The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

vulnerability alert CVE-2015-6327

Cisco ASA: denial of service via ISAKMP

Synthesis of the vulnerability

An attacker can send a malicious ISAKMP packet to Cisco ASA, in order to trigger a denial of service.
Impacted products: ASA.
Severity: 3/4.
Consequences: denial of service on server, denial of service on service.
Provenance: internet client.
Creation date: 22/10/2015.
Identifiers: CERTFR-2015-AVI-445, cisco-sa-20151021-asa-ike, CSCus94026, CVE-2015-6327, VIGILANCE-VUL-18161.

Description of the vulnerability

The Cisco ASA product has a service to manage received ISAKMP packets.

However, when a malicious packet is received, a fatal error occurs.

An attacker can therefore send a malicious ISAKMP packet to Cisco ASA, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2015-6326

Cisco ASA: denial of service via DNS

Synthesis of the vulnerability

An attacker can send a malicious DNS packet to Cisco ASA, in order to trigger a denial of service.
Impacted products: ASA.
Severity: 3/4.
Consequences: denial of service on server, denial of service on service.
Provenance: internet server.
Creation date: 22/10/2015.
Identifiers: CERTFR-2015-AVI-445, cisco-sa-20151021-asa-dns2, CSCuu07799, CVE-2015-6326, VIGILANCE-VUL-18160.

Description of the vulnerability

The Cisco ASA product can send DNS packets to perform a name resolution.

However, when a special packet is received, ASA sends a DNS query, to which an attacker can reply with a malicious DNS packet, then a fatal error occurs.

An attacker can therefore send a malicious DNS packet to Cisco ASA, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2015-6325

Cisco ASA: denial of service via DNS

Synthesis of the vulnerability

An attacker can send a malicious DNS packet to Cisco ASA, in order to trigger a denial of service.
Impacted products: ASA.
Severity: 3/4.
Consequences: denial of service on server, denial of service on service.
Provenance: internet server.
Creation date: 22/10/2015.
Identifiers: CERTFR-2015-AVI-445, cisco-sa-20151021-asa-dns1, CSCut03495, CVE-2015-6325, VIGILANCE-VUL-18159.

Description of the vulnerability

The Cisco ASA product can send DNS packets to perform a name resolution.

However, when a special packet is received, ASA sends a DNS query, to which an attacker can reply with a malicious DNS packet, then a fatal error occurs.

An attacker can therefore send a malicious DNS packet to Cisco ASA, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2015-6324

Cisco ASA: denial of service via DHCPv6

Synthesis of the vulnerability

An attacker can send a malicious DHCPv6 packet to Cisco ASA, in order to trigger a denial of service.
Impacted products: ASA.
Severity: 1/4.
Consequences: denial of service on server, denial of service on service.
Provenance: LAN.
Creation date: 22/10/2015.
Identifiers: CERTFR-2015-AVI-445, cisco-sa-20151021-asa-dhcp1, CSCus56252, CSCus57142, CVE-2015-6324, VIGILANCE-VUL-18158.

Description of the vulnerability

The Cisco ASA product has a DHCP relay.

However, when a malicious DHCPv6 packet is received, a fatal error occurs.

An attacker can therefore send a malicious DHCPv6 packet to Cisco ASA, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2015-7885

Linux kernel: information disclosure via dgnc_mgmt_ioctl

Synthesis of the vulnerability

A local attacker can read a memory fragment via dgnc_mgmt_ioctl() of the Linux kernel, in order to obtain sensitive information.
Impacted products: Linux, openSUSE, Ubuntu.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 22/10/2015.
Identifiers: CERTFR-2015-AVI-549, CVE-2015-7885, openSUSE-SU-2016:0301-1, openSUSE-SU-2016:0318-1, USN-2841-1, USN-2841-2, USN-2842-1, USN-2842-2, USN-2843-1, USN-2843-2, USN-2843-3, USN-2844-1, VIGILANCE-VUL-18157.

Description of the vulnerability

The Linux kernel implements a dgnc (Digi Neo and Digi ClassicBoard) driver.

However, the dgnc_mgmt_ioctl() function of the drivers/staging/dgnc/dgnc_mgmt.c file does not initialize a memory area before returning it to the user.

A local attacker can therefore read a memory fragment via dgnc_mgmt_ioctl() of the Linux kernel, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2015-7884

Linux kernel: information disclosure via vivid_fb_ioctl

Synthesis of the vulnerability

A local attacker can read a memory fragment via vivid_fb_ioctl() of the Linux kernel, in order to obtain sensitive information.
Impacted products: Linux, openSUSE Leap, Ubuntu.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 22/10/2015.
Identifiers: CERTFR-2015-AVI-549, CVE-2015-7884, openSUSE-SU-2016:1008-1, USN-2842-1, USN-2842-2, USN-2843-1, USN-2843-2, USN-2843-3, VIGILANCE-VUL-18156.

Description of the vulnerability

The Linux kernel implements a vivid (Virtual Video) driver.

However, the vivid_fb_ioctl() function of the drivers/media/platform/vivid/vivid-osd.c file does not initialize a memory area before returning it to the user.

A local attacker can therefore read a memory fragment via vivid_fb_ioctl() of the Linux kernel, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2011-5325

BusyBox: directory traversal of tar

Synthesis of the vulnerability

An attacker can create a malicious tar archive, to traverse directories in BusyBox, in order to create a file outside the service root path.
Impacted products: BusyBox, Debian, Ubuntu.
Severity: 2/4.
Consequences: data creation/edition.
Provenance: internet client.
Creation date: 22/10/2015.
Identifiers: 8411, CVE-2011-5325, DLA-1445-1, DLA-1445-2, DLA-1445-3, USN-3935-1, VIGILANCE-VUL-18155.

Description of the vulnerability

The BusyBox product can extract archives in tar format.

However, if the archive contains a symbolic link to a directory, the archival/tar.c file of BusyBox accepts to follow this link, and to create files outside the working directory.

An attacker can therefore create a malicious tar archive, to traverse directories in BusyBox, in order to create a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2015-6031

MiniUPnP: buffer overflow

Synthesis of the vulnerability

An attacker can generate a buffer overflow of MiniUPnP, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, openSUSE, openSUSE Leap, Ubuntu.
Severity: 2/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 21/10/2015.
Identifiers: CVE-2015-6031, DSA-3379-1, openSUSE-SU-2015:2070-1, USN-2780-1, USN-2780-2, VIGILANCE-VUL-18154.

Description of the vulnerability

An attacker can generate a buffer overflow of MiniUPnP, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2015-7834

V8: vulnerability

Synthesis of the vulnerability

A vulnerability of V8 was announced.
Impacted products: openSUSE, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights, data reading, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 21/10/2015.
Identifiers: CVE-2015-7834, openSUSE-SU-2015:1816-1, openSUSE-SU-2015:1867-1, openSUSE-SU-2015:1872-1, openSUSE-SU-2015:1873-1, openSUSE-SU-2015:1876-1, openSUSE-SU-2015:1877-1, openSUSE-SU-2015:1887-1, USN-2770-1, USN-2770-2, VIGILANCE-VUL-18153.

Description of the vulnerability

A vulnerability of V8 was announced.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2015-1793 CVE-2015-4730 CVE-2015-4766

MySQL: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of MySQL.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, MariaDB ~ precise, MySQL Community, MySQL Enterprise, openSUSE, openSUSE Leap, Solaris, Percona Server, RHEL, Ubuntu.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights, data reading, data creation/edition, data deletion, denial of service on service.
Provenance: user account.
Number of vulnerabilities in this bulletin: 28.
Creation date: 21/10/2015.
Identifiers: bulletinapr2016, CERTFR-2015-AVI-438, CERTFR-2015-AVI-456, cpuoct2015, CVE-2015-1793, CVE-2015-4730, CVE-2015-4766, CVE-2015-4791, CVE-2015-4792, CVE-2015-4800, CVE-2015-4802, CVE-2015-4807, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819, CVE-2015-4826, CVE-2015-4830, CVE-2015-4833, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4864, CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4890, CVE-2015-4895, CVE-2015-4904, CVE-2015-4905, CVE-2015-4910, CVE-2015-4913, DSA-3377-1, DSA-3385-1, FEDORA-2015-111f449417, FEDORA-2015-b689ef0dbf, FEDORA-2016-868c170507, FEDORA-2016-e30164d0a2, openSUSE-SU-2015:2243-1, openSUSE-SU-2015:2244-1, openSUSE-SU-2015:2246-1, openSUSE-SU-2016:0368-1, RHSA-2016:0534-01, RHSA-2016:0705-01, RHSA-2016:1132-01, RHSA-2016:1480-01, RHSA-2016:1481-01, SOL59010802, USN-2781-1, VIGILANCE-VUL-18152.

Description of the vulnerability

Several vulnerabilities were announced in MySQL.

An attacker can use a vulnerability of Client programs, in order to obtain information, to alter information, or to trigger a denial of service. [severity:2/4; CVE-2015-4819]

An attacker can use a vulnerability of Server : Security : Encryption, in order to obtain or alter information. [severity:2/4; CVE-2015-1793]

An attacker can use a vulnerability of Server : DML, in order to obtain information, to alter information, or to trigger a denial of service. [severity:2/4; CVE-2015-4879]

An attacker can use a vulnerability of Server : DDL, in order to trigger a denial of service. [severity:2/4; CVE-2015-4815]

An attacker can use a vulnerability of Server : DML, in order to trigger a denial of service. [severity:2/4; CVE-2015-4905]

An attacker can use a vulnerability of Server : DML, in order to trigger a denial of service. [severity:2/4; CVE-2015-4858]

An attacker can use a vulnerability of Server : DML, in order to trigger a denial of service. [severity:2/4; CVE-2015-4862]

An attacker can use a vulnerability of Server : InnoDB, in order to trigger a denial of service. [severity:2/4; CVE-2015-4866]

An attacker can use a vulnerability of Server : InnoDB, in order to trigger a denial of service. [severity:2/4; CVE-2015-4816]

An attacker can use a vulnerability of Server : Optimizer, in order to trigger a denial of service. [severity:2/4; CVE-2015-4800]

An attacker can use a vulnerability of Server : Parser, in order to trigger a denial of service. [severity:2/4; CVE-2015-4870]

An attacker can use a vulnerability of Server : Partition, in order to trigger a denial of service. [severity:2/4; CVE-2015-4802]

An attacker can use a vulnerability of Server : Partition, in order to trigger a denial of service. [severity:2/4; CVE-2015-4833]

An attacker can use a vulnerability of Server : Security : Privileges, in order to alter information. [severity:2/4; CVE-2015-4830]

An attacker can use a vulnerability of Server : Types, in order to trigger a denial of service. [severity:2/4; CVE-2015-4730]

An attacker can use a vulnerability of Server : Types, in order to obtain information. [severity:2/4; CVE-2015-4826]

An attacker can use a vulnerability of libmysqld, in order to trigger a denial of service. [severity:2/4; CVE-2015-4904]

An attacker can use a vulnerability of Server : DML, in order to trigger a denial of service. [severity:2/4; CVE-2015-4913]

An attacker can use a vulnerability of Server : InnoDB, in order to trigger a denial of service. [severity:2/4; CVE-2015-4895]

An attacker can use a vulnerability of Server : InnoDB, in order to trigger a denial of service. [severity:2/4; CVE-2015-4861]

An attacker can use a vulnerability of Server : Query Cache, in order to trigger a denial of service. [severity:2/4; CVE-2015-4807]

An attacker can use a vulnerability of Server : Replication, in order to trigger a denial of service. [severity:2/4; CVE-2015-4890]

An attacker can use a vulnerability of Server : Security : Privileges, in order to trigger a denial of service. [severity:2/4; CVE-2015-4791]

An attacker can use a vulnerability of Server : Security : Privileges, in order to alter information. [severity:2/4; CVE-2015-4864]

An attacker can use a vulnerability of Server : SP, in order to trigger a denial of service. [severity:1/4; CVE-2015-4836]

An attacker can use a vulnerability of Server : Memcached, in order to trigger a denial of service. [severity:1/4; CVE-2015-4910]

An attacker can use a vulnerability of Server : Security : Firewall, in order to trigger a denial of service. [severity:1/4; CVE-2015-4766]

An attacker can use a vulnerability of Server : Partition, in order to trigger a denial of service. [severity:1/4; CVE-2015-4792]
Full Vigil@nce bulletin... (Free trial)

Previous page   Next page

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1501 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1921 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2847