The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of HPE Performance Center

vulnerability bulletin CVE-2016-2183 CVE-2016-6329

Blowfish, Triple-DES: algorithms too weak, SWEET32

Synthesis of the vulnerability

An attacker can create a TLS/VPN session with a Blowfish/Triple-DES algorithm, and perform a two days attack, in order to decrypt data.
Impacted products: Avaya Ethernet Routing Switch, Blue Coat CAS, ProxySG par Blue Coat, SGOS by Blue Coat, Cisco ASR, Cisco Aironet, Cisco ATA, Cisco AnyConnect Secure Mobility Client, Cisco ACE, ASA, AsyncOS, Cisco Catalyst, Cisco Content SMA, Cisco ESA, IOS by Cisco, IOS XE Cisco, IOS XR Cisco, Cisco IPS, Nexus by Cisco, NX-OS, Cisco Prime Access Registrar, Prime Collaboration Assurance, Cisco Prime DCNM, Prime Infrastructure, Cisco Prime LMS, Cisco Router, Secure ACS, Cisco CUCM, Cisco Manager Attendant Console, Cisco Unified CCX, Cisco IP Phone, Cisco MeetingPlace, Cisco Wireless IP Phone, Cisco WSA, Cisco Wireless Controller, Debian, Avamar, Black Diamond, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FileZilla Server, FortiAnalyzer, FortiAnalyzer Virtual Appliance, FortiGate, FortiGate Virtual Appliance, FortiOS, FreeRADIUS, hMailServer, HPE BSM, LoadRunner, HP Operations, Performance Center, Real User Monitoring, SiteScope, HP Switch, HP-UX, AIX, DB2 UDB, Informix Server, IRAD, Security Directory Server, Tivoli Directory Server, Tivoli Storage Manager, Tivoli System Automation, WebSphere MQ, Junos Space, McAfee Email Gateway, ePO, Data ONTAP, Snap Creator Framework, Nodejs Core, OpenSSL, openSUSE, openSUSE Leap, Oracle Communications, Oracle DB, Oracle Directory Server, Oracle Directory Services Plus, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Oracle iPlanet Web Server, Oracle OIT, Solaris, Tuxedo, Oracle Virtual Directory, WebLogic, Oracle Web Tier, SSL protocol, Pulse Connect Secure, Pulse Secure Client, Pulse Secure SBR, RHEL, JBoss EAP by Red Hat, SAS Add-in for Microsoft Office, SAS Analytics Pro, Base SAS Software, SAS Enterprise BI Server, SAS Enterprise Guide, SAS Management Console, SAS OLAP Server, SAS SAS/ACCESS, SAS SAS/AF, SAS SAS/CONNECT, SAS SAS/EIS, SAS SAS/ETS, SAS SAS/FSP, SAS SAS/GRAPH, SAS SAS/IML, SAS SAS/OR, SAS SAS/STAT, SAS SAS/Web Report Studio, Slackware, Splunk Enterprise, stunnel, SUSE Linux Enterprise Desktop, SLES, Synology DS***, Synology RS***, Nessus, Ubuntu, WinSCP.
Severity: 1/4.
Consequences: data reading.
Provenance: internet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 25/08/2016.
Identifiers: 1610582, 1991866, 1991867, 1991870, 1991871, 1991875, 1991876, 1991878, 1991880, 1991882, 1991884, 1991885, 1991886, 1991887, 1991889, 1991892, 1991894, 1991896, 1991902, 1991903, 1991951, 1991955, 1991959, 1991960, 1991961, 1992681, 1993777, 1994375, 1995099, 1995922, 1998797, 1999054, 1999421, 2000209, 2000212, 2000370, 2000544, 2001608, 2002021, 2002335, 2002336, 2002479, 2002537, 2002870, 2002897, 2002991, 2003145, 2003480, 2003620, 2003673, 2004036, 2008828, 523628, 9010102, bulletinapr2017, c05349499, c05369403, c05369415, c05390849, CERTFR-2017-AVI-012, CERTFR-2019-AVI-049, cisco-sa-20160927-openssl, cpuapr2017, cpujan2018, cpujul2017, cpuoct2017, CVE-2016-2183, CVE-2016-6329, DSA-2018-124, DSA-3673-1, DSA-3673-2, FEDORA-2016-7810e24465, FEDORA-2016-dc2cb4ad6b, FG-IR-16-047, FG-IR-16-048, FG-IR-17-127, FG-IR-17-173, HPESBGN03697, HPESBGN03765, HPESBUX03725, HPSBGN03690, HPSBGN03694, HPSBHF03674, ibm10718843, java_jan2017_advisory, JSA10770, KM03060544, NTAP-20160915-0001, openSUSE-SU-2016:2199-1, openSUSE-SU-2016:2391-1, openSUSE-SU-2016:2407-1, openSUSE-SU-2016:2496-1, openSUSE-SU-2016:2537-1, openSUSE-SU-2017:1638-1, openSUSE-SU-2018:0458-1, RHSA-2017:0336-01, RHSA-2017:0337-01, RHSA-2017:0338-01, RHSA-2017:3113-01, RHSA-2017:3114-01, RHSA-2017:3239-01, RHSA-2017:3240-01, RHSA-2018:2123-01, SA133, SA40312, SB10171, SB10186, SB10197, SB10215, SOL13167034, SP-CAAAPUE, SPL-129207, SSA:2016-266-01, SSA:2016-363-01, SUSE-SU-2016:2387-1, SUSE-SU-2016:2394-1, SUSE-SU-2016:2458-1, SUSE-SU-2016:2468-1, SUSE-SU-2016:2469-1, SUSE-SU-2016:2470-1, SUSE-SU-2016:2470-2, SUSE-SU-2017:1444-1, SUSE-SU-2017:2838-1, SUSE-SU-2017:3177-1, SWEET32, TNS-2016-16, USN-3087-1, USN-3087-2, USN-3270-1, USN-3339-1, USN-3339-2, USN-3372-1, VIGILANCE-VUL-20473.

Description of the vulnerability

The Blowfish and Triple-DES symetric encryption algorithms use 64 bit blocks.

However, if they are used in CBC mode, a collision occurs after 785 GB transferred, and it is then possible to decrypt blocks with an attack lasting two days.

An attacker can therefore create a TLS/VPN session with a Blowfish/Triple-DES algorithm, and perform a two days attack, in order to decrypt data.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2016-4359 CVE-2016-4360 CVE-2016-4361

HPE LoadRunner, Performance Center: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of HPE LoadRunner, Performance Center.
Impacted products: LoadRunner, Performance Center.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights, denial of service on service.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 3.
Creation date: 01/06/2016.
Identifiers: c05157423, CVE-2016-4359, CVE-2016-4360, CVE-2016-4361, HPSBGN03609, VIGILANCE-VUL-19752, ZDI-16-363, ZDI-16-364.

Description of the vulnerability

Several vulnerabilities were announced in HPE LoadRunner, Performance Center.

An attacker can use a vulnerability via Shared Memory Name Construction, in order to run code. [severity:3/4; CVE-2016-4359, ZDI-16-363]

An attacker can trigger a fatal error via import_csv, in order to trigger a denial of service. [severity:2/4; CVE-2016-4360, ZDI-16-364]

An attacker can trigger a fatal error, in order to trigger a denial of service. [severity:2/4; CVE-2016-4361]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2015-6857

HP Loadrunner/Performance Virtual Table Server: code execution via import_database

Synthesis of the vulnerability

An unauthenticated attacker can access to HP Loadrunner Virtual Table Server or HP Performance Center Virtual Table Server, in order to run privileged code.
Impacted products: LoadRunner, Performance Center.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights.
Provenance: intranet client.
Creation date: 25/11/2015.
Revisions dates: 03/12/2015, 04/12/2015.
Identifiers: c04900820, c04907374, CVE-2015-6857, HPSBGN03523, HPSBGN03525, VIGILANCE-VUL-18377, ZDI-15-581.

Description of the vulnerability

The HP Loadrunner Virtual Table Server and HP Performance Center Virtual Table Server products listen on port 4000.

However, by using the /data/import_database resource to inject SQL commands, an attacker can alter the base, and then execute code with NETWORK SERVICE privileges.

An unauthenticated attacker can therefore access to HP Loadrunner Virtual Table Server or HP Performance Center Virtual Table Server, in order to run privileged code.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2015-2121

HP Network Virtualization for LoadRunner and Performance Center: information disclosure

Synthesis of the vulnerability

A remote attacker can use HP Network Virtualization for LoadRunner and Performance Center, in order to obtain sensitive information.
Impacted products: LoadRunner, Performance Center.
Severity: 2/4.
Consequences: data reading.
Provenance: intranet client.
Creation date: 11/05/2015.
Identifiers: c04657310, CVE-2015-2121, HPSBGN03328, VIGILANCE-VUL-16854, ZDI-15-192.

