The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Unix (platform) ~ not comprehensive

computer vulnerability bulletin CVE-2017-0781 CVE-2017-0782 CVE-2017-0783

Bluetooth Drivers: multiple vulnerabilities

Synthesis of the vulnerability

Several vulnerabilities were announced in several implementations of Bluetooth drivers.
Impacted products: iOS by Apple, iPhone, Android OS, QRadar SIEM, Linux, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, SUSE Linux Enterprise Desktop, SLES, Unix (platform) ~ not comprehensive, WindRiver Linux.
Severity: 2/4.
Creation date: 12/09/2017.
Revisions dates: 13/09/2017, 13/09/2017.
Identifiers: 2011746, BlueBorne, CERTFR-2017-AVI-400, CERTFR-2018-AVI-014, CERTFR-2018-AVI-048, CVE-2017-0781, CVE-2017-0782, CVE-2017-0783, CVE-2017-0785, CVE-2017-1000250, CVE-2017-1000251, CVE-2017-8628, SUSE-SU-2017:2956-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0171-1, VIGILANCE-VUL-23818, VU#240311.

Description of the vulnerability

Several vulnerabilities were announced in several implementations of Bluetooth drivers:
 - Android : Information Leak Vulnerability (CVE-2017-0785) - VIGILANCE-VUL-23741
 - Android : Remote Code Execution Vulnerability #1 (CVE-2017-0781) - VIGILANCE-VUL-23741
 - Android : Remote Code Execution vulnerability #2 (CVE-2017-0782) - VIGILANCE-VUL-23741
 - Android : Man in The Middle attack (CVE-2017-0783) - VIGILANCE-VUL-23741
 - Windows : Man in The Middle attack (CVE-2017-8628) - VIGILANCE-VUL-23826
 - Linux : BlueZ Information leak vulnerability (CVE-2017-1000250) - VIGILANCE-VUL-23829
 - Linux : Kernel > 3.3 Stack overflow (CVE-2017-1000251) - VIGILANCE-VUL-23830
 - iOS : Remote code execution via Low Energy Audio Protocol (CVE-2017-14315) - mitigated by iOS 10

This bulletin serves as a cap because all these vulnerabilities have been grouped under the name "BlueBorne". Individual bulletins are referenced at the end of each line.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability bulletin CVE-2016-6645 CVE-2016-6646

EMC Unisphere for VMAX: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of EMC Unisphere for VMAX.
Impacted products: Unix (platform) ~ not comprehensive.
Severity: 3/4.
Creation date: 04/10/2016.
Revision date: 04/10/2016.
Identifiers: 490107, CVE-2016-6645, CVE-2016-6646, ESA-2016-121, VIGILANCE-VUL-20758.

Description of the vulnerability

Several vulnerabilities were announced in EMC Unisphere for VMAX.

An attacker can use a vulnerability via vApp Managers, in order to run code. [severity:3/4; CVE-2016-6646]

An authenticated attacker can use a vulnerability via vApp Managers, in order to run code. [severity:2/4; CVE-2016-6645]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability note CVE-2016-7406 CVE-2016-7407 CVE-2016-7408

Dropbear: four vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Dropbear.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, Unix (platform) ~ not comprehensive.
Severity: 2/4.
Creation date: 28/07/2016.
Revision date: 26/09/2016.
Identifiers: CVE-2016-7406, CVE-2016-7407, CVE-2016-7408, CVE-2016-7409, DLA-634-1, FEDORA-2016-6de0b19b3b, openSUSE-SU-2016:1891-1, openSUSE-SU-2016:1917-1, VIGILANCE-VUL-20244.

Description of the vulnerability

Several vulnerabilities were announced in Dropbear.

An attacker can generate a format string attack via Message Printout, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-7406]

An attacker can use a vulnerability via dropbearconvert, in order to run code. [severity:2/4; CVE-2016-7407]

An attacker can use a vulnerability via dbclient, in order to run code. [severity:2/4; CVE-2016-7408]

An attacker can bypass security features via DEBUG_TRACE, in order to obtain sensitive information. [severity:1/4; CVE-2016-7409]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability CVE-2016-4583 CVE-2016-4584 CVE-2016-4585

WebKit: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of WebKit.
Impacted products: iOS by Apple, iPhone, Fedora, Ubuntu, Unix (platform) ~ not comprehensive, WebKit.
Severity: 3/4.
Creation date: 29/08/2016.
Identifiers: CVE-2016-4583, CVE-2016-4584, CVE-2016-4585, CVE-2016-4586, CVE-2016-4587, CVE-2016-4588, CVE-2016-4589, CVE-2016-4590, CVE-2016-4591, CVE-2016-4592, CVE-2016-4622, CVE-2016-4623, CVE-2016-4624, CVE-2016-4651, FEDORA-2016-4728dfe3ec, FEDORA-2016-d957ffbac1, HT206902, USN-3079-1, VIGILANCE-VUL-20480, WSA-2016-0005.

Description of the vulnerability

Several vulnerabilities were announced in WebKit.

An attacker can bypass security features via WebKit, in order to obtain sensitive information. [severity:2/4; CVE-2016-4587]

An attacker can bypass security features via WebKit, in order to obtain sensitive information. [severity:2/4; CVE-2016-4583]

An attacker can bypass security features via WebKit, in order to obtain sensitive information. [severity:2/4; CVE-2016-4591]

An attacker can use a vulnerability via WebKit, in order to run code. [severity:3/4; CVE-2016-4589]

An attacker can use a vulnerability via WebKit, in order to run code. [severity:3/4; CVE-2016-4622]

An attacker can use a vulnerability via WebKit, in order to run code. [severity:3/4; CVE-2016-4623]

An attacker can use a vulnerability via WebKit, in order to run code. [severity:3/4; CVE-2016-4624]

An attacker can trigger a fatal error via WebKit, in order to trigger a denial of service. [severity:2/4; CVE-2016-4592]

An attacker can trigger a Cross Site Scripting via WebKit JavaScript Bindings, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2016-4651]

An attacker can trigger a Cross Site Scripting via WebKit Page Loading, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2016-4585]

An attacker can use a vulnerability via WebKit Page Loading, in order to run code. [severity:3/4; CVE-2016-4584]

An attacker can bypass access restrictions via Safari, in order to alter website aspect. [severity:2/4; CVE-2016-4590]

An attacker can use a vulnerability, in order to run code. [severity:3/4; CVE-2016-4586]

An attacker can use a vulnerability, in order to run code. [severity:3/4; CVE-2016-4588]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability announce 20432

TrueCrypt: detecting hidden partition

Synthesis of the vulnerability

An attacker can detect hidden partitions of TrueCrypt.
Impacted products: Windows (platform) ~ not comprehensive, TrueCrypt, Unix (platform) ~ not comprehensive.
Severity: 1/4.
Creation date: 19/08/2016.
Identifiers: VIGILANCE-VUL-20432.

Description of the vulnerability

The TrueCrypt product can use hidden partitions.

However, an attacker can detect these partitions. Technical details are unknown.

An attacker can therefore detect hidden partitions of TrueCrypt.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability bulletin CVE-2016-6313

GnuPG: predicting 160 bits

Synthesis of the vulnerability

An attacker can use a vulnerability in the pseudo-random generator of GnuPG, in order to predict bits.
Impacted products: Debian, Fedora, GnuPG, Security Directory Server, openSUSE, openSUSE Leap, Solaris, RHEL, Slackware, Ubuntu, Unix (platform) ~ not comprehensive.
Severity: 2/4.
Creation date: 18/08/2016.
Identifiers: 2000347, bulletinoct2017, CVE-2016-6313, CVE-2016-6316-ERROR, DLA-600-1, DLA-602-1, DSA-3649-1, DSA-3650-1, FEDORA-2016-2b4ecfa79f, FEDORA-2016-3a0195918f, FEDORA-2016-81aab0aff9, FEDORA-2016-9864953aa3, openSUSE-SU-2016:2208-1, openSUSE-SU-2016:2423-1, RHSA-2016:2674-01, SSA:2016-236-01, SSA:2016-236-02, USN-3064-1, USN-3065-1, VIGILANCE-VUL-20413.

Description of the vulnerability

The GnuPG/Libgcrypt product uses a pseudo-random generator to generate series of bits, used by keys.

However, an attacker who can read 4640 successive bits can predict the 160 next bits.

Existing RSA keys are not weakened. Existing DSA / ElGamal keys should not be weakened. The editor thus recommends to not revoke existing keys.

An attacker can therefore use a vulnerability in the pseudo-random generator of GnuPG, in order to predict bits.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability alert CVE-2016-0782

Apache ActiveMQ: Cross Site Scripting via Web Console

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via Web Console of Apache ActiveMQ, in order to run JavaScript code in the context of the web site.
Impacted products: Unix (platform) ~ not comprehensive.
Severity: 2/4.
Creation date: 15/07/2016.
Identifiers: CVE-2016-0782, RHSA-2016:1424-01, VIGILANCE-VUL-20106.

Description of the vulnerability

The Apache ActiveMQ product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting via Web Console of Apache ActiveMQ, in order to run JavaScript code in the context of the web site.
Complete Vigil@nce bulletin.... (Free trial)

computer vulnerability announce 20077

GnuTLS: Man-in-the-Middle via p11-kit Trust Module

Synthesis of the vulnerability

An attacker can act as a Man-in-the-Middle with p11-kit Trust Module on GnuTLS, in order to read or write data in the session.
Impacted products: Fedora, Unix (platform) ~ not comprehensive.
Severity: 2/4.
Creation date: 12/07/2016.
Identifiers: FEDORA-2016-2a5046f726, FEDORA-2016-446eaaf618, FEDORA-2016-4738cb1a2c, GNUTLS-SA-2016-2, VIGILANCE-VUL-20077.

Description of the vulnerability

The GnuTLS product uses the TLS protocol, in order to create secure sessions.

However, the X.509 certificate and the service identity are not correctly checked by the p11-kit Trust Module.

An attacker can therefore act as a Man-in-the-Middle with p11-kit Trust Module on GnuTLS, in order to read or write data in the session.
Complete Vigil@nce bulletin.... (Free trial)

vulnerability bulletin CVE-2016-1854 CVE-2016-1855 CVE-2016-1856

WebKit: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of WebKit.
Impacted products: iOS by Apple, iPhone, Fedora, Ubuntu, Unix (platform) ~ not comprehensive, WebKit.
Severity: 3/4.
Creation date: 30/05/2016.
Identifiers: CVE-2016-1854, CVE-2016-1855, CVE-2016-1856, CVE-2016-1857, CVE-2016-1858, CVE-2016-1859, FEDORA-2016-c1f4334ded, FEDORA-2016-f5107c318e, HT206568, USN-3079-1, VIGILANCE-VUL-19723, WSA-2016-0004.

Description of the vulnerability

Several vulnerabilities were announced in WebKit.

An attacker can use a vulnerability, in order to run code. [severity:3/4; CVE-2016-1854]

An attacker can use a vulnerability, in order to run code. [severity:3/4; CVE-2016-1855]

An attacker can use a vulnerability, in order to run code. [severity:3/4; CVE-2016-1856]

An attacker can use a vulnerability, in order to run code. [severity:3/4; CVE-2016-1857]

An attacker can bypass security features, in order to obtain sensitive information. [severity:2/4; CVE-2016-1858]

An attacker can use a vulnerability via WebKit Canvas, in order to run code. [severity:3/4; CVE-2016-1859]
Complete Vigil@nce bulletin.... (Free trial)

vulnerability bulletin CVE-2015-0949

BIOS: privilege escalation via SMM

Synthesis of the vulnerability

A local privileged attacker can use SMM on some BIOS, in order to bypass Secure Boot or to flash the firmware.
Impacted products: BIG-IP Hardware, TMOS, Windows (platform) ~ not comprehensive, Unix (platform) ~ not comprehensive.
Severity: 1/4.
Creation date: 21/04/2016.
Identifiers: CVE-2015-0949, K04362926, SOL04362926, VIGILANCE-VUL-19433, VU#631788.

Description of the vulnerability

The BIOS can use the SMM (System Management Mode) mode.

However, some BIOS implementations allow access outside the SMRAM memory.

A local privileged attacker can therefore use SMM on some BIOS, in order to bypass Secure Boot or to flash the firmware.
Complete Vigil@nce bulletin.... (Free trial)
Our database contains other pages. You can request a free trial to read them.