The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of SLES

vulnerability alert CVE-2014-7169

bash: code execution via Function Variable

Synthesis of the vulnerability

An attacker can define a special environment variable, which is transmitted (via CGI or OpenSSH for example) to bash, in order to execute code.
Impacted products: Arkoon FAST360, GAiA, CheckPoint IP Appliance, IPSO, SecurePlatform, CheckPoint Security Appliance, CheckPoint Smart-1, CheckPoint VSX-1, Cisco ASR, Cisco ACE, ASA, IOS XE Cisco, Cisco IPS, IronPort Encryption, Cisco Nexus, NX-OS, Secure ACS, Cisco CUCM, Cisco Unified CCX, XenServer, Clearswift Email Gateway, Clearswift Web Gateway, Debian, Avamar, EMC CAVA, EMC CEE, EMC CEPA, Celerra FAST, Celerra NS, Celerra NX4, EMC CMDCE, Connectrix Switch, NetWorker, PowerPath, Unisphere EMC, VNX Operating Environment, VNX Series, Black Diamond, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FortiAnalyzer, FortiAnalyzer Virtual Appliance, FortiManager, FortiManager Virtual Appliance, HP Operations, AIX, IVE OS, Junos Space, MAG Series Juniper, NSM Central Manager, NSMXpress, Juniper SA, Juniper UAC, MBS, McAfee Email and Web Security, McAfee Email Gateway, McAfee MOVE AntiVirus, McAfee NSP, McAfee NGFW, McAfee Web Gateway, openSUSE, Solaris, pfSense, RealPresence Collaboration Server, RealPresence Distributed Media Application, Polycom VBP, RHEL, RSA Authentication Manager, ROX, RuggedSwitch, Slackware, Stonesoft NGFW/VPN, SUSE Linux Enterprise Desktop, SLES, Ubuntu, Unix (platform) ~ not comprehensive, ESX, vCenter, VMware vSphere, Wind River Linux.
Severity: 3/4.
Creation date: 25/09/2014.
Identifiers: 193355, 193866, 194029, 194064, 194669, 480931, c04475942, c04479492, CERTFR-2014-AVI-403, CERTFR-2014-AVI-415, CERTFR-2014-AVI-480, cisco-sa-20140926-bash, CTX200217, CTX200223, CVE-2014-3659-REJECT, CVE-2014-7169, DSA-3035-1, ESA-2014-111, ESA-2014-123, ESA-2014-124, ESA-2014-125, ESA-2014-126, ESA-2014-127, ESA-2014-128, ESA-2014-133, ESA-2014-136, ESA-2014-150, ESA-2014-151, ESA-2014-152, ESA-2014-162, FEDORA-2014-11514, FEDORA-2014-11527, FEDORA-2014-12202, FG-IR-14-030, HPSBGN03138, HPSBMU03144, JSA10648, JSA10661, MDVSA-2014:190, MDVSA-2015:164, openSUSE-SU-2014:1229-1, openSUSE-SU-2014:1242-1, openSUSE-SU-2014:1248-1, openSUSE-SU-2014:1308-1, openSUSE-SU-2014:1310-1, pfSense-SA-14_18.packages, RHSA-2014:1306-01, RHSA-2014:1311-01, RHSA-2014:1312-01, RHSA-2014:1354-01, RHSA-2014:1865-01, SB10085, sk102673, SOL15629, SSA:2014-268-01, SSA:2014-268-02, SSA-860967, SUSE-SU-2014:1247-1, SUSE-SU-2014:1247-2, T1021272, USN-2363-1, USN-2363-2, VIGILANCE-VUL-15401, VMSA-2014-0010, VMSA-2014-0010.10, VMSA-2014-0010.11, VMSA-2014-0010.12, VMSA-2014-0010.13, VMSA-2014-0010.2, VMSA-2014-0010.4, VMSA-2014-0010.7, VMSA-2014-0010.8, VMSA-2014-0010.9, VN-2014-002.

