CVE-2015-0239

The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYSENTER instruction.

SB15-061: Vulnerability Summary for the Week of February 23, 2015

Original release date: March 02, 2015

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:

  • High – Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 – 10.0

  • Medium – Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 – 6.9

  • Low – Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 – 3.9

Entries may include additional information provided by organizations and efforts sponsored by US-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of US-CERT analysis.

High Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
adobe — flash_player Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322. 2015-02-21 10.0 CVE-2015-0331
BID
apptha — wordpress_video_gallery SQL injection vulnerability in videogalleryrss.php in the Apptha WordPress Video Gallery (contus-video-gallery) plugin before 2.8 for WordPress allows remote attackers to execute arbitrary SQL commands via the vid parameter in a rss action to wp-admin/admin-ajax.php. 2015-02-24 7.5 CVE-2015-2065
CONFIRM
OSVDB
EXPLOIT-DB
MISC
cisco — carrier_routing_system Cisco IOS XR 5.0.1 and 5.2.1 on Network Convergence System (NCS) 6000 devices and 5.1.3 and 5.1.4 on Carrier Routing System X (CRS-X) devices allows remote attackers to cause a denial of service (line-card reload) via malformed IPv6 packets with extension headers, aka Bug ID CSCuq95241. 2015-02-21 7.1 CVE-2015-0618
SECTRACK
BID
cisco — ips_sensor_software Race condition in the SSL implementation on Cisco Intrusion Prevention System (IPS) devices allows remote attackers to cause a denial of service by making many management-interface HTTPS connections during the key-regeneration phase of an upgrade, aka Bug ID CSCui25688. 2015-02-21 7.1 CVE-2015-0631
BID
d-link — dcs-931l_firmware Unrestricted file upload vulnerability in D-Link DCS-931L with firmware 1.04 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension. 2015-02-23 9.0 CVE-2015-2049
d-link — dap-1320_firmware D-Link DAP-1320 Rev Ax with firmware before 1.21b05 allows attackers to execute arbitrary commands via unspecified vectors. 2015-02-23 10.0 CVE-2015-2050
d-link — dir-645_firmware The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface. 2015-02-23 10.0 CVE-2015-2051
d-link — dir-645_firmware Stack-based buffer overflow in the DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary code via a long string in a GetDeviceSettings action to the HNAP interface. 2015-02-23 10.0 CVE-2015-2052
dell — asset_manager Multiple SQL injection vulnerabilities in Dell ScriptLogic Asset Manager (aka Quest Workspace Asset Manager) before 9.5 allow remote attackers to execute arbitrary SQL commands via unspecified vectors to (1) GetClientPackage.aspx or (2) GetProcessedPackage.aspx. 2015-02-24 7.5 CVE-2015-1605
MISC
MISC
BID
dlguard — dlguard SQL injection vulnerability in DLGuard 4.5 allows remote attackers to execute arbitrary SQL commands via the c parameter to index.php. 2015-02-24 7.5 CVE-2015-2066
MISC
MISC
FULLDISC
etouch — samepage SQL injection vulnerability in eTouch SamePage Enterprise Edition 4.4.0.0.239 allows remote attackers to execute arbitrary SQL commands via the catId parameter to cm/blogrss/feed. 2015-02-24 7.5 CVE-2015-2070
EXPLOIT-DB
FULLDISC
MISC
OSVDB
gnu — glibc The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process. 2015-02-24 7.8 CVE-2014-9402
CONFIRM
MLIST
SUSE
ibm — tivoli_storage_manager Stack-based buffer overflow in dsmtca in the client in IBM Tivoli Storage Manager (TSM) 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2 before 6.2.5.4, and 6.3 before 6.3.2.3 on UNIX, Linux, and OS X allows local users to gain privileges via unspecified vectors. 2015-02-21 7.2 CVE-2014-6184
AIXAPAR
info-zip — unzip Buffer overflow in the charset_to_intern function in unix/unix.c in Info-Zip UnZip 6.10b allows remote attackers to execute arbitrary code via a crafted string, as demonstrated by converting a string from CP866 to UTF-8. 2015-02-23 7.5 CVE-2015-1315
MISC
MLIST
MISC
mozilla — firefox Multiple use-after-free vulnerabilities in OpenType Sanitiser, as used in Mozilla Firefox before 36.0, might allow remote attackers to trigger problematic Developer Console information or possibly have unspecified other impact by leveraging incorrect macro expansion, related to the ots::ots_gasp_parse function. 2015-02-25 7.5 CVE-2015-0823
CONFIRM
CONFIRM
SECTRACK
BID
mozilla — firefox Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. 2015-02-25 7.5 CVE-2015-0835
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
SECTRACK
SECTRACK
BID
mozilla — firefox Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. 2015-02-25 7.5 CVE-2015-0836
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
CONFIRM
SECTRACK
SECTRACK
BID
network_vision — intravue Network Vision IntraVue before 2.3.0a14 on Windows allows remote attackers to execute arbitrary OS commands via unspecified vectors. 2015-02-26 10.0 CVE-2015-0977
redhat — jboss_jbpm-designer XML external entity (XXE) vulnerability in the JBPMBpmn2ResourceImpl function in designer/bpmn2/resource/JBPMBpmn2ResourceImpl.java in jbpm-designer 6.0.x and 6.2.x allows remote attackers to read arbitrary files and possibly have other unspecified impact by importing a crafted BPMN2 file. 2015-02-20 7.5 CVE-2014-3682
CONFIRM
CONFIRM
CONFIRM
CONFIRM
samba — samba The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c. 2015-02-23 10.0 CVE-2015-0240
CONFIRM
CONFIRM
CONFIRM
UBUNTU
SECTRACK
DEBIAN
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
REDHAT
SUSE
sympies — wordpress_survey_and_poll SQL injection vulnerability in the ajax_survey function in settings.php in the WordPress Survey and Poll plugin 1.1.7 for WordPress allows remote attackers to execute arbitrary SQL commands via the survey_id parameter in an ajax_survey action to wp-admin/admin-ajax.php. 2015-02-26 7.5 CVE-2015-2090
MISC
EXPLOIT-DB
MISC
OSVDB
zhone_technologies — gpon_2520_firmware Zhone GPON 2520 with firmware R4.0.2.566b allows remote attackers to cause a denial of service via a long string in the oldpassword parameter. 2015-02-23 7.8 CVE-2015-2055
EXPLOIT-DB

Back to top

Medium Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
acobot_live_chat_&_contact_form_project — acobot_live_chat_&_contact_form Multiple cross-site request forgery (CSRF) vulnerabilities in the Acobot Live Chat & Contact Form plugin 2.0 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings or (2) conduct cross-site scripting (XSS) attacks via the acobot_token parameter in the acobot page to wp-admin/options-general.php. 2015-02-20 6.8 CVE-2015-2039
XF
XF
MISC
archmage_project — archmage Directory traversal vulnerability in arCHMage 0.2.4 allows remote attackers to write to arbitrary files via a .. (dot dot) in a CHM file. 2015-02-23 5.0 CVE-2015-1589
CONFIRM
XF
MLIST
MLIST
avatar_uploader_project — avatar_uploader Unrestricted file upload vulnerability in the Avatar Uploader module before 6.x-1.3 for Drupal allows remote authenticated users to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via unspecified vectors. 2015-02-26 6.5 CVE-2015-2087
BID
cfdbplugin — contact_form_db Cross-site scripting (XSS) vulnerability in the Contact Form DB (aka CFDB and contact-form-7-to-database-extension) plugin 2.8.26 for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit_time parameter in the CF7DBPluginSubmissions page to wp-admin/admin.php. 2015-02-20 4.3 CVE-2015-2040
XF
MISC
cisco — ios The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016. 2015-02-26 5.8 CVE-2014-2188
cisco — prime_lan_management_solution Multiple cross-site scripting (XSS) vulnerabilities in the help pages in Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS) and Cisco Security Manager, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCuq54654 and CSCun18263. 2015-02-26 4.3 CVE-2015-0594
cisco — content_security_management_appliance The web framework in Cisco AsyncOS on Email Security Appliance (ESA), Content Security Management Appliance (SMA), and Web Security Appliance (WSA) devices allows remote attackers to trigger redirects via a crafted HTTP header, aka Bug IDs CSCur44412, CSCur44415, CSCur89630, CSCur89636, CSCur89633, and CSCur89639. 2015-02-21 4.3 CVE-2015-0624
SECTRACK
SECTRACK
BID
cisco — ios Race condition in the Neighbor Discovery (ND) protocol implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service via a flood of Router Solicitation messages on the local network, aka Bug ID CSCuo67770. 2015-02-26 5.7 CVE-2015-0632
cisco — unified_computing_system The Integrated Management Controller (IMC) in Cisco Unified Computing System (UCS) 1.4(7h) and earlier on C-Series servers allows remote attackers to bypass intended access restrictions by sending crafted DHCP response packets on the local network, aka Bug ID CSCuf52876. 2015-02-25 6.8 CVE-2015-0633
cisco — application_networking_manager Cross-site request forgery (CSRF) vulnerability in the web GUI in Cisco Application Networking Manager (ANM), and Device Manager (DM) on Cisco 4710 Application Control Engine (ACE) appliances, allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuo99753. 2015-02-26 6.8 CVE-2015-0651
crossslide_jquery_project — crossslide_jquery Multiple cross-site request forgery (CSRF) vulnerabilities in the CrossSlide jQuery (crossslide-jquery-plugin-for-wordpress) plugin 2.0.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings or conduct cross-site scripting (XSS) attacks via the (2) csj_width, (3) csj_height, (4) csj_sleep, (5) csj_fade, or (6) upload_image parameter in the thisismyurl_csj.php page to wp-admin/options-general.php. 2015-02-26 6.8 CVE-2015-2089
MISC
cybernetikz — easy_social_icons Cross-site request forgery (CSRF) vulnerability in the Easy Social Icons plugin before 1.2.3 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the image_file parameter in an edit action in the cnss_social_icon_add page to wp-admin/admin.php. 2015-02-25 6.8 CVE-2015-2084
CONFIRM
EXPLOIT-DB
FULLDISC
MISC
d-link — dcs-931l_firmware Cross-site request forgery (CSRF) vulnerability in D-Link DCS-931L with firmware 1.04 and earlier allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. 2015-02-23 6.8 CVE-2015-2048
dlguard — dlguard Multiple cross-site scripting (XSS) vulnerabilities in DLGuard 5, 4.6, and 4.5 allow remote attackers to inject arbitrary web script or HTML via the (1) page, (2) c, or (3) redirect parameter to index.php or (4) search field (searchTerm parameter) in the main page. 2015-02-24 4.3 CVE-2015-2064
MISC
MISC
FULLDISC
e2fsprogs_project — e2fsprogs Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0247. 2015-02-24 4.6 CVE-2015-1572
UBUNTU
DEBIAN
etouch — samepage Directory traversal vulnerability in cm/newui/blog/export.jsp in eTouch SamePage Enterprise Edition 4.4.0.0.239 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the filepath parameter. 2015-02-24 4.0 CVE-2015-2071
EXPLOIT-DB
FULLDISC
MISC
OSVDB
gnu — glibc The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of request that trigger a call to the getaddrinfo function. 2015-02-24 5.0 CVE-2013-7423
CONFIRM
CONFIRM
MLIST
google — play_services_sdk The GoogleAuthUtil.getToken method in the Google Play services SDK before 2015 sets parameters in OAuth token requests upon finding a corresponding _opt_ parameter in the Bundle extras argument, which allows attackers to bypass an intended consent dialog and retrieve tokens for arbitrary OAuth scopes including the SID and LSID scopes, and consequently obtain access to a Google account, via a crafted application, as demonstrated by setting the has_permission=1 parameter value upon finding _opt_has_permission in that argument. 2015-02-22 4.3 CVE-2014-7922
MISC
MISC
ibm — rational_insight IBM Rational Insight 1.1.1.5 allows remote attackers to bypass authentication and obtain sensitive information via a crafted request to a Jazz Reporting Service (JRS) report URL. 2015-02-24 5.0 CVE-2014-6115
ilch — cms Cross-site request forgery (CSRF) vulnerability in Ilch CMS allows remote attackers to hijack the authentication of administrators for requests that add a value to a profile field via a profilefields request to admin.php. 2015-02-25 6.8 CVE-2015-2083
MISC
komodia — redirector_sdk The SDK for Komodia Redirector with SSL Digestor, as used in Lavasoft Ad-Aware Web Companion 1.1.885.1766 and Ad-Aware AdBlocker (alpha) 1.3.69.1, Qustodio for Windows, Atom Security, Inc. StaffCop 5.8, and other products, uses the same X.509 certificate private key for a root CA certificate across different customers’ installations, which makes it easier for man-in-the-middle attackers to spoof SSL servers by leveraging knowledge of this key, as originally reported for Superfish VisualDiscovery on certain Lenovo Notebook laptop products. 2015-02-24 5.0 CVE-2015-2077
MISC
MISC
MISC
MISC
SECTRACK
CONFIRM
CONFIRM
MISC
MISC
MISC
komodia — redirector_sdk The SDK for Komodia Redirector with SSL Digestor, as used in Lavasoft Ad-Aware Web Companion 1.1.885.1766 and Ad-Aware AdBlocker (alpha) 1.3.69.1, Qustodio for Windows, Atom Security, Inc. StaffCop 5.8, and other products, does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers, a different vulnerability than CVE-2015-2077. 2015-02-24 5.0 CVE-2015-2078
MISC
MISC
SECTRACK
MISC
MISC
kony — enterprise_mobile_management Kony Management (aka Enterprise Mobile Management or EMM) 1.2 and earlier allows remote authenticated users to read (1) arbitrary messages via the messageId parameter to selfservice/managedevice/getMessageBody or (2) requests via the requestId parameter to selfservice/devicemgmt/getDeviceInfoTab.htm. 2015-02-24 4.0 CVE-2014-8487
BID
BUGTRAQ
magmi — magmi Directory traversal vulnerability in web/ajax_pluginconf.php in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. 2015-02-24 5.0 CVE-2015-2067
EXPLOIT-DB
MISC
magmi — magmi Multiple cross-site scripting (XSS) vulnerabilities in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allow remote attackers to inject arbitrary web script or HTML via the (1) profile parameter to web/magmi.php or (2) QUERY_STRING to web/magmi_import_run.php. 2015-02-24 4.3 CVE-2015-2068
EXPLOIT-DB
MISC
mcafee — mcafee_agent The log viewer in McAfee Agent (MA) before 4.8.0 Patch 3 and 5.0.0, when the “Accept connections only from the ePO server” option is disabled, allows remote attackers to conduct clickjacking attacks via a crafted web page, aka an “http-generic-click-jacking” vulnerability. 2015-02-23 4.3 CVE-2015-2053
mozilla — firefox The UITour::onPageEvent function in Mozilla Firefox before 36.0 does not ensure that an API call originates from a foreground tab, which allows remote attackers to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site. 2015-02-25 4.3 CVE-2015-0819
CONFIRM
SECTRACK
BID
mozilla — firefox Mozilla Firefox before 36.0 allows user-assisted remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions. 2015-02-25 6.8 CVE-2015-0821
CONFIRM
SECTRACK
BID
mozilla — firefox The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code. 2015-02-25 4.3 CVE-2015-0822
CONFIRM
SECTRACK
SECTRACK
BID
mozilla — firefox The mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 36.0 allows remote attackers to cause a denial of service (out-of-bounds write of zero values, and application crash) via vectors that trigger use of DrawTarget and the Cairo library for image drawing. 2015-02-25 5.0 CVE-2015-0824
CONFIRM
SECTRACK
BID
mozilla — firefox Stack-based buffer underflow in the mozilla::MP3FrameParser::ParseBuffer function in Mozilla Firefox before 36.0 allows remote attackers to obtain sensitive information from process memory via a malformed MP3 file that improperly interacts with memory allocation during playback. 2015-02-25 4.3 CVE-2015-0825
CONFIRM
SECTRACK
BID
mozilla — firefox The nsTransformedTextRun::SetCapitalization function in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read of heap memory) via a crafted Cascading Style Sheets (CSS) token sequence that triggers a restyle or reflow operation. 2015-02-25 6.8 CVE-2015-0826
CONFIRM
SECTRACK
BID
mozilla — firefox Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic. 2015-02-25 4.3 CVE-2015-0827
CONFIRM
SECTRACK
SECTRACK
BID
mozilla — firefox Double free vulnerability in the nsXMLHttpRequest::GetResponse function in Mozilla Firefox before 36.0, when a nonstandard memory allocator is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted JavaScript code that makes an XMLHttpRequest call with zero bytes of data. 2015-02-25 6.8 CVE-2015-0828
CONFIRM
CONFIRM
SECTRACK
BID
mozilla — firefox Buffer overflow in libstagefright in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code via a crafted MP4 video that is improperly handled during playback. 2015-02-25 6.8 CVE-2015-0829
CONFIRM
SECTRACK
BID
mozilla — firefox The WebGL implementation in Mozilla Firefox before 36.0 does not properly allocate memory for copying an unspecified string to a shader’s compilation log, which allows remote attackers to cause a denial of service (application crash) via crafted WebGL content. 2015-02-25 5.0 CVE-2015-0830
CONFIRM
SECTRACK
BID
mozilla — firefox Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation. 2015-02-25 6.8 CVE-2015-0831
CONFIRM
SECTRACK
SECTRACK
BID
mozilla — firefox Mozilla Firefox before 36.0 does not properly recognize the equivalence of domain names with and without a trailing . (dot) character, which allows man-in-the-middle attackers to bypass the HPKP and HSTS protection mechanisms by constructing a URL with this character and leveraging access to an X.509 certificate for a domain with this character. 2015-02-25 5.0 CVE-2015-0832
CONFIRM
BID
mozilla — firefox Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 on Windows, when the Maintenance Service is not used, allow local users to gain privileges via a Trojan horse DLL in (1) the current working directory or (2) a temporary directory, as demonstrated by bcrypt.dll. 2015-02-25 6.9 CVE-2015-0833
CONFIRM
SECTRACK
SECTRACK
BID
mozilla — firefox The WebRTC subsystem in Mozilla Firefox before 36.0 recognizes turns: and stuns: URIs but accesses the TURN or STUN server without using TLS, which makes it easier for man-in-the-middle attackers to discover credentials by spoofing a server and completing a brute-force attack within a short time window. 2015-02-25 4.3 CVE-2015-0834
CONFIRM
SECTRACK
BID
openstack — image_registry_and_delivery_service_(glance) OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them before the uploads finish, a different vulnerability than CVE-2015-1881. 2015-02-24 4.0 CVE-2014-9684
CONFIRM
openstack — image_registry_and_delivery_service_(glance) OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684. 2015-02-24 4.0 CVE-2015-1881
CONFIRM
piwigo — piwigo SQL injection vulnerability in Piwigo before 2.7.4, when all filters are activated, allows remote authenticated users to execute arbitrary SQL commands via the filter_level parameter in a “Refresh photo set” action in the batch_manager page to admin.php. 2015-02-20 6.0 CVE-2015-1517
BID
BUGTRAQ
MISC
piwigo — piwigo Cross-site scripting (XSS) vulnerability in the administrative backend in Piwigo before 2.7.4 allows remote attackers to inject arbitrary web script or HTML via the page parameter to admin.php. 2015-02-20 4.3 CVE-2015-2034
MISC
MISC
FULLDISC
MISC
piwigo — piwigo SQL injection vulnerability in the administrative backend in Piwigo before 2.7.4 allows remote adminsitrators to execute arbitrary SQL commands via the user parameter in the history page to admin.php. 2015-02-20 6.5 CVE-2015-2035
MISC
MISC
FULLDISC
MISC
redhat — jboss_uberfire The UberFire Framework 0.3.x does not properly restrict paths, which allows remote attackers to (1) execute arbitrary code by uploading crafted content to FileUploadServlet or (2) read arbitrary files via vectors involving FileDownloadServlet. 2015-02-20 6.8 CVE-2014-8114
CONFIRM
redhat — jboss_kie_workbench The default authorization constrains in KIE Workbench 6.0.x allows remote authenticated users to read or write to arbitrary files, bypass intended access restrictions, and possibly have other unspecified impact via unknown vectors. 2015-02-20 6.5 CVE-2014-8115
CONFIRM
samsung — ipolis_device_manager Buffer overflow in the XnsSdkDeviceIpInstaller.ocx ActiveX control in Samsung iPOLiS Device Manager 1.12.2 allows remote attackers to execute arbitrary code via a long string in the first argument to the (1) ReadConfigValue or (2) WriteConfigValue function. 2015-02-24 6.8 CVE-2015-0555
FULLDISC
sierra_wireless — sierra_wireless_aircard_760s CRLF injection vulnerability in export.cfg in the web-based administrative console for Sierra Wireless AirCard 760S, 762S, and 763S allows remote attackers to inject arbitrary headers via CRLF sequences in the save parameter. 2015-02-23 4.3 CVE-2015-2054
FULLDISC
speed_software — explorer Directory traversal vulnerability in the Speed Root Explorer application before 3.2 for Android and the Speed Explorer application before 2.2 for Android allows remote attackers to write to arbitrary files via a crafted filename. 2015-02-24 5.0 CVE-2014-9282
synck_graphica — mailform_pro_cgi SYNCK GRAPHICA Mailform Pro CGI 4.1.4 and 4.1.5, when the mailauth module is enabled, does not properly send e-mail messages, which allows remote attackers to execute arbitrary code via unspecified vectors. 2015-02-26 6.8 CVE-2015-0883
CONFIRM
term_queue_project — term_queue Cross-site scripting (XSS) vulnerability in unspecified administration pages in the Term Queue module before 6.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via unknown vectors. 2015-02-26 4.3 CVE-2015-2088
BID
textangular — textangular Cross-site scripting (XSS) vulnerability in textAngular-sanitize.js in textAngular before 1.3.7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors to the editor. 2015-02-20 4.3 CVE-2015-0167
XF
unit4 — prosoft_hrms Cross-site scripting (XSS) vulnerability in Login.aspx in UNIT4 Prosoft HRMS before 8.14.330.43 allows remote attackers to inject arbitrary web script or HTML via the txtUserID parameter. 2015-02-25 4.3 CVE-2015-2082
BUGTRAQ
MISC
vanillaforums — vanilla_forums Multiple cross-site scripting (XSS) vulnerabilities in Vanilla Forums before 2.0.18.13 and 2.1.x before 2.1.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. 2015-02-25 4.3 CVE-2014-9685
visualware — myconnection_server Multiple cross-site scripting (XSS) vulnerabilities in Visualware MyConnection Server 8.2b allow remote attackers to inject arbitrary web script or HTML via the (1) bt, (2) variable, or (3) et parameter to myspeed/db/historyitem. 2015-02-25 4.3 CVE-2015-2043
MISC
woothemes — woocommerce Cross-site scripting (XSS) vulnerability in the WooCommerce plugin before 2.2.11 for WordPress allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING in the wc-reports page to wp-admin/admin.php. 2015-02-24 4.3 CVE-2015-2069
CONFIRM
FULLDISC
zen-cart.jp — zen_cart Multiple cross-site scripting (XSS) vulnerabilities in zencart-ja (aka Zen Cart Japanese edition) 1.3 jp through 1.3.0.2 jp8 and 1.5 ja through 1.5.1 ja allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, related to admin/includes/init_includes/init_sanitize.php and includes/init_includes/init_sanitize.php. 2015-02-26 4.3 CVE-2015-0882
CONFIRM
JVN

Back to top

Low Vulnerabilities

Primary
Vendor — Product
Description Published CVSS Score Source & Patch Info
ibm — tivoli_storage_manager dsmtca in the client in IBM Tivoli Storage Manager (TSM) 5.4.x, 5.5.x, 6.x before 6.4.3, and 7.1.x before 7.1.2 allows local users to discover the backup/restore encryption-key password via unspecified vectors. 2015-02-24 2.1 CVE-2014-4818
SECTRACK
AIXAPAR
mozilla — firefox Mozilla Firefox before 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote attackers to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mechanism via a crafted web site. 2015-02-25 2.6 CVE-2015-0820
CONFIRM
BID
panopoly_magic_project — panopoly_magic Cross-site scripting (XSS) vulnerability in the live preview in the Panopoly Magic module before 7.x-1.17 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a pane title. 2015-02-26 3.5 CVE-2015-2086
BID
puppetlabs — facter Puppet Labs Facter 1.6.0 through 2.4.0 allows local users to obtains sensitive Amazon EC2 IAM instance metadata by reading a fact for an Amazon EC2 node. 2015-02-23 2.1 CVE-2015-1426
redhat — jboss_enterprise_application_platform PicketBox and JBossSX, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.2 and JBoss BRMS before 6.0.3 roll up patch 2, allows remote authenticated users to read and modify the application sever configuration and state by deploying a crafted application. 2015-02-20 3.6 CVE-2014-0005
typo3 — typo3 The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value. 2015-02-23 2.6 CVE-2015-2047
CONFIRM
MLIST
MLIST
DEBIAN

Back to top

 


This product is provided subject to this Notification and this Privacy & Use policy.

Slim Framework – (CVE-2015-2171, PHP Object Injection), Other Vulnerabilities

Posted by Scott Arciszewski on Mar 02

Product: Slim PHP Framework
Website: http://www.slimframework.com/
Affected versions: 2.5.0 and lower
Fixed in: 2.6.0 (released 2015-03-01)
CVSS Score: I don’t care. Does anybody really?

“””
Slim has super-secure cryptography using military-grade encryption. Slim
uses your unique key to encrypt session and cookie data before persisting
data to disk.
“””

Wow, sounds great. Let’s look under the hood….

CVE-2015-1187: D-Link DIR-636L Remote Command Injection – Incorrect Authentication

Posted by csirt on Mar 02

#############################################################################
#
# SWISSCOM CSIRT SECURITY ADVISORY – http://www.swisscom.com/security
#
#############################################################################
#
# CVE ID: CVE-2015-1187
# Product: D-Link DIR636L
# Vendor: D-Link
# Subject: Remote Command Injection – Incorrect Authentication
# Effect: Remotely exploitable
# Author: Tiago Caetano Henriques,…

PandaLabs neutralized 75 million new malware samples in 2014, twice as many as in 2013

PandaLabs, the anti-malware laboratory of Panda Security detected and neutralized 75 million malware samples in 2014. This figure more than doubles the number recorded in 2013: nearly 30 million new malware strains.

In all, the total number of malware specimens detected by PandaLabs throughout its history has reached 220 million, which means that 34 percent of all malware ever created was coded in 2014. In fact, last year Panda Security recorded an average of 200,000 new malware strains per day. The year 2014 can be considered the year of massive cyber-attacks, with some of the world’s biggest corporations falling victim to large-scale data breaches.

 

Trojans continue to account for most new malware

Trojans are still the most common type of malware way ahead of other malware specimens. In fact, in 2014 Trojans accounted for almost 70 percent of all new malware created, followed by viruses (12.33 percent), other malware (10 percent), worms (6 percent) and adware/spyware (3 percent). In this respect, CryptoLocker was one of the most destructive Trojans unleashed last year. “CryptoLocker is one of the nastiest pieces of malware to have targeted users in 2014. This ransomware encrypts victims’ files and requires a ransom in order to decrypt them. Thousands of computers have fallen victim to it, from home users to businesses and financial institutions”, said Luis Corrons, Technical Director of PandaLabs at Panda Security.

 

Malware and infections

Trojans, once again, accounted for more infections (65 percent) than any other malware, although there was a notable increase in the ‘Other’ category. This category includes PUPs (Potentially Unwanted Programs): applications which, despite not being malicious per se, install unwanted software without properly informing the user.

PandaLabs Annual Report 2014

 

China tops the list of infections

Despite being one of the worst years for IT security, the global infection rate in 2014 was 30.42 percent, a significant decrease on 2013’s figure. Country by country, China once again had the most infections with a rate of 49 percent, followed by Ecuador (42.33 percent) and Turkey (41.53 percent). Theses countries were also at the top of the infection rankings last year, although in a different order: China, Turkey and Ecuador.

Other countries with rates above the global average in 2014 include Colombia (33 percent), Uruguay (33 percent) and Chile (31 percent).

 

Sweden the safest country

Europe was the area with the lowest infection rate, with nine countries ranked among the ten least infected nations, whereas Japan was the only non-European country to appear in the ranking. The list was topped by Scandinavian countries: Sweden (20 percent), Norway (20 percent) and Finland (21 percent).

 

“We live in an Internet-connected world, and as such we are exposed to cyber-attacks now more than ever before. Security threats will increase in 2015, and both companies and home users must prepare themselves to respond to them. It is not a question of whether their security will be compromised but rather when and how, so in this case prevention is key”, concluded Corrons.

 

The full report is available here.

The post PandaLabs neutralized 75 million new malware samples in 2014, twice as many as in 2013 appeared first on MediaCenter Panda Security.

AVG Puts People First for Mobile Security

AMSTERDAM and SAN FRANCISCO – March, 2, 2015 – AVG® Technologies N.V. (NYSE: AVG), the online security company™ for 197 million active users, today previewed the next version of the AVG Zen™ platform to mobile operators and original equipment manufacturers (OEM). With the consumer launch currently planned for later this year, AVG Zen delivers a new family-first approach to security, including support for industry partner apps and wearables on customers’ devices, all in one place.

With digital lives becoming more complex in an Internet of Things world, security is now about protecting people as well as their devices and personal data. The next version of AVG Zen delivers three core pillars:

  • A subscription security service for families that includes AVG AntiVirus and AVG Cleaner across their devices to give them confidence in their digital lifestyle. AVG AntiVirus for Android™ was the first mobile security product to enter the 100-500 million downloads category on the Google® Play™ store.
  • A dedicated set of family products from Location Labs by AVG including phone controls and location services. Already offered by the top four US mobile operators, extending the availability of these products through AVG Zen makes it even easier for families to communicate and share location. Phone controls gives parents peace of mind when giving their children their first mobile device, allowing them to monitor and set limits.
  • A platform for mobile operators to deliver context-aware solutions for core services. This could be, for example, notifying a user if they are running low on storage or approaching their data limit. AVG Zen is open to partners looking to expand their offerings directly to AVG’s 197 million end users.

 

With global smartphone subscribers reaching 3.5 billion by 2019, industry figures calculate suppliers of Internet of Things product and service providers will generate incremental revenue exceeding $300 billion by 2020. Research into data management and security services estimates these alone will drive revenues in excess of $1.8 billion in the same timeframe.

AVG Zen enables mobile operators to provide context-aware alerts, updates and information direct to the customer to give them control and transparency of their security across their family, data, and devices.

“People not only want their online rights to be recognized, they want more control and responsibility over their online actions and those of family members. But today, their online experience is still disconnected. In the 2015 consumer trust survey we carried out with MEF, 72 percent were not happy sharing personal data with apps, 40 percent named privacy and security as important when choosing a mobile device, and another 34 percent relied on dedicated security apps to protect them,” said Yuval Ben-Itzhak, Chief Technology Officer, AVG Technologies. “Mobile operators and online security companies hold a trusted position in consumers’ lives and we have the opportunity to transform their connected experience by bringing everything together all in one central place.”

 

 

About AVG Technologies

AVG is the online security company providing leading software and services to secure devices, data and people. Over 197 million active users, as of December 31, 2014, use AVG´s products and services. AVG’s Consumer portfolio includes internet security, performance optimization, and personal privacy and identity protection for mobile devices and desktops. The AVG Business portfolio – delivered by managed service providers, VARs and resellers – offers IT administration, control and reporting, integrated security, and mobile device management that simplify and protect businesses.

All trademarks are the property of their respective owners.

www.avg.com

 

Contacts:

US

Katie Han

Waggener Edstrom for AVG

[email protected]

+ 1 (212) 551 4807

UK

Samantha Woodman

Waggener Edstrom for AVG

[email protected]

+ 44 (0)20 7632 3840