SEC Consult SA-20150113-0 :: Multiple critical vulnerabilities in all snom desktop IP phones

Posted by SEC Consult Vulnerability Lab on Jan 13

SEC Consult Vulnerability Lab Security Advisory < 20150113-0 >
=======================================================================
title: Multiple critical vulnerabilities
product: snom IP phones
vulnerable version: all firmware versions <8.7.5.15, all firmware branches
of all snom desktop IP phones (3xx, 7xx, 8xx, etc)
are affected
fixed version: 8.7.5.15…

Re: Snom SIP phones denial of service through HTTP

Posted by kapejod () googlemail com on Jan 13

The latest version is 8.7.3.25.9, there is no 8.7.4.X, yet.

And yes, you missed something, (without the quotes) ” –data-binary @-“
This turns it into a HTTP POST request and uses the input from stdin.
Otherwise you just do a regular HTTP GET which gets blocked because it’s
not authenticated.

On Mon, Jan 12, 2015 at 10:20 PM, Martin Schuhmacher <broetchen25 () gmx net>
wrote:

Reflecting XSS vulnerability in filemanager of CMS b2evolution v. 5.2.0

Posted by Steffen Rösemann on Jan 13

Advisory: Reflecting XSS vulnerability in CMS filemanager of b2evolution v.
5.2.0
Advisory ID: SROEADV-2014-09
Author: Steffen Rösemann
Affected Software: CMS b2evolution v. 5.2.0 (Release-Date: 6th-Dec-2014)
Vendor URL: http://b2evolution.net/
Vendor Status: did not respond to issue
CVE-ID: –

==========================
Vulnerability Description:
==========================

The filemanager of b2evolution v. 5.2.0 is prone to reflecting XSS…

MS15-008 – Important: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3019215) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (January 13, 2015): Bulletin published.
Summary: This security update resolves one privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application on an affected system. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability.

MS15-003 – Important: Vulnerability in Windows User Profile Service Could Allow Elevation of Privilege (3021674) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (January 13, 2015): V1.0 (January 13, 2015): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in the Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application. A local attacker who successfully exploited this vulnerability could run arbitrary code on a target system with elevated privileges. An attacker must have valid logon credentials and be able to log on locally to exploit the vulnerability.

MS15-006 – Important: Vulnerability in Windows Error Reporting Could Allow Security Feature Bypass (3004365) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (January 13, 2015): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Windows Error Reporting (WER). The vulnerability could allow security feature bypass if successfully exploited by an attacker. An attacker who successfully exploited this vulnerability could gain access to the memory of a running process. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.