Description of the vulnerability

A remote attacker can use HP Network Virtualization for LoadRunner and Performance Center, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2015-0235

glibc: buffer overflow of gethostbyname, GHOST

Synthesis of the vulnerability

An attacker can for example send an email using a long IPv4 address, to force the messaging server to resolve this address, and to generate a buffer overflow in gethostbyname() of the glibc, in order to trigger a denial of service, and possibly to execute code. Several programs using the gethostbyname() function are vulnerable with a similar attack vector.
Impacted products: Arkoon FAST360, GAiA, CheckPoint IP Appliance, Provider-1, SecurePlatform, CheckPoint Security Gateway, CheckPoint VSX-1, Cisco ASR, Cisco Catalyst, IOS XE Cisco, IOS XR Cisco, Nexus by Cisco, NX-OS, Prime Infrastructure, Cisco CUCM, XenServer, Clearswift Email Gateway, Debian, Unisphere EMC, VNX Operating Environment, VNX Series, Exim, BIG-IP Hardware, TMOS, HPE BSM, HP Operations, Performance Center, Junos Space, McAfee Email and Web Security, McAfee Email Gateway, McAfee MOVE AntiVirus, McAfee NSP, McAfee NTBA, McAfee NGFW, VirusScan, McAfee Web Gateway, openSUSE, Oracle Communications, Palo Alto Firewall PA***, PAN-OS, PHP, HDX, RealPresence Collaboration Server, RealPresence Distributed Media Application, RealPresence Resource Manager, Polycom VBP, RHEL, SIMATIC, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Ubuntu, Unix (platform) ~ not comprehensive, WordPress Core.
Severity: 4/4.
Consequences: user access/rights, denial of service on client.
Provenance: internet server.
Creation date: 27/01/2015.
Revision date: 27/01/2015.
Identifiers: 198850, 199399, c04577814, c04589512, CERTFR-2015-AVI-043, cisco-sa-20150128-ghost, cpujul2015, cpujul2017, cpuoct2016, cpuoct2017, cpuoct2018, CTX200437, CVE-2015-0235, DSA-3142-1, ESA-2015-030, ESA-2015-041, GHOST, HPSBGN03270, HPSBGN03285, JSA10671, K16057, KM01391662, MDVSA-2015:039, openSUSE-SU-2015:0162-1, openSUSE-SU-2015:0184-1, PAN-SA-2015-0002, RHSA-2015:0090-01, RHSA-2015:0092-01, RHSA-2015:0099-01, RHSA-2015:0101-01, RHSA-2015:0126-01, SB10100, sk104443, SOL16057, SSA:2015-028-01, SSA-994726, SUSE-SU-2015:0158-1, USN-2485-1, VIGILANCE-VUL-16060, VU#967332.

Description of the vulnerability

The glibc library provides two functions to obtain the IP address of a server from its DNS name:
  struct hostent *gethostbyname(const char *name);
  struct hostent *gethostbyname2(const char *name, int af);

For example:
  he = gethostbyname("www.example.com");

These functions also accept to directly process an IP address:
  he = gethostbyname("192.168.1.1");

However, a malformed IPv4 address, which is too long such as 192.168.111111.1 (more than 1024 byte long) triggers an overflow in the __nss_hostname_digits_dots() function.

An attacker can therefore for example send an email using a long IPv4 address, to force the messaging server to resolve this address, and to generate a buffer overflow in gethostbyname() of the glibc, in order to trigger a denial of service, and possibly to execute code.

Several programs using the gethostbyname() function are vulnerable (exim, php, pppd, procmail) with a similar attack vector. The following programs are apparently not vulnerable: apache, cups, dovecot, gnupg, isc-dhcp, lighttpd, mariadb/mysql, nfs-utils, nginx, nodejs, openldap, openssh, postfix, proftpd, pure-ftpd, rsyslog, samba, sendmail, squid, sysklogd, syslog-ng, tcp_wrappers, vsftpd, xinetd.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2014-9322

Linux kernel: privilege escalation via IRET gsbase

Synthesis of the vulnerability

A local attacker can call an IRET on the Linux kernel, in order to escalate his privileges.
Impacted products: BIG-IP Hardware, TMOS, Android OS, HPE BSM, HP Operations, Performance Center, Linux, openSUSE, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 16/12/2014.
Identifiers: c04594684, CERTFR-2014-AVI-532, CERTFR-2015-AVI-021, CERTFR-2015-AVI-054, CVE-2014-9322, HPSBGN03282, KM01411792, MDVSA-2015:027, openSUSE-SU-2014:1669-1, openSUSE-SU-2014:1677-1, openSUSE-SU-2014:1678-1, openSUSE-SU-2015:0566-1, RHSA-2014:1997-01, RHSA-2014:1998-01, RHSA-2014:2008-01, RHSA-2014:2009-01, RHSA-2014:2010-01, RHSA-2014:2028-01, RHSA-2014:2029-01, RHSA-2014:2030-01, RHSA-2014:2031-01, RHSA-2015:0009-01, SOL16122, SUSE-SU-2014:1693-1, SUSE-SU-2014:1693-2, SUSE-SU-2014:1695-1, SUSE-SU-2014:1695-2, SUSE-SU-2014:1698-1, SUSE-SU-2015:0068-1, SUSE-SU-2015:0581-1, SUSE-SU-2015:0736-1, SUSE-SU-2015:0812-1, USN-2464-1, USN-2491-1, VIGILANCE-VUL-15815.

Description of the vulnerability

On an Intel processor, when an interruption/exception occurs (for example a system call via int 0x80), the current context (registers CS and EIP/RIP, and flags) is saved. At the end of the interruption/exception, the IRET instruction restores saved values, so the interrupted program can continue its execution where it was interrupted:
 - restore the EIP/RIP instruction pointer
 - restore the CS register (privilege switch)
 - restore flags

However, on a 64 bit processor, with a writable kernel stack, after an IRET triggering a #SS Fault, the general_protection() function is executed with kernel/user BS Base addresses swapped.

A local attacker can therefore call an IRET on the Linux kernel, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2014-6324

Windows domain: privilege escalation via Kerberos KDC

Synthesis of the vulnerability

An attacker, who is authenticated on the domain, can create a fake Kerberos ticket for Windows, in order to obtain privileges of the domain administrator.
Impacted products: LoadRunner, Performance Center, Windows 2003, Windows 2008 R0, Windows 2008 R2, Windows 2012.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user account.
Creation date: 18/11/2014.
Identifiers: 3011780, c04526330, CERTFR-2014-ALE-011, CERTFR-2014-AVI-489, CVE-2014-6324, HPSBMU03224, MS14-068, VIGILANCE-VUL-15667, VU#213119.

Description of the vulnerability

Domain controllers implement the Kerberos KDC (Key Distribution Center) service, which processes authorizations for domain users.

Kerberos tickets are signed. However, the Windows implementation of KDC accepts tickets without a valid signature.

An attacker, who is authenticated on the domain, can therefore create a fake Kerberos ticket for Windows, in order to obtain privileges of the domain administrator.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2014-3673 CVE-2014-3687 CVE-2014-3688

Linux kernel: multiple vulnerabilities of SCTP

Synthesis of the vulnerability

An attacker can use several vulnerabilities of SCTP of the Linux kernel.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, HPE BSM, HP Operations, Performance Center, Linux, openSUSE, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 3.
Creation date: 28/10/2014.
Identifiers: c04594684, CERTFR-2014-AVI-455, CERTFR-2014-AVI-459, CERTFR-2014-AVI-495, CERTFR-2014-AVI-528, CERTFR-2014-AVI-532, CERTFR-2015-AVI-051, CERTFR-2015-AVI-165, CERTFR-2018-AVI-361, CVE-2014-3673, CVE-2014-3687, CVE-2014-3688, DSA-3060-1, FEDORA-2014-13558, FEDORA-2014-13773, FEDORA-2014-14068, HPSBGN03282, KM01411792, MDVSA-2014:230, MDVSA-2015:027, openSUSE-SU-2014:1677-1, openSUSE-SU-2014:1678-1, openSUSE-SU-2015:0566-1, RHSA-2014:1971-01, RHSA-2014:1997-01, RHSA-2014:2009-01, RHSA-2014:2028-01, RHSA-2014:2030-01, RHSA-2015:0043-01, RHSA-2015:0062-01, RHSA-2015:0115-01, SOL15910, SOL16025, SUSE-SU-2014:1693-1, SUSE-SU-2014:1693-2, SUSE-SU-2014:1695-1, SUSE-SU-2014:1695-2, SUSE-SU-2014:1698-1, SUSE-SU-2015:0068-1, SUSE-SU-2015:0178-1, SUSE-SU-2015:0481-1, SUSE-SU-2015:0529-1, SUSE-SU-2015:0581-1, SUSE-SU-2015:0652-1, SUSE-SU-2015:0736-1, SUSE-SU-2015:0812-1, SUSE-SU-2018:2062-1, USN-2417-1, USN-2418-1, USN-2441-1, USN-2442-1, USN-2445-1, USN-2446-1, USN-2447-1, USN-2447-2, USN-2448-1, USN-2448-2, VIGILANCE-VUL-15554.

Description of the vulnerability

Several vulnerabilities were announced in the Linux kernel.

An attacker can send duplicated packets of type ASCONF to a kernel that bundles fragments in the output queue, in order to trigger a denial of service. [severity:2/4; CVE-2014-3687]

An attacker can send specially crafted ASCONF packets, in order to trigger a denial of service. [severity:2/4; CVE-2014-3673]

An attacker can send a sequence of SCTP fragments, the last of which has an ill formed header, in order make the kernel use an excessive amount of memory for the packet queue and so, to trigger a denial of service. [severity:2/4; CVE-2014-3688]
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2014-6410

Linux kernel: infinite loop of __udf_read_inode

Synthesis of the vulnerability

An attacker can mount an UDF file system, to generate a large recursion in __udf_read_inode(), in order to trigger a denial of service of the Linux kernel.
Impacted products: Fedora, HPE BSM, HP Operations, Performance Center, Linux, openSUSE, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: user shell.
Creation date: 15/09/2014.
Identifiers: c04594684, CERTFR-2014-AVI-413, CERTFR-2014-AVI-532, CVE-2014-6410, FEDORA-2014-11008, HPSBGN03282, KM01411792, MDVSA-2014:201, openSUSE-SU-2014:1669-1, openSUSE-SU-2014:1677-1, RHSA-2014:1318-01, RHSA-2014:1971-01, RHSA-2014:1997-01, RHSA-2014:2009-01, RHSA-2014:2028-01, RHSA-2014:2030-01, SUSE-SU-2014:1316-1, SUSE-SU-2014:1319-1, USN-2374-1, USN-2375-1, USN-2376-1, USN-2377-1, USN-2378-1, USN-2379-1, VIGILANCE-VUL-15353.

Description of the vulnerability

The Linux kernel supports UDF file systems.

However, the __udf_read_inode() function of the fs/udf/inode.c file does not limit the number of ICB, which triggers an unlimited recursive call.

An attacker can therefore mount an UDF file system, to generate a large recursion in __udf_read_inode(), in order to trigger a denial of service of the Linux kernel.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2012-6657

Linux kernel: unreachable memory reading via SO_KEEPALIVE

Synthesis of the vulnerability

An attacker can force a read at an invalid address via SO_KEEPALIVE on the Linux kernel, in order to trigger a denial of service.
Impacted products: BIG-IP Hardware, TMOS, HPE BSM, HP Operations, Performance Center, Linux, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 1/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: user shell.
Creation date: 15/09/2014.
Identifiers: c04594684, CERTFR-2014-AVI-532, CERTFR-2015-AVI-165, CVE-2012-6657, HPSBGN03282, KM01411792, RHSA-2014:1997-01, RHSA-2014:2009-01, RHSA-2014:2028-01, RHSA-2014:2030-01, SOL16011, SUSE-SU-2015:0652-1, SUSE-SU-2015:0812-1, VIGILANCE-VUL-15352.

Description of the vulnerability

The setsockopt() function defines options of a socket.

The SO_KEEPALIVE option is use to keep a session active. However, the net/core/sock.c file does not check if the socket if of type SOCK_STREAM, so the kernel tries to read a memory area which is not reachable, which triggers a fatal error.

An attacker can therefore force a read at an invalid address via SO_KEEPALIVE on the Linux kernel, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about HPE Performance Center: