The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:

computer vulnerability CVE-2016-5138

Google Chrome: integer overflow via kbasep_vinstr_attach_client

Synthesis of the vulnerability

An attacker can generate an integer overflow via kbasep_vinstr_attach_client() of Google Chrome, in order to trigger a denial of service, and possibly to run code.
Impacted products: Chrome, openSUSE Leap, Opera.
Severity: 3/4.
Consequences: user access/rights, denial of service on client.
Provenance: document.
Creation date: 28/07/2016.
Identifiers: CERTFR-2016-AVI-253, CERTFR-2016-AVI-261, CVE-2016-5138, openSUSE-SU-2016:2320-1, VIGILANCE-VUL-20245.

Description of the vulnerability

The Google Chrome product uses a Mali Midgard driver.

However, if an integer is too large, a multiplication overflows in kbasep_vinstr_attach_client(), and an allocated memory area is too short.

An attacker can therefore generate an integer overflow via kbasep_vinstr_attach_client() of Google Chrome, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2016-7406 CVE-2016-7407 CVE-2016-7408

Dropbear: four vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Dropbear.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, Unix (platform) ~ not comprehensive.
Severity: 2/4.
Consequences: user access/rights, data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 4.
Creation date: 28/07/2016.
Revision date: 26/09/2016.
Identifiers: CVE-2016-7406, CVE-2016-7407, CVE-2016-7408, CVE-2016-7409, DLA-634-1, FEDORA-2016-6de0b19b3b, openSUSE-SU-2016:1891-1, openSUSE-SU-2016:1917-1, VIGILANCE-VUL-20244.

Description of the vulnerability

Several vulnerabilities were announced in Dropbear.

An attacker can generate a format string attack via Message Printout, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-7406]

An attacker can use a vulnerability via dropbearconvert, in order to run code. [severity:2/4; CVE-2016-7407]

An attacker can use a vulnerability via dbclient, in order to run code. [severity:2/4; CVE-2016-7408]

An attacker can bypass security features via DEBUG_TRACE, in order to obtain sensitive information. [severity:1/4; CVE-2016-7409]
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2016-0263 CVE-2016-0361 CVE-2016-0392

IBM DB2: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of IBM DB2.
Impacted products: DB2 UDB.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights, denial of service on service.
Provenance: user account.
Number of vulnerabilities in this bulletin: 3.
Creation date: 28/07/2016.
Identifiers: 1986595, CVE-2016-0263, CVE-2016-0361, CVE-2016-0392, VIGILANCE-VUL-20243.

Description of the vulnerability

Several vulnerabilities were announced in IBM DB2.

An attacker can bypass security features via IBM General Parallel File System, in order to escalate his privileges or cause a denial of service. [severity:2/4; CVE-2016-0263]

An attacker can use a vulnerability via Setuid File Parameters, in order to run code. [severity:2/4; CVE-2016-0392]

An attacker can bypass security features via Spectrum Scale GUI, in order to escalate his privileges. [severity:2/4; CVE-2016-0361]
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2016-6503 CVE-2016-6504 CVE-2016-6505

Wireshark: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Wireshark.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, Solaris, Wireshark.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 11.
Creation date: 28/07/2016.
Identifiers: bulletinjul2016, CERTFR-2016-AVI-254, CVE-2016-6503, CVE-2016-6504, CVE-2016-6505, CVE-2016-6506, CVE-2016-6507, CVE-2016-6508, CVE-2016-6509, CVE-2016-6510, CVE-2016-6511, CVE-2016-6512, CVE-2016-6513, DLA-595-1, DSA-3648-1, FEDORA-2016-a15d2be020, openSUSE-SU-2016:1974-1, VIGILANCE-VUL-20242, wnpa-sec-2016-39, wnpa-sec-2016-40, wnpa-sec-2016-41, wnpa-sec-2016-42, wnpa-sec-2016-43, wnpa-sec-2016-44, wnpa-sec-2016-45, wnpa-sec-2016-46, wnpa-sec-2016-47, wnpa-sec-2016-48, wnpa-sec-2016-49.

Description of the vulnerability

Several vulnerabilities were announced in Wireshark.

An attacker can send a malicious CORBA IDL packet, in order to trigger a denial of service. [severity:2/4; CVE-2016-6503, wnpa-sec-2016-39]

An attacker can send a malicious NDS packet, in order to trigger a denial of service. [severity:2/4; CVE-2016-6504, wnpa-sec-2016-40]

An attacker can send a malicious PacketBB packet, in order to trigger a denial of service. [severity:2/4; CVE-2016-6505, wnpa-sec-2016-41]

An attacker can generate an infinite loop via WSP, in order to trigger a denial of service. [severity:2/4; CVE-2016-6506, wnpa-sec-2016-42]

An attacker can generate an infinite loop via MMSE, in order to trigger a denial of service. [severity:2/4; CVE-2016-6507, wnpa-sec-2016-43]

An attacker can generate an infinite loop via RLC, in order to trigger a denial of service. [severity:2/4; CVE-2016-6508, wnpa-sec-2016-44]

An attacker can send a malicious LDSS packet, in order to trigger a denial of service. [severity:2/4; CVE-2016-6509, wnpa-sec-2016-45]

An attacker can send a malicious RLC packet, in order to trigger a denial of service. [severity:2/4; CVE-2016-6510, wnpa-sec-2016-46]

An attacker can generate an infinite loop via OpenFlow, in order to trigger a denial of service. [severity:2/4; CVE-2016-6511, wnpa-sec-2016-47]

An attacker can generate an infinite loop via MMSE, WAP, WBXML, and WSP, in order to trigger a denial of service. [severity:2/4; CVE-2016-6512, wnpa-sec-2016-48]

An attacker can send a malicious WBXML packet, in order to trigger a denial of service. [severity:2/4; CVE-2016-6513, wnpa-sec-2016-49]
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2016-6250

libarchive: integer overflow via Filename Size

Synthesis of the vulnerability

An attacker can generate an integer overflow via Filename Size of libarchive, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Fedora, openSUSE Leap, RHEL, Slackware, Splunk Enterprise, Ubuntu, Unix (platform) ~ not comprehensive.
Severity: 2/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 28/07/2016.
Identifiers: CVE-2016-6250, DSA-3677-1, FEDORA-2016-472cdecb18, FEDORA-2016-c580100c89, openSUSE-SU-2016:3002-1, openSUSE-SU-2016:3005-1, RHSA-2016:1844-01, SPL-119440, SPL-121159, SPL-123095, SSA:2016-172-01, USN-3225-1, VIGILANCE-VUL-20241.

Description of the vulnerability

An attacker can generate an integer overflow via Filename Size of libarchive, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2016-1461

Cisco Email Security Appliance: some type of file are unfiltered

Synthesis of the vulnerability

An attacker can craft malicious files, in order to bypass the content filter of Cisco Email Security Appliance.
Impacted products: AsyncOS, Cisco ESA.
Severity: 2/4.
Consequences: data flow.
Provenance: document.
Creation date: 28/07/2016.
Identifiers: CERTFR-2016-AVI-255, cisco-sa-20160727-esa, CSCuz14932, CSCvo34734, CVE-2016-1461, VIGILANCE-VUL-20240.

Description of the vulnerability

The Cisco Email Security Appliance product offers an anti-spam filter.

The filter must inspect attached files. However, a specific type of file can bypass the content filter.

An attacker can therefore craft malicious files, in order to bypass the content filter of Cisco Email Security Appliance.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2015-5220 CVE-2016-3737

Red Hat JBoss Operations Network: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Red Hat JBoss Operations Network.
Impacted products: Junos Space.
Severity: 3/4.
Consequences: user access/rights, denial of service on service.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 28/07/2016.
Identifiers: CVE-2015-5220, CVE-2016-3737, JSA10838, RHSA-2016:1519-01, VIGILANCE-VUL-20239.

Description of the vulnerability

Several vulnerabilities were announced in Red Hat JBoss Operations Network.

An attacker can trigger a fatal error in Web Console, in order to trigger a denial of service. [severity:2/4; CVE-2015-5220]

An attacker can send serialized data via JON, in order to run code. [severity:3/4; CVE-2016-3737]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2016-1460

Cisco Wireless LAN Controller: denial of service via wireless frame management

Synthesis of the vulnerability

An unauthenticated attacker can send a malicious wireless frame management packet to Cisco Wireless LAN Controller, in order to trigger a denial of service.
Impacted products: Cisco Wireless Controller.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: radio connection.
Creation date: 28/07/2016.
Identifiers: CERTFR-2016-AVI-255, cisco-sa-20160727-wlc, CSCun92979, CVE-2016-1460, VIGILANCE-VUL-20238.

Description of the vulnerability

The Cisco Wireless LAN Controller product has a service to manage received wireless frame management packets.

However, when a malicious packet is received, a fatal error occurs.

An unauthenticated attacker can therefore send a malicious wireless frame management packet to Cisco Wireless LAN Controller, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2016-5400

Linux kernel: memory leak via AirSpy

Synthesis of the vulnerability

An attacker can create a memory leak via AirSpy on the Linux kernel, in order to trigger a denial of service.
Impacted products: Fedora, Linux, Ubuntu.
Severity: 1/4.
Consequences: denial of service on server.
Provenance: user shell.
Creation date: 28/07/2016.
Identifiers: CERTFR-2016-AVI-289, CVE-2016-5400, FEDORA-2016-30e3636e79, FEDORA-2016-754e4768d8, USN-3070-1, USN-3070-2, USN-3070-3, USN-3070-4, VIGILANCE-VUL-20237.

Description of the vulnerability

The Linux kernel supports the AirSpy USB driver.

However, a device containing 64 entries forces an error in the airspy_probe(), and the memory allocated to process it is never freed.

An attacker can therefore create a memory leak via AirSpy on the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2014-9906

Perl DBD-mysql: use after free via mysql_dr_error

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via mysql_dr_error() of Perl DBD::mysql, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Perl Module ~ not comprehensive, Ubuntu.
Severity: 2/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 28/07/2016.
Identifiers: CVE-2014-9906, DLA-576-1, DSA-3635-1, USN-3103-1, VIGILANCE-VUL-20236.

Description of the vulnerability

The DBD::mysql module can be installed on Perl, to access to a MySQL database.

However, when an error occurs, the mysql_dr_error() function frees a memory area before reusing it.

An attacker can therefore force the usage of a freed memory area via mysql_dr_error() of Perl DBD::mysql, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

Previous page   Next page

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1161 1181 1201 1221 1241 1261 1281 1301 1321 1341 1361 1381 1401 1421 1441 1461 1481 1501 1521 1541 1561 1581 1601 1621 1641 1661 1681 1701 1721 1741 1761 1781 1801 1821 1841 1861 1881 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1941 1961 1981 2001 2021 2041 2061 2081 2101 2121 2141 2161 2181 2201 2221 2241 2261 2281 2301 2321 2341 2361 2381 2401 2421 2441 2461 2481 2501 2521 2541 2561 2581 2601 2621 2641 2661 2681 2701 2721 2741 2761 2781 2801 2821 2841 2846