolink functionality are vulnerable to cross-site scripting. Not only regular backend forms are affected but also frontend extensions which use the rendering with typolink.

It has been discovered that the output table listing in the Files backend module is vulnerable to cross-site scripting when a file extension contains malicious sequences. Access to the file system of the server - either directly or through synchronization - is required to exploit the vulnerability.

It has been discovered that the extraction of manually uploaded ZIP archives in Extension Manager is vulnerable to directory traversal. Admin privileges are required in order to exploit this vulnerability. Since TYPO3 v9 LTS, System Maintainer privileges are required as well.

Failing to properly escape user submitted content, class QueryGenerator is vulnerable to SQL injection. Having system extension ext:lowlevel installed and a valid backend user having administrator privileges are required to exploit this vulnerability.

It has been discovered that classes QueryGenerator and QueryView are vulnerable to insecure deserialization. Requirements for successfully exploiting this vulnerability (one of the following): - having system extension ext:lowlevel (Backend Module: DB Check) installed and valid backend user having administrator privileges - having system extension ext:sys_action installed and valid backend user having limited privileges

TYPO3 allows to upload files either in the backend user interface as well as in custom developed extensions. To reduce the possibility to upload potential malicious code TYPO3 uses the fileDenyPattern to deny e.g. user submitted PHP scripts from being persisted. Besides that it is possible for any editor to upload file assets using the file module (fileadmin) or changing their avatar image shown in the TYPO3 backend. Per default TYPO3 allows to upload and store HTML and SVG files as well using the mentioned functionalities. Custom extension implementations probably would also accept those files when only the fileDenyPattern is evaluated. Since HTML and SVG files - which might contain executable JavaScript code per W3C standard - could be directly displayed in web clients, the whole web application is exposed to be vulnerable concerning Cross-Site Scripting. Currently the following scenarios are known - given an authenticated regular editor is able to upload files using the TYPO3 backend: - directly target a potential victim to a known public resource in a URL, e.g. /fileadmin/malicious.svg or /fileadmin/malicious.html - using the TypoScript content object “SVG” (implemented in class ScalableVectorGraphicsContentObject) having renderMode set to inline for SVG files (available since TYPO3 v9.0) - custom implementations that directly output and render markup of HTML and SVG files SVG files that are embedded using an img src=”malicious.svg” tag are not vulnerable since potential scripts are not executed in these scenarios (see https://www.w3.org/wiki/SVG_Security). The icon API of TYPO3 is not scope of this announcement since SVG icons need to be registered using an individual implementation, which is not considered as user submitted content.

It has been discovered that request handling in Extbase can be vulnerable to insecure deserialization. User submitted payload has to be signed with a corresponding HMAC-SHA1 using the sensitive TYPO3 encryptionKey as secret - invalid or unsigned payload is not deserialized. However, since sensitive information could have been leaked by accident (e.g. in repositories or in commonly known and unprotected backup files), there is the possibility that attackers know the private encryptionKey and are able to calculate the required HMAC-SHA1 to allow a malicious payload to be deserialized. Requirements for successfully exploiting this vulnerability (all of the following): - rendering at least one Extbase plugin in the frontend - encryptionKey has been leaked (from LocalConfiguration.php or corresponding .env file).

https://typo3.org/security/advisory/typo3-core-sa-2019-021/ https://typo3.org/security/advisory/typo3-core-sa-2019-022/ https://typo3.org/security/advisory/typo3-core-sa-2019-023/ https://typo3.org/security/advisory/typo3-core-sa-2019-024/ https://typo3.org/security/advisory/typo3-core-sa-2019-025/ https://typo3.org/security/advisory/typo3-core-sa-2019-026/ https://typo3.org/security/advisory/typo3-psa-2019-010/ https://typo3.org/security/advisory/typo3-psa-2019-011/ 2019-12-17 2019-12-25
e2fsprogs -- maliciously corrupted file systems can trigger buffer overruns in the quota code used by e2fsck e2fsprogs 1.45.4

Ted Y. Ts'o reports:

A maliciously corrupted file systems can trigger buffer overruns in the quota code used by e2fsck.

http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.45.4 CVE-2019-5094 2019-09-23 2019-12-21
drupal -- Drupal Core - Multiple Vulnerabilities drupal7 7.69 drupal8 8.8.1

Drupal Security Team reports:

A visit to install.php can cause cached data to become corrupted. This could cause a site to be impaired until caches are rebuilt.

Drupal 8 core's file_save_upload() function does not strip the leading and trailing dot ('.') from filenames, like Drupal 7 did. Users with the ability to upload files with any extension in conjunction with contributed modules may be able to use this to upload system files such as .htaccess in order to bypass protections afforded by Drupal's default .htaccess file. After this fix, file_save_upload() now trims leading and trailing dots from filenames.

The Media Library module has a security vulnerability whereby it doesn't sufficiently restrict access to media items in certain configurations.

The Drupal project uses the third-party library Archive_Tar, which has released a security-related feature that impacts some Drupal configurations. Multiple vulnerabilities are possible if Drupal is configured to allow .tar, .tar.gz, .bz2 or .tlz file uploads and processes them. The latest versions of Drupal update Archive_Tar to 1.4.9 to mitigate the file processing vulnerabilities.

https://www.drupal.org/sa-core-2019-009 https://www.drupal.org/sa-core-2019-010 https://www.drupal.org/sa-core-2019-011 https://www.drupal.org/sa-core-2019-012 2019-12-18 2019-12-21
py-matrix-synapse -- multiple vulnerabilities py35-matrix-synapse py36-matrix-synapse py37-matrix-synapse 1.7.1

Matrix developers report:

The [synapse 1.7.1] release includes several security fixes as well as a fix to a bug exposed by the security fixes. All previous releases of Synapse are affected. Administrators are encouraged to upgrade as soon as possible.

  • Fix a bug which could cause room events to be incorrectly authorized using events from a different room.
  • Fix a bug causing responses to the /context client endpoint to not use the pruned version of the event.
  • Fix a cause of state resets in room versions 2 onwards.
https://github.com/matrix-org/synapse/releases/tag/v1.7.1 2019-12-18 2019-12-18
OpenSSL -- Overflow vulnerability openssl 1.0.2u,1

The OpenSSL project reports:

rsaz_512_sqr overflow bug on x86_64 (CVE-2019-1551) (Low)
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME.

https://www.openssl.org/news/secadv/20191206.txt CVE-2019-1551 2019-12-06 2019-12-20
spamassassin -- multiple vulnerabilities spamassassin 3.4.3

the Apache Spamassassin project reports:

An input validation error of user-supplied input parsing multipart emails. Specially crafted emails can consume all resources on the system.

A local user is able to execute arbitrary shell commands through specially crafted nefarious CF files.

https://www.cybersecurity-help.cz/vdb/SB2019121311 CVE-2019-12420 CVE-2018-11805 2019-12-11 2019-12-13
samba -- multiple vulnerabilities samba48 4.8.0 samba410 4.10.11 samba411 4.11.3

The Samba Team reports:

CVE-2019-14861:

An authenticated user can crash the DCE/RPC DNS management server by creating records with matching the zone name.

CVE-2019-14870:

The DelegationNotAllowed Kerberos feature restriction was not being applied when processing protocol transition requests (S4U2Self), in the AD DC KDC.

https://www.samba.org/samba/history/samba-4.10.11.html CVE-2019-14861 CVE-2019-14870 2019-12-10 2019-12-12
dovecot -- null pointer deref in notify with empty headers dovecot 2.3.92.3.9.2

Aki Tuomi reports

Mail with group address as sender will cause a signal 11 crash in push notification drivers. Group address as recipient can cause crash in some drivers.

https://dovecot.org/pipermail/dovecot/2019-December/117894.html CVE-2019-19722 2019-12-10 2019-12-13
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.5.012.5.4 12.4.012.4.6 10.5.012.3.9

Gitlab reports:

Path traversal with potential remote code execution

Disclosure of private code via Elasticsearch integration

Update Git dependency

https://about.gitlab.com/blog/2019/12/10/critical-security-release-gitlab-12-5-4-released/ CVE-2019-19628 CVE-2019-19629 CVE-2019-19604 2019-12-10 2019-12-10
Ghostscript -- Security bypass vulnerabilities ghostscript9-agpl-base ghostscript9-agpl-x11 9.50

Cedric Buissart (Red Hat) reports:

A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

CVE-2019-14811 CVE-2019-14812 CVE-2019-14813 CVE-2019-14817 2019-08-20 2019-12-09
phpmyadmin -- multiple vulnerabilities phpmyadmin 4.9.2

the phpmyadmin team reports:

This security fix is part of an ongoing effort to improve the security of the Designer feature and is designated PMASA-2019-5. There is also an improvement for how we sanitize git version information shown on the home page.

https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released/ 2019-11-22 2019-12-06
Django -- multiple vulnerabilities py35-django21 py36-django21 py37-django21 py38-django21 2.1.15 py35-django22 py36-django22 py37-django22 py38-django22 2.2.8

Django release reports:

CVE-2019-19118: Privilege escalation in the Django admin.

Since Django 2.1, a Django model admin displaying a parent model with related model inlines, where the user has view-only permissions to a parent model but edit permissions to the inline model, would display a read-only view of the parent model but editable forms for the inline.

Submitting these forms would not allow direct edits to the parent model, but would trigger the parent model's save() method, and cause pre and post-save signal handlers to be invoked. This is a privilege escalation as a user who lacks permission to edit a model should not be able to trigger its save-related signals.

https://www.djangoproject.com/weblog/2019/dec/02/security-releases/ CVE-2019-19118 2019-11-25 2019-12-03
py-matrix-synapse -- incomplete cleanup of 3rd-party-IDs on user deactivation py35-matrix-synapse py36-matrix-synapse py37-matrix-synapse 1.6.1

Matrix developers report:

Clean up local threepids from user on account deactivation.

https://github.com/matrix-org/synapse/releases/tag/v1.6.1 https://github.com/matrix-org/synapse/pull/6426 2019-11-28 2019-11-28
py-matrix-synapse -- missing signature checks on some federation APIs py35-matrix-synapse py36-matrix-synapse py37-matrix-synapse 1.5.0

Matrix developers report:

Make sure that [...] events sent over /send_join, /send_leave, and /invite, are correctly signed and come from the expected servers.

https://github.com/matrix-org/synapse/pull/6262 https://github.com/matrix-org/synapse/releases/tag/v1.5.0 2019-10-29 2019-10-29
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.5.012.5.2 12.4.012.4.5 11.9.012.3.8

Gitlab reports:

Unauthorized access to grafana metrics

Update Mattermost dependency

https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-2-released/ CVE-2019-19262 2019-11-27 2019-11-28
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.5.012.5.1 12.4.012.4.4 12.3.7

Gitlab reports:

Path traversal with potential remote code execution

Private objects exposed through project import

Disclosure of notes via Elasticsearch integration

Disclosure of comments via Elasticsearch integration

DNS Rebind SSRF in various chat notifications

Disclosure of vulnerability status in dependency list

Disclosure of commit count in Cycle Analytics

Exposure of related branch names

Tags pushes from blocked users

Branches and Commits exposed to Guest members via integration

IDOR when adding users to protected environments

Former project members able to access repository information

Unauthorized access to grafana metrics

Todos created for former project members

Update Mattermost dependency

Disclosure of AWS secret keys on certain Admin pages

Stored XSS in Group and User profile fields

Forked project information disclosed via Project API

Denial of Service in the issue and commit comment pages

Tokens stored in plaintext

https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-1-released/ CVE-2019-19088 CVE-2019-19309 CVE-2019-19086 CVE-2019-19087 CVE-2019-19261 CVE-2019-19256 CVE-2019-19254 CVE-2019-19257 CVE-2019-19263 CVE-2019-19258 CVE-2019-19259 CVE-2019-19260 CVE-2019-19262 CVE-2019-19255 CVE-2019-19310 CVE-2019-19311 CVE-2019-19312 CVE-2019-19313 CVE-2019-19314 2019-11-27 2019-11-27
webkit2-gtk3 -- Multiple vulnerabilities webkit2-gtk3 2.26.2

The WebKitGTK project reports multiple vulnerabilities.

https://webkitgtk.org/security/WSA-2019-0006.html CVE-2019-8710 CVE-2019-8743 CVE-2019-8764 CVE-2019-8765 CVE-2019-8766 CVE-2019-8782 CVE-2019-8783 CVE-2019-8808 CVE-2019-8811 CVE-2019-8812 CVE-2019-8813 CVE-2019-8814 CVE-2019-8815 CVE-2019-8816 CVE-2019-8819 CVE-2019-8820 CVE-2019-8821 CVE-2019-8822 CVE-2019-8823 2019-11-08 2019-11-27
urllib3 -- multiple vulnerabilities py27-urllib3 py35-urllib3 py36-urllib3 py37-urllib3 py38-urllib3 1.24.3,1

NIST reports: (by search in the range 2018/01/01 - 2019/11/10):

urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.

In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.

The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.

https://nvd.nist.gov/vuln/search/results?form_type=Advanced&results_type=overview&query=urllib3&search_type=all&pub_start_date=01%2F01%2F2018&pub_end_date=11%2F10%2F2019 CVE-2018-20060 CVE-2019-11236 CVE-2019-11324 ports/229322 2018-12-11 2019-11-26
FreeBSD -- Intel CPU Microcode Update FreeBSD-kernel 12.112.1_1 12.012.0_12 11.311.3_5

Starting with version 1.26, the devcpu-data port/package includes updates and mitigations for the following technical and security advisories (depending on CPU model).

Intel TSX Updates (TAA) CVE-2019-11135 Voltage Modulation Vulnerability CVE-2019-11139 MD_CLEAR Operations CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-11091 TA Indirect Sharing CVE-2017-5715 EGETKEY CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-11091 JCC SKX102 Erratum

Updated microcode includes mitigations for CPU issues, but may also cause a performance regression due to the JCC erratum mitigation. Please visit http://www.intel.com/benchmarks for further information.

Please visit http://www.intel.com/security for detailed information on these advisories as well as a list of CPUs that are affected.

Operating a CPU without the latest microcode may result in erratic or unpredictable behavior, including system crashes and lock ups. Certain issues listed in this advisory may result in the leakage of privileged system information to unprivileged users. Please refer to the security advisories listed above for detailed information.

CVE-2019-11135 CVE-2019-11139 CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-11091 CVE-2017-5715 SA-19:26.mcu 2019-11-14 2019-11-25
FreeBSD -- Machine Check Exception on Page Size Change FreeBSD-kernel 12.112.1_1 12.012.0_12 11.311.3_5

Intel discovered a previously published erratum on some Intel platforms can be exploited by malicious software to potentially cause a denial of service by triggering a machine check that will crash or hang the system.

Malicious guest operating systems may be able to crash the host.

CVE-2018-12207 SA-19:25.mcepsc 2019-11-14 2019-11-25
clamav -- Denial-of-Service (DoS) vulnerability clamav 0.102.1,1

Micah Snyder reports:

A Denial-of-Service (DoS) vulnerability may occur when scanning a specially crafted email file as a result of excessively long scan times. The issue is resolved by implementing several maximums in parsing MIME messages and by optimizing use of memory allocation.

https://blog.clamav.net/2019/11/clamav-01021-and-01015-patches-have.html CVE-2019-15961 2019-09-06 2019-11-25
unbound -- parsing vulnerability unbound 1.9.5

Unbound Security Advisories:

Recent versions of Unbound contain a vulnerability that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with --enable-ipsecmod support, and ipsecmod is enabled and used in the configuration.

https://nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-ipsec-module CVE-2019-18934 2019-11-19 2019-11-23
gitea -- multiple vulnerabilities gitea 1.9.10

The Gitea Team reports:

This release contains five security fixes, so we recommend updating:

  • Fix issue with user.fullname
  • Ignore mentions for users with no access
  • Be more strict with git arguments
  • Extract the username and password from the mirror url
  • Reserve .well-known username
https://blog.gitea.io/2019/11/gitea-1.10.0-is-released/ ports/241981 2019-11-17 2019-11-22
asterisk -- Re-invite with T.38 and malformed SDP causes crash asterisk13 13.29.2

The Asterisk project reports:

If Asterisk receives a re-invite initiating T.38 faxing and has a port of 0 and no c line in the SDP, a crash will occur.

https://downloads.asterisk.org/pub/security/AST-2019-008.html CVE-2019-18976 2019-11-07 2019-11-22
asterisk -- AMI user could execute system commands asterisk13 13.29.2 asterisk16 16.6.2

The Asterisk project reports:

A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.

https://downloads.asterisk.org/pub/security/AST-2019-007.html CVE-2019-18610 2019-10-10 2019-11-22
asterisk -- SIP request can change address of a SIP peer asterisk13 13.29.2 asterisk16 16.6.2

The Asterisk project reports:

A SIP request can be sent to Asterisk that can change a SIP peers IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peers name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport.

https://downloads.asterisk.org/pub/security/AST-2019-006.html CVE-2019-18790 2019-10-17 2019-11-22
drm graphics drivers -- Local privilege escalation and denial of service drm-current-kmod 4.16.g20191120 drm-devel-kmod 5.0.g20191120 drm-fbsd12.0-kmod 4.16.g20191120 drm-fbsd11.2-kmod 4.11.g20191204

Intel reports:

As part of IPU 2019.2, INTEL-SA-00242 advises that insufficient access control may allow an authenticated user to potentially enable escalation of privilege via local access.

INTEL-SA-00260 advises that insufficient access control may allow an authenticated user to potentially enable denial of service via local access.

https://blogs.intel.com/technology/2019/11/ipas-november-2019-intel-platform-update-ipu https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html CVE-2019-0154 CVE-2019-11112 2019-11-12 2019-11-20 2019-12-04
squid -- Vulnerable to HTTP Digest Authentication squid 4.9

Squid Team reports:

Problem Description: Due to incorrect data management Squid is vulnerable to a information disclosure when processing HTTP Digest Authentication.

Severity: Nonce tokens contain the raw byte value of a pointer which sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.

http://www.squid-cache.org/Advisories/SQUID-2019_11.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18679 CVE-2019-18679 2019-11-05 2019-11-19
libidn2 -- roundtrip check vulnerability libidn2 2.2.0

CVE list:

GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.

https://gitlab.com/libidn/libidn2/blob/master/NEWS https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290 CVE-2019-12290 2019-11-14 2019-11-18 2020-06-24
GNU cpio -- multiple vulnerabilities gcpio 2.13

Sergey Poznyakoff reports:

This stable release fixes several potential vulnerabilities

CVE-2015-1197: cpio, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.

CVE-2016-2037: The cpio_safer_name_suffix function in util.c allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.

CVE-2019-14866: Improper input validation when writing tar header fields leads to unexpected tar generation.

https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html CVE-2015-1197 CVE-2016-2037 CVE-2019-14866 2019-11-06 2019-11-15
libmad -- multiple vulnerabilities libmad 0.15.1b_7

National Vulnerability Database:

CVE-2017-8372: The mad_layer_III function in layer3.c in Underbit MAD libmad 0.15.1b, if NDEBUG is omitted, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted audio file.

CVE-2017-8373: The mad_layer_III function in layer3.c in Underbit MAD libmad 0.15.1b allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.

CVE-2017-8374: The mad_bit_skip function in bit.c in Underbit MAD libmad 0.15.1b allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508133#15 https://nvd.nist.gov/vuln/detail/CVE-2017-8372 https://nvd.nist.gov/vuln/detail/CVE-2017-8373 https://nvd.nist.gov/vuln/detail/CVE-2017-8374 https://blogs.gentoo.org/ago/2017/04/30/libmad-assertion-failure-in-layer3-c/ https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_layer_iii-layer3-c/ https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_bit_skip-bit-c/ CVE-2017-8372 CVE-2017-8373 CVE-2017-8374 2017-04-30 2019-11-13
chromium -- multiple vulnerabilities chromium 78.0.3904.97

Google Chrome Releases reports:

Four security issues were fixed, including:

  • [1021723] Various fixes from internal audits, fuzzing and other initiatives
https://chromereleases.googleblog.com/2019/11/stable-channel-update-for-desktop.html 2019-11-06 2019-11-12
wordpress -- multiple issues wordpress fr-wordpress 5.2.4,1 de-wordpress zh_CN-wordpress zh_TW-wordpress ja-wordpress ru-wordpress 5.2.4

wordpress developers reports:

Props to Evan Ricafort for finding an issue where stored XSS (cross-site scripting) could be added via the Customizer.

rops to J.D. Grimes who found and disclosed a method of viewing unauthenticated posts.

Props to Weston Ruter for finding a way to create a stored XSS to inject Javascript into style tags.

rops to David Newman for highlighting a method to poison the cache of JSON GET requests via the Vary: Origin header.

Props to Eugene Kolodenker who found a server-side request forgery in the way that URLs are validated.

Props to Ben Bidner of the WordPress Security Team who discovered issues related to referrer validation in the admin.

https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/ 2019-10-14 2019-11-12
nexus2-oss -- Multiple vulerabilities nexus2-oss 2.14.15

Sonatype reports:

Several RCE vulnerabilities have been found and corrected in 2.14.15:

CVE-2019-16530: An attacker with elevated privileges can upload a specially crafted file. That file can contain commands that will be executed on the system, with the same privileges as the user running the server.

CVE-2019-15893: A Remote Code Execution vulnerability has been discovered in Nexus Repository Manager requiring immediate action. The vulnerability allows for an attacker with administrative access to NXRM to create repostories that can grant access to read/execute system data outside the scope of NXRM.

CVE-2019-5475: A vulnerability has been found that can allow user's with administrative privileges to run processes on the target server, that the nxrm os user has access to.

CVE-2019-16530 CVE-2019-15893 CVE-2019-5475 2019-09-19 2019-11-07
php -- env_path_info underflow in fpm_main.c can lead to RCE php71 7.1.33 php72 7.2.24 php73 7.3.11 php74 7.4.0.rc5

The PHP project reports:

The PHP development team announces the immediate availability of PHP 7.3.11. This is a security release which also contains several bug fixes.

The PHP development team announces the immediate availability of PHP 7.2.24. This is a security release which also contains several bug fixes.

The PHP development team announces the immediate availability of PHP 7.1.33. This is a security release which also contains several bug fixes.

CVE-2019-11043 https://www.php.net/archive/2019.php#2019-10-24-1 https://www.php.net/archive/2019.php#2019-10-24-2 https://www.php.net/archive/2019.php#2019-10-24-3 2019-10-24 2019-11-06
mediawiki -- multiple vulnerabilities mediawiki131 1.31.5 mediawiki132 1.32.5 mediawiki133 1.33.1

Mediawiki reports:

Security fixes: T230402, CVE-2019-16738 SECURITY: Add permission check for suppressed account to Special:Redirect.

CVE-2019-16738 https://lists.wikimedia.org/pipermail/mediawiki-announce/2019-October/000236.html 2019-08-13 2019-11-03
MySQL -- Multiple vulerabilities mariadb55-server 5.5.66 mariadb101-server 10.1.42 mariadb102-server 10.2.28 mariadb103-server 10.3.19 mariadb104-server 10.4.9 mysql56-server 5.6.46 mysql57-server 5.7.28 mysql80-server 8.0.18 percona55-server 5.5.66 percona56-server 5.6.46 percona57-server 5.7.28

Oracle reports:

This Critical Patch Update contains 31 new security fixes for Oracle MySQL. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.

https://www.oracle.com/security-alerts/cpuoct2019.html CVE-2019-5443 CVE-2019-1543 CVE-2019-3011 CVE-2019-2966 CVE-2019-2967 CVE-2019-2974 CVE-2019-2946 CVE-2019-3004 CVE-2019-2914 CVE-2019-2969 CVE-2019-2991 CVE-2019-2920 CVE-2019-2993 CVE-2019-2922 CVE-2019-2923 CVE-2019-2924 CVE-2019-2963 CVE-2019-2968 CVE-2019-3003 CVE-2019-2997 CVE-2019-2948 CVE-2019-2950 CVE-2019-2982 CVE-2019-2998 CVE-2019-2960 CVE-2019-2957 CVE-2019-2938 CVE-2019-3018 CVE-2019-3009 CVE-2019-2910 CVE-2019-2911 2019-10-15 2019-11-02
file -- Heap buffer overflow possible file 5.37

mitre reports

cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780 https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84 2019-08-26 2019-11-02
webkit2-gtk3 -- Multiple vulnerabilities webkit2-gtk3 2.26.1

The WebKitGTK project reports multiple vulnerabilities.

https://webkitgtk.org/security/WSA-2019-0005.html CVE-2019-8625 CVE-2019-8674 CVE-2019-8707 CVE-2019-8719 CVE-2019-8720 CVE-2019-8726 CVE-2019-8733 CVE-2019-8735 CVE-2019-8763 CVE-2019-8768 CVE-2019-8769 CVE-2019-8771 2019-10-29 2019-10-31
gitea -- information disclosure gitea 1.9.5

The Gitea Team reports:

When a comment in an issue or PR mentions a user using @username, the mentioned user receives a mail notification even if they don't have permission to see the originating repository.

https://github.com/go-gitea/gitea/releases/tag/v1.9.5 https://blog.gitea.io/2019/10/gitea-1.9.5-is-released/ 2019-09-27 2019-10-30
samba -- multiple vulnerabilities samba48 4.8.12 samba410 4.10.10 samba411 4.11.2

The samba project reports:

Malicious servers can cause Samba client code to return filenames containing path separators to calling code.

When the password contains multi-byte (non-ASCII) characters, the check password script does not receive the full password string.

Users with the "get changes" extended access right can crash the AD DC LDAP server by requesting an attribute using the range= syntax.

https://www.samba.org/samba/security/CVE-2019-10218.html CVE-2019-10218 https://www.samba.org/samba/security/CVE-2019-14833.html CVE-2019-14833 https://www.samba.org/samba/security/CVE-2019-14847.html CVE-2019-14847 2019-09-29 2019-10-29
Gitlab -- Disclosure Vulnerabilities gitlab-ce 12.4.012.4.1 12.3.012.3.6 012.2.9

Gitlab reports:

Source branch of a MR could be removed by an unauthorised user

Private group members could be listed

Disclosure of System Notes via Elasticsearch integration

Disclosure of Private Comments via Elasticsearch integration

Confirm existence of private repositories

Private group membership could be disclosed

Disclosure of Project Labels

Disclosure of Private Project Path and Labels

Uncontrolled Resource Consumption due to Nested GraphQL Queries

Improper access control on comments

Sentry Token Access Control

Authorisation check for Project Transfer option

XSS in Wiki Pages Using RDoc

Untrusted Input could be used for Internal Redirect

Access control for protected environments

Private Sub Group path Disclosure

Disclosure of Group Packages List

Private Repository Name Disclosure

https://about.gitlab.com/blog/2019/10/30/security-release-gitlab-12-dot-4-dot-1-released/ CVE-2019-18446 CVE-2019-18447 CVE-2019-18460 CVE-2019-18456 CVE-2019-18448 CVE-2019-18449 CVE-2019-18450 CVE-2019-18452 CVE-2019-18455 CVE-2019-18453 CVE-2019-18457 CVE-2019-18458 CVE-2019-18454 CVE-2019-18451 CVE-2019-18459 CVE-2019-18461 CVE-2019-18463 CVE-2019-18462 2019-10-30 2019-10-30
FreeBSD -- Reference count overflow in mqueue filesystem 32-bit compat FreeBSD-kernel 12.012.0_10 11.311.3_3 11.211.2_14

Problem Description:

System calls operating on file descriptors obtain a reference to relevant struct file which due to a programming error was not always put back, which in turn could be used to overflow the counter of affected struct file.

Impact:

A local user can use this flaw to obtain access to files, directories, sockets, etc., opened by processes owned by other users. If obtained struct file represents a directory from outside of user's jail, it can be used to access files outside of the jail. If the user in question is a jailed root they can obtain root privileges on the host system.

CVE-2019-5603 SA-19:24.mqueuefs 2019-08-20 2019-10-24
FreeBSD -- kernel memory disclosure from /dev/midistat FreeBSD-kernel 12.012.0_10 11.311.3_3 11.211.2_14

Problem Description:

The kernel driver for /dev/midistat implements a handler for read(2). This handler is not thread-safe, and a multi-threaded program can exploit races in the handler to cause it to copy out kernel memory outside the boundaries of midistat's data buffer.

Impact:

The races allow a program to read kernel memory within a 4GB window centered at midistat's data buffer. The buffer is allocated each time the device is opened, so an attacker is not limited to a static 4GB region of memory.

On 32-bit platforms, an attempt to trigger the race may cause a page fault in kernel mode, leading to a panic.

CVE-2019-5612 SA-19:23.midi 2019-08-20 2019-10-24
FreeBSD -- IPv6 remote Denial-of-Service FreeBSD-kernel 12.012.0_10 11.311.3_3 11.211.2_14

Problem Description:

Due do a missing check in the code of m_pulldown(9) data returned may not be contiguous as requested by the caller.

Impact:

Extra checks in the IPv6 code catch the error condition and trigger a kernel panic leading to a remote DoS (denial-of-service) attack with certain Ethernet interfaces. At this point it is unknown if any other than the IPv6 code paths can trigger a similar condition.

CVE-2019-5611 SA-19:22.mbuf 2019-08-20 2019-10-24
FreeBSD -- Insufficient validation of guest-supplied data (e1000 device) FreeBSD-kernel 12.012.0_9 11.311.3_2 11.211.2_13

Problem Description:

The e1000 network adapters permit a variety of modifications to an Ethernet packet when it is being transmitted. These include the insertion of IP and TCP checksums, insertion of an Ethernet VLAN header, and TCP segmentation offload ("TSO"). The e1000 device model uses an on-stack buffer to generate the modified packet header when simulating these modifications on transmitted packets.

When TCP segmentation offload is requested for a transmitted packet, the e1000 device model used a guest-provided value to determine the size of the on-stack buffer without validation. The subsequent header generation could overflow an incorrectly sized buffer or indirect a pointer composed of stack garbage.

Impact:

A misbehaving bhyve guest could overwrite memory in the bhyve process on the host.

CVE-2019-5609 SA-19:21.bhyve 2019-08-06 2019-10-24
FreeBSD -- Insufficient message length validation in bsnmp library FreeBSD 12.012.0_9 11.311.3_2 11.211.2_13

Problem Description:

A function extracting the length from type-length-value encoding is not properly validating the submitted length.

Impact:

A remote user could cause, for example, an out-of-bounds read, decoding of unrelated data, or trigger a crash of the software such as bsnmpd resulting in a denial of service.

CVE-2019-5610 SA-19:20.bsnmp 2019-08-06 2019-10-24
FreeBSD -- ICMPv6 / MLDv2 out-of-bounds memory access FreeBSD-kernel 12.012.0_9 11.311.3_2 11.211.2_13

Problem Description:

The ICMPv6 input path incorrectly handles cases where an MLDv2 listener query packet is internally fragmented across multiple mbufs.

Impact:

A remote attacker may be able to cause an out-of-bounds read or write that may cause the kernel to attempt to access an unmapped page and subsequently panic.

CVE-2019-5608 SA-19:19.mldv2 2019-08-06 2019-10-24
FreeBSD -- Multiple vulnerabilities in bzip2 FreeBSD 12.012.0_9 11.311.3_2 11.211.2_13

Problem Description:

The decompressor used in bzip2 contains a bug which can lead to an out-of-bounds write when processing a specially crafted bzip2(1) file.

bzip2recover contains a heap use-after-free bug which can be triggered when processing a specially crafted bzip2(1) file.

Impact:

An attacker who can cause maliciously crafted input to be processed may trigger either of these bugs. The bzip2recover bug may cause a crash, permitting a denial-of-service. The bzip2 decompressor bug could potentially be exploited to execute arbitrary code.

Note that some utilities, including the tar(1) archiver and the bspatch(1) binary patching utility (used in portsnap(8) and freebsd-update(8)) decompress bzip2(1)-compressed data internally; system administrators should assume that their systems will at some point decompress bzip2(1)-compressed data even if they never explicitly invoke the bunzip2(1) utility.

CVE-2016-3189 CVE-2019-1290 SA-19:18.bzip2 2019-08-06 2019-10-24
varnish -- Information Disclosure Vulnerability varnish6 6.3.1

Varnish Software reports:

A bug has been discovered in Varnish Cache where we fail to clear a pointer between the handling of one client requests and the next on the same connection. This can under specific circumstances lead to information being leaked from the connection workspace.

https://varnish-cache.org/security/VSV00004.html#vsv00004 2019-10-21 2019-10-24
sudo -- Potential bypass of Runas user restrictions sudo 1.8.28

Todd C. Miller reports:

When sudo is configured to allow a user to run commands as an arbitrary user via the ALL keyword in a Runas specification, it is possible to run commands as root by specifying the user ID -1 or 4294967295.

This can be used by a user with sufficient sudo privileges to run commands as root even if the Runas specification explicitly disallows root access as long as the ALL keyword is listed first in the Runas specification.

Log entries for commands run this way will list the target user as 4294967295 instead of root. In addition, PAM session modules will not be run for the command.

https://www.sudo.ws/alerts/minus_1_uid.html CVE-2019-14287 2019-10-15 2019-10-24
Loofah -- XSS vulnerability rubygem-loofah 2.3.1

GitHub issue:

This issue has been created for public disclosure of an XSS vulnerability that was responsibly reported by https://hackerone.com/vxhex

In the Loofah gem, through v2.3.0, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.

https://github.com/flavorjones/loofah/releases https://github.com/flavorjones/loofah/issues/171 CVE-2019-15587 2019-10-22 2019-10-23
python 3.7 -- multiple vulnerabilities python37 3.7.5

Python changelog:

bpo-38243: Escape the server title of xmlrpc.server.DocXMLRPCServer when rendering the document page as HTML.

bpo-38174: Update vendorized expat library version to 2.2.8, which resolves CVE-2019-15903.

bpo-37764: Fixes email._header_value_parser.get_unstructured going into an infinite loop for a specific case in which the email header does not have trailing whitespace, and the case in which it contains an invalid encoded word.

bpo-37461: Fix an infinite loop when parsing specially crafted email headers.

bpo-34155: Fix parsing of invalid email addresses with more than one @ (e.g. a@b@c.com.) to not return the part before 2nd @ as valid email address.

https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-5-final CVE-2019-15903 2019-09-14 2019-10-19
Pillow -- Allocation of resources without limits or throttling py27-pillow py35-pillow py36-pillow py37-pillow 6.2.0

Mitre reports:

An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image.

https://github.com/python-pillow/Pillow/issues/4123 CVE-2019-16865 ports/241268 2019-09-24 2019-10-15
mongodb -- Bump Windows package dependencies mongodb34 3.4.22 mongodb36 3.6.14 mongodb40 4.0.11

Rich Mirch reports:

An unprivileged user or program on Microsoft Windows which can create OpenSSL configuration files in a fixed location may cause utility programs shipped with MongoDB server versions less than 4.0.11, 3.6.14, and 3.4.22 to run attacker defined code as the user running the utility.

CVE-2019-2390 https://jira.mongodb.org/browse/SERVER-42233 2019-08-06 2019-09-30
mongodb -- Our init scripts check /proc/[pid]/stat should validate that `(${procname})` is the process' command name. mongodb34 3.4.22 mongodb36 3.6.14 mongodb40 4.0.11

Sicheng Liu of Beijing DBSEC Technology Co., Ltd reports:

Incorrect scoping of kill operations in MongoDB Server's packaged SysV init scripts allow users with write access to the PID file to insert arbitrary PIDs to be killed when the root user stops the MongoDB process via SysV init.

CVE-2019-2389 https://jira.mongodb.org/browse/SERVER-40563 2019-08-06 2019-09-30
mongodb -- Attach IDs to users mongodb34 3.4.22 mongodb36 3.6.13 mongodb40 4.0.9

Mitch Wasson of Cisco's Advanced Malware Protection Group reports:

After user deletion in MongoDB Server the improper invalidation of authorization sessions allows an authenticated user's session to persist and become conflated with new accounts, if those accounts reuse the names of deleted ones.

CVE-2019-2386 https://jira.mongodb.org/browse/SERVER-38984 2019-08-06 2019-09-28
mod_perl2 -- execute arbitrary Perl code ap24-mod_perl2 2.0.11,3

mod_perl2 2.0.11 fixes Arbitrary Perl code execution in the context of the user account via a user-owned .htaccess.

mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2767 https://www.securityfocus.com/bid/105195 https://access.redhat.com/errata/RHSA-2018:2826 https://bugs.debian.org/644169 https://usn.ubuntu.com/3825-2/ 2011-07-19 2019-10-09
Xpdf -- Multiple Vulnerabilities xpdf 4.02,1 xpdf4 4.02,1 xpdf3 3.04_11

Xpdf 4.02 fixes two vulnerabilities. Both fixes have been backported to 3.04.

An invalid memory access vulnerability in TextPage::findGaps() in Xpdf 4.01 through a crafted PDF document can cause a segfault.

An out of bounds write exists in TextPage::findGaps() of Xpdf 4.01.01

https://nvd.nist.gov/vuln/detail/CVE-2019-9877 https://nvd.nist.gov/vuln/detail/CVE-2019-16927 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9877 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1692 2019-10-01 2019-10-06
unbound -- parsing vulnerability unbound 1.7.11.9.4

Unbound Security Advisories:

Due to an error in parsing NOTIFY queries, it is possible for Unbound to continue processing malformed queries and may ultimately result in a pointer dereference in uninitialized memory. This results in a crash of the Unbound daemon.

https://www.nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-parsing-notify-queries CVE-2019-16866 2019-10-03 2019-10-03
ruby -- multiple vulnerabilities ruby 2.4.0,12.4.9,1 2.5.0,12.5.7,1 2.6.0,12.6.5,1

Ruby news:

This release includes security fixes. Please check the topics below for details.

CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch?

A NUL injection vulnerability of Ruby built-in methods (File.fnmatch and File.fnmatch?) was found. An attacker who has the control of the path pattern parameter could exploit this vulnerability to make path matching pass despite the intention of the program author.

CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick's Digest access authentication

Regular expression denial of service vulnerability of WEBrick's Digest authentication module was found. An attacker can exploit this vulnerability to cause an effective denial of service against a WEBrick service.

CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)

There is an HTTP response splitting vulnerability in WEBrick bundled with Ruby.

CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test

A code injection vulnerability of Shell#[] and Shell#test in a standard library (lib/shell.rb) was found.

https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-6-5-released/ https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-5-7-released/ https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-4-8-released/ https://www.ruby-lang.org/en/news/2019/10/02/ruby-2-4-9-released/ https://www.ruby-lang.org/en/news/2019/10/01/nul-injection-file-fnmatch-cve-2019-15845/ https://www.ruby-lang.org/en/news/2019/10/01/webrick-regexp-digestauth-dos-cve-2019-16201/ https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/ https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255/ CVE-2019-15845 CVE-2019-16201 CVE-2019-16254 CVE-2019-16255 2019-10-01 2019-10-02
Gitlab -- Disclosure Vulnerabilities gitlab-ce 12.3.012.3.3 12.2.012.2.7 8.17.012.1.13

Gitlab reports:

Disclosure of Private Code, Merge Requests and Commits via Elasticsearch integration

https://about.gitlab.com/2019/10/02/security-release-gitlab-12-dot-3-dot-3-released/ 2019-10-02 2019-10-02
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.3.012.3.2 12.2.012.2.6 7.12.012.1.12

SO-AND-SO reports:

XSS in Markdown Preview Using Mermaid

Bypass Email Verification using Salesforce Authentication

Account Takeover using SAML

Uncontrolled Resource Consumption in Markdown using Mermaid

Disclosure of Private Project Path and Labels

Disclosure of Assignees via Milestones

Disclosure of Project Path via Unsubscribe Link

Disclosure of Project Milestones via Groups

Disclosure of Private System Notes via GraphQL

GIT Command Injection via API

Bypass User Blocking via CI/CD token

IDOR Adding Groups to Protected Environments

Disclosure of Group Membership via Merge Request Approval Rules

Disclosure of Head Pipeline via Blocking Merge Request Feature

Grafana update

https://about.gitlab.com/2019/09/30/security-release-gitlab-12-dot-3-dot-2-released/ CVE-2019-19039 2019-09-30 2019-10-02
cacti -- Authenticated users may bypass authorization checks cacti 1.2.7

The cacti developers reports:

In Cacti through 1.2.6, authenticated users may bypass authorization checks (for viewing a graph) via a direct graph_json.php request with a modified local_graph_id parameter.

CVE-2019-16723 https://github.com/Cacti/cacti/releases/tag/release%2F1.2.7 2019-09-23 2019-10-02
Exim -- heap-based buffer overflow in string_vformat leading to RCE exim 4.924.92.3

Exim developers team report:

There is a heap overflow in string_vformat().Using a EHLO message, remote code execution seems to be possible.

https://www.openwall.com/lists/oss-security/2019/09/28/1 2019-09-28 2019-09-29
go -- invalid headers are normalized, allowing request smuggling go 1.13.1,1 go-devel g20190925

The Go project reports:

net/http (through net/textproto) used to accept and normalize invalid HTTP/1.1 headers with a space before the colon, in violation of RFC 7230. If a Go server is used behind a reverse proxy that accepts and forwards but doesn't normalize such invalid headers, the reverse proxy and the server can interpret the headers differently. This can lead to filter bypasses or request smuggling, the latter if requests from separate clients are multiplexed onto the same connection by the proxy. Such invalid headers are now rejected by Go servers, and passed without normalization to Go client applications.

CVE-2019-16276 https://github.com/golang/go/issues/34540 2019-09-25 2019-09-26
mantis -- multiple vulnerabilities mantis-php71 mantis-php72 mantis-php73 mantis-php74 2.22.1,1

The Mantis developers report:

CVE-2019-15715: [Admin Required - Post Authentication] Command Execution / Injection Vulnerability

CVE-2019-8331: In Bootstrap before 3.4.1, XSS is possible in the tooltip or popover data-template attribute

Missing integrity hashes for CSS resources from CDNs

https://mantisbt.org/bugs/changelog_page.php?project=mantisbt&version=2.22.1 CVE-2019-15715 CVE-2019-8331 2019-08-28 2019-09-27
jenkins -- multiple vulnerabilities jenkins 2.196 jenkins-lts 2.176.3

Jenkins Security Advisory:

Description

(Medium) SECURITY-1498 / CVE-2019-10401

Stored XSS vulnerability in expandable textbox form control

(Medium) SECURITY-1525 / CVE-2019-10402

XSS vulnerability in combobox form control

(Medium) SECURITY-1537 (1) / CVE-2019-10403

Stored XSS vulnerability in SCM tag action tooltip

(Medium) SECURITY-1537 (2) / CVE-2019-10404

Stored XSS vulnerability in queue item tooltip

(Medium) SECURITY-1505 / CVE-2019-10405

Diagnostic web page exposed Cookie HTTP header

(Medium) SECURITY-1471 / CVE-2019-10406

XSS vulnerability in Jenkins URL setting

CVE-2019-10401 CVE-2019-10402 CVE-2019-10403 CVE-2019-10404 CVE-2019-10405 CVE-2019-10406 https://jenkins.io/security/advisory/2019-09-25/ 2019-09-25 2019-09-25
ISC KEA -- Multiple vulnerabilities kea 1.6.0

Internet Systems Consortium, Inc. reports:

A packet containing a malformed DUID can cause the kea-dhcp6 server to terminate (CVE-2019-6472) [Medium]

An invalid hostname option can cause the kea-dhcp4 server to terminate (CVE-2019-6473) [Medium]

An oversight when validating incoming client requests can lead to a situation where the Kea server
will exit when trying to restart (CVE-2019-6474) [Medium]

https://gitlab.isc.org/isc-projects/kea/issues CVE-2019-6472 CVE-2019-6473 CVE-2019-6474 2019-08-28 2019-09-20
expat2 -- Fix extraction of namespace prefixes from XML names expat 2.2.8

expat project reports:

Fix heap overflow triggered by XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber), and deny internal entities closing the doctype

https://github.com/libexpat/libexpat/blob/R_2_2_8/expat/Changes 2019-09-13 2019-09-17
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.2.012.2.5 12.1.012.1.9 11.6.012.0.9

Gitlab reports:

Project Template Functionality Could Be Used to Access Restricted Project Data

Security Enhancements in GitLab Pages

https://about.gitlab.com/2019/09/10/critical-security-release-gitlab-12-dot-2-dot-5-released/ CVE-2019-16170 2019-09-10 2019-09-12
Mbed TLS -- Side channel attack on deterministic ECDSA mbedtls 2.16.3

Janos Follath reports:

Mbed TLS does not have a constant-time/constant-trace arithmetic library and uses blinding to protect against side channel attacks.

In the ECDSA signature routine previous Mbed TLS versions used the same RNG object for generating the ephemeral key pair and for generating the blinding values. The deterministic ECDSA function reused this by passing the RNG object created from the private key and the message to be signed as prescribed by RFC 6979. This meant that the same RNG object was used whenever the same message was signed, rendering the blinding ineffective.

If the victim can be tricked to sign the same message repeatedly, the private key may be recoverable through side channels.

https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2019-10 2019-09-06 2019-09-19
bro -- invalid memory access or heap buffer over-read bro 2.6.4

Jon Siwek of Corelight reports:

This is a security patch release to address a potential Denial of Service vulnerability:

  • The NTLM analyzer did not properly handle AV Pair sequences that were either empty or unterminated, resulting in invalid memory access or heap buffer over-read. The NTLM analyzer is enabled by default and used in the analysis of SMB, DCE/RPC, and GSSAPI protocols.
https://raw.githubusercontent.com/zeek/zeek/3b5a9f88ece1d274edee897837e280ef751bde94/NEWS 2019-08-28 2019-09-17
expat2 -- Fix extraction of namespace prefixes from XML names expat 2.2.7

expat project reports:

XML names with multiple colons could end up in the wrong namespace, and take a high amount of RAM and CPU resources while processing, opening the door to use for denial-of-service attacks

https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes 2019-06-19 2019-09-16
curl -- multiple vulnerabilities curl 7.19.47.66.0

curl security problems:

CVE-2019-5481: FTP-KRB double-free

libcurl can be told to use kerberos over FTP to a server, as set with the CURLOPT_KRBLEVEL option.

During such kerberos FTP data transfer, the server sends data to curl in blocks with the 32 bit size of each block first and then that amount of data immediately following.

A malicious or just broken server can claim to send a very large block and if by doing that it makes curl's subsequent call to realloc() to fail, curl would then misbehave in the exit path and double-free the memory.

In practical terms, an up to 4 GB memory area may very well be fine to allocate on a modern 64 bit system but on 32 bit systems it will fail.

Kerberos FTP is a rarely used protocol with curl. Also, Kerberos authentication is usually only attempted and used with servers that the client has a previous association with.

CVE-2019-5482: TFTP small blocksize heap buffer overflow

libcurl contains a heap buffer overflow in the function (tftp_receive_packet()) that receives data from a TFTP server. It can call recvfrom() with the default size for the buffer rather than with the size that was used to allocate it. Thus, the content that might overwrite the heap memory is controlled by the server.

This flaw is only triggered if the TFTP server sends an OACK without the BLKSIZE option, when a BLKSIZE smaller than 512 bytes was requested by the TFTP client. OACK is a TFTP extension and is not used by all TFTP servers.

Users choosing a smaller block size than default should be rare as the primary use case for changing the size is to make it larger.

It is rare for users to use TFTP across the Internet. It is most commonly used within local networks. TFTP as a protocol is always inherently insecure.

This issue was introduced by the add of the TFTP BLKSIZE option handling. It was previously incompletely fixed by an almost identical issue called CVE-2019-5436.

https://curl.haxx.se/docs/security.html https://curl.haxx.se/docs/CVE-2019-5481.html https://curl.haxx.se/docs/CVE-2019-5482.html CVE-2019-5481 CVE-2019-5482 2019-09-11 2019-09-14
OpenSSL -- Multiple vulnerabilities openssl 1.0.2t,1 openssl111 1.1.1d

The OpenSSL project reports:

ECDSA remote timing attack (CVE-2019-1547) [Low]

Fork Protection (CVE-2019-1549) [Low]
(OpenSSL 1.1.1 only)

https://www.openssl.org/news/secadv/20190910.txt CVE-2019-1547 CVE-2019-1549 2019-09-10 2019-09-11
Flash Player -- multiple vulnerabilities linux-flashplayer 32.0.0.255

Adobe reports:

  • This update resolves a same origin method execution vulnerability that could lead to arbitrary code execution (CVE-2019-8069).
  • This update resolves a use-after-free vulnerability that could lead to arbitrary code execution (CVE-2019-8070).
CVE-2019-8069 CVE-2019-8070 https://helpx.adobe.com/security/products/flash-player/apsb19-46.html 2019-09-10 2019-09-10
oniguruma -- multiple vulnerabilities oniguruma 6.9.3

A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe().

A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression.

Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.

CVE-2019-13224 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224 https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55 CVE-2019-13225 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13225 https://github.com/kkos/oniguruma/commit/c509265c5f6ae7264f7b8a8aae1cfa5fc59d108c 2019-07-03 2019-09-07
xymon-server -- multiple vulnerabilities xymon-server 4.3.29

Japheth Cleaver reports:

Several buffer overflows were reported by University of Cambridge Computer Security Incident Response Team.

https://lists.xymon.com/archive/2019-July/046570.html CVE-2019-13451 CVE-2019-13452 CVE-2019-13455 CVE-2019-13273 CVE-2019-13274 CVE-2019-13484 CVE-2019-13485 CVE-2019-13486 2019-07-23 2019-09-07
wordpress -- multiple issues wordpress fr-wordpress 5.2.3,1 de-wordpress zh_CN-wordpress zh_TW-wordpress ja-wordpress ru-wordpress 5.2.3

wordpress developers reports:

Props to Simon Scannell of RIPS Technologies for finding and disclosing two issues. The first, a cross-site scripting (XSS) vulnerability found in post previews by contributors. The second was a cross-site scripting vulnerability in stored comments.

Props to Tim Coen for disclosing an issue where validation and sanitization of a URL could lead to an open redirect.

Props to Anshul Jain for disclosing reflected cross-site scripting during media uploads.

Props to Zhouyuan Yang of Fortinets FortiGuard Labs who disclosed a vulnerability for cross-site scripting (XSS) in shortcode previews.

Props to Ian Dunn of the Core Security Team for finding and disclosing a case where reflected cross-site scripting could be found in the dashboard.

Props to Soroush Dalilifrom NCC Group for disclosing an issue with URL sanitization that can lead to cross-site scripting (XSS) attacks.

In addition to the above changes, we are also updating jQuery on older versions of WordPress. This change was added in 5.2.1 and is now being brought to older versions.

https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/ 2019-09-05 2019-09-06
Exim -- RCE with root privileges in TLS SNI handler exim 4.92.2

Exim developers report:

If your Exim server accepts TLS connections, it is vulnerable. This does not depend on the TLS libray, so both, GnuTLS and OpenSSL are affected.

The vulnerability is exploitable by sending a SNI ending in a backslash-null sequence during the initial TLS handshake. The exploit exists as a POC. For more details see the document qualys.mbx

https://git.exim.org/exim.git/blob_plain/2600301ba6dbac5c9d640c87007a07ee6dcea1f4:/doc/doc-txt/cve-2019-15846/cve.txt 2019-09-02 2019-09-06
asterisk -- Remote Crash Vulnerability in audio transcoding asterisk13 13.28.1 asterisk16 16.5.1

The Asterisk project reports:

When audio frames are given to the audio transcoding support in Asterisk the number of samples are examined and as part of this a message is output to indicate that no samples are present. A change was done to suppress this message for a particular scenario in which the message was not relevant. This change assumed that information about the origin of a frame will always exist when in reality it may not.

This issue presented itself when an RTP packet containing no audio (and thus no samples) was received. In a particular transcoding scenario this audio frame would get turned into a frame with no origin information. If this new frame was then given to the audio transcoding support a crash would occur as no samples and no origin information would be present. The transcoding scenario requires the genericplc option to be set to enabled (the default) and a transcoding path from the source format into signed linear and then from signed linear into another format.

Note that there may be other scenarios that have not been found which can cause an audio frame with no origin to be given to the audio transcoding support and thus cause a crash.

https://downloads.asterisk.org/pub/security/AST-2019-005.html CVE-2019-15639 2019-08-07 2019-09-06
asterisk -- Crash when negotiating for T.38 with a declined stream asterisk15 15.7.4 asterisk16 16.5.1

The Asterisk project reports:

When Asterisk sends a re-invite initiating T.38 faxing, and the endpoint responds with a declined media stream a crash will then occur in Asterisk.

https://downloads.asterisk.org/pub/security/AST-2019-004.html CVE-2019-15297 2019-08-05 2019-09-06
samba -- combination of parameters and permissions can allow user to escape from the share path definition samba410 4.10.8

The samba project reports:

On a Samba SMB server for all versions of Samba from 4.9.0 clients are able to escape outside the share root directory if certain configuration parameters set in the smb.conf file.

CVE-2019-10197 https://www.samba.org/samba/security/CVE-2019-10197.html 2019-09-01 2019-09-03
mozilla -- multiple vulnerabilities firefox 69.0,1 waterfox 56.2.14 seamonkey linux-seamonkey 2.53.0 firefox-esr 61.0,168.1.0,1 60.9.0,1 linux-firefox 61.0,268.1.0,2 60.9.0,2 libxul thunderbird linux-thunderbird 61.068.1.0 60.9.0

Mozilla Foundation reports:

CVE-2019-11751: Malicious code execution through command line parameters

CVE-2019-11746: Use-after-free while manipulating video

CVE-2019-11744: XSS by breaking out of title and textarea elements using innerHTML

CVE-2019-11742: Same-origin policy violation with SVG filters and canvas to steal cross-origin images

CVE-2019-11736: File manipulation and privilege escalation in Mozilla Maintenance Service

CVE-2019-11753: Privilege escalation with Mozilla Maintenance Service in custom Firefox installation location

CVE-2019-11752: Use-after-free while extracting a key value in IndexedDB

CVE-2019-9812: Sandbox escape through Firefox Sync

CVE-2019-11741: Isolate addons.mozilla.org and accounts.firefox.com

CVE-2019-11743: Cross-origin access to unload event attributes

CVE-2019-11748: Persistence of WebRTC permissions in a third party context

CVE-2019-11749: Camera information available without prompting using getUserMedia

CVE-2019-5849: Out-of-bounds read in Skia

CVE-2019-11750: Type confusion in Spidermonkey

CVE-2019-11737: Content security policy directives ignore port and path if host is a wildcard

CVE-2019-11738: Content security policy bypass through hash-based sources in directives

CVE-2019-11747: 'Forget about this site' removes sites from pre-loaded HSTS list

CVE-2019-11734: Memory safety bugs fixed in Firefox 69

CVE-2019-11735: Memory safety bugs fixed in Firefox 69 and Firefox ESR 68.1

CVE-2019-11740: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9

CVE-2019-11734 CVE-2019-11735 CVE-2019-11736 CVE-2019-11737 CVE-2019-11738 CVE-2019-11740 CVE-2019-11741 CVE-2019-11742 CVE-2019-11743 CVE-2019-11744 CVE-2019-11746 CVE-2019-11747 CVE-2019-11748 CVE-2019-11749 CVE-2019-11750 CVE-2019-11751 CVE-2019-11752 CVE-2019-11753 CVE-2019-5849 CVE-2019-9812 https://www.mozilla.org/security/advisories/mfsa2019-25/ https://www.mozilla.org/security/advisories/mfsa2019-26/ https://www.mozilla.org/security/advisories/mfsa2019-27/ 2019-09-03 2019-09-03
www/varnish6 -- Denial of Service varnish6 6.2.1

The Varnish Team reports:

A failure in HTTP/1 parsing can allow a remote attacker to trigger an assertion in varnish, restarting the daemon and clearing the cache.

https://varnish-cache.org/security/VSV00003.html 2019-09-02 2019-09-03
libgcrypt -- ECDSA timing attack libgcrypt 1.8.5

GnuPG reports:

Mitigate an ECDSA timing attack.

CVE-2019-13627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627 2019-08-29 2019-09-02
webkit2-gtk3 -- Multiple vulnerabilities webkit2-gtk3 2.24.4

The WebKitGTK project reports many vulnerabilities, including several arbitrary code execution vulnerabilities.

https://webkitgtk.org/security/WSA-2019-0004.html CVE-2019-8644 CVE-2019-8649 CVE-2019-8658 CVE-2019-8666 CVE-2019-8669 CVE-2019-8671 CVE-2019-8672 CVE-2019-8673 CVE-2019-8676 CVE-2019-8677 CVE-2019-8678 CVE-2019-8679 CVE-2019-8680 CVE-2019-8681 CVE-2019-8683 CVE-2019-8684 CVE-2019-8686 CVE-2019-8687 CVE-2019-8688 CVE-2019-8689 CVE-2019-8690 2019-08-29 2019-08-30
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.2.012.2.3 12.1.012.1.8 0.0.012.0.8

Gitlab reports:

Kubernetes Integration Server-Side Request Forgery

Server-Side Request Forgery in Jira Integration

Improved Protection Against Credential Stuffing Attacks

Markdown Clientside Resource Exhaustion

Pipeline Status Disclosure

Group Runner Authorization Issue

CI Metrics Disclosure

User IP Disclosed by Embedded Image and Media

Label Description HTML Injection

IDOR in Epic Notes API

Push Rule Bypass

Project Visibility Restriction Bypass

Merge Request Discussion Restriction Bypass

Disclosure of Merge Request IDs

Weak Authentication In Certain Account Actions

Disclosure of Commit Title and Comments

Stored XSS via Markdown

EXIF Geolocation Data Exposure

Multiple SSRF Regressions on Gitaly

Default Branch Name Exposure

Potential Denial of Service via CI Pipelines

Privilege Escalation via Logrotate

https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ CVE-2019-15728 CVE-2019-15730 CVE-2019-15722 CVE-2019-15729 CVE-2019-15721 CVE-2019-15727 CVE-2019-15726 CVE-2019-15724 CVE-2019-15725 CVE-2019-15723 CVE-2019-15732 CVE-2019-15731 CVE-2019-15738 CVE-2019-15737 CVE-2019-15734 CVE-2019-15739 CVE-2019-15740 CVE-2019-15733 CVE-2019-15736 CVE-2019-15741 2019-08-29 2019-08-30
RDoc -- multiple jQuery vulnerabilities ruby 2.4.0,12.4.7,1 2.5.0,12.5.6,1 2.6.0,12.6.3,1 rubygem-rdoc 6.1.2

Ruby news:

There are multiple vulnerabilities about Cross-Site Scripting (XSS) in jQuery shipped with RDoc which bundled in Ruby. All Ruby users are recommended to update Ruby to the latest release which includes the fixed version of RDoc.

The following vulnerabilities have been reported.

CVE-2012-6708

CVE-2015-9251

https://www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/ CVE-2012-6708 CVE-2015-9251 2019-08-28 2019-08-29 2019-08-31
Dovecot -- improper input validation dovecot 2.3.7.2 dovecot-pigeonhole 0.5.7.2

Aki Tuomi reports:

Vulnerability Details: IMAP and ManageSieve protocol parsers do not properly handle NUL byte when scanning data in quoted strings, leading to out of bounds heap memory writes. Risk: This vulnerability allows for out-of-bounds writes to objects stored on the heap up to 8096 bytes in pre-login phase, and 65536 bytes post-login phase, allowing sufficiently skilled attacker to perform complicated attacks that can lead to leaking private information or remote code execution. Abuse of this bug is very difficult to observe, as it does not necessarily cause a crash. Attempts to abuse this bug are not directly evident from logs.

https://dovecot.org/pipermail/dovecot/2019-August/116874.html CVE-2019-11500 2019-04-13 2019-08-28
jenkins -- multiple vulnerabilities jenkins 2.191 jenkins-lts 2.176.2

Jenkins Security Advisory:

Description

(Medium) SECURITY-1453 / CVE-2019-10383

Stored XSS vulnerability in update center

(High) SECURITY-1491 / CVE-2019-10384

CSRF protection tokens for anonymous users did not expire in some circumstances

CVE-2019-10383 CVE-2019-10384 https://jenkins.io/security/advisory/2019-08-28/ 2019-08-28 2019-08-28
Mozilla -- Stored passwords in 'Saved Logins' can be copied without master password entry cliqz 1.28.2 firefox 68.0.2,1

Mozilla Foundation reports:

CVE-2019-11733: Stored passwords in 'Saved Logins' can be copied without master password entry

When a master password is set, it is required to be entered again before stored passwords can be accessed in the 'Saved Logins' dialog. It was found that locally stored passwords can be copied to the clipboard thorough the 'copy password' context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords.

https://www.mozilla.org/security/advisories/mfsa2019-24/ CVE-2019-11733 2019-08-14 2019-08-28
h2o -- multiple HTTP/2 vulnerabilities h2o-devel 2.3.0.b2

Jonathon Loomey of Netflix reports:

HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion

Recently, a series of DoS attack vulnerabilities have been reported on a broad range of HTTP/2 stacks. Among the vulnerabilities, H2O is exposed to the following:

  • CVE-2019-9512 "Ping Flood": The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
  • CVE-2019-9514 "Reset Flood": The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both, potentially leading to a denial of service.
  • CVE-2019-9515 "Settings Flood": The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
https://github.com/h2o/h2o/issues/2090 https://www.kb.cert.org/vuls/id/605641/ CVE-2019-9512 CVE-2019-9514 CVE-2019-9515 2019-08-13 2019-08-25
h2o -- multiple HTTP/2 vulnerabilities h2o 2.2.6

Jonathon Loomey of Netflix reports:

HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion

Recently, a series of DoS attack vulnerabilities have been reported on a broad range of HTTP/2 stacks. Among the vulnerabilities, H2O is exposed to the following:

  • CVE-2019-9512 "Ping Flood": The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
  • CVE-2019-9514 "Reset Flood": The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both, potentially leading to a denial of service.
  • CVE-2019-9515 "Settings Flood": The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
https://github.com/h2o/h2o/issues/2090 https://www.kb.cert.org/vuls/id/605641/ CVE-2019-9512 CVE-2019-9514 CVE-2019-9515 2019-08-13 2019-08-25
gitea -- multiple vulnerabilities gitea 1.9.2

The Gitea Team reports:

This release contains two security fixes, so we highly recommend updating.

https://github.com/go-gitea/gitea/releases/tag/v1.9.2 https://blog.gitea.io/2019/08/gitea-1.9.2-is-released/ 2019-08-22 2019-08-22
clamav -- multiple vulnerabilities clamav 0.101.4,1 clamav-milter 0.101.4,1

Micah Snyder reports:

  • An out of bounds write was possible within ClamAV&s NSIS bzip2 library when attempting decompression in cases where the number of selectors exceeded the max limit set by the library (CVE-2019-12900). The issue has been resolved by respecting that limit.
  • The zip bomb vulnerability mitigated in 0.101.3 has been assigned the CVE identifier CVE-2019-12625. Unfortunately, a workaround for the zip-bomb mitigation was immediately identified. To remediate the zip-bomb scan time issue, a scan time limit has been introduced in 0.101.4. This limit now resolves ClamAV's vulnerability to CVE-2019-12625.
https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html CVE-2019-12625 CVE-2019-12900 2019-08-21 2019-08-21
Node.js -- multiple vulnerabilities node 12.8.1 node10 10.16.3 node8 8.16.1

Node.js reports:

Node.js, as well as many other implementations of HTTP/2, have been found vulnerable to Denial of Service attacks. See https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md for more information.

Updates are now available for all active Node.js release lines, including Linux ARMv6 builds for Node.js 8.x (which had been delayed).

We recommend that all Node.js users upgrade to a version listed below as soon as possible.

Vulnerabilities Fixed

Impact: All versions of Node.js 8 (LTS "Carbon"), Node.js 10 (LTS "Dubnium"), and Node.js 12 (Current) are vulnerable to the following:

  • CVE-2019-9511 "Data Dribble": The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
  • CVE-2019-9512 "Ping Flood": The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
  • CVE-2019-9513 "Resource Loop": The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU, potentially leading to a denial of service.
  • CVE-2019-9514 "Reset Flood": The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both, potentially leading to a denial of service.
  • CVE-2019-9515 "Settings Flood": The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
  • CVE-2019-9516 "0-Length Headers Leak": The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory, potentially leading to a denial of service.
  • CVE-2019-9517 "Internal Data Buffering": The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both, potentially leading to a denial of service.
  • CVE-2019-9518 "Empty Frames Flood": The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU, potentially leading to a denial of service. (Discovered by Piotr Sikora of Google)
https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/ CVE-2019-9511 CVE-2019-9512 CVE-2019-9513 CVE-2019-9514 CVE-2019-9515 CVE-2019-9516 CVE-2019-9517 CVE-2019-9518 2019-08-16 2019-08-21
vlc -- multiple vulnerabilities vlc 3.0.8,4

The VLC project reports:

Security: * Fix a buffer overflow in the MKV demuxer (CVE-2019-14970) * Fix a read buffer overflow in the avcodec decoder (CVE-2019-13962) * Fix a read buffer overflow in the FAAD decoder * Fix a read buffer overflow in the OGG demuxer (CVE-2019-14437, CVE-2019-14438) * Fix a read buffer overflow in the ASF demuxer (CVE-2019-14776) * Fix a use after free in the MKV demuxer (CVE-2019-14777, CVE-2019-14778) * Fix a use after free in the ASF demuxer (CVE-2019-14533) * Fix a couple of integer underflows in the MP4 demuxer (CVE-2019-13602) * Fix a null dereference in the dvdnav demuxer * Fix a null dereference in the ASF demuxer (CVE-2019-14534) * Fix a null dereference in the AVI demuxer * Fix a division by zero in the CAF demuxer (CVE-2019-14498) * Fix a division by zero in the ASF demuxer (CVE-2019-14535)

https://www.videolan.org/developers/vlc-branch/NEWS CVE-2019-13602 CVE-2019-13962 CVE-2019-14437 CVE-2019-14438 CVE-2019-14498 CVE-2019-14533 CVE-2019-14534 CVE-2019-14535 CVE-2019-14776 CVE-2019-14777 CVE-2019-14778 CVE-2019-14970 2019-07-14 2019-08-20
nsd -- Stack-based Buffer Overflow nsd 4.2.2

SO-AND-SO reports:

nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.

https://nvd.nist.gov/vuln/detail/CVE-2019-13207 https://github.com/NLnetLabs/nsd/issues/20 CVE-2019-13207 2019-07-28 2019-08-19
webmin -- unauthenticated remote code execution webmin 1.930 usermin 1.780

Joe Cooper reports:

I've rolled out Webmin version 1.930 and Usermin version 1.780 for all repositories. This release includes several security fixes, including one potentially serious one caused by malicious code inserted into Webmin and Usermin at some point on our build infrastructure. We're still investigating how and when, but the exploitable code has never existed in our github repositories, so we've rebuilt from git source on new infrastructure (and checked to be sure the result does not contain the malicious code).

I don't have a changelog for these releases yet, but I wanted to announce them immediately due to the severity of this issue. To exploit the malicious code, your Webmin installation must have Webmin -> Webmin Configuration -> Authentication -> Password expiry policy set to Prompt users with expired passwords to enter a new one. This option is not set by default, but if it is set, it allows remote code execution.

This release addresses CVE-2019-15107, which was disclosed earlier today. It also addresses a handful of XSS issues that we were notified about, and a bounty was awarded to the researcher (a different one) who found them.

https://virtualmin.com/node/66890 CVE-2019-15107 2019-08-17 2019-08-17
gitea -- multiple vulnerabilities gitea 1.9.1

The Gitea Team reports:

This release contains two security fixes, so we highly recommend updating.

https://blog.gitea.io/2019/08/gitea-1.9.1-is-released/ https://github.com/go-gitea/gitea/releases/tag/v1.9.1 2019-07-31 2019-07-31
xdm -- remote denial of service xdm 1.1.12

nvd.nist.gov reports

X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the "!" character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.

https://nvd.nist.gov/vuln/detail/CVE-2013-2179 CVE-2013-2179 2013-06-07 2019-08-18
Libgit2 -- multiple vulnerabilities libgit2 0.28.3

The Git community reports:

A carefully constructed commit object with a very large number of parents may lead to potential out-of-bounds writes or potential denial of service.

The ProgramData configuration file is always read for compatibility with Git for Windows and Portable Git installations. The ProgramData location is not necessarily writable only by administrators, so we now ensure that the configuration file is owned by the administrator or the current user.

https://github.com/libgit2/libgit2/releases/tag/v0.28.3 2019-08-13 2019-08-18
Apache -- Multiple vulnerabilities apache24 2.4.41

SO-AND-SO reports:

SECURITY: CVE-2019-10081

mod_http2: HTTP/2 very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.

SECURITY: CVE-2019-9517

mod_http2: a malicious client could perform a DoS attack by flooding a connection with requests and basically never reading responses on the TCP connection. Depending on h2 worker dimensioning, it was possible to block those with relatively few connections.

SECURITY: CVE-2019-10098

rewrite, core: Set PCRE_DOTALL flag by default to avoid unpredictable matches and substitutions with encoded line break characters.

SECURITY: CVE-2019-10092

Remove HTML-escaped URLs from canned error responses to prevent misleading text/links being displayed via crafted links.

SECURITY: CVE-2019-10097

mod_remoteip: Fix stack buffer overflow and NULL pointer deference when reading the PROXY protocol header.

CVE-2019-10082

mod_http2: Using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.

http://www.apache.org/dist/httpd/CHANGES_2.4 CVE-2019-10081 CVE-2019-9517 CVE-2019-10098 CVE-2019-10092 CVE-2019-10082 2019-08-14 2019-08-17
nghttp2 -- multiple vulnerabilities libnghttp2 nghttp2 1.39.2

nghttp2 GitHub releases:

This release fixes CVE-2019-9511 "Data Dribble" and CVE-2019-9513 "Resource Loop" vulnerability in nghttpx and nghttpd. Specially crafted HTTP/2 frames cause Denial of Service by consuming CPU time. Check out https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md for details. For nghttpx, additionally limiting inbound traffic by --read-rate and --read-burst options is quite effective against this kind of attack.

CVE-2019-9511 "Data Dribble": The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.

CVE-2019-9513 "Ping Flood": The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.

https://github.com/nghttp2/nghttp2/releases https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md CVE-2019-9511 CVE-2019-9513 2019-08-13 2019-08-16
CUPS -- multiple vulnerabilities cups 2.2.12

Apple reports:

  • CVE-2019-8696 and CVE-2019-8675: SNMP buffer overflows.
  • IPP buffer overflow.
  • Memory disclosure in the scheduler.
  • DoS issues in the scheduler.
https://github.com/apple/cups/releases/tag/v2.2.12 CVE-2019-8675 CVE-2019-8696 2019-08-15 2019-08-16
traefik -- Denial of service in HTTP/2 traefik 1.7.14

The traefik project reports:

Update of dependency to go go1.12.8 resolves potential HTTP/2 denial of service in traefik.

https://github.com/containous/traefik/releases/tag/v1.7.14 CVE-2019-9512 CVE-2019-9514 2019-08-13 2019-08-15
NGINX -- Multiple vulnerabilities nginx 1.16.1,2 nginx-devel 1.17.3

NGINX Team reports:

Several security issues were identified in nginx HTTP/2 implementation which might cause excessive memory consumption and CPU usage (CVE-2019-9511, CVE-2019-9513, CVE-2019-9516). The issues affect nginx compiled with the ngx_http_v2_module (not compiled by default) if the http2 option of the listen directive is used in a configuration file.

http://nginx.org/en/security_advisories.html CVE-2019-9511 CVE-2019-9513 CVE-2019-9516 2019-08-13 2019-08-14 2019-08-14
Nokogiri -- injection vulnerability rubygem-nokogiri 1.10.4

Nokogiri GitHub release:

A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess by Ruby's Kernel.open method. Processes are vulnerable only if the undocumented method Nokogiri::CSS::Tokenizer#load_file is being passed untrusted user input.

This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.

https://github.com/sparklemotion/nokogiri/releases https://github.com/sparklemotion/nokogiri/issues/1915 CVE-2019-5477 2019-08-11 2019-08-13
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.1.012.1.6 12.0.012.0.6 10.0.011.11.8

Gitlab reports:

Insecure Authentication Methods Disabled for Grafana By Default

Multiple Command-Line Flag Injection Vulnerabilities

Insecure Cookie Handling on GitLab Pages

https://about.gitlab.com/2019/08/12/critical-security-release-gitlab-12-dot-1-dot-6-released/ CVE-2019-14943 CVE-2019-14944 CVE-2019-14942 2019-08-12 2019-08-13
KDE Frameworks -- malicious .desktop files execute code kf5-kconfig 5.60.0_2

The KDE Community has released a security announcement:

The syntax Key[$e]=$(shell command) in *.desktop files, .directory files, and configuration files (typically found in ~/.config) was an intentional feature of KConfig, to allow flexible configuration. This could however be abused by malicious people to make the users install such files and get code executed even without intentional action by the user.

CVE-2019-14744 https://kde.org/info/security/advisory-20190807-1.txt 2019-08-07 2019-08-09
doas -- Prevent passing of environment variables doas 6.1

Jesse Smith (upstream author of the doas program) reported:

Previous versions of "doas" transferred most environment variables, such as USER, HOME, and PATH from the original user to the target user. Passing these variables could cause files in the wrong path or home directory to be read (or written to), which resulted in potential security problems.

Many thanks to Sander Bos for reporting this issue and explaining how it can be exploited.

https://marc.info/?l=openbsd-tech&m=156105665713340&w=2 https://github.com/slicer69/doas/releases/tag/6.1 2019-08-03 2019-08-09 2019-08-15
bro -- Null pointer dereference and Signed integer overflow bro 2.6.3

Jon Siwek of Corelight reports:

This is a security patch release to address potential Denial of Service vulnerabilities:

  • Null pointer dereference in the RPC analysis code. RPC analyzers (e.g. MOUNT or NFS) are not enabled in the default configuration.
  • Signed integer overflow in BinPAC-generated parser code. The result of this is Undefined Behavior with respect to the array bounds checking conditions that BinPAC generates, so it's unpredictable what an optimizing compiler may actually do under the assumption that signed integer overlows should never happen. The specific symptom which lead to finding this issue was with the PE analyzer causing out-of-memory crashes due to large allocations that were otherwise prevented when the array bounds checking logic was changed to prevent any possible signed integer overlow.
https://raw.githubusercontent.com/zeek/zeek/1d874e5548a58b3b8fd2a342fe4aa0944e779809/NEWS 2019-06-22 2019-08-09
PostgresSQL -- TYPE in pg_temp execute arbitrary SQL during `SECURITY DEFINER` execution postgresql11-server 11.5 postgresql10-server 10.10 postgresql96-server 9.6.15 postgresql95-server 9.5.19 postgresql94-server 9.4.24

The PostgreSQL project reports:

Versions Affected: 9.4 - 11

Given a suitable `SECURITY DEFINER` function, an attacker can execute arbitrary SQL under the identity of the function owner. An attack requires `EXECUTE` permission on the function, which must itself contain a function call having inexact argument type match. For example, `length('foo'::varchar)` and `length('foo')` are inexact, while `length('foo'::text)` is exact. As part of exploiting this vulnerability, the attacker uses `CREATE DOMAIN` to create a type in a `pg_temp` schema. The attack pattern and fix are similar to that for CVE-2007-2138.

Writing `SECURITY DEFINER` functions continues to require following the considerations noted in the documentation:

https://www.postgresql.org/docs/devel/sql-createfunction.html#SQL-CREATEFUNCTION-SECURITY

Versions Affected: 11

In a database containing hypothetical, user-defined hash equality operators, an attacker could read arbitrary bytes of server memory. For an attack to become possible, a superuser would need to create unusual operators. It is possible for operators not purpose-crafted for attack to have the properties that enable an attack, but we are not aware of specific examples.

https://www.postgresql.org/about/news/1960/ CVE-2019-10208 CVE-2019-10209 2019-08-08 2019-08-08
Django -- multiple vulnerabilities py27-django111 py35-django111 py36-django111 py37-django111 1.11.23 py27-django21 py35-django21 py36-django21 py37-django21 2.1.11 py27-django22 py35-django22 py36-django22 py37-django22 2.2.4

Django release notes:

CVE-2019-14232: Denial-of-service possibility in django.utils.text.Truncator

If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable

The regular expressions used by Truncator have been simplified in order to avoid potential backtracking issues. As a consequence, trailing punctuation may now at times be included in the truncated output.

CVE-2019-14233: Denial-of-service possibility in strip_tags()

Due to the behavior of the underlying HTMLParser, django.utils.html.strip_tags() would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities. The strip_tags() method is used to implement the corresponding striptags template filter, which was thus also vulnerable.

strip_tags() now avoids recursive calls to HTMLParser when progress removing tags, but necessarily incomplete HTML entities, stops being made.

Remember that absolutely NO guarantee is provided about the results of strip_tags() being HTML safe. So NEVER mark safe the result of a strip_tags() call without escaping it first, for example with django.utils.html.escape().

CVE-2019-14234: SQL injection possibility in key and index lookups for JSONField/HStoreField

Key and index lookups for JSONField and key lookups for HStoreField were subject to SQL injection, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to QuerySet.filter().

CVE-2019-14235: Potential memory exhaustion in django.utils.encoding.uri_to_iri()

If passed certain inputs, django.utils.encoding.uri_to_iri() could lead to significant memory usage due to excessive recursion when re-percent-encoding invalid UTF-8 octet sequences.

uri_to_iri() now avoids recursion when re-percent-encoding invalid UTF-8 octet sequences.

https://docs.djangoproject.com/en/1.11/releases/1.11.23/ https://docs.djangoproject.com/en/2.1/releases/2.1.11/ https://docs.djangoproject.com/en/2.2/releases/2.2.4/ CVE-2019-14232 CVE-2019-14233 CVE-2019-14234 CVE-2019-14235 2019-08-01 2019-08-03
gitea -- multiple vulnerabilities gitea 1.9.0

The Gitea Team reports:

This version of Gitea contains security fixes that could not be backported to 1.8. For this reason, we strongly recommend updating.

https://blog.gitea.io/2019/07/gitea-1.9.0-is-released/ https://github.com/go-gitea/gitea/releases/tag/v1.9.0 2019-07-31 2019-07-31
FreeBSD -- File description reference count leak FreeBSD-kernel 12.012.0_8 11.211.2_12 11.311.3_1

Problem Description:

If a process attempts to transmit rights over a UNIX-domain socket and an error causes the attempt to fail, references acquired on the rights are not released and are leaked. This bug can be used to cause the reference counter to wrap around and free the corresponding file structure.

Impact:

A local user can exploit the bug to gain root privileges or escape from a jail.

CVE-2019-5607 SA-19:17.fd 2019-07-24 2019-07-30
FreeBSD -- Bhyve out-of-bounds read in XHCI device FreeBSD-kernel 12.012.0_8 11.211.2_12 11.311.3_1

Problem Description:

The pci_xhci_device_doorbell() function does not validate the 'epid' and 'streamid' provided by the guest, leading to an out-of-bounds read.

Impact:

A misbehaving bhyve guest could crash the system or access memory that it should not be able to.

CVE-2019-5604 SA-19:16.bhyve 2019-07-24 2019-07-30
FreeBSD -- Reference count overflow in mqueue filesystem FreeBSD-kernel 12.012.0_8 11.211.2_12 11.311.3_1

Problem Description:

System calls operating on file descriptors obtain a reference to relevant struct file which due to a programming error was not always put back, which in turn could be used to overflow the counter of affected struct file.

Impact:

A local user can use this flaw to obtain access to files, directories, sockets etc. opened by processes owned by other users. If obtained struct file represents a directory from outside of user's jail, it can be used to access files outside of the jail. If the user in question is a jailed root they can obtain root privileges on the host system.

CVE-2019-5603 SA-19:15.mqueuefs 2019-07-24 2019-07-30
FreeBSD -- Kernel memory disclosure in freebsd32_ioctl FreeBSD-kernel 11.211.2_12 11.311.3_1

Problem Description:

Due to insufficient initialization of memory copied to userland in the components listed above small amounts of kernel memory may be disclosed to userland processes.

Impact:

A user who can invoke 32-bit FreeBSD ioctls may be able to read the contents of small portions of kernel memory.

Such memory might contain sensitive information, such as portions of the file cache or terminal buffers. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way; for example, a terminal buffer might include a user-entered password.

CVE-2019-5605 SA-19:14.freebsd32 2019-07-24 2019-07-30
FreeBSD -- pts(4) write-after-free FreeBSD-kernel 12.012.0_8 11.211.2_12 11.311.3_1

Problem Description:

The code which handles a close(2) of a descriptor created by posix_openpt(2) fails to undo the configuration which causes SIGIO to be raised. This bug can lead to a write-after-free of kernel memory.

Impact:

The bug permits malicious code to trigger a write-after-free, which may be used to gain root privileges or escape a jail.

CVE-2019-5606 SA-19:13.pts 2019-07-24 2019-07-30
FreeBSD -- telnet(1) client multiple vulnerabilities FreeBSD 12.012.0_8 11.211.2_12 11.311.3_1

Problem Description:

Insufficient validation of environment variables in the telnet client supplied in FreeBSD can lead to stack-based buffer overflows. A stack- based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers.

This issue only affects the telnet client. Inbound telnet sessions to telnetd(8) are not affected by this issue.

Impact:

These buffer overflows may be triggered when connecting to a malicious server, or by an active attacker in the network path between the client and server. Specially crafted TELNET command sequences may cause the execution of arbitrary code with the privileges of the user invoking telnet(1).

CVE-2019-0053 SA-19:12.telnet 2019-07-24 2019-07-30
FreeBSD -- Privilege escalation in cd(4) driver FreeBSD-kernel 12.012.0_7 11.211.2_11

Problem Description:

To implement one particular ioctl, the Linux emulation code used a special interface present in the cd(4) driver which allows it to copy subchannel information directly to a kernel address. This interface was erroneously made accessible to userland, allowing users with read access to a cd(4) device to arbitrarily overwrite kernel memory when some media is present in the device.

Impact:

A user in the operator group can make use of this interface to gain root privileges on a system with a cd(4) device when some media is present in the device.

CVE-2019-5602 SA-19:11.cd_ioctl 2019-07-02 2019-07-30
FreeBSD -- Kernel stack disclosure in UFS/FFS FreeBSD-kernel 12.012.0_7 11.211.2_11

Problem Description:

A bug causes up to three bytes of kernel stack memory to be written to disk as uninitialized directory entry padding. This data can be viewed by any user with read access to the directory. Additionally, a malicious user with write access to a directory can cause up to 254 bytes of kernel stack memory to be exposed.

Impact:

Some amount of the kernel stack is disclosed and written out to the filesystem.

CVE-2019-5601 SA-19:10.ufs 2019-07-02 2019-07-30
FreeBSD -- iconv buffer overflow FreeBSD 12.012.0_7 11.211.2_11

Problem Description:

With certain inputs, iconv may write beyond the end of the output buffer.

Impact:

Depending on the way in which iconv is used, an attacker may be able to create a denial of service, provoke incorrect program behavior, or induce a remote code execution. iconv is a libc library function and the nature of possible attacks will depend on the way in which iconv is used by applications or daemons.

CVE-2019-5600 SA-19:09.iconv 2019-07-02 2019-07-30
FreeBSD -- Resource exhaustion in non-default RACK TCP stack FreeBSD-kernel 12.012.0_6

Problem Description:

While processing acknowledgements, the RACK code uses several linked lists to maintain state entries. A malicious attacker can cause the lists to grow unbounded. This can cause an expensive list traversal on every packet being processed, leading to resource exhaustion and a denial of service.

Impact:

An attacker with the ability to send specially crafted TCP traffic to a victim system can degrade network performance and/or consume excessive CPU by exploiting the inefficiency of traversing the potentially very large RACK linked lists with relatively small bandwidth cost.

CVE-2019-5599 SA-19:08.rack 2019-06-19 2019-07-30
FreeBSD -- Microarchitectural Data Sampling (MDS) FreeBSD-kernel 12.012.0_5 11.211.2_10

Problem Description:

On some Intel processors utilizing speculative execution a local process may be able to infer stale information from microarchitectural buffers to obtain a memory disclosure.

Impact:

An attacker may be able to read secret data from the kernel or from a process when executing untrusted code (for example, in a web browser).

CVE-2018-1212 CVE-2018-1213 CVE-2019-1109 SA-19:07.mds 2019-05-14 2019-07-30
FreeBSD -- ICMP/ICMP6 packet filter bypass in pf FreeBSD-kernel 12.012.0_4 11.211.2_10

Problem Description:

States in pf(4) let ICMP and ICMP6 packets pass if they have a packet in their payload matching an existing condition. pf(4) does not check if the outer ICMP or ICMP6 packet has the same destination IP as the source IP of the inner protocol packet.

Impact:

A maliciously crafted ICMP/ICMP6 packet could bypass the packet filter rules and be passed to a host that would otherwise be unavailable.

CVE-2019-5598 SA-19:06.pf 2019-05-14 2019-07-30
FreeBSD -- IPv6 fragment reassembly panic in pf(4) FreeBSD-kernel 12.012.0_4 11.211.2_10

Problem Description:

A bug in the pf(4) IPv6 fragment reassembly logic incorrectly uses the last extension header offset from the last received packet instead of from the first packet.

Impact:

Malicious IPv6 packets with different IPv6 extensions could cause a kernel panic or potentially a filtering rule bypass.

CVE-2019-5597 SA-19:05.pf 2019-05-14 2019-07-30
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.1.012.1.2 12.0.012.0.4 8.9.011.11.7

Gitlab reports:

GitHub Integration SSRF

Trigger Token Impersonation

Build Status Disclosure

SSRF Mitigation Bypass

Information Disclosure New Issue ID

IDOR Label Name Enumeration

Persistent XSS Wiki Pages

User Revokation Bypass with Mattermost Integration

Arbitrary File Upload via Import Project Archive

Information Disclosure Vulnerability Feedback

Persistent XSS via Email

Denial Of Service Epic Comments

Email Verification Bypass

Override Merge Request Approval Rules

https://about.gitlab.com/2019/07/29/security-release-gitlab-12-dot-1-dot-2-released/ 2019-07-29 2019-07-30
py-matrix-synapse -- multiple vulnerabilities py27-matrix-synapse py35-matrix-synapse py36-matrix-synapse py37-matrix-synapse 1.2.1

Matrix developers report:

The matrix team releases Synapse 1.2.1 as a critical security update. It contains patches relating to redactions and event federation:

  • Prevent an attack where a federated server could send redactions for arbitrary events in v1 and v2 rooms.
  • Prevent a denial-of-service attack where cycles of redaction events would make Synapse spin infinitely.
  • Prevent an attack where users could be joined or parted from public rooms without their consent.
  • Fix a vulnerability where a federated server could spoof read-receipts from users on other servers.
  • It was possible for a room moderator to send a redaction for an m.room.create event, which would downgrade the room to version 1.
https://matrix.org/blog/2019/07/26/critical-security-update-synapse-1-2-1-released https://github.com/matrix-org/synapse/releases/tag/v1.2.1 2019-07-26 2019-07-28
Exim -- RCE in ${sort} expansion exim 4.854.92.1

Exim team report:

A local or remote attacker can execute programs with root privileges - if you've an unusual configuration.

If your configuration uses the ${sort } expansion for items that can be controlled by an attacker (e.g. $local_part, $domain). The default config, as shipped by the Exim developers, does not contain ${sort }.

The vulnerability is exploitable either remotely or locally and could be used to execute other programs with root privilege. The ${sort } expansion re-evaluates its items.

Exim 4.92.1 is not vulnerable.

CVE-2019-13917 https://www.exim.org/static/doc/security/CVE-2019-13917.txt 2019-07-18 2019-07-25 2019-07-26
MySQL -- Multiple vulerabilities mariadb55-server 5.5.65 mariadb101-server 10.1.41 mariadb102-server 10.2.26 mariadb103-server 10.3.17 mariadb104-server 10.4.7 mysql56-server 5.6.45 mysql57-server 5.7.27 mysql80-server 8.0.17 percona55-server 5.5.65 percona56-server 5.6.45 percona57-server 5.7.27

Oracle reports:

This Critical Patch Update contains 45 new security fixes for Oracle MySQL. 4 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.

https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html CVE-2019-2730 CVE-2019-2731 CVE-2019-2737 CVE-2019-2738 CVE-2019-2739 CVE-2019-2740 CVE-2019-2741 CVE-2019-2743 CVE-2019-2746 CVE-2019-2747 CVE-2019-2752 CVE-2019-2755 CVE-2019-2757 CVE-2019-2758 CVE-2019-2774 CVE-2019-2778 CVE-2019-2780 CVE-2019-2784 CVE-2019-2785 CVE-2019-2789 CVE-2019-2791 CVE-2019-2795 CVE-2019-2796 CVE-2019-2797 CVE-2019-2798 CVE-2019-2800 CVE-2019-2801 CVE-2019-2802 CVE-2019-2803 CVE-2019-2805 CVE-2019-2808 CVE-2019-2810 CVE-2019-2811 CVE-2019-2812 CVE-2019-2814 CVE-2019-2815 CVE-2019-2819 CVE-2019-2822 CVE-2019-2826 CVE-2019-2830 CVE-2019-2834 CVE-2019-2879 CVE-2019-3822 2019-07-16 2019-07-22
drupal -- Drupal core - Access bypass drupal8 8.7.5

Drupal Security Team reports:

In Drupal 8.7.4, when the experimental Workspaces module is enabled, an access bypass condition is created.

This can be mitigated by disabling the Workspaces module. It does not affect any release other than Drupal 8.7.4.

https://www.drupal.org/SA-CORE-2019-008 2019-07-17 2019-07-21
PuTTY 0.72 -- buffer overflow in SSH-1 and integer overflow in SSH client putty 0.72 putty-gtk2 0.72 putty-nogtk 0.72

Simon Tatham reports:

Vulnerabilities fixed in this release include:

  • A malicious SSH-1 server could trigger a buffer overrun by sending extremely short RSA keys, or certain bad packet length fields. Either of these could happen before host key verification, so even if you trust the server you *intended* to connect to, you would still be at risk.
    (However, the SSH-1 protocol is obsolete, and recent versions of PuTTY do not try it by default, so you are only at risk if you work with old servers and have explicitly configured SSH-1.)
  • If a malicious process found a way to impersonate Pageant, then it could cause an integer overflow in any of the SSH client tools (PuTTY, Plink, PSCP, PSFTP) which accessed the malicious Pageant.

Other security-related bug fixes include:

  • The 'trust sigil' system introduced in PuTTY 0.71 to protect against server spoofing attacks had multiple bugs. Trust sigils were not turned off after login in the SSH-1 and Rlogin protocols, and not turned back on if you used the Restart Session command. Both are now fixed.
https://lists.tartarus.org/pipermail/putty-announce/2019/000028.html 2019-07-14 2019-07-20
jenkins -- multiple vulnerabilities jenkins 2.186 jenkins-lts 2.176.2

Jenkins Security Advisory:

Description

(Medium) SECURITY-1424 / CVE-2019-10352

Arbitrary file write vulnerability using file parameter definitions

(High) SECURITY-626 / CVE-2019-10353

CSRF protection tokens did not expire

(Medium) SECURITY-534 / CVE-2019-10354

Unauthorized view fragment access

CVE-2019-10352 CVE-2019-10353 CVE-2019-10354 https://jenkins.io/security/advisory/2019-07-17/ 2019-07-17 2019-07-17
libxslt -- security framework bypass libxslt 1.1.33

Mitre report:

libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068 2019-04-10 2019-07-16
asterisk -- Remote crash vulnerability with MESSAGE messages asterisk13 13.27.1 asterisk15 15.7.3 asterisk16 16.4.1

The Asterisk project reports:

A specially crafted SIP in-dialog MESSAGE message can cause Asterisk to crash.

https://downloads.asterisk.org/pub/security/AST-2019-002.html CVE-2019-12827 2019-06-13 2019-07-12
asterisk -- Remote Crash Vulnerability in chan_sip channel driver asterisk13 13.27.1 asterisk15 15.7.3 asterisk16 16.4.1

The Asterisk project reports:

When T.38 faxing is done in Asterisk a T.38 reinvite may be sent to an endpoint to switch it to T.38. If the endpoint responds with an improperly formatted SDP answer including both a T.38 UDPTL stream and an audio or video stream containing only codecs not allowed on the SIP peer or user a crash will occur. The code incorrectly assumes that there will be at least one common codec when T.38 is also in the SDP answer.

https://downloads.asterisk.org/pub/security/AST-2019-003.html CVE-2019-13161 2019-06-28 2019-07-12
python 3.7 -- multiple vulnerabilities python37 3.7.4

Python changelog:

bpo-37463: ssl.match_hostname() no longer accepts IPv4 addresses with additional text after the address and only quad-dotted notation without trailing whitespaces. Some inet_aton() implementations ignore whitespace and all data after whitespace, e.g.'127.0.0.1 whatever'.

bpo-35907: CVE-2019-9948: Avoid file reading by disallowing local-file:// and local_file:// URL schemes in URLopener().open() and URLopener().retrieve() of urllib.request.

bpo-36742: Fixes mishandling of pre-normalization characters in urlsplit().

bpo-30458: Address CVE-2019-9740 by disallowing URL paths with embedded whitespace or control characters through into the underlying http client request. Such potentially malicious header injection URLs now cause an http.client.InvalidURL exception to be raised.

bpo-33529: Prevent fold function used in email header encoding from entering infinite loop when there are too many non-ASCII characters in a header.

bpo-35755: shutil.which() now uses os.confstr("CS_PATH") if available and if the PATH environment variable is not set. Remove also the current directory from posixpath.defpath. On Unix, shutil.which() and the subprocess module no longer search the executable in the current directory if the PATH environment variable is not set.

https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-4-final CVE-2019-9740 CVE-2019-9948 2019-03-13 2019-07-12
mozilla -- multiple vulnerabilities firefox 68.0_4,1 waterfox 56.2.12 seamonkey linux-seamonkey 2.53.0 firefox-esr 60.8.0,1 linux-firefox 60.8.0,2 libxul thunderbird linux-thunderbird 60.8.0

Mozilla Foundation reports:

CVE-2019-9811: Sandbox escape via installation of malicious language pack

CVE-2019-11711: Script injection within domain through inner window reuse

CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects

CVE-2019-11713: Use-after-free with HTTP/2 cached stream

CVE-2019-11714: NeckoChild can trigger crash when accessed off of main thread

CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault

CVE-2019-11715: HTML parsing error can contribute to content XSS

CVE-2019-11716: globalThis not enumerable until accessed

CVE-2019-11717: Caret character improperly escaped in origins

CVE-2019-11718: Activity Stream writes unsanitized content to innerHTML

CVE-2019-11719: Out-of-bounds read when importing curve25519 private key

CVE-2019-11720: Character encoding XSS vulnerability

CVE-2019-11721: Domain spoofing through unicode latin 'kra' character

CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin

CVE-2019-11723: Cookie leakage during add-on fetching across private browsing boundaries

CVE-2019-11724: Retired site input.mozilla.org has remote troubleshooting permissions

CVE-2019-11725: Websocket resources bypass safebrowsing protections

CVE-2019-11727: PKCS#1 v1.5 signatures can be used for TLS 1.3

CVE-2019-11728: Port scanning through Alt-Svc header

CVE-2019-11710: Memory safety bugs fixed in Firefox 68

CVE-2019-11709: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8

CVE-2019-11709 CVE-2019-11710 CVE-2019-11711 CVE-2019-11712 CVE-2019-11713 CVE-2019-11714 CVE-2019-11715 CVE-2019-11716 CVE-2019-11717 CVE-2019-11718 CVE-2019-11719 CVE-2019-11720 CVE-2019-11721 CVE-2019-11723 CVE-2019-11724 CVE-2019-11725 CVE-2019-11727 CVE-2019-11728 CVE-2019-11729 CVE-2019-11730 CVE-2019-9811 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ 2019-07-09 2019-07-09 2019-07-23
GnuPG -- denial of service gnupg 2.2.17

From the GnuPG 2.2.17 changelog:

gpg: Ignore all key-signatures received from keyservers. This change is required to mitigate a DoS due to keys flooded with faked key-signatures.

https://dev.gnupg.org/T4606 https://dev.gnupg.org/T4607 2019-07-03 2019-07-09
python 3.6 -- multiple vulnerabilities python36 3.6.9

Python changelog:

bpo-35907: CVE-2019-9948: Avoid file reading by disallowing local-file:// and local_file:// URL schemes in URLopener().open() and URLopener().retrieve() of urllib.request.

bpo-36742: Fixes mishandling of pre-normalization characters in urlsplit().

bpo-30458: Address CVE-2019-9740 by disallowing URL paths with embedded whitespace or control characters through into the underlying http client request. Such potentially malicious header injection URLs now cause an http.client.InvalidURL exception to be raised.

bpo-36216: Changes urlsplit() to raise ValueError when the URL contains characters that decompose under IDNA encoding (NFKC-normalization) into characters that affect how the URL is parsed.

bpo-33529: Prevent fold function used in email header encoding from entering infinite loop when there are too many non-ASCII characters in a header.

bpo-35121: Don't send cookies of domain A without Domain attribute to domain B when domain A is a suffix match of domain B while using a cookiejar with http.cookiejar.DefaultCookiePolicy policy. Patch by Karthikeyan Singaravelan.

https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-9-final CVE-2019-9948 CVE-2019-9740 2019-03-13 2019-07-08
webkit2-gtk3 -- Multiple vulnerabilities webkit2-gtk3 2.24.2

The WebKitGTK project reports many vulnerabilities, including several arbitrary code execution vulnerabilities.

https://webkitgtk.org/security/WSA-2019-0002.html CVE-2019-6201 CVE-2019-6251 CVE-2019-7285 CVE-2019-7292 CVE-2019-8503 CVE-2019-8506 CVE-2019-8515 CVE-2019-8518 CVE-2019-8523 CVE-2019-8524 CVE-2019-8535 CVE-2019-8536 CVE-2019-8544 CVE-2019-8551 CVE-2019-8558 CVE-2019-8559 CVE-2019-8563 CVE-2019-11070 https://webkitgtk.org/security/WSA-2019-0003.html CVE-2019-6237 CVE-2019-8571 CVE-2019-8583 CVE-2019-8584 CVE-2019-8586 CVE-2019-8587 CVE-2019-8594 CVE-2019-8595 CVE-2019-8596 CVE-2019-8597 CVE-2019-8601 CVE-2019-8607 CVE-2019-8608 CVE-2019-8609 CVE-2019-8610 CVE-2019-8615 CVE-2019-8611 CVE-2019-8619 CVE-2019-8622 CVE-2019-8623 2019-04-10 2019-07-06
mediawiki -- multiple vulnerabilities mediawiki131 1.31.3 mediawiki132 1.32.3

Mediawiki reports:

Security fixes: T197279, CVE-2019-12468: Directly POSTing to Special:ChangeEmail would allow for bypassing reauthentication, allowing for potential account takeover. T204729, CVE-2019-12473: Passing invalid titles to the API could cause a DoS by querying the entire `watchlist` table. T207603, CVE-2019-12471: Loading user JavaScript from a non-existent account allows anyone to create the account, and XSS the users' loading that script. T208881: blacklist CSS var(). T199540, CVE-2019-12472: It is possible to bypass the limits on IP range blocks (`$wgBlockCIDRLimit`) by using the API. T212118, CVE-2019-12474: Privileged API responses that include whether a recent change has been patrolled may be cached publicly. T209794, CVE-2019-12467: A spammer can use Special:ChangeEmail to send out spam with no rate limiting or ability to block them. T25227, CVE-2019-12466: An account can be logged out without using a token(CRRF) T222036, CVE-2019-12469: Exposed suppressed username or log in Special:EditTags. T222038, CVE-2019-12470: Exposed suppressed log in RevisionDelete page. T221739, CVE-2019-11358: Fix potential XSS in jQuery.

CVE-2019-11358 CVE-2019-12466 CVE-2019-12467 CVE-2019-12468 CVE-2019-12469 CVE-2019-12470 CVE-2019-12471 CVE-2019-12472 CVE-2019-12473 CVE-2019-12474 https://lists.wikimedia.org/pipermail/mediawiki-announce/2019-June/000230.html 2019-04-23 2019-07-05
ettercap -- out-of-bound read vulnerability ettercap 0.8.3,1

Ettercap GitHub issue:

Etterfilter results in an invalid read of 8 bytes when parsing a crafted file.

https://github.com/Ettercap/ettercap/issues/782 https://nvd.nist.gov/vuln/detail/CVE-2017-6430 CVE-2017-6430 2019-07-01 2019-07-03
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.0.012.0.3 11.11.011.11.5 8.3.011.10.8

Gitlab reports:

Ability to Write a Note to a Private Snippet

Recent Pipeline Information Disclosed to Unauthorised Users

Resource Exhaustion Attack

Error Caused by Encoded Characters in Comments

Authorization Issues in GraphQL

Number of Merge Requests was Accessible

Enabling One of the Service Templates Could Cause Resource Depletion

Broken Access Control for the Content of Personal Snippets

Decoding Color Codes Caused Resource Depletion

Merge Request Template Name Disclosure

SSRF Vulnerability in Project GitHub Integration

https://about.gitlab.com/2019/07/03/security-release-gitlab-12-dot-0-dot-3-released/ CVE-2019-13001 CVE-2019-13002 CVE-2019-13003 CVE-2019-13004 CVE-2019-13005 CVE-2019-13006 CVE-2019-13007 CVE-2019-13009 CVE-2019-13010 CVE-2019-13011 CVE-2019-13121 2019-07-03 2019-07-03
SDL2_image -- multiple vulnerabilities sdl2_image 2.0.5

SDL_image developers report:

Fixed a number of security issues:

  • TALOS-2019-0820
  • TALOS-2019-0821
  • TALOS-2019-0841
  • TALOS-2019-0842
  • TALOS-2019-0843
  • TALOS-2019-0844
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0820 https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0821 https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0841 https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0842 https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0843 https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0844 CVE-2019-5051 CVE-2019-5052 CVE-2019-5057 CVE-2019-5058 CVE-2019-5059 CVE-2019-5060 2019-07-02 2019-07-03
irssi -- Use after free when sending SASL login to the server irssi 1.2.1,1

Irssi reports:

Use after free when sending SASL login to the server found by ilbelkyr. (CWE-416, CWE-825)

https://irssi.org/security/irssi_sa_2019_06.txt CVE-2019-13045 2019-06-29 2019-07-01
Django -- Incorrect HTTP detection with reverse-proxy connecting via HTTPS py27-django111 py35-django111 py36-django111 py37-django111 1.11.22 py35-django21 py36-django21 py37-django21 2.1.10 py35-django22 py36-django22 py37-django22 2.2.3

Django security releases issued:

When deployed behind a reverse-proxy connecting to Django via HTTPS, django.http.HttpRequest.scheme would incorrectly detect client requests made via HTTP as using HTTPS. This entails incorrect results for is_secure(), and build_absolute_uri(), and that HTTP requests would not be redirected to HTTPS in accordance with SECURE_SSL_REDIRECT.

CVE-2019-12781 https://www.djangoproject.com/weblog/2019/jul/01/security-releases/ 2019-07-01 2019-07-01
bzip2 -- multiple issues bzip2 1.0.7

bzip2 developers reports:

CVE-2016-3189 - Fix use-after-free in bzip2recover (Jakub Martisko)

CVE-2019-12900 - Detect out-of-range nSelectors in corrupted files (Albert Astals Cid). Found through fuzzing karchive.

https://gitlab.com/federicomenaquintero/bzip2/blob/master/NEWS https://bugzilla.redhat.com/show_bug.cgi?id=1319648 CVE-2016-3189 CVE-2019-12900 2019-06-23 2019-06-30
powerdns -- multiple vulnerabilities powerdns 4.1.10

PowerDNS Team reports:

CVE-2019-10162: An issue has been found in PowerDNS Authoritative Server allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.

CVE-2019-10163: An issue has been found in PowerDNS Authoritative Server allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.

https://doc.powerdns.com/authoritative/changelog/4.1.html#change-4.1.10 CVE-2019-10162 CVE-2019-10163 2019-06-21 2019-06-21
TYPO3 -- multiple vulnerabilities typo3-8-php71 typo3-8-php72 typo3-8-php73 8.7.27 typo3-9-php71 typo3-9-php72 typo3-9-php73 9.5.8

TYPO3 news:

Please read the corresponding Security Advisories for details.

https://typo3.org/article/typo3-958-and-8727-security-releases-published/ https://get.typo3.org/release-notes/8.7.27 https://get.typo3.org/release-notes/9.5.8 CVE-2019-10912 CVE-2019-12747 CVE-2019-12748 2019-06-28 2019-06-28
PostgreSQL -- Stack-based buffer overflow via setting a password postgresql11-server 11.4 postgresql10-server 10.9

The PostgreSQL project reports:

An authenticated user could create a stack-based buffer overflow by changing their own password to a purpose-crafted value. In addition to the ability to crash the PostgreSQL server, this could be further exploited to execute arbitrary code as the PostgreSQL operating system account.

Additionally, a rogue server could send a specifically crafted message during the SCRAM authentication process and cause a libpq-enabled client to either crash or execute arbitrary code as the client's operating system account.

This issue is fixed by upgrading and restarting your PostgreSQL server as well as your libpq installations. All users running PostgreSQL 10, 11, and 12 beta are encouraged to upgrade as soon as possible.

https://www.postgresql.org/about/news/1949/ CVE-2019-10164 2019-06-20 2019-06-27
znc -- privilege escalation znc 1.7.4

Mitre reports:

Modules.cpp in ZNC before 1.7.4-rc1 allows remote authenticated non-admin users to escalate privileges and execute arbitrary code by loading a module with a crafted name.

CVE-2019-12816 https://wiki.znc.in/ChangeLog/1.7.4 2019-06-13 2019-06-22
Mozilla -- multiple vulnerabilities thunderbird thunderbird-60.7.2

Mozilla Foundation reports:

CVE-2019-11707: Type confusion in Array.pop

A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw.

CVE-2019-11708: sandbox escape using Prompt:Open

Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer.

https://www.mozilla.org/en-US/security/advisories/mfsa2019-20/ CVE-2019-11707 CVE-2019-11708 2019-06-20 2019-06-21
Mozilla -- multiple vulnerabilities firefox 67.0.4,1 waterfox 56.2.12 firefox-esr 60.7.2,1

Mozilla Foundation reports:

CVE-2019-11708: sandbox escape using Prompt:Open

Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer.

https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/ CVE-2019-11708 2019-06-20 2019-06-21 2019-07-09
Mozilla -- multiple vulnerabilities thunderbird 60.7.1

Mozilla Foundation reports:

CVE-2019-11703: Heap buffer overflow in icalparser.c

A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in parser_get_next_char when processing certain email messages, resulting in a potentially exploitable crash.

CVE-2019-11704: Heap buffer overflow in icalvalue.c

A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in icalmemory_strdup_and_dequote when processing certain email messages, resulting in a potentially exploitable crash.

CVE-2019-11705: Stack buffer overflow in icalrecur.c

A flaw in Thunderbird's implementation of iCal causes a stack buffer overflow in icalrecur_add_bydayrules when processing certain email messages, resulting in a potentially exploitable crash.

CVE-2019-11706: Type confusion in icalproperty.c

A flaw in Thunderbird's implementation of iCal causes a type confusion in icaltimezone_get_vtimezone_properties when processing certain email messages, resulting in a crash.

https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/ CVE-2019-11703 CVE-2019-11704 CVE-2019-11705 CVE-2019-11706 2019-06-13 2019-06-21
vlc -- Double free in Matroska demuxer vlc 3.0.7.1,4

The VLC project reports:

mkv: Fix potential double free

CVE-2019-12874 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12874 http://git.videolan.org/?p=vlc.git;a=commit;h=81023659c7de5ac2637b4a879195efef50846102 2019-05-20 2019-06-20
vlc -- Buffer overflow vulnerability vlc 3.0.7,4

zhangyang reports:

The ReadFrame function in the avi.c file uses a variable i_width_bytes, which is obtained directly from the file. It is a signed integer. It does not do a strict check before the memory operation(memmove, memcpy), which may cause a buffer overflow.

CVE-2019-5439 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5439 https://hackerone.com/reports/484398 2019-01-23 2019-06-20
mozilla -- multiple vulnerabilities firefox 67.0.3,1 waterfox 56.2.11 firefox-esr 60.7.1,1

Mozilla Foundation reports:

CVE-2019-11707: Type confusion in Array.pop

A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw.

CVE-2019-11707 https://www.mozilla.org/security/advisories/mfsa2019-18/ 2019-06-18 2019-06-19 2019-06-20
netatalk3 -- remote code execution vulnerability netatalk3 3.1.12,1

NIST reports:

Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.

https://nvd.nist.gov/vuln/detail/CVE-2018-1160 https://medium.com/tenable-techblog/exploiting-an-18-year-old-bug-b47afe54172 2018-11-10 2019-06-16
GraphicsMagick -- multiple vulnerabilities GraphicsMagick 1.3.32,1

GraphicsMagick News:

Read "Security Fixes:" section for details.

http://www.graphicsmagick.org/NEWS.html 2019-06-15 2019-06-16
chromium -- use after free chromium 75.0.3770.90

Google Chrome Releases reports:

[961413] High CVE-2019-5842: Use-after-free in Blink. Reported by BUGFENSE Anonymous Bug Bounties https://bugfense.io on 2019-05-09

https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop_13.html CVE-2019-5842 2019-05-09 2019-06-15
phpMyAdmin -- CSRF vulnerability in login form phpMyAdmin phpMyAdmin-php56 phpMyAdmin-php70 phpMyAdmin-php71 phpMyAdmin-php72 4.9.0

The phpMyAdmin development team reports:

Summary

CSRF vulnerability in login form

Description

A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken <img> tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a payload (such as a specific INSERT or DELETE statement) through the victim.

Severity

We consider this vulnerability to be severe.

Mitigation factor

Only the 'cookie' auth_type is affected; users can temporary use phpMyAdmin's http authentication as a workaround.

https://www.phpmyadmin.net/security/PMASA-2019-4/ CVE-2019-12616 2019-06-04 2019-06-13
Vim/NeoVim -- Security vulnerability vim vim-console vim-tiny 8.1.1365 neovim 0.3.6

Security releases for Vim/NeoVim:

Sandbox escape allows for arbitrary code execution.

https://nvd.nist.gov/vuln/detail/CVE-2019-12735 2019-05-22 2019-06-13
mybb -- vulnerabilities mybb 1.8.21

mybb Team reports:

High risk: Theme import stylesheet name RCE

High risk: Nested video MyCode persistent XSS

Medium risk: Find Orphaned Attachments reflected XSS

Medium risk: Post edit reflected XSS

Medium risk: Private Messaging folders SQL injection

Low risk: Potential phar deserialization through Upload Path

https://blog.mybb.com/2019/06/10/mybb-1-8-21-released-security-maintenance-release/ 2019-06-10 2019-06-12
Flash Player -- arbitrary code execution linux-flashplayer 32.0.0.207

Adobe reports:

  • This update resolves a use-after-free vulnerability that could lead to arbitrary code execution (CVE-2019-7845).
CVE-2019-7845 https://helpx.adobe.com/security/products/flash-player/apsb19-30.html 2019-06-11 2019-06-11
drupal -- Drupal core - Moderately critical drupal7 7.67 drupal8 8.7.1

Drupal Security Team reports:

CVE-2019-11831: By-passing protection of Phar Stream Wrapper Interceptor.

In order to intercept file invocations like file_exists or stat on compromised Phar archives the base name has to be determined and checked before allowing to be handled by PHP Phar stream handling. The current implementation is vulnerable to path traversal leading to scenarios where the Phar archive to be assessed is not the actual (compromised) file.

https://www.drupal.org/SA-CORE-2019-007 2019-05-08 2019-06-08
Exim -- RCE in deliver_message() function exim 4.874.92

Exim team and Qualys report:

We received a report of a possible remote exploit. Currently there is no evidence of an active use of this exploit.

A patch exists already, is being tested, and backported to all versions we released since (and including) 4.87.

The severity depends on your configuration. It depends on how close to the standard configuration your Exim runtime configuration is. The closer the better.

Exim 4.92 is not vulnerable.

CVE-2019-10149 https://www.exim.org/static/doc/security/CVE-2019-10149.txt 2019-05-27 2019-06-06
Django -- AdminURLFieldWidget XSS py27-django111 py35-django111 py36-django111 py37-django111 1.11.21 py35-django21 py36-django21 py37-django21 2.1.9 py35-django22 py36-django22 py37-django22 2.2.2

Django security releases issued:

The clickable "Current URL" link generated by AdminURLFieldWidget displayed the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link..

jQuery before 3.4.0, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.

CVE-2019-12308 CVE-2019-11358 https://www.djangoproject.com/weblog/2019/jun/03/security-releases/ 2019-06-03 2019-06-06
Gitlab -- Multiple Vulnerabilities gitlab-ce 11.11.011.11.1 11.10.011.10.5 6.8.011.9.12

Gitlab reports:

Remote Command Execution Vulnerability on Repository Download Feature

Confidential Issue Titles Revealed to Restricted Users on Unsubscribe

Disclosure of Milestone Metadata through the Search API

Private Project Discovery via Comment Links

Metadata of Confidential Issues Disclosed to Restricted Users

Mandatory External Authentication Provider Sign-In Restrictions Bypass

Internal Projects Allowed to Be Created on in Private Groups

Server-Side Request Forgery Through DNS Rebinding

Stored Cross-Site Scripting on Wiki Pages

Stored Cross-Site Scripting on Notes

Repository Password Disclosed on Import Error Page

Protected Branches Restriction Rules Bypass

Stored Cross-Site Scripting Vulnerability on Child Epics

https://about.gitlab.com/2019/06/03/security-release-gitlab-11-dot-11-dot-1-released/ CVE-2019-12430 CVE-2019-12432 CVE-2019-12431 CVE-2019-12434 CVE-2019-12429 CVE-2019-12428 CVE-2019-12433 CVE-2019-12443 CVE-2019-12444 CVE-2019-12445 CVE-2019-12446 CVE-2019-12441 CVE-2019-12442 2019-06-03 2019-06-03
buildbot -- OAuth Authentication Vulnerability py27-buildbot py35-buildbot py36-buildbot py37-buildbot 2.3.1

Buildbot accepted user-submitted authorization token from OAuth and used it to authenticate user.

The vulnerability can lead to malicious attackers to authenticate as legitimate users of a Buildbot instance without knowledge of the victim's login credentials on certain scenarios.

If an attacker has an application authorized to access data of another user at the same Identity Provider as the used by the Buildbot instance, then he can acquire a token to access the data of that user, supply the token to the Buildbot instance and successfully login as the victim.

https://github.com/buildbot/buildbot/wiki/OAuth-vulnerability-in-using-submitted-authorization-token-for-authentication https://github.com/buildbot/buildbot/pull/4763 CVE-2019-12300 2019-05-07 2019-06-01
bro -- Unsafe integer conversions can cause unintentional code paths to be executed bro 2.6.2

Jon Siwek of Corelight reports:

The following Denial of Service vulnerabilities are addressed:

  • Integer type mismatches in BinPAC-generated parser code and Bro analyzer code may allow for crafted packet data to cause unintentional code paths in the analysis logic to be taken due to unsafe integer conversions causing the parser and analysis logic to each expect different fields to have been parsed. One such example, reported by Maksim Shudrak, causes the Kerberos analyzer to dereference a null pointer. CVE-2019-12175 was assigned for this issue.
  • The Kerberos parser allows for several fields to be left uninitialized, but they were not marked with an &optional attribute and several usages lacked existence checks. Crafted packet data could potentially cause an attempt to access such uninitialized fields, generate a runtime error/exception, and leak memory. Existence checks and &optional attributes have been added to the relevent Kerberos fields.
  • BinPAC-generated protocol parsers commonly contain fields whose length is derived from other packet input, and for those that allow for incremental parsing, BinPAC did not impose a limit on how large such a field could grow, allowing for remotely-controlled packet data to cause growth of BinPAC's flowbuffer bounded only by the numeric limit of an unsigned 64-bit integer, leading to memory exhaustion. There is now a generalized limit for how large flowbuffers are allowed to grow, tunable by setting "BinPAC::flowbuffer_capacity_max".
CVE-2017-12175 2019-05-29 2019-05-31
ImageMagick -- multiple vulnerabilities ImageMagick7 7.0.8.47 ImageMagick7-nox11 7.0.8.47 ImageMagick6 6.9.10.47,1 ImageMagick6-nox11 6.9.10.47,1

cvedetails.com reports:

CVE-2019-7175: In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.

CVE-2019-7395: In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.

CVE-2019-7396: In ImageMagick before 7.0.8-25, a memory leak exists in ReadSIXELImage in coders/sixel.c.

CVE-2019-7397: In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.

CVE-2019-7398: In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c.

CVE-2019-9956: In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file.

CVE-2019-10131: An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.

CVE-2019-10649: In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file.

CVE-2019-10650: In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file.

CVE-2019-10714: LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV.

CVE-2019-11470: The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.

CVE-2019-11472: ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.

CVE-2019-11597: In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.

CVE-2019-11598: In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.

https://www.cvedetails.com/vulnerability-list/vendor_id-1749/Imagemagick.html CVE-2019-7175 CVE-2019-7395 CVE-2019-7396 CVE-2019-7397 CVE-2019-7398 CVE-2019-9956 CVE-2019-10131 CVE-2019-10649 CVE-2019-10650 CVE-2019-10714 CVE-2019-11470 CVE-2019-11472 CVE-2019-11597 CVE-2019-11598 2019-03-07 2019-05-30 2019-06-17
cyrus-imapd -- buffer overrun in httpd cyrus-imapd30 3.0.03.0.10 cyrus-imapd25 2.5.02.5.13

Cyrus IMAP 3.0.10 Release Notes states:

Fixed CVE-2019-11356: buffer overrun in httpd

CVE-2019-11356 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11356 2019-04-19 2019-05-27
serendipity -- XSS serendipity 2.1.5

MITRE:

Serendipity before 2.1.5 has XSS via EXIF data that is mishandled in the templates/2k11/admin/media_choose.tpl Editor Preview feature or the templates/2k11/admin/media_items.tpl Media Library feature.

https://blog.s9y.org/archives/282-Serendipity-2.1.5-released.html CVE-2019-11870 2019-05-01 2019-05-26
sqlite3 -- use after free sqlite3 3.26.0

MITRE reports:

An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0777 CVE-2019-5018 2019-05-09 2019-05-26
suricata -- buffer over-read suricata 4.1.4

Mitre reports:

An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.

https://suricata-ids.org/2019/04/30/suricata-4-1-4-released/ CVE-2019-10053 2019-03-15 2019-05-26 2019-05-26
curl -- multiple vulnerabilities curl 7.19.47.65.0

curl security problems:

CVE-2019-5435: Integer overflows in curl_url_set()

libcurl contains two integer overflows in the curl_url_set() function that if triggered, can lead to a too small buffer allocation and a subsequent heap buffer overflow.

The flaws only exist on 32 bit architectures and require excessive string input lengths.

CVE-2019-5436: TFTP receive buffer overflow

libcurl contains a heap buffer overflow in the function (tftp_receive_packet()) that recevives data from a TFTP server. It calls recvfrom() with the default size for the buffer rather than with the size that was used to allocate it. Thus, the content that might overwrite the heap memory is entirely controlled by the server.

The flaw exists if the user selects to use a "blksize" of 504 or smaller (default is 512). The smaller size that is used, the larger the possible overflow becomes.

Users chosing a smaller size than default should be rare as the primary use case for changing the size is to make it larger.

It is rare for users to use TFTP across the Internet. It is most commonly used within local networks.

https://curl.haxx.se/docs/security.html https://curl.haxx.se/docs/CVE-2019-5435.html https://curl.haxx.se/docs/CVE-2019-5436.html CVE-2019-5435 CVE-2019-5436 2019-05-22 2019-05-25 2019-05-26
OCaml -- Multiple Security Vulnerabilities ocaml 4.03.0

MITRE reports:

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

https://nvd.nist.gov/vuln/detail/CVE-2015-8869 https://github.com/ocaml/ocaml/commit/659615c7b100a89eafe6253e7a5b9d84d0e8df74#diff-a97df53e3ebc59bb457191b496c90762 CVE-2015-8869 2016-06-13 2019-05-23 2019-05-26
mozilla -- multiple vulnerabilities firefox 67.0,1 waterfox 56.2.10 seamonkey linux-seamonkey 2.53.0 firefox-esr 60.7.0,1 linux-firefox 60.7.0,2 libxul thunderbird linux-thunderbird 60.7.0

Mozilla Foundation reports:

CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS

CVE-2019-9816: Type confusion with object groups and UnboxedObjects

CVE-2019-9817: Stealing of cross-domain images using canvas

CVE-2019-9818: Use-after-free in crash generation server

CVE-2019-9819: Compartment mismatch with fetch API

CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell

CVE-2019-9821: Use-after-free in AssertWorkerThread

CVE-2019-11691: Use-after-free in XMLHttpRequest

CVE-2019-11692: Use-after-free removing listeners in the event listener manager

CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux

CVE-2019-7317: Use-after-free in png_image_free of libpng library

CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox

CVE-2019-11695: Custom cursor can render over user interface outside of web content

CVE-2019-11696: Java web start .JNLP files are not recognized as executable files for download prompts

CVE-2019-11697: Pressing key combinations can bypass installation prompt delays and install extensions

CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks

CVE-2019-11700: res: protocol can be used to open known local files

CVE-2019-11699: Incorrect domain name highlighting during page navigation

CVE-2019-11701: webcal: protocol default handler loads vulnerable web page

CVE-2019-9814: Memory safety bugs fixed in Firefox 67

CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7

CVE-2019-9815 CVE-2019-9816 CVE-2019-9817 CVE-2019-9818 CVE-2019-9819 CVE-2019-9820 CVE-2019-9821 CVE-2019-11691 CVE-2019-11692 CVE-2019-11693 CVE-2019-7317 CVE-2019-11694 CVE-2019-11695 CVE-2019-11696 CVE-2019-11697 CVE-2019-11698 CVE-2019-11700 CVE-2019-11699 CVE-2019-11701 CVE-2019-9814 CVE-2019-9800 https://www.mozilla.org/security/advisories/mfsa2019-13/ https://www.mozilla.org/security/advisories/mfsa2019-14/ https://www.mozilla.org/security/advisories/mfsa2019-15/ 2019-05-21 2019-05-22 2019-07-23
samba -- multiple vulnerabilities samba46 4.6.16 samba47 4.7.12 samba48 4.8.12 samba49 4.9.8 samba410 4.10.3

The samba project reports:

The checksum validation in the S4U2Self handler in the embedded Heimdal KDC did not first confirm that the checksum was keyed, allowing replacement of the requested target (client) principal

Authenticated users with write permission can trigger a symlink traversal to write or detect files outside the Samba share.

https://www.samba.org/samba/security/CVE-2018-16860.html CVE-2018-16860 https://www.samba.org/samba/security/CVE-2019-3880.html CVE-2019-3880 2019-05-14 2019-05-14
Rust -- violation of Rust's safety guarantees rust 1.34.01.34.2

Sean McArthur reports:

The Rust Programming Language Standard Library 1.34.x before 1.34.2 contains a stabilized method which, if overridden, can violate Rust's safety guarantees and cause memory unsafety. If the Error::type_id method is overridden then any type can be safely cast to any other type, causing memory safety vulnerabilities in safe code (e.g., out-of-bounds write or read). Code that does not manually implement Error::type_id is unaffected.

https://blog.rust-lang.org/2019/05/13/Security-advisory.html CVE-2019-12083 2019-05-09 2019-05-15
Flash Player -- arbitrary code execution linux-flashplayer 32.0.0.192

Adobe reports:

  • This update resolves a use-after-free vulnerability that could lead to arbitrary code execution (CVE-2019-7837).
CVE-2019-7837 https://helpx.adobe.com/security/products/flash-player/apsb19-26.html 2019-05-14 2019-05-14
PHP -- Multiple vulnerabilities in EXIF module php71-exif 7.1.28 php72-exif 7.2.17 php73-exif 7.3.4

The PHP project reports:

Heap-buffer-overflow in php_ifd_get32s (CVE-2019-11034)

Heap-buffer-overflow in exif_iif_add_value (CVE-2019-11035)

https://www.php.net/ChangeLog-7.php CVE-2019-11034 CVE-2019-11035 2019-04-04 2019-05-11
PostgreSQL -- Selectivity estimators bypass row security policies postgresql11-server 11.3 postgresql10-server 10.8 postgresql96-server 9.6.13 postgresql95-server 9.5.17

The PostgreSQL project reports:

PostgreSQL maintains statistics for tables by sampling data available in columns; this data is consulted during the query planning process. Prior to this release, a user able to execute SQL queries with permissions to read a given column could craft a leaky operator that could read whatever data had been sampled from that column. If this happened to include values from rows that the user is forbidden to see by a row security policy, the user could effectively bypass the policy. This is fixed by only allowing a non-leakproof operator to use this data if there are no relevant row security policies for the table.

https://www.postgresql.org/about/news/1939/ CVE-2019-10130 2019-05-09 2019-05-09
PostgreSQL -- Memory disclosure in partition routing postgresql11-server 11.3

The PostgreSQL project reports:

Prior to this release, a user running PostgreSQL 11 can read arbitrary bytes of server memory by executing a purpose-crafted INSERT statement to a partitioned table.

https://www.postgresql.org/about/news/1939/ CVE-2019-10129 2019-05-09 2019-05-09
gitea -- multiple vulnerabilities gitea 1.8.0

Gitea Team reports:

This release contains two new security fixes which cannot be backported to the 1.7.0 branch, so it is recommended to update to this version.

https://blog.gitea.io/2019/04/gitea-1.8.0-is-released/ 2019-04-21 2019-05-06
comms/hylafax -- Malformed fax sender remote code execution in JPEG support hylafax 6.0.7

A malicious sender that sets both JPEG and MH,MR,MMR or JBIG in the same DCS signal or sends a large JPEG page could lead to remote code execution.

CVE-2018-17141 ftp://ftp.hylafax.org/security/CVE-2018-17141.html https://www.x41-dsec.de/lab/advisories/x41-2018-008-hylafax/ http://bugs.hylafax.org/show_bug.cgi?id=974 http://git.hylafax.org/HylaFAX?a=commit;h=c6cac8d8cd0dbe313689ba77023e12bc5b3027be 2018-08-24 2019-05-05
Gitlab -- Information Disclosure gitlab-ce 11.10.011.10.3 11.9.011.9.11 11.8.011.8.10

Gitlab reports:

Information Disclosure with Limited Scope Token

https://about.gitlab.com/2019/04/30/security-release-gitlab-11-dot-10-dot-3-released/ CVE-2019-11605 2019-04-30 2019-05-01
Dovecot -- Multiple vulnerabilities dovecot 2.3.02.3.6

Aki Tuomi reports:

Submission-login crashes with signal 11 due to null pointer access when authentication is aborted by disconnecting. This can lead to denial-of-service attack by persistent attacker(s).

Aki Tuomi reports:

Submission-login crashes when authentication is started over TLS secured channel and invalid authentication message is sent. This can lead to denial-of-service attack by persistent attacker(s).

https://dovecot.org/list/dovecot-news/2019-April/000409.html CVE-2019-11494 https://dovecot.org/list/dovecot-news/2019-April/000410.html CVE-2019-11499 2019-03-11 2019-04-30
Gitlab -- Multiple vulnerabilities gitlab-ce 11.10.011.10.2 11.9.011.9.10 6.0.011.8.9

Gitlab reports:

Moving an Issue to Private Repo Leaks Project Namespace

Notification Emails Sent to Restricted Users

Unauthorized Comments on Confidential Issues

Merge Request Approval Count Inflation

Unsanitized Branch Names on New Merge Request Notification Emails

Improper Sanitation of Credentials in Gitaly

https://about.gitlab.com/2019/04/29/security-release-gitlab-11-dot-10-dot-2-released/ CVE-2019-11545 CVE-2019-11544 CVE-2019-11548 CVE-2019-11546 CVE-2019-11547 CVE-2019-11549 2019-04-29 2019-04-29
buildbot -- CRLF injection in Buildbot login and logout redirect code py27-buildbot py35-buildbot py36-buildbot py37-buildbot 1.8.0

A CRLF can be injected in Location header of /auth/login and /auth/logout This is due to lack of input validation in the buildbot redirection code.

It was not found a way to impact Buildbot product own security through this vulnerability, but it could be used to compromise other sites hosted on the same domain as Buildbot. - cookie injection a master domain (ie if your buildbot is on buildbot.buildbot.net, one can inject a cookie on *.buildbot.net, which could impact another website hosted in your domain) - HTTP response splitting and cache poisoning (browser or proxy) are also typical impact of this vulnerability class, but might be impractical to exploit.

https://github.com/buildbot/buildbot/wiki/CRLF-injection-in-Buildbot-login-and-logout-redirect-code https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7313 CVE-2019-7313 2019-01-29 2019-04-26
drupal -- Drupal core - Moderately critical drupal7 7.66 drupal8 8.6.15

Drupal Security Team reports:

CVE-2019-10909: Escape validation messages in the PHP templating engine.

CVE-2019-10910: Check service IDs are valid.

CVE-2019-10911: Add a separator in the remember me cookie hash.

jQuery 3.4.0 includes a fix for some unintended behavior when using jQuery.extend(true, {}, ...). If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. This fix is included in jQuery 3.4.0, but patch diffs exist to patch previous jQuery versions.

It's possible that this vulnerability is exploitable with some Drupal modules. As a precaution, this Drupal security release backports the fix to jQuery.extend(), without making any other changes to the jQuery version that is included in Drupal core (3.2.1 for Drupal 8 and 1.4.4 for Drupal 7) or running on the site via some other module such as jQuery Update.

https://www.drupal.org/SA-CORE-2019-005 https://www.drupal.org/SA-CORE-2019-006 2019-04-17 2019-04-25
py-yaml -- arbitrary code execution py27-yaml py35-yaml py36-yaml py37-yaml 4.1

pyyaml reports:

the PyYAML.load function could be easily exploited to call any Python function. That means it could call any system command using os.system()

CVE-2017-18342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18342 https://github.com/yaml/pyyaml/pull/74 2018-06-27 2019-04-23
FreeBSD -- EAP-pwd message reassembly issue with unexpected fragment FreeBSD 12.012.0_3 11.211.2_9 wpa_supplicant 2.8 hostapd 2.8

Problem Description:

EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant (EAP peer) does not to validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to NULL pointer dereference.

See https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt for a detailed description of the bug.

Impact:

All wpa_supplicant and hostapd versions with EAP-pwd support could suffer a denial of service attack through process termination.

https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt 2019-04-18 2019-04-23
FreeBSD -- EAP-pwd missing commit validation FreeBSD 12.012.0_3 11.211.2_9 wpa_supplicant 2.8 hostapd 2.8

Problem Description:

EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant (EAP peer) does not to validate the received scalar and element values in EAP-pwd-Commit messages properly. This could result in attacks that would be able to complete EAP-pwd authentication exchange without the attacker having to know the used password.

See https://w1.fi/security/2019-4/eap-pwd-missing-commit-validation.txt for a detailed description of the bug.

Impact:

All wpa_supplicant and hostapd versions with EAP-pwd support.

CVE-2019-9497 CVE-2019-9498 CVE-2019-9499 SA-19:03.wpa 2019-04-10 2019-04-23 2019-07-30
FreeBSD -- SAE confirm missing state validation FreeBSD 12.012.0_3 11.211.2_9 wpa_supplicant 2.8 hostapd 2.8

Problem Description:

When hostapd is used to operate an access point with SAE (Simultaneous Authentication of Equals; also known as WPA3-Personal), an invalid authentication sequence could result in the hostapd process terminating due to a NULL pointer dereference when processing SAE confirm message. This was caused by missing state validation steps when processing the SAE confirm message in hostapd/AP mode.

See https://w1.fi/security/2019-3/sae-confirm-missing-state-validation.txt for a detailed description of the bug.

Impact:

All hostapd versions with SAE support (CONFIG_SAE=y in the build configuration and SAE being enabled in the runtime configuration).

CVE-2019-9496 2019-04-10 2019-04-23
FreeBSD -- EAP-pwd side-channel attack FreeBSD 12.012.0_3 11.211.2_9 wpa_supplicant 2.8 hostapd 2.8

Problem Description:

Potential side channel attacks in the SAE implementations used by both hostapd and wpa_supplicant (see CVE-2019-9494 and VU#871675). EAP-pwd uses a similar design for deriving PWE from the password and while a specific attack against EAP-pwd is not yet known to be tested, there is no reason to believe that the EAP-pwd implementation would be immune against the type of cache attack that was identified for the SAE implementation. Since the EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant (EAP peer) does not support MODP groups, the timing attack described against SAE is not applicable for the EAP-pwd implementation.

See https://w1.fi/security/2019-2/eap-pwd-side-channel-attack.txt for a detailed description of the bug.

Impact:

All wpa_supplicant and hostapd versions with EAP-pwd support (CONFIG_EAP_PWD=y in the build configuration and EAP-pwd being enabled in the runtime configuration).

CVE-2019-9495 2019-04-10 2019-04-23
FreeBSD -- SAE side-channel attacks FreeBSD 12.012.0_3 11.211.2_9 wpa_supplicant 2.8 hostapd 2.8

Problem Description:

Side channel attacks in the SAE implementations used by both hostapd (AP) and wpa_supplicant (infrastructure BSS station/mesh station). SAE (Simultaneous Authentication of Equals) is also known as WPA3-Personal. The discovered side channel attacks may be able to leak information about the used password based on observable timing differences and cache access patterns. This might result in full password recovery when combined with an offline dictionary attack and if the password is not strong enough to protect against dictionary attacks.

See https://w1.fi/security/2019-1/sae-side-channel-attacks.txt for a detailed description of the bug.

Impact:

All wpa_supplicant and hostapd versions with SAE support (CONFIG_SAE=y in the build configuration and SAE being enabled in the runtime configuration).

CVE-2019-9494 2019-04-10 2019-04-23
Istio -- Security vulnerabilities istio 1.1.2

Istio reports:

Two security vulnerabilities have recently been identified in the Envoy proxy. The vulnerabilities are centered on the fact that Envoy did not normalize HTTP URI paths and did not fully validate HTTP/1.1 header values. These vulnerabilities impact Istio features that rely on Envoy to enforce any of authorization, routing, or rate limiting.

CVE-2019-9900 CVE-2019-9901 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9900 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9901 https://github.com/envoyproxy/envoy/issues/6434 https://github.com/envoyproxy/envoy/issues/6435 2019-03-29 2019-04-22
Ghostscript -- Security bypass vulnerability ghostscript9-agpl-base ghostscript9-agpl-x11 9.27

Cedric Buissart (Red Hat) reports:

It was found that the superexec operator was available in the internal dictionary in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.

It was found that the forceput operator could be extracted from the DefineResource method in ghostscript before 9.27. A specially crafted PostScript file could use this flaw in order to, for example, have access to the file system outside of the constrains imposed by -dSAFER.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838 CVE-2019-3835 CVE-2019-3838 2019-03-21 2019-04-21
GnuTLS -- double free, invalid pointer access gnutls 3.6.7

The GnuTLS project reports:

  • Tavis Ormandy from Google Project Zero found a memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.
  • It was found using the TLS fuzzer tools that decoding a malformed TLS1.3 asynchronous message can cause a server crash via an invalid pointer access. The issue affects GnuTLS server applications since 3.6.4.
https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27 CVE-2019-3829 CVE-2019-3836 2019-03-27 2019-04-19
dovecot -- json encoder crash dovecot 2.3.02.3.5.2 dovecot2 2.3.02.3.5.2

Aki Tuomi reports:

* CVE-2019-10691: Trying to login with 8bit username containing invalid UTF8 input causes auth process to crash if auth policy is enabled. This could be used rather easily to cause a DoS. Similar crash also happens during mail delivery when using invalid UTF8 in From or Subject header when OX push notification driver is used.

https://dovecot.org/pipermail/dovecot-news/2019-April/000407.html CVE-2019-10691 2019-04-09 2019-04-18 2019-05-26
libssh2 -- multiple issues libssh2 1.8.1,3 linux-c6-libssh2 1.4.2_7 linux-c7-libssh2 1.4.3_3

libssh2 developers report:

  • Defend against possible integer overflows in comp_method_zlib_decomp.
  • Defend against writing beyond the end of the payload in _libssh2_transport_read().
  • Sanitize padding_length - _libssh2_transport_read().
  • This prevents an underflow resulting in a potential out-of-bounds read if a server sends a too-large padding_length, possibly with malicious intent.
  • Prevent zero-byte allocation in sftp_packet_read() which could lead to an out-of-bounds read.
  • Check the length of data passed to sftp_packet_add() to prevent out-of-bounds reads.
  • Add a required_size parameter to sftp_packet_require et. al. to require callers of these functions to handle packets that are too short.
  • Additional length checks to prevent out-of-bounds reads and writes in _libssh2_packet_add().
https://github.com/libssh2/libssh2/releases/tag/libssh2-1.8.1 https://libssh2.org/CVE-2019-3855.html https://libssh2.org/CVE-2019-3856.html https://libssh2.org/CVE-2019-3857.html https://libssh2.org/CVE-2019-3858.html https://libssh2.org/CVE-2019-3859.html https://libssh2.org/CVE-2019-3860.html https://libssh2.org/CVE-2019-3861.html https://libssh2.org/CVE-2019-3862.html https://libssh2.org/CVE-2019-3863.html CVE-2019-3855 CVE-2019-3856 CVE-2019-3857 CVE-2019-3858 CVE-2019-3859 CVE-2019-3860 CVE-2019-3861 CVE-2019-3862 CVE-2019-3863 2019-03-14 2019-04-18 2019-07-07
gitea -- remote code execution gitea 1.7.5

The Gitea team reports:

Prevent remote code execution vulnerability with mirror repo URL settings.

https://blog.gitea.io/2019/04/gitea-1.7.6-is-released/ 2019-04-13 2019-04-17
MySQL -- multiple vulnerabilities mariadb55-server 5.5.64 mariadb101-server 10.1.39 mariadb102-server 10.2.23 mariadb103-server 10.3.14 mysql56-server 5.6.44 mysql57-server 5.7.26 mysql80-server 8.0.15 percona55-server 5.5.64 percona56-server 5.6.44 percona57-server 5.7.26

Oracle reports:

Critical Patch Update Oracle MySQL Executive Summary

This Critical Patch Update contains 44 new security fixes for Oracle MySQL. 3 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.

The Oracle MySQL products and versions affected by vulnerabilities that are fixed in this Critical Patch Update are: MySQL Server, versions 5.6.43 and prior, 5.7.25 and prior, 8.0.15 and prior

Further details will be published by Oracle on 2019-04-16

https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html 2019-04-13 2019-04-13
wget -- security flaw in caching credentials passed as a part of the URL wget 1.191.20.1

Gynvael Coldwind reports:

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483 CVE-2018-20483 2018-12-25 2019-04-12
Gitlab -- Group Runner Registration Token Exposure gitlab-ce 11.9.011.9.7 11.8.011.8.7 10.4.011.7.11

Gitlab reports:

Group Runner Registration Token Exposure

https://about.gitlab.com/2019/04/10/critical-security-release-gitlab-11-dot-9-dot-7-released/ CVE-2019-11000 2019-04-10 2019-04-11
jenkins -- multiple vulnerabilities jenkins 2.172 jenkins-lts 2.164.2

Jenkins Security Advisory:

Description

(Medium) SECURITY-1289

Jenkins accepted cached legacy CLI authentication

(Medium) SECURITY-1327

XSS vulnerability in form validation button

https://jenkins.io/security/advisory/2019-04-10/ 2019-04-10 2019-04-10
Flash Player -- multiple vulnerabilities linux-flashplayer 32.0.0.171

Adobe reports:

  • This update resolves a use-after-free vulnerability that could lead to arbitrary code execution (CVE-2019-7096).
  • This update resolves an out-of-bounds read vulnerability that could lead to information disclosure (CVE-2019-7108).
CVE-2019-7096 CVE-2019-7108 https://helpx.adobe.com/security/products/flash-player/apsb19-19.html 2019-04-09 2019-04-10
clamav -- multiple vulnerabilities clamav 0.101.2,1

Clamav reports:

An out-of-bounds heap read condition may occur when scanning PDF documents

An out-of-bounds heap read condition may occur when scanning PE files

An out-of-bounds heap write condition may occur when scanning OLE2 files

An out-of-bounds heap read condition may occur when scanning malformed PDF documents

A path-traversal write condition may occur as a result of improper input validation when scanning RAR archives

A use-after-free condition may occur as a result of improper error handling when scanning nested RAR archives

https://blog.clamav.net/2019/03/clamav-01012-and-01003-patches-have.html CVE-2019-1787 CVE-2019-1789 CVE-2019-1788 CVE-2019-1786 CVE-2019-1785 CVE-2019-1798 2019-03-29 2019-04-05
Gitlab -- Multiple vulnerabilities gitlab-ce 11.9.011.9.4 11.8.011.8.6 11.7.10

Gitlab reports:

DoS potential for regex in CI/CD refs

Related branches visible in issues for guests

Persistent XSS at merge request resolve conflicts

Improper authorization control "move issue"

Guest users of private projects have access to releases

DoS potential on project languages page

Recurity assessment: information exposure through timing discrepancy

Recurity assessment: loginState HMAC issues

Recurity assessment: open redirect

PDF.js vulnerable to CVE-2018-5158

IDOR labels of private projects/groups

EXIF geolocation data not stripped from uploaded images

https://about.gitlab.com/2019/04/01/security-release-gitlab-11-dot-9-dot-4-released/ CVE-2019-10640 CVE-2019-10116 CVE-2019-10111 CVE-2019-10110 CVE-2019-10115 CVE-2019-10113 CVE-2019-10114 CVE-2019-10112 CVE-2019-10117 CVE-2018-5158 CVE-2019-10108 CVE-2019-10109 2019-04-01 2019-04-02
Apache -- Multiple vulnerabilities apache24 2.4.39

The Apache httpd Project reports:

Apache HTTP Server privilege escalation from modules' scripts (CVE-2019-0211) (important)

mod_auth_digest access control bypass (CVE-2019-0217) (important)

mod_ssl access control bypass (CVE-2019-0215) (important)

mod_http2, possible crash on late upgrade (CVE-2019-0197) (low)

mod_http2, read-after-free on a string compare (CVE-2019-0196) (low)

Apache httpd URL normalization inconsistincy (CVE-2019-0220) (low)

https://www.apache.org/dist/httpd/CHANGES_2.4.39 https://httpd.apache.org/security/vulnerabilities_24.html CVE-2019-0211 CVE-2019-0217 CVE-2019-0215 CVE-2019-0196 CVE-2019-0220 2019-04-01 2019-04-02
Kubectl -- Potential directory traversal kubectl 1.11.9 1.12.01.12.7 1.13.01.13.5

Kubernetes.io reports:

A security issue was discovered with the Kubernetes kubectl cp command that could enable a directory traversal replacing or deleting files on a user’s workstation.

CVE-2019-1002101 https://nvd.nist.gov/vuln/detail/CVE-2019-1002101 2019-03-28 2019-04-01
znc -- Denial of Service znc 1.7.3

Mitre reports:

ZNC before 1.7.3-rc1 allows an existing remote user to cause a Denial of Service (crash) via invalid encoding.

CVE-2019-9917 https://wiki.znc.in/ChangeLog/1.7.3 2019-03-21 2019-03-31
Jupyter notebook -- open redirect vulnerability py27-notebook py35-notebook py36-notebook py37-notebook 5.7.8

Jupyter blog:

Login pages tend to take a parameter for redirecting back to a page after successful login, e.g. /login?next=/notebooks/mynotebook.ipynb, so that you aren't disrupted too much if you try to visit a page, but have to authenticate first. An Open Redirect Vulnerability is when a malicious person crafts a link pointing to the login page of a trusted site, but setting the "redirect after successful login" parameter to send the user to their own site, instead of a page on the authenticated site (the notebook or JupyterHub server), e.g. /login?next=http://badwebsite.biz. This doesn't necessarily compromise anything immediately, but it enables phishing if users don't notice that the domain has changed, e.g. by showing a fake "re-enter your password" page. Servers generally have to validate the redirect URL to avoid this. Both JupyterHub and Notebook already do this, but the validation didn't take into account all possible ways to redirect to other sites, so some malicious URLs could still be crafted to redirect away from the server (the above example does not work in any recent version of either package). Only certain browsers (Chrome and Firefox, not Safari) could be redirected from the JupyterHub login page, but all browsers could be redirected away from a standalone notebook server.

https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4 https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst CVE-2019-10255 2019-03-28 2019-03-29 2019-04-06
dovecot -- Buffer overflow reading extension header dovecot 2.3.5.1

Aki Tuomi reports:

Vulnerability Details: When reading FTS or POP3-UIDL header from dovecot index, the input buffer size is not bound, and data is copied to target structure causing stack overflow. Risk: This can be used for local root privilege escalation or executing arbitrary code in dovecot process context. This requires ability to directly modify dovecot indexes. Steps to reproduce: Produce dovecot.index.log entry that creates an FTS header which has more than 12 bytes of data. Trigger dovecot indexer-worker or run doveadm index. Dovecot will crash. Mitigations: Since 2.3.0 dovecot has been compiled with stack smash protection, ASLR, read-only GOT tables and other techniques that make exploiting this bug much harder.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7524 https://dovecot.org/list/dovecot-news/2019-March/000401.html CVE-2019-7524 2019-02-05 2019-03-28
drupal -- Drupal core - Moderately critical - Cross Site Scripting drupal7 7.65 drupal8 8.6.13

Drupal Security Team reports:

Under certain circumstances the File module/subsystem allows a malicious user to upload a file that can trigger a cross-site scripting (XSS) vulnerability.

https://www.drupal.org/project/drupal/releases/8.6.13 https://www.drupal.org/project/drupal/releases/7.65 https://www.drupal.org/SA-CORE-2019-004 CVE-2019-6341 2019-03-20 2019-03-27 2019-03-28
Python -- NULL pointer dereference vulnerability python27 2.7.16 python35 3.5.7 python36 3.6.8_1 python37 3.7.3

Python Changelog:

bpo-35746: [CVE-2019-5010] Fix a NULL pointer deref in ssl module. The cert parser did not handle CRL distribution points with empty DP or URI correctly. A malicious or buggy certificate can result into segfault. Vulnerability (TALOS-2018-0758) reported by Colin Read and Nicolas Edet of Cisco.

https://docs.python.org/3.7/whatsnew/changelog.html https://bugs.python.org/issue35746 CVE-2019-5010 2019-01-15 2019-03-26 2019-03-27
wordpress -- multiple issues wordpress fr-wordpress 5.1.1,1 de-wordpress zh_CN-wordpress zh_TW-wordpress ja-wordpress ru-wordpress 5.1.1

wordpress developers reports:

Hosts can now offer a button for their users to update PHP.

The recommended PHP version used by the Update PHP notice can now be filtered.

https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/ 2019-03-12 2019-03-21
Gitlab -- Vulnerability gitlab-ce 11.8.011.8.3 11.7.7

Gitlab reports:

Project Runner Token Exposed Through Issues Quick Actions

https://about.gitlab.com/2019/03/20/critical-security-release-gitlab-11-dot-8-dot-3-released/ CVE-2019-9866 2019-03-20 2019-03-21
libXdmcp -- insufficient entropy generating session keys libXdmcp 1.1.3

The freedesktop and x.org project reports:

It was discovered that libXdmcp before 1.1.3 used weak entropy to generate session keys on platforms without arc4random_buf() but with getentropy(). On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.

Please note, that since FreeBSD provides arc4random_buf(), it is unknown if FreeBSD is affected by this vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2017-2625 https://lists.x.org/archives/xorg-announce/2019-March/002974.html CVE-2017-2625 2017-04-04 2019-03-21 2019-03-22
Gitlab -- Vulnerability gitlab-ce 11.8.2

Gitlab reports:

Public project in a private group makes the group page publicly accessible

https://about.gitlab.com/2019/03/14/gitlab-11-8-2-released/ CVE-2019-9732 2019-03-14 2019-03-20
gitea -- XSS vulnerability gitea 1.7.4

Gitea Team reports:

Fix potential XSS vulnerability in repository description.

https://blog.gitea.io/2019/03/gitea-1.7.4-is-released/ 2019-03-12 2019-03-20
mozilla -- multiple vulnerabilities firefox 66.0_3,1 waterfox 56.2.9 seamonkey linux-seamonkey 2.53.0 firefox-esr 60.6.0,1 linux-firefox 60.6.0,2 libxul thunderbird linux-thunderbird 60.6.0

Mozilla Foundation reports:

CVE-2019-9790: Use-after-free when removing in-use DOM elements

CVE-2019-9791: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey

CVE-2019-9792: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script

CVE-2019-9793: Improper bounds checks when Spectre mitigations are disabled

CVE-2019-9794: Command line arguments not discarded during execution

CVE-2019-9795: Type-confusion in IonMonkey JIT compiler

CVE-2019-9796: Use-after-free with SMIL animation controller

CVE-2019-9797: Cross-origin theft of images with createImageBitmap

CVE-2019-9798: Library is loaded from world writable APITRACE_LIB location

CVE-2019-9799: Information disclosure via IPC channel messages

CVE-2019-9801: Windows programs that are not 'URL Handlers' are exposed to web content

CVE-2019-9802: Chrome process information leak

CVE-2019-9803: Upgrade-Insecure-Requests incorrectly enforced for same-origin navigation

CVE-2019-9804: Code execution through 'Copy as cURL' in Firefox Developer Tools on macOS

CVE-2019-9805: Potential use of uninitialized memory in Prio

CVE-2019-9806: Denial of service through successive FTP authorization prompts

CVE-2019-9807: Text sent through FTP connection can be incorporated into alert messages

CVE-2019-9809: Denial of service through FTP modal alert error messages

CVE-2019-9808: WebRTC permissions can display incorrect origin with data: and blob: URLs

CVE-2019-9789: Memory safety bugs fixed in Firefox 66

CVE-2019-9788: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6

CVE-2019-9788 CVE-2019-9789 CVE-2019-9790 CVE-2019-9791 CVE-2019-9792 CVE-2019-9793 CVE-2019-9794 CVE-2019-9795 CVE-2019-9796 CVE-2019-9797 CVE-2019-9798 CVE-2019-9799 CVE-2019-9801 CVE-2019-9802 CVE-2019-9803 CVE-2019-9804 CVE-2019-9805 CVE-2019-9806 CVE-2019-9807 CVE-2019-9808 CVE-2019-9809 https://www.mozilla.org/security/advisories/mfsa2019-07/ https://www.mozilla.org/security/advisories/mfsa2019-08/ 2019-03-19 2019-03-19 2019-07-23
PowerDNS -- Insufficient validation in the HTTP remote backend powerdns 4.1.7

PowerDNS developers report:

An issue has been found in PowerDNS Authoritative Server when the HTTP remote backend is used in RESTful mode (without post=1 set), allowing a remote user to cause the HTTP backend to connect to an attacker-specified host instead of the configured one, via a crafted DNS query. This can be used to cause a denial of service by preventing the remote backend from getting a response, content spoofing if the attacker can time its own query so that subsequent queries will use an attacker-controlled HTTP server instead of the configured one, and possibly information disclosure if the Authoritative Server has access to internal servers.

https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html CVE-2019-3871 2019-03-18 2019-03-19
Rails -- Action View vulnerabilities rubygem-actionview4 4.2.11.1 rubygem-actionview50 5.0.7.2 rubygem-actionview5 5.1.6.2

Ruby on Rails blog:

Rails 4.2.11.1, 5.0.7.2, 5.1.6.2, 5.2.2.1, and 6.0.0.beta3 have been released! These contain the following important security fixes. It is recommended that users upgrade as soon as possible:

CVE-2019-5418 File Content Disclosure in Action View

CVE-2019-5419 Denial of Service Vulnerability in Action View

https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ CVE-2019-5418 CVE-2019-5419 2019-03-13 2019-03-18
PuTTY -- security fixes in new release putty 0.71 putty-gtk2 0.71 putty-nogtk 0.71

The PuTTY team reports:

New in 0.71:

  • Security fixes found by an EU-funded bug bounty programme:
  • + a remotely triggerable memory overwrite in RSA key exchange, which can occur before host key verification
  • + potential recycling of random numbers used in cryptography
  • + on Unix, remotely triggerable buffer overflow in any kind of server-to-client forwarding
  • + multiple denial-of-service attacks that can be triggered by writing to the terminal
  • Other security enhancements: major rewrite of the crypto code to remove cache and timing side channels.
  • User interface changes to protect against fake authentication prompts from a malicious server.
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html 2019-03-16 2019-03-17
Jupyter notebook -- cross-site inclusion (XSSI) vulnerability py27-notebook py35-notebook py36-notebook py37-notebook 5.7.6

Jupyter notebook Changelog:

5.7.6 contains a security fix for a cross-site inclusion (XSSI) vulnerability, where files at a known URL could be included in a page from an unauthorized website if the user is logged into a Jupyter server. The fix involves setting the X-Content-Type-Options: nosniff header, and applying CSRF checks previously on all non-GET API requests to GET requests to API endpoints and the /files/ endpoint.

The attacking page is able to access some contents of files when using Internet Explorer through script errors, but this has not been demonstrated with other browsers. A CVE has been requested for this vulnerability.

https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-auth-prompt-spoofing.html https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-fd-set-overflow.html https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-rng-reuse.html https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-rsa-kex-integer-overflow.html https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-terminal-dos-combining-chars.html https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-terminal-dos-combining-chars-double-width-gtk.html https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-terminal-dos-one-column-cjk.html https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/pscp-unsanitised-server-output.html https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/side-channels.html 2019-03-10 2019-03-16
RubyGems -- multiple vulnerabilities ruby23-gems ruby24-gems ruby25-gems 3.0.2

RubyGems Security Advisories:

CVE-2019-8320: Delete directory using symlink when decompressing tar

CVE-2019-8321: Escape sequence injection vulnerability in 'verbose'

CVE-2019-8322: Escape sequence injection vulnerability in 'gem owner'

CVE-2019-8323: Escape sequence injection vulnerability in API response handling

CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution

CVE-2019-8325: Escape sequence injection vulnerability in errors

https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html https://github.com/rubygems/rubygems/blob/master/History.txt CVE-2019-8320 CVE-2019-8321 CVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325 2019-03-05 2019-03-15
OpenSSL -- ChaCha20-Poly1305 nonce vulnerability openssl111 1.1.1b_1

The OpenSSL project reports:

Low: ChaCha20-Poly1305 with long nonces (CVE-2019-1543)

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored.

https://www.openssl.org/news/secadv/20190306.txt CVE-2019-1543 2019-03-06 2019-03-07
ntp -- Crafted null dereference attack from a trusted source with an authenticated mode 6 packet ntp 4.2.8p13 FreeBSD 12.012.0_2 11.211.2_8

Network Time Foundation reports:

A crafted malicious authenticated mode 6 (ntpq) packet from a permitted network address can trigger a NULL pointer dereference, crashing ntpd.

Note that for this attack to work, the sending system must be on an address that the target's ntpd accepts mode 6 packets from, and must use a private key that is specifically listed as being used for mode 6 authorization.

Impact: The ntpd daemon can crash due to the NULL pointer dereference, causing a denial of service.

Mitigation:

  • Use restrict noquery to limit addresses that can send mode 6 queries.
  • Limit access to the private controlkey in ntp.keys.
  • Upgrade to 4.2.8p13, or later.
http://bugs.ntp.org/3565 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8936 https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?vector=(AV:N/AC:H/Au:M/C:N/I:N/A:C) https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H CVE-2019-8936 SA-19:04.ntp 2019-01-15 2019-03-07 2019-07-30
rssh - multiple vulnerabilities rssh 2.3.4_2

NVD reports:

rssh version 2.3.4 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in allowscp permission that can result in Local command execution. This attack appear to be exploitable via An authorized SSH user with the allowscp permission.

Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.

https://nvd.nist.gov/vuln/search/results?form_type=Advanced&cves=on&cpe_version=cpe%3a%2fa%3apizzashack%3arssh%3a2.3.4 CVE-2019-1000018 CVE-2019-3463 CVE-2019-3464 2019-02-04 2019-03-06
rt -- XSS via jQuery rt42 4.2.04.2.16 rt44 4.4.04.4.4

BestPractical reports:

The version of jQuery used in RT 4.2 and 4.4 has a Cross-site Scripting (XSS) vulnerability when using cross-domain Ajax requests. This vulnerability is assigned CVE-2015-9251. RT does not use this jQuery feature so it is not directly vulnerable. jQuery version 1.12 no longer receives official updates, however a fix was posted with recommendations for applications to patch locally, so RT will follow this recommendation and ship with a patched version.

https://docs.bestpractical.com/release-notes/rt/4.4.4 https://docs.bestpractical.com/release-notes/rt/4.2.16 CVE-2015-9251 2019-03-05 2019-03-06
slixmpp -- improper access control py35-slixmpp py36-slixmpp py37-slixmpp 1.4.2

NVD reports:

slixmpp version before commit 7cd73b594e8122dddf847953fcfc85ab4d316416 contains an incorrect Access Control vulnerability in XEP-0223 plugin (Persistent Storage of Private Data via PubSub) options profile, used for the configuration of default access model that can result in all of the contacts of the victim can see private data having been published to a PEP node. This attack appears to be exploitable if the user of this library publishes any private data on PEP, the node isn't configured to be private. This vulnerability appears to have been fixed in commit 7cd73b594e8122dddf847953fcfc85ab4d316416 which is included in slixmpp 1.4.2.

https://nvd.nist.gov/vuln/detail/CVE-2019-1000021 CVE-2019-1000021 2019-02-04 2019-03-05
Gitlab -- Multiple vulnerabilities gitlab-ce 11.8.011.8.1 11.7.011.7.6 2.9.011.6.10

Gitlab reports:

Arbitrary file read via MergeRequestDiff

CSRF add Kubernetes cluster integration

Blind SSRF in prometheus integration

Merge request information disclosure

IDOR milestone name information disclosure

Burndown chart information disclosure

Private merge request titles in public project information disclosure

Private namespace disclosure in email notification when issue is moved

Milestone name disclosure

Issue board name disclosure

NPM automatic package referencer

Path traversal snippet mover

Information disclosure repo existence

Issue DoS via Mermaid

Privilege escalation impersonate user

https://about.gitlab.com/2019/03/04/security-release-gitlab-11-dot-8-dot-1-released/ CVE-2019-9221 CVE-2019-9176 CVE-2019-9174 CVE-2019-9172 CVE-2019-9170 CVE-2019-9175 CVE-2019-9178 CVE-2019-9179 CVE-2019-9171 CVE-2019-9224 CVE-2019-9225 CVE-2019-9219 CVE-2019-9217 CVE-2019-9222 CVE-2019-9223 CVE-2019-9220 CVE-2019-9485 2019-03-04 2019-03-05
py-gunicorn -- CWE-113 vulnerability py27-gunicorn py35-gunicorn py36-gunicorn py37-gunicorn 19.5.0

Everardo reports:

gunicorn version 19.4.5 contains a CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers vulnerability in process_headers function in gunicorn/http/wsgi.py that can result in an attacker causing the server to return arbitrary HTTP headers.

CVE-2018-1000164 https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5 2018-04-02 2019-03-05
Node.js -- multiple vulnerabilities node 11.10.1 node10 10.15.2 node8 8.15.1 node6 6.17.0

Node.js reports:

Updates are now available for all active Node.js release lines. In addition to fixes for security flaws in Node.js, they also include upgrades of Node.js 6 and 8 to OpenSSL 1.0.2r which contains a fix for a moderate severity security vulnerability.

For these releases, we have decided to withhold the fix for the Misinterpretation of Input (CWE-115) flaw mentioned in the original announcement. This flaw is very low severity and we are not satisfied that we had a complete and stable fix ready for release. We will be seeking to address this flaw via alternate mechanisms in the near future. In addition, we have introduced an additional CVE for a change in Node.js 6 that we have decided to classify as a Denial of Service (CWE-400) flaw.

We recommend that all Node.js users upgrade to a version listed below as soon as possible.

OpenSSL: 0-byte record padding oracle (CVE-2019-1559)

OpenSSL 1.0.2r contains a fix for CVE-2019-1559 and is included in the releases for Node.js versions 6 and 8 only. Node.js 10 and 11 are not impacted by this vulnerability as they use newer versions of OpenSSL which do not contain the flaw.

Under certain circumstances, a TLS server can be forced to respond differently to a client if a zero-byte record is received with an invalid padding compared to a zero-byte record with an invalid MAC. This can be used as the basis of a padding oracle attack to decrypt data.

Only TLS connections using certain ciphersuites executing under certain conditions are exploitable. We are currently unable to determine whether the use of OpenSSL in Node.js exposes this vulnerability. We are taking a cautionary approach and recommend the same for users. For more information, see the advisory and a detailed write-up by the reporters of the vulnerability.

https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/ CVE-2019-5737 CVE-2019-5739 CVE-2019-1559 2019-02-28 2019-03-03
mybb -- vulnerabilities mybb 1.8.20_1

mybb Team reports:

Medium risk: Reset Password reflected XSS

Medium risk: ModCP Profile Editor username reflected XSS

Low risk: Predictable CSRF token for guest users

Low risk: ACP Stylesheet Properties XSS

Low risk: Reset Password username enumeration via email

https://blog.mybb.com/2019/02/27/mybb-1-8-20-released-security-maintenance-release/ 2019-02-27 2019-03-02 2019-03-04
asterisk -- Remote crash vulnerability with SDP protocol violation asterisk15 15.7.2 asterisk16 16.2.1

The Asterisk project reports:

When Asterisk makes an outgoing call, a very specific SDP protocol violation by the remote party can cause Asterisk to crash.

https://downloads.asterisk.org/pub/security/AST-2019-001.html CVE-2019-7251 2019-01-24 2019-03-01
- webkit-gtk -- Multiple vulnabilities + webkit-gtk -- Multiple vulnerabilities webkit2-gtk3 2.22.6 webkit-gtk2 webkit-gtk3 0

The Webkitgtk project reports:

CVE-2019-6212 - Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling.

CVE-2019-6215 - Processing maliciously crafted web content may lead to arbitrary code execution. A type confusion issue was addressed with improved memory handling.

CVE-2019-6216 - Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling.

CVE-2019-6217 - Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling.

CVE-2019-6226 - Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling.

CVE-2019-6227 - Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling.

CVE-2019-6229 - Processing maliciously crafted web content may lead to universal cross site scripting. A logic issue was addressed with improved validation.

CVE-2019-6233 - Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling.

CVE-2019-6234 - Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling.

https://webkitgtk.org/security/WSA-2019-0001.html CVE-2019-6212 CVE-2019-6215 CVE-2019-6216 CVE-2019-6217 CVE-2019-6226 CVE-2019-6227 CVE-2019-6229 CVE-2019-6233 CVE-2019-6234 2019-02-08 2019-02-24
rdesktop - critical - Remote Code Execution rdesktop 1.8.4
  • Fix memory corruption in process_bitmap_data - CVE-2018-8794
  • Fix remote code execution in process_bitmap_data - CVE-2018-8795
  • Fix remote code execution in process_plane - CVE-2018-8797
  • Fix Denial of Service in mcs_recv_connect_response - CVE-2018-20175
  • Fix Denial of Service in mcs_parse_domain_params - CVE-2018-20175
  • Fix Denial of Service in sec_parse_crypt_info - CVE-2018-20176
  • Fix Denial of Service in sec_recv - CVE-2018-20176
  • Fix minor information leak in rdpdr_process - CVE-2018-8791
  • Fix Denial of Service in cssp_read_tsrequest - CVE-2018-8792
  • Fix remote code execution in cssp_read_tsrequest - CVE-2018-8793
  • Fix Denial of Service in process_bitmap_data - CVE-2018-8796
  • Fix minor information leak in rdpsnd_process_ping - CVE-2018-8798
  • Fix Denial of Service in process_secondary_order - CVE-2018-8799
  • Fix remote code execution in in ui_clip_handle_data - CVE-2018-8800
  • Fix major information leak in ui_clip_handle_data - CVE-2018-20174
  • Fix memory corruption in rdp_in_unistr - CVE-2018-20177
  • Fix Denial of Service in process_demand_active - CVE-2018-20178
  • Fix remote code execution in lspci_process - CVE-2018-20179
  • Fix remote code execution in rdpsnddbg_process - CVE-2018-20180
  • Fix remote code execution in seamless_process - CVE-2018-20181
  • Fix remote code execution in seamless_process_line - CVE-2018-20182
https://github.com/rdesktop/rdesktop/releases/tag/v1.8.4 CVE-2018-20175 CVE-2018-20176 CVE-2018-8791 CVE-2018-8792 CVE-2018-8793 CVE-2018-8794 CVE-2018-8795 CVE-2018-8796 CVE-2018-8797 CVE-2018-8798 CVE-2018-8799 CVE-2018-8800 CVE-2018-20174 CVE-2018-20177 CVE-2018-20178 CVE-2018-20179 CVE-2018-20180 CVE-2018-20181 CVE-2018-20182 2019-01-02 2019-02-22
drupal -- Drupal core - Highly critical - Remote Code Execution drupal8 8.6.10

Drupal Security Team

Some field types do not properly sanitize data from non-form sources. This can lead to arbitrary PHP code execution in some cases..

https://www.drupal.org/sa-core-2019-002 CVE-2019-6340 2019-02-20 2019-02-21
OpenSSL -- Padding oracle vulnerability openssl 1.0.2r,1 linux-c6-openssl 1.0.1e_16

The OpenSSL project reports:

0-byte record padding oracle (CVE-2019-1559) (Moderate)
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data.

https://www.openssl.org/news/secadv/20190226.txt CVE-2019-1559 2019-02-19 2019-02-20 2019-03-07
msmtp -- certificate-verification issue msmtp 1.8.11.8.3

msmtp developers report:

In msmtp 1.8.2, when tls_trust_file has its default configuration, certificate-verification results are not properly checked.

https://marlam.de/msmtp/news/msmtp-1-8-3/ CVE-2019-8337 2019-02-11 2019-02-15
mozilla -- multiple vulnerabilities firefox 65.0.1,1 firefox-esr 60.5.1,1 thunderbird 60.5.1

Mozilla Foundation reports:

CVE-2018-18356: Use-after-free in Skia

CVE-2019-5785: Integer overflow in Skia

CVE-2018-18511: Cross-origin theft of images with ImageBitmapRenderingContext

CVE-2018-18511 CVE-2018-18356 CVE-2019-5785 https://www.mozilla.org/en-US/security/advisories/mfsa2019-04/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/ 2019-02-13 2019-02-13
Flash Player -- information disclosure linux-flashplayer 32.0.0.142

Adobe reports:

  • This update resolves an out-of-bounds vulnerability that could lead to information disclosure (CVE-2019-7090).
CVE-2019-7090 https://helpx.adobe.com/security/products/flash-player/apsb19-06.html 2019-02-12 2019-02-12
OpenJPEG -- integer overflow openjpeg 2.3.0_4

NVD reports:

In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file.

https://nvd.nist.gov/vuln/detail/CVE-2018-5727 https://github.com/uclouvain/openjpeg/issues/1053 CVE-2018-5727 2017-12-08 2019-02-11 2019-03-29
FreeBSD -- File description reference count leak FreeBSD-kernel 12.012.0_3

Problem Description:

FreeBSD 12.0 attempts to handle the case where the receiving process does not provide a sufficiently large buffer for an incoming control message containing rights. In particular, to avoid leaking the corresponding descriptors into the receiving process' descriptor table, the kernel handles the truncation case by closing descriptors referenced by the discarded message.

The code which performs this operation failed to release a reference obtained on the file corresponding to a received right. This bug can be used to cause the reference counter to wrap around and free the file structure.

Impact:

A local user can exploit the bug to gain root privileges or escape from a jail.

CVE-2019-5596 SA-19:02.fd 2019-02-05 2019-02-11
FreeBSD -- System call kernel data register leak FreeBSD-kernel 12.012.0_3 11.211.2_9

Problem Description:

The callee-save registers are used by kernel and for some of them (%r8, %r10, and for non-PTI configurations, %r9) the content is not sanitized before return from syscalls, potentially leaking sensitive information.

Impact:

Typically an address of some kernel data structure used in the syscall implementation, is exposed.

CVE-2019-5595 SA-19:01.syscall 2019-02-05 2019-02-11
kf5-kauth -- Insecure handling of arguments in helpers kf5-kauth 5.54.0_2

Albert Astals Cid reports:

KAuth allows to pass parameters with arbitrary types to helpers running as root over DBus.

Certain types can cause crashes and trigger decoding arbitrary images with dynamically loaded plugin

https://www.kde.org/info/security/advisory-20190209-1.txt CVE-2019-7443 2019-02-09 2019-02-10
unit -- heap memory buffer overflow unit 0.3.01.7.1

unit security problems:

CVE-2019-7401: a head memory buffer overflow might have

been caused in the router process by a specially crafted

request, potentially resulting in a segmentation fault

or other unspecified behavior.

http://mailman.nginx.org/pipermail/unit/2019-February/000112.html CVE-2019-7401 2019-02-07 2019-02-08
curl -- multiple vulnerabilities curl 7.64.0

curl security problems:

CVE-2018-16890: NTLM type-2 out-of-bounds buffer read

libcurl contains a heap buffer out-of-bounds read flaw.

The function handling incoming NTLM type-2 messages (lib/vauth/ntlm.c:ntlm_decode_type2_target) does not validate incoming data correctly and is subject to an integer overflow vulnerability.

Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVE-2019-3822: NTLMv2 type-3 header stack buffer overflow

libcurl contains a stack based buffer overflow vulnerability.

The function creating an outgoing NTLM type-3 header (lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening.

This output data can grow larger than the local buffer if very large "nt response" data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server.

Such a "large value" needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.

CVE-2019-3823: SMTP end-of-response out-of-bounds read

libcurl contains a heap out-of-bounds read in the code handling the end-of-response for SMTP.

If the buffer passed to smtp_endofresp() isn't NUL terminated and contains no character ending the parsed number, and len is set to 5, then the strtol() call reads beyond the allocated buffer. The read contents will not be returned to the caller.

https://curl.haxx.se/docs/security.html https://curl.haxx.se/docs/CVE-2018-16890.html https://curl.haxx.se/docs/CVE-2019-3822.html https://curl.haxx.se/docs/CVE-2019-3823.html CVE-2018-16890 CVE-2019-3822 CVE-2019-3823 2019-02-07 2019-02-07
Gitlab -- Multiple vulnerabilities gitlab-ce 11.7.011.7.4 11.6.011.6.9

Gitlab reports:

Leak of Confidential Issue and Merge Request Titles

Persistent XSS in User Status

https://about.gitlab.com/2019/02/05/critical-security-release-gitlab-11-dot-7-dot-4-released/ CVE-2019-7353 CVE-2019-6796 2019-02-05 2019-02-06
mail/dovecot -- Suitable client certificate can be used to login as other user dovecot 2.3.4.1

Aki Tuomi (Open-Xchange Oy) reports:

Normally Dovecot is configured to authenticate imap/pop3/managesieve/submission clients using regular username/password combination. Some installations have also required clients to present a trusted SSL certificate on top of that. It's also possible to configure Dovecot to take the username from the certificate instead of from the user provided authentication. It's also possible to avoid having a password at all, only trusting the SSL certificate. If the provided trusted SSL certificate is missing the username field, Dovecot should be failing the authentication. However, the earlier versions will take the username from the user provided authentication fields (e.g. LOGIN command). If there is no additional password verification, this allows the attacker to login as anyone else in the system. This affects only installations using: auth_ssl_require_client_cert = yes auth_ssl_username_from_cert = yes Attacker must also have access to a valid trusted certificate without the ssl_cert_username_field in it. The default is commonName, which almost certainly exists in all certificates. This could happen for example if ssl_cert_username_field is a field that normally doesn't exist, and attacker has access to a web server's certificate (and key), which is signed with the same CA. Attack can be migitated by having the certificates with proper Extended Key Usage, such as 'TLS Web Server' and 'TLS Web Server Client'. Also, ssl_cert_username_field setting was ignored with external SMTP AUTH, because none of the MTAs (Postfix, Exim) currently send the cert_username field. This may have allowed users with trusted certificate to specify any username in the authentication. This does not apply to Dovecot Submission service.

https://www.mail-archive.com/dovecot@dovecot.org/msg76117.html CVE-2019-3814 2019-01-16 2019-02-05
typo3 -- multiple vulnerabilities typo3-8-php71 typo3-8-php72 typo3-8-php73 8.7.24 typo3-9-php71 typo3-9-php72 typo3-9-php73 9.5.4

Typo3 news:

Please read the corresponding Security Advisories for details.

https://typo3.org/article/typo3-954-and-8723-security-releases-published/ https://typo3.org/article/typo3-v8724-lts-released/ 2019-01-22 2019-02-02
gitea -- multiple vulnerabilities gitea 1.7.1

Gitea Team reports:

Disable redirect for i18n

Only allow local login if password is non-empty

Fix go-get URL generation

https://github.com/go-gitea/gitea/releases/tag/v1.7.1 2019-01-31 2019-02-01
p5-Email-Address-List -- DDoS related vulnerability p5-Email-Address-List 0.06

Best PRactical Solutions reports:

  0.06 2019-01-02
 
  - Changes to address CVE-2018-18898 which could allow DDoS-type attacks.
    Thanks to Lukas Kramer for reporting the issue and Alex Vandiver for
    contributing fixes.
    - Fix pathological backtracking for unkown regex
    - Fix pathological backtracking in obs-phrase(i.e. obs-display-name)
    - Fix pathological backtracking in cfws, quoted strings
 	  
https://metacpan.org/source/BPS/Email-Address-List-0.06/Changes CVE-2018-18898 2019-01-02 2019-01-31
Gitlab -- Multiple vulnerabilities gitlab-ce 11.7.011.7.3 11.6.011.6.8 0.0.011.5.10

Gitlab reports:

Remote Command Execution via GitLab Pages

Covert Redirect to Steal GitHub/Bitbucket Tokens

Remote Mirror Branches Leaked by Git Transfer Refs

Denial of Service with Markdown

Guests Can View List of Group Merge Requests

Guest Can View Merge Request Titles via System Notes

Persistent XSS via KaTeX

Emails Sent to Unauthorized Users

Hyperlink Injection in Notification Emails

Unauthorized Access to LFS Objects

Trigger Token Exposure

Upgrade Rails to 5.0.7.1 and 4.2.11

Contributed Project Information Visible in Private Profile

Imported Project Retains Prior Visibility Setting

Error disclosure on Project Import

Persistent XSS in User Status

Last Commit Status Leaked to Guest Users

Mitigations for IDN Homograph and RTLO Attacks

Access to Internal Wiki When External Wiki Enabled

User Can Comment on Locked Project Issues

Unauthorized Reaction Emojis by Guest Users

User Retains Project Role After Removal from Private Group

GitHub Token Leaked to Maintainers

Unauthenticated Blind SSRF in Jira Integration

Unauthorized Access to Group Membership

Validate SAML Response in Group SAML SSO

https://about.gitlab.com/2019/01/31/security-release-gitlab-11-dot-7-dot-3-released/ CVE-2019-6783 CVE-2019-6788 CVE-2019-6785 CVE-2019-6790 CVE-2019-6997 CVE-2019-6784 CVE-2019-6789 CVE-2019-6781 CVE-2019-6786 CVE-2019-6787 CVE-2018-16476 CVE-2019-6782 CVE-2019-6791 CVE-2019-6792 CVE-2019-6796 CVE-2019-6794 CVE-2019-6795 CVE-2019-6960 CVE-2019-6995 CVE-2019-7176 CVE-2019-7155 CVE-2019-6797 CVE-2019-6793 CVE-2019-6996 2019-01-31 2019-01-31
turnserver -- multiple vulnerabilities turnserver 4.5.1.0

Mihály Mészáros reports:

We made 4.5.1.0 release public today that fixes many vulnerabilities.

It fix the following vulnerabilities:

  • CVE-2018-4056
  • CVE-2018-4058
  • CVE-2018-4059

They will be exposed very soon..

https://github.com/coturn/coturn/blob/4.5.1.0/ChangeLog https://groups.google.com/d/msg/turn-server-project-rfc5766-turn-server/0RuCzcQa0ew/ebZfNEDqBwAJ CVE-2018-4056 CVE-2018-4058 CVE-2018-4059 2019-01-28 2019-01-30
mozilla -- multiple vulnerabilities firefox 65.0_1,1 waterfox 56.2.7 seamonkey linux-seamonkey 2.53.0 firefox-esr 60.5.0_1,1 linux-firefox 60.5.0,2 libxul thunderbird linux-thunderbird 60.5.0

Mozilla Foundation reports:

CVE-2018-18500: Use-after-free parsing HTML5 stream

CVE-2018-18503: Memory corruption with Audio Buffer

CVE-2018-18504: Memory corruption and out-of-bounds read of texture client buffer

CVE-2018-18505: Privilege escalation through IPC channel messages

CVE-2018-18506: Proxy Auto-Configuration file can define localhost access to be proxied

CVE-2018-18502: Memory safety bugs fixed in Firefox 65

CVE-2018-18501: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5

CVE-2018-18500 CVE-2018-18501 CVE-2018-18502 CVE-2018-18503 CVE-2018-18504 CVE-2018-18505 CVE-2018-18506 https://www.mozilla.org/en-US/security/advisories/mfsa2019-01/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-02/ 2019-01-29 2019-01-29 2019-07-23
powerdns-recursor -- multiple vulnerabilities powerdns-recursor 4.1.9

PowerDNS Team reports:

CVE-2019-3806: An issue has been found in PowerDNS Recursor where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua. When the recursor is configured to run with more than one thread (threads=X) and to do the distribution of incoming queries to the worker threads itself (pdns-distributes-queries=yes), the Lua script is not properly loaded in the thread handling incoming TCP queries, causing the Lua hooks to not be properly applied.

CVE-2019-3807: An issue has been found in PowerDNS Recursor where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation.

https://doc.powerdns.com/recursor/changelog/4.1.html CVE-2019-3806 CVE-2019-3807 2019-01-21 2019-01-22
MySQL -- multiple vulnerabilities mariadb55-server 5.5.63 mariadb100-server 10.0.38 mariadb101-server 10.1.38 mariadb102-server 10.2.22 mariadb103-server 10.3.13 mysql55-server 5.5.63 mysql56-server 5.6.43 mysql57-server 5.7.25 mysql80-server 8.0.14 percona55-server 5.5.63 percona56-server 5.6.43 percona57-server 5.7.25

Oracle reports:

Please reference CVE/URL list for details

Not all listed CVE's are present in all versions/flavors

https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixMSQL CVE-2019-2534 CVE-2019-2533 CVE-2019-2529 CVE-2019-2482 CVE-2019-2434 CVE-2019-2455 CVE-2019-2503 CVE-2019-2436 CVE-2019-2536 CVE-2019-2502 CVE-2019-2510 CVE-2019-2539 CVE-2019-2494 CVE-2019-2495 CVE-2019-2537 CVE-2019-2420 CVE-2019-2481 CVE-2019-2507 CVE-2019-2530 CVE-2019-2528 CVE-2019-2531 CVE-2019-2486 CVE-2019-2532 CVE-2019-2535 CVE-2019-2513 2019-01-15 2019-01-27
botan2 -- Side channel during ECC key generation botan2 2.9.0

botan2 developers reports:

A timing side channel during ECC key generation could leak information about the high bits of the secret scalar. Such information allows an attacker to perform a brute force attack on the key somewhat more efficiently than they would otherwise. Found by Ján Jančár using ECTester.

Bug introduced in 1.11.20, fixed in 2.9.0

https://botan.randombit.net/security.html#id1 CVE-2018-20187 2018-12-17 2019-01-27
phpMyAdmin -- File disclosure and SQL injection phpMyAdmin phpMyAdmin-php56 phpMyAdmin-php70 phpMyAdmin-php71 phpMyAdmin-php72 4.8.5

The phpMyAdmin development team reports:

Summary

Arbitrary file read vulnerability

Description

When AllowArbitraryServer configuration set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access.

phpMyadmin attempts to block the use of LOAD DATA INFILE, but due to a bug in PHP, this check is not honored. Additionally, when using the 'mysql' extension, mysql.allow_local_infile is enabled by default. Both of these conditions allow the attack to occur.

Severity

We consider this vulnerability to be critical.

Mitigation factor

This attack can be mitigated by setting the `AllowArbitraryServer` configuration directive to false (which is the default value).

Affected Versions

phpMyAdmin versions from at least 4.0 through 4.8.4 are affected

Summary

SQL injection in Designer feature

Description

A vulnerability was reported where a specially crafted username can be used to trigger an SQL injection attack through the designer feature.

Severity

We consider this vulnerability to be serious.

Affected Versions

phpMyAdmin versions from 4.5.0 through 4.8.4 are affected

https://www.phpmyadmin.net/security/PMASA-2019-1/ https://www.phpmyadmin.net/security/PMASA-2019-2/ 2019-01-21 2019-01-27
gitea -- multiple vulnerabilities gitea 1.7.0

Gitea Team reports:

Do not display the raw OpenID error in the UI

When redirecting clean the path to avoid redirecting to external site

Prevent DeleteFilePost doing arbitrary deletion

https://github.com/go-gitea/gitea/releases/tag/v1.7.0 2019-01-22 2019-01-26
libzmq4 -- Remote Code Execution Vulnerability libzmq4 4.2.04.3.1

A vulnerability has been found that would allow attackers to direct a peer to jump to and execute from an address indicated by the attacker. This issue has been present since v4.2.0. Older releases are not affected. NOTE: The attacker needs to know in advance valid addresses in the peer's memory to jump to, so measures like ASLR are effective mitigations. NOTE: this attack can only take place after authentication, so peers behind CURVE/GSSAPI are not vulnerable to unauthenticated attackers.

CVE-2019-6250 https://github.com/zeromq/libzmq/issues/3351 https://github.com/zeromq/libzmq/pull/3353 https://nvd.nist.gov/vuln/detail/CVE-2019-6250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6250 2019-01-08 2019-01-26
Apache -- vulnerability apache24 2.4.38

The Apache httpd Project reports:

SECURITY: CVE-2018-17199 mod_session: mod_session_cookie does not respect expiry time allowing sessions to be reused.

SECURITY: CVE-2019-0190 mod_ssl: Fix infinite loop triggered by a client-initiated renegotiation in TLSv1.2 (or earlier) with OpenSSL 1.1.1 and later. PR 63052.

SECURITY: CVE-2018-17189 mod_http2: fixes a DoS attack vector. By sending slow request bodies to resources not consuming them, httpd cleanup code occupies a server thread unnecessarily. This was changed to an immediate stream reset which discards all stream state and incoming data.

http://www.apache.org/dist/httpd/CHANGES_2.4.38 http://httpd.apache.org/security/vulnerabilities_24.html CVE-2018-17199 CVE-2018-17189 CVE-2019-0190 2019-01-22 2019-01-23
www/mod_dav_svn -- Malicious SVN clients can crash mod_dav_svn. mod_dav_svn 1.10.01.10.3 1.11.0

Subversion project reports:

Malicious SVN clients can trigger a crash in mod_dav_svn by omitting the root path from a recursive directory listing request.

http://subversion.apache.org/security/CVE-2018-11803-advisory.txt 2019-01-23 2019-01-23
www/py-requests -- Information disclosure vulnerability py27-requests py35-requests py36-requests py37-requests 2.20.0

The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-18074 https://nvd.nist.gov/vuln/detail/CVE-2018-18074 https://github.com/requests/requests/issues/4716 https://github.com/requests/requests/pull/4718 https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff 2018-06-27 2019-01-22 2019-01-27
joomla3 -- vulnerabilitiesw joomla3 3.9.2

JSST reports:

Inadequate escaping in mod_banners leads to a stored XSS vulnerability.

Inadequate escaping in com_contact leads to a stored XSS vulnerability

Inadequate checks at the Global Configuration Text Filter settings allowed a stored XSS.

Inadequate checks at the Global Configuration helpurl settings allowed a stored XSS.

https://developer.joomla.org/security-centre/760-00190101-core-stored-xss-in-mod-banners.html CVE-2019-6264 https://developer.joomla.org/security-centre/761-20190102-core-stored-xss-in-com-contact.html CVE-2019-6261 https://developer.joomla.org/security-centre/762-20190103-core-stored-xss-issue-in-the-global-configuration-textfilter-settings.html CVE-2019-6263 https://developer.joomla.org/security-centre/763-20190104-core-stored-xss-issue-in-the-global-configuration-help-url.html CVE-2019-6262 2018-12-01 2019-01-20
drupal -- Drupal core - Arbitrary PHP code execution drupal7 7.63 drupal8 8.6.7

Drupal Security Team reports:

A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI.

Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability.

This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.

https://www.drupal.org/SA-CORE-2018-006 2019-01-16 2019-01-19
Helm -- client unpacking chart that contains malicious content helm 2.0.02.12.2

Helm security notice

A specially crafted chart may be able to unpack content into locations on the filesystem outside of the chart's path, potentially overwriting existing files.

https://helm.sh/blog/helm-security-notice-2019/index.html 2019-01-14 2019-01-18
Gitlab -- Arbitrary repo read in Gitlab project import gitlab-ce 11.6.011.6.4 11.5.011.5.7 8.9.011.4.14

Gitlab reports:

Arbitrary repo read in Gitlab project import

https://about.gitlab.com/2019/01/16/critical-security-release-gitlab-11-dot-6-dot-4-released/ CVE-2019-6240 2019-01-16 2019-01-17
jenkins -- multiple vulnerabilities jenkins 2.160 jenkins-lts 2.150.2

Jenkins Security Advisory:

Description

(High) SECURITY-868

Administrators could persist access to Jenkins using crafted 'Remember me' cookie

(Medium) SECURITY-901

Deleting a user in an external security realm did not invalidate their session or 'Remember me' cookie

https://jenkins.io/security/advisory/2019-01-16/ 2019-01-16 2019-01-16
py-matrix-synapse -- undisclosed vulnerability py27-matrix-synapse py35-matrix-synapse py36-matrix-synapse py37-matrix-synapse 0.34.1.1

Matrix developers report:

The matrix team announces the availablility of synapse security releases 0.34.0.1 and 0.34.1.1, fixing CVE-2019-5885.

CVE-2019-5885 https://matrix.org/blog/2019/01/10/critical-security-update-synapse-0-34-0-1-synapse-0-34-1-1/ 2019-01-10 2019-01-15
irssi -- Use after free irssi 1.1.0,11.1.2,1

Irssi reports:

Use after free when hidden lines were expired from the scroll buffer. It may affect the stability of Irssi. (CWE-417, CWE-825)

https://irssi.org/security/irssi_sa_2019_01.txt CVE-2019-5882 ports/234798 2019-01-09 2019-01-10
uriparser -- Out-of-bounds read uriparser 0.9.1

Upstream project reports:

Out-of-bounds read in uriParse*Ex* for incomplete URIs with IPv6 addresses with embedded IPv4 address, e.g. "//[::44.1"; mitigated if passed parameter afterLast points to readable memory containing a '\0' byte.

https://github.com/uriparser/uriparser/blob/uriparser-0.9.1/ChangeLog 2019-01-02 2019-01-06
gitea -- insufficient privilege check gitea 1.6.3

The Gitea project reports:

Security

  • Prevent DeleteFilePost doing arbitrary deletion
https://github.com/go-gitea/gitea/issues/5631 2019-01-04 2019-01-06
chromium -- Use after free in PDFium chromium 71.0.3578.98

Google Chrome Releases reports:

1 security fix contributed by external researches:

  • High CVE-2018-17481: Use after free in PDFium
CVE-2018-17481 https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop_12.html 2018-12-12 2019-01-05
chromium -- multiple vulnerabilities chromium 71.0.3578.80

Google Chrome Releases reports:

43 security fixes in this release, including:

  • High CVE-2018-17480: Out of bounds write in V8
  • High CVE-2018-17481: Use after free in PDFium
  • High CVE-2018-18335: Heap buffer overflow in Skia
  • High CVE-2018-18336: Use after free in PDFium
  • High CVE-2018-18337: Use after free in Blink
  • High CVE-2018-18338: Heap buffer overflow in Canvas
  • High CVE-2018-18339: Use after free in WebAudio
  • High CVE-2018-18340: Use after free in MediaRecorder
  • High CVE-2018-18341: Heap buffer overflow in Blink
  • High CVE-2018-18342: Out of bounds write in V8
  • High CVE-2018-18343: Use after free in Skia
  • High CVE-2018-18344: Inappropriate implementation in Extensions
  • High To be allocated: Multiple issues in SQLite via WebSQL
  • Medium CVE-2018-18345: Inappropriate implementation in Site Isolation
  • Medium CVE-2018-18346: Incorrect security UI in Blink
  • Medium CVE-2018-18347: Inappropriate implementation in Navigation
  • Medium CVE-2018-18348: Inappropriate implementation in Omnibox
  • Medium CVE-2018-18349: Insufficient policy enforcement in Blink
  • Medium CVE-2018-18350: Insufficient policy enforcement in Blink
  • Medium CVE-2018-18351: Insufficient policy enforcement in Navigation
  • Medium CVE-2018-18352: Inappropriate implementation in Media
  • Medium CVE-2018-18353: Inappropriate implementation in Network Authentication
  • Medium CVE-2018-18354: Insufficient data validation in Shell Integration
  • Medium CVE-2018-18355: Insufficient policy enforcement in URL Formatter
  • Medium CVE-2018-18356: Use after free in Skia
  • Medium CVE-2018-18357: Insufficient policy enforcement in URL Formatter
  • Medium CVE-2018-18358: Insufficient policy enforcement in Proxy
  • Medium CVE-2018-18359: Out of bounds read in V8
  • Low To be allocated: Inappropriate implementation in PDFium
  • Low To be allocated: Use after free in Extensions
  • Low To be allocated: Inappropriate implementation in Navigation
  • Low To be allocated: Inappropriate implementation in Navigation
  • Low To be allocated: Insufficient policy enforcement in Navigation
  • Low To be allocated: Insufficient policy enforcement in URL Formatter
  • Medium To be allocated: Insufficient policy enforcement in Payments
  • Various fixes from internal audits, fuzzing and other initiatives
CVE-2018-17480 CVE-2018-17481 CVE-2018-18335 CVE-2018-18336 CVE-2018-18337 CVE-2018-18338 CVE-2018-18339 CVE-2018-18340 CVE-2018-18341 CVE-2018-18342 CVE-2018-18343 CVE-2018-18344 CVE-2018-18345 CVE-2018-18346 CVE-2018-18347 CVE-2018-18348 CVE-2018-18349 CVE-2018-18350 CVE-2018-18351 CVE-2018-18352 CVE-2018-18353 CVE-2018-18354 CVE-2018-18355 CVE-2018-18356 CVE-2018-18357 CVE-2018-18358 CVE-2018-18359 https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html 2018-12-04 2019-01-05
Django -- Content spoofing possibility in the default 404 page py27-django111 py35-django111 py36-django111 py37-django111 1.11.18 py35-django20 py36-django20 py37-django20 2.0.10 py35-django21 py36-django21 py37-django21 2.1.5

Django security releases issued reports:

An attacker could craft a malicious URL that could make spoofed content appear on the default page generated by the django.views.defaults.page_not_found() view.

CVE-2019-3498 https://www.djangoproject.com/weblog/2019/jan/04/security-releases/ 2019-01-03 2019-01-05
Gitlab -- Multiple vulnerabilities gitlab-ce 11.6.011.6.1 11.5.011.5.6 8.0.011.4.13

Gitlab reports:

Source code disclosure merge request diff

Todos improper access control

URL rel attribute not set

Persistent XSS Autocompletion

SSRF repository mirroring

CI job token LFS error message disclosure

Secret CI variable exposure

Guest user CI job disclosure

Persistent XSS label reference

Persistent XSS wiki in IE browser

SSRF in project imports with LFS

Improper access control CI/CD settings

Missing authorization control merge requests

Improper access control branches and tags

Missing authentication for Prometheus alert endpoint

https://about.gitlab.com/2018/12/31/security-release-gitlab-11-dot-6-dot-1-released/ CVE-2018-20493 CVE-2018-20492 CVE-2018-20489 CVE-2018-20490 CVE-2018-20497 CVE-2018-20495 CVE-2018-20488 CVE-2018-20494 CVE-2018-20496 CVE-2018-20491 CVE-2018-20499 CVE-2018-20500 CVE-2018-20501 CVE-2018-20498 CVE-2018-20507 2018-12-31 2019-01-02
diff --git a/security/vuxml/vuln/2020.xml b/security/vuxml/vuln/2020.xml index 928a3eaab63f..c91206e3c661 100644 --- a/security/vuxml/vuln/2020.xml +++ b/security/vuxml/vuln/2020.xml @@ -1,13173 +1,13173 @@ gitea -- multiple vulnerabilities gitea 1.13.1

The Gitea Team reports for release 1.13.1:

  • Hide private participation in Orgs
  • Fix escaping issue in diff
https://github.com/go-gitea/gitea/releases/tag/v1.13.1 ports/252310 2020-12-15 2020-12-31
InspIRCd websocket module double free vulnerability inspircd 3.8.1

The InspIRCd development team reports:

The websocket module before v3.8.1 contains a double free vulnerability. When combined with a HTTP reverse proxy this vulnerability can be used by any user who is [GKZ]-lined to remotely crash an InspIRCd server.

https://docs.inspircd.org/security/2020-02/ 2020-02-01 2021-01-01
Intel CPU issues devcpu-data 1.31

Intel reports:

Intel CPUs suffer Special Register Buffer Data Sampling vulnerability

https://software.intel.com/security-software-guidance/insights/processors-affected-special-register-buffer-data-sampling CVE-2020-0543 2020-06-09 2020-12-28
asterisk -- Remote crash in res_pjsip_diversion asterisk13 13.38.1 asterisk16 16.15.1 asterisk18 18.1.1

The Asterisk project reports:

AST-2020-003: A crash can occur in Asterisk when a SIP message is received that has a History-Info header, which contains a tel-uri.

AST-2020-004: A crash can occur in Asterisk when a SIP 181 response is received that has a Diversion header, which contains a tel-uri.

https://downloads.asterisk.org/pub/security/AST-2020-003.html https://downloads.asterisk.org/pub/security/AST-2020-004.html 2020-12-02 2020-12-22
postsrsd -- Denial of service vulnerability postsrsd 1.10

postsrsd developer reports:

PostSRSd could be tricked into consuming a lot of CPU time with an SRS address that has an excessively long time stamp tag.

CVE-2020-35573 https://github.com/roehling/postsrsd/commit/4733fb11f6bec6524bb8518c5e1a699288c26bac https://github.com/roehling/postsrsd/releases/tag/1.10 2020-12-12 2020-12-21
powerdns -- Various issues in GSS-TSIG support powerdns 4.4.0

PowerDNS developers report:

A remote, unauthenticated attacker can trigger a race condition leading to a crash, or possibly arbitrary code execution, by sending crafted queries with a GSS-TSIG signature.

A remote, unauthenticated attacker can cause a denial of service by sending crafted queries with a GSS-TSIG signature.

A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution by sending crafted queries with a GSS-TSIG signature.

CVE-2020-24696 CVE-2020-24697 CVE-2020-24698 https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2020-06.html 2020-08-27 2020-12-21
vault -- User Enumeration via LDAP auth vault 1.6.1

Vault developers report:

Vault allowed enumeration of users via the LDAP auth method. This vulnerability, was fixed in Vault 1.6.1 and 1.5.6.

An external party reported that they were able to enumerate LDAP users via error messages returned by Vault’s LDAP auth method

CVE-2020-35177 https://discuss.hashicorp.com/t/hcsec-2020-25-vault-s-ldap-auth-method-allows-user-enumeration/18984 2020-12-16 2020-12-17
jasper -- heap overflow vulnerability jasper 2.0.23

JasPer NEWS:

Fix CVE-2020-27828, heap-overflow in cp_create() in jpc_enc.c.

CVE-2020-27828 https://github.com/jasper-software/jasper/blob/master/NEWS https://github.com/jasper-software/jasper/issues/252 2020-12-08 2020-12-13
py-matrix-synapse -- DoS on Federation API py36-matrix-synapse py37-matrix-synapse py38-matrix-synapse py39-matrix-synapse 1.23.1

Matrix developers reports:

A malicious or poorly-implemented homeserver can inject malformed events into a room by specifying a different room id in the path of a /send_join, /send_leave, /invite or /exchange_third_party_invite request. This can lead to a denial of service in which future events will not be correctly sent to other servers over federation. This affects any server which accepts federation requests from untrusted servers.

CVE-2020-26257 https://github.com/matrix-org/synapse/security/advisories/GHSA-hxmp-pqch-c8mm ports/251768 2020-12-09 2020-12-13
p11-kit -- Multiple vulnerabilities p11-kit 0.23.22

The p11-glue project reports:

CVE-2020-29363: Out-of-bounds write in p11_rpc_buffer_get_byte_array_value function
A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.

CVE-2020-29362: Out-of-bounds read in p11_rpc_buffer_get_byte_array function
A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.

CVE-2020-29361: Integer overflow when allocating memory for arrays of attributes and object identifiers
Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.

https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html CVE-2020-29361 CVE-2020-29362 CVE-2020-29363 2020-12-12 2020-12-12
Unbound/NSD -- Denial of service vulnerability unbound 1.13.0 nsd 4.3.4

NLNetLabs reports:

Unbound and NSD when writing the PID file would not check if an existing file was a symlink. This could allow for a local symlink \ attack if an attacker has access to the user Unbound/NSD runs as.

https://nlnetlabs.nl/downloads/unbound/CVE-2020-28935.txt CVE-2020-28935 2020-12-01 2020-12-12
LibreSSL -- NULL pointer dereference libressl 3.2.03.2.3 3.1.5 libressl-devel 3.3.1

The LibreSSL project reports:

Malformed ASN.1 in a certificate revocation list or a timestamp response token can lead to a NULL pointer dereference.

https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.2.3-relnotes.txt 2020-12-08 2020-12-11 2020-12-12
glpi -- Public GLPIKEY can be used to decrypt any data glpi 9.4.6

MITRE Corporation reports:

GLPI before before version 9.4.6 has a vulnerability involving a default encryption key. GLPIKEY is public and is used on every instance. This means anyone can decrypt sensitive data stored using this key. It is possible to change the key before installing GLPI. But on existing instances, data must be reencrypted with the new key. Problem is we can not know which columns or rows in the database are using that; espcially from plugins. Changing the key without updating data would lend in bad password sent from glpi; but storing them again from the UI will work.

https://github.com/glpi-project/glpi/security/advisories/GHSA-j222-j9mf-h6j9 https://github.com/glpi-project/glpi/commit/efd14468c92c4da43333aa9735e65fd20cbc7c6c CVE-2020-5248 2020-01-02 2020-01-02
glpi -- Insecure Direct Object Reference on ajax/getDropdownValue.php glpi 9.5.3

MITRE Corporation reports:

In GLPI before 9.5.3, ajax/getDropdownValue.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any itemType (e.g., Ticket, Users, etc.).

https://github.com/glpi-project/glpi/security/advisories/GHSA-pqfv-4pvr-55r4 CVE-2020-27663 2020-10-22 2020-10-22
glpi -- Insecure Direct Object Reference on ajax/comments.ph glpi 9.5.3

MITRE Corporation reports:

In GLPI before 9.5.3, ajax/comments.php has an Insecure Direct Object Reference (IDOR) vulnerability that allows an attacker to read data from any database table (e.g., glpi_tickets, glpi_users, etc.).

https://github.com/glpi-project/glpi/security/advisories/GHSA-wq38-gwxp-8p5p CVE-2020-27662 2020-10-22 2020-10-22
glpi -- Any CalDAV calendars is read-only for every authenticated user glpi 9.5.0 9.5.3

MITRE Corporation reports:

In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of every other user, even admin ones. This issue is fixed in version 9.5.3. As a workaround, one can remove the caldav.php file to block access to CalDAV server.

https://github.com/glpi-project/glpi/security/advisories/GHSA-qmw3-87hr-5wgx https://github.com/glpi-project/glpi/commit/527280358ec78988ac57e9809d2eb21fcd74caf7 https://github.com/glpi-project/glpi/releases/tag/9.5.3 CVE-2020-26212 2020-10-01 2020-10-01
glpi -- SQL Injection in Search API glpi 9.1 9.5.2

MITRE Corporation reports:

In GLPI before version 9.5.2, there is a SQL Injection in the API's search function. Not only is it possible to break the SQL syntax, but it is also possible to utilise a UNION SELECT query to reflect sensitive information such as the current database version, or database user. The most likely scenario for this vulnerability is with someone who has an API account to the system. The issue is patched in version 9.5.2. A proof-of-concept with technical details is available in the linked advisory.

https://github.com/glpi-project/glpi/commit/3dc4475c56b241ad659cc5c7cb5fb65727409cf0 https://github.com/glpi-project/glpi/security/advisories/GHSA-jwpv-7m4h-5gvc CVE-2020-15226 2020-06-25 2020-06-25
glpi -- leakage issue with knowledge base glpi 9.5.0 9.5.2

MITRE Corporation reports:

In GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ.

https://github.com/glpi-project/glpi/commit/39e25591efddc560e3679ab07e443ee6198705e2 https://github.com/glpi-project/glpi/security/advisories/GHSA-x9hg-j29f-wvvv CVE-2020-15217 2020-06-25 2020-06-25
glpi -- Unauthenticated Stored XSS glpi 0.65 9.5.2

MITRE Corporation reports:

In GLPI before version 9.5.2, the `install/install.php` endpoint insecurely stores user input into the database as `url_base` and `url_base_api`. These settings are referenced throughout the application and allow for vulnerabilities like Cross-Site Scripting and Insecure Redirection Since authentication is not required to perform these changes,anyone could point these fields at malicious websites or form input in a way to trigger XSS. Leveraging JavaScript it's possible to steal cookies, perform actions as the user, etc. The issue is patched in version 9.5.2.

https://github.com/glpi-project/glpi/commit/a8109d4ee970a222faf48cf48fae2d2f06465796 https://github.com/glpi-project/glpi/security/advisories/GHSA-prvh-9m4h-4m79 CVE-2020-15177 2020-06-25 2020-06-25
glpi -- Multiple SQL Injections Stemming From isNameQuoted() glpi 0.68 9.5.2

MITRE Corporation reports:

In GLPI before version 9.5.2, when supplying a back tick in input that gets put into a SQL query,the application does not escape or sanitize allowing for SQL Injection to occur. Leveraging this vulnerability an attacker is able to exfiltrate sensitive information like passwords, reset tokens, personal details, and more. The issue is patched in version 9.5.2

https://github.com/glpi-project/glpi/commit/f021f1f365b4acea5066d3e57c6d22658cf32575 https://github.com/glpi-project/glpi/security/advisories/GHSA-x93w-64x9-58qw CVE-2020-15176 2020-06-25 2020-06-25
glpi -- Unauthenticated File Deletion glpi 0.70 9.5.2

MITRE Corporation reports:

In GLPI before version 9.5.2, the pluginimage.send.php endpoint allows a user to specify an image from a plugin. The parameters can be maliciously crafted to instead delete the .htaccess file for the files directory. Any user becomes able to read all the files and folders contained in /files/. Some of the sensitive information that is compromised are the user sessions, logs, and more. An attacker would be able to get the Administrators session token and use that to authenticate. The issue is patched in version 9.5.2.

https://github.com/glpi-project/glpi/security/advisories/GHSA-rm52-jx9h-rwcp https://github.com/glpi-project/glpi/commit/6ca9a0e77299a755c356d758344a23278df67f65 CVE-2020-15175 2020-06-25 2020-06-25
glpi -- SQL injection for all usages of "Clone" feature glpi 9.5.0 9.5.1

MITRE Corporation reports:

In glpi before 9.5.1, there is a SQL injection for all usages of "Clone" feature. This has been fixed in 9.5.1.

https://github.com/glpi-project/glpi/security/advisories/GHSA-qv6w-68gq-wx2v https://github.com/glpi-project/glpi/commit/a4baa64114eb92fd2adf6056a36e0582324414ba https://github.com/glpi-project/glpi/pull/6684 CVE-2020-15108 2020-06-25 2020-06-25
glpi -- Reflexive XSS in Dropdown menus glpi 0.68.1 9.4.6

MITRE Corporation reports:

In GLPI after 0.68.1 and before 9.4.6, multiple reflexive XSS occur in Dropdown endpoints due to an invalid Content-Type. This has been fixed in version 9.4.6.

https://github.com/glpi-project/glpi/security/advisories/GHSA-3xxh-f5p2-jg3h https://github.com/glpi-project/glpi/commit/5e1c52c5e8a30ceb4e9572964da7ed89ddfb1aaf CVE-2020-11062 2020-03-30 2020-03-30
glpi -- Remote Code Execution (RCE) via the backup functionality glpi 9.4.6

MITRE Corporation reports:

In GLPI before 9.4.6, an attacker can execute system commands by abusing the backup functionality. Theoretically, this vulnerability can be exploited by an attacker without a valid account by using a CSRF. Due to the difficulty of the exploitation, the attack is only conceivable by an account having Maintenance privileges and the right to add WIFI networks. This is fixed in version 9.4.6.

https://github.com/glpi-project/glpi/security/advisories/GHSA-cvvq-3fww-5v6f https://github.com/glpi-project/glpi/commit/ad748d59c94da177a3ed25111c453902396f320c CVE-2020-11060 2020-03-30 2020-03-30
glpi -- multiple related stored XSS vulnerabilities glpi 9.4.6

MITRE Corporation reports:

In GLPI before version 9.4.6 there are multiple related stored XSS vulnerabilities. The package is vulnerable to Stored XSS in the comments of items in the Knowledge base. Adding a comment with content "alert(1)" reproduces the attack. This can be exploited by a user with administrator privileges in the User-Agent field. It can also be exploited by an outside party through the following steps: 1. Create a user with the surname `" onmouseover="alert(document.cookie)` and an empty first name. 2. With this user, create a ticket 3. As an administrator (or other privileged user) open the created ticket 4. On the "last update" field, put your mouse on the name of the user 5. The XSS fires This is fixed in version 9.4.6.

https://github.com/glpi-project/glpi/security/advisories/GHSA-3g3h-rwhr-7385 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/ CVE-2020-11036 2020-03-30 2020-03-30
glpi -- weak csrf tokens glpi 0.83.3 9.4.6

MITRE Corporation reports:

In GLPI after version 0.83.3 and before version 9.4.6, the CSRF tokens are generated using an insecure algorithm. The implementation uses rand and uniqid and MD5 which does not provide secure values. This is fixed in version 9.4.6.

https://github.com/glpi-project/glpi/security/advisories/GHSA-w7q8-58qp-vmpf https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/ CVE-2020-11035 2020-03-30 2020-03-30
glpi -- bypass of the open redirect protection glpi 9.4.6

MITRE Corporation reports:

In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection based which is based on a regexp. This is fixed in version 9.4.6.

https://github.com/glpi-project/glpi/security/advisories/GHSA-gxv6-xq9q-37hg https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/ CVE-2020-11034 2020-03-30 2020-03-30
glpi -- able to read any token through API user endpoint glpi 9.1 9.4.6

MITRE Corporation reports:

In GLPI from version 9.1 and before version 9.4.6, any API user with READ right on User itemtype will have access to full list of users when querying apirest.php/User. The response contains: - All api_tokens which can be used to do privileges escalations or read/update/delete data normally non accessible to the current user. - All personal_tokens can display another users planning. Exploiting this vulnerability requires the api to be enabled, a technician account. It can be mitigated by adding an application token. This is fixed in version 9.4.6.

https://github.com/glpi-project/glpi/security/advisories/GHSA-rf54-3r4w-4h55 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WQMONZRWLWOXMHMYWR7A5Q5JJERPMVC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q4BG2UTINBVV7MTJRXKBQ26GV2UINA6L/ CVE-2020-11033 2020-03-30 2020-03-30
glpi -- SQL injection for all helpdesk instances glpi 9.4.6

MITRE Corporation reports:

In GLPI before version 9.4.6, there is a SQL injection vulnerability for all helpdesk instances. Exploiting this vulnerability requires a technician account. This is fixed in version 9.4.6.

https://github.com/glpi-project/glpi/security/advisories/GHSA-344w-34h9-wwhh CVE-2020-11032 2020-03-30 2020-03-30
glpi -- Improve encryption algorithm glpi 9.5.0

MITRE Corporation reports:

In GLPI before version 9.5.0, the encryption algorithm used is insecure. The security of the data encrypted relies on the password used, if a user sets a weak/predictable password, an attacker could decrypt data. This is fixed in version 9.5.0 by using a more secure encryption library. The library chosen is sodium.

https://github.com/glpi-project/glpi/security/advisories/GHSA-7xwm-4vjr-jvqh https://github.com/glpi-project/glpi/commit/f1ae6c8481e5c19a6f1801a5548cada45702e01a#diff-b5d0ee8c97c7abd7e3fa29b9a27d1780 https://github.com/glpi-project/glpi/commit/f1ae6c8481e5c19a6f1801a5548cada45702e01a#diff-b5d0ee8c97c7abd7e3fa29b9a27d1780 CVE-2020-11031 2020-03-30 2020-03-30
glpi -- Account takeover vulnerability glpi 9.4.4

MITRE Corporation reports:

GLPI through 9.4.3 is prone to account takeover by abusing the ajax/autocompletion.php autocompletion feature. The lack of correct validation leads to recovery of the token generated via the password reset functionality, and thus an authenticated attacker can set an arbitrary password for any user. This vulnerability can be exploited to take control of admin account. This vulnerability could be also abused to obtain other sensitive fields like API keys or password hashes.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14666 https://github.com/glpi-project/glpi/security/advisories/GHSA-47hq-pfrr-jh5q https://www.tarlogic.com/advisories/Tarlogic-2019-GPLI-Account-Takeover.txt CVE-2019-14666 2019-08-05 2019-08-05
cURL -- Multiple vulnerabilities curl 4.07.74.0

The cURL project reports:

Trusting FTP PASV responses (CVE-2020-8284)

FTP wildcard stack overflow (CVE-2020-8285)

Inferior OCSP verification (CVE-2020-8286)

https://curl.se/docs/security.html CVE-2020-8284 CVE-2020-8285 CVE-2020-8286 2020-12-09 2020-12-09
OpenSSL -- NULL pointer de-reference openssl 1.0.2,11.1.1i,1 FreeBSD 12.212.2_2 12.112.1_12 11.411.4_6

The OpenSSL project reports:

EDIPARTYNAME NULL pointer de-reference (High)

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack.

https://www.openssl.org/news/secadv/20201208.txt CVE-2020-1971 SA-20:33.openssl 2020-12-08 2020-12-08 2020-12-15
Gitlab -- Multiple vulnerabilities gitlab-ce 13.6.013.6.2 13.5.013.5.5 12.213.4.9

Gitlab reports:

XSS in Zoom Meeting URL

Limited Information Disclosure in Private Profile

User email exposed via GraphQL endpoint

Group and project membership potentially exposed via GraphQL

Search terms logged in search parameter in rails logs

Un-authorised access to feature flag user list

A specific query on the explore page causes statement timeouts

Exposure of starred projects on private user profiles

Uncontrolled Resource Consumption in any Markdown field using Mermaid

Former group members able to view updates to confidential epics

Update GraphicsMagick dependency

Update GnuPG dependency

Update libxml dependency

https://about.gitlab.com/releases/2020/12/07/security-release-gitlab-13-6-2-released/ CVE-2020-26407 CVE-2020-26408 CVE-2020-13357 CVE-2020-26411 CVE-2020-26409 2020-12-07 2020-12-07
consul -- Fix Consul Connect CA private key configuration consul 1.9.0

Hashicorp reports:

Increase the permissions to read from the /connect/ca/configuration endpoint to operator:write. Previously Connect CA configuration, including the private key, set via this endpoint could be read back by an operator with operator:read privileges.

https://github.com/hashicorp/consul/blob/master/CHANGELOG.md CVE-2020-28053 2020-11-02 2020-12-06
chromium -- multiple vulnerabilities chromium 87.0.4280.88

Chrome Releases reports:

This release contains 8 security fixes, including:

  • [1142331] High CVE-2020-16037: Use after free in clipboard. Reported by Ryoya Tsukasaki on 2020-10-26
  • [1138683] High CVE-2020-16038: Use after free in media. Reported by Khalil Zhani on 2020-10-14
  • [1149177] High CVE-2020-16039: Use after free in extensions. Reported by Anonymous on 2020-11-15
  • [1150649] High CVE-2020-16040: Insufficient data validation in V8. Reported by Lucas Pinheiro, Microsoft Browser Vulnerability Research on 2020-11-19
  • [1151865] Medium CVE-2020-16041: Out of bounds read in networking. Reported by Sergei Glazunov and Mark Brand of Google Project Zero on 2020-11-23
  • [1151890] Medium CVE-2020-16042: Uninitialized Use in V8. Reported by André Bargull on 2020-11-2
CVE-2020-16037 CVE-2020-16038 CVE-2020-16039 CVE-2020-16040 CVE-2020-16041 CVE-2020-16042 https://chromereleases.googleblog.com/2020/12/stable-channel-update-for-desktop.html 2020-12-02 2020-12-05
gitea -- multiple vulnerabilities gitea 1.13.0

The Gitea Team reports for release 1.13.0:

  • Add Allow-/Block-List for Migrate and Mirrors
  • Prevent git operations for inactive users
  • Disallow urlencoded new lines in git protocol paths if there is a port
  • Mitigate Security vulnerability in the git hook feature
  • Disable DSA ssh keys by default
  • Set TLS minimum version to 1.2
  • Use argon as default password hash algorithm
  • Escape failed highlighted files
https://github.com/go-gitea/gitea/releases/tag/v1.13.0 ports/251577 2020-12-01 2020-12-04
FreeBSD -- Multiple vulnerabilities in rtsold FreeBSD 12.212.2_1 12.112.1_11 11.411.4_5

Problem Description:

Two bugs exist in rtsold(8)'s RDNSS and DNSSL option handling. First, rtsold(8) failed to perform sufficient bounds checking on the extent of the option. In particular, it does not verify that the option does not extend past the end of the received packet before processing its contents. The kernel currently ignores such malformed packets but still passes them to userspace programs.

Second, when processing a DNSSL option, rtsold(8) decodes domain name labels per an encoding specified in RFC 1035 in which the first octet of each label contains the label's length. rtsold(8) did not validate label lengths correctly and could overflow the destination buffer.

Impact:

It is believed that these bugs could be exploited to gain remote code execution within the rtsold(8) daemon, which runs as root. Note that rtsold(8) only processes messages received from hosts attached to the same physical link as the interface(s) on which rtsold(8) is listening.

In FreeBSD 12.2 rtsold(8) runs in a Capsicum sandbox, limiting the scope of a compromised rtsold(8) process.

CVE-2020-25577 SA-20:32.rtsold 2020-12-01 2020-12-02
FreeBSD -- ICMPv6 use-after-free in error message handling FreeBSD-kernel 12.212.2_1 12.112.1_11 11.411.4_5

Problem Description:

When an ICMPv6 error message is received, the FreeBSD ICMPv6 stack may extract information from the message to hand to upper-layer protocols. As a part of this operation, it may parse IPv6 header options from a packet embedded in the ICMPv6 message.

The handler for a routing option caches a pointer into the packet buffer holding the ICMPv6 message. However, when processing subsequent options the packet buffer may be freed, rendering the cached pointer invalid. The network stack may later dereference the pointer, potentially triggering a use-after-free.

Impact:

A remote host may be able to trigger a read of freed kernel memory. This may trigger a kernel panic if the address had been unmapped.

CVE-2020-7469 SA-20:31.icmp6 2020-12-01 2020-12-02
xorg-server -- Multiple input validation failures in X server XKB extension xorg-server 1.20.9_1,1 xephyr 1.20.9_1,1 xorg-vfbserver 1.20.9_1,1 xorg-nestserver 1.20.9_1,1 xwayland 1.20.9_2,1 xorg-dmx 1.20.9_1,1

The X.org project reports:

These issues can lead to privileges elevations for authorized clients on systems where the X server is running privileged.

Insufficient checks on the lengths of the XkbSetMap request can lead to out of bounds memory accesses in the X server.

Insufficient checks on input of the XkbSetDeviceInfo request can lead to a buffer overflow on the head in the X server.

https://lists.x.org/archives/xorg-announce/2020-December/003066.html CVE-2020-14360 CVE-2020-25712 2020-12-01 2020-12-01
nomad -- multiple vulnerabilities nomad 0.12.6

The HashiCorp team reports:

  • artifact: Fixed a bug where interpolation can be used in the artifact destination field to write artifact payloads outside the allocation directory.
  • template: Fixed a bug where interpolation can be used in the template source and destination fields to read or write files outside the allocation directory even when disable_file_sandbox was set to false (the default).
  • template: Fixed a bug where the disable_file_sandbox configuration was only respected for the template file function and not the template source and destination fields.
https://github.com/hashicorp/nomad/blob/master/CHANGELOG.md CVE-2020-27195 2020-10-21 2020-11-27
gitea -- multiple vulnerabilities gitea 1.12.6

The Gitea Team reports for release 1.12.6:

  • Prevent git operations for inactive users
  • Disallow urlencoded new lines in git protocol paths if there is a port
Disallow urlencoded new lines in git protocol paths if there is a port ports/251296 2020-11-16 2020-11-21
Node.js -- November 2020 Security Releases node 15.2.1 node14 14.15.1 node12 12.19.1

Node.js reports:

Updates are now available for v12.x, v14.x and v15.x Node.js release lines for the following issues.

Denial of Service through DNS request (CVE-2020-8277)

A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of service by getting the application to resolve a DNS record with a larger number of responses.

https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/ CVE-2020-8277 2020-11-16 2020-11-21
mutt -- authentication credentials being sent over an unencrypted connection mutt 2.0.2

Kevin J. McCarthy reports:

Mutt had incorrect error handling when initially connecting to an IMAP server, which could result in an attempt to authenticate without enabling TLS.

CVE-2020-28896 https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a 2020-11-20 2020-11-20
mozjpeg -- heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file mozjpeg 4.0.0

NIST reports:

  • Heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
CVE-2020-13790 https://nvd.nist.gov/vuln/detail/CVE-2020-13790 2020-06-03 2020-10-10
libjpeg-turbo -- Issue in the PPM reader causing a buffer overrun in cjpeg, TJBench, or the tjLoadImage() function. libjpeg-turbo 2.0.4

libjpeg-turbo releases reports:

This release fixes the following security issue:

  • Heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
CVE-2020-13790 https://nvd.nist.gov/vuln/detail/CVE-2020-13790 2020-06-03 2020-10-10
mantis -- multiple vulnerabilities mantis-php72 mantis-php73 mantis-php74 mantis-php80 2.24.3,1

Mantis 2.24.3 release reports:

This release fixes 3 security issues:

  • 0027039: CVE-2020-25781: Access to private bug note attachments
  • 0027275: CVE-2020-25288: HTML Injection on bug_update_page.php
  • 0027304: CVE-2020-25830: HTML Injection in bug_actiongroup_page.php
ports/251141 CVE-2020-25781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25781 CVE-2020-25288 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25288 CVE-2020-25830 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25830 2020-09-13 2020-11-14 2020-11-15
go -- math/big: panic during recursive division of very large numbers; cmd/go: arbitrary code execution at build time through cgo go 1.15.5,1

The Go project reports:

A number of math/big.Int methods (Div, Exp, DivMod, Quo, Rem, QuoRem, Mod, ModInverse, ModSqrt, Jacobi, and GCD) can panic when provided crafted large inputs. For the panic to happen, the divisor or modulo argument must be larger than 3168 bits (on 32-bit architectures) or 6336 bits (on 64-bit architectures). Multiple math/big.Rat methods are similarly affected.

The go command may execute arbitrary code at build time when cgo is in use. This may occur when running go get on a malicious package, or any other command that builds untrusted code. This can be caused by a malicious gcc flags specified via a #cgo directive.

The go command may execute arbitrary code at build time when cgo is in use. This may occur when running go get on a malicious package, or any other command that builds untrusted code. This can be caused by malicious unquoted symbol names.

CVE-2020-28362 https://github.com/golang/go/issues/42552 CVE-2020-28367 https://github.com/golang/go/issues/42556 CVE-2020-28366 https://github.com/golang/go/issues/42559 2020-11-09 2020-11-12
salt -- multiple vulnerabilities py36-salt py37-salt py38-salt 30023002.1

SaltStack reports multiple security vulnerabilities in Salt 3002:

  • CVE-2020-16846: Prevent shell injections in netapi ssh client.
  • CVE-2020-17490: Prevent creating world readable private keys with the tls execution module.
  • CVE-2020-25592: Properly validate eauth credentials and tokens along with their ACLs. Prior to this change eauth was not properly validated when calling Salt ssh via the salt-api. Any value for 'eauth' or 'token' would allow a user to bypass authentication and make calls to Salt ssh.
https://docs.saltstack.com/en/latest/topics/releases/3002.1.html CVE-2020-16846 https://nvd.nist.gov/vuln/detail/CVE-2020-16846 CVE-2020-17490 https://nvd.nist.gov/vuln/detail/CVE-2020-17490 CVE-2020-25592 https://nvd.nist.gov/vuln/detail/CVE-2020-25592 2020-11-06 2020-11-12
Apache OpenOffice -- Unrestricted actions leads to arbitrary code execution in crafted documents apache-openoffice 4.1.8 apache-openoffice-devel 4.2.1602022694,4

The Apache Openofffice project reports:

CVE-2020-13958 Unrestricted actions leads to arbitrary code execution in crafted documents

Description

A vulnerability in Apache OpenOffice scripting events allows an attacker to construct documents containing hyperlinks pointing to an executable on the target users file system. These hyperlinks can be triggered unconditionally. In fixed versions no internal protocol may be called from the document event handler and other hyperlinks require a control-click.

Severity: Low

There are no known exploits of this vulnerability.
A proof-of-concept demonstration exists.

Thanks to the reporter for discovering this issue.

Acknowledgments

The Apache OpenOffice Security Team would like to thank Imre Rad for discovering and reporting this attack vector.

https://www.openoffice.org/security/cves/CVE-2020-13958.html CVE-2020-13958 2020-04-28 2020-11-10
raptor2 -- buffer overflow raptor2 2.0.15_16

CVE MITRE reports:

raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18926 https://github.com/LibreOffice/core/blob/master/external/redland/raptor/0001-Calcualte-max-nspace-declarations-correctly-for-XML-.patch.1 CVE-2017-18926 2017-04-16 2020-11-09
jupyter notebook -- open redirect vulnerability py37-notebook py38-notebook py39-notebook 6.1.5

Jupyter reports:

6.1.5 is a security release, fixing one vulnerability: Fix open redirect vulnerability GHSA-c7vm-f5p4-8fqh (CVE to be assigned)

https://jupyter-notebook.readthedocs.io/en/stable/changelog.html#release-6-1-5 https://github.com/jupyter/notebook/blob/6.1.5/docs/source/changelog.rst 2020-10-15 2020-11-08
asterisk -- Outbound INVITE loop on challenge with different nonce asterisk13 13.37.1 asterisk16 16.14.1 asterisk18 18.0.1

The Asterisk project reports:

If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur.

https://downloads.asterisk.org/pub/security/AST-2020-002.html 2020-11-05 2020-11-05
asterisk -- Remote crash in res_pjsip_session asterisk13 13.37.1 asterisk16 16.14.1 asterisk18 18.0.1

The Asterisk project reports:

Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending upon some off nominal circumstances, and timing it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects were de-referenced, or accessed next by the initial creation thread.

https://downloads.asterisk.org/pub/security/AST-2020-001.html 2020-11-05 2020-11-05
chromium -- multiple vulnerabilities chromium 86.0.4240.183

Chrome Releases reports:

This release contains 10 security fixes, including:

  • [1138911] High CVE-2020-16004: Use after free in user interface. Reported by Leecraso and Guang Gong of 360 Alpha Lab working with 360 BugCloud on 2020-10-15
  • [1139398] High CVE-2020-16005: Insufficient policy enforcement in ANGLE. Reported by Jaehun Jeong (@n3sk) of Theori on 2020-10-16
  • [1133527] High CVE-2020-16006: Inappropriate implementation in V8. Reported by Bill Parks on 2020-09-29
  • [1125018] High CVE-2020-16007: Insufficient data validation in installer. Reported by Abdelhamid Naceri (halov) on 2020-09-04
  • [1134107] High CVE-2020-16008: Stack buffer overflow in WebRTC. Reported by Tolya Korniltsev on 2020-10-01
  • [1143772] High CVE-2020-16009: Inappropriate implementation in V8. Reported by Clement Lecigne of Google's Threat Analysis Group and Samuel Groß of Google Project Zero on 2020-10-29
  • [1144489] High CVE-2020-16011: Heap buffer overflow in UI on Windows. Reported by Sergei Glazunov of Google Project Zero on 2020-11-01

There are reports that an exploit for CVE-2020-16009 exists in the wild.

CVE-2020-16004 CVE-2020-16005 CVE-2020-16006 CVE-2020-16007 CVE-2020-16008 CVE-2020-16009 CVE-2020-16011 https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop.html 2020-11-02 2020-11-03
Gitlab -- Multiple vulnerabilities gitlab-ce 13.5.013.5.2 13.4.013.4.5 8.8.913.3.9

Gitlab reports:

Path Traversal in LFS Upload

Path traversal allows saving packages in arbitrary location

Kubernetes agent API leaks private repos

Terraform state deletion API exposes object storage URL

Stored-XSS in error message of build-dependencies

Git credentials persisted on disk

Potential Denial of service via container registry

Info leak when group is transferred from private to public group

Limited File Disclosure Via Multipart Bypass

Unauthorized user is able to access scheduled pipeline variables and values

CSRF in runner administration page allows an attacker to pause/resume runners

Regex backtracking attack in path parsing of Advanced Search result

Bypass of required CODEOWNERS approval

SAST CiConfiguration information visible without permissions

https://about.gitlab.com/releases/2020/11/02/security-release-gitlab-13-5-2-released/ CVE-2020-13355 CVE-2020-26405 CVE-2020-13358 CVE-2020-13359 CVE-2020-13340 CVE-2020-13353 CVE-2020-13354 CVE-2020-13352 CVE-2020-13356 CVE-2020-13351 CVE-2020-13350 CVE-2020-13349 CVE-2020-13348 2020-11-02 2020-11-02
wordpress -- multiple issues wordpress fr-wordpress 5.5.2,1 de-wordpress zh_CN-wordpress zh_TW-wordpress ja-wordpress ru-wordpress 5.5.2

wordpress developers reports:

Ten security issues affect WordPress versions 5.5.1 and earlier. If you havent yet updated to 5.5, all WordPress versions since 3.7 have also been updated to fix the following security issues: -Props to Alex Concha of the WordPress Security Team for their work in hardening deserialization requests. -Props to David Binovec on a fix to disable spam embeds from disabled sites on a multisite network. -Thanks to Marc Montas from Sucuri for reporting an issue that could lead to XSS from global variables. -Thanks to Justin Tran who reported an issue surrounding privilege escalation in XML-RPC. He also found and disclosed an issue around privilege escalation around post commenting via XML-RPC. -Props to Omar Ganiev who reported a method where a DoS attack could lead to RCE. -Thanks to Karim El Ouerghemmi from RIPS who disclosed a method to store XSS in post slugs. -Thanks to Slavco for reporting, and confirmation from Karim El Ouerghemmi, a method to bypass protected meta that could lead to arbitrary file deletion.

https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/ 2020-10-29 2020-11-02
samba -- Multiple Vulnerabilities samba410 4.10.18 samba411 4.11.15 samba412 4.12.9 samba413 4.13.1

The Samba Team reports:

  • CVE-2020-14318: Missing handle permissions check in SMB1/2/3 ChangeNotify
  • CVE-2020-14323: Unprivileged user can crash winbind
  • CVE-2020-14383: An authenticated user can crash the DCE/RPC DNS with easily crafted records
https://www.samba.org/samba/security/CVE-2020-14318.html https://www.samba.org/samba/security/CVE-2020-14323.html https://www.samba.org/samba/security/CVE-2020-14383.html CVE-2020-14318 CVE-2020-14323 CVE-2020-14383 2020-10-29 2020-10-30
tmux -- stack overflow in CSI parsing tmux 3.1c

Nicholas Marriott reports:

tmux has a stack overflow in CSI parsing.

https://groups.google.com/g/tmux-users/c/DGfmsD9CM00/m/Six6uZG0AQAJ https://marc.info/?l=openbsd-announce&m=160399126725142&w=2 2020-10-29 2020-10-30
motion -- Denial of Service motion 3.24.3.1

cxsecurity.com reports:

A Denial of Service condition in Motion-Project Motion 3.2 through 4.3.1 allows remote unauthenticated users to cause a webu.c segmentation fault and kill the main process via a crafted HTTP request

https://cve-search.iicrai.org/cve/CVE-2020-26566 2020-10-05 2020-10-28
freetype2 -- heap buffer overlfow freetype2 2.10.4

The freetype project reports:

A heap buffer overflow has been found in the handling of embedded PNG bitmaps, introduced in FreeType version 2.6.

https://sourceforge.net/projects/freetype/files/freetype2/2.10.4/ CVE-2020-15999 2020-10-20 2020-10-22
MySQL -- Multiple vulnerabilities mariadb103-server 10.3.26 mariadb104-server 10.4.16 mariadb105-server 10.5.7 mysql56-server 5.6.50 mysql57-server 5.7.32 mysql80-server 8.0.22

Oracle reports:

This Critical Patch Update contains 48 new security patches for Oracle MySQL.

The highest CVSS v3.1 Base Score of vulnerabilities affecting Oracle MySQL is 8.

NOTE: MariaDB only contains CVE-2020-14812 CVE-2020-14765 CVE-2020-14776 and CVE-2020-14789

https://www.oracle.com/security-alerts/cpuoct2020.html#AppendixMSQL CVE-2020-14878 CVE-2020-14828 CVE-2020-14775 CVE-2020-14765 CVE-2020-14769 CVE-2020-14830 CVE-2020-14836 CVE-2020-14846 CVE-2020-14800 CVE-2020-14827 CVE-2020-14760 CVE-2020-14776 CVE-2020-14821 CVE-2020-14829 CVE-2020-14848 CVE-2020-14852 CVE-2020-14814 CVE-2020-14789 CVE-2020-14804 CVE-2020-14812 CVE-2020-14773 CVE-2020-14777 CVE-2020-14785 CVE-2020-14793 CVE-2020-14794 CVE-2020-14809 CVE-2020-14837 CVE-2020-14839 CVE-2020-14845 CVE-2020-14861 CVE-2020-14866 CVE-2020-14868 CVE-2020-14888 CVE-2020-14891 CVE-2020-14893 CVE-2020-14786 CVE-2020-14790 CVE-2020-14844 CVE-2020-14799 CVE-2020-14869 CVE-2020-14672 CVE-2020-14870 CVE-2020-14867 CVE-2020-14873 CVE-2020-14838 CVE-2020-14860 CVE-2020-14791 CVE-2020-14771 2020-10-20 2020-10-21 2020-11-07
chromium -- multiple vulnerabilities chromium 86.0.4240.111

Chrome Releases reports:

This release includes 5 security fixes:

  • [1125337] High CVE-2020-16000: Inappropriate implementation in Blink. Reported by amaebi_jp on 2020-09-06
  • [1135018] High CVE-2020-16001: Use after free in media. Reported by Khalil Zhani on 2020-10-05
  • [1137630] High CVE-2020-16002: Use after free in PDFium. Reported by Weipeng Jiang (@Krace) from Codesafe Team of Legendsec at Qi'anxin Group on 2020-10-13
  • [1139963] High CVE-2020-15999: Heap buffer overflow in Freetype. Reported by Sergei Glazunov of Google Project Zero on 2020-10-19
  • [1134960] Medium CVE-2020-16003: Use after free in printing. Reported by Khalil Zhani on 2020-10-04
CVE-2020-15999 CVE-2020-16000 CVE-2020-16001 CVE-2020-16002 CVE-2020-16003 https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html 2020-10-20 2020-10-21
powerdns-recursor -- cache pollution powerdns-recursor 4.3.04.3.5 4.2.04.2.5 4.1.04.1.18

PowerDNS Team reports:

CVE-2020-25829: An issue has been found in PowerDNS Recursor where a remote attacker can cause the cached records for a given name to be updated to the ‘Bogus’ DNSSEC validation state, instead of their actual DNSSEC ‘Secure’ state, via a DNS ANY query. This results in a denial of service for installations that always validate (dnssec=validate) and for clients requesting validation when on-demand validation is enabled (dnssec=process).

https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html CVE-2020-25829 2020-10-13 2020-10-14
MariaDB -- Undisclosed vulnerability mariadb103-client 10.3.25 mariadb103-server 10.3.25 mariadb104-client 10.4.15 mariadb104-server 10.4.15 mariadb105-client 10.5.6 mariadb105-server 10.5.6

The MariaDB project reports:

Details of this vulnerability have not yet been disclosed

https://mariadb.com/kb/en/mariadb-1056-release-notes/ https://mariadb.com/kb/en/mariadb-10415-release-notes/ https://mariadb.com/kb/en/mariadb-10325-release-notes/ CVE-2020-15180 2020-10-07 2020-10-18
py-matrix-synapse -- XSS vulnerability py36-matrix-synapse py37-matrix-synapse py38-matrix-synapse py39-matrix-synapse 1.21.0

Matrix developers reports:

The fallback authentication endpoint served via Synapse were vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains.

