Vulnerability Summary for the Week of July 8, 2019.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Vulnerability Summary for the Week of July 8, 2019 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: • High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 • Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9 • Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9 Entries may include additional information provided by organizations and efforts sponsored by Ug-CERT. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletins is compiled from external, open source reports and is not a direct result of Ug- CERT analysis. High Vulnerabilities CVS Source Primary Publish S Description & Patch Vendor -- Product ed Scor Info e CVE- Contao 4.x allows SQL 2019- 2019- contao -- contao Injection. Fixed in Contao 7.5 07-09 11512 4.4.39 and Contao 4.7.5. MISC /web/Lib/Action/IndexAction. class.php in D-Link Central WiFi Manager CWM(100) CVE- before v1.03R0100_BETA6 2019- dlink -- allows remote attackers to 13372 2019- central_wifimanage execute arbitrary PHP code via 7.5 MISC 07-06 r a cookie because a cookie's CONFI username field allows eval RM injection, and an empty MISC password bypasses authentication. CVS Source Primary Publish S Description & Patch Vendor -- Product ed Scor Info e An issue was discovered in the D-Link Central WiFi Manager CVE- CWM(100) before 2019- dlink -- v1.03R0100_BETA6. Input 13373 2019- central_wifimanage does not get validated and 7.5 MISC 07-06 r arbitrary SQL statements can CONFI be executed in the database via RM the /web/Public/Conn.php MISC parameter dbSQL. A SQL Injection was discovered in D-Link Central CVE- WiFi Manager CWM(100) 2019- dlink -- before v1.03R0100_BETA6 in 13375 2019- central_wifimanage PayAction.class.php with the 7.5 MISC 07-06 r index.php/Pay/passcodeAuth CONFI parameter passcode. The RM vulnerability does not need any MISC authentication. D-Link DIR-655 C devices CVE- before 3.02B05 BETA03 allow 2019- remote attackers to execute dlink -- dir- 2019- 13561 arbitrary commands via shell 10.0 655_firmware 07-11 MISC metacharacters in the MISC online_firmware_check.cgi MISC check_fw_url parameter. An issue was discovered on D- Link DIR-818LW devices with CVE- firmware 2.06betab01. There 2019- dlink -- dir- is a command injection in 2019- 9.0 13481 818lw_firmware HNAP1 (exploitable with 07-10 BID Authentication) via shell MISC metacharacters in the MTU field to SetWanSettings. CVS Source Primary Publish S Description & Patch Vendor -- Product ed Scor Info e An issue was discovered on D- Link DIR-818LW devices with CVE- firmware 2.06betab01. There 2019- dlink -- dir- is a command injection in 2019- 10.0 13482 818lw_firmware HNAP1 (exploitable with 07-10 BID Authentication) via shell MISC metacharacters in the Type field to SetWanSettings. Dynacolor FCM-MB40 v1.2.0.0 devices allow remote attackers to execute arbitrary commands via a crafted CVE- fortinet -- fcm- parameter to a CGI script, as 2019- 2019- 9.0 mb40_firmware demonstrated by sed injection 07-07 13398 in cgi- MISC bin/camctrl_save_profile.cgi (save parameter) and cgi- bin/ddns.cgi. In ihevcd_sao_shift_ctb of ihevcd_sao.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code CVE- execution with no additional 2019- execution privileges needed. 2019- google -- android 9.3 2106 User interaction is needed for 07-08 CONFI exploitation. Product: Android. RM Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A- 130023983. In ihevcd_parse_pps of 2019- CVE- google -- android 9.3 ihevcd_parse_headers.c, there 07-08 2019- CVS Source Primary Publish S Description & Patch Vendor -- Product ed Scor Info e is a possible out of bounds 2107 write due to a missing bounds CONFI check. This could lead to RM remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-130024844. In MakeMPEG4VideoCodecSpec ificData of AVIExtractor.cpp, there is a possible out of bounds write due to an incorrect bounds check. This CVE- could lead to remote code 2019- 2019- google -- android execution with no additional 9.3 2109 07-08 execution privileges needed. CONFI User interaction is needed for RM exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1. Android ID: A-130651570. In loop of DnsTlsSocket.cpp, there is a possible heap memory corruption due to a CVE- use after free. This could lead 2019- 2019- google -- android to remote code execution in 7.5 2111 07-08 the netd server with no CONFI additional execution privileges RM needed. User interaction is not needed for exploitation. CVS Source Primary Publish S Description & Patch Vendor -- Product ed Scor Info e Product: Android. Versions: Android-9. Android ID: A- 122856181. In several functions of alarm.cc, there is possible memory corruption due to a use after free. This could lead CVE- to local code execution with no 2019- additional execution privileges 2019- google -- android 7.2 2112 needed. User interaction is not 07-08 CONFI needed for exploitation. RM Product: Android. Versions: Android-8.0 Android-8.1 Android-9. Android ID: A- 117997080. CVE- hidea.com AZ Admin 1.0 has 2019- 2019- hidea -- az_admin news_det.php?cod= SQL 7.5 07-11 13507 Injection. MISC An issue was discovered in CVE- Hsycms V1.1. There is a SQL 2019- 2019- hsycms -- hsycms 7.5 injection vulnerability via a 07-10 10653 /news/*.html page. MISC A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows CVE- attackers to potentially cause 2019- oniguruma_project 2019- information disclosure, denial 7.5 13224 -- oniguruma 07-10 of service, or possibly code CONFI execution by providing a RM crafted regular expression. The attacker provides a pair of a CVS Source Primary Publish S Description & Patch Vendor -- Product ed Scor Info e regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe(). Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust. The strong_password gem CVE- 0.0.7 for Ruby, as distributed 2019- strong_password_p on RubyGems.org, included a 13354 2019- roject -- code-execution backdoor 7.5 MISC 07-08 strong_password inserted by a third party. The MISC current version, without this MISC backdoor, is 0.0.6. MISC An issue was discovered in the CVE- Teclib Fields plugin through 2019- 1.9.2 for GLPI. it allows SQL 12723 teclib-edition -- 2019- Injection via container_id and 7.5 MISC fields 07-10 old_order parameters to MISC ajax/reorder.php by an CONFI unauthenticated user. RM Trape through 2019-05-08 has CVE- SQL injection via the data[2] trape_project -- 2019- 2019- variable in core/db.py, as 7.5 trape 07-10 13489 demonstrated by the /bs t MISC parameter. CVE- TYPO3 8.x through 8.7.26 and 2019- 9.x through 9.5.7 allows 2019- typo3 -- typo3 7.5 12747 Deserialization of Untrusted 07-09 CONFI Data. RM CVS Source Primary Publish S Description & Patch Vendor -- Product ed Scor Info e CVE- Vivotek FD8136 devices allow 2018- vivotek -- 2019- Remote Command Injection, 10.0 14494 fd8136_firmware 07-10 related to BusyBox and wget. MISC MISC Vivotek FD8136 devices allow CVE- Remote Command Injection, 2018- vivotek -- aka "another command 2019- 10.0 14495 fd8136_firmware injection vulnerability in our 07-10 MISC target device," a different issue MISC than CVE-2018-14494. Vivotek FD8136 devices allow remote memory corruption and CVE- remote code execution because 2018- vivotek -- 2019- of a stack-based buffer 7.5 14496 fd8136_firmware 07-10 overflow, related to sprintf, MISC vlocal_buff_4326, and MISC set_getparam.cgi. The Yoast SEO plugin before CVE- 11.6-RC5 for WordPress does 2019- 2019- yoast -- yoast_seo 7.5 not properly restrict unfiltered 07-09 13478 HTML in term descriptions. MISC Back to top Medium Vulnerabilities CV Source Primary Publis SS & Description Vendor -- Product hed Sco Patch re Info posix/JackSocket.cpp in libjack in JACK2 1.9.1 through 1.9.12 (as distributed with alsa- plugins 1.1.7 and later) has a "double file descriptor close" issue during a failed connection attempt CVE- when jackd2 is not 2019- 2019- alsa-project -- alsa running. Exploitation 6.8 13351 07-05 success depends on MISC multithreaded timing of MISC that double close, which can result in unintended information disclosure, crashes, or file corruption due to having the wrong file associated with the file descriptor. CVE- iart.php in XAMPP 2019- 1.7.0 has XSS, a related 2019- apachefriends -- xampp 4.3 8920 issue to CVE-2008- 07-09 BID 3569. MISC mq_parse_http in CVE- mongoose.c in 2019- 2019- cesanta -- mongoose Mongoose 6.15 has a 5.0 13503 07-10 heap-based buffer over- MISC read. MISC cisco -- A vulnerability in the 2019- CVE- unified_communications_man Session Initiation 5.0 07-05 2019- ager Protocol (SIP) protocol CV Source Primary Publis SS & Description Vendor -- Product hed Sco Patch re Info implementation of 1887 Cisco Unified CISCO Communications Manager could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.