Description of the vulnerability

The bulletin VIGILANCE-VUL-15399 describes a vulnerability of bash.

However, the offered patch (VIGILANCE-SOL-36695) is incomplete. An variant of the initial attack can thus still be used to execute code or to create a file.

In this case, the code is run when the variable is parsed (which is not necessarily an environment variable), and not when the shell starts. The impact may thus be lower, but this was not confirmed.

An attacker can therefore define a special environment variable, which is transmitted (via CGI or OpenSSH for example) to bash, in order to execute code.
Complete Vigil@nce bulletin.... (free trial)

vulnerability CVE-2014-1568

NSS, CyaSSL, GnuTLS: bypassing the certification chain via ASN.1

Synthesis of the vulnerability

An attacker can create a malicious X.509 certificate, which is accepted as valid, in order to deceive services using the RSA signature (such as SSL/TLS sessions).
Impacted products: Debian, Fedora, Junos Space, MBS, Firefox, NSS, SeaMonkey, Thunderbird, openSUSE, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu, Unix (platform) ~ not comprehensive.
Severity: 3/4.
Creation date: 25/09/2014.
Identifiers: BERserk, CERTFR-2014-AVI-401, CERTFR-2015-AVI-431, CVE-2014-1568, DSA-3033-1, DSA-3034-1, DSA-3037-1, FEDORA-2014-11518, FEDORA-2014-11565, FEDORA-2014-11744, FEDORA-2014-11745, JSA10698, MDVSA-2014:189, MDVSA-2015:059, MFSA 2014-73, openSUSE-SU-2014:1224-1, openSUSE-SU-2014:1232-1, RHSA-2014:1307-01, RHSA-2014:1354-01, RHSA-2014:1371-01, SSA:2014-267-02, SSA:2014-271-01, SSA:2014-271-02, SSA:2014-271-03, SUSE-SU-2014:1220-1, SUSE-SU-2014:1220-2, SUSE-SU-2014:1220-3, SUSE-SU-2014:1220-4, USN-2360-1, USN-2360-2, USN-2361-1, VIGILANCE-VUL-15400, VU#772676.

Description of the vulnerability

The NSS, CyaSSL and GnuTLS libraries implement cryptographic feature, such as the RSA signature check.

The ASN.1 DigestInfo type is used to represent the hash algorithm and the hash value. The BER ASN.1 encoding allows to encode sizes in several ways. So, the ASN.1 parser reformats data for DigestInfo, without indicating an error. An invalid RSA signature can then be accepted as valid.

An attacker can therefore create a malicious X.509 certificate, which is accepted as valid, in order to deceive services using the RSA signature (such as SSL/TLS sessions).
Complete Vigil@nce bulletin.... (free trial)

computer vulnerability note CVE-2014-6271

bash: code execution via Environment Variable, ShellShock

Synthesis of the vulnerability

An attacker can define a special environment variable, which is transmitted (via CGI or OpenSSH for example) to bash, in order to execute code.
Impacted products: Arkoon FAST360, GAiA, CheckPoint IP Appliance, IPSO, SecurePlatform, CheckPoint Security Appliance, CheckPoint Smart-1, CheckPoint VSX-1, Cisco ASR, Cisco ACE, ASA, IOS XE Cisco, Cisco IPS, IronPort Encryption, Cisco Nexus, NX-OS, Secure ACS, Cisco CUCM, Cisco Unified CCX, XenServer, Clearswift Email Gateway, Clearswift Web Gateway, Debian, Avamar, EMC CAVA, EMC CEE, EMC CEPA, Celerra FAST, Celerra NS, Celerra NX4, EMC CMDCE, Connectrix Switch, NetWorker, PowerPath, Unisphere EMC, VNX Operating Environment, VNX Series, Black Diamond, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FortiAnalyzer, FortiAnalyzer Virtual Appliance, FortiManager, FortiManager Virtual Appliance, HP Operations, AIX, IVE OS, Junos Space, MAG Series Juniper, NSM Central Manager, NSMXpress, Juniper SA, Juniper UAC, MBS, McAfee Email and Web Security, McAfee Email Gateway, McAfee MOVE AntiVirus, McAfee NSP, McAfee NGFW, McAfee Web Gateway, openSUSE, Solaris, pfSense, RealPresence Collaboration Server, RealPresence Distributed Media Application, Polycom VBP, RHEL, RSA Authentication Manager, ROX, RuggedSwitch, Slackware, Stonesoft NGFW/VPN, SUSE Linux Enterprise Desktop, SLES, Ubuntu, Unix (platform) ~ not comprehensive, ESX, vCenter, VMware vSphere, Wind River Linux.
Severity: 4/4.
Creation date: 24/09/2014.
Identifiers: 1141597, 193355, 193866, 194029, 194064, 194669, 480931, c04475942, c04479492, CERTFR-2014-ALE-006, CERTFR-2014-AVI-403, CERTFR-2014-AVI-415, CERTFR-2014-AVI-480, cisco-sa-20140926-bash, CTX200217, CTX200223, CVE-2014-6271, DSA-3032-1, ESA-2014-111, ESA-2014-123, ESA-2014-124, ESA-2014-125, ESA-2014-126, ESA-2014-127, ESA-2014-128, ESA-2014-133, ESA-2014-136, ESA-2014-150, ESA-2014-151, ESA-2014-152, ESA-2014-162, FEDORA-2014-11360, FEDORA-2014-11503, FG-IR-14-030, HPSBGN03138, HPSBMU03144, JSA10648, JSA10661, MDVSA-2014:186, MDVSA-2015:164, openSUSE-SU-2014:1226-1, openSUSE-SU-2014:1238-1, openSUSE-SU-2014:1308-1, openSUSE-SU-2014:1310-1, pfSense-SA-14_18.packages, RHSA-2014:1293-01, RHSA-2014:1294-01, RHSA-2014:1295-01, RHSA-2014:1354-01, SB10085, ShellShock, sk102673, SOL15629, SSA:2014-267-01, SSA-860967, SUSE-SU-2014:1212-1, SUSE-SU-2014:1213-1, SUSE-SU-2014:1214-1, SUSE-SU-2014:1223-1, T1021272, USN-2362-1, VIGILANCE-VUL-15399, VMSA-2014-0010, VMSA-2014-0010.10, VMSA-2014-0010.11, VMSA-2014-0010.12, VMSA-2014-0010.13, VMSA-2014-0010.2, VMSA-2014-0010.4, VMSA-2014-0010.7, VMSA-2014-0010.8, VMSA-2014-0010.9, VN-2014-002, VU#252743.

Description of the vulnerability

When bash interpreter is started, environment variables of the parent process are transfered to the current process. For example:
  export A=test
  bash
  echo $A

Functions can also be transfered through environment variables. For example:
  export F='() { echo bonjour; }'
  bash
  F

However, bash loads functions by interpreting the full environment variable. If an environment variable starts with "() {" and ends with "; command", then the command is run when the shell is started.

The main attack vectors are:
 - CGI scripts (Apache mod_cgi, mod_cgid) on a web server (variables: HTTP_header, REMOTE_HOST, SERVER_PROTOCOL)
 - OpenSSH via AcceptEnv (variables : TERM, ForceCommand avec SSH_ORIGINAL_COMMAND)

An attacker can therefore define a special environment variable, which is transmitted (via CGI or OpenSSH for example) to bash, in order to execute code.
Complete Vigil@nce bulletin.... (free trial)

vulnerability announce CVE-2014-6421 CVE-2014-6422 CVE-2014-6423

Wireshark: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Wireshark.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, MBS, openSUSE, Solaris, RHEL, SUSE Linux Enterprise Desktop, SLES, Wireshark.
Severity: 2/4.
Creation date: 17/09/2014.
Identifiers: CERTFR-2014-AVI-390, CVE-2014-6421, CVE-2014-6422, CVE-2014-6423, CVE-2014-6424, CVE-2014-6425, CVE-2014-6426, CVE-2014-6427, CVE-2014-6428, CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432, DSA-3049-1, FEDORA-2014-11441, MDVSA-2014:188, openSUSE-SU-2014:1249-1, RHSA-2014:1676-01, RHSA-2014:1677-01, SOL16940, SUSE-SU-2014:1221-1, VIGILANCE-VUL-15362, wnpa-sec-2014-12, wnpa-sec-2014-13, wnpa-sec-2014-14, wnpa-sec-2014-15, wnpa-sec-2014-16, wnpa-sec-2014-17, wnpa-sec-2014-18, wnpa-sec-2014-19.

Description of the vulnerability

Several vulnerabilities were announced in Wireshark.

An attacker can send a malicious RTP packet, in order to trigger a denial of service. [severity:2/4; CVE-2014-6421, CVE-2014-6422, wnpa-sec-2014-12]

An attacker can generate an infinite loop in MEGACO, in order to trigger a denial of service. [severity:2/4; CVE-2014-6423, wnpa-sec-2014-13]

An attacker can send a malicious Netflow packet, in order to trigger a denial of service. [severity:2/4; CVE-2014-6424, wnpa-sec-2014-14]

An attacker can send a malicious CUPS packet, in order to trigger a denial of service. [severity:2/4; CVE-2014-6425, wnpa-sec-2014-15]

An attacker can generate an infinite loop in HIP, in order to trigger a denial of service. [severity:2/4; CVE-2014-6426, wnpa-sec-2014-16]

An attacker can send a malicious RTSP packet, in order to trigger a denial of service. [severity:2/4; CVE-2014-6427, wnpa-sec-2014-17]

An attacker can send a malicious SES packet, in order to trigger a denial of service. [severity:2/4; CVE-2014-6428, wnpa-sec-2014-18]

An attacker can use a malicious Sniffer file, in order to trigger a denial of service. [severity:2/4; CVE-2014-6429, CVE-2014-6430, CVE-2014-6431, CVE-2014-6432, wnpa-sec-2014-19]
Complete Vigil@nce bulletin.... (free trial)

computer vulnerability bulletin CVE-2014-3635 CVE-2014-3636 CVE-2014-3637

D-Bus: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of D-Bus.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, MBS, openSUSE, SUSE Linux Enterprise Desktop, SLES, Ubuntu, Unix (platform) ~ not comprehensive.
Severity: 2/4.
Creation date: 16/09/2014.
Identifiers: CVE-2014-3635, CVE-2014-3636, CVE-2014-3637, CVE-2014-3638, CVE-2014-3639, DSA-3026-1, FEDORA-2014-16147, FEDORA-2014-16227, FEDORA-2014-16243, FEDORA-2014-17570, FEDORA-2014-17595, MDVSA-2014:214, MDVSA-2015:176, openSUSE-SU-2014:1228-1, openSUSE-SU-2014:1239-1, SOL17256, SUSE-SU-2014:1146-1, USN-2352-1, VIGILANCE-VUL-15358.

Description of the vulnerability

Several vulnerabilities were announced in D-Bus.

An attacker can generate a buffer overflow via a cmsg message, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2014-3635]

An attacker can use all file descriptors, in order to trigger a denial of service. [severity:1/4; CVE-2014-3636]

An attacker can create permanent connections, in order to trigger a denial of service. [severity:1/4; CVE-2014-3637]

An attacker can use complex operations, in order to trigger a denial of service. [severity:2/4; CVE-2014-3638]

An attacker can use incomplete connections, in order to trigger a denial of service. [severity:1/4; CVE-2014-3639]
Complete Vigil@nce bulletin.... (free trial)

vulnerability bulletin CVE-2014-6410

Linux kernel: infinite loop of __udf_read_inode

Synthesis of the vulnerability

An attacker can mount an UDF file system, to generate a large recursion in __udf_read_inode(), in order to trigger a denial of service of the Linux kernel.
Impacted products: Fedora, HP BSM, HP Operations, Performance Center, Linux, MBS, openSUSE, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Creation date: 15/09/2014.
Identifiers: c04594684, CERTFR-2014-AVI-413, CERTFR-2014-AVI-532, CVE-2014-6410, FEDORA-2014-11008, HPSBGN03282, KM01411792, MDVSA-2014:201, openSUSE-SU-2014:1669-1, openSUSE-SU-2014:1677-1, RHSA-2014:1318-01, RHSA-2014:1971-01, RHSA-2014:1997-01, RHSA-2014:2009-01, RHSA-2014:2028-01, RHSA-2014:2030-01, SUSE-SU-2014:1316-1, SUSE-SU-2014:1319-1, USN-2374-1, USN-2375-1, USN-2376-1, USN-2377-1, USN-2378-1, USN-2379-1, VIGILANCE-VUL-15353.

Description of the vulnerability

The Linux kernel supports UDF file systems.

However, the __udf_read_inode() function of the fs/udf/inode.c file does not limit the number of ICB, which triggers an unlimited recursive call.

An attacker can therefore mount an UDF file system, to generate a large recursion in __udf_read_inode(), in order to trigger a denial of service of the Linux kernel.
Complete Vigil@nce bulletin.... (free trial)

vulnerability announce CVE-2012-6657

Linux kernel: unreachable memory reading via SO_KEEPALIVE

Synthesis of the vulnerability

An attacker can force a read at an invalid address via SO_KEEPALIVE on the Linux kernel, in order to trigger a denial of service.
Impacted products: BIG-IP Hardware, TMOS, HP BSM, HP Operations, Performance Center, Linux, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 1/4.
Creation date: 15/09/2014.
Identifiers: c04594684, CERTFR-2014-AVI-532, CERTFR-2015-AVI-165, CVE-2012-6657, HPSBGN03282, KM01411792, RHSA-2014:1997-01, RHSA-2014:2009-01, RHSA-2014:2028-01, RHSA-2014:2030-01, SOL16011, SUSE-SU-2015:0652-1, SUSE-SU-2015:0812-1, VIGILANCE-VUL-15352.

Description of the vulnerability

The setsockopt() function defines options of a socket.

The SO_KEEPALIVE option is use to keep a session active. However, the net/core/sock.c file does not check if the socket if of type SOCK_STREAM, so the kernel tries to read a memory area which is not reachable, which triggers a fatal error.

An attacker can therefore force a read at an invalid address via SO_KEEPALIVE on the Linux kernel, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (free trial)

vulnerability bulletin CVE-2014-3181 CVE-2014-3182 CVE-2014-3183

Linux kernel: multiple vulnerabilities of USB Driver

Synthesis of the vulnerability

An attacker can use several vulnerabilities of USB Driver of the Linux kernel.
Impacted products: BIG-IP Hardware, TMOS, Fedora, Linux, MBS, openSUSE, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Creation date: 12/09/2014.
Identifiers: CERTFR-2014-AVI-413, CERTFR-2014-AVI-482, CERTFR-2015-AVI-085, CERTFR-2015-AVI-165, CVE-2014-3181, CVE-2014-3182, CVE-2014-3183, CVE-2014-3184, CVE-2014-3185, CVE-2014-3186, FEDORA-2014-11008, FEDORA-2014-11031, MDVSA-2014:201, openSUSE-SU-2014:1669-1, openSUSE-SU-2014:1677-1, openSUSE-SU-2015:0566-1, RHSA-2014:1318-01, RHSA-2014:1843-01, RHSA-2014:1971-01, RHSA-2015:0284-03, RHSA-2015:1272-01, SOL15912, SUSE-SU-2014:1693-1, SUSE-SU-2014:1693-2, SUSE-SU-2014:1695-1, SUSE-SU-2014:1695-2, SUSE-SU-2014:1698-1, SUSE-SU-2015:0068-1, SUSE-SU-2015:0481-1, SUSE-SU-2015:0652-1, SUSE-SU-2015:0812-1, USN-2374-1, USN-2375-1, USN-2376-1, USN-2377-1, USN-2378-1, USN-2379-1, VIGILANCE-VUL-15343.

Description of the vulnerability

Several vulnerabilities were announced in USB drivers of the Linux kernel.

An attacker can force the usage of a freed memory area in hid-logitech-dj.c, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2014-3182]

An attacker can generate a buffer overflow in hid-logitech-dj.c, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2014-3183]

An attacker can generate a buffer overflow in x_report_fixup() functions of hid-x.c, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2014-3184]

An attacker can generate a buffer overflow in drivers/usb/serial/whiteheat.c, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2014-3185]

An attacker can generate a buffer overflow in hid-magicmouse.c, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2014-3181]

An attacker can generate a buffer overflow in hid-picolcd_core.c, in order to trigger a denial of service, and possibly to execute code. [severity:2/4; CVE-2014-3186]
Complete Vigil@nce bulletin.... (free trial)

computer vulnerability bulletin CVE-2014-4274

MySQL: file corruption via MyISAM

Synthesis of the vulnerability

A local attacker can create a symbolic link, in order for example to alter the /var/lib/mysql/my.cnf file, with privileges of MySQL.
Impacted products: Debian, Fedora, MBS, MySQL Community, MySQL Enterprise, Solaris, Percona Server, XtraDB Cluster, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Creation date: 10/09/2014.
Identifiers: 18045646, bulletinoct2015, CVE-2014-4274, DSA-3054-1, FEDORA-2014-14791, FEDORA-2014-9942, FEDORA-2014-9956, MDVSA-2015:091, RHSA-2014:1859-01, RHSA-2014:1860-01, RHSA-2014:1861-01, RHSA-2014:1862-01, RHSA-2014:1937-01, RHSA-2014:1940-01, SUSE-SU-2015:0620-1, SUSE-SU-2015:0743-1, USN-2384-1, VIGILANCE-VUL-15328.

Description of the vulnerability

The myisam/ha_myisam.cc file of MySQL uses a ".TMD" temporary file.

However, when the file is opened, the program does not check if it is an existing symbolic link. The file pointed by the link is thus opened with privileges of the program. Moreover, the file name is predictable, and is located in a publicly writable directory, so the attacker can create the symbolic link before its usage.

A local attacker can therefore create a symbolic link, in order for example to alter the /var/lib/mysql/my.cnf file, with privileges of MySQL.
Complete Vigil@nce bulletin.... (free trial)

vulnerability CVE-2014-0547 CVE-2014-0548 CVE-2014-0549

Adobe Flash Player: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Impacted products: Flash Player, IE, openSUSE, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 3/4.
Creation date: 09/09/2014.
Identifiers: 2755801, APSB14-21, CERTFR-2014-AVI-379, CVE-2014-0547, CVE-2014-0548, CVE-2014-0549, CVE-2014-0550, CVE-2014-0551, CVE-2014-0552, CVE-2014-0553, CVE-2014-0554, CVE-2014-0555, CVE-2014-0556, CVE-2014-0557, CVE-2014-0559, openSUSE-SU-2014:1110-1, openSUSE-SU-2014:1130-1, RHSA-2014:1173-01, SUSE-SU-2014:1124-1, VIGILANCE-VUL-15310.

Description of the vulnerability

Several vulnerabilities were announced in Adobe Flash Player.

An attacker can read a memory fragment, in order to obtain sensitive information. [severity:1/4; CVE-2014-0557]

An attacker can bypass a security feature, in order to escalate his privileges. [severity:2/4; CVE-2014-0554]

An attacker can use a freed memory area, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; CVE-2014-0553]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; CVE-2014-0547]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; CVE-2014-0549]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; CVE-2014-0550]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; CVE-2014-0551]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; CVE-2014-0552]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; CVE-2014-0555]

An attacker can bypass the same origin policy, in order to obtain sensitive information. [severity:2/4; CVE-2014-0548]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; CVE-2014-0556]

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; CVE-2014-0559]
Complete Vigil@nce bulletin.... (free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about SLES: