Vulnerability Summary for the Week of June 5, 2017

Vulnerability Summary for the Week of June 5, 2017

Vulnerability Summary for the Week of June 5, 2017 Please Note: • The vulnerabilities are categorized by their level of severity which is either High, Medium or Low. • The CVE identity number is the publicly known ID given to that particular vulnerability. Therefore, you can search the status of that particular vulnerability using that ID. • The CVSS (Common Vulnerability Scoring System) score is a standard scoring system used to determine the severity of the vulnerability. High Vulnerabilities Primary CVSS Source & Patch Vendor -- Product Description Published Score Info In Apache Hadoop 2.8.0, 3.0.0-alpha1, and 3.0.0-alpha2, the LinuxContainerExecutor runs docker commands as root with CVE-2017-7669 insufficient input validation. When the docker BID(link is feature is enabled, authenticated users can run 2017-06- external) apache -- hadoop commands as root. 04 8.5 MLIST CVE-2017-9364 Unrestricted File Upload exists in BigTree CONFIRM(link CMS through 4.2.18: if an attacker uploads an is external) bigtreecms -- 'xxx.pht' or 'xxx.phtml' file, they could bypass 2017-06- CONFIRM(link bigtree_cms a safety check and execute any code. 02 7.5 is external) CVE-2017-9435 Dolibarr ERP/CRM before 5.0.3 is vulnerable CONFIRM(link to a SQL injection in user/index.php is external) (search_supervisor and search_statut 2017-06- CONFIRM(link dolibarr -- dolibarr parameters). 05 7.5 is external) CVE-2014-9923 In NAS in all Android releases from CAF BID(link is using the Linux kernel, a Buffer Copy external) without Checking Size of Input vulnerability 2017-06- CONFIRM(link google -- android could potentially exist. 06 9.3 is external) Primary CVSS Source & Patch Vendor -- Product Description Published Score Info CVE-2014-9924 BID(link is In 1x in all Android releases from CAF using external) the Linux kernel, a Signed to Unsigned 2017-06- CONFIRM(link google -- android Conversion Error could potentially occur. 06 9.3 is external) CVE-2014-9925 In HDR in all Android releases from CAF BID(link is using the Linux kernel, a Buffer Copy external) without Checking Size of Input vulnerability 2017-06- CONFIRM(link google -- android could potentially exist. 06 9.3 is external) CVE-2014-9926 BID(link is In GNSS in all Android releases from CAF external) using the Linux kernel, a Use After Free 2017-06- CONFIRM(link google -- android vulnerability could potentially exist. 06 9.3 is external) In UIM in all Android releases from CAF using the Linux kernel, a Buffer Copy CVE-2014-9927 without Checking Size of Input vulnerability 2017-06- CONFIRM(link google -- android could potentially exist. 06 9.3 is external) CVE-2014-9928 In GERAN in all Android releases from CAF BID(link is using the Linux kernel, a Buffer Copy external) without Checking Size of Input vulnerability 2017-06- CONFIRM(link google -- android could potentially exist. 06 9.3 is external) CVE-2014-9929 In WCDMA in all Android releases from BID(link is CAF using the Linux kernel, a Use of Out-of- external) range Pointer Offset vulnerability could 2017-06- CONFIRM(link google -- android potentially exist. 06 9.3 is external) CVE-2014-9930 BID(link is In WCDMA in all Android releases from external) CAF using the Linux kernel, a Use After Free 2017-06- CONFIRM(link google -- android vulnerability could potentially exist. 06 9.3 is external) CVE-2014-9941 In the Embedded File System in all Android BID(link is releases from CAF using the Linux kernel, a external) Time-of-Check Time-of-Use Race Condition 2017-06- CONFIRM(link google -- android vulnerability could potentially exist. 06 7.6 is external) Primary CVSS Source & Patch Vendor -- Product Description Published Score Info CVE-2014-9942 BID(link is In Boot in all Android releases from CAF external) using the Linux kernel, a Use of Uninitialized 2017-06- CONFIRM(link google -- android Variable vulnerability could potentially exist. 06 9.3 is external) CVE-2014-9943 In Core Kernel in all Android releases from BID(link is CAF using the Linux kernel, a Null Pointer external) Dereference vulnerability could potentially 2017-06- CONFIRM(link google -- android exist. 06 9.3 is external) CVE-2014-9944 In the Secure File System in all Android BID(link is releases from CAF using the Linux kernel, an external) Integer Overflow to Buffer Overflow 2017-06- CONFIRM(link google -- android vulnerability could potentially exist. 06 9.3 is external) CVE-2014-9945 In TrustZone in all Android releases from BID(link is CAF using the Linux kernel, an Improper external) Authorization vulnerability could potentially 2017-06- CONFIRM(link google -- android exist. 06 9.3 is external) CVE-2014-9946 BID(link is In Core Kernel in all Android releases from external) CAF using the Linux kernel, a Use After Free 2017-06- CONFIRM(link google -- android vulnerability could potentially exist. 06 9.3 is external) CVE-2014-9948 In TrustZone in all Android releases from BID(link is CAF using the Linux kernel, an Improper external) Validation of Array Index vulnerability could 2017-06- CONFIRM(link google -- android potentially exist. 06 9.3 is external) CVE-2014-9949 In TrustZone in all Android releases from BID(link is CAF using the Linux kernel, an Untrusted external) Pointer Dereference vulnerability could 2017-06- CONFIRM(link google -- android potentially exist. 06 9.3 is external) In Core Kernel in all Android releases from CAF using the Linux kernel, an Improper CVE-2014-9950 Authorization vulnerability could potentially 2017-06- BID(link is google -- android exist. 06 9.3 external) Primary CVSS Source & Patch Vendor -- Product Description Published Score Info CONFIRM(link is external) CVE-2014-9952 In the Secure File System in all Android BID(link is releases from CAF using the Linux kernel, a external) capture-replay vulnerability could potentially 2017-06- CONFIRM(link google -- android exist. 06 9.3 is external) CVE-2015-9005 In TrustZone in all Android releases from BID(link is CAF using the Linux kernel, an Integer external) Overflow to Buffer Overflow vulnerability 2017-06- CONFIRM(link google -- android could potentially exist. 06 9.3 is external) CVE-2015-9006 In Resource Power Manager (RPM) in all BID(link is Android releases from CAF using the Linux external) kernel, an Improper Access Control 2017-06- CONFIRM(link google -- android vulnerability could potentially exist. 06 9.3 is external) CVE-2015-9007 BID(link is In TrustZone in all Android releases from external) CAF using the Linux kernel, a Double Free 2017-06- CONFIRM(link google -- android vulnerability could potentially exist. 06 9.3 is external) CVE-2016- 10297 In TrustZone in all Android releases from BID(link is CAF using the Linux kernel, a Time-of- external) Check Time-of-Use Race Condition 2017-06- CONFIRM(link google -- android vulnerability could potentially exist. 06 9.3 is external) In Lenovo Service Bridge before version 4, a CVE-2016-8228 lenovo -- user with local privileges on a system could 2017-06- CONFIRM(link lenovo_service_bridge execute code with administrative privileges. 04 7.2 is external) In Mercurial before 4.1.3, "hg serve --stdio" allows remote authenticated users to launch CVE-2017-9462 the Python debugger, and consequently CONFIRM execute arbitrary code, by using --debugger as 2017-06- CONFIRM mercurial -- mercurial a repository name. 06 9.0 CONFIRM CVE-2017-9363 2017-06- CONFIRM(link Untrusted Java serialization in Soffid IAM soffid -- iam 02 7.5 is external) console before 1.7.5 allows remote attackers Primary CVSS Source & Patch Vendor -- Product Description Published Score Info to achieve arbitrary remote code execution via a crafted authentication request. Todd Miller's sudo version 1.8.20p1 and CVE-2017- earlier is vulnerable to an input validation 1000368 (embedded newlines) in the BID(link is get_process_ttyname() function resulting in external) information disclosure and command 2017-06- CONFIRM(link todd_miller -- sudo execution. 05 7.2 is external) CVE-2017-9360 websitebaker -- WebsiteBaker v2.10.0 has a SQL injection 2017-06- MISC(link is websitebaker vulnerability in /account/details.php. 02 7.5 external) CVE-2017-9345 BID(link is In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to external) 2.0.12, the DNS dissector could go into an MISC infinite loop. This was addressed in MISC epan/dissectors/packet-dns.c by trying to 2017-06- MISC wireshark -- wireshark detect self-referencing pointers. 02 7.8 MISC CVE-2017-9346 BID(link is In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to external) 2.0.12, the SoulSeek dissector could go into MISC an infinite loop. This was addressed in MISC epan/dissectors/packet-slsk.c by making loop 2017-06- MISC wireshark -- wireshark bounds more explicit. 02 7.8 MISC CVE-2017-9349 BID(link is In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to external) 2.0.12, the DICOM dissector has an infinite MISC loop. This was addressed in MISC epan/dissectors/packet-dcm.c by validating a 2017-06- MISC wireshark -- wireshark length value. 02 7.8 MISC CVE-2017-9350 In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to BID(link is 2.0.12, the openSAFETY dissector could external) crash or exhaust system memory. This was MISC addressed in epan/dissectors/packet- MISC opensafety.c by checking for a negative 2017-06- MISC wireshark -- wireshark length. 02 7.8 MISC Primary CVSS Source & Patch Vendor -- Product Description Published Score Info CVE-2017-9352 In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to BID(link is 2.0.12, the Bazaar dissector could go into an external) infinite loop.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    68 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us