The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Debian Jessie

computer vulnerability bulletin CVE-2016-5108

VLC: buffer overflow via DecodeAdpcmImaQT

Synthesis of the vulnerability

An attacker can trigger a buffer overflow via QuickTime of VLC, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, openSUSE, openSUSE Leap, VLC.
Severity: 1/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 27/05/2016.
Identifiers: CERTFR-2016-AVI-190, CVE-2016-5108, DSA-3598-1, openSUSE-SU-2016:1651-1, openSUSE-SU-2016:1652-1, VIGILANCE-VUL-19718.

Description of the vulnerability

The VLC product can play QuickTime files.

The routine DecodeAdpcmImaQT fills the buffer p_buffer with data from the user provided file. However, the index into the buffer is computed from file data, without bound check.

An attacker can therefore trigger a buffer overflow via QuickTime of VLC, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2013-7456 CVE-2016-4343 CVE-2016-5093

PHP 5: five vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of PHP 5.
Impacted products: Mac OS X, Debian, BIG-IP Hardware, TMOS, Fedora, openSUSE, openSUSE Leap, PHP, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: privileged access/rights, denial of service on server, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 5.
Creation date: 26/05/2016.
Identifiers: 71331, 72114, 72135, 72227, 72241, CERTFR-2016-AVI-195, CVE-2013-7456, CVE-2016-4343, CVE-2016-5093, CVE-2016-5094, CVE-2016-5095, CVE-2016-5096, DLA-499-1, DLA-533-1, DSA-3602-1, FEDORA-2016-65f1ffdc0c, FEDORA-2016-6b1938566f, HT206903, K43449212, K51390683, openSUSE-SU-2016:1553-1, openSUSE-SU-2016:1688-1, RHSA-2016:2750-01, SOL43449212, SOL51390683, SSA:2016-148-03, SUSE-SU-2016:1581-1, SUSE-SU-2016:1638-1, USN-3030-1, USN-3045-1, VIGILANCE-VUL-19712.

Description of the vulnerability

Several vulnerabilities were announced in PHP 5.

An attacker can generate an integer overflow via fread, in order to trigger a denial of service, and possibly to run code. [severity:2/4; 72114, CVE-2016-5096]

An attacker can generate an integer overflow via php_html_entities, in order to trigger a denial of service, and possibly to run code. [severity:2/4; 72135, CVE-2016-5094, CVE-2016-5095]

An attacker can force a read at an invalid address via imagescale, in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; 72227, CVE-2013-7456]

An attacker can force a read at an invalid address via get_icu_value_internal, in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; 72241, CVE-2016-5093]

An attacker can force a read at an invalid address via phar_make_dirstream(), in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; 71331, CVE-2016-4343]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2016-5097 CVE-2016-5098 CVE-2016-5099

phpMyAdmin: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of phpMyAdmin.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, phpMyAdmin.
Severity: 1/4.
Consequences: data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 26/05/2016.
Identifiers: CERTFR-2016-AVI-181, CVE-2016-5097, CVE-2016-5098, CVE-2016-5099, DSA-3627-1, FEDORA-2016-55261b6815, FEDORA-2016-cd05bd994a, openSUSE-SU-2016:1434-1, openSUSE-SU-2016:1556-1, PMASA-2016-14, PMASA-2016-15, PMASA-2016-16, VIGILANCE-VUL-19707.

Description of the vulnerability

Several vulnerabilities were announced in phpMyAdmin.

An attacker can obtain sensitive information exposed in URL request parameters. [severity:1/4; CVE-2016-5097, PMASA-2016-14]

An attacker can trigger an error in order get information about the filesystem outside the Web server tree. [severity:1/4; CVE-2016-5098, PMASA-2016-15]

An attacker can trigger the insertion of special HTML characters into a page via a specially crafted URL. [severity:1/4; CVE-2016-5099, PMASA-2016-16]
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin 19703

ruby-mail: vulnerability via SMTP Injection

Synthesis of the vulnerability

A vulnerability via SMTP Injection of ruby-mail was announced.
Impacted products: Debian.
Severity: 1/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: internet client.
Creation date: 26/05/2016.
Identifiers: DLA-489-1, VIGILANCE-VUL-19703.

Description of the vulnerability

A vulnerability via SMTP Injection of ruby-mail was announced.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2016-5107

QEMU: out-of-bounds memory reading via megasas_init_firmware

Synthesis of the vulnerability

An attacker can force a read at an invalid address via megasas_init_firmware of QEMU, in order to trigger a denial of service, or to obtain sensitive information.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, QEMU, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: data reading, denial of service on service.
Provenance: user shell.
Creation date: 25/05/2016.
Identifiers: CVE-2016-5107, DLA-1599-1, FEDORA-2016-73853a7a16, FEDORA-2016-a80eab65ba, FEDORA-2016-ea3002b577, openSUSE-SU-2016:2494-1, openSUSE-SU-2016:2497-1, openSUSE-SU-2016:2642-1, SUSE-SU-2016:2093-1, SUSE-SU-2016:2100-1, SUSE-SU-2016:2533-1, SUSE-SU-2016:2589-1, USN-3047-1, USN-3047-2, VIGILANCE-VUL-19701.

Description of the vulnerability

An attacker can force a read at an invalid address via megasas_init_firmware of QEMU, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2016-5106

QEMU: buffer overflow via megasas_dcmd_set_properties

Synthesis of the vulnerability

An attacker can generate a buffer overflow via megasas_dcmd_set_properties of QEMU, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, QEMU, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, denial of service on server.
Provenance: user shell.
Creation date: 25/05/2016.
Identifiers: CVE-2016-5106, DLA-1599-1, FEDORA-2016-4edd58a3b5, FEDORA-2016-73853a7a16, FEDORA-2016-8d3fe9914b, FEDORA-2016-a80eab65ba, FEDORA-2016-ea3002b577, openSUSE-SU-2016:2494-1, openSUSE-SU-2016:2497-1, openSUSE-SU-2016:2642-1, SUSE-SU-2016:2093-1, SUSE-SU-2016:2100-1, SUSE-SU-2016:2533-1, SUSE-SU-2016:2589-1, USN-3047-1, USN-3047-2, VIGILANCE-VUL-19700.

Description of the vulnerability

An attacker can generate a buffer overflow via megasas_dcmd_set_properties of QEMU, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2016-5105

QEMU: information disclosure via megasas_dcmd_cfg_read

Synthesis of the vulnerability

A local attacker can read a memory fragment via MegaRAID SAS 8708EM2 of QEMU, in order to obtain sensitive information.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, QEMU, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 25/05/2016.
Identifiers: CVE-2016-5105, DLA-1599-1, FEDORA-2016-4edd58a3b5, FEDORA-2016-73853a7a16, FEDORA-2016-8d3fe9914b, FEDORA-2016-a80eab65ba, FEDORA-2016-ea3002b577, openSUSE-SU-2016:2494-1, openSUSE-SU-2016:2497-1, openSUSE-SU-2016:2642-1, SUSE-SU-2016:2093-1, SUSE-SU-2016:2100-1, SUSE-SU-2016:2533-1, SUSE-SU-2016:2589-1, USN-3047-1, USN-3047-2, VIGILANCE-VUL-19699.

Description of the vulnerability

A local attacker can read a memory fragment via MegaRAID SAS 8708EM2 of QEMU, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2016-4447 CVE-2016-4448 CVE-2016-4449

libxml2: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of libxml2.
Impacted products: iOS by Apple, iPhone, Mac OS X, Blue Coat CAS, ProxyAV, ProxyRA, ProxySG par Blue Coat, SGOS by Blue Coat, Debian, BIG-IP Hardware, TMOS, Fedora, Junos OS, Junos Space, libxml, McAfee Web Gateway, openSUSE Leap, Oracle Communications, RHEL, Slackware, Splunk Enterprise, SLES, Nessus, Ubuntu.
Severity: 2/4.
Consequences: user access/rights, data reading, denial of service on service, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 25/05/2016.
Identifiers: 1989337, 1991909, 1991910, 1991911, 1991913, 1991997, CERTFR-2017-AVI-012, cpujan2018, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449, DLA-503-1, DSA-3593-1, FEDORA-2017-a3a47973eb, FEDORA-2017-be8574d593, HT206902, HT206903, JSA10770, JSA10916, K24322529, K41103561, openSUSE-SU-2016:1595-1, RHSA-2016:1292-01, SA129, SB10170, SOL41103561, SPL-119440, SPL-121159, SPL-123095, SSA:2016-148-01, SUSE-SU-2016:1538-1, SUSE-SU-2016:1604-1, TNS-2017-03, USN-2994-1, USN-3235-1, VIGILANCE-VUL-19694.

Description of the vulnerability

Several vulnerabilities were announced in libxml2.

An attacker can force a read at an invalid address via xmlParseName, in order to trigger a denial of service, or to obtain sensitive information. [severity:1/4; CVE-2016-4447]

An attacker can use a format string attack, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-4448]

An attacker can generate a memory corruption via Entities Content, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-4449]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2014-3672

Xen: denial of service via /var/log/xen

Synthesis of the vulnerability

An attacker can fill the partition containing the /var/log/xen file of Xen, in order to trigger a denial of service.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Xen.
Severity: 1/4.
Consequences: denial of service on server, denial of service on service.
Provenance: user shell.
Creation date: 24/05/2016.
Identifiers: CVE-2014-3672, DLA-571-1, FEDORA-2016-4edd58a3b5, FEDORA-2016-8d3fe9914b, openSUSE-SU-2016:2494-1, openSUSE-SU-2016:2497-1, SUSE-SU-2016:2093-1, SUSE-SU-2016:2100-1, SUSE-SU-2016:2528-1, SUSE-SU-2016:2533-1, SUSE-SU-2016:2725-1, VIGILANCE-VUL-19685, XSA-180.

Description of the vulnerability

The Xen product logs its errors in the /var/log/xen file.

However, there is no limit on the size of the /var/log/xen file.

An attacker can therefore fill the partition containing the /var/log/xen file of Xen, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2016-4952

QEMU: out-of-bounds memory reading via PVSCSI_CMD

Synthesis of the vulnerability

An attacker can force a read at an invalid address via PVSCSI_CMD of QEMU, in order to trigger a denial of service, or to obtain sensitive information.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, QEMU, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: data reading, denial of service on server, denial of service on service.
Provenance: user shell.
Creation date: 23/05/2016.
Identifiers: CVE-2016-4952, DLA-1599-1, FEDORA-2016-73853a7a16, FEDORA-2016-a80eab65ba, FEDORA-2016-ea3002b577, openSUSE-SU-2016:1750-1, openSUSE-SU-2016:2494-1, openSUSE-SU-2016:2497-1, SUSE-SU-2016:1560-1, SUSE-SU-2016:1703-1, SUSE-SU-2016:2093-1, SUSE-SU-2016:2100-1, SUSE-SU-2016:2533-1, USN-3047-1, USN-3047-2, VIGILANCE-VUL-19679.

Description of the vulnerability

The QEMU product can be compiled with VMWARE PVSCSI Paravirtual SCSI Bus Emulation.

However, the PVSCSI_CMD_SETUP_RINGS and PVSCSI_CMD_SETUP_MSG_RING commands try to read a memory area located outside the expected range, which triggers a fatal error, or leads to the disclosure of a memory fragment.

An attacker can therefore force a read at an invalid address via PVSCSI_CMD of QEMU, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Debian Jessie: