The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of RedHat Fedora

computer vulnerability CVE-2015-8936

squidguard: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of squidguard, in order to run JavaScript code in the context of the web site.
Impacted products: Debian, Fedora, openSUSE Leap.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 22/06/2016.
Identifiers: CVE-2015-8936, DLA-524-1, FEDORA-2016-8b19472a3c, FEDORA-2016-f8a01aa629, FEDORA-2016-fbb5a65729, openSUSE-SU-2016:2580-1, VIGILANCE-VUL-19955.

Description of the vulnerability

An attacker can trigger a Cross Site Scripting of squidguard, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2016-3092

Apache Tomcat: denial of service via FileUpload

Synthesis of the vulnerability

An attacker can send files of a specially chosen size to Apache Tomcat, in order to overload the server.
Impacted products: Tomcat, Debian, Fedora, HP-UX, Domino, QRadar SIEM, Tivoli Storage Manager, Tivoli System Automation, Tivoli Workload Scheduler, WebSphere AS Traditional, IBM WebSphere ESB, WebSphere MQ, MariaDB ~ precise, MySQL Community, MySQL Enterprise, openSUSE Leap, Oracle Communications, Oracle Directory Server, Oracle Directory Services Plus, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Oracle iPlanet Web Server, Oracle OIT, Solaris, Tuxedo, Oracle Virtual Directory, WebLogic, Oracle Web Tier, Percona Server, XtraDB Cluster, Puppet, RHEL, JBoss EAP by Red Hat, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: internet client.
Creation date: 22/06/2016.
Identifiers: 1987864, 1989628, 1990172, 1991866, 1991867, 1991870, 1991871, 1991875, 1991876, 1991878, 1991880, 1991882, 1991884, 1991885, 1991886, 1991887, 1991889, 1991892, 1991894, 1991896, 1991902, 1991903, 1991951, 1991955, 1991959, 1991960, 1991961, 1992835, 1995388, 1995793, 2000095, 2000544, 2001563, 2012109, 2015814, 7014463, bulletinjul2016, c05324759, cpuapr2017, cpuapr2018, cpujul2017, cpujul2018, cpuoct2017, CVE-2016-3092, DLA-528-1, DLA-529-1, DSA-3609-1, DSA-3611-1, DSA-3614-1, FEDORA-2016-0a4dccdd23, FEDORA-2016-2b0c16fd82, HPSBUX03665, openSUSE-SU-2016:2252-1, RHSA-2016:2068-01, RHSA-2016:2069-01, RHSA-2016:2070-01, RHSA-2016:2071-01, RHSA-2016:2072-01, RHSA-2016:2599-02, RHSA-2016:2807-01, RHSA-2016:2808-01, RHSA-2017:0455-01, RHSA-2017:0456-01, RHSA-2017:0457-01, SUSE-SU-2017:1660-1, USN-3024-1, USN-3027-1, VIGILANCE-VUL-19953.

Description of the vulnerability

The Apache Tomcat product uses a slightly fork of the Apache Commons FileUpload library.

This library is used to receive files from an HTTP client to the server. However, when the file size is such that the size of the MIME envelope (file content + MIME headers) is equal to the size of the file reading buffer, the transfer requires an extremely long duration.

An attacker can therefore send files of a specially chosen size to Apache Tomcat, in order to overload the server.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2016-5832 CVE-2016-5833 CVE-2016-5834

WordPress Core: eight vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of WordPress Core.
Impacted products: Debian, Fedora, WordPress Core.
Severity: 2/4.
Consequences: client access/rights, data reading, data creation/edition.
Provenance: internet client.
Number of vulnerabilities in this bulletin: 8.
Creation date: 22/06/2016.
Identifiers: CERTFR-2016-AVI-215, CVE-2016-5832, CVE-2016-5833, CVE-2016-5834, CVE-2016-5835, CVE-2016-5836, CVE-2016-5837, CVE-2016-5838, CVE-2016-5839, DLA-1452-1, DLA-568-1, DLA-633-1, DSA-3639-1, FEDORA-2016-4573f8c9ba, FEDORA-2016-7db496f6f2, FEDORA-2016-a5e392ef01, VIGILANCE-VUL-19952.

Description of the vulnerability

Several vulnerabilities were announced in WordPress Core.

An attacker can block or tamper with the redirections. [severity:1/4; CVE-2016-5832]

An attacker can trigger a Cross Site Scripting via the names of attached files, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2016-5833]

An attacker can trigger a Cross Site Scripting via the names of attached files, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2016-5834]

An attcker can access to the change log of articles. [severity:1/4; CVE-2016-5835]

An attacker can trigger a fatal error via oEmbed, in order to trigger a denial of service. [severity:1/4; CVE-2016-5836]

An attacker can remove categories in which an article is registered. [severity:1/4; CVE-2016-5837]

An attacker can change the password of another user with a stolen cookie. [severity:2/4; CVE-2016-5838]

The routine sanitize_file_name accepts invalid names. [severity:2/4; CVE-2016-5839]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2016-4444 CVE-2016-4445 CVE-2016-4446

setroubleshoot: injection of shell command

Synthesis of the vulnerability

An attacker can inject shell command via setroubleshoot, in order to run code under the account "root".
Impacted products: Fedora, RHEL.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 4.
Creation date: 22/06/2016.
Identifiers: CVE-2016-4444, CVE-2016-4445, CVE-2016-4446, CVE-2016-4989, FEDORA-2016-047a86f5b1, FEDORA-2016-75ca94dee3, FEDORA-2016-b68f69b086, FEDORA-2016-f2493c754a, FEDORA-2016-f597359bf2, RHSA-2016:1267-01, RHSA-2016:1293-01, VIGILANCE-VUL-19949.

Description of the vulnerability

An attacker can inject shell command via setroubleshoot, in order to run code under the account "root".
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin 19938

nfdump: denial of service

Synthesis of the vulnerability

An attacker can generate a fatal error of nfdump, in order to trigger a denial of service.
Impacted products: Fedora.
Severity: 2/4.
Consequences: denial of service on service, denial of service on client.
Provenance: internet server.
Creation date: 21/06/2016.
Identifiers: FEDORA-2016-3b49c9aa49, FEDORA-2016-54dfd21f15, VIGILANCE-VUL-19938.

Description of the vulnerability

An attacker can generate a fatal error of nfdump, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2016-5360

HAproxy: denial of service via reqdeny

Synthesis of the vulnerability

An attacker can generate a fatal error via the filter "reqdeny" of HAproxy, in order to trigger a denial of service.
Impacted products: Fedora, Ubuntu.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: internet client.
Creation date: 21/06/2016.
Identifiers: CVE-2016-5360, FEDORA-2016-b38938aa8e, USN-3011-1, VIGILANCE-VUL-19937.

Description of the vulnerability

An attacker can generate a fatal error via the filter "reqdeny" of HAproxy, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2016-4472

expat: denial of service via a CHM file

Synthesis of the vulnerability

An attacker can raise a fatal error in pointer arithmetic in expat, while processing a CHM file, in order to make expat crash.
Impacted products: Fedora, Notes, WebSphere AS Traditional, Python, Slackware, Nessus, Ubuntu.
Severity: 1/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 20/06/2016.
Identifiers: 1988026, 1990421, 1990658, CERTFR-2018-AVI-288, CVE-2016-4472, FEDORA-2016-0fd6ca526a, FEDORA-2016-60889583ab, FEDORA-2016-7c6e7a9265, SSA:2016-359-01, SSA:2017-266-02, SSA:2018-124-01, TNS-2018-08, USN-3013-1, VIGILANCE-VUL-19932.

Description of the vulnerability

An attacker can raise a fatal error in pointer arithmetic in expat, while processing a CHM file, in order to make expat crash.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2016-4428

OpenStack Horizon: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via OpenStack Horizon, in order to run JavaScript code in the context of the web site.
Impacted products: Debian, Fedora, Solaris, Ubuntu.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 20/06/2016.
Identifiers: bulletinjul2016, CVE-2016-4428, DLA-520-1, DSA-3617-1, FEDORA-2016-e538b11379, USN-3447-1, VIGILANCE-VUL-19928.

Description of the vulnerability

An attacker can trigger a Cross Site Scripting via OpenStack Horizon, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2016-4971

wget: file corruption via a redirecton to an FTP URL

Synthesis of the vulnerability

An attacker can corrupt an arbitrary file by redirecting an HTTP request to an FTP location.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, Solaris, Palo Alto Firewall PA***, PAN-OS, RHEL, Ubuntu.
Severity: 2/4.
Consequences: data reading, data creation/edition.
Provenance: internet server.
Creation date: 20/06/2016.
Identifiers: bulletinjul2016, CVE-2016-4971, DLA-536-1, FEDORA-2016-24135dfe43, FEDORA-2016-2db8cbc2fd, openSUSE-SU-2016:2027-1, openSUSE-SU-2016:2277-1, PAN-SA-2017-0003, PAN-SA-2017-0012, PAN-SA-2017-0013, PAN-SA-2017-0014, PAN-SA-2017-0016, RHSA-2016:2587-02, USN-3012-1, VIGILANCE-VUL-19927.

Description of the vulnerability

An attacker can corrupt an arbitrary file by redirecting an HTTP request to an FTP location.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2016-4303

iperf3: buffer overflow via cjson

Synthesis of the vulnerability

An attacker can generate a buffer overflow via cjson of iperf3, in order to trigger a denial of service, and possibly to run code.
Impacted products: Fedora, openSUSE, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service, denial of service on client.
Provenance: internet server.
Creation date: 20/06/2016.
Identifiers: CVE-2016-4303, FEDORA-2016-45402a6f3b, FEDORA-2016-9693e82a25, openSUSE-SU-2016:2113-1, openSUSE-SU-2016:2121-1, VIGILANCE-VUL-19926.

Description of the vulnerability

An attacker can generate a buffer overflow via cjson of iperf3, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about RedHat Fedora: