High Vulnerabilities
Total Page:16
File Type:pdf, Size:1020Kb
Vulnerability Summary for the Week of June 24, 2019 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9 • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9 Entries may include additional information provided by organizations and efforts sponsored by Ug-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of Ug-CERT analysis. High Vulnerabilities Primary CVSS Source & Description Published Vendor -- Product Score Patch Info CVE-2019- An issue was discovered in Mongoose before 2019-06- 12951 cesanta -- mongoose 6.15. The parse_mqtt() function in mg_mqtt.c has 7.5 24 MISC a critical heap-based buffer overflow. MISC A vulnerability in the web-based management CVE-2019- cisco -- interface of Cisco Data Center Network Manager 2019-06- 1619 7.5 data_center_network_manager (DCNM) could allow an unauthenticated, remote 26 BID attacker to bypass authentication and execute CISCO Primary CVSS Source & Description Published Vendor -- Product Score Patch Info arbitrary actions with administrative privileges on an affected device. The vulnerability is due to improper session management on affected DCNM software. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to gain administrative access on the affected device. A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to upload arbitrary files on an affected device. The vulnerability is due to incorrect CVE-2019- cisco -- permission settings in affected DCNM software. 2019-06- 1620 10.0 data_center_network_manager An attacker could exploit this vulnerability by 26 BID uploading specially crafted data to the affected CISCO device. A successful exploit could allow the attacker to write arbitrary files on the filesystem and execute code with root privileges on the affected device. CVE-2019- Citrix AppDNA before 7 1906.1.0.472 has 2019-06- 12292 citrix -- appdna 7.5 Incorrect Access Control. 24 CONFIRM MISC Primary CVSS Source & Description Published Vendor -- Product Score Patch Info HP Support Assistant 8.7.50 and earlier allows a CVE-2019- user to gain system privilege and allows 2019-06- 6328 hp -- support_assistant unauthorized modification of directories or files. 7.2 25 BID Note: A different vulnerability than CVE-2019- CONFIRM 6329. HP Support Assistant 8.7.50 and earlier allows a CVE-2019- user to gain system privilege and allows 2019-06- 6329 hp -- support_assistant unauthorized modification of directories or files. 7.2 25 BID Note: A different vulnerability than CVE-2019- CONFIRM 6328. CVE-2018- 20843 MISC In libexpat in Expat before 2.2.7, XML input MISC including XML names that contain a large MISC number of colons could make the XML parser 2019-06- MISC libexpat -- expat 7.8 consume a high amount of RAM and CPU 24 MISC resources while processing (enough to be usable MLIST for denial-of-service attacks). BUGTRAQ UBUNTU UBUNTU DEBIAN Primary CVSS Source & Description Published Vendor -- Product Score Patch Info CVE-2019- LiveZilla Server before 8.0.1.1 is vulnerable to 2019-06- 12939 livezilla -- livezilla SQL Injection in server.php via the p_ext_rse 7.5 24 BID parameter. MISC LiveZilla Server before 8.0.1.1 is vulnerable to CVE-2019- Denial Of Service (memory consumption) in 2019-06- livezilla -- livezilla 7.1 12940 knowledgebase.php via a large integer value of 24 MISC the depth parameter. LiveZilla Server before 8.0.1.1 is vulnerable to CVE-2019- 2019-06- livezilla -- livezilla SQL Injection in functions.internal.build.inc.php 7.5 12960 25 via the parameter p_dt_s_d. MISC Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an CVE-2019- pivotal_software -- application using an affected version of Spring 2019-06- 7.5 11272 spring_security Security is leveraging PlaintextPasswordEncoder 26 CONFIRM and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of "null". PostgreSQL versions 10.x before 10.9 and 2019-06- CVE-2019- postgresql -- postgresql 9.0 versions 11.x before 11.4 are vulnerable to a 26 10164 Primary CVSS Source & Description Published Vendor -- Product Score Patch Info stack-based buffer overflow. Any authenticated CONFIRM user can overflow a stack-based buffer by MISC changing the user's own password to a purpose- crafted value. This often suffices to execute arbitrary code as the PostgreSQL operating system account. The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command CVE-2019- injection, which allows the remote attacker to 2019-06- qemu -- qemu 10.0 12928 achieve code execution, denial of service, or 24 MISC information disclosure by sending a crafted QMP command to the listening server. The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, CVE-2019- which allows the attacker to achieve code 2019-06- qemu -- qemu 10.0 12929 execution, denial of service, or information 24 MISC disclosure by sending a crafted QMP command to the listening server. apps/gsudo.c in gsudo in ToaruOS through 1.10.9 CVE-2019- has a buffer overflow allowing local privilege 2019-06- toaruos -- toaruos 7.2 12937 escalation to the root user via the DISPLAY 23 MISC environment variable. Medium Vulnerabilities CVS Source & Primary Publishe S Description Patch Vendor -- Product d Scor Info e The Roundcube component of Analogic CVE- Poste.io 2.1.6 uses .htaccess to protect the 2019- logs/ folder, which is effective with the 2019-06- analogic -- poste.io 4.0 12938 Apache HTTP Server but is ineffective 24 MISC with nginx. Attackers can read logs via MISC the webmail/logs/sendmail URI. CVE- The fix for CVE-2019-0199 was 2019- incomplete and did not address HTTP/2 10072 connection window exhaustion on write BID in Apache Tomcat versions 9.0.0.M1 to MISC 9.0.19 and 8.5.0 to 8.5.40 . By not 2019-06- apache -- tomcat 5.0 CONFIR sending WINDOW_UPDATE messages 21 M for the connection window (stream 0) CONFIR clients were able to cause server-side M threads to block eventually leading to CONFIR thread exhaustion and a DoS. M The issue searching component in Jira CVE- 2019-06- atlassian -- jira before version 8.1.0 allows remote 4.0 2019- 26 attackers to deny access to Jira service 11583 CVS Source & Primary Publishe S Description Patch Vendor -- Product d Scor Info e via denial of service vulnerability in issue BID search when ordering by "Epic Name". MISC CVE- BCN Quark Quarking Password Manager 2019- 3.1.84 suffers from a clickjacking 12880 vulnerability caused by allowing * within 2019-06- bcnquark -- quarking_password_manager 4.3 MISC web_accessible_resources. An attacker 24 FULLDIS can take advantage of this vulnerability C and cause significant harm. MISC CVE- arch/powerpc/mm/mmu_context_book3s 2019- 64.c in the Linux kernel before 5.1.15 for 12817 powerpc has a bug where unrelated MLIST processes may be able to read/write to 2019-06- BID canonical -- ubuntu_linux 6.9 one another's virtual memory under 25 CONFIR certain conditions via an mmap above M 512 TB. Only a subset of powerpc MISC systems are affected. FEDORA UBUNTU A vulnerability in the web-based 2019-06- CVE- cisco -- data_center_network_manager 5.0 management interface of Cisco Data 26 2019-1621 CVS Source & Primary Publishe S Description Patch Vendor -- Product d Scor Info e Center Network Manager (DCNM) could BID allow an unauthenticated, remote attacker CISCO to gain access to sensitive files on an affected device. The vulnerability is due to incorrect permissions settings on affected DCNM software. An attacker could exploit this vulnerability by connecting to the web-based management interface of an affected device and requesting specific URLs. A successful exploit could allow the attacker to download arbitrary files from the underlying filesystem of the affected device. A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker CVE- to retrieve sensitive information from an 2019-06- 2019-1622 cisco -- data_center_network_manager 5.0 affected device. The vulnerability is due 26 BID to improper access controls for certain CISCO URLs on affected DCNM software. An attacker could exploit this vulnerability by connecting to the web-based CVS Source & Primary Publishe S Description Patch Vendor -- Product d Scor Info e management interface of an affected device and requesting specific URLs. A successful exploit could allow the attacker to download log files and diagnostic information from the affected device. CVE- 2019- 12280 MISC FULLDIS C PC-Doctor Toolbox before 7.3 has an 2019-06- dell -- supportassist_for_business_pcs 6.8 CONFIR Uncontrolled Search Path Element. 25 M BID MISC MISC MISC MISC FasterXML jackson-databind 2.x before CVE- 2.9.9 might allow attackers to have a 2019-06- 2019- fasterxml -- jackson-databind 4.3 variety of impacts by leveraging failure to 24 12384 block the logback-core class from MISC CVS Source & Primary Publishe S Description Patch Vendor -- Product d Scor Info e polymorphic deserialization.