ZoneMinder – multiple vulnerabilities

Posted by John Marzella on Feb 04

==========================================================================
Product: ZoneMinder
Versions: Multiple versions – see inline
Vulnerabilities: File disclosure, XSS, CSRF, Auth bypass & Info disclosure
CVE-IDs: CVE-2017-5595, CVE-2017-5367, CVE-2017-5368, CVE-2016-10140
Author: John Marzella
Date: 03/02/2017
==========================================================================

CVE-2016-10140 – Auth bypass and Info disclosure -…

CVE-2017-5882

Cross-site scripting (XSS) vulnerability in index.asp in SANADATA SanaCMS 7.3 allows remote attackers to inject arbitrary web script or HTML via the search parameter.

CVE-2016-7147

Cross-site scripting (XSS) vulnerability in the manage_findResult component in the search feature in Zope ZMI in Plone before 4.3.12 and 5.x before 5.0.7 allows remote attackers to inject arbitrary web script or HTML via vectors involving double quotes, as demonstrated by the obj_ids:tokens parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7140.

CVE-2017-5880

Splunk Web in Splunk Enterprise versions 6.5.x before 6.5.2, 6.4.x before 6.4.5, 6.3.x before 6.3.9, 6.2.x before 6.2.13, 6.1.x before 6.1.12, 6.0.x before 6.0.13, 5.0.x before 5.0.17 and Splunk Light versions before 6.5.2 allows remote authenticated users to cause a denial of service (daemon crash) via a crafted GET request, aka SPL-130279.

USN-3187-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-3187-1

3rd February, 2017

linux vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux
    – Linux kernel

Details

Andrey Konovalov discovered that the SCTP implementation in the Linux
kernel improperly handled validation of incoming data. A remote attacker
could use this to cause a denial of service (system crash). (CVE-2016-9555)

It was discovered that multiple memory leaks existed in the XFS
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (memory consumption). (CVE-2016-9685)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.2.0-121-powerpc-smp

3.2.0-121.164
linux-image-powerpc-smp

3.2.0.121.136
linux-image-3.2.0-121-highbank

3.2.0-121.164
linux-image-3.2.0-121-powerpc64-smp

3.2.0-121.164
linux-image-3.2.0-121-virtual

3.2.0-121.164
linux-image-3.2.0-121-generic

3.2.0-121.164
linux-image-3.2.0-121-generic-pae

3.2.0-121.164
linux-image-generic-pae

3.2.0.121.136
linux-image-highbank

3.2.0.121.136
linux-image-3.2.0-121-omap

3.2.0-121.164
linux-image-virtual

3.2.0.121.136
linux-image-powerpc64-smp

3.2.0.121.136
linux-image-generic

3.2.0.121.136
linux-image-omap

3.2.0.121.136

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2016-9555,

CVE-2016-9685

USN-3188-1: Linux kernel vulnerability

Ubuntu Security Notice USN-3188-1

3rd February, 2017

linux vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

The system could be made to crash if it received specially crafted
network traffic.

Software description

  • linux
    – Linux kernel

Details

Andrey Konovalov discovered that the SCTP implementation in the Linux
kernel improperly handled validation of incoming data. A remote attacker
could use this to cause a denial of service (system crash).

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
linux-image-powerpc-smp

3.13.0.108.116
linux-image-powerpc-e500mc

3.13.0.108.116
linux-image-3.13.0-108-generic

3.13.0-108.155
linux-image-generic

3.13.0.108.116
linux-image-3.13.0-108-powerpc-e500

3.13.0-108.155
linux-image-powerpc64-emb

3.13.0.108.116
linux-image-3.13.0-108-generic-lpae

3.13.0-108.155
linux-image-3.13.0-108-powerpc-smp

3.13.0-108.155
linux-image-3.13.0-108-powerpc-e500mc

3.13.0-108.155
linux-image-3.13.0-108-lowlatency

3.13.0-108.155
linux-image-3.13.0-108-powerpc64-emb

3.13.0-108.155
linux-image-generic-lpae

3.13.0.108.116
linux-image-powerpc-e500

3.13.0.108.116
linux-image-lowlatency

3.13.0.108.116
linux-image-3.13.0-108-powerpc64-smp

3.13.0-108.155
linux-image-powerpc64-smp

3.13.0.108.116

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2016-9555

USN-3188-2: Linux kernel (Trusty HWE) vulnerability

Ubuntu Security Notice USN-3188-2

3rd February, 2017

linux-lts-trusty vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 12.04 LTS

Summary

The system could be made to crash if it received specially crafted
network traffic.

Software description

  • linux-lts-trusty
    – Linux hardware enablement kernel from Trusty for Precise

Details

USN-3188-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu
12.04 LTS.

Andrey Konovalov discovered that the SCTP implementation in the Linux
kernel improperly handled validation of incoming data. A remote attacker
could use this to cause a denial of service (system crash).

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 12.04 LTS:
linux-image-3.13.0-108-generic-lpae

3.13.0-108.155~precise1
linux-image-generic-lpae-lts-trusty

3.13.0.108.99
linux-image-3.13.0-108-generic

3.13.0-108.155~precise1
linux-image-generic-lts-trusty

3.13.0.108.99

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2016-9555

USN-3189-1: Linux kernel vulnerabilities

Ubuntu Security Notice USN-3189-1

3rd February, 2017

linux, linux-raspi2, linux-snapdragon vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux
    – Linux kernel

  • linux-raspi2
    – Linux kernel for Raspberry Pi 2

  • linux-snapdragon
    – Linux kernel for Snapdragon Processors

Details

Mikulas Patocka discovered that the asynchronous multibuffer cryptographic
daemon (mcryptd) in the Linux kernel did not properly handle being invoked
with incompatible algorithms. A local attacker could use this to cause a
denial of service (system crash). (CVE-2016-10147)

Qidan He discovered that the ICMP implementation in the Linux kernel did
not properly check the size of an ICMP header. A local attacker with
CAP_NET_ADMIN could use this to expose sensitive information.
(CVE-2016-8399)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.04 LTS:
linux-image-powerpc-smp 4.4.0.62.65
linux-image-powerpc-e500mc 4.4.0.62.65
linux-image-4.4.0-1042-raspi2

4.4.0-1042.49
linux-image-4.4.0-62-powerpc-e500mc

4.4.0-62.83
linux-image-4.4.0-62-lowlatency

4.4.0-62.83
linux-image-generic 4.4.0.62.65
linux-image-4.4.0-62-powerpc-smp

4.4.0-62.83
linux-image-4.4.0-62-powerpc64-smp

4.4.0-62.83
linux-image-lowlatency 4.4.0.62.65
linux-image-4.4.0-1046-snapdragon

4.4.0-1046.50
linux-image-4.4.0-62-powerpc64-emb

4.4.0-62.83
linux-image-powerpc64-smp 4.4.0.62.65
linux-image-generic-lpae 4.4.0.62.65
linux-image-snapdragon 4.4.0.1046.38
linux-image-4.4.0-62-generic

4.4.0-62.83
linux-image-4.4.0-62-generic-lpae

4.4.0-62.83
linux-image-powerpc64-emb 4.4.0.62.65
linux-image-raspi2 4.4.0.1042.41

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2016-10147,

CVE-2016-8399

USN-3189-2: Linux kernel (Xenial HWE) vulnerabilities

Ubuntu Security Notice USN-3189-2

3rd February, 2017

linux-lts-xenial vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in the kernel.

Software description

  • linux-lts-xenial
    – Linux hardware enablement kernel from Xenial for Trusty

Details

USN-3189-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu
14.04 LTS.

Mikulas Patocka discovered that the asynchronous multibuffer cryptographic
daemon (mcryptd) in the Linux kernel did not properly handle being invoked
with incompatible algorithms. A local attacker could use this to cause a
denial of service (system crash). (CVE-2016-10147)

Qidan He discovered that the ICMP implementation in the Linux kernel did
not properly check the size of an ICMP header. A local attacker with
CAP_NET_ADMIN could use this to expose sensitive information.
(CVE-2016-8399)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
linux-image-powerpc-smp-lts-xenial

4.4.0.62.48
linux-image-lowlatency-lts-xenial

4.4.0.62.48
linux-image-4.4.0-62-powerpc-e500mc

4.4.0-62.83~14.04.1
linux-image-4.4.0-62-lowlatency

4.4.0-62.83~14.04.1
linux-image-4.4.0-62-powerpc-smp

4.4.0-62.83~14.04.1
linux-image-4.4.0-62-powerpc64-smp

4.4.0-62.83~14.04.1
linux-image-generic-lpae-lts-xenial

4.4.0.62.48
linux-image-powerpc64-smp-lts-xenial

4.4.0.62.48
linux-image-4.4.0-62-powerpc64-emb

4.4.0-62.83~14.04.1
linux-image-generic-lts-xenial

4.4.0.62.48
linux-image-powerpc64-emb-lts-xenial

4.4.0.62.48
linux-image-4.4.0-62-generic

4.4.0-62.83~14.04.1
linux-image-4.4.0-62-generic-lpae

4.4.0-62.83~14.04.1
linux-image-powerpc-e500mc-lts-xenial

4.4.0.62.48

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References

CVE-2016-10147,

CVE-2016-8399