CVE-2020-26891 https://github.com/matrix-org/synapse/security/advisories/GHSA-3x8c-fmpc-5rmq https://github.com/matrix-org/synapse/releases/tag/v1.21.2 ports/249948 2020-10-01 2020-10-17
drupal -- Multiple Vulnerabilities drupal7 7.72

Drupal Security Team reports:

The Drupal AJAX API does not disable JSONP by default, which can lead to cross-site scripting.

https://www.drupal.org/sa-core-2020-007 2020-09-16 2020-10-17
Flash Player -- arbitrary code execution linux-flashplayer 32.0.0.445

Adobe reports:

  • This update resolves a NULL pointer dereference vulnerability that could lead to arbitrary code execution (CVE-2020-9746).
CVE-2020-9746 https://helpx.adobe.com/security/products/flash-player/apsb20-58.html 2020-10-13 2020-10-13
Rails -- Possible XSS vulnerability rubygem-actionpack60 6.0.3.4

Ruby on Rails blog:

Rails version 6.0.3.4 has been released! This version is a security release and addresses one possible XSS attack vector in Actionable Exceptions.

https://weblog.rubyonrails.org/2020/10/7/Rails-6-0-3-4-has-been-released/ CVE-2020-8264 2020-10-07 2020-10-10
Payara -- path trasversal flaw via either loc/con parameters in Eclipse Mojarra payara 5.201

Payara Releases reports:

The following is a list of tracked Common Vulnerabilities and Exposures that have been reported and analyzed, which can or have impacted Payara Server across releases:

  • CVE-2020-6950 Eclipse Mojarra vulnerable to path trasversal flaw via either loc/con parameters
CVE-2020-6950 https://docs.payara.fish/community/docs/5.2020.4/security/security-fix-list.html 2020-01-13 2020-10-06
Payara -- A Polymorphic Typing issue in FasterXML jackson-databind payara 5.193

Payara Releases reports:

The following is a list of tracked Common Vulnerabilities and Exposures that have been reported and analyzed, which can or have impacted Payara Server across releases:

  • CVE-2019-12086 A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9
CVE-2019-12086 https://docs.payara.fish/community/docs/5.193/security/security-fix-list.html 2019-05-17 2020-10-06
payara -- multiple vulnerabilities payara 5.191

Payara Releases reports:

The following is a list of tracked Common Vulnerabilities and Exposures that have been reported and analyzed, which can or have impacted Payara Server across releases:

  • CVE-2018-14721 FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks
  • CVE-2018-14720 FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct external XML entity (XXE) attacks
  • CVE-2018-14719 FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code
  • CVE-2018-14718 FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code
  • CVE-2018-14371 Eclipse Mojarra before 2.3.7 is affected by Directory Traversal via the loc parameter
CVE-2018-14721 CVE-2018-14720 CVE-2018-14719 CVE-2018-14718 CVE-2018-14371 https://docs.payara.fish/community/docs/5.191/security/security-fix-list.html 2019-02-01 2020-10-06
zeek -- Vulnerability due to memory leak zeek 3.0.11

Jon Siwek of Corelight reports:

This release fixes the following security issue:

  • A memory leak in multipart MIME code has potential for remote exploitation and cause for Denial of Service via resource exhaustion.
https://github.com/zeek/zeek/releases/tag/v3.0.11 2020-09-29 2020-10-07
chromium -- multiple vulnerabilities chromium 86.0.4240.75

Chrome releases reports:

This release contains 35 security fixes, including:

  • [1127322] Critical CVE-2020-15967: Use after free in payments. Reported by Man Yue Mo of GitHub Security Lab on 2020-09-11
  • [1126424] High CVE-2020-15968: Use after free in Blink. Reported by Anonymous on 2020-09-09
  • [1124659] High CVE-2020-15969: Use after free in WebRTC. Reported by Anonymous on 2020-09-03
  • [1108299] High CVE-2020-15970: Use after free in NFC. Reported by Man Yue Mo of GitHub Security Lab on 2020-07-22
  • [1114062] High CVE-2020-15971: Use after free in printing. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2020-08-07
  • [1115901] High CVE-2020-15972: Use after free in audio. Reported by Anonymous on 2020-08-13
  • [1133671] High CVE-2020-15990: Use after free in autofill. Reported by Rong Jian and Guang Gong of Alpha Lab, Qihoo 360 on 2020-09-30
  • [1133688] High CVE-2020-15991: Use after free in password manager. Reported by Rong Jian and Guang Gong of Alpha Lab, Qihoo 360 on 2020-09-30
  • [1106890] Medium CVE-2020-15973: Insufficient policy enforcement in extensions. Reported by David Erceg on 2020-07-17
  • [1104103] Medium CVE-2020-15974: Integer overflow in Blink. Reported by Juno Im (junorouse) of Theori on 2020-07-10
  • [1110800] Medium CVE-2020-15975: Integer overflow in SwiftShader. Reported by Anonymous on 2020-07-29
  • [1123522] Medium CVE-2020-15976: Use after free in WebXR. Reported by YoungJoo Lee (@ashuu_lee) of Raon Whitehat on 2020-08-31
  • [1083278] Medium CVE-2020-6557: Inappropriate implementation in networking. Reported by Matthias Gierlings and Marcus Brinkmann (NDS Ruhr-University Bochum) on 2020-05-15
  • [1097724] Medium CVE-2020-15977: Insufficient data validation in dialogs. Reported by Narendra Bhati (@imnarendrabhati) on 2020-06-22
  • [1116280] Medium CVE-2020-15978: Insufficient data validation in navigation. Reported by Luan Herrera (@lbherrera_) on 2020-08-14
  • [1127319] Medium CVE-2020-15979: Inappropriate implementation in V8. Reported by Avihay Cohen (@SeraphicAlgorithms) on 2020-09-11
  • [1092453] Medium CVE-2020-15980: Insufficient policy enforcement in Intents. Reported by Yongke Wang (@Rudykewang) and Aryb1n (@aryb1n) of Tencent Security Xuanwu Lab on 2020-06-08
  • [1123023] Medium CVE-2020-15981: Out of bounds read in audio. Reported by Christoph Guttandin on 2020-08-28
  • [1039882] Medium CVE-2020-15982: Side-channel information leakage in cache. Reported by Luan Herrera (@lbherrera_) on 2020-01-07
  • [1076786] Medium CVE-2020-15983: Insufficient data validation in webUI. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2020-04-30
  • [1080395] Medium CVE-2020-15984: Insufficient policy enforcement in Omnibox. Reported by Rayyan Bijoora on 2020-05-07
  • [1099276] Medium CVE-2020-15985: Inappropriate implementation in Blink. Reported by Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research on 2020-06-25
  • [1100247] Medium CVE-2020-15986: Integer overflow in media. Reported by Mark Brand of Google Project Zero on 2020-06-29
  • [1127774] Medium CVE-2020-15987: Use after free in WebRTC. Reported by Philipp Hancke on 2020-09-14
  • [1110195] Medium CVE-2020-15992: Insufficient policy enforcement in networking. Reported by Alison Huffman, Microsoft Browser Vulnerability Research on 2020-07-28
  • [1092518] Low CVE-2020-15988: Insufficient policy enforcement in downloads. Reported by Samuel Attard on 2020-06-08
  • [1108351] Low CVE-2020-15989: Uninitialized Use in PDFium. Reported by Gareth Evans (Microsoft) on 2020-07-22
CVE-2020-6557 CVE-2020-15967 CVE-2020-15968 CVE-2020-15969 CVE-2020-15970 CVE-2020-15971 CVE-2020-15972 CVE-2020-15973 CVE-2020-15974 CVE-2020-15975 CVE-2020-15976 CVE-2020-15977 CVE-2020-15978 CVE-2020-15979 CVE-2020-15980 CVE-2020-15981 CVE-2020-15982 CVE-2020-15983 CVE-2020-15984 CVE-2020-15985 CVE-2020-15986 CVE-2020-15987 CVE-2020-15988 CVE-2020-15989 CVE-2020-15990 CVE-2020-15991 CVE-2020-15992 https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html 2020-10-06 2020-10-07
libexif -- multiple vulnerabilities libexif 0.6.22

Release notes:

Lots of fixes exposed by fuzzers like AFL, ClusterFuzz, OSSFuzz and others:

CVE-2016-6328: fixed integer overflow when parsing maker notes

CVE-2017-7544: fixed buffer overread

CVE-2018-20030: Fix for recursion DoS

CVE-2019-9278: replaced integer overflow checks the compiler could optimize away by safer constructs

CVE-2020-0093: read overflow

CVE-2020-12767: fixed division by zero

CVE-2020-13112: Various buffer overread fixes due to integer overflows in maker notes

CVE-2020-13113: Potential use of uninitialized memory

CVE-2020-13114: Time consumption DoS when parsing canon array markers

https://github.com/libexif/libexif/blob/master/NEWS CVE-2016-6328 CVE-2017-7544 CVE-2018-20030 CVE-2019-9278 CVE-2020-0093 CVE-2020-12767 CVE-2020-13112 CVE-2020-13113 CVE-2020-13114 2020-05-18 2020-10-05
kdeconnect -- packet manipulation can be exploited in a Denial of Service attack kdeconnect-kde 20.08.1

Albert Astals Cid reports:

KDE Project Security Advisory

Title KDE Connect: packet manipulation can be exploited in a Denial of Service attack
Risk Rating Important
CVE CVE-2020-26164
Versions kdeconnect <= 20.08.1
Author Albert Vaca Cintora <albertvaka@gmail.com>
Date 2 October 2020

Overview

An attacker on your local network could send maliciously crafted packets to other hosts running kdeconnect on the network, causing them to use large amounts of CPU, memory or network connections, which could be used in a Denial of Service attack within the network.

Impact

Computers that run kdeconnect are susceptible to DoS attacks from the local network.

Workaround

We advise you to stop KDE Connect when on untrusted networks like those on airports or conferences.

Since kdeconnect is dbus activated it is relatively hard to make sure it stays stopped so the brute force approach is to uninstall the kdeconnect package from your system and then run

 	      kquitapp5 kdeconnectd
 	  

Just install the package again once you're back in a trusted network.

Solution

KDE Connect 20.08.2 patches several code paths that could result in a DoS.

You can apply these patches on top of 20.08.1:

  • https://invent.kde.org/network/kdeconnect-kde/-/commit/f183b5447bad47655c21af87214579f03bf3a163
  • https://invent.kde.org/network/kdeconnect-kde/-/commit/b279c52101d3f7cc30a26086d58de0b5f1c547fa
  • https://invent.kde.org/network/kdeconnect-kde/-/commit/d35b88c1b25fe13715f9170f18674d476ca9acdc
  • https://invent.kde.org/network/kdeconnect-kde/-/commit/b496e66899e5bc9547b6537a7f44ab44dd0aaf38
  • https://invent.kde.org/network/kdeconnect-kde/-/commit/5310eae85dbdf92fba30375238a2481f2e34943e
  • https://invent.kde.org/network/kdeconnect-kde/-/commit/721ba9faafb79aac73973410ee1dd3624ded97a5
  • https://invent.kde.org/network/kdeconnect-kde/-/commit/ae58b9dec49c809b85b5404cee17946116f8a706
  • https://invent.kde.org/network/kdeconnect-kde/-/commit/66c768aa9e7fba30b119c8b801efd49ed1270b0a
  • https://invent.kde.org/network/kdeconnect-kde/-/commit/85b691e40f525e22ca5cc4ebe79c361d71d7dc05
  • https://invent.kde.org/network/kdeconnect-kde/-/commit/48180b46552d40729a36b7431e97bbe2b5379306

Credits

Thanks Matthias Gerstner and the openSUSE security team for reporting the issue.

Thanks to Aleix Pol, Nicolas Fella and Albert Vaca Cintora for the patches.

https://kde.org/info/security/advisory-20201002-1.txt CVE-2020-26164 2020-10-02 2020-10-04
upnp -- denial of service (crash) upnp 1.12.1_1,1

CVE mitre reports:

Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13848 https://nvd.nist.gov/vuln/detail/CVE-2020-13848 https://github.com/pupnp/pupnp/issues/177 https://github.com/pupnp/pupnp/commit/c805c1de1141cb22f74c0d94dd5664bda37398e0 CVE-2020-13848 2020-06-04 2020-10-03
Gitlab -- multiple vulnerabilities gitlab-ce 13.4.013.4.2 13.3.013.3.7 7.1213.2.10

Gitlab reports:

Potential Denial Of Service Via Update Release Links API

Insecure Storage of Session Key In Redis

Improper Access Expiration Date Validation

Cross-Site Scripting in Multiple Pages

Unauthorized Users Can View Custom Project Template

Cross-Site Scripting in SVG Image Preview

Incomplete Handling in Account Deletion

Insufficient Rate Limiting at Re-Sending Confirmation Email

Improper Type Check in GraphQL

To-dos Are Not Redacted When Membership Changes

Guest users can modify confidentiality attribute

Command injection on runner host

Insecure Runner Configuration in Kubernetes Environments

https://about.gitlab.com/releases/2020/10/01/security-release-13-4-2-release/ CVE-2020-13333 CVE-2020-13332 CVE-2020-13335 CVE-2020-13334 CVE-2020-13327 2020-10-01 2020-10-02
tt-rss -- multiple vulnerabilities tt-rss g20200919

tt-rss project reports:

The cached_url feature mishandles JavaScript inside an SVG document.

imgproxy in plugins/af_proxy_http/init.php mishandles $_REQUEST["url"] in an error message.

It does not validate all URLs before requesting them.

Allows remote attackers to execute arbitrary PHP code via a crafted plural forms header.

https://community.tt-rss.org/t/heads-up-several-vulnerabilities-fixed/3799 https://community.tt-rss.org/t/replace-php-gettext/2889 CVE-2020-25789 CVE-2020-25788 CVE-2020-25787 CVE-2016-6175 2020-09-15 2020-09-20
Apache Ant leaks sensitive information via the java.io.tmpdir apache-ant 1.11.10.8

Apache reports:

Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.

https://issues.apache.org/jira/browse/RAT-269?page=com.atlassian.jira.plugin.system.issuetabpanels%3Aall-tabpanel CVE-2020-1945 2020-05-14 2020-09-28
powerdns -- Leaking uninitialised memory through crafted zone records powerdns 4.3.04.3.1 4.2.04.2.3 4.1.04.1.14

PowerDNS Team reports

CVE-2020-17482: An issue has been found in PowerDNS Authoritative Server before 4.3.1 where an authorized user with the ability to insert crafted records into a zone might be able to leak the content of uninitialized memory. Such a user could be a customer inserting data via a control panel, or somebody with access to the REST API. Crafted records cannot be inserted via AXFR.

https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2020-05.html CVE-2020-17482 2020-09-22 2020-09-24
chromium -- multiple vulnerabilities chromium 85.0.4183.121

Chrome Releases reports:

This release fixes 10 security issues, including:

  • [1100136] High CVE-2020-15960: Out of bounds read in storage. Reported by Anonymous on 2020-06-28
  • [1114636] High CVE-2020-15961: Insufficient policy enforcement in extensions. Reported by David Erceg on 2020-08-10
  • [1121836] High CVE-2020-15962: Insufficient policy enforcement in serial. Reported by Leecraso and Guang Gong of 360 Alpha Lab working with 360 BugCloud on 2020-08-26
  • [1113558] High CVE-2020-15963: Insufficient policy enforcement in extensions. Reported by David Erceg on 2020-08-06
  • [1126249] High CVE-2020-15965: Out of bounds write in V8. Reported by Lucas Pinheiro, Microsoft Browser Vulnerability Research on 2020-09-08
  • [1113565] Medium CVE-2020-15966: Insufficient policy enforcement in extensions. Reported by David Erceg on 2020-08-06
  • [1121414] Low CVE-2020-15964: Insufficient data validation in media. Reported by Woojin Oh(@pwn_expoit) of STEALIEN on 2020-08-25
CVE-2020-15960 CVE-2020-15961 CVE-2020-15962 CVE-2020-15963 CVE-2020-15964 CVE-2020-15965 CVE-2020-15966 https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html 2020-09-21 2020-09-22
libxml -- multiple vulnerabilities libxml2 2.9.10_1

CVE mitre reports:

CVE-2019-20388

xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.

CVE-2020-7595

xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.

CVE-2020-24977

GNOME project libxml2 v2.9.10 and earlier have a global buffer over-read vulnerability in xmlEncodeEntitiesInternal

https://nvd.nist.gov/vuln/detail/CVE-2019-20388 https://nvd.nist.gov/vuln/detail/CVE-2020-7595 https://nvd.nist.gov/vuln/detail/CVE-2020-24977 2020-01-21 2020-09-22
py-matrix-synapse -- malformed events may prevent users from joining federated rooms py36-matrix-synapse py37-matrix-synapse py38-matrix-synapse 1.19.2

Problem Description:

Affected Synapse versions assume that all events have an "origin" field set. If an event without the "origin" field is sent into a federated room, servers not already joined to the room will be unable to do so due to failing to fetch the malformed event.

Impact:

An attacker could cause a denial of service by deliberately sending a malformed event into a room, thus preventing new servers (and thus their users) from joining the room.

https://github.com/matrix-org/synapse/issues/8319 https://github.com/matrix-org/synapse/pull/8324 https://github.com/matrix-org/synapse/blob/v1.19.3/CHANGES.md 2020-09-16 2020-09-21
Python -- multiple vulnerabilities python35 3.5.10

Python reports:

bpo-39603: Prevent http header injection by rejecting control characters in http.client.putrequest(…).

bpo-29778: Ensure python3.dll is loaded from correct locations when Python is embedded (CVE-2020-15523).

bpo-41004: CVE-2020-14422: The __hash__() methods of ipaddress.IPv4Interface and ipaddress.IPv6Interface incorrectly generated constant hash values of 32 and 128 respectively. This resulted in always causing hash collisions. The fix uses hash() to generate hash values for the tuple of (address, mask length, network address).

bpo-39073: Disallow CR or LF in email.headerregistry.Address arguments to guard against header injection attacks.

bpo-38576: Disallow control characters in hostnames in http.client, addressing CVE-2019-18348. Such potentially malicious header injection URLs now cause a InvalidURL to be raised.

bpo-39503: CVE-2020-8492: The AbstractBasicAuthHandler class of the urllib.request module uses an inefficient regular expression which can be exploited by an attacker to cause a denial of service. Fix the regex to prevent the catastrophic backtracking. Vulnerability reported by Ben Caller and Matt Schwager.

bpo-38945: Newline characters have been escaped when performing uu encoding to prevent them from overflowing into to content section of the encoded file. This prevents malicious or accidental modification of data during the decoding process.

bpo-38804: Fixes a ReDoS vulnerability in http.cookiejar. Patch by Ben Caller.

bpo-39017: Avoid infinite loop when reading specially crafted TAR files using the tarfile module (CVE-2019-20907).

bpo-41183: Use 3072 RSA keys and SHA-256 signature for test certs and keys.

bpo-39503: AbstractBasicAuthHandler of urllib.request now parses all WWW-Authenticate HTTP headers and accepts multiple challenges per header: use the realm of the first Basic challenge.

CVE-2020-15523 CVE-2020-14422 CVE-2019-18348 CVE-2020-8492 CVE-2019-20907 2020-08-19 2020-09-20
samba -- Unauthenticated domain takeover via netlogon samba410 4.10.18 samba411 4.11.13 samba412 4.12.7

The Samba Team reports:

An unauthenticated attacker on the network can gain administrator access by exploiting a netlogon protocol flaw.

https://www.samba.org/samba/security/CVE-2020-1472.html CVE-2020-1472 2020-01-01 2020-09-20
Nextcloud -- Password share by mail not hashed nextcloud 19.0.1

The Nextcloud project reports:

NC-SA-2020-026 (low): Password of share by mail is not hashed when given on the create share call
A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.

https://nextcloud.com/security/advisory/?id=NC-SA-2020-026 CVE-2020-8183 2020-06-04 2020-09-19
webkit2-gtk3 -- multible vulnerabilities webkit2-gtk3 2.28.3

The WebKitGTK project reports vulnerabilities:

  • CVE-2020-9802: Processing maliciously crafted web content may lead to arbitrary code execution.
  • CVE-2020-9803: Processing maliciously crafted web content may lead to arbitrary code execution.
  • CVE-2020-9805: Processing maliciously crafted web content may lead to universal cross site scripting.
  • CVE-2020-9806: Processing maliciously crafted web content may lead to arbitrary code execution.
  • CVE-2020-9807: Processing maliciously crafted web content may lead to arbitrary code execution.
  • CVE-2020-9843: Processing maliciously crafted web content may lead to a cross site scripting attack.
  • CVE-2020-9850: A remote attacker may be able to cause arbitrary code execution.
  • CVE-2020-13753: CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal’s input buffer.
https://webkitgtk.org/security/WSA-2020-0006.html CVE-2020-9802 CVE-2020-9803 CVE-2020-9805 CVE-2020-9806 CVE-2020-9807 CVE-2020-9843 CVE-2020-9850 CVE-2020-13753 2020-07-10 2020-07-10
Node.js -- September 2020 Security Releases node 14.11.0 node12 12.18.4 node10 10.22.1

Node.js reports:

Updates are now available for v10,x, v12.x and v14.x Node.js release lines for the following issues.

HTTP Request Smuggling due to CR-to-Hyphen conversion (High) (CVE-2020-8201)

Affected Node.js versions converted carriage returns in HTTP request headers to a hyphen before parsing. This can lead to HTTP Request Smuggling as it is a non-standard interpretation of the header.

Impacts:

  • All versions of the 14.x and 12.x releases line

Denial of Service by resource exhaustion CWE-400 due to unfinished HTTP/1.1 requests (Critical) (CVE-2020-8251)

Node.js is vulnerable to HTTP denial of service (DOS) attacks based on delayed requests submission which can make the server unable to accept new connections. The fix a new http.Server option called requestTimeout with a default value of 0 which means it is disabled by default. This should be set when Node.js is used as an edge server, for more details refer to the documentation.

Impacts:

  • All versions of the 14.x release line

fs.realpath.native on may cause buffer overflow (Medium) (CVE-2020-8252)

libuv's realpath implementation incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.

Impacts:

  • All versions of the 10.x release line
  • All versions of the 12.x release line
  • All versions of the 14.x release line before 14.9.0
https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/ CVE-2020-8201 CVE-2020-8251 CVE-2020-8252 2020-09-08 2020-09-16
FreeBSD -- ftpd privilege escalation via ftpchroot feature FreeBSD 12.112.1_10 11.411.4_4 11.311.3_14

Problem Description:

A ftpd(8) bug in the implementation of the file system sandbox, combined with capabilities available to an authenticated FTP user, can be used to escape the file system restriction configured in ftpchroot(5). Moreover, the bug allows a malicious client to gain root privileges.

Impact:

A malicious FTP user can gain privileged access to an affected system.

CVE-2020-7468 SA-20:30.ftpd 2020-09-15 2020-09-16
FreeBSD -- bhyve SVM guest escape FreeBSD-kernel 12.112.1_10 11.411.4_4 11.311.3_14

Problem Description:

A number of AMD virtualization instructions operate on host physical addresses, are not subject to nested page table translation, and guest use of these instructions was not trapped.

Impact:

From kernel mode a malicious guest can write to arbitrary host memory (with some constraints), affording the guest full control of the host.

CVE-2020-7467 SA-20:29.bhyve_svm 2020-09-15 2020-09-16
FreeBSD -- bhyve privilege escalation via VMCS access FreeBSD-kernel 12.112.1_10 11.411.4_4 11.311.3_14

Problem Description:

AMD and Intel CPUs support hardware virtualization using specialized data structures that control various aspects of guest operation. These are the Virtual Machine Control Structure (VMCS) on Intel CPUs, and the Virtual Machine Control Block (VMCB) on AMD CPUs. Insufficient access controls allow root users, including those running in a jail, to change these data structures.

Impact:

An attacker with host root access (including to a jailed bhyve instance) can use this vulnerability to achieve kernel code execution.

CVE-2020-24718 SA-20:28.bhyve_vmcs 2020-09-15 2020-09-16
FreeBSD -- ure device driver susceptible to packet-in-packet attack FreeBSD-kernel 12.112.1_10 11.411.4_4 11.311.3_14

Problem Description:

A programming error in the ure(4) device driver caused some Realtek USB Ethernet interfaces to incorrectly report packets with more than 2048 bytes in a single USB transfer as having a length of only 2048 bytes.

An adversary can exploit this to cause the driver to misinterpret part of the payload of a large packet as a separate packet, and thereby inject packets across security boundaries such as VLANs.

Impact:

An attacker that can send large frames (larger than 2048 bytes in size) to be received by the host (be it VLAN, or non-VLAN tagged packet), can inject arbitrary packets to be received and processed by the host. This includes spoofing packets from other hosts, or injecting packets to other VLANs than the host is on.

CVE-2020-7464 SA-20:27.ure 2020-09-15 2020-09-16
Rails -- Potential XSS vulnerability rubygem-actionview52 5.2.4.4 rubygem-actionview60 6.0.3.3

Ruby on Rails blog:

Rails 5.2.4.4 and 6.0.3.3 have been released! These releases contain an important security fix, so please upgrade when you can.

Both releases contain the following fix: [CVE-2020-15169] Potential XSS vulnerability in Action View

https://weblog.rubyonrails.org/2020/9/10/Rails-5-2-4-4-and-6-0-3-3-have-been-released/ https://groups.google.com/forum/#!topic/rubyonrails-security/b-C9kSGXYrc https://github.com/rails/rails/blob/5-2-stable/actionview/CHANGELOG.md https://github.com/rails/rails/blob/6-0-stable/actionview/CHANGELOG.md CVE-2020-15169 2020-09-09 2020-09-12
zeek -- Various vulnerabilities zeek 3.0.10

Jon Siwek of Corelight reports:

This release fixes the following security issue:

  • The AYIYA and GTPv1 parsing/decapsulation logic may leak memory -- These leaks have potential for remote exploitation to cause Denial of Service via resource exhaustion.
https://github.com/zeek/zeek/releases/tag/v3.0.10 2020-08-28 2020-09-09
chromium -- multiple vulnerabilities chromium 85.0.4183.102

Chrome Releases reports:

This release contains 5 security fixes:

  • [1116304] High CVE-2020-6573: Use after free in video. Reported by Leecraso and Guang Gong of 360 Alpha Lab working with 360 BugCloud on 2020-08-14
  • [1102196] High CVE-2020-6574: Insufficient policy enforcement in installer. Reported by CodeColorist of Ant-Financial LightYear Labs on 2020-07-05
  • [1081874] High CVE-2020-6575: Race in Mojo. Reported by Microsoft on 2020-05-12
  • [1111737] High CVE-2020-6576: Use after free in offscreen canvas. Reported by Looben Yang on 2020-07-31
  • [1122684] High CVE-2020-15959: Insufficient policy enforcement in networking. Reported by Eric Lawrence of Microsoft on 2020-08-27
CVE-2020-6573 CVE-2020-6574 CVE-2020-6575 CVE-2020-6576 CVE-2020-15969 https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop.html 2020-09-08 2020-09-09
Multi-link PPP protocol daemon MPD5 remotely exploitable crash mpd5 5.9

Version 5.9 contains security fix for L2TP clients and servers. Insufficient validation of incoming L2TP control packet specially crafted by unauthenticated user might lead to unexpected termination of the process. The problem affects mpd versions since 4.0 that brought in initial support for L2TP. Installations not using L2TP clients nor L2TP server configuration were not affected.

CVE-2020-7465 CVE-2020-7466 http://mpd.sourceforge.net/doc5/mpd4.html#4 2020-09-04 2020-09-06 2020-09-07
Mbed TLS -- Local side channel attack on RSA and static Diffie-Hellman mbedtls 2.16.8

Manuel Pégourié-Gonnard reports:

An attacker with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave such as SGX or the TrustZone secure world) can recover the private keys used in RSA or static (finite-field) Diffie-Hellman operations.

https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-09-2 2020-09-01 2020-09-06
Mbed TLS -- Local side channel attack on classical CBC decryption in (D)TLS mbedtls 2.16.8

Manuel Pégourié-Gonnard reports:

When decrypting/authenticating (D)TLS record in a connection using a CBC ciphersuite without the Encrypt-then-Mac extension RFC 7366, Mbed TLS used dummy rounds of the compression function associated with the hash used for HMAC in order to hide the length of the padding to remote attackers, as recommended in the original Lucky Thirteen paper.

A local attacker who is able to observe the state of the cache could monitor the presence of mbedtls_md_process() in the cache in order to determine when the actual computation ends and when the dummy rounds start. This is a reliable target as it's always called at least once, in response to a previous attack. The attacker can then continue with one of many well-documented Lucky 13 variants.

https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-09-1 CVE-2020-16150 2020-09-01 2020-09-06
GnuTLS -- null pointer dereference gnutls 3.6.15

The GnuTLS project reports:

It was found by oss-fuzz that the server sending a "no_renegotiation" alert in an unexpected timing, followed by an invalid second handshake can cause a TLS 1.3 client to crash via a null-pointer dereference. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.

https://gnutls.org/security-new.html#GNUTLS-SA-2020-09-04 CVE-2020-24659 2020-09-04 2020-09-06
Django -- multiple vulnerabilities py35-django22 py36-django22 py37-django22 py38-django22 2.2.16 py36-django30 py37-django30 py38-django30 3.0.10 py36-django31 py37-django31 py38-django31 3.1.1

Django Release notes:

CVE-2020-24583: Incorrect permissions on intermediate-level directories on Python 3.7+

On Python 3.7+, FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files and to intermediate-level collected static directories when using the collectstatic management command.

CVE-2020-24584: Permission escalation in intermediate-level directories of the file system cache on Python 3.7+

On Python 3.7+, the intermediate-level directories of the file system cache had the system's standard umask rather than 0o077 (no group or others permissions).

https://docs.djangoproject.com/en/2.2/releases/2.2.16/ https://docs.djangoproject.com/en/3.0/releases/3.0.10/ https://docs.djangoproject.com/en/3.1/releases/3.1.1/ CVE-2020-24583 CVE-2020-24584 2020-09-01 2020-09-05
gnupg -- AEAD key import overflow gnupg 2.2.212.2.23

Importing an OpenPGP key having a preference list for AEAD algorithms will lead to an array overflow and thus often to a crash or other undefined behaviour.

Importing an arbitrary key can often easily be triggered by an attacker and thus triggering this bug. Exploiting the bug aside from crashes is not trivial but likely possible for a dedicated attacker. The major hurdle for an attacker is that only every second byte is under their control with every first byte having a fixed value of 0x04.

CVE-2020-25125 https://dev.gnupg.org/T5050 2020-09-03 2020-09-03
FreeBSD -- dhclient heap overflow FreeBSD 12.112.1_9 11.411.4_3 11.311.3_13

Problem Description:

When parsing option 119 data, dhclient(8) computes the uncompressed domain list length so that it can allocate an appropriately sized buffer to store the uncompressed list. The code to compute the length failed to handle certain malformed input, resulting in a heap overflow when the uncompressed list is copied into in inadequately sized buffer.

Impact:

The heap overflow could in principle be exploited to achieve remote code execution. The affected process runs with reduced privileges in a Capsicum sandbox, limiting the immediate impact of an exploit. However, it is possible the bug could be combined with other vulnerabilities to escape the sandbox.

CVE-2020-7461 SA-20:26.dhclient 2020-09-02 2020-09-02
FreeBSD -- SCTP socket use-after-free bug FreeBSD-kernel 12.112.1_9 11.411.4_3 11.311.3_13

Problem Description:

Due to improper handling in the kernel, a use-after-free bug can be triggered by sending large user messages from multiple threads on the same socket.

Impact:

Triggering the use-after-free situation may result in unintended kernel behaviour including a kernel panic.

CVE-2020-7463 SA-20:25.sctp 2020-09-02 2020-09-02
FreeBSD -- IPv6 Hop-by-Hop options use-after-free bug FreeBSD-kernel 11.311.3_13

Problem Description:

Due to improper mbuf handling in the kernel, a use-after-free bug might be triggered by sending IPv6 Hop-by-Hop options over the loopback interface.

Impact:

Triggering the use-after-free situation may result in unintended kernel behaviour including a kernel panic.

CVE-2020-7462 SA-20:24.ipv6 2020-09-02 2020-09-02
Gitlab -- multiple vulnerabilities gitlab-ce 13.3.013.3.4 13.2.013.2.8 013.1.10

Gitlab reports:

Vendor Cross-Account Assume-Role Attack

Stored XSS on the Vulnerability Page

Outdated Job Token Can Be Reused to Access Unauthorized Resources

File Disclosure Via Workhorse File Upload Bypass

Unauthorized Maintainer Can Edit Group Badge

Denial of Service Within Wiki Functionality

Sign-in Vulnerable to Brute-force Attacks

Invalidated Session Allows Account Access With an Old Password

GitLab Omniauth Endpoint Renders User Controlled Messages

Blind SSRF Through Repository Mirroring

Information Disclosure Through Incorrect Group Permission Verifications

No Rate Limit on GitLab Webhook Feature

GitLab Session Revocation Feature Does Not Invalidate All Sessions

OAuth Authorization Scope for an External Application Can Be Changed Without User Consent

Unauthorized Maintainer Can Delete Repository

Improper Verification of Deploy-Key Leads to Access Restricted Repository

Disabled Repository Still Accessible With a Deploy-Token

Duplicated Secret Code Generated by 2 Factor Authentication Mechanism

Lack of Validation Within Project Invitation Flow

Current Sessions Not Invalidated Upon Enabling 2 Factor Authentication

Users Without 2 Factor Authentication Can Be Blocked Accessing GitLab

Lack of Upper Bound Check Leading to Possible Denial of Service

2 Factor Authentication for Groups Was Not Enforced Within API Endpoint

GitLab Runner Denial of Service via CI Jobs

Update jQuery Dependency

https://about.gitlab.com/releases/2020/09/02/security-release-gitlab-13-3-3-released/ CVE-2020-13318 CVE-2020-13301 CVE-2020-13284 CVE-2020-13298 CVE-2020-13313 CVE-2020-13311 CVE-2020-13289 CVE-2020-13302 CVE-2020-13314 CVE-2020-13309 CVE-2020-13287 CVE-2020-13306 CVE-2020-13299 CVE-2020-13300 CVE-2020-13317 CVE-2020-13303 CVE-2020-13316 CVE-2020-13304 CVE-2020-13305 CVE-2020-13307 CVE-2020-13308 CVE-2020-13315 CVE-2020-13297 CVE-2020-13310 CVE-2020-11022 2020-09-02 2020-09-02
go -- net/http/cgi, net/http/fcgi: Cross-Site Scripting (XSS) when Content-Type is not specified go 1.14.8,1 1.15,11.15.1,1

The Go project reports:

When a Handler does not explicitly set the Content-Type header, both CGI implementations default to “text/html”. If an attacker can make a server generate content under their control (e.g. a JSON containing user data or an uploaded image file) this might be mistakenly returned by the server as “text/html”. If a victim visits such a page they could get the attacker's code executed in the context of the server origin. If an attacker can make a server generate content under their control (e.g. a JSON containing user data or an uploaded image file) this might be mistakenly returned by the server as “text/html”. If a victim visits such a page they could get the attacker's code executed in the context of the server origin.

CVE-2020-24553 https://github.com/golang/go/issues/40928 2020-08-20 2020-09-01
ark -- extraction outside of extraction directory ark 20.08.0_1

Albert Astals Cid reports:

Overview

A maliciously crafted TAR archive containing symlink entries would install files anywhere in the user's home directory upon extraction.

Proof of concept

For testing, an example of malicious archive can be found at dirsymlink.tar

Impact

Users can unwillingly install files like a modified .bashrc, or a malicious script placed in ~/.config/autostart.

Workaround

Before extracting a downloaded archive using the Ark GUI, users should inspect it to make sure it doesn't contain symlink entries pointing outside the extraction folder.

The 'Extract' context menu from the Dolphin file manager shouldn't be used.

Solution

Ark 20.08.1 skips maliciously crafted symlinks when extracting TAR archives.

Alternatively, 8bf8c5ef07b0ac5e914d752681e470dea403a5bd can be applied to previous releases.

Credits

Thanks to Fabian Vogt for reporting this issue and for fixing it.

https://kde.org/info/security/advisory-20200827-1.txt CVE-2020-24654 2020-08-27 2020-08-28
php72 -- use of freed hash key php72 7.2.33 php73 7.3.21 php74 7.4.9

grigoritchy at gmail dot com reports:

The phar_parse_zipfile function had use-after-free vulnerability because of mishandling of the actual_alias variable.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7068 CVE-2020-7068 2020-07-06 2020-08-27
chromium -- multiple vulnerabilities chromium 85.0.4183.83

Chrome Releases reports:

This update includes 20 security fixes, including:

  • [1109120] High CVE-2020-6558: Insufficient policy enforcement in iOS. Reported by Alison Huffman, Microsoft Browser Vulnerability Research on 2020-07-24
  • [1116706] High CVE-2020-6559: Use after free in presentation API. Reported by Liu Wei and Wu Zekai of Tencent Security Xuanwu Lab on 2020-08-15
  • [1108181] Medium CVE-2020-6560: Insufficient policy enforcement in autofill. Reported by Nadja Ungethuem from www.unnex.de on 2020-07-22
  • [932892] Medium CVE-2020-6561: Inappropriate implementation in Content Security Policy. Reported by Rob Wu on 2019-02-16
  • [1086845] Medium CVE-2020-6562: Insufficient policy enforcement in Blink. Reported by Masato Kinugawa on 2020-05-27
  • [1104628] Medium CVE-2020-6563: Insufficient policy enforcement in intent handling. Reported by Pedro Oliveira on 2020-07-12
  • [841622] Medium CVE-2020-6564: Incorrect security UI in permissions. Reported by Khalil Zhani on 2018-05-10
  • [1029907] Medium CVE-2020-6565: Incorrect security UI in Omnibox. Reported by Khalil Zhani on 2019-12-02
  • [1065264] Medium CVE-2020-6566: Insufficient policy enforcement in media. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2020-03-27
  • [937179] Low CVE-2020-6567: Insufficient validation of untrusted input in command line handling. Reported by Joshua Graham of TSS on 2019-03-01
  • [1092451] Low CVE-2020-6568: Insufficient policy enforcement in intent handling. Reported by Yongke Wang(@Rudykewang) and Aryb1n(@aryb1n) of Tencent Security Xuanwu Lab on 2020-06-08
  • [995732] Low CVE-2020-6569: Integer overflow in WebUSB. Reported by guaixiaomei on 2019-08-20
  • [1084699] Low CVE-2020-6570: Side-channel information leakage in WebRTC. Reported by Signal/Tenable on 2020-05-19
  • [1085315] Low CVE-2020-6571: Incorrect security UI in Omnibox. Reported by Rayyan Bijoora on 2020-05-21
CVE-2020-6558 CVE-2020-6559 CVE-2020-6560 CVE-2020-6561 CVE-2020-6562 CVE-2020-6563 CVE-2020-6564 CVE-2020-6565 CVE-2020-6566 CVE-2020-6567 CVE-2020-6568 CVE-2020-6569 CVE-2020-6570 CVE-2020-6571 https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_25.html 2020-08-25 2020-08-26
jasper -- multiple vulnerabilities jasper 2.0.20

JasPer NEWS:

- Fix CVE-2018-9154

- Fix CVE-2018-19541

- Fix CVE-2016-9399, CVE-2017-13751

- Fix CVE-2018-19540

- Fix CVE-2018-9055

- Fix CVE-2017-13748

- Fix CVE-2017-5503, CVE-2017-5504, CVE-2017-5505

- Fix CVE-2018-9252

- Fix CVE-2018-19139

- Fix CVE-2018-19543, CVE-2017-9782

- Fix CVE-2018-20570

- Fix CVE-2018-20622

- Fix CVE-2016-9398

- Fix CVE-2017-14132

- Fix CVE-2017-5499

- Fix CVE-2018-18873

- Fix CVE-2017-13750

https://github.com/jasper-software/jasper/blob/master/NEWS CVE-2018-9154 CVE-2018-19541 CVE-2016-9399 CVE-2017-13751 CVE-2018-19540 CVE-2018-9055 CVE-2017-13748 CVE-2017-5503 CVE-2017-5504 CVE-2017-5505 CVE-2018-9252 CVE-2018-19139 CVE-2018-19543 CVE-2017-9782 CVE-2018-20570 CVE-2018-20622 CVE-2016-9398 CVE-2017-14132 CVE-2017-5499 CVE-2018-18873 CVE-2017-13750 2020-07-28 2020-08-25 2020-09-05
xorg-server -- Multiple input validation failures in X server extensions xorg-server 1.20.8_4,1 xephyr 1.20.8_4,1 xorg-vfbserver 1.20.8_4,1 xorg-nestserver 1.20.8_4,1 xwayland 1.20.8_4,1 xorg-dmx 1.20.8_4,1

The X.org project reports:

All theses issuses can lead to local privileges elevation on systems where the X server is running privileged.

The handler for the XkbSetNames request does not validate the request length before accessing its contents.

An integer underflow exists in the handler for the XIChangeHierarchy request.

An integer underflow exist in the handler for the XkbSelectEvents request.

An integer underflow exist in the handler for the CreateRegister request of the X record extension.

CVE-2020-14345 CVE-2020-14346 CVE-2020-14361 CVE-2020-14362 https://lists.x.org/archives/xorg-announce/2020-August/003058.html 2020-08-25 2020-08-25
libX11 -- Doublefree in locale handlng code libX11 1.6.12,1

The X.org project reports:

There is an integer overflow and a double free vulnerability in the way LibX11 handles locales. The integer overflow is a necessary precursor to the double free.

CVE-2020-14363 https://lists.x.org/archives/xorg-announce/2020-August/003056.html 2020-08-25 2020-08-25 2020-11-15
chrony <= 3.5.1 data corruption through symlink vulnerability writing the pidfile chrony 3.5.1

Miroslav Lichvar reports:

chrony-3.5.1 [...] fixes a security issue in writing of the pidfile.

When chronyd is configured to save the pidfile in a directory where the chrony user has write permissions (e.g. /var/run/chrony - the default since chrony-3.4), an attacker that compromised the chrony user account could create a symbolic link at the location of the pidfile to make chronyd starting with root privileges follow the symlink and write its process ID to a file for which the chrony user doesn't have write permissions, causing a denial of service, or data loss.

This issue was reported by Matthias Gerstner of SUSE.

https://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2020/08/msg00000.html CVE-2020-14367 2020-08-06 2020-08-22
sysutils/openzfs-kmod -- critical permissions issues openzfs-kmod 2020081800

Andrew Walker reports:

Issue 1:

Users are always granted permissions to cd into a directory. The check for whether execute is present on directories is a de-facto no-op. This cannot be mitigated without upgrading. Even setting an explicit "deny - execute" NFSv4 ACE will be bypassed.

Issue 2:

All ACEs for the owner_group (group@) and regular groups (group:<foo>) are granted the current user. This means that POSIX mode 770 is de-facto 777, and the below ACL is also de-facto 777 because the groupmember check for builtin_administrators returns True.

 root@TESTBOX[~]# getfacl testfile
 # file: testfile
 # owner: root
 # group: wheel
 group:builtin_administrators:rwxpDdaARWcCos:-------:allow
 	  
ports/248787 https://github.com/openzfs/zfs/commit/716b53d0a14c72bda16c0872565dd1909757e73f https://reviews.freebsd.org/D26107 2020-08-13 2020-08-20
textproc/elasticsearch6 -- field disclosure flaw elasticsearch6 6.8.12

Elastic reports:

A field disclosure flaw was found in Elasticsearch when running a scrolling search with Field Level Security. If a user runs the same query another more privileged user recently ran, the scrolling search can leak fields that should be hidden. This could result in an attacker gaining additional permissions against a restricted index.

CVE-2020-7019 https://discuss.elastic.co/t/elastic-stack-7-9-0-and-6-8-12-security-update/245456 https://github.com/elastic/elasticsearch/pull/39490 2020-08-19 2020-08-20
adns -- multiple vulnerabilities adns 1.5.2

Ian Jackson and the adns project reports:

Vulnerable applications: all adns callers. Exploitable by: the local recursive resolver. Likely worst case: Remote code execution.

Vulnerable applications: those that make SOA queries. Exploitable by: upstream DNS data sources. Likely worst case: DoS (crash of the adns-using application)

Vulnerable applications: those that use adns_qf_quoteok_query. Exploitable by: sources of query domain names. Likely worst case: DoS (crash of the adns-using application)

Vulnerable applications: adnshost. Exploitable by: code responsible for framing the input. Likely worst case: DoS (adnshost crashes at EOF).

https://www.chiark.greenend.org.uk/pipermail/adns-announce/2020/000004.html CVE-2017-9103 CVE-2017-9104 CVE-2017-9105 CVE-2017-9106 CVE-2017-9107 CVE-2017-9108 CVE-2017-9109 2017-05-21 2020-08-20
Icinga Web 2 -- directory traversal vulnerability icingaweb2 2.8.1

Icinga development team reports:

CVE-2020-24368

Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Directory Traversal vulnerability which allows an attacker to access arbitrary files that are readable by the process running Icinga Web 2. This issue is fixed in Icinga Web 2 in v2.6.4, v2.7.4 and v2.8.2.

https://icinga.com/2020/08/19/icinga-web-security-release-v2-6-4-v2-7-4-and-v2-8-2/ CVE-2020-24368 2020-08-19 2020-08-19
curl -- expired pointer dereference vulnerability curl 7.29.07.72.0

curl security problems:

CVE-2020-8231: wrong connect-only connection

An application that performs multiple requests with libcurl's multi API and sets the CURLOPT_CONNECT_ONLY option, might in rare circumstances experience that when subsequently using the setup connect-only transfer, libcurl will pick and use the wrong connection - and instead pick another one the application has created since then.

CURLOPT_CONNECT_ONLY is the option to tell libcurl to not perform an actual transfer, only connect. When that operation is completed, libcurl remembers which connection it used for that transfer and "easy handle". It remembers the connection using a pointer to the internal connectdata struct in memory.

If more transfers are then done with the same multi handle before the connect-only connection is used, leading to the initial connect-only connection to get closed (for example due to idle time-out) while also new transfers (and connections) are setup, such a new connection might end up getting the exact same memory address as the now closed connect-only connection.

If after those operations, the application then wants to use the original transfer's connect-only setup to for example use curl_easy_send() to send raw data over that connection, libcurl could erroneously find an existing connection still being alive at the address it remembered since before even though this is now a new and different connection.

The application could then accidentally send data over that connection which wasn't at all intended for that recipient, entirely unknowingly.

https://curl.haxx.se/docs/security.html https://curl.haxx.se/docs/CVE-2020-8231.html CVE-2020-8231 2020-08-19 2020-08-19
Python -- multiple vulnerabilities python37 3.7.9 python36 3.6.12

Python reports:

bpo-29778: Ensure python3.dll is loaded from correct locations when Python is embedded (CVE-2020-15523).

bpo-41004: CVE-2020-14422: The __hash__() methods of ipaddress.IPv4Interface and ipaddress.IPv6Interface incorrectly generated constant hash values of 32 and 128 respectively. This resulted in always causing hash collisions. The fix uses hash() to generate hash values for the tuple of (address, mask length, network address).

bpo-39603: Prevent http header injection by rejecting control characters in http.client.putrequest(...).

https://docs.python.org/release/3.7.9/whatsnew/changelog.html#changelog https://docs.python.org/release/3.6.12/whatsnew/changelog.html#changelog CVE-2020-14422 CVE-2020-15523 2020-06-17 2020-08-19
security/trousers -- several vulnerabilities trousers 0.3.14_3

the TrouSerS project reports reports:

If the tcsd daemon is started with root privileges, it fails to drop the root gid after it is no longer needed.

If the tcsd daemon is started with root privileges, the tss user has read and write access to the /etc/tcsd.conf file.

If the tcsd daemon is started with root privileges, the creation of the system.data file is prone to symlink attacks.

https://sourceforge.net/p/trousers/trousers/ci/e74dd1d96753b0538192143adf58d04fcd3b242b/ https://www.openwall.com/lists/oss-security/2020/05/20/3 CVE-2020-24330 CVE-2020-24331 CVE-2020-24332 2020-05-20 2020-08-18
chromium -- heap buffer overflow chromium 84.0.4147.135

Chrome Releases reports:

This release contains one security fix:

  • [1115345] High CVE-2020-6556: Heap buffer overflow in SwiftShader. Reported by Alison Huffman, Microsoft Browser Vulnerability Research on 2020-08-12
CVE-2020-6556 https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop_18.html 2020-08-18 2020-08-18
ceph14 -- HTTP header injection via CORS ExposeHeader tag ceph14 14.2.11

Red Hat bugzilla reports:

A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway). The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made.

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10753 CVE-2020-10753 ports/248673 2020-05-27 2020-08-16
jenkins -- Buffer corruption in bundled Jetty jenkins 2.243 jenkins-lts 2.235.5

Jenkins Security Advisory:

Description

(Critical) SECURITY-1983 / CVE-2019-17638

Buffer corruption in bundled Jetty

CVE-2019-17638 https://www.jenkins.io/security/advisory/2020-08-17/ 2020-08-17 2020-08-17
net/rsync -- multiple zlib issues rsync 3.2.0

rsync developers reports:

Various zlib fixes, including security fixes for CVE-2016-9843, CVE-2016-9842, CVE-2016-9841, and CVE-2016-9840

https://download.samba.org/pub/rsync/NEWS#3.2.0 CVE-2016-9843 CVE-2016-9842 CVE-2016-9841 CVE-2016-9840 2020-06-19 2020-08-16
security/py-ecdsa -- multiple issues py27-ecdsa 0.13.3 py37-ecdsa 0.13.3

py-ecdsa developers report:

Fix CVE-2019-14853 - possible DoS caused by malformed signature decoding.

Fix CVE-2019-14859 - signature malleability caused by insufficient checks of DER encoding

https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3 CVE-2019-14853 CVE-2019-14859 2019-10-07 2020-08-16
snmptt -- malicious shell code snmptt 1.4.2

Snmptt reports:

Fixed a security issue with EXEC / PREXEC / unknown_trap_exec that could allow malicious shell code to be executed.

Fixed a bug with EXEC / PREXEC / unknown_trap_exec that caused commands to be run as root instead of the user defined in daemon_uid.

http://snmptt.sourceforge.net/changelog.shtml ports/248162 2020-07-23 2020-08-15
mail/dovecot -- multiple vulnerabilities dovecot 2.3.11

Aki Tuomi reports:

Parsing mails with a large number of MIME parts could have resulted in excessive CPU usage or a crash due to running out of stack memory..

Dovecot's NTLM implementation does not correctly check message buffer size, which leads to reading past allocation which can lead to crash

lmtp/submission: Issuing the RCPT command with an address that has the empty quoted string as local-part causes the lmtp service to crash.

Dovecot's RPA mechanism implementation accepts zero-length message, which leads to assert-crash later on.

https://dovecot.org/pipermail/dovecot-news/2020-August/000440.html CVE-2020-12100 CVE-2020-12673 CVE-2020-10967 CVE-2020-12674 2020-04-23 2020-08-13
ilmbase, openexr -- v2.5.3 is a patch release with various bug/security fixes ilmbase 2.5.3 openexr 2.5.3

Cary Phillips reports:

v2.5.3 - Patch release with various bug/security fixes [...]:

  • Various sanitizer/fuzz-identified issues related to handling of invalid input
https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.5.3 2020-07-13 2020-08-13
jenkins -- multiple vulnerabilities jenkins 2.252 jenkins-lts 2.235.4

Jenkins Security Advisory:

Description

(High) SECURITY-1955 / CVE-2020-2229

Stored XSS vulnerability in help icons

(High) SECURITY-1957 / CVE-2020-2230

Stored XSS vulnerability in project naming strategy

(High) SECURITY-1960 / CVE-2020-2231

Stored XSS vulnerability in 'Trigger builds remotely'

CVE-2020-2229 CVE-2020-2230 CVE-2020-2231 https://www.jenkins.io/security/advisory/2020-08-12/ 2020-08-12 2020-08-12
chromium -- multiple vulnerabilities chromium 84.0.4147.125

Chrome Releases reports:

This release contains 15 security fixes, including:

  • [1107433] High CVE-2020-6542: Use after free in ANGLE. Reported by Piotr Bania of Cisco Talos on 2020-07-20
  • [1104046] High CVE-2020-6543: Use after free in task scheduling. Reported by Looben Yang on 2020-07-10
  • [1108497] High CVE-2020-6544: Use after free in media. Reported by Tim Becker of Theori on 2020-07-22
  • [1095584] High CVE-2020-6545: Use after free in audio. Reported by Anonymous on 2020-06-16
  • [1100280] High CVE-2020-6546: Inappropriate implementation in installer. Reported by Andrew Hess (any1) on 2020-06-29
  • [1102153] High CVE-2020-6547: Incorrect security UI in media. Reported by David Albert on 2020-07-05
  • [1103827] High CVE-2020-6548: Heap buffer overflow in Skia. Reported by Choongwoo Han, Microsoft Browser Vulnerability Research on 2020-07-09
  • [1105426] High CVE-2020-6549: Use after free in media. Reported by Sergei Glazunov of Google Project Zero on 2020-07-14
  • [1106682] High CVE-2020-6550: Use after free in IndexedDB. Reported by Sergei Glazunov of Google Project Zero on 2020-07-17
  • [1107815] High CVE-2020-6551: Use after free in WebXR. Reported by Sergei Glazunov of Google Project Zero on 2020-07-21
  • [1108518] High CVE-2020-6552: Use after free in Blink. Reported by Tim Becker of Theori on 2020-07-22
  • [1111307] High CVE-2020-6553: Use after free in offline mode. Reported by Alison Huffman, Microsoft Browser Vulnerability Research on 2020-07-30
  • [1094235] Medium CVE-2020-6554: Use after free in extensions. Reported by Anonymous on 2020-06-12
  • [1105202] Medium CVE-2020-6555: Out of bounds read in WebGL. Reported by Marcin Towalski of Cisco Talos on 2020-07-13
CVE-2020-6542 CVE-2020-6543 CVE-2020-6544 CVE-2020-6545 CVE-2020-6546 CVE-2020-6547 CVE-2020-6548 CVE-2020-6549 CVE-2020-6550 CVE-2020-6551 CVE-2020-6552 CVE-2020-6553 CVE-2020-6554 CVE-2020-6555 https://chromereleases.googleblog.com/2020/08/stable-channel-update-for-desktop.html 2020-08-10 2020-08-11
puppetdb -- Multiple vulnerabilities puppetdb5 5.2.18

Puppetlabs reports:

In June 2020, jackson-databind published security updates addressing several CVEs. Previous releases of PuppetDB contain a vulnerable version of jackson.core:jackson-databind. PuppetDB 5.2.18 contains an updated version of jackson-databind that has patched the vulnerabilities.

https://puppet.com/security/cve/jackson-july-2020-security-fixes/ CVE-2020-9548 CVE-2020-14062 CVE-2020-14060 CVE-2020-14061 CVE-2020-14195 2020-07-23 2020-08-11
bftpd -- Multiple vulnerabilities bftpd 5.6

Bftpd project reports:

Bftpd is vulnerable to out of bounds memory access, file descriptor leak and a potential buffer overflow.

http://bftpd.sourceforge.net/news.html 2020-04-16 2020-08-10
trafficserver -- resource consumption trafficserver 8.0.8

Bryan Call reports:

ATS is vulnerable to certain types of HTTP/2 HEADERS frames that can cause the server to allocate a large amount of memory and spin the thread.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9494 CVE-2020-9494 2020-06-24 2020-07-02
Apache httpd -- Multiple vulnerabilities apache24 2.4.46 mod_http2 1.15.14

The Apache httpd projec reports:

  • mod_http2: Important: Push Diary Crash on Specifically Crafted HTTP/2 Header (CVE-2020-9490)
    A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards.
  • mod_proxy_uwsgi: Moderate: mod_proxy_uwsgi buffer overflow (CVE-2020-11984)
    info disclosure and possible RCE
  • mod_http2: Moderate: Push Diary Crash on Specifically Crafted HTTP/2 Header (CVE-2020-11993)
    When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools.
https://downloads.apache.org/httpd/CHANGES_2.4.46 https://httpd.apache.org/security/vulnerabilities_24.html CVE-2020-9490 CVE-2020-11984 CVE-2020-11993 2020-08-07 2020-08-08 2020-08-08
go -- encoding/binary: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs go 1.14.7,1

The Go project reports:

Certain invalid inputs to ReadUvarint or ReadVarint could cause those functions to read an unlimited number of bytes from the ByteReader argument before returning an error. This could lead to processing more input than expected when the caller is reading directly from the network and depends on ReadUvarint and ReadVarint only consuming a small, bounded number of bytes, even from invalid inputs.

CVE-2020-16845 https://github.com/golang/go/issues/40618 2020-08-06 2020-08-06
Gitlab -- Multiple Vulnerabilities gitlab-ce 13.3.0

Gitlab reports:

Arbitrary File Read when Moving an Issue

Memory Exhaustion via Excessive Logging of Invite Email Error

Denial of Service Through Project Import Feature

User Controlled Git Configuration Settings Resulting in SSRF

Stored XSS in Issue Reference Number Tooltip

Stored XSS in Issues List via Milestone Title

Improper Access Control After Group Transfer

Bypass Email Verification Required for OAuth Flow

Confusion When Using Hexadecimal Branch Names

Insufficient OAuth Revocation

Improper Access Control for Project Sharing

Stored XSS in Jobs Page

Improper Access Control of Applications Page

SSRF into Shared Runner

Update Kramdown Gem

https://about.gitlab.com/releases/2020/08/05/gitlab-13-2-3-released/ CVE-2020-10977 CVE-2020-13280 CVE-2020-13281 CVE-2020-14001 2020-08-05 2020-08-06 2020-08-25
FreeBSD -- sendmsg(2) privilege escalation FreeBSD-kernel 12.112.1_8 11.411.4_2 11.311.3_12

Problem Description:

When handling a 32-bit sendmsg(2) call, the compat32 subsystem copies the control message to be transmitted (if any) into kernel memory, and adjusts alignment of control message headers. The code which performs this work contained a time-of-check to time-of-use (TOCTOU) vulnerability which allows a malicious userspace program to modify control message headers after they were validated by the kernel.

Impact:

The TOCTOU bug can be exploited by an unprivileged malicious userspace program to trigger privilege escalation.

CVE-2020-7460 SA-20:23.sendmsg 2020-08-05 2020-08-06
FreeBSD -- Potential memory corruption in USB network device drivers FreeBSD-kernel 12.112.1_8 11.411.4_2 11.311.3_12

Problem Description:

A missing length validation code common to these three drivers means that a malicious USB device could write beyond the end of an allocated network packet buffer.

Impact:

An attacker with physical access to a USB port and the ability to bring a network interface up may be able to use a specially crafted USB device to gain kernel or user-space code execution.

CVE-2020-7459 SA-20:21.usb_net 2020-08-05 2020-08-06
typo3 -- multiple vulnerabilities typo3-9-php72 typo3-9-php73 typo3-9-php74 9.5.20 typo3-10-php72 typo3-10-php73 typo3-10-php74 10.4.6

Typo3 Team reports:

In case an attacker manages to generate a valid cryptographic message authentication code (HMAC-SHA1) - either by using a different existing vulnerability or in case the internal encryptionKey was exposed - it is possible to retrieve arbitrary files of a TYPO3 installation. This includes the possibility to fetch typo3conf/LocalConfiguration.php which again contains the encryptionKey as well as credentials of the database management system being used. In case a database server is directly accessible either via internet or in a shared hosting network, this allows to completely retrieve, manipulate or delete database contents. This includes creating an administration user account - which can be used to trigger remote code execution by injecting custom extensions.

It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message authentication code (HMAC-SHA1) and can lead to various attack chains as described below.

https://typo3.org/article/typo3-1046-and-9520-security-releases-published https://typo3.org/security/advisory/typo3-core-sa-2020-007 https://typo3.org/security/advisory/typo3-core-sa-2020-008 CVE-2020-15098 CVE-2020-15099 2020-07-28 2020-08-04
xorg-server -- Pixel Data Uninitialized Memory Information Disclosure xorg-server 1.20.8_3,1 xephyr 1.20.8_3,1 xorg-vfbserver 1.20.8_3,1 xorg-nestserver 1.20.8_3,1 xwayland 1.20.8_3,1 xorg-dmx 1.20.8_3,1

The X.org project reports:

Allocation for pixmap data in AllocatePixmap() does not initialize the memory in xserver, it leads to leak uninitialize heap memory to clients. When the X server runs with elevated privileges.

This flaw can lead to ASLR bypass, which when combined with other flaws (known/unknown) could lead to lead to privilege elevation in the client.

https://lists.x.org/archives/xorg-announce/2020-July/003051.html CVE-2020-14347 2020-07-31 2020-08-01
libX11 -- Heap corruption in the X input method client in libX11 libX11 1.6.9_3,1

The X.org project reports:

The X Input Method (XIM) client implementation in libX11 has some integer overflows and signed/unsigned comparison issues that can lead to heap corruption when handling malformed messages from an input method.

https://lists.x.org/archives/xorg-announce/2020-July/003050.html CVE-2020-14344 2020-07-31 2020-08-01
Python -- multiple vulnerabilities python38 3.8.5

Python reports:

bpo-41304: Fixes python3x._pth being ignored on Windows, caused by the fix for bpo-29778 (CVE-2020-15801).

bpo-39603: Prevent http header injection by rejecting control characters in http.client.putreques().

https://docs.python.org/3/whatsnew/changelog.html#python-3-8-5-final CVE-2020-15801 2020-02-11 2020-07-31
ark -- directory traversal ark 20.04.2_1 20.04.3

KDE Project Security Advisory reports:

KDE Project Security Advisory

Title: Ark: maliciously crafted archive can install files outside the extraction directory.
Risk Rating: Important
CVE: CVE-2020-16116
Versions: ark <= 20.04.3
Author: Elvis Angelaccio <elvis.angelaccio@kde.org>
Date: 30 July 2020

Overview

A maliciously crafted archive with "../" in the file paths would install files anywhere in the user's home directory upon extraction.

Proof of concept

For testing, an example of malicious archive can be found at https://github.com/jwilk/traversal-archives/releases/download/0/relative2.zip

Impact

Users can unwillingly install files like a modified .bashrc, or a malicious script placed in ~/.config/autostart

Workaround

Users should not use the 'Extract' context menu from the Dolphin file manager. Before extracting a downloaded archive using the Ark GUI, users should inspect it to make sure it doesn't contain entries with "../" in the file path.

Solution

Ark 20.08.0 prevents loading of malicious archives and shows a warning message to the users.

Alternatively, https://invent.kde.org/utilities/ark/-/commit/0df592524fed305d6fbe74ddf8a196bc9ffdb92f can be applied to previous releases.

Credits

Thanks to Dominik Penner for finding and reporting this issue and thanks to Elvis Angelaccio and Albert Astals Cid for fixing it.

CVE-2020-16116 https://kde.org/info/security/advisory-20200730-1.txt 2020-07-30 2020-07-30
chromium -- multiple vulnerabilities chromium 84.0.4147.105

Chrome Releases reports:

This update contains 8 security fixes, including:

  • [1105318] High CVE-2020-6537: Type Confusion in V8. Reported by Alphalaab on 2020-07-14
  • [1096677] High CVE-2020-6538: Inappropriate implementation in WebView. Reported by Yongke Wang(@Rudykewang) and Aryb1n(@aryb1n) of Tencent Security Xuanwu Lab on 2020-06-18
  • [1104061] High CVE-2020-6532: Use after free in SCTP. Reported by Anonymous on 2020-07-09
  • [1105635] High CVE-2020-6539: Use after free in CSS. Reported by Oriol Brufau on 2020-07-14
  • [1105720] High CVE-2020-6540: Heap buffer overflow in Skia. Reported by Zhen Zhou of NSFOCUS Security Team on 2020-07-15
  • [1106773] High CVE-2020-6541: Use after free in WebUSB. Reported by Sergei Glazunov of Google Project Zero on 2020-07-17
CVE-2020-6532 CVE-2020-6537 CVE-2020-6538 CVE-2020-6539 CVE-2020-6540 CVE-2020-6541 https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop_27.html 2020-07-27 2020-07-28
libsndfile -- out-of-bounds read memory access libsndfile 1.0.29.p.20200620

RedHat reports:

It was discovered the fix for CVE-2018-19758 was not complete and still allows a read beyond the limits of a buffer in wav_write_header() function in wav.c. A local attacker may use this flaw to make the application crash.

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3832 2019-02-14 2020-07-28
FreeRDP -- Integer overflow in RDPEGFX channel freerdp 2.2.0

Bernhard Miklautz reports:

  • Integer overflow due to missing input sanitation in rdpegfx channel
  • All FreeRDP clients are affected
  • The input rectangles from the server are not checked against local surface coordinates and blindly accepted. A malicious server can send data that will crash the client later on (invalid length arguments to a memcpy)
https://www.freerdp.com/2020/07/20/2_2_0-released https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15103 CVE-2020-15103 2020-06-25 2020-07-28
zeek -- Various vulnerabilities zeek 3.0.8

Jon Siwek of Corelight reports:

This release fixes the following security issues:

  • Fix potential DNS analyzer stack overflow
  • Fix potential NetbiosSSN analyzer stack overflow
https://github.com/zeek/zeek/releases/tag/v3.0.8 2020-07-28 2020-07-28
Cacti -- multiple vulnerabilities cacti 1.2.13

Cacti developers reports:

Multiple fixes for bundled jQuery to prevent code exec (CVE-2020-11022, CVE-2020-11023).

PHPMail contains a escaping bug (CVE-2020-13625).

SQL Injection via color.php in Cacti (CVE-2020-14295).

https://www.cacti.net/release_notes.php?version=1.2.13 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13625 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14295 CVE-2020-11022 CVE-2020-11023 CVE-2020-13625 CVE-2020-14295 2020-07-15 2020-07-27
Wagtail -- XSS vulnerability py36-wagtail py37-wagtail py38-wagtail 2.8.02.9.3 2.7.4

GitHub Advisory Database:

When a form page type is made available to Wagtail editors through the wagtail.contrib.forms app, and the page template is built using Django's standard form rendering helpers such as form.as_p (as directed in the documentation), any HTML tags used within a form field's help text will be rendered unescaped in the page. Allowing HTML within help text is an intentional design decision by Django; however, as a matter of policy Wagtail does not allow editors to insert arbitrary HTML by default, as this could potentially be used to carry out cross-site scripting attacks, including privilege escalation. This functionality should therefore not have been made available to editor-level users.

The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.

https://github.com/advisories/GHSA-2473-9hgq-j7xw CVE-2020-15118 2020-07-20 2020-07-24
pango -- buffer overflow pango 1.42.4_5

Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is: The heap based buffer overflow can be used to get code execution. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condition. The attack vector is: Bug can be used when application pass invalid utf-8 strings to functions like pango_itemize.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010238 https://nvd.nist.gov/vuln/detail/CVE-2019-1010238 CVE-2019-1010238 2019-07-19 2020-07-23 2020-09-26
Apache Tomcat -- Multiple Vulnerabilities tomcat7 7.0.105 tomcat85 8.5.57 tomcat9 9.0.37 tomcat-devel 10.0.0.M7

The Apache Software Foundation reports:

An h2c direct connection did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.

The payload length in a WebSocket frame was not correctly validated. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.

A specially crafted sequence of HTTP/2 requests could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.

https://tomcat.apache.org/security-7.html https://tomcat.apache.org/security-8.html https://tomcat.apache.org/security-9.html https://tomcat.apache.org/security-10.html CVE-2020-11996 CVE-2020-13934 CVE-2020-13935 2020-07-05 2020-07-23 2020-07-23
Python -- multiple vulnerabilities python38 3.8.4

Python reports:

bpo-41162:Audit hooks are now cleared later during finalization to avoid missing events.

bpo-29778:Ensure python3.dll is loaded from correct locations when Python is embedded.

https://docs.python.org/3/whatsnew/changelog.html#python-3-8-4-final CVE-2020-15523 2020-06-29 2020-07-20
VirtualBox -- Multiple vulnerabilities virtualbox-ose 5.25.2.44 6.06.0.24 6.16.1.12

Oracle reports:

Vulnerabilities in VirtualBox core can allow users with logon access to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of these vulnerabilities can result in unauthorized access to critical data, access to all Oracle VM VirtualBox accessible data, unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) or takeover of Oracle VM VirtualBox.

https://www.oracle.com/security-alerts/cpujul2020.html CVE-2020-14628 CVE-2020-14629 CVE-2020-14646 CVE-2020-14647 CVE-2020-14648 CVE-2020-14649 CVE-2020-14650 CVE-2020-14673 CVE-2020-14674 CVE-2020-14675 CVE-2020-14676 CVE-2020-14677 CVE-2020-14694 CVE-2020-14695 CVE-2020-14698 CVE-2020-14699 CVE-2020-14700 CVE-2020-14703 CVE-2020-14704 CVE-2020-14707 CVE-2020-14711 CVE-2020-14712 CVE-2020-14713 CVE-2020-14714 CVE-2020-14715 2020-07-14 2020-07-19
clamav -- multiple vulnerabilities clamav 0.102.4,1

Micah Snyder reports:

CVE-2020-3350
Fixed a vulnerability a malicious user could exploit to replace a scan target's directory with a symlink to another path to trick clamscan, clamdscan, or clamonacc into removing or moving a different file (such as a critical system file). The issue would affect users that use the --move or --remove options for clamscan, clamdscan and clamonacc.
CVE-2020-3327
Fixed a vulnerability in the ARJ archive-parsing module in ClamAV 0.102.3 that could cause a denial-of-service (DoS) condition. Improper bounds checking resulted in an out-of-bounds read that could cause a crash. The previous fix for this CVE in version 0.102.3 was incomplete. This fix correctly resolves the issue.
CVE-2020-3481
Fixed a vulnerability in the EGG archive module in ClamAV 0.102.0 - 0.102.3 that could cause a denial-of-service (DoS) condition. Improper error handling could cause a crash due to a NULL pointer dereference. This vulnerability is mitigated for those using the official ClamAV signature databases because the file type signatures in daily.cvd will not enable the EGG archive parser in affected versions.
https://blog.clamav.net/2020/07/clamav-01024-security-patch-released.html CVE-2020-3350 CVE-2020-3327 CVE-2020-3481 2020-07-16 2020-07-16
OpenEXR/ilmbase 2.5.2 -- patch release with various bug/security fixes ilmbase 2.5.2 openexr 2.5.2

Cary Phillips reports:

openexr 2.5.2 [is a p]atch release with various bug/security and build/install fixes:

  • Invalid input could cause a heap-use-after-free error in DeepScanLineInputFile::DeepScanLineInputFile()
  • Invalid chunkCount attributes could cause heap buffer overflow in getChunkOffsetTableSize()
  • Invalid tiled input file could cause invalid memory access TiledInputFile::TiledInputFile()
https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.5.2 2020-05-18 2020-07-16
chromium -- multiple vulnerabilities chromium 84.0.4147.89

Chrome Releases reports:

This update contains 38 security fixes, including:

  • [1103195] Critical CVE-2020-6510: Heap buffer overflow in background fetch. Reported by Leecraso and Guang Gong of 360 Alpha Lab working with 360 BugCloud on 2020-07-08
  • [1074317] High CVE-2020-6511: Side-channel information leakage in content security policy. Reported by Mikhail Oblozhikhin on 2020-04-24
  • [1084820] High CVE-2020-6512: Type Confusion in V8. Reported by nocma, leogan, cheneyxu of WeChat Open Platform Security Team on 2020-05-20
  • [1091404] High CVE-2020-6513: Heap buffer overflow in PDFium. Reported by Aleksandar Nikolic of Cisco Talos on 2020-06-04
  • [1076703] High CVE-2020-6514: Inappropriate implementation in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2020-04-30
  • [1082755] High CVE-2020-6515: Use after free in tab strip. Reported by DDV_UA on 2020-05-14
  • [1092449] High CVE-2020-6516: Policy bypass in CORS. Reported by Yongke Wang(@Rudykewang) and Aryb1n(@aryb1n) of Tencent Security Xuanwu Lab on 2020-06-08
  • [1095560] High CVE-2020-6517: Heap buffer overflow in history. Reported by ZeKai Wu (@hellowuzekai) of Tencent Security Xuanwu Lab on 2020-06-16
  • [986051] Medium CVE-2020-6518: Use after free in developer tools. Reported by David Erceg on 2019-07-20
  • [1064676] Medium CVE-2020-6519: Policy bypass in CSP. Reported by Gal Weizman (@WeizmanGal) of PerimeterX on 2020-03-25
  • [1092274] Medium CVE-2020-6520: Heap buffer overflow in Skia. Reported by Zhen Zhou of NSFOCUS Security Team on 2020-06-08
  • [1075734] Medium CVE-2020-6521: Side-channel information leakage in autofill. Reported by Xu Lin (University of Illinois at Chicago), Panagiotis Ilia (University of Illinois at Chicago), Jason Polakis (University of Illinois at Chicago) on 2020-04-27
  • [1052093] Medium CVE-2020-6522: Inappropriate implementation in external protocol handlers. Reported by Eric Lawrence of Microsoft on 2020-02-13
  • [1080481] Medium CVE-2020-6523: Out of bounds write in Skia. Reported by Liu Wei and Wu Zekai of Tencent Security Xuanwu Lab on 2020-05-08
  • [1081722] Medium CVE-2020-6524: Heap buffer overflow in WebAudio. Reported by Sung Ta (@Mipu94) of SEFCOM Lab, Arizona State University on 2020-05-12
  • [1091670] Medium CVE-2020-6525: Heap buffer overflow in Skia. Reported by Zhen Zhou of NSFOCUS Security Team on 2020-06-05
  • [1074340] Low CVE-2020-6526: Inappropriate implementation in iframe sandbox. Reported by Jonathan Kingston on 2020-04-24
  • [992698] Low CVE-2020-6527: Insufficient policy enforcement in CSP. Reported by Zhong Zhaochen of andsecurity.cn on 2019-08-10
  • [1063690] Low CVE-2020-6528: Incorrect security UI in basic auth. Reported by Rayyan Bijoora on 2020-03-22
  • [978779] Low CVE-2020-6529: Inappropriate implementation in WebRTC. Reported by kaustubhvats7 on 2019-06-26
  • [1016278] Low CVE-2020-6530: Out of bounds memory access in developer tools. Reported by myvyang on 2019-10-21
  • [1042986] Low CVE-2020-6531: Side-channel information leakage in scroll to text. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2020-01-17
  • [1069964] Low CVE-2020-6533: Type Confusion in V8. Reported by Avihay Cohen @ SeraphicAlgorithms on 2020-04-11
  • [1072412] Low CVE-2020-6534: Heap buffer overflow in WebRTC. Reported by Anonymous on 2020-04-20
  • [1073409] Low CVE-2020-6535: Insufficient data validation in WebUI. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2020-04-22
  • [1080934] Low CVE-2020-6536: Incorrect security UI in PWAs. Reported by Zhiyang Zeng of Tencent security platform department on 2020-05-09
CVE-2020-6510 CVE-2020-6511 CVE-2020-6512 CVE-2020-6513 CVE-2020-6514 CVE-2020-6515 CVE-2020-6516 CVE-2020-6517 CVE-2020-6518 CVE-2020-6519 CVE-2020-6520 CVE-2020-6521 CVE-2020-6522 CVE-2020-6523 CVE-2020-6524 CVE-2020-6525 CVE-2020-6526 CVE-2020-6527 CVE-2020-6528 CVE-2020-6529 CVE-2020-6530 CVE-2020-6531 CVE-2020-6533 CVE-2020-6534 CVE-2020-6535 CVE-2020-6536 https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html 2020-07-14 2020-07-15
jenkins -- multiple vulnerabilities jenkins 2.245 jenkins-lts 2.235.2

Jenkins Security Advisory:

Description

(High) SECURITY-1868 / CVE-2020-2220

Stored XSS vulnerability in job build time trend

(High) SECURITY-1901 / CVE-2020-2221

Stored XSS vulnerability in upstream cause

(High) SECURITY-1902 / CVE-2020-2222

Stored XSS vulnerability in 'keep forever' badge icons

(High) SECURITY-1945 / CVE-2020-2223

Stored XSS vulnerability in console links

CVE-2020-2220 CVE-2020-2221 CVE-2020-2222 CVE-2020-2223 https://www.jenkins.io/security/advisory/2020-07-15/ 2020-07-15 2020-07-15
MySQL -- Multiple vulnerabilities mysql56-client 5.6.49 mysql56-server 5.6.49 mysql57-client 5.7.31 mysql57-server 5.7.31 mysql80-client 8.0.21 mysql80-server 8.0.21

Oracle reports:

This Critical Patch Update contains 40 new security patches for Oracle MySQL. 6 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.

The highest CVSS v3.1 Base Score of vulnerabilities affecting Oracle MySQL is 9.8.

This Pre-Release Announcement provides advance information about the Oracle Critical Patch Update for July 2020, which will be released on Tuesday, July 14, 2020.

https://www.oracle.com/security-alerts/cpujul2020.html 2020-07-07 2020-07-11
FreeBSD -- IPv6 socket option race condition and use after free FreeBSD-kernel 12.112.1_7 11.411.4_1 11.311.3_11

Problem Description:

The IPV6_2292PKTOPTIONS set handler was missing synchronization, so racing accesses could modify freed memory.

Impact:

A malicious user application could trigger memory corruption, leading to privilege escalation.

CVE-2020-7457 SA-20:20.ipv6 2020-07-09 2020-07-10
FreeBSD -- posix_spawnp(3) buffer overflow FreeBSD 11.411.4_1

Problem Description:

posix_spawnp spawns a new thread with a limited stack allocated on the heap before delegating to execvp for the final execution within that thread.

execvp would previously make unbounded allocations on the stack, directly proportional to the length of the user-controlled PATH environment variable.

Impact:

Long values in the user-controlled PATH environment variable cause posix_spawnp to write beyond the end of stack that was allocated, ultimately overflowing the heap-allocated stack with a direct copy of the value stored in PATH.

CVE-2020-7458 SA-20:18.posix_spawnp 2020-07-09 2020-07-10
mybb -- multible vulnerabilities mybb 1.8.22

mybb Team reports:

High risk: Installer RCE on settings file write

Medium risk: Arbitrary upload paths and Local File Inclusion RCE

Medium risk: XSS via insufficient HTML sanitization of Blog feed and Extend data

Low risk: Open redirect on login

Low risk: SCEditor reflected XSS

https://blog.mybb.com/2019/12/30/mybb-1-8-22-released-security-maintenance-release/ 2019-12-30 2020-07-09
kramdown -- template option vulnerability rubygem-kramdown 2.3.0

kramdown news:

CVE-2020-14001 is addressed to avoid problems when using the {::options /} extension together with the 'template' option.

https://kramdown.gettalong.org/news.html CVE-2020-14001 2020-06-28 2020-07-08
Mbed TLS -- Side-channel attack on ECC key import and validation mbedtls 2.16.7

Manuel Pégourié-Gonnard reports:

The scalar multiplication function in Mbed TLS accepts a random number generator (RNG) as an optional argument and, if provided, uses it to protect against some attacks.

It is the caller's responsibility to provide a RNG if protection against side-channel attacks is desired; however two groups of functions in Mbed TLS itself fail to pass a RNG:

  1. mbedtls_pk_parse_key() and mbedtls_pk_parse_keyfile()
  2. mbedtls_ecp_check_pub_priv() and mbedtls_pk_check_pair()

When those functions are called, scalar multiplication is computed without randomisation, a number of old and new attacks apply, allowing a powerful local attacker to fully recover the private key.

https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07 2020-07-01 2020-07-07
Gitlab -- Multiple Vulnerabilities gitlab-ce 13.1.013.1.3 13.0.013.0.9 012.10.14

Gitlab reports:

Workhorse bypass allows files in /tmp to be read via Maven Repository APIs

https://about.gitlab.com/releases/2020/07/06/critical-security-release-gitlab-13-1-3-released/ CVE-2020-15525 2020-07-06 2020-07-07
Python -- multiple vulnerabilities python37 3.7.8

Python reports:

The AbstractBasicAuthHandler class of the urllib.request module uses an inefficient regular expression which can be exploited by an attacker to cause a denial of service. Fix the regex to prevent the catastrophic backtracking. Vulnerability reported by Ben Caller and Matt Schwager.

Disallow control characters in hostnames in http.client, addressing CVE-2019-18348. Such potentially malicious header injection URLs now cause a InvalidURL to be raised.

Disallow CR or LF in email.headerregistry.Address arguments to guard against header injection attacks.

https://docs.python.org/3.7/whatsnew/changelog.html#changelog CVE-2019-18348 CVE-2020-8492 2019-10-24 2020-07-06
samba -- Multiple Vulnerabilities samba410 4.10.17 samba411 4.11.11 samba412 4.12.4

The Samba Team reports:

Four vulnerabilities were fixed in samba:

  • CVE-2020-10730: NULL pointer de-reference and use-after-free in Samba AD DC LDAP Server with ASQ, VLV and paged_results
  • CVE-2020-10745: Parsing and packing of NBT and DNS packets can consume excessive CPU in the AD DC (only)
  • CVE-2020-10760: LDAP Use-after-free in Samba AD DC Global Catalog with paged_results and VLV
  • CVE-2020-14303: Empty UDP packet DoS in Samba AD DC nbtd
https://www.samba.org/samba/security/CVE-2020-10730.html https://www.samba.org/samba/security/CVE-2020-10745.html https://www.samba.org/samba/security/CVE-2020-10760.html https://www.samba.org/samba/security/CVE-2020-14303.html CVE-2020-10730 CVE-2020-10745 CVE-2020-10760 CVE-2020-14303 2020-07-02 2020-07-02
Anydesk -- Multiple Vulnerabilities anydesk 5.5.5

Anydesk reports:

AnyDesk before 5.5.3 on Linux and FreeBSD has a format string vulnerability that can be exploited for remote code execution.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13160 CVE-2020-13160 2020-06-10 2020-07-04
py-matrix-synapse -- multiple vulnerabilities py36-matrix-synapse py37-matrix-synapse py38-matrix-synapse 1.15.2

Matrix developers report:

Due to the two security issues highlighted below, server administrators are encouraged to update Synapse. We are not aware of these vulnerabilities being exploited in the wild.

  • A malicious homeserver could force Synapse to reset the state in a room to a small subset of the correct state. This affects all Synapse deployments which federate with untrusted servers.
  • HTML pages served via Synapse were vulnerable to clickjacking attacks. This predominantly affects homeservers with single-sign-on enabled, but all server administrators are encouraged to upgrade.
https://github.com/matrix-org/synapse/releases/tag/v1.15.2 2020-07-02 2020-07-03
dbus file descriptor leak dbus 1.12.18

GitHub Security Lab reports:

D-Bus has a file descriptor leak, which can lead to denial of service when the dbus-daemon runs out of file descriptors. An unprivileged local attacker can use this to attack the system dbus-daemon, leading to denial of service for all users of the machine.

https://gitlab.freedesktop.org/dbus/dbus/-/issues/294 https://www.openwall.com/lists/oss-security/2020/06/04/3 CVE-2020-12049 2020-04-09 2020-07-03
Gitlab -- Multiple Vulnerabilities gitlab-ce 13.1.013.1.2 13.0.013.0.8 012.10.13

Gitlab reports:

Missing Permission Check on Time Tracking

Cross-Site Scripting in PyPi Files API

Insecure Authorization Check on Private Project Security Dashboard

Cross-Site Scripting in References

Cross-Site Scripting in Group Names

Cross-Site Scripting in Blob Viewer

Cross-Site Scripting in Error Tracking

Insecure Authorisation Check on Creation and Deletion of Deploy Tokens

User Name Format Restiction Bypass

Denial of Service in Issue Comments

Cross-Site Scripting in Wiki Pages

Private Merge Request Updates Leaked via Todos

Private User Activity Leaked via API

Cross-Site Scripting in Bitbucket Import Feature

Github Project Restriction Bypass

Update PCRE Dependency

Update Kaminari Gem

Cross-Site Scripting in User Profile

Update Xterm.js

https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ CVE-2020-14155 CVE-2020-11082 CVE-2019-0542 2020-07-01 2020-07-02
coturn -- information leakage coturn 4.5.1.3

Felix Dörre reports:

The issue is that STUN/TURN response buffer is not initialized properly. (CWE 665) This is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client.

https://github.com/coturn/coturn/commit/fdf7065d0f8e676feaf6734e86370f6dadfb8eec CVE-2020-4067 2020-06-30 2020-07-02
powerdns-recursor -- access restriction bypass powerdns-recursor 4.3.04.3.2 4.2.04.2.3 4.1.04.1.17

PowerDNS Team reports:

CVE-2020-14196: An issue has been found in PowerDNS Recursor where the ACL applied to the internal web server via webserver-allow-from is not properly enforced, allowing a remote attacker to send HTTP queries to the internal web server, bypassing the restriction. In the default configuration the API webserver is not enabled. Only installations using a non-default value for webserver and webserver-address are affected.

https://doc.powerdns.com/recursor/security-advisories/index.html CVE-2020-14196 2020-07-01 2020-07-02
drupal -- Multiple Vulnerabilities drupal7 7.72

Drupal Security Team reports:

The Drupal core Form API does not properly handle certain form input from cross-site requests, which can lead to other vulnerabilities.

https://www.drupal.org/sa-core-2020-004 2020-06-17 2020-07-01
xrdp -- Local users can perform a buffer overflow attack against the xrdp-sesman service and then inpersonate it xrdp 0.9.13.1,1

Ashley Newson reports:

The xrdp-sesman service can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350.

https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4044 CVE-2020-4044 2020-06-02 2020-06-30
MongoDB -- Ensure RoleGraph can serialize authentication restrictions to BSON mongodb36 3.6.18 mongodb40 4.0.15 mongodb42 4.2.3

reports:

Improper serialization of MongoDB Server's internal authorization state permits a user with valid credentials to bypass IP source address protection mechanisms following administrative action.

Credit
Discovered by Tony Yesudas.

CVE-2020-7921 2020-01-10 2020-06-29
libvorbis -- two vulnerabilities libvorbis 1.3.6_1,3

Two vulnerabilities were fixed in the upstream repository:

https://www.openwall.com/lists/oss-security/2017/09/21/2 CVE-2017-14160 https://gitlab.xiph.org/xiph/vorbis/-/issues/2335 CVE-2018-10392 2017-09-21 2020-06-28
PuTTY -- Release 0.74 fixes two security vulnerabilities putty 0.74 putty-gtk2 0.74 putty-nogtk 0.74

Simon Tatham reports:

[Release 0.74] fixes the following security issues:

  • New configuration option to disable PuTTY's default policy of changing its host key algorithm preferences to prefer keys it already knows. (There is a theoretical information leak in this policy.) [CVE-2020-14002]
  • In some situations an SSH server could cause PuTTY to access freed mdmory by pretending to accept an SSH key and then refusing the actual signature. It can only happen if you're using an SSH agent.
https://lists.tartarus.org/pipermail/putty-announce/2020/000030.html https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-dynamic-hostkey-info-leak.html https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ CVE-2020-14002 https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-keylist-used-after-free.html 2020-06-27 2020-06-28
chromium -- multiple vulnerabilities chromium 83.0.4103.116

Chrome Releases reports:

This update includes 2 security fixes, including:

  • [1092308] High CVE-2020-6509: Use after free in extensions. Reported by Anonymous on 2020-06-08
CVE-2020-6509 https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop_22.html 2020-06-22 2020-06-24
Machine-in-the-middle response injection attack when using STARTTLS with IMAP, POP3, and SMTP mutt 1.14.3

mutt 1.14.4 updates:

CVE-2020-14954 - Machine-in-the-middle response injection attack when using STARTTLS with IMAP, POP3, and SMTP

CVE-2020-14954 https://gitlab.com/muttmua/mutt/-/commit/c547433cdf2e79191b15c6932c57f1472bfb5ff4 2020-06-16 2020-06-24
IMAP fcc/postpone machine-in-the-middle attack mutt 1.14.2

mutt 1.14.3 updates:

CVE-2020-14093 - IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.

https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01 CVE-2020-14093 2020-06-14 2020-06-24
curl -- multiple vulnerabilities curl 7.20.07.71.0

curl security problems:

CVE-2020-8169: Partial password leak over DNS on HTTP redirect

libcurl can be tricked to prepend a part of the password to the host name before it resolves it, potentially leaking the partial password over the network and to the DNS server(s).

libcurl can be given a username and password for HTTP authentication when requesting an HTTP resource - used for HTTP Authentication such as Basic, Digest, NTLM and similar. The credentials are set, either together with CURLOPT_USERPWD or separately with CURLOPT_USERNAME and CURLOPT_PASSWORD. Important detail: these strings are given to libcurl as plain C strings and they are not supposed to be URL encoded.

In addition, libcurl also allows the credentials to be set in the URL, using the standard RFC 3986 format: http://user:password@host/path. In this case, the name and password are URL encoded as that's how they appear in URLs.

If the options are set, they override the credentials set in the URL.

Internally, this is handled by storing the credentials in the "URL object" so that there is only a single set of credentials stored associated with this single URL.

When libcurl handles a relative redirect (as opposed to an absolute URL redirect) for an HTTP transfer, the server is only sending a new path to the client and that path is applied on to the existing URL. That "applying" of the relative path on top of an absolute URL is done by libcurl first generating a full absolute URL out of all the components it has, then it applies the redirect and finally it deconstructs the URL again into its separate components.

This security vulnerability originates in the fact that curl did not correctly URL encode the credential data when set using one of the curl_easy_setopt options described above. This made curl generate a badly formatted full URL when it would do a redirect and the final re-parsing of the URL would then go bad and wrongly consider a part of the password field to belong to the host name.

The wrong host name would then be used in a name resolve lookup, potentially leaking the host name + partial password in clear text over the network (if plain DNS was used) and in particular to the used DNS server(s).

CVE-2020-8177: curl overwrite local file with -J

curl can be tricked by a malicious server to overwrite a local file when using -J (--remote-header-name) and -i (--include) in the same command line.

The command line tool offers the -J option that saves a remote file using the file name present in the Content-Disposition: response header. curl then refuses to overwrite an existing local file using the same name, if one already exists in the current directory.

The -J flag is designed to save a response body, and so it doesn't work together with -i and there's logic that forbids it. However, the check is flawed and doesn't properly check for when the options are used in the reversed order: first using -J and then -i were mistakenly accepted.

The result of this mistake was that incoming HTTP headers could overwrite a local file if one existed, as the check to avoid the local file was done first when body data was received, and due to the mistake mentioned above, it could already have received and saved headers by that time.

The saved file would only get response headers added to it, as it would abort the saving when the first body byte arrives. A malicious server could however still be made to send back virtually anything as headers and curl would save them like this, until the first CRLF-CRLF sequence appears.

(Also note that -J needs to be used in combination with -O to have any effect.)

https://curl.haxx.se/docs/security.html https://curl.haxx.se/docs/CVE-2020-8169.html https://curl.haxx.se/docs/CVE-2020-8177.html CVE-2020-8169 CVE-2020-8177 2020-06-24 2020-06-24
CUPS -- memory corruption cups 2.3.3_1

Apple reports:

  • CVE-2019-8842: The ippReadIO function may under-read an extension.
  • CVE-2020-3898: The ppdOpen function did not handle invalid UI constraint. ppdcSource::get_resolution function did not handle invalid resolution strings. An application may be able to gain elevated privileges.
https://github.com/apple/cups/releases/tag/v2.3.3 https://support.apple.com/en-us/HT211100 CVE-2019-8842 CVE-2020-3898 2020-04-28 2020-06-24
Rails -- permission vulnerability rubygem-actionpack60 6.0.3.2

Ruby on Rails blog:

Rails 6.0.3.2 has been released! This version of Rails contains an important security patch, and you should upgrade! The release contains only one patch that addresses CVE-2020-8185.

https://weblog.rubyonrails.org/2020/6/17/Rails-6-0-3-2-has-been-released/ https://github.com/rails/rails/blob/6-0-stable/actionpack/CHANGELOG.md https://groups.google.com/forum/#!topic/rubyonrails-security/pAe9EV8gbM0 CVE-2020-8185 2020-06-17 2020-06-22
vlc heap-based buffer overflow vlc 3.0.11,4

Thomas Guillem reports:

A heap-based buffer overflow in the hxxx_AnnexB_to_xVC function in modules/packetizer/hxxx_nal.c in VideoLAN VLC media player before 3.0.11 allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted H.264 Annex-B video (.avi for example) file.

https://nvd.nist.gov/vuln/detail/CVE-2020-13428 CVE-2020-13428 2020-05-27 2020-06-17
Several issues in Lynis lynis 2.0.02.7.5

lynis update:

This release resolves two security issues

https://github.com/CISOfy/lynis/blob/master/CHANGELOG.md#security-issues 2020-06-18 2020-06-18
BIND -- Remote Denial of Service vulnerability bind911 9.11.149.11.20 bind916 9.16.09.16.4

ISC reports:

The asterisk character ("*") is allowed in DNS zone files, where it is most commonly present as a wildcard at a terminal node of the Domain Name System graph. However, the RFCs do not require and BIND does not enforce that an asterisk character be present only at a terminal node.

A problem can occur when an asterisk is present in an empty non-terminal location within the DNS graph. If such a node exists, after a series of queries, named can reach an inconsistent state that results in the failure of an assertion check in rbtdb.c, followed by the program exiting due to the assertion failure.

CVE-2020-8619 https://kb.isc.org/docs/cve-2020-8619 2020-06-17 2020-06-18
BIND -- Remote Denial of Service vulnerability bind916 9.16.09.16.4

ISC reports:

An assertion check in BIND (that is meant to prevent going beyond the end of a buffer when processing incoming data) can be incorrectly triggered by a large response during zone transfer.

CVE-2020-8618 https://kb.isc.org/docs/cve-2020-8618 2020-06-17 2020-06-18
LibreOffice Security Advisory libreoffice 6.4.4

LibreOffice reports:

Two flaws were found in LibreOffice:

  • CVE-2020-12802: remote graphics contained in docx format retrieved in 'stealth mode'
  • CVE-2020-12803: XForms submissions could overwrite local files
https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12802 https://www.libreoffice.org/about-us/security/advisories/cve-2020-12803 CVE-2020-12802 CVE-2020-12803 2020-06-08 2020-06-12
several security issues in sqlite3 sqlite3 3.32.2,1 FreeBSD 12.112.1_8 11.411.4_2 11.311.3_12

sqlite3 update:

Various security issues could be used by an attacker to cause SQLite to crash, resulting in a denial of service, or possibly execute arbitrary code.

https://nvd.nist.gov/vuln/detail/CVE-2020-11655 CVE-2020-11655 https://nvd.nist.gov/vuln/detail/CVE-2020-13434 CVE-2020-13434 https://nvd.nist.gov/vuln/detail/CVE-2020-13435 CVE-2020-13435 https://nvd.nist.gov/vuln/detail/CVE-2020-13630 CVE-2020-13630 https://nvd.nist.gov/vuln/detail/CVE-2020-13631 CVE-2020-13631 https://nvd.nist.gov/vuln/detail/CVE-2020-13632 CVE-2020-13632 SA-20:22.sqlite 2020-05-25 2020-06-10 2020-08-06
Node.js -- June 2020 Security Releases node 14.4.0 node12 12.18.0 node10 10.21.0

Node.js reports:

Updates are now available for all supported Node.js release lines for the following issues.

TLS session reuse can lead to host certificate verification bypass (High) (CVE-2020-8172)

The 'session' event could be emitted before the 'secureConnect' event. It should not be, because the connection may fail to be authorized. If it was saved an authorized connection could be established later with the session ticket. Note that the https agent caches sessions, so is vulnerable to this.

The 'session' event will now only be emitted after the 'secureConnect' event, and only for authorized connections.

HTTP/2 Large Settings Frame DoS (Low) (CVE-2020-11080)

Receiving unreasonably large HTTP/2 SETTINGS frames can consume 100% CPU to process all the settings, blocking all other activities until complete.

The HTTP/2 session frame is limited to 32 settings by default. This can be configured if necessary using the maxSettings option.

napi_get_value_string_*() allows various kinds of memory corruption (High) (CVE-2020-8174)

Calling napi_get_value_string_latin1(), napi_get_value_string_utf8(), or napi_get_value_string_utf16() with a non-NULL buf, and a bufsize of 0 will cause the entire string value to be written to buf, probably overrunning the length of the buffer.

A exploit has not been reported and it may be difficult but the following is suggested:

  • All users of LTS Node.js versions should update to the versions announced in this security post. This will address the issue for any non pre-built add-on.
  • Maintainers who support EOL Node.js versions and/or build against a version of Node.js that did not support N-API internally should update to use the new versions of node-addon-api 1.x and 2.x that will be released soon after this announcement.

ICU-20958 Prevent SEGV_MAPERR in append (High) (CVE-2020-10531)

An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.

Fix was applied to 10.x in an abundance of caution, even though there is no known way to trigger the overflow in 10.x.

https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/ CVE-2020-8174 CVE-2020-8172 CVE-2020-10531 CVE-2020-11080 2020-06-02 2020-06-12
tcpreplay -- Multiple vulnerabilities tcpreplay 4.3.2

fklassen on Github reports:

This release fixes the following security issues:

  • memory access in do_checksum()
  • NULL pointer dereference get_layer4_v6()
  • NULL pointer dereference get_ipv6_l4proto()
https://github.com/appneta/tcpreplay/releases/tag/v4.3.2 CVE-2019-8381 CVE-2019-8376 CVE-2019-8377 2019-03-12 2020-06-11
znc -- Authenticated users can trigger an application crash znc 1.8.01.8.1

Mitre reports:

ZNC 1.8.0 up to 1.8.1-rc1 allows attackers to trigger an application crash (with a NULL pointer dereference) if echo-message is not enabled and there is no network.

CVE-2020-13775 https://wiki.znc.in/ChangeLog/1.8.1 2020-06-02 2020-06-10
NPM -- Multiple vulnerabilities npm 6.13.4

NPM reports:

Global node_modules Binary Overwrite

Symlink reference outside of node_modules

Arbitrary File Write

https://nodejs.org/en/blog/vulnerability/december-2019-security-releases/ CVE-2019-16775 CVE-2019-16776 CVE-2019-16777 2019-12-18 2020-06-10
libadplug -- Various vulnerabilities libadplug 2.3.3

Malvineous on Github reports:

This release fixes the following security issues:

  • buffer overflow in .bmf
  • buffer overflow in .dtm
  • buffer overflow in .mkj
  • buffer overflow in .a2m
  • buffer overflow in .rad
  • buffer overflow in .mtk
  • double free and OOB reads in .u6m
https://github.com/adplug/adplug/releases/tag/adplug-2.3.3 CVE-2019-14690 CVE-2019-14691 CVE-2019-14692 CVE-2019-14732 CVE-2019-14733 CVE-2019-14734 CVE-2019-15151 2020-06-08 2020-06-10
zeek -- Various vulnerabilities zeek 3.0.7

Jon Siwek of Corelight reports:

This release fixes the following security issues:

  • Fix potential stack overflow in NVT analyzer
  • Fix NVT analyzer memory leak from multiple telnet authn name options
  • Fix multiple content-transfer-encoding headers causing a memory leak
  • Fix potential leak of Analyzers added to tree during Analyzer::Done
  • Prevent IP fragment reassembly on packets without minimal IP header
https://raw.githubusercontent.com/zeek/zeek/v3.0.7/NEWS 2020-05-04 2020-06-10
Flash Player -- arbitrary code execution linux-flashplayer 32.0.0.387

Adobe reports:

  • This update resolves a use-after-free vulnerability that could lead to arbitrary code execution (CVE-2020-9633).
CVE-2020-9633 https://helpx.adobe.com/security/products/flash-player/apsb20-30.html 2020-06-09 2020-06-09
FreeBSD -- USB HID descriptor parsing error FreeBSD-kernel 12.112.1_6 11.311.3_10

Problem Description:

If the push/pop level of the USB HID state is not restored within the processing of the same HID item, an invalid memory location may be used for subsequent HID item processing.

Impact:

An attacker with physical access to a USB port may be able to use a specially crafted USB device to gain kernel or user-space code execution.

CVE-2020-7456 SA-20:17.usb 2020-06-03 2020-06-09
FreeRDP -- multiple vulnerabilities freerdp 2.1.1

The FreeRDP changelog reports 14 CVEs addressed after 2.0.0-rc4

https://github.com/FreeRDP/FreeRDP/blob/2.1.1/ChangeLog CVE-2020-11521 CVE-2020-11522 CVE-2020-11523 CVE-2020-11524 CVE-2020-11525 CVE-2020-11526 CVE-2020-11039 CVE-2020-11038 CVE-2020-11043 CVE-2020-11040 CVE-2020-11041 CVE-2020-11019 CVE-2020-11017 CVE-2020-11018 2020-04-10 2020-05-28
chromium -- multiple vulnerabilities chromium 83.0.4103.97

Chrome Releases reports:

This update includes 5 security fixes. Below, we highlight fixes that were contributed by external researchers.

  • [1082105] High CVE-2020-6493: Use after free in WebAuthentication. Reported by Anonymous on 2020-05-13
  • [1083972] High CVE-2020-6494: Incorrect security UI in payments. Reported by Juho Nurminen on 2020-05-18
  • [1072116] High CVE-2020-6495: Insufficient policy enforcement in developer tools. Reported by David Erceg on 2020-04-18
  • [1085990] High CVE-2020-6496: Use after free in payments. Reported by Khalil Zhani on 2020-05-24
CVE-2020-6493 CVE-2020-6494 CVE-2020-6495 CVE-2020-6496 https://chromereleases.googleblog.com/2020/06/stable-channel-update-for-desktop.html 2020-06-03 2020-06-05
Gitlab -- Multiple Vulnerabilities gitlab-ce 13.0.013.0.4 12.10.012.10.9 10.6.012.9.9

Gitlab reports:

CI Token Access Control

https://about.gitlab.com/releases/2020/06/03/critical-security-release-13-0-4-released/ 2020-06-03 2020-06-04
Django -- multiple vulnerabilities py36-django22 py37-django22 py38-django22 2.2.13 py36-django30 py37-django30 py38-django30 3.0.7

Django security release reports:

CVE-2020-13254: Potential data leakage via malformed memcached keys

In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage. In order to avoid this vulnerability, key validation is added to the memcached cache backends.

CVE-2020-13596: Possible XSS via admin ForeignKeyRawIdWidget

Query parameters for the admin ForeignKeyRawIdWidget were not properly URL encoded, posing an XSS attack vector. ForeignKeyRawIdWidget now ensures query parameters are correctly URL encoded.

https://www.djangoproject.com/weblog/2020/jun/03/security-releases/ CVE-2020-13254 CVE-2020-13596 2020-06-01 2020-06-04
malicious URLs may present credentials to wrong server git 2.26.02.26.1 2.25.02.25.3 2.24.02.24.2 2.23.02.23.2 2.22.02.22.3 2.21.02.21.2 2.20.02.20.3 2.19.02.19.4 2.18.02.18.3 02.17.4 git-lite 2.26.02.26.1 2.25.02.25.3 2.24.02.24.2 2.23.02.23.2 2.22.02.22.3 2.21.02.21.2 2.20.02.20.3 2.19.02.19.4 2.18.02.18.3 02.17.4 git-gui 2.26.02.26.1 2.25.02.25.3 2.24.02.24.2 2.23.02.23.2 2.22.02.22.3 2.21.02.21.2 2.20.02.20.3 2.19.02.19.4 2.18.02.18.3 02.17.4

git security advisory reports:

Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server for an HTTP request being made to another server, resulting in credentials for the former being sent to the latter.

https://github.com/git/git/security/advisories/GHSA-qm7j-c969-7j4q CVE-2020-5260 2020-04-14 2020-04-22
malicious URLs can cause git to send a stored credential to wrong server git 2.26.02.26.2 2.25.02.25.4 2.24.02.24.3 2.23.02.23.3 2.22.02.22.4 2.21.02.21.3 2.20.02.20.4 2.19.02.19.5 2.18.02.18.4 02.17.5 git-lite 2.26.02.26.2 2.25.02.25.4 2.24.02.24.3 2.23.02.23.3 2.22.02.22.4 2.21.02.21.3 2.20.02.20.4 2.19.02.19.5 2.18.02.18.4 02.17.5 git-gui 2.26.02.26.2 2.25.02.25.4 2.24.02.24.3 2.23.02.23.3 2.22.02.22.4 2.21.02.21.3 2.20.02.20.4 2.19.02.19.5 2.18.02.18.4 02.17.5

git security advisory reports:

Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that are considered illegal as of the recently published Git versions can cause Git to send a "blank" pattern to helpers, missing hostname and protocol fields. Many helpers will interpret this as matching any URL, and will return some unspecified stored password, leaking the password to an attacker's server.

https://github.com/git/git/security/advisories/GHSA-hjc9-x69f-jqj7 CVE-2020-11008 2020-04-20 2020-04-22
GnuTLS -- flaw in TLS session ticket key construction gnutls 3.6.14

The GnuTLS project reports:

It was found that GnuTLS 3.6.4 introduced a regression in the TLS protocol implementation. This caused the TLS server to not securely construct a session ticket encryption key considering the application supplied secret, allowing a MitM attacker to bypass authentication in TLS 1.3 and recover previous conversations in TLS 1.2.

https://gnutls.org/security-new.html#GNUTLS-SA-2020-06-03 CVE-2020-13777 2020-06-03 2020-06-04
websocket-extensions -- ReDoS vulnerability rubygem-websocket-extensions 0.1.5

Changelog:

Remove a ReDoS vulnerability in the header parser (CVE-2020-7663)

https://github.com/faye/websocket-extensions-ruby/blob/master/CHANGELOG.md https://github.com/faye/websocket-extensions-ruby/commit/aa156a439da681361ed6f53f1a8131892418838b CVE-2020-7663 2020-06-02 2020-06-03
nghttp2 -- DoS vulnerability nghttp2 libnghttp2 1.41.0

nghttp2 security advisories:

The overly large HTTP/2 SETTINGS frame payload causes denial of service.

The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%.

https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr CVE-2020-11080 2020-06-02 2020-06-03
gitea -- multiple vulnerabilities gitea 1.11.6

The Gitea Team reports for release 1.11.6:

  • Fix missing authorization check on pull for public repos of private/limited org (#11656) (#11683)
  • Use session for retrieving org teams (#11438) (#11439)
https://github.com/go-gitea/gitea/releases/tag/v1.11.6 ports/246892 2020-03-01 2020-05-31
kaminari -- potential XSS vulnerability rubygem-kaminari-core 1.2.1

Kaminari Security Advisories:

There was a vulnerability in versions of Kaminari that would allow an attacker to inject arbitrary code into pages with pagination links.

The 1.2.1 gem including the patch has already been released.

All past released versions are affected by this vulnerability.

https://github.com/kaminari/kaminari/security/advisories/GHSA-r5jw-62xg-j433 https://github.com/kaminari/kaminari/blob/master/CHANGELOG.md#121 https://github.com/kaminari/kaminari/pull/1020 CVE-2020-11082 2020-04-22 2020-05-28
Sane -- Multiple Vulnerabilities sane-backends 1.0.30

The Sane Project reports:

epson2: fixes CVE-2020-12867 (GHSL-2020-075) and several memory management issues found while addressing that CVE

epsonds: addresses out-of-bound memory access issues to fix CVE-2020-12862 (GHSL-2020-082) and CVE-2020-12863 (GHSL-2020-083), addresses a buffer overflow fixing CVE-2020-12865 (GHSL-2020-084) and disables network autodiscovery to mitigate CVE-2020-12866 (GHSL-2020-079), CVE-2020-12861 (GHSL-2020-080) and CVE-2020-12864 (GHSL-2020-081). Note that this backend does not support network scanners to begin with.

magicolor: fixes a floating point exception and uninitialized data read

fixes an overflow in sanei_tcp_read()

https://gitlab.com/sane-project/backends/-/releases/1.0.30 CVE-2020-12861 CVE-2020-12862 CVE-2020-12863 CVE-2020-12864 CVE-2020-12865 CVE-2020-12866 CVE-2020-12867 2020-05-17 2020-05-28
Gitlab -- Multiple Vulnerabilities gitlab-ce 13.0.013.0.1 12.10.012.10.7 12.9.012.9.8

Gitlab reports:

User Email Verification Bypass

OAuth Flow Missing Email Verification Checks

Notification Email Verification Bypass

Undisclosed Vulnerability on a Third-Party Rendering Engine

Group Sign-Up Restriction Bypass

Mirror Project Owner Impersonation

Missing Permission Check on Fork Relation Creation

Cross-Site Scripting in Repository Files API

Kubernetes Cluster Token Disclosure

Object Storage File Enumeration

Insecure Authorization Check on Project Deploy Keys

Cross-Site Scripting on Metrics Dashboard

Denial of Service on Custom Dashboards

Client-Side Code Injection through Mermaid Markup

Cross-Site Scripting on Static Site Editor

Disclosure of Amazon EKS Credentials

Denial of Service on Workhorse

https://about.gitlab.com/releases/2020/05/27/security-release-13-0-1-released/ 2020-05-27 2020-05-28
sympa -- Denial of service caused by malformed CSRF token sympa 6.2.54

Javier Moreno discovered a vulnerability in Sympa web interface that can cause denial of service (DoS) attack.

By submitting requests with malformed parameters, this flaw allows to create junk files in Sympa's directory for temporary files. And particularly by tampering token to prevent CSRF, it allows to originate exessive notification messages to listmasters.

CVE-2020-9369 https://sympa-community.github.io/security/2020-001.html 2020-02-24 2020-05-22
sympa - Security flaws in setuid wrappers sympa 6.2.56

A vulnerability has been discovered in Sympa web interface by which attacker can execute arbitrary code with root privileges. Sympa uses two sorts of setuid wrappers:

The FastCGI wrappers wwsympa-wrapper.fcgi and sympa_soap_server-wrapper.fcgi were used to make the web interface running under privileges of a dedicated user.

The newaliases wrapper (sympa_newaliases-wrapper) allows Sympa to update the alias database with root privileges.

Since these setuid wrappers did not clear environment variables, if environment variables like PERL5LIB were injected, forged code might be loaded and executed under privileges of setuid-ed users.

https://sympa-community.github.io/security/2020-002.html 2020-05-24 2020-05-26
powerdns-recursor -- multiple vulnerabilities powerdns-recursor 4.3.04.3.1 4.2.04.2.2 4.1.04.1.16

PowerDNS Team reports:

CVE-2020-10995: An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect.

CVE-2020-12244: An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer. This would allow an attacker in position of man-in-the-middle to send a NXDOMAIN answer for a name that does exist, bypassing DNSSEC validation.

CVE-2020-10030: An issue has been found in PowerDNS Authoritative Server allowing an attacker with enough privileges to change the system's hostname to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not null-terminate the returned string if the hostname is larger than the supplied buffer. Linux systems are not affected because the buffer is always large enough. OpenBSD systems are not affected because the returned hostname is always null-terminated. Under some conditions this issue can lead to the writing of one null-byte out-of-bounds on the stack, causing a denial of service or possibly arbitrary code execution.

https://doc.powerdns.com/recursor/security-advisories/index.html CVE-2020-10995 CVE-2020-12244 CVE-2020-10030 2020-05-19 2020-05-26 2020-05-29
chromium -- multiple vulnerabilities chromium 83.0.4103.61

Google Chrome Releases reports:

This release includes 38 security fixes, including CVEs CVE-2020-6465 through CVE-2020-6491.

CVE-2020-6465 CVE-2020-6466 CVE-2020-6467 CVE-2020-6468 CVE-2020-6469 CVE-2020-6470 CVE-2020-6471 CVE-2020-6472 CVE-2020-6473 CVE-2020-6474 CVE-2020-6475 CVE-2020-6476 CVE-2020-6477 CVE-2020-6478 CVE-2020-6479 CVE-2020-6480 CVE-2020-6481 CVE-2020-6482 CVE-2020-6483 CVE-2020-6484 CVE-2020-6485 CVE-2020-6486 CVE-2020-6487 CVE-2020-6488 CVE-2020-6489 CVE-2020-6490 CVE-2020-6491 https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html 2020-05-19 2020-05-24
piwigo -- Multible Vulnerabilities piwigo 2.10.2

Piwigo reports:

Piwigo 2.10.1 is affected by stored XSS via the Group Name Field to the group_list page.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-8089 CVE-2020-8089 2020-02-07 2020-05-23
Apache Tomcat Remote Code Execution via session persistence tomcat7 7.0.104 tomcat85 8.5.55 tomcat9 9.0.35 tomcat-devel 10.0.0.M5

The Apache Software Foundation reports:

Under certain circumstances an attacker will be able to trigger remote code execution via deserialization of the file under their control

http://tomcat.apache.org/security-7.html http://tomcat.apache.org/security-8.html http://tomcat.apache.org/security-9.html http://tomcat.apache.org/security-10.html CVE-2020-9484 2020-05-12 2020-05-22
unbound -- mutliple vulnerabilities unbound 1.10.1 FreeBSD 12.112.1_7 11.411.4_1 11.311.3_11

NLNetLabs reports:

This release fixes CVE-2020-12662 and CVE-2020-12663.

Bug Fixes:

  • CVE-2020-12662 Unbound can be tricked into amplifying an incoming query into a large number of queries directed to a target.
  • CVE-2020-12663 Malformed answers from upstream name servers can be used to make Unbound unresponsive.
https://lists.nlnetlabs.nl/pipermail/unbound-users/2020-May/006833.html CVE-2020-12662 CVE-2020-12663 SA-20:19.unbound 2020-05-19 2020-05-22 2020-07-10
drupal -- Multiple Vulnerabilities drupal7 7.70 drupal8 8.8.6

Drupal Security Team reports:

The jQuery project released version 3.5.0, and as part of that, disclosed two security vulnerabilities that affect all prior versions. As mentioned in the jQuery blog, both are: ... Security issues in jQuerys DOM manipulation methods, as in .html(), .append(), and the others. Security advisories for both of these issues have been published on GitHub.

Drupal 7 has an Open Redirect vulnerability. For example, a user could be tricked into visiting a specially crafted link which would redirect them to an arbitrary external URL. The vulnerability is caused by insufficient validation of the destination query parameter in the drupal_goto() function.

https://www.drupal.org/sa-core-2020-002 https://www.drupal.org/sa-core-2020-003 2020-05-20 2020-05-22
Zabbix -- Remote code execution zabbix3-server zabbix3-proxy 3.0.31

Zabbix reports:

Fixed security vulnerability cve-2020-11800 (remote code execution). (ZBX-17600)

CVE-2020-11800 https://www.zabbix.com/rn/rn3.0.31 https://support.zabbix.com/browse/ZBX-17600 2020-04-15 2020-05-20
Rails -- multiple vulnerabilities rubygem-actionpack52 rubygem-actionview52 rubygem-activestorage52 rubygem-activesupport52 5.2.4.3 rubygem-actionpack60 rubygem-actionview60 rubygem-activestorage60 rubygem-activesupport60 6.0.3.1

Ruby on Rails blog:

Hi everyone! Rails 5.2.4.3 and 6.0.3.1 have been released! These releases contain important security fixes, so please upgrade when you can.

Both releases contain the following fixes:

CVE-2020-8162: Circumvention of file size limits in ActiveStorage

CVE-2020-8164: Possible Strong Parameters Bypass in ActionPack

CVE-2020-8165: Potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore

CVE-2020-8166: Ability to forge per-form CSRF tokens given a global CSRF token

CVE-2020-8167: CSRF Vulnerability in rails-ujs

https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/ https://groups.google.com/forum/#!topic/rubyonrails-security/PjU3946mreQ https://groups.google.com/forum/#!topic/rubyonrails-security/f6ioe4sdpbY https://groups.google.com/forum/#!topic/rubyonrails-security/bv6fW4S0Y1c https://groups.google.com/forum/#!topic/rubyonrails-security/NOjKiGeXUgw https://groups.google.com/forum/#!topic/rubyonrails-security/x9DixQDG9a0 CVE-2020-8162 CVE-2020-8164 CVE-2020-8165 CVE-2020-8166 CVE-2020-8167 2020-05-18 2020-05-19
Dovecot -- Multiple vulnerabilities dovecot 2.3.10.1

Aki Tuomi reports:

Vulnerability Details: Sending malformed NOOP command causes crash in submission, submission-login or lmtp service. Risk: Remote attacker can keep submission-login service down, causing denial of service attack. For lmtp the risk is neglible, as lmtp is usually behind a trusted MTA. Steps to reproduce: Send ``NOOP EE"FY`` to submission port, or similarly malformed command.

Vulnerability Details: Sending command followed by sufficient number of newlines triggers a use-after-free bug that might crash submission-login, submission or lmtp service. Risk: Remote attacker can keep submission-login service down, causing denial of service attack. For lmtp the risk is neglible, as lmtp is usually behind a trusted MTA. Steps to reproduce: This can be currently reproduced with ASAN or Valgrind. Reliable way to crash has not yet been discovered.

Vulnerability Details: Sending mail with empty quoted localpart causes submission or lmtp component to crash. Risk: Malicious actor can cause denial of service to mail delivery by repeatedly sending mails with bad sender or recipient address. Steps to reproduce: Send mail with envelope sender or recipient as <""@example.org>. Workaround: For submission there is no workaround, but triggering the bug requires valid credentials. For lmtp, one can implement sufficient filtering on MTA level to prevent mails with such addresses from ending up in LMTP delivery.

https://dovecot.org/pipermail/dovecot-news/2020-May/000438.html CVE-2020-10957 CVE-2020-10958 CVE-2020-10967 2020-04-02 2020-05-18
clamav -- multiple vulnerabilities clamav 0.102.3,1

Micah Snyder reports:

CVE-2020-3327: Fixed a vulnerability in the ARJ archive-parsing module in ClamAV 0.102.2 that could cause a denial-of-service condition. Improper bounds checking of an unsigned variable results in an out-of-bounds read which causes a crash. Special thanks to Daehui Chang and Fady Othman for helping identify the ARJ parsing vulnerability.

CVE-2020-3341: Fixed a vulnerability in the PDF-parsing module in ClamAV 0.101 - 0.102.2 that could cause a denial-of-service condition. Improper size checking of a buffer used to initialize AES decryption routines results in an out-of-bounds read, which may cause a crash. OSS-Fuzz discovered this vulnerability.

https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html CVE-2020-3327 CVE-2020-3341 2020-05-12 2020-05-14
Rails -- remote code execution vulnerability rubygem-actionview4 4.2.11.2

Ruby on Rails blog:

Due to an unfortunate oversight, Rails 4.2.11.2 has a missing constant error. To address this Rails 4.2.11.3 has been released.

The original announcement for CVE-2020-8163 has a follow-up message with an updated patch if you’re unable to use the gems.

https://weblog.rubyonrails.org/2020/5/16/rails-4-2-11-3-has-been-released/ https://groups.google.com/forum/#!topic/rubyonrails-security/hWuKcHyoKh0 CVE-2020-8163 2020-05-15 2020-05-16
salt -- multiple vulnerabilities in salt-master process py27-salt py32-salt py33-salt py34-salt py35-salt py36-salt py37-salt py38-salt 2019.2.4 30003000.2

F-Secure reports:

CVE-2020-11651 - Authentication bypass vulnerabilities

The ClearFuncs class processes unauthenticated requests and unintentionally exposes the _send_pub() method, which can be used to queue messages directly on the master publish server. Such messages can be used to trigger minions to run arbitrary commands as root.

The ClearFuncs class also exposes the method _prep_auth_info(), which returns the "root key" used to authenticate commands from the local root user on the master server. This "root key" can then be used to remotely call administrative commands on the master server. This unintentional exposure provides a remote un-authenticated attacker with root-equivalent access to the salt master.

CVE-2020-11652 - Directory traversal vulnerabilities

The wheel module contains commands used to read and write files under specific directory paths. The inputs to these functions are concatenated with the target directory and the resulting path is not canonicalized, leading to an escape of the intended path restriction.

The get_token() method of the salt.tokens.localfs class (which is exposed to unauthenticated requests by the ClearFuncs class) fails to sanitize the token input parameter which is then used as a filename, allowing insertion of ".." path elements and thus reading of files outside of the intended directory. The only restriction is that the file has to be deserializable by salt.payload.Serial.loads().

CVE-2020-11651 CVE-2020-11652 https://nvd.nist.gov/vuln/detail/CVE-2020-11651 https://nvd.nist.gov/vuln/detail/CVE-2020-11652 https://docs.saltstack.com/en/latest/topics/releases/2019.2.4.html https://labs.f-secure.com/advisories/saltstack-authorization-bypass https://blog.f-secure.com/new-vulnerabilities-make-exposed-salt-hosts-easy-targets/ https://www.tenable.com/blog/cve-2020-11651-cve-2020-11652-critical-salt-framework-vulnerabilities-exploited-in-the-wild 2020-04-30 2020-05-16
json-c -- integer overflow and out-of-bounds write via a large JSON file json-c 0.14

Tobias Stöckmann reports:

I have discovered a way to trigger an out of boundary write while parsing a huge json file through a malicious input source. It can be triggered if an attacker has control over the input stream or if a huge load during filesystem operations can be triggered.

https://github.com/json-c/json-c/pull/592 https://github.com/json-c/json-c/pull/599 CVE-2020-12762 2020-05-02 2020-05-14 2020-05-17
typo3 -- multiple vulnerabilities typo3-9-php72 typo3-9-php73 typo3-9-php74 9.5.17 typo3-10-php72 typo3-10-php73 typo3-10-php74 10.4.2

Typo3 News:

CVE-2020-11063: TYPO3-CORE-SA-2020-001: Information Disclosure in Password Reset

It has been discovered that time-based attacks can be used with the password reset functionality for backend users. This allows an attacker to verify whether a backend user account with a given email address exists or not.

CVE-2020-11064: TYPO3-CORE-SA-2020-002: Cross-Site Scripting in Form Engine

It has been discovered that HTML placeholder attributes containing data of other database records are vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.

CVE-2020-11065: TYPO3-CORE-SA-2020-003: Cross-Site Scripting in Link Handling

It has been discovered that link tags generated by typolink functionality are vulnerable to cross-site scripting - properties being assigned as HTML attributes have not been parsed correctly.

CVE-2020-11066: TYPO3-CORE-SA-2020-004: Class destructors causing side-effects when being unserialized

Calling unserialize() on malicious user-submitted content can result in the following scenarios:

- trigger deletion of arbitrary directory in file system (if writable for web server)

- trigger message submission via email using identity of web site (mail relay)

Another insecure deserialization vulnerability is required to actually exploit mentioned aspects.

CVE-2020-11067: TYPO3-CORE-SA-2020-005: Insecure Deserialization in Backend User Settings

It has been discovered that backend user settings (in $BE_USER->uc) are vulnerable to insecure deserialization. In combination with vulnerabilities of 3rd party components this can lead to remote code execution. A valid backend user account is needed to exploit this vulnerability.

CVE-2020-11069: TYPO3-CORE-SA-2020-006: Same-Site Request Forgery to Backend User Interface

It has been discovered that the backend user interface and install tool are vulnerable to same-site request forgery. A backend user can be tricked into interacting with a malicious resource an attacker previously managed to upload to the web server - scripts are then executed with the privileges of the victims’ user session.

In a worst case scenario new admin users can be created which can directly be used by an attacker. The vulnerability is basically a cross-site request forgery (CSRF) triggered by a cross-site scripting vulnerability (XSS) - but happens on the same target host - thus, it’ actually a same-site request forgery (SSRF).

Malicious payload such as HTML containing JavaScript might be provided by either an authenticated backend user or by a non-authenticated user using a 3rd party extension - e.g. file upload in a contact form with knowing the target location.

The attacked victim requires an active and valid backend or install tool user session at the time of the attack to be successful.

https://typo3.org/article/typo3-1042-and-9517-security-releases-published https://get.typo3.org/release-notes/9.5.17 https://get.typo3.org/release-notes/10.4.2 https://typo3.org/security/advisory/typo3-core-sa-2020-001 https://typo3.org/security/advisory/typo3-core-sa-2020-002 https://typo3.org/security/advisory/typo3-core-sa-2020-003 https://typo3.org/security/advisory/typo3-core-sa-2020-004 https://typo3.org/security/advisory/typo3-core-sa-2020-005 https://typo3.org/security/advisory/typo3-core-sa-2020-006 CVE-2020-11063 CVE-2020-11064 CVE-2020-11065 CVE-2020-11066 CVE-2020-11067 CVE-2020-11069 2020-05-12 2020-05-13
FreeBSD -- Insufficient cryptodev MAC key length check FreeBSD-kernel 12.112.1_5

Problem Description:

Requests to create cryptography sessions using a MAC did not validate the user-supplied MAC key length. The cryptodev module allocates a buffer whose size is this user-suppled length.

Impact:

An unprivileged process can trigger a kernel panic.

CVE-2019-15879 SA-20:15.cryptodev 2020-01-20 2020-05-12
FreeBSD -- Use after free in cryptodev module FreeBSD-kernel 12.112.1_5 11.311.3_9

Problem Description:

A race condition permitted a data structure in the kernel to be used after it was freed by the cryptodev module.

Impact:

An unprivileged process can overwrite arbitrary kernel memory.

CVE-2019-15879 SA-20:15.cryptodev 2020-01-20 2020-05-12
FreeBSD -- Improper checking in SCTP-AUTH shared key update FreeBSD-kernel 11.311.3_9

Problem Description:

The SCTP layer does improper checking when an application tries to update a shared key. Therefore an unprivileged local user can trigger a use-after- free situation, for example by specific sequences of updating shared keys and closing the SCTP association.

Impact:

Triggering the use-after-free situation may result in unintended kernel behaviour including a kernel panic.

CVE-2019-15878 SA-20:14.sctp 2019-09-19 2020-05-12
FreeBSD -- Memory disclosure vulnerability in libalias FreeBSD-kernel 12.112.1_5 11.411.4_1 11.311.3_9

Problem Description:

The FTP packet handler in libalias incorrectly calculates some packet lengths. This may result in disclosing small amounts of memory from the kernel (for the in-kernel NAT implementation) or from the process space for natd (for the userspace implementation).

Impact:

A malicious attacker could send specially constructed packets that exploit the erroneous calculation allowing the attacker to disclose small amount of memory either from the kernel (for the in-kernel NAT implementation) or from the process space for natd (for the userspace implementation).

CVE-2020-7455 SA-20:13.libalias 2020-05-12 2020-05-12
FreeBSD -- Insufficient packet length validation in libalias FreeBSD-kernel 12.112.1_5 11.411.4_1 11.311.3_9

Problem Description:

libalias(3) packet handlers do not properly validate the packet length before accessing the protocol headers. As a result, if a libalias(3) module does not properly validate the packet length before accessing the protocol header, it is possible for an out of bound read or write condition to occur.

Impact:

A malicious attacker could send specially constructed packets that exploit the lack of validation allowing the attacker to read or write memory either from the kernel (for the in-kernel NAT implementation) or from the process space for natd (for the userspace implementation).

CVE-2020-7454 SA-20:12.libalias 2020-05-12 2020-05-12
qutebrowser -- Reloading page with certificate errors shows a green URL qutebrowser 1.11.1

Qutebrowser developers report:

After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (colors.statusbar.url.warn.fg). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (colors.statusbar.url.success_https). While the user already has seen a certificate error prompt at this point (or set content.ssl_strict to false which is not recommended), this could still provide a false sense of security.

https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2f-898j https://github.com/qutebrowser/qutebrowser/issues/5403 CVE-2020-11054 2020-05-02 2020-05-09
Python -- CRLF injection via the host part of the url passed to urlopen() python27 2.7.18 python38 3.8.3 python37 3.7.7 python36 3.6.10 python35 3.5.9_4

Python reports:

An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348 https://bugs.python.org/issue38576 CVE-2019-18348 2019-10-24 2020-05-09 2020-06-13
glpi -- stored XSS glpi 9.4.3

MITRE Corporation reports:

inc/user.class.php in GLPI before 9.4.3 allows XSS via a user picture.

https://github.com/glpi-project/glpi/commit/c2aa7a7cd6af28be3809acc7e7842d2d2008c0fb https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_stored_XSS.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13239 CVE-2019-13239 2019-02-25 2020-05-09
zeek -- Various vulnerabilities zeek 3.0.6

Jon Siwek of Corelight reports:

This release fixes the following security issues:

  • Fix buffer over-read in Ident analyzer
  • Fix SSL scripting error leading to uninitialized field access and memory leak
  • Fix POP3 analyzer global buffer over-read
  • Fix potential stack overflows due to use of Variable-Length-Arrays
https://raw.githubusercontent.com/zeek/zeek/v3.0.6/NEWS 2020-05-06 2020-05-06
Wagtail -- potential timing attack vulnerability py35-wagtail py36-wagtail py37-wagtail py38-wagtail 2.7.3 2.82.8.2

Wagtail release notes:

CVE-2020-11037: Potential timing attack on password-protected private pages

This release addresses a potential timing attack on pages or documents that have been protected with a shared password through Wagtail's "Privacy" controls. This password check is performed through a character-by-character string comparison, and so an attacker who is able to measure the time taken by this check to a high degree of accuracy could potentially use timing differences to gain knowledge of the password. (This is understood to be feasible on a local network, but not on the public internet.)

https://docs.wagtail.io/en/latest/releases/2.8.2.html https://github.com/wagtail/wagtail/security/advisories/GHSA-jjjr-3jcw-f8v6 CVE-2020-11037 2020-05-04 2020-05-05
mailman -- arbitrary content injection vulnerability via options or private archive login pages mailman 2.1.30_4 2.1.312.1.33 mailman-with-htdig 2.1.30_4 2.1.312.1.33

Mark Sapiro reports:

A content injection vulnerability via the options login page has been discovered and reported by Vishal Singh.

An issue similar to CVE-2018-13796 exists at different endpoint & param. It can lead to a phishing attack.

(added 2020-05-07) This is essentially the same as https://bugs.launchpad.net/mailman/+bug/1873722 except the vector is the private archive login page and the attack only succeeds if the list's roster visibility (private_roster) setting is 'Anyone'.

https://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/1845/NEWS#L8 https://bugs.launchpad.net/mailman/+bug/1873722 https://bugs.launchpad.net/mailman/+bug/1877379 https://mail.python.org/archives/list/mailman-developers@python.org/thread/SYBIZ3MNSQZLKN6PVKO7ZKR7QMOBMS45/ CVE-2018-13796 2020-04-20 2020-05-07
cacti -- XSS exposure cacti 1.2.12

Cacti developer reports:

Lack of escaping of color items can lead to XSS exposure.

https://sourceforge.net/p/cacti/mailman/message/37000502/ https://github.com/Cacti/cacti/blob/release/1.2.12/CHANGELOG CVE-2020-7106 ports/246164 2020-04-16 2020-05-04
Squid -- multiple vulnerabilities squid 4.10

The Squid developers reports:

Improper Input Validation issues in HTTP Request processing (CVE-2020-8449, CVE-2020-8450).

Information Disclosure issue in FTP Gateway (CVE-2019-12528).

Buffer Overflow issue in ext_lm_group_acl helper (CVE-2020-8517).

http://lists.squid-cache.org/pipermail/squid-announce/2020-February/000107.html https://nvd.nist.gov/vuln/detail/CVE-2020-8449 https://nvd.nist.gov/vuln/detail/CVE-2020-8450 https://nvd.nist.gov/vuln/detail/CVE-2019-12528 https://nvd.nist.gov/vuln/detail/CVE-2020-8517 CVE-2020-8449 CVE-2020-8450 CVE-2019-12528 CVE-2020-8517 ports/244026 2020-02-10 2020-04-07
taglib -- heap-based buffer over-read via a crafted audio file taglib 1.12.b.1

Webin security lab - dbapp security Ltd reports:

The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.

https://seclists.org/fulldisclosure/2018/May/49 CVE-2018-11439 2018-05-28 2020-05-03
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.10.012.10.2 12.9.012.9.5 8.4.012.8.10

Gitlab reports:

Path Traversal in NuGet Package Registry

Workhorse Bypass Leads to File Disclosure

OAuth Application Client Secrets Revealed

Code Owners Approval Rules Are Not Updated for Existing Merge Requests When Source Branch Changes

Code Owners Protection Not Enforced from Web UI

Repository Mirror Passwords Exposed To Maintainers

Admin Audit Log Page Denial of Service

Private Project ID Revealed Through Group API

Elasticsearch Credentials Logged to ELK

GitHub Personal Access Token Exposed on Integrations Page

Update Nokogiri dependency

Update OpenSSL Dependency

Update git

https://about.gitlab.com/releases/2020/04/30/security-release-12-10-2-released/ CVE-2020-12448 CVE-2020-10187 CVE-2020-7595 CVE-2020-1967 CVE-2020-11008 2020-04-30 2020-05-01
vlc -- Multiple vulnerabilities fixed in VLC media player vlc 3.0.10,4

VideoLAN reports:

Details

A remote user could:

  • Create a specifically crafted image file that could trigger an out of bounds read
  • Send a specifically crafter request to the microdns service discovery, potentially triggering various memory management issues

Impact

If successful, a malicious third party could trigger either a crash of VLC or an arbitratry code execution with the privileges of the target user.

While these issues in themselves are most likely to just crash the player, we can't exclude that they could be combined to leak user informations or remotely execute code. ASLR and DEP help reduce the likelyness of code execution, but may be bypassed.

We have not seen exploits performing code execution through these vulnerabilities

CVE-2019-19721 affects VLC 3.0.8 and earlier, and only reads 1 byte out of bound

https://www.videolan.org/security/sb-vlc309.html 2020-04-01 2020-04-29
samba -- multiple vulnerabilities samba410 4.10.15 samba411 4.11.8 samba412 4.12.2

The Samba Team reports:

CVE-2020-10700

A client combining the 'ASQ' and 'Paged Results' LDAP controls can cause a use-after-free in Samba's AD DC LDAP server.

CVE-2020-10704

A deeply nested filter in an un-authenticated LDAP search can exhaust the LDAP server's stack memory causing a SIGSEGV.

https://www.samba.org/samba/history/samba-4.12.2.html CVE-2020-10700 CVE-2020-10704 2020-04-29 2020-04-29
ceph14 -- multiple security issues ceph14 14.1.114.2.9

RedHat reports:

ceph: secure mode of msgr2 breaks both confidentiality and integrity aspects for long-lived sessions.

ceph: header-splitting in RGW GetObject has a possible XSS.

CVE-2020-1759 https://www.openwall.com/lists/oss-security/2020/04/07/2 CVE-2020-1760 https://www.openwall.com/lists/oss-security/2020/04/07/1 2020-04-07 2020-04-14
nested filters leads to stack overflow openldap24-server 2.4.50

Howard Chu reports:

nested filters leads to stack overflow

https://bugs.openldap.org/show_bug.cgi?id=9202 CVE-2020-12243 2020-04-28 2020-04-28
py-yaml -- FullLoader (still) exploitable for arbitrary command execution py27-yaml py35-yaml py36-yaml py37-yaml py38-yaml 5.3.1

Riccardo Schirone (https://github.com/ret2libc) reports:

In FullLoader python/object/new constructor, implemented by construct_python_object_apply, has support for setting the state of a deserialized instance through the set_python_instance_state method. After setting the state, some operations are performed on the instance to complete its initialization, however it is possible for an attacker to set the instance' state in such a way that arbitrary code is executed by the FullLoader.

This patch tries to block such attacks in FullLoader by preventing set_python_instance_state from setting arbitrar properties. It implements a blacklist that includes extend method (called by construct_python_object_apply) and all special methods (e.g. __set__, __setitem__, etc.).

Users who need special attributes being set in the state of a deserialized object can still do it through the UnsafeLoader, which however should not be used on untrusted input. Additionally, they can subclass FullLoader and redefine state_blacklist_regexp to include the additional attributes they need, passing the subclassed loader to yaml.load.

https://bugzilla.redhat.com/show_bug.cgi?id=1807367 https://github.com/yaml/pyyaml/pull/386 CVE-2020-1747 ports/245937 2020-03-02 2020-04-27 2020-04-29
py-bleach -- regular expression denial-of-service py27-bleach py35-bleach py36-bleach py37-bleach py38-bleach 3.1.4

Bleach developers reports:

bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS).

Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}).

https://github.com/mozilla/bleach/security/advisories/GHSA-vqhp-cxgc-6wmm https://bugzilla.mozilla.org/show_bug.cgi?id=1623633 CVE-2020-6817 ports/245943 2019-03-09 2020-04-26
MySQL Server -- Multiple vulerabilities mariadb101-server 10.1.45 mariadb102-server 10.2.32 mariadb103-server 10.3.23 mariadb104-server 10.4.13 mysql56-server 5.6.48 mysql57-server 5.7.30 mysql80-server 8.0.20 percona55-server 5.5.68 percona56-server 5.6.48 percona57-server 5.7.30

Oracle reports:

This Critical Patch Update contains 45 new security patches for Oracle MySQL. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.

MariaDB reports 4 of these vulnerabilities exist in their software

https://www.oracle.com/security-alerts/cpujan2020.html CVE-2019-5482 CVE-2019-15601 CVE-2020-2780 CVE-2020-2790 CVE-2020-2768 CVE-2020-2804 CVE-2020-2760 CVE-2020-2806 CVE-2020-2762 CVE-2020-2814 CVE-2020-2893 CVE-2020-2895 CVE-2020-2898 CVE-2020-2903 CVE-2020-2896 CVE-2020-2770 CVE-2020-2765 CVE-2020-2892 CVE-2020-2897 CVE-2020-2923 CVE-2020-2924 CVE-2020-2901 CVE-2020-2928 CVE-2020-2904 CVE-2020-2925 CVE-2020-2759 CVE-2020-2763 CVE-2020-2761 CVE-2020-2774 CVE-2020-2853 CVE-2020-2779 CVE-2020-2812 CVE-2019-1547 CVE-2020-2926 CVE-2020-2921 CVE-2020-2930 2020-04-14 2020-04-23 2020-05-16
MySQL Client -- Multiple vulerabilities mysql56-client 5.6.48 mysql57-client 5.7.30 mysql80-client 8.0.20 mysql-connector-c 8.0.20 mysql-connector-c++ 8.0.20 mysql-connector-java 8.0.20 percona55-client 5.5.68 percona56-client 5.6.48 percona57-client 5.7.30

Oracle reports:

This Critical Patch Update contains 45 new security patches for Oracle MySQL. 9 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.

https://www.oracle.com/security-alerts/cpujan2020.html CVE-2020-2752 CVE-2020-2934 CVE-2020-2875 CVE-2020-2922 CVE-2020-2933 2020-04-14 2020-04-23
Nextcloud -- multiple vulnerabilities nextcloud 18.0.4

Nextcloud reports:

XSS in Files PDF viewer (NC-SA-2020-019)

Missing ownership check on remote wipe endpoint (NC-SA-2020-018)

https://nextcloud.com/security/advisories/ https://nextcloud.com/security/advisory/?id=NC-SA-2020-018 https://nextcloud.com/security/advisory/?id=NC-SA-2020-019 2020-03-18 2020-04-23
Python -- Regular Expression DoS attack against client python38 3.8.3 python37 3.7.7 python36 3.6.10 python35 3.5.9_4 python27 2.7.18

Ben Caller and Matt Schwager reports:

Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.

https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html https://bugs.python.org/issue39503 CVE-2020-8492 ports/245819 2019-11-17 2020-04-23 2020-06-13
Wagtail -- XSS vulnerability py35-wagtail py36-wagtail py37-wagtail py38-wagtail 2.7.2

Wagtail release notes:

CVE-2020-11001: Possible XSS attack via page revision comparison view

This release addresses a cross-site scripting (XSS) vulnerability on the page revision comparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform actions with that user credentials. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.

https://docs.wagtail.io/en/latest/releases/2.7.2.html https://github.com/advisories/GHSA-v2wc-pfq2-5cm6 CVE-2020-11001 2020-04-03 2020-04-22
libntlm -- buffer overflow vulnerability libntlm 1.6

NVD reports:

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

https://gitlab.com/jas/libntlm/-/issues/2 https://nvd.nist.gov/vuln/detail/CVE-2019-17455 CVE-2019-17455 2019-10-08 2020-04-21
OpenSSL remote denial of service vulnerability FreeBSD 12.112.1_4 openssl 1.1.1,11.1.1g,1

Problem Description:

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognized signature algorithm is received from the peer.

Impact:

A malicious peer could exploit the NULL pointer dereference crash, causing a denial of service attack.

CVE-2020-1967 SA-20:11.openssl https://www.openssl.org/news/secadv/20200421.txt 2020-04-21 2020-04-21 2020-04-22
FreeBSD -- ipfw invalid mbuf handling FreeBSD-kernel 12.112.1_4 11.311.3_8

Problem Description:

Incomplete packet data validation may result in accessing out-of-bounds memory (CVE-2019-5614) or may access memory after it has been freed (CVE-2019-15874).

Impact:

Access to out of bounds or freed mbuf data can lead to a kernel panic or other unpredictable results.

CVE-2019-5614 CVE-2019-15874 SA-20:10.ipfw 2020-04-21 2020-04-21
py-twisted -- multiple vulnerabilities py27-twisted py35-twisted py36-twisted py37-twisted py38-twisted 20.3.0

Twisted developers reports:

All HTTP clients in twisted.web.client now raise a ValueError when called with a method and/or URL that contain invalid characters. This mitigates CVE-2019-12387. Thanks to Alex Brasetvik for reporting this vulnerability.

The HTTP/2 server implementation now enforces TCP flow control on control frame messages and times out clients that send invalid data without reading responses. This closes CVE-2019-9512 (Ping Flood), CVE-2019-9514 (Reset Flood), and CVE-2019-9515 (Settings Flood). Thanks to Jonathan Looney and Piotr Sikora.

twisted.web.http was subject to several request smuggling attacks. Requests with multiple Content-Length headers were allowed (CVE-2020-10108, thanks to Jake Miller from Bishop Fox and ZeddYu Lu for reporting this) and now fail with a 400; requests with a Content-Length header and a Transfer-Encoding header honored the first header (CVE-2020-10109, thanks to Jake Miller from Bishop Fox for reporting this) and now fail with a 400; requests whose Transfer-Encoding header had a value other than "chunked" and "identity" (thanks to ZeddYu Lu) were allowed and now fail with a 400.

https://github.com/twisted/twisted/blob/twisted-20.3.0/NEWS.rst CVE-2019-12387 CVE-2019-9512 CVE-2019-9514 CVE-2019-9515 CVE-2020-10108 CVE-2020-10109 ports/245252 2019-03-01 2020-04-21
Client/server denial of service when handling AES-CTR ciphers libssh 0.8.00.8.9 0.9.00.9.4

The libssh team reports (originally reported by Yasheng Yang from Google):

A malicious client or server could crash the counterpart implemented with libssh AES-CTR ciphers are used and don't get fully initialized. It will crash when it tries to cleanup the AES-CTR ciphers when closing the connection.

https://www.libssh.org/security/advisories/CVE-2020-1730.txt" CVE-2020-1730 2020-01-25 2020-04-19
webkit2-gtk3 -- Denial of service webkit2-gtk3 2.28.1

The WebKitGTK project reports the following vulnerability.

Processing maliciously crafted web content may lead to arbitrary code execution or application crash (denial of service). Description: A memory corruption issue (use-after-free) was addressed with improved memory handling.

https://webkitgtk.org/security/WSA-2020-0004.html CVE-2020-11793 2020-04-16 2020-04-18
drupal -- Drupal Core - Moderately critical - Third-party library drupal8 8.8.4

Drupal Security Team reports:

The Drupal project uses the third-party library CKEditor, which has released a security improvement that is needed to protect some Drupal configurations.

Vulnerabilities are possible if Drupal is configured to use the WYSIWYG CKEditor for your site's users. An attacker that can createor edit content may be able to exploit this Cross Site Scripting (XSS) vulnerability to target users with access to the WYSIWYG CKEditor, and this may include site admins with privileged access.

The latest versions of Drupal update CKEditor to 4.14 to mitigate the vulnerabilities.

https://www.drupal.org/sa-core-2020-001 2020-03-18 2020-04-17
ansible - Vault password leak from temporary file ansible 2.8.9 ansible27 2.7.17 ansible26 2.7.17 ansible25 2.7.17 ansible24 2.7.17 ansible23 2.7.17

Borja Tarraso reports:

A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1740 https://github.com/ansible/ansible/issues/67798 CVE-2020-1740 2020-02-12 2020-04-17
ansible - subversion password leak from PID ansible 2.8.9 ansible27 2.7.17 ansible26 2.7.17 ansible25 2.7.17 ansible24 2.7.17 ansible23 2.7.17

Borja Tarraso reports:

A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739 https://github.com/ansible/ansible/issues/67797 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/ CVE-2020-1739 2020-02-12 2020-04-17
ansible - win_unzip path normalization ansible 2.8.9 ansible27 2.7.17 ansible26 2.7.17 ansible25 2.7.17 ansible24 2.7.17 ansible23 2.7.17

Borja Tarraso reports:

A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737 https://github.com/ansible/ansible/issues/67795 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/ CVE-2020-1737 2020-02-12 2020-04-17
chromium -- use after free chromium 81.0.4044.113

Google Chrome Releases reports:

[1067851] Critical CVE-2020-6457: Use after free in speech recognizer. Reported by Leecraso and Guang Gong of Alpha Lab, Qihoo 360 on 2020-04-04

https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_15.html CVE-2020-6457 2020-04-15 2020-04-16
openvpn -- illegal client float can break VPN session for other users openvpn 2.4.8_3 openvpn-mbedtls 2.4.8_3 openvpn-devel 202016

Lev Stipakov and Gert Doering report:

There is a time frame between allocating peer-id and initializing data channel key (which is performed on receiving push request or on async push-reply) in which the existing peer-id float checks do not work right.

If a "rogue" data channel packet arrives during that time frame from another address and with same peer-id, this would cause client to float to that new address.

The net effect of this behaviour is that the VPN session for the "victim client" is broken. Since the "attacker client" does not have suitable keys, it can not inject or steal VPN traffic from the other session. The time window is small and it can not be used to attack a specific client's session, unless some other way is found to make it disconnect and reconnect first.

https://github.com/OpenVPN/openvpn/commit/f7b318f811bb43c0d3aa7f337ec6242ed2c33881 https://sourceforge.net/p/openvpn/openvpn/ci/f7b318f811bb43c0d3aa7f337ec6242ed2c33881/ https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg19720.html https://community.openvpn.net/openvpn/ticket/1272 https://patchwork.openvpn.net/patch/1077/ CVE-2020-11810 2020-04-13 2020-04-16
Mbed TLS -- Side channel attack on ECDSA mbedtls 2.16.6

Manuel Pégourié-Gonnard reports:

An attacker with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave such as SGX or the TrustZone secure world) can fully recover an ECDSA private key after observing a number of signature operations.

https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-04 CVE-2020-10932 2020-04-14 2020-04-15
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.9.012.9.3 12.8.012.8.9 012.7.9

Gitlab reports:

NuGet Package and File Disclosure through GitLab Workhorse

Job Artifact Uploads and File Disclosure through GitLab Workhorse

Incorrect membership following group removal

Logging of Praefect tokens

Update Rack dependency

Update OpenSSL dependency

https://about.gitlab.com/releases/2020/04/14/critical-security-release-gitlab-12-dot-9-dot-3-released/ CVE-2020-11505 CVE-2020-11506 CVE-2020-11649 CVE-2020-16782 2020-04-14 2020-04-15
zeek -- Remote crash vulnerability zeek 3.0.4

Jon Siwek of Corelight reports:

This release fixes the following security issue:

  • An attacker can crash Zeek remotely via crafted packet sequence.
https://raw.githubusercontent.com/zeek/zeek/e059d4ec2e689b3c8942f4aa08b272f24ed3f612/NEWS 2020-04-14 2020-04-14
chromium -- multiple vulnerabilities chromium 81.0.4044.92

Google Chrome Releases reports:

This updates includes 32 security fixes, including:

  • [1019161] High CVE-2020-6454: Use after free in extensions. Reported by Leecraso and Guang Gong of Alpha Lab, Qihoo 360 on 2019-10-29
  • [1043446] High CVE-2020-6423: Use after free in audio. Reported by Anonymous on 2020-01-18
  • [1059669] High CVE-2020-6455: Out of bounds read in WebSQL. Reported by Nan Wang(@eternalsakura13) and Guang Gong of Alpha Lab, Qihoo 360 on 2020-03-09
  • [1031479] Medium CVE-2020-6430: Type Confusion in V8. Reported by Avihay Cohen @ SeraphicAlgorithms on 2019-12-06
  • [1040755] Medium CVE-2020-6456: Insufficient validation of untrusted input in clipboard. Reported by Michał Bentkowski of Securitum on 2020-01-10
  • [852645] Medium CVE-2020-6431: Insufficient policy enforcement in full screen. Reported by Luan Herrera (@lbherrera_) on 2018-06-14
  • [965611] Medium CVE-2020-6432: Insufficient policy enforcement in navigations. Reported by David Erceg on 2019-05-21
  • [1043965] Medium CVE-2020-6433: Insufficient policy enforcement in extensions. Reported by David Erceg on 2020-01-21
  • [1048555] Medium CVE-2020-6434: Use after free in devtools. Reported by HyungSeok Han (DaramG) of Theori on 2020-02-04
  • [1032158] Medium CVE-2020-6435: Insufficient policy enforcement in extensions. Reported by Sergei Glazunov of Google Project Zero on 2019-12-09
  • [1034519] Medium CVE-2020-6436: Use after free in window management. Reported by Igor Bukanov from Vivaldi on 2019-12-16
  • [639173] Low CVE-2020-6437: Inappropriate implementation in WebView. Reported by Jann Horn on 2016-08-19
  • [714617] Low CVE-2020-6438: Insufficient policy enforcement in extensions. Reported by Ng Yik Phang on 2017-04-24
  • [868145] Low CVE-2020-6439: Insufficient policy enforcement in navigations. Reported by remkoboonstra on 2018-07-26
  • [894477] Low CVE-2020-6440: Inappropriate implementation in extensions. Reported by David Erceg on 2018-10-11
  • [959571] Low CVE-2020-6441: Insufficient policy enforcement in omnibox. Reported by David Erceg on 2019-05-04
  • [1013906] Low CVE-2020-6442: Inappropriate implementation in cache. Reported by B@rMey on 2019-10-12
  • [1040080] Low CVE-2020-6443: Insufficient data validation in developer tools. Reported by @lovasoa (Ophir LOJKINE) on 2020-01-08
  • [922882] Low CVE-2020-6444: Uninitialized Use in WebRTC. Reported by mlfbrown on 2019-01-17
  • [933171] Low CVE-2020-6445: Insufficient policy enforcement in trusted types. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2019-02-18
  • [933172] Low CVE-2020-6446: Insufficient policy enforcement in trusted types. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2019-02-18
  • [991217] Low CVE-2020-6447: Inappropriate implementation in developer tools. Reported by David Erceg on 2019-08-06
  • [1037872] Low CVE-2020-6448: Use after free in V8. Reported by Guang Gong of Alpha Lab, Qihoo 360 on 2019-12-26
CVE-2020-6423 CVE-2020-6430 CVE-2020-6431 CVE-2020-6432 CVE-2020-6433 CVE-2020-6434 CVE-2020-6435 CVE-2020-6436 CVE-2020-6437 CVE-2020-6438 CVE-2020-6439 CVE-2020-6440 CVE-2020-6441 CVE-2020-6442 CVE-2020-6443 CVE-2020-6444 CVE-2020-6445 CVE-2020-6446 CVE-2020-6447 CVE-2020-6448 CVE-2020-6454 CVE-2020-6455 CVE-2020-6456 https://chromereleases.googleblog.com/2020/04/stable-channel-update-for-desktop_7.html 2020-04-07 2020-04-12
chromium -- multiple vulnerabilities chromium 80.0.3987.162

Google Chrome Releases reports:

This update contains 8 security fixes.

  • [1062247] High CVE-2020-6450: Use after free in WebAudio. Reported by Man Yue Mo of Semmle Security Research Team on 2020-03-17
  • [1061018] High CVE-2020-6451: Use after free in WebAudio. Reported by Man Yue Mo of Semmle Security Research Team on 2020-03-12
  • [1059764] High CVE-2020-6452: Heap buffer overflow in media Reported by asnine on 2020-03-09
  • [1066247] Various fixes from internal audits, fuzzing and other initiatives.
https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_31.html CVE-2020-6450 CVE-2020-6451 CVE-2020-6452 2020-03-31 2020-04-02
HAproxy -- serious vulnerability affecting the HPACK decoder used for HTTP/2 haproxy 2.0.02.0.14 haproxy18 1.8.01.8.25 haproxy19 1.9.01.9.15 haproxy21 2.1.02.1.4

The HAproxy Project reports:

The main driver for this release is that it contains a fix for a serious vulnerability that was responsibly reported last week by Felix Wilhelm from Google Project Zero, affecting the HPACK decoder used for HTTP/2. CVE-2020-11100 was assigned to this issue.

CVE-2020-11100 https://www.mail-archive.com/haproxy@formilux.org/msg36876.html https://www.mail-archive.com/haproxy@formilux.org/msg36877.html https://www.mail-archive.com/haproxy@formilux.org/msg36878.html https://www.mail-archive.com/haproxy@formilux.org/msg36879.html 2020-04-02 2020-04-02
Apache -- Multiple vulnerabilities apache24 2.4.43

Apache Team reports:

SECURITY: CVE-2020-1934

mod_proxy_ftp: Use of uninitialized value with malicious backend FTP server.

SECURITY: CVE-2020-1927

rewrite, core: Set PCRE_DOTALL flag by default to avoid unpredictable matches and substitutions with encoded line break characters. The fix for CVE-2019-10098 was not effective.

https://downloads.apache.org/httpd/CHANGES_2.4.43 CVE-2020-1934 CVE-2020-1927 2020-04-01 2020-04-02
cacti -- multiple vulnerabilities cacti 1.2.10

The Cacti developers reports:

When guest users have access to realtime graphs, remote code could be executed (CVE-2020-8813).

Lack of escaping on some pages can lead to XSS exposure (CVE-2020-7106).

Remote Code Execution due to input validation failure in Performance Boost Debug Log (CVE-2020-7237).

https://github.com/Cacti/cacti/releases/tag/release%2F1.2.10 https://nvd.nist.gov/vuln/detail/CVE-2020-8813 https://nvd.nist.gov/vuln/detail/CVE-2020-7106 https://nvd.nist.gov/vuln/detail/CVE-2020-7237 CVE-2020-8813 CVE-2020-7106 CVE-2020-7237 ports/245198 2020-02-04 2020-04-02
GnuTLS -- flaw in DTLS protocol implementation gnutls 3.6.13

The GnuTLS project reports:

It was found that GnuTLS 3.6.3 introduced a regression in the DTLS protocol implementation. This caused the DTLS client to not contribute any randomness to the DTLS negotiation breaking the security guarantees of the DTLS protocol.

https://gnutls.org/security-new.html#GNUTLS-SA-2020-03-31 CVE-2020-11501 2020-03-31 2020-03-31
PostgresSQL -- ALTER ... DEPENDS ON EXTENSION is missing authorization checks postgresql12-server 12.2 postgresql11-server 11.7 postgresql10-server 10.12 postgresql96-server 9.6.17

The PostgreSQL project reports:

Versions Affected: 9.6 - 12

The ALTER ... DEPENDS ON EXTENSION sub-commands do not perform authorization checks, which can allow an unprivileged user to drop any function, procedure, materialized view, index, or trigger under certain conditions. This attack is possible if an administrator has installed an extension and an unprivileged user can CREATE, or an extension owner either executes DROP EXTENSION predictably or can be convinced to execute DROP EXTENSION.

https://www.postgresql.org/about/news/1960/ CVE-2020-1720 2020-02-13 2020-03-29
mediawiki -- multiple vulnerabilities mediawiki131 1.31.7 mediawiki133 1.33.3 mediawiki134 1.34.1

Mediawiki reports:

Security fixes: T246602:jquery.makeCollapsible allows applying event handler to any CSS selector.

https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-March/000247.html 2020-03-02 2020-03-27
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.9.012.9.1 12.8.012.8.8 012.7.8

Gitlab reports:

Arbitrary File Read when Moving an Issue

Path Traversal in NPM Package Registry

SSRF on Project Import

External Users Can Create Personal Snippet

Triggers Decription Can be Updated by Other Maintainers in Project

Information Disclosure on Confidential Issues Moved to Private Programs

Potential DoS in Repository Archive Download

Blocked Users Can Still Pull/Push Docker Images

Repository Mirroring not Disabled when Feature not Activated

Vulnerability Feedback Page Was Leaking Information on Vulnerabilities

Stored XSS Vulnerability in Admin Feature

Upload Feature Allowed a User to Read Unauthorized Exported Files

Unauthorized Users Are Able to See CI Metrics

Last Pipeline Status of a Merge Request Leaked

Blind SSRF on FogBugz

Update Nokogiri dependency

https://about.gitlab.com/releases/2020/03/26/security-release-12-dot-9-dot-1-released/ CVE-2020-10953 CVE-2020-10956 CVE-2020-10954 CVE-2020-10952 CVE-2020-10955 CVE-2020-9795 2020-03-26 2020-03-26
rubygem-json -- Unsafe Objection Creation Vulnerability in JSON (Additional fix) rubygem-json 2.3.0

When parsing certain JSON documents, the json gem (including the one bundled with Ruby) can be coerced into creating arbitrary objects in the target system.

This is the same issue as CVE-2013-0269. The previous fix was incomplete, which addressed JSON.parse(user_input), but didn’t address some other styles of JSON parsing including JSON(user_input) and JSON.parse(user_input, nil).

See CVE-2013-0269 in detail. Note that the issue was exploitable to cause a Denial of Service by creating many garbage-uncollectable Symbol objects, but this kind of attack is no longer valid because Symbol objects are now garbage-collectable. However, creating arbitrary bjects may cause severe security consequences depending upon the application code.

Please update the json gem to version 2.3.0 or later. You can use gem update json to update it. If you are using bundler, please add gem "json", ">= 2.3.0" to your Gemfile.

https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/ CVE-2020-10663 2020-03-19 2020-03-26 2020-04-02
jenkins -- multiple vulnerabilities jenkins 2.227 jenkins-lts 2.204.5

Jenkins Security Advisory:

Description

(High) SECURITY-1774 / CVE-2020-2160

CSRF protection for any URL could be bypassed

(Medium) SECURITY-1781 / CVE-2020-2161

Stored XSS vulnerability in label expression validation

(Medium) SECURITY-1793 / CVE-2020-2162

Stored XSS vulnerability in file parameters

(Medium) SECURITY-1796 / CVE-2020-2163

Stored XSS vulnerability in list view column headers

CVE-2020-2160 CVE-2020-2161 CVE-2020-2162 CVE-2020-2163 https://jenkins.io/security/advisory/2020-03-25/ 2020-03-25 2020-03-25
phpMyAdmin -- SQL injection phpMyAdmin phpMyAdmin-php72 phpMyAdmin-php73 phpMyAdmin-php74 phpMyAdmin5 phpMyAdmin5-php72 phpMyAdmin5-php73 phpMyAdmin5-php74 4.9.5 5.05.0.2

phpMyAdmin Team reports:

PMASA-2020-2 SQL injection vulnerability in the user accounts page, particularly when changing a password

PMASA-2020-3 SQL injection vulnerability relating to the search feature

PMASA-2020-4 SQL injection and XSS having to do with displaying results

Removing of the "options" field for the external transformation

https://www.phpmyadmin.net/news/2020/3/21/phpmyadmin-495-and-502-are-released/ 2020-03-21 2020-03-25
puppetserver and puppetdb -- Puppet Server and PuppetDB may leak sensitive information via metrics API puppetdb5 5.2.13 puppetdb6 6.9.1 puppetserver5 5.3.12 puppetserver6 6.9.2

Puppetlabs reports:

Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names and class names. Previously, these endpoints were open to the local network.

PE 2018.1.13 & 2019.4.0, Puppet Server 6.9.1 & 5.3.12, and PuppetDB 6.9.1 & 5.2.13 disable trapperkeeper-metrics /v1 metrics API and only allows /v2 access on localhost by default.

CVE-2020-7943 https://puppet.com/security/cve/CVE-2020-7943/ 2020-03-10 2020-03-23
puppet6 -- Arbitrary Catalog Retrieval puppet6 6.13.0

Puppetlabs reports:

Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master.

Puppet 6.13.0 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior.

CVE-2020-7942 https://puppet.com/security/cve/CVE-2020-7942/ 2020-02-18 2020-03-23
FreeBSD -- Kernel memory disclosure with nested jails FreeBSD-kernel 12.112.1_3 11.311.3_7

Problem Description:

A missing NUL-termination check for the jail_set(2) configration option "osrelease" may return more bytes when reading the jail configuration back with jail_get(2) than were originally set.

Impact:

For jails with a non-default setting of children.max > 0 ("nested jails") a superuser inside a jail can create a jail and may be able to read and take advantage of exposed kernel memory.

CVE-2020-7453 SA-20:08.jail 2020-03-19 2020-03-19
FreeBSD -- Incorrect user-controlled pointer use in epair FreeBSD-kernel 12.112.1_3 11.311.3_7

Problem Description:

Incorrect use of a potentially user-controlled pointer in the kernel allowed vnet jailed users to panic the system and potentially execute aribitrary code in the kernel.

Impact:

Users with root level access (or the PRIV_NET_IFCREATE privilege) can panic the system, or potentially escape the jail or execute arbitrary code with kernel priviliges.

CVE-2020-7452 SA-20:07.epair 2020-03-19 2020-03-19
FreeBSD -- Insufficient ixl(4) ioctl(2) privilege checking FreeBSD-kernel 12.112.1_3

Problem Description:

The driver-specific ioctl(2) command handlers in ixl(4) failed to check whether the caller has sufficient privileges to perform the corresponding operation.

Impact:

The ixl(4) handler permits unprivileged users to trigger updates to the device's non-volatile memory (NVM).

CVE-2019-15877 SA-20:06.if_ixl_ioctl 2020-03-19 2020-03-19
FreeBSD -- Insufficient oce(4) ioctl(2) privilege checking FreeBSD-kernel 12.112.1_3 11.311.3_7

Problem Description:

The driver-specific ioctl(2) command handlers in oce(4) failed to check whether the caller has sufficient privileges to perform the corresponding operation.

Impact:

The oce(4) handler permits unprivileged users to send passthrough commands to device firmware.

CVE-2019-15876 SA-20:05.if_oce_ioctl 2020-03-19 2020-03-19
FreeBSD -- TCP IPv6 SYN cache kernel information disclosure FreeBSD-kernel 12.112.1_3 11.311.3_7

Problem Description:

When a TCP server transmits or retransmits a TCP SYN-ACK segment over IPv6, the Traffic Class field is not initialized. This also applies to challenge ACK segments, which are sent in response to received RST segments during the TCP connection setup phase.

Impact:

For each TCP SYN-ACK (or challenge TCP-ACK) segment sent over IPv6, one byte of kernel memory is transmitted over the network.

CVE-2020-7451 SA-20:04.tcp 2020-03-19 2020-03-19
www/py-bleach -- multiple vulnerabilities py27-bleach py35-bleach py36-bleach py37-bleach py38-bleach 3.1.2

* ``bleach.clean`` behavior parsing embedded MathML and SVG content with RCDATA tags did not match browser behavior and could result in a mutation XSS.

Calls to ``bleach.clean`` with ``strip=False`` and ``math`` or ``svg`` tags and one or more of the RCDATA tags ``script``, ``noscript``, ``style``, ``noframes``, ``iframe``, ``noembed``, or ``xmp`` in the allowed tags whitelist were vulnerable to a mutation XSS.

* ``bleach.clean`` behavior parsing ``noscript`` tags did not match browser behavior.

Calls to ``bleach.clean`` allowing ``noscript`` and one or more of the raw text tags (``title``, ``textarea``, ``script``, ``style``, ``noembed``, ``noframes``, ``iframe``, and ``xmp``) were vulnerable to a mutation XSS.

https://bugzilla.mozilla.org/show_bug.cgi?id=1615315 https://bugzilla.mozilla.org/show_bug.cgi?id=1621692 2020-02-13 2020-03-18
zeek -- potential denial of service issues zeek 3.0.3

Jon Siwek of Corelight reports:

This release addresses the following security issues:

  • Potential Denial of Service due to memory leak in DNS TSIG message parsing.
  • Potential Denial of Service due to memory leak (or assertion when compiling with assertions enabled) when receiving a second SSH KEX message after a first.
  • Potential Denial of Service due to buffer read overflow and/or memory leaks in Kerberos analyzer. The buffer read overflow could occur when the Kerberos message indicates it contains an IPv6 address, but does not send enough data to parse out a full IPv6 address. A memory leak could occur when processing KRB_KDC_REQ KRB_KDC_REP messages for message types that do not match a known/expected type.
  • Potential Denial of Service when sending many zero-length SSL/TLS certificate data. Such messages underwent the full Zeek file analysis treatment which is expensive (and meaninguless here) compared to how cheaply one can "create" or otherwise indicate many zero-length contained in an SSL message.
  • Potential Denial of Service due to buffer read overflow in SMB transaction data string handling. The length of strings being parsed from SMB messages was trusted to be whatever the message claimed instead of the actual length of data found in the message.
  • Potential Denial of Service due to null pointer dereference in FTP ADAT Base64 decoding.
  • Potential Denial of Service due buffer read overflow in FTP analyzer word/whitespace handling. This typically won't be a problem in most default deployments of Zeek since the FTP analyzer receives data from a ContentLine (NVT) support analyzer which first null-terminates the buffer used for further FTP parsing.
https://github.com/zeek/zeek/blob/9dda3602a760f00d9532c6314ea79108106033fa/NEWS 2020-02-25 2020-03-15
Okular -- Local binary execution via action links okular 19.12.3_3

Albert Astals Cid:

Okular can be tricked into executing local binaries via specially crafted PDF files.

This binary execution can require almost no user interaction.

No parameters can be passed to those local binaries.

We have not been able to identify any binary that will cause actual damage, be it in the hardware or software level, when run without parameters.

We remain relatively confident that for this issue to do any actual damage, it has to run a binary specially crafted. That binary must have been deployed to the user system via another method, be it the user downloading it directly as an email attachment, webpage download, etc. or by the system being already compromised.

https://kde.org/info/security/advisory-20200312-1.txt 2020-03-12 2020-03-13
Gitlab -- Vulnerability gitlab-ce 12.8.012.8.6

Gitlab reports:

Email Confirmation not Required on Sign-up

https://about.gitlab.com/releases/2020/03/11/critical-security-release-gitlab-12-dot-8-dot-6-released/ 2020-03-11 2020-03-12
Django -- potential SQL injection vulnerability py27-django111 py35-django111 py36-django111 py37-django111 py38-django111 1.11.29 py35-django22 py36-django22 py37-django22 py38-django22 2.2.11 py36-django30 py37-django30 py38-django30 3.0.4

MITRE CVE reports:

Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9402 https://www.djangoproject.com/weblog/2020/mar/04/security-releases/ CVE-2020-9402 2020-02-25 2020-03-12
py-matrix-synapse -- users of single-sign-on are vulnerable to phishing py35-matrix-synapse py36-matrix-synapse py37-matrix-synapse 1.11.1

Matrix developers report:

[The 1.11.1] release includes a security fix impacting installations using Single Sign-On (i.e. SAML2 or CAS) for authentication. Administrators of such installations are encouraged to upgrade as soon as possible.

https://github.com/matrix-org/synapse/releases/tag/v1.11.1 2020-03-03 2020-03-11
Node.js -- multiple vulnerabilities node 13.8.0 node12 12.15.0 node10 10.19.0

Node.js reports:

Updates are now available for all active Node.js release lines for the following issues.

HTTP request smuggling using malformed Transfer-Encoding header (Critical) (CVE-2019-15605)HTTP request smuggling using malformed Transfer-Encoding header (Critical) (CVE-2019-15605)

Affected Node.js versions can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system.

HTTP header values do not have trailing OWS trimmed (High) (CVE-2019-15606)

Optional whitespace should be trimmed from HTTP header values. Its presence may allow attackers to bypass security checks based on HTTP header values.

Remotely trigger an assertion on a TLS server with a malformed certificate string (High) (CVE-2019-15604)

Connecting to a NodeJS TLS server with a client certificate that has a type 19 string in its subjectAltName will crash the TLS server if it tries to read the peer certificate.

Strict HTTP header parsing (None)

Increase the strictness of HTTP header parsing. There are no known vulnerabilities addressed, but lax HTTP parsing has historically been a source of problems. Some commonly used sites are known to generate invalid HTTP headers, a --insecure-http-parser CLI option or insecureHTTPParser http option can be used if necessary for interoperability, but is not recommended.

https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/ CVE-2019-15605 CVE-2019-15606 CVE-2019-15604 2020-02-06 2020-03-09
gitea -- multiple vulnerabilities gitea 1.11.2

The Gitea Team reports for release 1.11.0:

  • Never allow an empty password to validate (#9682) (#9683)
  • Prevent redirect to Host (#9678) (#9679)
  • Swagger hide search field (#9554)
  • Add "search" to reserved usernames (#9063)
  • Switch to fomantic-ui (#9374)
  • Only serve attachments when linked to issue/release and if accessible by user (#9340)

The Gitea Team reports for release 1.11.2:

  • Ensure only own addresses are updated (#10397) (#10399)
  • Logout POST action (#10582) (#10585)
  • Org action fixes and form cleanup (#10512) (#10514)
  • Change action GETs to POST (#10462) (#10464)
  • Fix admin notices (#10480) (#10483)
  • Change admin dashboard to POST (#10465) (#10466)
  • Update markbates/goth (#10444) (#10445)
  • Update crypto vendors (#10385) (#10398)
https://blog.gitea.io/2020/02/gitea-1.11.0-is-released/ https://blog.gitea.io/2020/03/gitea-1.11.2-is-released/ ports/244025 2019-11-18 2020-03-07
salt -- salt-api vulnerability py27-salt py32-salt py33-salt py34-salt py35-salt py36-salt py37-salt py38-salt 2019.2.3

SaltStack reports:

With the Salt NetAPI enabled in addition to having a SSH roster defined, unauthenticated access is possible when specifying the client as SSH.

Additionally, when the raw_shell option is specified any arbitrary command may be run on the Salt master when specifying SSH options.

CVE-2019-17361 https://docs.saltstack.com/en/latest/topics/releases/2019.2.3.html https://nvd.nist.gov/vuln/detail/CVE-2019-17361 2020-01-15 2020-03-07
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.8.012.8.2 12.7.012.7.7 012.6.8

Gitlab reports:

Directory Traversal to Arbitrary File Read

Account Takeover Through Expired Link

Server Side Request Forgery Through Deprecated Service

Group Two-Factor Authentication Requirement Bypass

Stored XSS in Merge Request Pages

Stored XSS in Merge Request Submission Form

Stored XSS in File View

Stored XSS in Grafana Integration

Contribution Analytics Exposed to Non-members

Incorrect Access Control in Docker Registry via Deploy Tokens

Denial of Service via Permission Checks

Denial of Service in Design For Public Issue

Incorrect Access Control via LFS Import

Unescaped HTML in Header

Private Merge Request Titles Leaked via Widget

Project Namespace Exposed via Vulnerability Feedback Endpoint

Denial of Service Through Recursive Requests

Project Authorization Not Being Updated

Incorrect Permission Level For Group Invites

Disclosure of Private Group Epic Information

User IP Address Exposed via Badge images

https://about.gitlab.com/releases/2020/03/04/gitlab-12-dot-8-dot-2-released/ CVE-2020-8113 2020-03-04 2020-03-06
ntp -- Multiple vulnerabilities FreeBSD 11.311.3_7 12.112.1_3 ntp 4.2.8p14 ntp-devel 4.3.99_6

nwtime.org reports:

Three ntp vulnerabilities, Depending on configuration, may have little impact up to termination of the ntpd process.

NTP Bug 3610: Process_control() should exit earlier on short packets. On systems that override the default and enable ntpdc (mode 7) fuzz testing detected that a short packet will cause ntpd to read uninitialized data.

NTP Bug 3596: An unauthenticated unmonitored ntpd is vulnerable to attack on IPv4 with highly predictable transmit timestamps. An off-path attacker who can query time from the victim's ntp which receives time from an unauthenticated time source must be able to send from a spoofed IPv4 address of upstream ntp server and and the victim must be able to process a large number of packets with the spoofed IPv4 address of the upstream server. After eight or more successful attacks in a row the attacker can either modify the victim's clock by a small amount or cause ntpd to terminate. The attack is especially effective when unusually short poll intervals have been configured.

NTP Bug 3592: The fix for https://bugs.ntp.org/3445 introduced a bug such that a ntp can be prevented from initiating a time volley to its peer resulting in a DoS.

All three NTP bugs may result in DoS or terimation of the ntp daemon.

SA-20:09.ntp 2019-05-30 2020-03-03
- librsvg2 -- multiple vulnabilities + librsvg2 -- multiple vulnerabilities librsvg2 2.40.21 librsvg2-rust 2.41.02.46.3

Librsvg2 developers reports:

Backport the following fixes from 2.46.x:

Librsvg now has limits on the number of loaded XML elements, and the number of referenced elements within an SVG document. This is to mitigate malicious SVGs which try to consume all memory, and those which try to consume an exponential amount of CPU time.

Fix stack exhaustion with circular references in <use> elements.

Fix a denial-of-service condition from exponential explosion of rendered elements, through nested use of SVG <use> elements in malicious SVGs. This is similar to the XML "billion laughs attack" but for SVG instancing.

https://mail.gnome.org/archives/ftp-release-list/2020-February/msg00133.html CVE-2019-20446 2020-02-26 2020-03-02
TiMidity++ -- Multiple vulnerabilities timidity++ 2.15.0 timidity++-emacs 2.15.0 timidity++-gtk 2.15.0 timidity++-motif 2.15.0 timidity++-slang 2.15.0 timidity++-tcltk 2.15.0 timidity++-xaw 2.15.0 timidity++-xskin 2.15.0

qflb.wu of DBAPPSecurity reports:

Ihe insert_note_steps function in readmidi.c in TiMidity++ 2.14.0 can cause a denial of service(divide-by-zero error and application crash) via a crafted mid file.

The resample_gauss function in resample.c in TiMidity++ 2.14.0 can cause a denial of service(heap-buffer-overflow) via a crafted mid file.

The play_midi function in playmidi.c in TiMidity++ 2.14.0 can cause a denial of service(large loop and CPU consumption) via a crafted mid file.

https://seclists.org/fulldisclosure/2017/Jul/83 CVE-2017-11546 CVE-2017-11547 CVE-2017-11549 2017-07-31 2020-03-02
Solr -- multiple vulnerabilities apache-solr 8.3.1

Community reports:

8.1.1 and 8.2.0 users check ENABLE_REMOTE_JMX_OPTS setting

Apache Solr RCE vulnerability due to bad config default

Apache Solr RCE through VelocityResponseWriter

https://lucene.apache.org/solr/security.html CVE-2019-17558 2019-12-30 2020-02-29
OpenSMTPd -- LPE and RCE in OpenSMTPD's default install opensmtpd 6.6.4,1

OpenSMTPD developers reports:

An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group.

An unprivileged local attacker can read the first line of an arbitrary file (for example, root's password hash in /etc/master.passwd) or the entire contents of another user's file (if this file and /var/spool/smtpd/ are on the same filesystem).

CVE-2020-8793 https://www.openwall.com/lists/oss-security/2020/02/24/4 CVE-2020-8794 https://www.openwall.com/lists/oss-security/2020/02/24/5 2020-02-22 2020-02-24 2020-02-27
Mbed TLS -- Cache attack against RSA key import in SGX mbedtls 2.16.5

Janos Follath reports:

If Mbed TLS is running in an SGX enclave and the adversary has control of the main operating system, they can launch a side channel attack to recover the RSA private key when it is being imported.

The attack only requires access to fine grained measurements to cache usage. Therefore the attack might be applicable to a scenario where Mbed TLS is running in TrustZone secure world and the attacker controls the normal world or possibly when Mbed TLS is part of a hypervisor and the adversary has full control of a guest OS.

https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-02 2020-02-18 2020-02-24
Mbed TLS -- Side channel attack on ECDSA mbedtls 2.16.4

Janos Follath reports:

Our bignum implementation is not constant time/constant trace, so side channel attacks can retrieve the blinded value, factor it (as it is smaller than RSA keys and not guaranteed to have only large prime factors), and then, by brute force, recover the key.

https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2019-12 CVE-2019-18222 2019-10-25 2020-02-24
WeeChat -- Multiple vulnerabilities weechat 2.7.1

The WeeChat project reports:

Buffer overflow when receiving a malformed IRC message 324 (channel mode). (CVE-2020-8955)

Buffer overflow when a new IRC message 005 is received with longer nick prefixes.

Crash when receiving a malformed IRC message 352 (WHO).

https://weechat.org/doc/security/ CVE-2020-8955 2020-02-20 2020-02-21
webkit-gtk3 -- Multiple vulnerabilities webkit2-gtk3 2.26.4

The WebKitGTK project reports multiple vulnerabilities.

https://webkitgtk.org/security/WSA-2020-0002.html CVE-2020-3862 CVE-2020-3864 CVE-2020-3865 CVE-2020-3867 CVE-2020-3868 2020-02-14 2020-02-19
FreeBSD -- kernel stack data disclosure FreeBSD-kernel 12.112.1_2 12.012.0_13 11.311.3_6

Problem Description:

Due to incorrect initialization of a stack data structure, up to 20 bytes of kernel data stored previously stored on the stack will be exposed to a crashing user process.

Impact:

Sensitive kernel data may be disclosed.

CVE-2019-15875 SA-20:03.thrmisc 2020-01-28 2020-01-29
FreeBSD -- Missing IPsec anti-replay window check FreeBSD-kernel 12.012.0_13

Problem Description:

A missing check means that an attacker can reinject an old packet and it will be accepted and processed by the IPsec endpoint.

Impact:

The impact depends on the higher-level protocols in use over IPsec. For example, an attacker who can capture and inject packets could cause an action that was intentionally performed once to be repeated.

CVE-2019-5613 SA-20:02.ipsec 2020-01-28 2020-01-29
FreeBSD -- libfetch buffer overflow FreeBSD 12.112.1_2 12.012.0_13 11.311.3_6

Problem Description:

A programming error allows an attacker who can specify a URL with a username and/or password components to overflow libfetch(3) buffers.

Impact:

An attacker in control of the URL to be fetched (possibly via HTTP redirect) may cause a heap buffer overflow, resulting in program misbehavior or malicious code execution.

CVE-2020-7450 SA-20:01.libfetch 2020-01-28 2020-01-29
Gitlab -- Vulnerability gitlab-ce 12.7.012.7.6 12.6.012.6.7 12.5.012.5.10

Gitlab reports:

Incorrect membership handling of group sharing feature

https://about.gitlab.com/releases/2020/02/13/critical-security-release-gitlab-12-dot-7-dot-6-released/ CVE-2020-8795 2020-02-13 2020-02-13
dovecot -- multiple vulnerabilities dovecot 2.3.9.3

Aki Tuomi reports:

lib-smtp doesn't handle truncated command parameters properly, resulting in infinite loop taking 100% CPU for the process. This happens for LMTP (where it doesn't matter so much) and also for submission-login where unauthenticated users can trigger it.

Aki also reports:

Snippet generation crashes if: message is large enough that message-parser returns multiple body blocks The first block(s) don't contain the full snippet (e.g. full of whitespace) input ends with '>'

https://dovecot.org/pipermail/dovecot-news/2020-February/000430.html https://dovecot.org/pipermail/dovecot-news/2020-February/000431.html CVE-2020-7046 CVE-2020-7967 2020-01-14 2020-02-13
grub2-bhyve -- multiple privilege escalations grub2-bhyve 0.40_8

Reno Robert reports:

FreeBSD uses a two-process model for running a VM. For booting non-FreeBSD guests, a modified grub-emu is used (grub-bhyve). Grub-bhyve executes command from guest grub.cfg file. This is a security problem because grub was never written to handle inputs from OS as untrusted. In the current design, grub and guest OS works across trust boundaries. This exposes a grub to untrusted inputs from guest.

grub-bhyve (emu) is built without SDL graphics support which reduces lot of gfx attack surface, however font loading code is still accessible. Guest can provide arbitrary font file, which is parsed by grub-bhyve running as root.

In grub-core/font/font.c, read_section_as_string() allocates section->length + 1 bytes of memory. However, untrusted section->length is an unsigned 32-bit number, and the result can overflow to malloc(0). This can result in a controlled buffer overflow via the 'loadfont' command in a guest VM grub2.cfg, eventually leading to privilege escalation from guest to host.

Reno Robert also reports:

GRUB supports commands to read and write addresses of choice. In grub-bhyve, these commands provide a way to write to arbitrary virtual addresses within the grub-bhyve process. This is another way for a guest grub2.cfg, run by the host, to eventually escalate privileges.

These vulnerabilities are mitigated by disabling the 'loadfont', 'write_dword', 'read_dword', 'inl', 'outl', and other width variants of the same functionality in grub2-bhyve.

There is also work in progress to sandbox the grub-bhyve utility such that an escaped guest ends up with nobody:nobody in a Capsium sandbox. It is not included in 0.40_8.

https://www.voidsecurity.in/ 2019-12-09 2020-02-12
libexif -- privilege escalation libexif 0.6.21_5

Mitre reports:

In libexif, there is a possible out of bounds write due to an integer overflow. This could lead to remote escalation of privilege in the media content provider with no additional execution privileges needed. User interaction is needed for exploitation.

CVE-2019-9278 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9278 https://security-tracker.debian.org/tracker/CVE-2019-9278 https://seclists.org/bugtraq/2020/Feb/9 https://github.com/libexif/libexif/issues/26 2019-02-06 2020-02-11
Flash Player -- arbitrary code execution linux-flashplayer 32.0.0.330

Adobe reports:

  • This update resolves a type confusion vulnerability that could lead to arbitrary code execution (CVE-2020-3757).
CVE-2020-3757 https://helpx.adobe.com/security/products/flash-player/apsb20-06.html 2020-02-11 2020-02-11
NGINX -- HTTP request smuggling nginx 1.16.1_11,2 nginx-devel 1.17.7

NGINX Team reports:

NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20372 CVE-2019-20372 2019-12-10 2020-02-09
ksh93 -- certain environment variables interpreted as arithmetic expressions on startup, leading to code injection ksh93 2020.0.02020.0.1_1,1 ksh93-devel 2020.02.07

Upstream ksh93 maintainer Siteshwar Vashisht reports:

A flaw was found in the way ksh evaluates certain environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Services and applications that allow remote unauthenticated attackers to provide one of those environment variables could allow them to exploit this issue remotely.

https://bugzilla.redhat.com/show_bug.cgi?id=1757324 https://access.redhat.com/security/cve/CVE-2019-14868 https://access.redhat.com/errata/RHSA-2020:0431 2019-10-01 2020-02-07
clamav -- Denial-of-Service (DoS) vulnerability clamav 0.102.2,1

Micah Snyder reports:

A denial-of-service (DoS) condition may occur when using the optional credit card data-loss-prevention (DLP) feature. Improper bounds checking of an unsigned variable resulted in an out-of-bounds read, which causes a crash.

https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html CVE-2020-3123 2020-02-05 2020-02-05
Django -- potential SQL injection vulnerability py27-django111 py35-django111 py36-django111 py37-django111 py38-django111 1.11.28 py35-django22 py36-django22 py37-django22 py38-django22 2.2.10 py36-django30 py37-django30 py38-django30 3.0.3

MITRE CVE reports:

Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7471 https://docs.djangoproject.com/en/1.11/releases/1.11.28/ https://docs.djangoproject.com/en/2.2/releases/2.2.10/ https://docs.djangoproject.com/en/3.0/releases/3.0.3/ CVE-2020-7471 2020-02-03 2020-02-04
MariaDB -- Vulnerability in C API mariadb55-client 5.5.67 mariadb55-server 5.5.67 mariadb101-client 10.1.44 mariadb101-server 10.1.44 mariadb102-client 10.2.31 mariadb102-server 10.2.31 mariadb103-client 10.3.22 mariadb103-server 10.3.22 mariadb104-client 10.4.12 mariadb104-server 10.4.12 mariadb-connector-c 3.1.7

MariaDB reports:

Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client.

https://mariadb.com/kb/en/security/ https://mariadb.com/kb/en/mdb-5567-rn/ https://mariadb.com/kb/en/mdb-10412-rn/ https://mariadb.com/kb/en/mdb-10322-rn/ https://mariadb.com/kb/en/mdb-10231-rn/ https://mariadb.com/kb/en/mdb-10144-rn/ https://mariadb.com/kb/en/mariadb-connector-c-317-release-notes/ CVE-2020-2574 2020-01-28 2020-02-02
libssh -- Unsanitized location in scp could lead to unwanted command execution libssh 0.4.00.8.8 0.9.00.9.3

The libssh team reports:

In an environment where a user is only allowed to copy files and not to execute applications, it would be possible to pass a location which contains commands to be executed in additon.

When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of ssh_scp_new(), it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.

https://www.libssh.org/security/advisories/CVE-2019-14889.txt https://nvd.nist.gov/vuln/detail/CVE-2019-14889 CVE-2019-14889 2019-11-14 2020-02-02
spamassassin -- Nefarious rule configuration files can run system commands spamassassin 3.4.4

The Apache SpamAssassin project reports:

A nefarious rule configuration (.cf) files can be configured to run system commands. This issue is less stealthy and attempts to exploit the issue will throw warnings.

Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.

https://mail-archives.apache.org/mod_mbox/spamassassin-announce/202001.mbox/%3c0a91e67a-3190-36e5-41e9-d3553743bcd2@apache.org%3e https://mail-archives.apache.org/mod_mbox/spamassassin-announce/202001.mbox/%3ccdae17ce-acde-6060-148a-6dc5f45ee728@apache.org%3e CVE-2020-1930 CVE-2020-1931 2020-01-28 2020-01-31
sudo -- Potential bypass of Runas user restrictions sudo 1.8.31

Todd C. Miller reports:

Sudo's pwfeedback option can be used to provide visual feedback when the user is inputting their password. For each key press, an asterisk is printed. This option was added in response to user confusion over how the standard Password: prompt disables the echoing of key presses. While pwfeedback is not enabled by default in the upstream version of sudo, some systems, such as Linux Mint and Elementary OS, do enable it in their default sudoers files.

Due to a bug, when the pwfeedback option is enabled in the sudoers file, a user may be able to trigger a stack-based buffer overflow. This bug can be triggered even by users not listed in the sudoers file. There is no impact unless pwfeedback has been enabled.

https://www.sudo.ws/alerts/pwfeedback.html CVE-2019-18634 2020-01-30 2020-01-30
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.7.012.7.4 12.6.012.6.6 5.312.5.9

Gitlab reports:

Path Traversal to Arbitrary File Read

User Permissions Not Validated in ProjectExportWorker

XSS Vulnerability in File API

Package and File Disclosure through GitLab Workhorse

XSS Vulnerability in Create Groups

Issue and Merge Request Activity Counts Exposed

Email Confirmation Bypass Using AP

Disclosure of Forked Private Project Source Code

Private Project Names Exposed in GraphQL queries

Disclosure of Issues and Merge Requests via Todos

Denial of Service via AsciiDoc

Last Pipeline Status Exposed

Arbitrary Change of Pipeline Status

Grafana Token Displayed in Plaintext

Update excon gem

Update rdoc gem

Update rack-cors gem

Update rubyzip gem

https://about.gitlab.com/releases/2020/01/30/security-release-gitlab-12-7-4-released/ CVE-2020-7966 CVE-2020-8114 CVE-2020-7973 CVE-2020-6833 CVE-2020-7971 CVE-2020-7967 CVE-2020-7972 CVE-2020-7968 CVE-2020-7979 CVE-2020-7969 CVE-2020-7978 CVE-2020-7974 CVE-2020-7977 CVE-2020-7976 CVE-2019-16779 CVE-2019-18978 CVE-2019-16892 2020-01-30 2020-01-31
OpenSMTPd -- critical LPE / RCE vulnerability opensmtpd 6.4.0,16.6.2,1

OpenSMTPD developers report:

An incorrect check allows an attacker to trick mbox delivery into executing arbitrary commands as root and lmtp delivery into executing arbitrary commands as an unprivileged user

CVE-2020-7247 https://www.openwall.com/lists/oss-security/2020/01/28/3 2020-01-28 2020-01-29
jenkins -- multiple vulnerabilities jenkins 2.219 jenkins-lts 2.204.2

Jenkins Security Advisory:

Description

(High) SECURITY-1682 / CVE-2020-2099

Inbound TCP Agent Protocol/3 authentication bypass

(Medium) SECURITY-1641 / CVE-2020-2100

Jenkins vulnerable to UDP amplification reflection attack

(Medium) SECURITY-1659 / CVE-2020-2101

Non-constant time comparison of inbound TCP agent connection secret

(Medium) SECURITY-1660 / CVE-2020-2102

Non-constant time HMAC comparison

(Medium) SECURITY-1695 / CVE-2020-2103

Diagnostic page exposed session cookies

(Medium) SECURITY-1650 / CVE-2020-2104

Memory usage graphs accessible to anyone with Overall/Read

(Low) SECURITY-1704 / CVE-2020-2105

Jenkins REST APIs vulnerable to clickjacking

(Medium) SECURITY-1680 / CVE-2020-2106

Stored XSS vulnerability in Code Coverage API Plugin

(Medium) SECURITY-1565 / CVE-2020-2107

Fortify Plugin stored credentials in plain text

(High) SECURITY-1719 / CVE-2020-2108

XXE vulnerability in WebSphere Deployer Plugin

CVE-2020-2099 CVE-2020-2100 CVE-2020-2101 CVE-2020-2102 CVE-2020-2103 CVE-2020-2104 CVE-2020-2105 CVE-2020-2106 CVE-2020-2107 CVE-2020-2108 https://jenkins.io/security/advisory/2020-01-29/ 2020-01-29 2020-01-29
pkg -- vulnerability in libfetch pkg 1.12.0_1 pkg-devel 1.12.99_1

A programming error allows an attacker who can specify a URL with a username and/or password components to overflow libfetch(3) buffers.

SA-20:01.libfetch CVE-2020-7450 2020-01-28 2020-01-29
samba -- multiple vulnerabilities samba410 4.10.12 samba411 4.11.4

The Samba Team reports:

CVE-2019-14902

The implementation of ACL inheritance in the Samba AD DC was not complete, and so absent a 'full-sync' replication, ACLs could get out of sync between domain controllers.

CVE-2019-14907

When processing untrusted string input Samba can read past the end of the allocated buffer when printing a "Conversion error" message to the logs.

CVE-2019-19344

During DNS zone scavenging (of expired dynamic entries) there is a read of memory after it has been freed.

https://www.samba.org/samba/history/samba-4.10.12.html CVE-2019-14902 CVE-2019-14907 CVE-2019-19344 2020-01-14 2020-01-27
webkit-gtk3 -- Multiple vulnerabilities webkit2-gtk3 2.26.3

The WebKitGTK project reports multiple vulnerabilities.

https://webkitgtk.org/security/WSA-2020-0001.html CVE-2019-8835 CVE-2019-8844 CVE-2019-8846 2020-01-23 2020-01-26
Pillow -- Multiple vulnerabilities py27-pillow py35-pillow py36-pillow py37-pillow py38-pillow 6.2.2

Pillow developers report:

This release addresses several security problems, as well as addressing CVE-2019-19911.

CVE-2019-19911 is regarding FPX images. If an image reports that it has a large number of bands, a large amount of resources will be used when trying to process the image. This is fixed by limiting the number of bands to those usable by Pillow.

Buffer overruns were found when processing an SGI, PCX or FLI image. Checks have been added to prevent this.

Overflow checks have been added when calculating the size of a memory block to be reallocated in the processing of a TIFF image.

https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html CVE-2019-19911 CVE-2020-5310 CVE-2020-5311 CVE-2020-5312 CVE-2020-5313 ports/243336 2019-12-19 2020-01-24
gitea -- multiple vulnerabilities gitea 1.10.3

The Gitea Team reports:

  • Hide credentials when submitting migration
  • Never allow an empty password to validate
  • Prevent redirect to Host
  • Hide public repos owned by private orgs
https://github.com/go-gitea/gitea/releases/tag/v1.10.3 ports/243437 2019-11-22 2020-01-18
MySQL -- Multiple vulerabilities mysql56-server 5.6.47 mysql57-server 5.7.29 mysql80-server 8.0.19 percona55-server 5.5.67 percona56-server 5.6.47 percona57-server 5.7.29

Oracle reports:

This Critical Patch Update contains 17 new security fixes for Oracle MySQL. 5 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.

https://www.oracle.com/security-alerts/cpujan2020.html CVE-2019-1547 CVE-2020-2579 CVE-2020-2686 CVE-2020-2627 CVE-2020-2570 CVE-2020-2573 CVE-2020-2574 CVE-2020-2577 CVE-2020-2589 CVE-2020-2580 CVE-2020-2588 CVE-2020-2660 CVE-2020-2679 CVE-2020-2584 CVE-2020-2694 CVE-2020-2572 CVE-2019-8457 2020-01-14 2020-01-15 2020-02-02
drm graphics drivers -- potential information disclusure via local access drm-fbsd11.2-kmod 4.11.g20200115 drm-fbsd12.0-kmod 4.16.g20200115 drm-current-kmod 4.16.g20200115 drm-devel-kmod 5.0.g20200115

Intel reports:

.A potential security vulnerability in Intel(R) Processor Graphics may allow information disclosure. Intel is releasing software updates to mitigate this potential vulnerability.

Description: Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.

This patch provides mitigation for Gen9 hardware only. Patches for Gen7 and Gen7.5 will be provided later. Note that Gen8 is not impacted due to a previously implemented workaround. The mitigation involves using an existing hardware feature to forcibly clear down all EU state at each context switch.

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html CVE-2019-14615 2020-01-14 2020-01-15
Template::Toolkit -- Directory traversal on write p5-Template-Toolkit 3.004

Art Manion and Will Dormann report:

By using an older and less-secure form of open(), it is possible for untrusted template files to cause reads/writes outside of the template directories. This vulnerability is a component of the recent Citrix exploit.

https://www.kb.cert.org/vuls/id/619785/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19781 CVE-2019-19781 2019-12-13 2020-01-14
Gitlab -- Private objects exposed through project import gitlab-ce 12.6.012.6.4 12.5.012.5.7 8.9.012.4.8

Gitlab reports:

Private objects exposed through project importi

https://about.gitlab.com/releases/2020/01/13/critical-security-release-gitlab-12-dot-6-dot-4-released/ CVE-2020-6832 2020-01-13 2020-01-14
e2fsprogs -- rehash.c/pass 3a mutate_name() code execution vulnerability e2fsprogs 1.45.5

Lilith of Cisco Talos reports:

A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.

Theodore Y. Ts'o reports:

E2fsprogs 1.45.5 [...:] Fix a potential out of bounds write when checking a maliciously corrupted file system. This is probably not exploitable on 64-bit platforms, but may be exploitable on 32-bit binaries depending on how the compiler lays out the stack variables. (Addresses CVE-2019-5188)

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973 http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.45.5 CVE-2019-5188 2019-12-18 2020-01-08
phpMyAdmin -- SQL injection phpMyAdmin phpMyAdmin-php72 phpMyAdmin-php73 phpMyAdmin-php74 phpMyAdmin5 phpMyAdmin5-php72 phpMyAdmin5-php73 phpMyAdmin5-php74 4.9.4 5.0.05.0.1

The phpMyAdmin development team reports:

A SQL injection flaw has been discovered in the user accounts page

https://www.phpmyadmin.net/security/PMASA-2020-1/ CVE-2020-5504 2020-01-05 2020-01-11
cacti -- multiple vulnerabilities cacti 1.2.8

The cacti developers reports:

When viewing graphs, some input variables are not properly checked (SQL injection possible).

Multiple instances of lib/functions.php are affected by unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP module.

https://github.com/Cacti/cacti/releases/tag/release%2F1.2.8 CVE-2019-17357 CVE-2019-17358 ports/242834 2019-10-12 2020-01-06
Gitlab -- Multiple Vulnerabilities gitlab-ce 12.6.012.6.2 12.5.012.5.6 5.1.012.4.7

SO-AND-SO reports:

Group Maintainers Can Update/Delete Group Runners Using API

GraphQL Queries Can Hang the Application

Unauthorized Users Have Access to Milestones of Releases

Private Group Name Revealed Through Protected Tags API

Users Can Publish Reviews on Locked Merge Requests

DoS in the Issue and Commit Comments Pages

Project Name Disclosed Through Unsubscribe Link

Private Project Name Disclosed Through Notification Settings

https://about.gitlab.com/blog/2020/01/02/security-release-gitlab-12-6-2-released/ CVE-2019-20144 CVE-2019-20146 CVE-2019-20143 CVE-2019-20147 CVE-2019-20145 CVE-2019-20142 CVE-2019-20148 CVE-2020-5197 2020-01-02 2020-01-03
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 2a52f204707f..742cd18d67c0 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,2470 +1,2470 @@ freerdp -- clients using the `/video` command line switch might read uninitialized data freerdp 2.8.1

MITRE reports:

All FreeRDP based clients when using the `/video` command line switch might read uninitialized data, decode it as audio/video and display the result. FreeRDP based server implementations are not affected.

CVE-2022-39283 https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6cf9-3328-qrvh 2022-10-13 2023-02-24
freerdp -- clients using `/parallel` command line switch might read uninitialized data freerdp 2.8.1

MITRE reports:

FreeRDP based clients on unix systems using `/parallel` command line switch might read uninitialized data and send it to the server the client is currently connected to. FreeRDP based server implementations are not affected.

CVE-2022-39282 https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c45q-wcpg-mxjq 2022-10-13 2023-02-24
chromium -- multiple vulnerabilities chromium 110.0.5481.177 ungoogled-chromium 110.0.5481.177

Chrome Releases reports:

This update includes 10 security fixes:

  • [1415366] Critical CVE-2023-0941: Use after free in Prompts. Reported by Anonymous on 2023-02-13
  • [1414738] High CVE-2023-0927: Use after free in Web Payments API. Reported by Rong Jian of VRI on 2023-02-10
  • [1309035] High CVE-2023-0928: Use after free in SwiftShader. Reported by Anonymous on 2022-03-22
  • [1399742] High CVE-2023-0929: Use after free in Vulkan. Reported by Cassidy Kim(@cassidy6564) on 2022-12-09
  • [1410766] High CVE-2023-0930: Heap buffer overflow in Video. Reported by Cassidy Kim(@cassidy6564) on 2023-01-27
  • [1407701] High CVE-2023-0931: Use after free in Video. Reported by Cassidy Kim(@cassidy6564) on 2023-01-17
  • [1413005] High CVE-2023-0932: Use after free in WebRTC. Reported by Omri Bushari (Talon Cyber Security) on 2023-02-05
  • [1404864] Medium CVE-2023-0933: Integer overflow in PDF. Reported by Zhiyi Zhang from Codesafe Team of Legendsec at QI-ANXIN
CVE-2023-0941 CVE-2023-0927 CVE-2023-0928 CVE-2023-0929 CVE-2023-0930 CVE-2023-0931 CVE-2023-0932 CVE-2023-0933 https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html 2023-02-22 2023-02-22
zeek -- potential DoS vulnerabilities zeek 5.0.7

Tim Wojtulewicz of Corelight reports:

Receiving DNS responses from async DNS requests (via the lookup_addr, etc BIF methods) with the TTL set to zero could cause the DNS manager to eventually stop being able to make new requests.

Specially-crafted FTP packets with excessively long usernames, passwords, or other fields could cause log writes to use large amounts of disk space.

The find_all and find_all_ordered BIF methods could take extremely large amounts of time to process incoming data depending on the size of the input.

https://github.com/zeek/zeek/releases/tag/v5.0.7 2023-02-21 2023-02-21
- libde256 -- multiple vulnabilities + libde256 -- multiple vulnerabilities libde265 1.0.11

Libde265 developer reports:

This release fixes the known CVEs below. Many of them are actually caused by the same underlying issues that manifest in different ways.

CVE-2020-21594 CVE-2020-21595 CVE-2020-21596 CVE-2020-21597 CVE-2020-21598 CVE-2020-21599 CVE-2020-21600 CVE-2020-21601 CVE-2020-21602 CVE-2020-21603 CVE-2020-21604 CVE-2020-21605 CVE-2020-21606 CVE-2022-1253 CVE-2022-43236 CVE-2022-43237 CVE-2022-43238 CVE-2022-43239 CVE-2022-43240 CVE-2022-43241 CVE-2022-43242 CVE-2022-43243 CVE-2022-43244 CVE-2022-43245 CVE-2022-43248 CVE-2022-43249 CVE-2022-43250 CVE-2022-43252 CVE-2022-43253 CVE-2022-47655 https://github.com/strukturag/libde265/releases/tag/v1.0.10 2023-01-27 2023-02-21
git -- "git apply" overwriting paths outside the working tree git 2.39.2

git team reports:

By feeding a crafted input to "git apply", a path outside the working tree can be overwritten as the user who is running "git apply".

CVE-2023-23946 https://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/#cve-2023-23946 2023-02-14 2023-02-21
git -- Local clone-based data exfiltration with non-local transports git 2.39.2

git team reports:

Using a specially-crafted repository, Git can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source $GIT_DIR/objects directory contains symbolic links (c.f., CVE-2022-39253), the objects directory itself may still be a symbolic link.

These two may be combined to include arbitrary files based on known paths on the victim's filesystem within the malicious repository's working copy, allowing for data exfiltration in a similar manner as CVE-2022-39253.

CVE-2023-22490 https://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/#cve-2023-22490 2023-02-14 2023-02-21
git -- gitattributes parsing integer overflow git 2.39.1

git team reports:

gitattributes are used to define unique attributes corresponding to paths in your repository. These attributes are defined by .gitattributes file(s) within your repository.

The parser used to read these files has multiple integer overflows, which can occur when parsing either a large number of patterns, a large number of attributes, or attributes with overly-long names.

These overflows may be triggered via a malicious .gitattributes file. However, Git automatically splits lines at 2KB when reading .gitattributes from a file, but not when parsing it from the index. Successfully exploiting this vulnerability depends on the location of the .gitattributes file in question.

This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution.

CVE-2022-23521 https://github.blog/2023-01-17-git-security-vulnerabilities-announced-2/#cve-2022-23521 2023-01-17 2023-02-21
git -- Heap overflow in `git archive`, `git log --format` leading to RCE git 2.39.1

The git team reports:

git log has the ability to display commits using an arbitrary format with its --format specifiers. This functionality is also exposed to git archive via the export-subst gitattribute.

When processing the padding operators (e.g., %<(, %<|(, %>(, %>>(, or %><( ), an integer overflow can occur in pretty.c::format_and_pad_commit() where a size_t is improperly stored as an int, and then added as an offset to a subsequent memcpy() call.

This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., git log --format=...). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive.

This integer overflow can result in arbitrary heap writes, which may result in remote code execution.

CVE-2022-41903 https://github.blog/2023-01-17-git-security-vulnerabilities-announced-2/#cve-2022-41903 2023-01-17 2023-02-21
gitea -- password hash quality gitea 1.18.4

The Gitea team reports:

This PR refactors and improves the password hashing code within gitea and makes it possible for server administrators to set the password hashing parameters.

In addition it takes the opportunity to adjust the settings for pbkdf2 in order to make the hashing a little stronger.

Add command to bulk set must-change-password

As part of administration sometimes it is appropriate to forcibly tell users to update their passwords.

This PR creates a new command gitea admin user must-change-password which will set the MustChangePassword flag on the provided users.

https://blog.gitea.io/2023/02/gitea-1.18.4-is-released/ https://github.com/go-gitea/gitea/releases/tag/v1.18.4 2022-02-14 2023-02-20
traefik -- Use of vulnerable Go module x/net/http2 traefik 2.9.8

The Go project reports:

A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead be reading the body of the HTTP request, which could be attacker-manipulated to represent arbitrary HTTP2 requests.

CVE-2022-41721 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41721 2022-10-22 2023-02-19
Rundeck3 -- Log4J RCE vulnerability rundeck3 3.4.10

The Rundeck project reports:

This release updates both Community and Enterprise with the latest Log4J to address CVE-2021-44832 by updating it to 2.17.1.

CVE-2021-44832 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832 2021-12-11 2023-02-16
MinIO -- unprivileged users can create service accounts for admin users minio 2022.04.12.06.55.35

MinIO reports:

A security issue was found where an unprivileged user is able to create service accounts for root or other admin users and then is able to assume their access policies via the generated credentials.

CVE-2022-24842 https://github.com/minio/minio/security/advisories/GHSA-2j69-jjmg-534q 2022-04-11 2023-02-13
clamav -- Multiple vulnerabilities clamav 1.0.1,1 clamav-lts 0.103.8,1

Simon Scannell reports:

CVE-2023-20032
Fixed a possible remote code execution vulnerability in the HFS+ file parser.
CVE-2023-20052
Fixed a possible remote information leak vulnerability in the DMG file parser.
CVE-2023-20032 CVE-2023-20052 https://blog.clamav.net/2023/02/clamav-01038-01052-and-101-patch.html 2023-02-15 2023-02-16
go -- multiple vulnerabilities go119 1.19.6 go120 1.20.1

The Go project reports:

path/filepath: path traversal in filepath.Clean on Windows

On Windows, the filepath.Clean function could transform an invalid path such as a/../c:/b into the valid path c:\b. This transformation of a relative (if invalid) path into an absolute path could enable a directory traversal attack. The filepath.Clean function will now transform this path into the relative (but still invalid) path .\c:\b.

net/http, mime/multipart: denial of service from excessive resource consumption

Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue.

crypto/tls: large handshake records may cause panics

Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses.

net/http: avoid quadratic complexity in HPACK decoding

A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.

CVE-2022-41722 CVE-2022-41725 CVE-2022-41724 CVE-2022-41723 https://groups.google.com/g/golang-dev/c/G2APtTxT1HQ/m/6O6aksDaBAAJ 2023-02-14 2023-02-15
Django -- multiple vulnerabilities py37-django32 py38-django32 py39-django32 py310-django32 3.2.18 py38-django40 py39-django40 py310-django40 4.0.10 py38-django41 py39-django41 py310-django41 4.1.7

Django reports:

CVE-2023-24580: Potential denial-of-service vulnerability in file uploads.

CVE-2023-24580 https://www.djangoproject.com/weblog/2023/feb/14/security-releases/ 2023-02-01 2023-02-14
GnuTLS -- timing sidechannel in RSA decryption gnutls 3.7.9

The GnuTLS project reports:

A vulnerability was found that the response times to malformed RSA ciphertexts in ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding. Only TLS ciphertext processing is affected.

CVE-2023-0361 https://gnutls.org/security-new.html#GNUTLS-SA-2020-07-14 2023-02-10 2023-02-13
phpmyfaq -- multiple vulnerabilities phpmyfaq 3.1.11

phpmyfaq developers report:

a bypass to flood admin with FAQ proposals

stored XSS in questions

stored HTML injections

weak passwords

https://huntr.dev/bounties/14fc4841-0f5d-4e12-bf9e-1b60d2ac6a6c/ https://huntr.dev/bounties/8c74ccab-0d1d-4c6b-a0fa-803aa65de04f/ https://huntr.dev/bounties/87397c71-7b84-4617-a66e-fa6c73be9024/ https://huntr.dev/bounties/808d5452-607c-4af1-812f-26c49faf3e61/ https://huntr.dev/bounties/d9375178-2f23-4f5d-88bd-bba3d6ba7cc5/ https://huntr.dev/bounties/06af150b-b481-4248-9a48-56ded2814156/ https://huntr.dev/bounties/7152b340-c6f3-4ac8-9f62-f764a267488d/ https://huntr.dev/bounties/9e21156b-ab1d-4c60-88ef-8c9f3e2feb7f/ https://huntr.dev/bounties/b3881a1f-2f1e-45cb-86f3-735f66e660e9/ https://huntr.dev/bounties/949975f1-271d-46aa-85e5-1a013cdb5efb/ 2023-02-12 2023-02-12
chromium -- multiple vulnerabilities chromium 110.0.5481.77 ungoogled-chromium 110.0.5481.77

Chrome Releases reports:

This release contains 15 security fixes, including:

  • [1402270] High CVE-2023-0696: Type Confusion in V8. Reported by Haein Lee at KAIST Hacking Lab on 2022-12-18
  • [1341541] High CVE-2023-0697: Inappropriate implementation in Full screen mode. Reported by Ahmed ElMasry on 2022-07-03
  • [1403573] High CVE-2023-0698: Out of bounds read in WebRTC. Reported by Cassidy Kim(@cassidy6564) on 2022-12-25
  • [1371859] Medium CVE-2023-0699: Use after free in GPU. Reported by 7o8v and Cassidy Kim(@cassidy6564) on 2022-10-06
  • [1393732] Medium CVE-2023-0700: Inappropriate implementation in Download. Reported by Axel Chong on 2022-11-26
  • [1405123] Medium CVE-2023-0701: Heap buffer overflow in WebUI. Reported by Sumin Hwang of SSD Labs on 2023-01-05
  • [1316301] Medium CVE-2023-0702: Type Confusion in Data Transfer. Reported by Sri on 2022-04-14
  • [1405574] Medium CVE-2023-0703: Type Confusion in DevTools. Reported by raven at KunLun lab on 2023-01-07
  • [1385982] Low CVE-2023-0704: Insufficient policy enforcement in DevTools. Reported by Rhys Elsmore and Zac Sims of the Canva security team on 2022-11-18
  • [1238642] Low CVE-2023-0705: Integer overflow in Core. Reported by SorryMybad (@S0rryMybad) of Kunlun Lab on 2021-08-11
CVE-2023-0696 CVE-2023-0697 CVE-2023-0698 CVE-2023-0699 CVE-2023-0700 CVE-2023-0701 CVE-2023-0702 CVE-2023-0703 CVE-2023-0704 CVE-2023-0705 https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html 2023-02-07 2023-02-10
PostgreSQL server -- Client memory disclosure when connecting, with Kerberos, to modified server. postgresql15-client 15.2 postgresql14-client 14.7 postgresql13-client 13.10 postgresql12-client 12.14

PostgreSQL Project reports:

A modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. When a libpq client application has a Kerberos credential cache and doesn't explicitly disable option gssencmode, a server can cause libpq to over-read and report an error message containing uninitialized bytes from and following its receive buffer. If libpq's caller somehow makes that message accessible to the attacker, this achieves a disclosure of the over-read bytes. We have not confirmed or ruled out viability of attacks that arrange for a crash or for presence of notable, confidential information in disclosed bytes.

CVE-2022-41862 https://www.postgresql.org/support/security/CVE-2022-41862/ 2023-02-09 2023-02-09
Grafana -- Stored XSS in ResourcePicker component grafana 8.1.08.5.16 9.0.09.2.10 9.3.09.3.4 grafana8 8.1.08.5.16 grafana9 9.0.09.2.10 9.3.09.3.4

Grafana Labs reports:

On 2022-12-16 during an internal audit of Grafana, a member of the security team found a stored XSS vulnerability affecting the core plugin GeoMap.

The stored XSS vulnerability was possible due to SVG-files weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance.

CVE-2022-23552 https://github.com/grafana/grafana/security/advisories/GHSA-8xmm-x63g-f6xv 2022-12-16 2023-02-09
Grafana -- Spoofing originalUrl of snapshots grafana 8.0.08.5.16 9.0.09.2.10 9.3.09.3.4 grafana8 8.0.08.5.16 grafana9 9.0.09.2.10 9.3.09.3.4

Grafana Labs reports:

A third-party penetration test of Grafana found a vulnerability in the snapshot functionality. The value of the originalUrl parameter is automatically generated. The purpose of the presented originalUrl parameter is to provide a user who views the snapshot with the possibility to click on the Local Snapshot button in the Grafana web UI and be presented with the dashboard that the snapshot captured. The value of the originalUrl parameter can be arbitrarily chosen by a malicious user that creates the snapshot. (Note: This can be done by editing the query thanks to a web proxy like Burp.)

We have assessed this vulnerability as having a CVSS score of 6.7 MEDIUM (CVSS:6.7/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L).

CVE-2022-39324 https://github.com/grafana/grafana/security/advisories/GHSA-4724-7jwc-3fpw 2023-01-25 2023-02-09
LibreSSL -- Arbitrary memory read libressl 3.5.4 libressl-devel 3.6.2

The OpenBSD project reports:

A malicious certificate revocation list or timestamp response token would allow an attacker to read arbitrary memory.

https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.5.4-relnotes.txt 2023-02-08 2023-02-08
xorg-server -- Security issue in the X server xorg-server xephyr xorg-vfbserver 21.1.7,1 xorg-nestserver 21.1.7,2 xwayland 22.1.8,1 xwayland-devel 21.0.99.1.386

The X.org project reports:

  • CVE-2023-0494/ZDI-CAN-19596: X.Org Server DeepCopyPointerClasses use-after-free

    A dangling pointer in DeepCopyPointerClasses can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read/write into freed memory.

https://lists.x.org/archives/xorg-announce/2023-February/003320.html CVE-2023-0494 2023-02-07 2023-02-08
TightVNC -- Muliple Vulnerabilities tightvnc 1.3.10_6

MITRE reports:

TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.

TightVNC code version 1.3.10 contains global buffer overflow in HandleCoRREBBP macro function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.

TightVNC code version 1.3.10 contains heap buffer overflow in InitialiseRFBConnection function, which can potentially result code execution. This attack appear to be exploitable via network connectivity.

TightVNC code version 1.3.10 contains null pointer dereference in HandleZlibBPP function, which results Denial of System (DoS). This attack appear to be exploitable via network connectivity.

CVE-2019-8287 CVE-2019-15678 CVE-2019-15679 CVE-2019-15680 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8287 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15678 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15679 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15680 2019-02-12 2023-02-08
OpenSSL -- Multiple vulnerabilities openssl 1.1.1t,1 openssl-devel 3.0.8 openssl-quictls 3.0.8

The OpenSSL project reports:

X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) (High): There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING.

Timing Oracle in RSA Decryption (CVE-2022-4304) (Moderate): A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE.

X.509 Name Constraints Read Buffer Overflow (CVE-2022-4203) (Moderate): A read buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer.

Use-after-free following BIO_new_NDEF (CVE-2023-0215) (Moderate): The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications.

Double free after calling PEM_read_bio_ex (CVE-2022-4450) (Moderate): The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack.

Invalid pointer dereference in d2i_PKCS7 functions (CVE-2023-0216) (Moderate): An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions.

NULL dereference validating DSA public key (CVE-2023-0217) (Moderate): An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the EVP_PKEY_public_check() function. This will most likely lead to an application crash. This function can be called on public keys supplied from untrusted sources which could allow an attacker to cause a denial of service attack.

NULL dereference during PKCS7 data verification (CVE-2023-0401) (Moderate): A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not available the digest initialization will fail. There is a missing check for the return value from the initialization function which later leads to invalid usage of the digest API most likely leading to a crash.

CVE-2023-0286 CVE-2022-4304 CVE-2022-4203 CVE-2023-0215 CVE-2022-4450 CVE-2023-0216 CVE-2023-0401 https://www.openssl.org/news/secadv/20230207.txt 2023-02-07 2023-02-07
Django -- multiple vulnerabilities py37-django32 py38-django32 py39-django32 py310-django32 3.2.17 py38-django40 py39-django40 py310-django40 4.0.9 py38-django41 py39-django41 py310-django41 4.1.6

Django reports:

CVE-2023-23969: Potential denial-of-service via Accept-Language headers.

CVE-2023-23969 https://www.djangoproject.com/weblog/2023/feb/01/security-releases/ 2023-02-01 2023-02-06
kafka -- Denial Of Service vulnerability kafka 3.3.2

NIST reports:

jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.

CVE-2020-36518 https://nvd.nist.gov/vuln/detail/CVE-2020-36518 2022-03-11 2023-02-04
node_exporter -- bypass security with cache poisoning node_exporter 1.5.0

Prometheus team reports:

Prometheus and its exporters can be secured by a web.yml file that specifies usernames and hashed passwords for basic authentication. Passwords are hashed with bcrypt, which means that even if you have access to the hash, it is very hard to find the original password back. Passwords are hashed with bcrypt, which means that even if you have access to the hash, it is very hard to find the original password back. However, a flaw in the way this mechanism was implemented in the exporter toolkit makes it possible with people who know the hashed password to authenticate against Prometheus. A request can be forged by an attacker to poison the internal cache used to cache the computation of hashes and make subsequent requests successful. This cache is used in both happy and unhappy scenarios in order to limit side channel attacks that could tell an attacker if a user is present in the file or not.

CVE-2022-46146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46146 2021-11-28 2023-02-04
Asterisk -- multiple vulnerabilities asterisk18 18.15.1

The Asterisk project reports:

AST-2022-007: Remote Crash Vulnerability in H323 channel add on

AST-2022-008: Use after free in res_pjsip_pubsub.c

AST-2022-009: GetConfig AMI Action can read files outside of Asterisk directory

CVE-2022-37325 CVE-2022-42705 CVE-2022-42706 https://downloads.asterisk.org/pub/security/AST-2022-007.html https://downloads.asterisk.org/pub/security/AST-2022-008.html https://downloads.asterisk.org/pub/security/AST-2022-009.html 2022-12-01 2023-02-02
Spotipy -- Path traversal vulnerability py37-spotipy py38-spotipy py39-spotipy py310-spotipy py311-spotipy 2.22.0

Stéphane Bruckert

If a malicious URI is passed to the library, the library can be tricked into performing an operation on a different API endpoint than intended.

CVE-2023-23608 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23608 https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-q764-g6fm-555v 2023-01-16 2023-02-02
zeek -- potential DoS vulnerabilities zeek 5.0.6

Tim Wojtulewicz of Corelight reports:

A missing field in the SMB FSControl script-land record could cause a heap buffer overflow when receiving packets containing those header types.

Receiving a series of packets that start with HTTP/1.0 and then switch to HTTP/0.9 could cause Zeek to spend a large amount of time processing the packets.

Receiving large numbers of FTP commands sequentially from the network with bad data in them could cause Zeek to spend a large amount of time processing the packets, and generate a large amount of events.

https://github.com/zeek/zeek/releases/tag/v5.0.6 2023-02-01 2023-02-01
Gitlab -- Multiple Vulnerabilities gitlab-ce 15.8.015.8.1 15.7.015.7.6 12.4.015.6.7

Gitlab reports:

Denial of Service via arbitrarily large Issue descriptions

CSRF via file upload allows an attacker to take over a repository

Sidekiq background job DoS by uploading malicious CI job artifact zips

Sidekiq background job DoS by uploading a malicious Helm package

CVE-2022-3411 CVE-2022-4138 CVE-2022-3759 CVE-2023-0518 https://about.gitlab.com/releases/2023/01/31/security-release-gitlab-15-8-1-released/ 2023-01-31 2023-02-01
Plex Media Server -- security vulnerability plexmediaserver plexmediaserver-plexpass 1.25.0

Plex Security Team reports:

We have recently been made aware of a security vulnerability in Plex Media Server versions prior to 1.25.0 that could allow a local Windows user to obtain administrator privileges without authorization. To be clear, this required the user to already have local, physical access to the computer (just with a different user account on Windows). There are no indications that this exploit could be used from a remote machine.

Plex Media Server versions 1.25.0.5282 and newer are not subject to this vulnerability, and feature additional hardening to prevent similar issues from occurring in the future. Users running older server versions are encouraged to update their Plex Media Server installations.

CVE-2021-42835 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42835 2021-10-22 2023-01-30
prometheus2 -- basic authentication bypass prometheus 0.8.1

Prometheus team reports:

Prometheus and its exporters can be secured by a web.yml file that specifies usernames and hashed passwords for basic authentication. Passwords are hashed with bcrypt, which means that even if you have access to the hash, it is very hard to find the original password back. Passwords are hashed with bcrypt, which means that even if you have access to the hash, it is very hard to find the original password back. However, a flaw in the way this mechanism was implemented in the exporter toolkit makes it possible with people who know the hashed password to authenticate against Prometheus. A request can be forged by an attacker to poison the internal cache used to cache the computation of hashes and make subsequent requests successful. This cache is used in both happy and unhappy scenarios in order to limit side channel attacks that could tell an attacker if a user is present in the file or not.

CVE-2022-46146 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46146 2022-11-28 2023-01-30
chromium -- multiple vulnerabilities chromium 109.0.5414.119 ungoogled-chromium 109.0.5414.119

Chrome Releases reports:

This release contains 6 security fixes, including:

  • [1376354] High CVE-2023-0471: Use after free in WebTransport. Reported by chichoo Kim(chichoo) and Cassidy Kim(@cassidy6564) on 2022-10-19
  • [1405256] High CVE-2023-0472: Use after free in WebRTC. Reported by Cassidy Kim(@cassidy6564) on 2023-01-06
  • [1404639] Medium CVE-2023-0473: Type Confusion in ServiceWorker API. Reported by raven at KunLun lab on 2023-01-03
  • [1400841] Medium CVE-2023-0474: Use after free in GuestView. Reported by avaue at S.S.L on 2022-12-14
CVE-2023-0471 CVE-2023-0472 CVE-2023-0473 CVE-2023-0474 https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html 2023-01-24 2023-01-25
re2c -- uncontrolled recursion re2c 2.0

re2c reports:

re2c before 2.0 has uncontrolled recursion that causes stack consumption in find_fixed_tags.

CVE-2018-21232 https://nvd.nist.gov/vuln/detail/CVE-2018-21232 2022-05-24 2023-01-25
gitea -- information disclosure gitea 1.18.3

The Gitea team reports:

Prevent multiple To recipients: Change the mailer interface to prevent leaking of possible hidden email addresses when sending to multiple recipients.

https://blog.gitea.io/2023/01/gitea-1.18.3-is-released/ 2022-01-22 2023-01-24
net/krill -- DoS vulnerability krill 0.12.1

MITRE reports:

NLnet Labs Krill supports direct access to the RRDP repository content through its built-in web server at the "/rrdp" endpoint. Prior to 0.12.1 a direct query for any existing directory under "/rrdp/", rather than an RRDP file such as "/rrdp/notification.xml" as would be expected, causes Krill to crash. If the built-in "/rrdp" endpoint is exposed directly to the internet, then malicious remote parties can cause the publication server to crash. The repository content is not affected by this, but the availability of the server and repository can cause issues if this attack is persistent and is not mitigated. .

CVE-2023-0158 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0158 2023-01-10 2023-01-23
www/awstats -- Partial absolute pathname awstats 7.8

MITRE reports:

It seems #90 is not completely fixed in 7.8. (that is, even after CVE-2017-1000501 and CVE-2020-29600 are fixed). In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.

CVE-2020-35176 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35176 2022-12-11 2023-01-23
net/eternalterminal -- Multiple vulnerabilities eternalterminal 6.2.1

Mitre reports:

etserver and etclient have predictable logfile names in /tmp and they are world-readable logfiles

CVE-2022-48257 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48257 CVE-2022-48258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48258 2023-01-13 2023-01-23
powerdns-recursor -- denial of service powerdns-recursor 4.8.04.8.1

PowerDNS Team reports:

PowerDNS Security Advisory 2023-01: unbounded recursion results in program termination

CVE-2023-22617 https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2023-01.html 2023-01-20 2023-01-23
shells/fish -- arbitrary code execution via git fish 3.1.03.4.0

Peter Ammon reports:

fish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. When using the default configuration of fish, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory into one controlled by the attacker, such as on a shared file system or extracted archive, fish will run arbitrary commands under the attacker's control. This problem has been fixed in fish 3.4.0. Note that running git in these directories, including using the git tab completion, remains a potential trigger for this issue. As a workaround, remove the fish_git_prompt function from the prompt.

CVE-2022-20001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20001 2021-12-26 2023-01-21
MySQL -- Multiple vulnerabilities mysql-connector-c++ 8.0.33 mysql-connector-odbc 8.0.33 mysql-client57 5.7.42 mysql-server57 5.7.42 mysql-client80 8.0.33 mysql-server80 8.0.33

Oracle reports:

This Critical Patch Update contains 37 new security patches for Oracle MySQL. 8 of these vulnerabilities may be remotely exploitable without authentication, i.e., may be exploited over a network withouti requiring user credentials.

CVE-2022-32221 CVE-2022-24407 CVE-2022-24407 CVE-2022-3171 CVE-2022-1941 CVE-2023-21868 CVE-2023-21860 CVE-2023-21875 CVE-2023-21869 CVE-2023-21877 CVE-2023-21880 CVE-2023-21872 CVE-2023-21871 CVE-2023-21836 CVE-2023-21887 CVE-2023-21863 CVE-2023-21864 CVE-2023-21865 CVE-2023-21866 CVE-2023-21867 CVE-2023-21870 CVE-2023-21873 CVE-2023-21876 CVE-2023-21878 CVE-2023-21879 CVE-2023-21881 CVE-2023-21883 CVE-2023-21840 CVE-2023-21882 CVE-2023-21874 https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL 2023-01-20 2023-01-21
phpmyfaq -- multiple vulnerabilities phpmyfaq 3.1.10

phpmyfaq developers report:

phpMyFAQ does not implement sufficient checks to avoid a stored XSS in "Add new question"

phpMyFAQ does not implement sufficient checks to avoid a stored XSS in admin user page

phpMyFAQ does not implement sufficient checks to avoid a stored XSS in FAQ comments

phpMyFAQ does not implement sufficient checks to avoid a blind stored XSS in admin open question page

phpMyFAQ does not implement sufficient checks to avoid a reflected XSS in the admin backend login

phpMyFAQ does not implement sufficient checks to avoid stored XSS on user, category, FAQ, news and configuration admin backend

phpMyFAQ does not implement sufficient checks to avoid weak passwords

https://huntr.dev/bounties/cbba22f0-89ed-4d01-81ea-744979c8cbde/ https://huntr.dev/bounties/fac01e9f-e3e5-4985-94ad-59a76485f215/ https://huntr.dev/bounties/83cfed62-af8b-4aaa-94f2-5a33dc0c2d69/ https://huntr.dev/bounties/051d5e20-7fab-4769-bd7d-d986b804bb5a/ https://huntr.dev/bounties/c03c5925-43ff-450d-9827-2b65a3307ed6/ https://huntr.dev/bounties/f50ec8d1-cd60-4c2d-9ab8-3711870d83b9/ https://huntr.dev/bounties/82b0b629-c56b-4651-af3f-17f749751857/ https://huntr.dev/bounties/eac0a9d7-9721-4191-bef3-d43b0df59c67/ https://huntr.dev/bounties/bc27e84b-1f91-4e1b-a78c-944edeba8256/ 2023-01-15 2023-01-20
rack -- Multiple vulnerabilities rubygem-rack 3.0.4.1,3 rubygem-rack22 2.2.6.2,3 rubygem-rack16 1.6.14

Aaron Patterson reports:

CVE-2022-44570
Carefully crafted input can cause the Range header parsing component in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that deal with Range requests (such as streaming applications, or applications that serve files) may be impacted.
CVE-2022-44571
Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.
CVE-2022-44572
Carefully crafted input can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.
CVE-2022-44570 CVE-2022-44571 CVE-2022-44572 https://github.com/rack/rack/blob/v3.0.4.1/CHANGELOG.md https://github.com/advisories/GHSA-65f5-mfpf-vfhj https://github.com/advisories/GHSA-93pm-5p5f-3ghx https://github.com/advisories/GHSA-rqv2-275x-2jq5 2023-01-17 2023-01-19
Apache httpd -- Multiple vulnerabilities apache24 2.4.55

The Apache httpd project reports:

mod_dav out of bounds read, or write of zero byte (CVE-2006-20001) (moderate)

mod_proxy_ajp Possible request smuggling (CVE-2022-36760) (moderate)

mod_proxy prior to 2.4.55 allows a backend to trigger HTTP response splitting (CVE-2022-37436) (moderate)

CVE-2022-37436 CVE-2022-36760 CVE-2006-20001 https://downloads.apache.org/httpd/CHANGES_2.4.55 2023-01-17 2023-01-17
redis -- multiple vulnerabilities redis 7.0.8 redis-devel 7.0.8.20230116 redis62 6.2.9 redis6 6.0.17

The Redis core team reports:

CVE-2022-35977
Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands can drive Redis to OOM panic.
CVE-2023-22458
Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands can lead to denial-of-service.
CVE-2022-35977 CVE-2023-22458 https://github.com/redis/redis/releases/tag/7.0.8 2023-01-16 2023-01-16
security/keycloak -- Multiple possible DoS attacks keycloak 20.0.3

CIRCL reports:

  • CVE-2022-41966: XStream serializes Java objects to XML and back again. Versions prior to 1.4.20 may allow a remote attacker to terminate the application with a stack overflow error, resulting in a denial of service only via manipulation the processed input stream.
  • CVE-2022-40151: If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
CVE-2022-40151 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40151 CVE-2022-41966 https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-41966 2022-09-07 2023-01-16
security/tor -- SOCKS4(a) inversion bug tor 0.4.7.13

The Tor Project reports:

TROVE-2022-002: The SafeSocks option for SOCKS4(a) is inverted leading to SOCKS4 going through

This is a report from hackerone:
We have classified this as medium considering that tor was not defending in-depth for dangerous SOCKS request and so any user relying on SafeSocks 1 to make sure they don't link DNS leak and their Tor traffic wasn't safe afterall for SOCKS4(a). Tor Browser doesn't use SafeSocks 1 and SOCKS4 so at least the likely vast majority of users are not affected.

https://hackerone.com/bugs?subject=torproject&report_id=1784589 https://gitlab.torproject.org/tpo/core/tor/-/issues/40730 2023-01-12 2023-01-14
emacs -- arbitary shell command execution vulnerability of ctags emacs emacs-canna emacs-nox 28.2_2,3 emacs-devel emacs-devel-nox 30.0.50.202211128,2

lu4nx reports:

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVE-2022-45939 https://nvd.nist.gov/vuln/detail/CVE-2022-45939 2022-11-28 2023-01-12
cassandra3 -- multiple vulnerabilities cassandra3 3.11.14

Cassandra tema reports:

This release contains 6 security fixes including

  • CVE-2022-24823: When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory
  • CVE-2020-7238: Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header.
  • CVE-2019-2684: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE
  • CVE-2022-25857: The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
  • CVE-2022-42003: In FasterXML jackson-databind, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
  • CVE-2022-42004: In FasterXML jackson-databind, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays.
CVE-2022-24823 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24823 CVE-2020-7238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7238 CVE-2019-2684 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2684 CVE-2022-25857 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25857 CVE-2022-42003 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42003 CVE-2022-42004 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42004 2023-01-11 2023-01-11
cassandra3 -- arbitrary code execution cassandra3 3.11.13

Marcus Eriksson reports:

When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this.

CVE-2021-44521 https://www.cvedetails.com/cve/CVE-2021-44521 2022-02-11 2023-01-11
cassandra3 -- jBCrypt integer overflow cassandra3 3.11.12

mindrot project reports:

There is an integer overflow that occurs with very large log_rounds values, first reported by Marcus Rathsfeld.

CVE-2015-0886 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0886 2015-01-30 2023-01-11
xorg-server -- Multiple security issues in X server extensions xorg-server xephyr xorg-vfbserver 21.1.5,1 xorg-nestserver 21.1.5,2 xwayland 22.1.6,1 xwayland-devel 21.0.99.1.319

The X.org project reports:

  • CVE-2022-46340/ZDI-CAN-19265: X.Org Server XTestSwapFakeInput stack overflow

    The swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request.

    This issue does not affect systems where client and server use the same byte order.

  • CVE-2022-46341/ZDI-CAN-19381: X.Org Server XIPassiveUngrab out-of-bounds access

    The handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code.

  • CVE-2022-46342/ZDI-CAN-19400: X.Org Server XvdiSelectVideoNotify use-after-free

    The handler for the XvdiSelectVideoNotify request may write to memory after it has been freed.

  • CVE-2022-46343/ZDI-CAN-19404: X.Org Server ScreenSaverSetAttributes use-after-free

    The handler for the ScreenSaverSetAttributes request may write to memory after it has been freed.

  • CVE-2022-46344/ZDI-CAN-19405: X.Org Server XIChangeProperty out-of-bounds access

    The handler for the XIChangeProperty request has a length-validation issues, resulting in out-of-bounds memory reads and potential information disclosure.

  • CVE-2022-4283/ZDI-CAN-19530: X.Org Server XkbGetKbdByName use-after-free

    The XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.

https://lists.x.org/archives/xorg-announce/2022-December/003302.html CVE-2022-46340 CVE-2022-46341 CVE-2022-46342 CVE-2022-46343 CVE-2022-46344 CVE-2022-4283 2022-12-14 2023-01-11
Gitlab -- Multiple Vulnerabilities gitlab-ce 15.7.015.7.2 15.6.015.6.4 6.6.015.5.7

Gitlab reports:

Race condition on gitlab.com enables verified email forgery and third-party account hijacking

DOS and high resource consumption of Prometheus server through abuse of Grafana integration proxy endpoint

Maintainer can leak sentry token by changing the configured URL

Maintainer can leak masked webhook secrets by changing target URL of the webhook

Cross-site scripting in wiki changes page affecting self-hosted instances running without strict CSP

Group access tokens continue to work after owner loses ability to revoke them

Users' avatar disclosure by user ID in private GitLab instances

Arbitrary Protocol Redirection in GitLab Pages

Regex DoS due to device-detector parsing user agents

Regex DoS in the Submodule Url Parser

CVE-2022-4037 CVE-2022-3613 CVE-2022-4365 CVE-2022-4342 CVE-2022-3573 CVE-2022-4167 CVE-2022-3870 CVE-2023-0042 CVE-2022-4131 CVE-2022-3514 https://about.gitlab.com/releases/2023/01/09/security-release-gitlab-15-7-2-released/ 2023-01-09 2023-01-11
chromium -- multiple vulnerabilities chromium 109.0.5414.74 ungoogled-chromium 109.0.5414.74

Chrome Releases reports:

This release contains 17 security fixes, including:

  • [1353208] High CVE-2023-0128: Use after free in Overview Mode. Reported by Khalil Zhani on 2022-08-16
  • [1382033] High CVE-2023-0129: Heap buffer overflow in Network Service. Reported by asnine on 2022-11-07
  • [1370028] Medium CVE-2023-0130: Inappropriate implementation in Fullscreen API. Reported by Hafiizh on 2022-09-30
  • [1357366] Medium CVE-2023-0131: Inappropriate implementation in iframe Sandbox. Reported by NDevTK on 2022-08-28
  • [1371215] Medium CVE-2023-0132: Inappropriate implementation in Permission prompts. Reported by Jasper Rebane (popstonia) on 2022-10-05
  • [1375132] Medium CVE-2023-0133: Inappropriate implementation in Permission prompts. Reported by Alesandro Ortiz on 2022-10-17
  • [1385709] Medium CVE-2023-0134: Use after free in Cart. Reported by Chaoyuan Peng (@ret2happy) on 2022-11-17
  • [1385831] Medium CVE-2023-0135: Use after free in Cart. Reported by Chaoyuan Peng (@ret2happy) on 2022-11-18
  • [1356987] Medium CVE-2023-0136: Inappropriate implementation in Fullscreen API. Reported by Axel Chong on 2022-08-26
  • [1399904] Medium CVE-2023-0137: Heap buffer overflow in Platform Apps. Reported by avaue and Buff3tts at S.S.L. on 2022-12-10
  • [1346675] Low CVE-2023-0138: Heap buffer overflow in libphonenumber. Reported by Michael Dau on 2022-07-23
  • [1367632] Low CVE-2023-0139: Insufficient validation of untrusted input in Downloads. Reported by Axel Chong on 2022-09-24
  • [1326788] Low CVE-2023-0140: Inappropriate implementation in File System API. Reported by harrison.mitchell, cybercx.com.au on 2022-05-18
  • [1362331] Low CVE-2023-0141: Insufficient policy enforcement in CORS. Reported by scarlet on 2022-09-12
CVE-2023-0128 CVE-2023-0129 CVE-2023-0130 CVE-2023-0131 CVE-2023-0132 CVE-2023-0133 CVE-2023-0134 CVE-2023-0135 CVE-2023-0136 CVE-2023-0137 CVE-2023-0138 CVE-2023-0139 CVE-2023-0140 CVE-2023-0141 https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop.html 2023-01-10 2023-01-10
net-mgmt/cacti is vulnerable to remote command injection cacti 1.2.23

cacti team reports:

A command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device.

CVE-2022-46169 https://nvd.nist.gov/vuln/detail/CVE-2022-46169 2022-12-05 2023-01-05 2023-01-09
devel/viewvc-devel is vulnerable to cross-site scripting py37-viewvc-devel py38-viewvc-devel py39-viewvc-devel 1.3.0.20230104

C. Michael Pilato reports:

security fix: escape revision view copy paths (#311) [CVE-2023-22464]

security fix: escape revision view changed paths (#311) [CVE-2023-22456]

CVE-2023-22464 CVE-2023-22456 https://nvd.nist.gov/vuln/detail/CVE-2023-22464 https://nvd.nist.gov/vuln/detail/CVE-2023-22456 2023-01-04 2023-01-05
rxvt-unicode is vulnerable to a remote code execution rxvt-unicode 9.31

Marc Lehmann reports:

The biggest issue is resolving CVE-2022-4170, which allows command execution inside urxvt from within the terminal (that means anything that can output text in the terminal can start commands in the context of the urxvt process, even remotely).

CVE-2022-4170 https://nvd.nist.gov/vuln/detail/CVE-2022-4170 2022-12-05 2023-01-03
gitea -- multiple issues gitea 1.18.0

The Gitea team reports:

Remove ReverseProxy authentication from the API

Support Go Vulnerability Management

Forbid HTML string tooltips

https://blog.gitea.io/2022/12/gitea-1.18.0-is-released/ https://github.com/go-gitea/gitea/releases/tag/v1.18.0 2022-08-23 2023-01-02