The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of SunOS

computer vulnerability bulletin CVE-2015-3455

Squid: Man-in-the-Middle of SSL Bumping

Synthesis of the vulnerability

An attacker can act as a Man-in-the-Middle between Squid in ssl_bump client-first/bump mode and a server, in order to alter signatures.
Impacted products: Fedora, openSUSE, openSUSE Leap, Solaris, RHEL, Squid.
Severity: 3/4.
Consequences: data reading, data creation/edition, data deletion.
Provenance: internet server.
Creation date: 30/04/2015.
Identifiers: bulletinjul2015, CERTFR-2015-AVI-200, CVE-2015-3455, FEDORA-2016-7b40eb9e29, MDVSA-2015:230, openSUSE-SU-2015:1546-1, openSUSE-SU-2016:2081-1, RHSA-2015:2378-01, SQUID-2015:1, VIGILANCE-VUL-16788.

Description of the vulnerability

The Squid product uses the ssl_bump option to inspect SSL/TLS using several modes:
 - client-first: establish a TLS session with the client, and then the server.
 - server-first: establish a TLS session with the server, and then the client.

However, in the client-first or bump mode, the X.509 certificate of the SSL/TLS session is not checked by Squid.

An attacker can therefore act as a Man-in-the-Middle between Squid in ssl_bump client-first/bump mode and a server, in order to alter signatures.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2015-2783 CVE-2015-3329 CVE-2015-3330

PHP 5.6: eleven vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of PHP 5.6.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, HP-UX, openSUSE, Solaris, PHP, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 3/4.
Consequences: user access/rights, data reading, denial of service on service.
Provenance: internet client.
Number of vulnerabilities in this bulletin: 11.
Creation date: 17/04/2015.
Revisions dates: 17/04/2015, 30/04/2015.
Identifiers: 66550, 68819, 69152, 69218, 69227, 69316, 69324, 69337, 69353, 69441, bulletinjul2015, c04686230, CVE-2015-2783, CVE-2015-3329, CVE-2015-3330, CVE-2015-3411, CVE-2015-3412, CVE-2015-4599, CVE-2015-4600, CVE-2015-4601, CVE-2015-4602, CVE-2015-4603, CVE-2015-4604, CVE-2015-4605, DSA-3280-1, FEDORA-2015-6407, HPSBUX03337, openSUSE-SU-2015:0855-1, openSUSE-SU-2015:1197-1, RHSA-2015:1135-01, RHSA-2015:1187-01, RHSA-2015:1218-01, SOL17028, SOL17061, SSRT102066, SUSE-SU-2015:0868-1, SUSE-SU-2016:1638-1, USN-2658-1, VIGILANCE-VUL-16647.

Description of the vulnerability

Several vulnerabilities were announced in PHP 5.6.

An attacker can use a type error in exception::getTraceAsString, in order to obtain sensitive information. [severity:2/4; 69152, CVE-2015-4599]

An attacker can generate a memory corruption in php_stream_url_wrap_http_ex, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; 69337]

An attacker can use the null character, in order to access to other files. [severity:2/4; 69353, CVE-2015-3411, CVE-2015-3412]

An attacker can use apache2handler, in order to execute code. [severity:3/4; 69218, CVE-2015-3330]

An attacker can force the usage of a freed memory area in php_curl, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; 69316]

An attacker can force a read at an invalid address in Phar, in order to trigger a denial of service. [severity:2/4; 69324, CVE-2015-2783]

An attacker can generate a buffer overflow in phar_set_inode, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; 69441, CVE-2015-3329]

An attacker can force the usage of a freed memory area in zval_scan, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; 69227]

An attacker can force the usage of a freed memory area in SQLite, in order to trigger a denial of service, and possibly to execute code. [severity:3/4; 66550]

An attacker can use a type error in SoapFault unserialize(), in order to obtain sensitive information. [severity:2/4; CVE-2015-4600, CVE-2015-4601, CVE-2015-4602, CVE-2015-4603]

An attacker can trigger a fatal error in Fileinfo, in order to trigger a denial of service. [severity:2/4; 68819, CVE-2015-4604, CVE-2015-4605]
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2015-3152

MySQL: Man-in-the-Middle of TLS

Synthesis of the vulnerability

An attacker can act as a Man-in-the-Middle when the MySQL client asks for a TLS session, in order to read or alter exchanged data.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, MySQL Community, MySQL Enterprise, openSUSE, openSUSE Leap, Solaris, Percona Server, pfSense, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DS***, Synology RS***.
Severity: 2/4.
Consequences: data reading, data creation/edition.
Provenance: intranet server.
Creation date: 29/04/2015.
Identifiers: bulletinoct2018, CERTFR-2015-AVI-281, CVE-2015-3152, DSA-3311-1, FEDORA-2015-10831, FEDORA-2015-10849, oCERT-2015-003, openSUSE-SU-2015:1216-1, openSUSE-SU-2015:2243-1, RHSA-2015:1646-01, RHSA-2015:1647-01, RHSA-2015:1665-01, SOL16845, SSA:2015-198-02, SUSE-SU-2015:1273-1, SUSE-SU-2016:1638-1, VIGILANCE-VUL-16761.

Description of the vulnerability

The MySQL client can communicate with the server through a TLS session.

The "--ssl" option of the client tries to setup a TLS session, but does not require it. This behavior is documented, however many administrators are not aware of this behavior.

An attacker can therefore act as a Man-in-the-Middle when the MySQL client asks for a TLS session, in order to read or alter exchanged data.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2014-3589

python-pillow: vulnerability of IcnsImagePlugin

Synthesis of the vulnerability

A vulnerability in IcnsImagePlugin of python-pillow was announced.
Impacted products: Debian, Fedora, openSUSE, Solaris, Ubuntu.
Severity: 1/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Creation date: 29/04/2015.
Identifiers: CVE-2014-3589, DSA-3009-1, FEDORA-2014-9536, FEDORA-2014-9540, MDVSA-2014:163, MDVSA-2015:099, openSUSE-SU-2015:0798-1, USN-3080-1, USN-3090-1, USN-3090-2, VIGILANCE-VUL-16758.

Description of the vulnerability

A vulnerability in IcnsImagePlugin of python-pillow was announced.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2014-9601

python-pillow: vulnerability of PNG

Synthesis of the vulnerability

A vulnerability in PNG of python-pillow was announced.
Impacted products: Fedora, openSUSE, Solaris, Ubuntu.
Severity: 1/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Creation date: 29/04/2015.
Identifiers: bulletinjul2015, CVE-2014-9601, FEDORA-2015-0667, MDVSA-2015:099, openSUSE-SU-2015:0798-1, USN-3090-1, USN-3090-2, USN-3229-1, USN-3230-1, VIGILANCE-VUL-16756.

Description of the vulnerability

A vulnerability in PNG of python-pillow was announced.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2015-3153

cURL: headers sent to the proxy

Synthesis of the vulnerability

An attacker can capture headers sent by cURL to the proxy, in order to obtain sensitive information.
Impacted products: OpenOffice, curl, Debian, Juniper EX-Series, Juniper J-Series, Junos OS, SRX-Series, openSUSE, Solaris, Shibboleth SP, Ubuntu.
Severity: 2/4.
Consequences: data reading.
Provenance: intranet server.
Creation date: 29/04/2015.
Identifiers: CERTFR-2016-AVI-128, cpuoct2018, CVE-2015-3153, DSA-3240-1, JSA10743, JSA10874, openSUSE-SU-2015:0861-1, USN-2591-1, VIGILANCE-VUL-16752.

Description of the vulnerability

The cURL product can be configured to use a proxy to reach remote servers.

The "--header" option (or CURLOPT_HTTPHEADER) of cURL allows users to define additional headers for the HTTP query. However, by default, these headers are also sent to the proxy, even if the session to the remote server uses TLS.

An attacker can therefore capture headers sent by cURL to the proxy, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2014-7926

icu: vulnerability

Synthesis of the vulnerability

A vulnerability of icu was announced.
Impacted products: Debian, Fedora, Solaris, Ubuntu.
Severity: 1/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Creation date: 28/04/2015.
Identifiers: CVE-2014-7926, DSA-3187-1, FEDORA-2015-16314, FEDORA-2015-6084, FEDORA-2015-6087, MDVSA-2015:161, MDVSA-2015:161-1, USN-2522-1, USN-2522-2, USN-2522-3, VIGILANCE-VUL-16749.

Description of the vulnerability

A vulnerability of icu was announced.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2014-7923

icu: vulnerability

Synthesis of the vulnerability

A vulnerability of icu was announced.
Impacted products: Debian, Fedora, Solaris, Ubuntu.
Severity: 1/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Creation date: 28/04/2015.
Identifiers: CVE-2014-7923, DSA-3187-1, FEDORA-2015-16314, FEDORA-2015-6084, FEDORA-2015-6087, MDVSA-2015:161, MDVSA-2015:161-1, USN-2522-1, USN-2522-2, USN-2522-3, VIGILANCE-VUL-16748.

Description of the vulnerability

A vulnerability of icu was announced.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2015-3418

X.Org Server: denial of service via PutImage

Synthesis of the vulnerability

An attacker can use the PutImage() function with a null height, in order to trigger a denial of service of X.Org Server.
Impacted products: Solaris, XOrg Bundle ~ not comprehensive.
Severity: 1/4.
Consequences: denial of service on service.
Provenance: user shell.
Creation date: 27/04/2015.
Identifiers: 928520, bulletinoct2015, CVE-2015-3418, VIGILANCE-VUL-16718.

Description of the vulnerability

The X.Org Server product implements the server side of the PutImage() function, which displays an image on the screen.

However, if the image height is zero, a division by zero occurs.

An attacker can therefore use the PutImage() function with a null height, in order to trigger a denial of service of X.Org Server.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2013-4276

lcms: vulnerability of ColorSpace

Synthesis of the vulnerability

A vulnerability in ColorSpace of lcms was announced.
Impacted products: Fedora, openSUSE, Solaris.
Severity: 1/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: document.
Creation date: 24/04/2015.
Identifiers: CVE-2013-4276, FEDORA-2015-1648, MDVSA-2013:220, openSUSE-SU-2013:1547-1, openSUSE-SU-2013:1560-1, VIGILANCE-VUL-16705.

Description of the vulnerability

A vulnerability in ColorSpace of lcms was announced.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about SunOS: