Monthly Archives: December 2016
Gentoo Linux Security Advisory 201612-03
Gentoo Linux Security Advisory 201612-3 – Multiple vulnerabilities have been found in libsndfile, the worst of which might allow remote attackers to execute arbitrary code. Versions less than 1.0.26 are affected.
RHBA-2016:2849-1: kernel bug fix update
Red Hat Enterprise Linux: Updated kernel packages that fix several bugs and add various enhancements are
now available for Red Hat Enterprise Linux 7.
Apache ActiveMQ 5.11.1 / 5.13.2 Directory Traversal / Command Execution
Apache ActiveMQ versions 5.11.1 and 5.13.2 suffer from command execution and directory traversal vulnerabilities.
CVE-2016-9796
Alcatel-Lucent OmniVista 8770 2.0 through 3.0 exposes different ORBs interfaces, which can be queried using the GIOP protocol on TCP port 30024. An attacker can bypass authentication, and OmniVista invokes methods (AddJobSet, AddJob, and ExecuteNow) that can be used to run arbitrary commands on the server, with the privilege of NT AUTHORITYSYSTEM on the server. NOTE: The discoverer states “The vendor position is to refer to the technical guidelines of the product security deployment to mitigate this issue, which means applying proper firewall rules to prevent unauthorised clients to connect to the OmniVista server.”
CVE-2016-9797
In BlueZ 5.42, a buffer over-read was observed in “l2cap_dump” function in “tools/parser/l2cap.c” source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
CVE-2016-9798
In BlueZ 5.42, a use-after-free was identified in “conf_opt” function in “tools/parser/l2cap.c” source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
CVE-2016-9799
In BlueZ 5.42, a buffer overflow was observed in “pklg_read_hci” function in “btsnoop.c” source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.
CVE-2016-9800
In BlueZ 5.42, a buffer overflow was observed in “pin_code_reply_dump” function in “tools/parser/hci.c” source file. The issue exists because “pin” array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame “pin_code_reply_cp *cp” parameter.
CVE-2016-9801
In BlueZ 5.42, a buffer overflow was observed in “set_ext_ctrl” function in “tools/parser/l2cap.c” source file when processing corrupted dump file.