The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Slackware

computer vulnerability alert CVE-2017-13721

X.Org Server: memory corruption via Xext/shm Shmseg Resource Id

Synthesis of the vulnerability

An attacker can generate a memory corruption via Xext/shm Shmseg Resource Id of X.Org Server, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Solaris, Slackware, Ubuntu, XOrg Bundle ~ not comprehensive.
Severity: 2/4.
Creation date: 05/10/2017.
Identifiers: bulletinjan2018, CVE-2017-13721, DSA-4000-1, SSA:2017-279-03, USN-3453-1, VIGILANCE-VUL-24026.

Description of the vulnerability

An attacker can generate a memory corruption via Xext/shm Shmseg Resource Id of X.Org Server, in order to trigger a denial of service, and possibly to run code.

A detailed analysis was not performed for this bulletin.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability bulletin CVE-2017-0899 CVE-2017-0900 CVE-2017-0901

Ruby: four vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Ruby.
Impacted products: Debian, Fedora, RHEL, Slackware, Ubuntu.
Severity: 2/4.
Creation date: 06/09/2017.
Identifiers: CVE-2017-0899, CVE-2017-0900, CVE-2017-0901, CVE-2017-0902, DLA-1112-1, DLA-1114-1, DSA-3966-1, FEDORA-2017-20214ad330, FEDORA-2017-e136d63c99, RHSA-2017:3485-01, SSA:2017-261-03, USN-3439-1, USN-3553-1, VIGILANCE-VUL-23733.

Description of the vulnerability

Several vulnerabilities were announced in Ruby.

An unknown vulnerability was announced via Terminal Escape Sequences. [severity:1/4; CVE-2017-0899]

An attacker can trigger a fatal error via RubyGems Client, in order to trigger a denial of service. [severity:2/4; CVE-2017-0900]

An attacker can bypass access restrictions via RubyGems Client, in order to overwrite a file. [severity:2/4; CVE-2017-0901]

An attacker can bypass access restrictions via DNS Hijacking, in order to read or alter data. [severity:2/4; CVE-2017-0902]
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability CVE-2017-1000367 CVE-2017-1000368

sudo: privilege escalation via the parsing of /proc/pid/stat

Synthesis of the vulnerability

A local attacker can tamper with the parsing of /proc/[pid]/stat by sudo, in order to escalate his privileges.
Impacted products: Debian, Fedora, Junos Space, McAfee Web Gateway, openSUSE Leap, RHEL, Slackware, Sudo, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, InterScan Messaging Security Suite, Ubuntu, WindRiver Linux.
Severity: 2/4.
Creation date: 30/05/2017.
Revision date: 15/06/2017.
Identifiers: 1117723, CERTFR-2017-AVI-238, CERTFR-2017-AVI-365, CVE-2017-1000367, CVE-2017-1000368, DLA-1011-1, DLA-970-1, DSA-3867-1, FEDORA-2017-54580efa82, FEDORA-2017-8b250ebe97, FEDORA-2017-facd994774, JSA10824, JSA10826, openSUSE-SU-2017:1455-1, openSUSE-SU-2017:1697-1, RHSA-2017:1381-01, RHSA-2017:1382-01, RHSA-2017:1574-01, SB10205, SSA:2017-150-01, SUSE-SU-2017:1446-1, SUSE-SU-2017:1450-1, SUSE-SU-2017:1626-1, SUSE-SU-2017:1627-1, SUSE-SU-2017:1778-1, Synology-SA-17:19, USN-3304-1, VIGILANCE-VUL-22865.

Description of the vulnerability

The sudo product looks for its controlling tty.

Fot that, it reads the file /proc/pid/stat. However, the parsing of this file is wrong. An attacker can tamper with the program path to make sudo write into any file with root privileges.

A local attacker can therefore tamper with the parsing of /proc/[pid]/stat by sudo, in order to escalate his privileges.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability CVE-2017-3136 CVE-2017-3137 CVE-2017-3138

ISC BIND: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of ISC BIND.
Impacted products: Debian, Fedora, HP-UX, BIND, Juniper J-Series, JUNOS, SRX-Series, openSUSE Leap, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 3/4.
Creation date: 13/04/2017.
Identifiers: CERTFR-2017-AVI-112, CVE-2017-3136, CVE-2017-3137, CVE-2017-3138, DLA-957-1, DSA-3854-1, FEDORA-2017-0a876b0ba5, FEDORA-2017-44e494db1e, FEDORA-2017-edce28f24b, FEDORA-2017-ee4b0f53cb, HPESBUX03747, JSA10809, JSA10810, JSA10811, JSA10813, JSA10814, JSA10816, JSA10817, JSA10818, JSA10820, JSA10821, JSA10822, JSA10825, openSUSE-SU-2017:1063-1, RHSA-2017:1095-01, RHSA-2017:1105-01, RHSA-2017:1582-01, RHSA-2017:1583-01, SSA:2017-103-01, SUSE-SU-2017:0998-1, SUSE-SU-2017:0999-1, SUSE-SU-2017:1027-1, USN-3259-1, VIGILANCE-VUL-22445.

Description of the vulnerability

Several vulnerabilities were announced in ISC BIND.

An attacker can force an assertion error via DNS64 break-dnssec, in order to trigger a denial of service. [severity:3/4; CVE-2017-3136]

An attacker can trigger a fatal error via CNAME Response Ordering, in order to trigger a denial of service. [severity:3/4; CVE-2017-3137]

An attacker can force an assertion error via Null Command String, in order to trigger a denial of service. [severity:2/4; CVE-2017-3138]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability bulletin CVE-2014-3694 CVE-2014-3695 CVE-2014-3696

Pidgin: five vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Pidgin.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, Solaris, RHEL, Slackware, Ubuntu.
Severity: 2/4.
Creation date: 05/04/2017.
Identifiers: CVE-2014-3694, CVE-2014-3695, CVE-2014-3696, CVE-2014-3697, CVE-2014-3698, DSA-3055-1, FEDORA-2014-14069, openSUSE-SU-2014:1376-1, openSUSE-SU-2014:1397-1, openSUSE-SU-2017:0925-1, RHSA-2017:1854-01, SSA:2014-296-02, USN-2390-1, VIGILANCE-VUL-22333.

Description of the vulnerability

Several vulnerabilities were announced in Pidgin.

An attacker can act as a Man-in-the-Middle via SSL/TLS, in order to read or write data in the session. [severity:2/4; CVE-2014-3694]

An attacker can trigger a fatal error via MXit Protocol, in order to trigger a denial of service. [severity:2/4; CVE-2014-3695]

An attacker can trigger a fatal error via Groupwise Server Message, in order to trigger a denial of service. [severity:2/4; CVE-2014-3696]

An attacker can traverse directories via untar_block, in order to read a file outside the root path. [severity:2/4; CVE-2014-3697]

An attacker can bypass security features via jabber_idn_validate(), in order to obtain sensitive information. [severity:2/4; CVE-2014-3698]
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability announce CVE-2016-9042 CVE-2017-6451 CVE-2017-6452

NTP.org: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of NTP.org.
Impacted products: Mac OS X, Blue Coat CAS, BIG-IP Hardware, TMOS, Fedora, FreeBSD, AIX, McAfee Web Gateway, Meinberg NTP Server, NetBSD, NTP.org, Solaris, Palo Alto Firewall PA***, PAN-OS, pfSense, RHEL, Slackware, Spectracom SecureSync, Symantec Content Analysis, Synology DSM, Synology DS***, Synology RS***, Ubuntu, VxWorks.
Severity: 2/4.
Creation date: 22/03/2017.
Revision date: 30/03/2017.
Identifiers: APPLE-SA-2017-09-25-1, bulletinapr2017, CVE-2016-9042, CVE-2017-6451, CVE-2017-6452, CVE-2017-6455, CVE-2017-6458, CVE-2017-6459, CVE-2017-6460, CVE-2017-6462, CVE-2017-6463, CVE-2017-6464, FEDORA-2017-5ebac1c112, FEDORA-2017-72323a442f, FreeBSD-SA-17:03.ntp, HT208144, K02951273, K-511308, NTP-01-002, NTP-01-003, NTP-01-004, NTP-01-007, NTP-01-008, NTP-01-009, NTP-01-012, NTP-01-014, NTP-01-016, PAN-SA-2017-0022, RHSA-2017:3071-01, SA147, SB10201, SSA:2017-112-02, TALOS-2016-0260, USN-3349-1, VIGILANCE-VUL-22217, VU#633847.

Description of the vulnerability

Several vulnerabilities were announced in NTP.org.

An attacker can tamper with packet timestamp, in order to make target trafic dropped. [severity:2/4; CVE-2016-9042]

An attacker can generate a buffer overflow via ntpq, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2017-6460, NTP-01-002]

An attacker can generate a buffer overflow via mx4200_send(), in order to trigger a denial of service, and possibly to run code. [severity:1/4; CVE-2017-6451, NTP-01-003]

An attacker can generate a buffer overflow via ctl_put(), in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2017-6458, NTP-01-004]

An attacker can generate a buffer overflow via addKeysToRegistry(), in order to trigger a denial of service, and possibly to run code. [severity:1/4; CVE-2017-6459, NTP-01-007]

An attacker can generate a buffer overflow in the MS-Windows installer, in order to trigger a denial of service, and possibly to run code. [severity:1/4; CVE-2017-6452, NTP-01-008]

An attacker can define the PPSAPI_DLLS environment variable, in order to make the server run a library with hight privileges. [severity:2/4; CVE-2017-6455, NTP-01-009]

An authenticated attacker can submit an invalid configuration directive, to trigger a denial of service. [severity:2/4; CVE-2017-6463, NTP-01-012]

A privileged attacker can generate a buffer overflow via datum_pts_receive(), in order to trigger a denial of service, and possibly to run code. [severity:1/4; CVE-2017-6462, NTP-01-014]

An authenticated attacker can submit an invalid configuration directive "mode", to trigger a denial of service. [severity:2/4; CVE-2017-6464, NTP-01-016]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability alert CVE-2017-6435 CVE-2017-6436 CVE-2017-6437

libplist: six vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of libplist.
Impacted products: Debian, Fedora, openSUSE Leap, Slackware.
Severity: 2/4.
Creation date: 27/03/2017.
Identifiers: CVE-2017-6435, CVE-2017-6436, CVE-2017-6437, CVE-2017-6438, CVE-2017-6439, CVE-2017-6440, DLA-870-1, FEDORA-2017-3849af4477, FEDORA-2017-4047180cd3, openSUSE-SU-2017:1426-1, openSUSE-SU-2017:2208-1, SSA:2017-320-01, VIGILANCE-VUL-22251.

Description of the vulnerability

Several vulnerabilities were announced in libplist.

An attacker can generate a memory corruption via parse_string_node(), in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2017-6435]

An attacker can trigger a fatal error via parse_string_node(), in order to trigger a denial of service. [severity:1/4; CVE-2017-6436]

An attacker can force a read at an invalid address via base64encode(), in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; CVE-2017-6437]

An attacker can generate a buffer overflow via parse_unicode_node(), in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2017-6438]

An attacker can generate a buffer overflow via parse_string_node(), in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2017-6439]

An attacker can trigger a fatal error via parse_data_node(), in order to trigger a denial of service. [severity:1/4; CVE-2017-6440]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability announce CVE-2017-5834 CVE-2017-5835 CVE-2017-5836

libplist: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of libplist.
Impacted products: Debian, openSUSE Leap, Slackware.
Severity: 2/4.
Creation date: 21/02/2017.
Identifiers: CVE-2017-5834, CVE-2017-5835, CVE-2017-5836, DLA-840-1, openSUSE-SU-2017:0528-1, openSUSE-SU-2017:1426-1, SSA:2017-320-01, VIGILANCE-VUL-21912.

Description of the vulnerability

Several vulnerabilities were announced in libplist.

An attacker can generate a buffer overflow via parse_dict_node, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2017-5834]

An attacker can trigger a fatal error via Memory Allocation Error, in order to trigger a denial of service. [severity:1/4; CVE-2017-5835]

An attacker can generate a memory corruption via bplist.c, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2017-5836]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability CVE-2017-3135

ISC BIND: assertion error via the combination DNS64+RPZ

Synthesis of the vulnerability

An attacker can force an assertion failure when functions DNS64 and RPZ of ISC BIND are both enabled, in order to trigger a denial of service.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, HP-UX, BIND, Juniper J-Series, JUNOS, SRX-Series, openSUSE Leap, RHEL, Slackware, Ubuntu.
Severity: 2/4.
Creation date: 09/02/2017.
Identifiers: CVE-2017-3135, DLA-843-1, DSA-3795-1, FEDORA-2017-27099c270a, FEDORA-2017-2b46c8b6c2, FEDORA-2017-96b7f4f53e, FEDORA-2017-d0c9bf9508, HPESBUX03747, JSA10799, K80533167, openSUSE-SU-2017:0620-1, RHSA-2017:0276-01, SSA:2017-041-01, USN-3201-1, VIGILANCE-VUL-21790.

Description of the vulnerability

The ISC BIND product is a DNS server.

It can compute responses for IPv6 address queries from data for IPv4 addresses. However, when this function is enabled and that the function "Response Policy Zone" is also enabled, an assertion may be evaluated as false, which stops the process with a SIGABORT signal.

An attacker can therefore force an assertion failure when functions DNS64 and RPZ of ISC BIND are both enabled, in order to trigger a denial of service.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability note CVE-2016-10166 CVE-2016-10167 CVE-2016-10168

libgd2: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of libgd2.
Impacted products: Debian, Fedora, FortiAnalyzer, FortiAnalyzer Virtual Appliance, FortiGate, FortiGate Virtual Appliance, FortiOS, openSUSE Leap, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Creation date: 30/01/2017.
Identifiers: CERTFR-2017-AVI-237, CVE-2016-10166, CVE-2016-10167, CVE-2016-10168, DLA-804-1, DSA-3777-1, FEDORA-2017-9a5b89363f, FEDORA-2017-f787c35494, FG-IR-17-051, openSUSE-SU-2017:0548-1, openSUSE-SU-2017:0588-1, RHSA-2017:3221-01, SSA:2017-041-03, SUSE-SU-2017:0534-1, SUSE-SU-2017:0556-1, SUSE-SU-2017:0568-1, USN-3213-1, VIGILANCE-VUL-21699.

Description of the vulnerability

Several vulnerabilities were announced in libgd2.

An attacker can generate an integer overflow, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-10166]

An attacker can trigger a fatal error, in order to trigger a denial of service. [severity:2/4; CVE-2016-10167]

An attacker can generate an integer overflow via Chunks, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-10168]
Complete Vigil@nce bulletin.... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Slackware: