CERT Recently Published Vulnerability Notes
2015-08-07T18:41:16-04:00
CERT
cert@cert.org
http://www.cert.org/
http://www.cert.org/
CERT publishes vulnerability advisories called "Vulnerability Notes." Vulnerability Notes include summaries, technical details, remediation information, and lists of affected vendors. Many vulnerability notes are the result of private coordination and disclosure efforts.
CERTcert@cert.orgVU#628568: Sierra Wireless GX, ES, and LS gateways running ALEOS contains hard-coded credentialshttp://www.kb.cert.org/vuls/id/6285682015-08-07T18:41:16-04:002015-08-07T18:41:16-04:00Sierra Wireless GX,ES,and LS gateway devices running ALEOS versions 4.4.1 and earlier contain hard-coded credentials. <h1>Vulnerability Note VU#628568</h1>
<h2>Sierra Wireless GX, ES, and LS gateways running ALEOS contains hard-coded credentials</h2>
<p class="meta-text">Original Release date: 07 Aug 2015 | Last revised: 07 Aug 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>Sierra Wireless GX, ES, and LS gateway devices running ALEOS versions 4.4.1 and earlier contain hard-coded credentials.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><a href="http://cwe.mitre.org/data/definitions/259.html"><b>CWE-259</b></a><b>: Use of Hard-coded Password -</b> CVE-2015-2897
<p>Sierra Wireless devices running ALEOS, including AirLink GX, ES, and LS gateways, contain multiple hard-coded accounts with root privileges. These accounts are enabled by default and accessible by telnet or SSH in systems using ALEOS 4.3.4 or earlier. The accounts also exist and are enabled in versions 4.3.5 to 4.4.1, though remote access is disabled by default.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>A remote, unauthenticated attacker may be able to gain full control of an affected device.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an update</b><br>
<br>
Sierra Wireless has released <a href="http://source.sierrawireless.com/resources/airlink/software_reference_docs/release-notes/aleos-4,-d-,4,-d-,2-release-notes/#">version 4.4.2</a> to address this issue by disabling access to the hard-coded accounts by default. Users unable or unwilling to update may also consider the following workaround.</p></td></tr></table>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table" style="padding-top: 15px;"><tr><td><p><b>Restrict access</b><br>
<br>
As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from using credentials from a blocked network location.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Sierra Wireless</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9YHNPA" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">17 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">03 Aug 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23628568 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">9.0</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:N/AC:L/Au:S/C:C/I:C/A:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">7.0</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:POC/RL:OF/RC:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">6.2</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:MH/TD:M/CR:ND/IR:H/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="http://source.sierrawireless.com/resources/airlink/aleos_af/aleos_af_home/">http://source.sierrawireless.com/resources/airlink/aleos_af/aleos_af_home/</a></li>
<li><a href="http://source.sierrawireless.com/resources/airlink/software_reference_docs/release-notes/aleos-4,-d-,4,-d-,2-release-notes/">http://source.sierrawireless.com/resources/airlink/software_reference_docs/release-notes/aleos-4,-d-,4,-d-,2-release-notes/</a></li>
<li><a href="http://cwe.mitre.org/data/definitions/259.html">http://cwe.mitre.org/data/definitions/259.html</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>Thanks to the reporter who wishes to remain anonymous.</p>
<p>This document was written by Joel Land.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span><A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2897">CVE-2015-2897</A></span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>07 Aug 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>07 Aug 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>07 Aug 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>30</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23628568 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#360431: Chiyu Technology fingerprint access control contains multiple vulnerabilitieshttp://www.kb.cert.org/vuls/id/3604312015-07-31T14:29:16-04:002015-07-31T14:29:16-04:00Multiple models of Chiyu Technology fingerprint access control devices contain a cross-site scripting(XSS)vulnerability and an authentication bypass vulnerability. <h1>Vulnerability Note VU#360431</h1>
<h2>Chiyu Technology fingerprint access control contains multiple vulnerabilities</h2>
<p class="meta-text">Original Release date: 31 Jul 2015 | Last revised: 31 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>Multiple models of Chiyu Technology fingerprint access control devices contain a cross-site scripting (XSS) vulnerability and an authentication bypass vulnerability.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><a href="http://cwe.mitre.org/data/definitions/80.html"><b>CWE-80</b></a><b>: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) </b><b>- </b>CVE-2015-2870
<p>According to the reporter, <tt><script></tt> tags are not filtered out of a URL passed to the device, allowing an attacker to perform a reflected XSS attack.<br>
<br>
<a href="http://cwe.mitre.org/data/definitions/288.html"><b>CWE-288</b></a><b>: Authentication Bypass Using an Alternate Path or Channel </b><b>- </b>CVE-2015-2871<br>
<br>
According to the reporter, an attacker can view and modify the existing configuration of the device without authentication by directly accessing known paths. The path varies slightly depending on model and services available.<br>
<br>
Model BF-660C:<br>
<br>
<tt>http://<host>/net.htm</tt> - Communication settings<br>
<br>
Model BF-630, BF-630W:<br>
<br>
<tt>http://<host>/voice.htm</tt> - Voice Time Set<br>
<tt>http://<host>/bf.htm</tt> - UniFinger Setup<br>
<br>
The reporter has identified models BF-660C, BF-630, BF-630W as being vulnerable; other models may also be vulnerable.<br>
<br>
The CERT/CC has been unable to verify this information with the vendor.<br>
<br>
The CVSS score below is based on CVE-2015-2871.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>An unauthenticated remote attacker may be able to view or modify device configuration, or obtain user credentials.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>The CERT/CC is currently unaware of a practical solution to this problem.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Chiyu Technologies</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9Y7T8Q" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">03 Jun 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">07 Jul 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23360431 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">7.5</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:N/AC:L/Au:N/C:P/I:P/A:P</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">6.4</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:POC/RL:U/RC:UR</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">4.8</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:ND/TD:M/CR:ND/IR:ND/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="http://cwe.mitre.org/data/definitions/80.html">http://cwe.mitre.org/data/definitions/80.html</a></li>
<li><a href="http://cwe.mitre.org/data/definitions/288.html">http://cwe.mitre.org/data/definitions/288.html</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>Thanks to Maxim Rupp for reporting this vulnerability to us.</p>
<p>This document was written by Garret Wassermann.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span><A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2870">CVE-2015-2870</A>
<A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2871">CVE-2015-2871</A></span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>31 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>31 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>31 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>28</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23360431 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#577140: BIOS implementations fail to properly set UEFI write protections after waking from sleep modehttp://www.kb.cert.org/vuls/id/5771402015-07-30T16:03:19-04:002015-07-30T16:03:19-04:00Multiple BIOS implementations fail to properly set write protections after waking from sleep,leading to the possibility of an arbitrary BIOS image reflash. <h1>Vulnerability Note VU#577140</h1>
<h2>BIOS implementations fail to properly set UEFI write protections after waking from sleep mode</h2>
<p class="meta-text">Original Release date: 30 Jul 2015 | Last revised: 30 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>Multiple BIOS implementations fail to properly set write protections after waking from sleep, leading to the possibility of an arbitrary BIOS image reflash.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>According to Cornwell, Butterworth, Kovah, and Kallenberg, who reported the issue affecting certain Dell client systems (CVE-2015-2890):
<ul>
<p><i>There are a number of chipset mechanisms on Intel x86-based computers that provide protection of the BIOS from arbitrary reflash with attacker-controlled data. One of these is the BIOSLE and BIOSWE pair of bits found in the BIOS_CNTL register in the chipset. When the BIOSLE bit is set, the protection mechanism is enabled. The BIOS_CNTL is reset to its default value after a system reset. By default, the BIOSLE bit of the BIOS_CNTL register is cleared (disabled). The BIOS is responsible for re-enabling it after a reset. When a system goes to sleep and then wakes up, this is considered a reset from the hardware's point of view.<br>
<br>
Therefore, the BIOS_CNTL register must be reconfigured after waking from sleep. In a normal boot, the BIOS_CNTL is properly configured. However, in some instances BIOS makers do not properly re-set BIOS_CNTL bits upon wakeup. Therefore, an attacker is free to reflash the BIOS with an arbitrary image simply by forcing the system to go to sleep and wakes again. This bypasses the enforcement of signed updates or any other vendor mechanisms for protecting the BIOS from an arbitary reflash.<br>
</i></ul>
A similar issue <a href="https://support.apple.com/en-us/HT204934">affecting Apple systems</a> (CVE-2015-3692) involves the <tt>FLOCKDN</tt> bit remaining unset after waking from sleep. For more information, refer to Pedro Vilaça's <a href="https://reverse.put.as/2015/05/29/the-empire-strikes-back-apple-how-your-mac-firmware-security-is-completely-broken/">blog disclosure</a>.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>A privileged attacker with console access can reflash the BIOS of affected systems to an arbitrary image.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an update</b><br>
<br>
Refer to the Vendor Information section below for a list of affected Dell products, and <a href="http://support.dell.com/">visit their support page</a> to download updates. Apple updates addressing this issue have been pushed via the App Store beginning June 30, 2015. We are continuing to communicate with vendors as they investigate this vulnerability.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Apple</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/JLAD-9YFFSD" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">01 Jun 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">30 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Dell Computer Corporation, Inc.</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9XXQ9L" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">29 Jun 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">30 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">American Megatrends Incorporated (AMI)</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9YGNUC" title="View Vendor Information">Unknown</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">AsusTek Computer Inc.</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9YGNUJ" title="View Vendor Information">Unknown</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Hewlett-Packard Company</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9YGNUM" title="View Vendor Information">Unknown</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">IBM Corporation</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9YGNUP" title="View Vendor Information">Unknown</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Insyde Software Corporation</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9YGNUT" title="View Vendor Information">Unknown</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Intel Corporation</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9YGNUX" title="View Vendor Information">Unknown</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Lenovo</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9YGNV2" title="View Vendor Information">Unknown</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Phoenix Technologies Ltd.</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9YGNV5" title="View Vendor Information">Unknown</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Sony Corporation</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9YGNV9" title="View Vendor Information">Unknown</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Toshiba America Information Systems, Inc.</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9YGNVB" title="View Vendor Information">Unknown</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23577140 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">6.8</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:L/AC:L/Au:S/C:C/I:C/A:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">5.3</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:POC/RL:OF/RC:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">7.2</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:MH/TD:H/CR:ND/IR:H/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="https://reverse.put.as/2015/05/29/the-empire-strikes-back-apple-how-your-mac-firmware-security-is-completely-broken/">https://reverse.put.as/2015/05/29/the-empire-strikes-back-apple-how-your-mac-firmware-security-is-completely-broken/</a></li>
<li><a href="https://support.apple.com/en-us/HT204934">https://support.apple.com/en-us/HT204934</a></li>
<li><a href="http://support.dell.com/">http://support.dell.com/</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>Thanks to Sam Cornwell, John Butterworth, Xeno Kovah, and Corey Kallenberg for reporting this vulnerability in Dell products, and to Pedro Vilaça for disclosing the issue in Apple products.</p>
<p>This document was written by Joel Land.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span><A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2890">CVE-2015-2890</A>
<A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3692">CVE-2015-3692</A></span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>30 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>30 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>30 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>29</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23577140 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#924951: Android Stagefright contains multiple vulnerabilitieshttp://www.kb.cert.org/vuls/id/9249512015-07-28T15:11:16-04:002015-08-07T15:11:16-04:00Stagefright is the media playback service for Android,introduced in Android 2.2(Froyo). Stagefright in versions of Android prior to 5.1.1_r9 may contain multiple vulnerabilities,including several integer overflows,which may allow a remote attacker to execute code on the device. <h1>Vulnerability Note VU#924951</h1>
<h2>Android Stagefright contains multiple vulnerabilities</h2>
<p class="meta-text">Original Release date: 28 Jul 2015 | Last revised: 07 Aug 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p><a href="http://source.android.com/devices/media.html">Stagefright</a> is the media playback service for Android, introduced in Android 2.2 (Froyo). Stagefright in versions of Android prior to 5.1.1_r9 may contain multiple vulnerabilities, including several integer overflows, which may allow a remote attacker to execute code on the device.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>According to a Zimperium zLabs <a href="http://blog.zimperium.com/experts-found-a-unicorn-in-the-heart-of-android/">blog post</a>, Android's <a href="http://blog.zimperium.com/the-biggest-splash-at-blackhat-and-defcon-2015/"></a>Stagefright engine contains multiple vulnerabilities, including several integer overflows, allowing a remote attacker to access files or possibly execute code on the device. This vulnerability may at least partially affect all versions of Android starting from 2.2 (Froyo) and prior to 5.1.1_r9 (Lollipop).
<p>An attacker with a victim's cell phone number may send maliciously crafted multimedia messages (MMS) which may be improperly parsed by the Stagefright tool. Other attack vectors may be possible.<br>
<br>
According to <a href="http://arstechnica.com/security/2015/07/950-million-android-phones-can-be-hijacked-by-malicious-text-messages/">Ars Technica</a>, "successful exploits at the very least provide direct access to a phone's audio and camera feeds and to the external storage ... many older phones grant elevated system privileges to Stagefright code, a design that could allow attackers access to many more device resources."<br>
<br>
Zimperium has released <a href="https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/">more information</a> on these vulnerabilities, including a proof of concept code, patches, a video demoing the exploit and an Android app that detects the vulnerability.<br>
<br>
The vulnerabilities include:<br>
1. <font size="4">CVE-2015-1538, P0006, Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution</font><br>
2. <font size="4">CVE-2015-1538, P0004, Google Stagefright ‘ctts’ MP4 Atom Integer Overflow Remote Code Execution</font><br>
3. <font size="4">CVE-2015-1538, P0004, Google Stagefright ‘stts’ MP4 Atom Integer Overflow Remote Code Execution</font><br>
4. <font size="4">CVE-2015-1538, P0004, Google Stagefright ‘stss’ MP4 Atom Integer Overflow Remote Code Execution</font><br>
5. <font size="4">CVE-2015-1539, P0007, Google Stagefright ‘esds’ MP4 Atom Integer Underflow Remote Code Execution</font><br>
6. <font size="4">CVE-2015-3827, P0008, Google Stagefright ‘covr’ MP4 Atom Integer Underflow Remote Code Execution</font><br>
7. <font size="4">CVE-2015-3826, P0009, Google Stagefright 3GPP Metadata Buffer Overread</font><br>
8. <font size="4">CVE-2015-3828, P0010, Google Stagefright 3GPP Integer Underflow Remote Code Execution</font><br>
9. <font size="4">CVE-2015-3824, P0011, Google Stagefright ‘tx3g’ MP4 Atom Integer Overflow Remote Code Execution</font><br>
10. <font size="4">CVE-2015-3829, P0012, Google Stagefright ‘covr’ MP4 Atom Integer Overflow Remote Code Execution</font><br>
<br>
Since integer overflow is a type of memory error, Address Space Layout Randomization (ASLR) appears to partially mitigate this issue; <a href="http://www.forbes.com/sites/thomasbrewster/2015/07/27/android-text-attacks/">Forbes</a> reports that Android before 4.1 (Jelly Bean) have "inadequate exploit mitigations<font size="4">." </font><a href="https://developer.android.com/about/versions/android-4.0-highlights.html">ASLR</a> was introduced in Android 4.0 and <a href="https://www.duosecurity.com/blog/exploit-mitigations-in-android-jelly-bean-4-1">fully enabled</a> in Android 4.1.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>A remote attacker may be able to execute code on the Android device.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an update</b><br>
<br>
The Android Open Source Project (AOSP) has released <a href="https://developers.google.com/android/nexus/images">Android 5.1.1_r9</a> to address this issue. Currently this update is only available for Nexus and <a href="http://www.sammobile.com/2015/08/06/stagefright-fix-for-the-galaxy-s6-galaxy-s5-and-galaxy-note-4-released-by-att/">Samsung</a> phones.<br>
<br>
In the US, cell phone carriers largely control the updating process. The update may or may not be available for your phone. Contact your cell phone carrier or manufacturer for update information.<br>
<br>
Alternatively, the vulnerability may be mitigated by the following workarounds:</p></td></tr></table>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table" style="padding-top: 15px;"><tr><td><p><b>Block all text messages from unknown senders</b><br>
<br>
Blocking all text messages from unknown senders in your default text message handling app may mitigate this issue.<br>
<br>
<b>Turn off "Auto Retrieve" for multimedia messages</b>
<p>If your default text messaging app does not allow blocking of senders, you may also disable the auto retrieve feature for multimedia messages. This may prevent the autoloading of MMS content into Stagefright.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Amazon</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9YUSLW" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">28 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Barnes and Noble</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9YUSM2" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">28 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Google</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9YUQ62" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">28 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">HTC</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9YUSLU" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">28 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Huawei Technologies</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9YUSLP" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">28 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Kyocera Communications</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9YUSMA" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">28 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">LG Electronics</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9YUSMD" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">28 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Motorola, Inc.</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9YUSMF" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">28 Jul 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Samsung Mobile</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9YUSMR" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">07 Aug 2015</td></tr>
<tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Sony Corporation</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9YUSMT" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">28 Jul 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23924951 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">5.8</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:N/AC:M/Au:N/C:P/I:P/A:N</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">4.7</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:POC/RL:W/RC:UR</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">3.5</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:ND/TD:M/CR:ND/IR:ND/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/">https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/</a></li>
<li><a href="http://blog.zimperium.com/experts-found-a-unicorn-in-the-heart-of-android/">http://blog.zimperium.com/experts-found-a-unicorn-in-the-heart-of-android/</a></li>
<li><a href="http://www.forbes.com/sites/thomasbrewster/2015/07/27/android-text-attacks/">http://www.forbes.com/sites/thomasbrewster/2015/07/27/android-text-attacks/</a></li>
<li><a href="http://www.zdnet.com/article/stagefright-just-how-scary-is-it-for-android-users/">http://www.zdnet.com/article/stagefright-just-how-scary-is-it-for-android-users/</a></li>
<li><a href="http://arstechnica.com/security/2015/07/950-million-android-phones-can-be-hijacked-by-malicious-text-messages/">http://arstechnica.com/security/2015/07/950-million-android-phones-can-be-hijacked-by-malicious-text-messages/</a></li>
<li><a href="https://android.googlesource.com/platform/frameworks/av/+/0e4e5a8%5E!/">https://android.googlesource.com/platform/frameworks/av/+/0e4e5a8%5E!/</a></li>
<li><a href="https://android.googlesource.com/platform/frameworks/av/+/5c134e6%5E!/">https://android.googlesource.com/platform/frameworks/av/+/5c134e6%5E!/</a></li>
<li><a href="https://android.googlesource.com/platform/frameworks/av/+/030d8d0%5E!/">https://android.googlesource.com/platform/frameworks/av/+/030d8d0%5E!/</a></li>
<li><a href="http://source.android.com/devices/media.html">http://source.android.com/devices/media.html</a></li>
<li><a href="https://developers.google.com/android/nexus/images">https://developers.google.com/android/nexus/images</a></li>
<li><a href="https://www.duosecurity.com/blog/exploit-mitigations-in-android-jelly-bean-4-1">https://www.duosecurity.com/blog/exploit-mitigations-in-android-jelly-bean-4-1</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>Thanks to Joshua Drake at Zimperium’s zLabs for working with Google to develop patches and publicly disclose these vulnerabilities.</p>
<p>This document was written by Garret Wassermann.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span><A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538">CVE-2015-1538</A>
<A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1539">CVE-2015-1539</A>
<A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3824">CVE-2015-3824</A>
<A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3826">CVE-2015-3826</A>
<A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3827">CVE-2015-3827</A>
<A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3828">CVE-2015-3828</A>
<A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3829">CVE-2015-3829</A></span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>21 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>28 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>07 Aug 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>90</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23924951 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#819439: Fiat Chrysler Automobiles UConnect allows a vehicle to be remotely controlledhttp://www.kb.cert.org/vuls/id/8194392015-07-24T11:31:16-04:002015-07-27T11:31:16-04:00Fiat Chrysler Automobiles(FCA)UConnect may allow a remote attacker to control physical vehicle functions. <h1>Vulnerability Note VU#819439</h1>
<h2>Fiat Chrysler Automobiles UConnect allows a vehicle to be remotely controlled</h2>
<p class="meta-text">Original Release date: 24 Jul 2015 | Last revised: 27 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>Fiat Chrysler Automobiles (FCA) UConnect may allow a remote attacker to control physical vehicle functions.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>According to a <a href="http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/">WIRED news article</a>, an unknown vulnerability in FCA UConnect software allows some functions of recent models of Jeep Cherokee to be controlled by a remote attacker. Other FCA makes (including Chrysler, Dodge, and Ram) that use UConnect may also be vulnerable.
<p>FCA with the National Highway and Transportation Safety Administration (NHTSA) has initiated a <a href="http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483033/RCAK-15V461-4967.pdf">safety recall</a> (NHTSA campaign 15V461000, "Radio Software Security Vulnerabilities") for all possibly affected makes and models:<br>
<ul type="disc">
<li>2013-2015 Ram 1500 Pickup
<li>2013-2015 Ram 3500 Cab Chassis
<li>2013-2015 Ram 2500 Pickup
<li>2013-2015 Ram 3500 Pickup
<li>2013-2015 Ram 4500/5500 Cab Chassis
<li>2013-2015 Dodge Viper
<li>2014-2015 Jeep Cherokee
<li>2014-2015 Jeep Grand Cherokee
<li>2014-2015 Dodge Durango
<li>2015 Chrysler 200s
<li>2015 Chrysler 300s
<li>2015 Dodge Challenger
<li>2015 Dodge Charger</ul>
<br>
For more information, see NHTSA's <a href="http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483036/RCLRPT-15V461-9407.pdf">report</a> and the <a href="http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483034/RMISC-15V461-1264.pdf">chronology</a> of events leading to the recall.<br>
<br>
It appears that some UConnect systems were configured with services listening on the Sprint mobile network. An attacker would have to have access to the Sprint mobile network.<br>
<br>
FCA vehicles are designed with safety systems that mitigate, but do not completely prevent, this type of attack.<br>
<br>
The paper <a href="http://www.autosec.org/pubs/cars-usenixsec2011.pdf"><i>Comprehensive Experimental Analyses of Automotive Attack Surfaces</i></a>, published in 2011, documents similar research, including successful experiments gaining remote control of physical vehicle functions.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>A remote attacker could control some physical functions of a vulnerable vehicle, potentially causing significant physical damage and serious or fatal injury.<br>
<br>
The WIRED article states that the researchers were able to remotely disable the transmission, and that the car had to be stopped and restarted to restore normal operation. WIRED also reports:<br>
<ul>Miller and Valasek’s full arsenal includes functions that at lower speeds fully kill the engine, abruptly engage the brakes, or disable them altogether. The researchers say they’re working on perfecting their steering control—for now they can only hijack the wheel when the Jeep is in reverse. Their hack enables surveillance too: They can track a targeted Jeep’s GPS coordinates, measure its speed, and even drop pins on a map to trace its route.<br>
</ul>
Furthermore, an attacker could remotely control "...the air-conditioning, radio, and windshield wipers."<br>
<br>
An FCA<a href="http://blog.fcanorthamerica.com/2015/07/22/unhacking-the-hacked-jeep/"> blog post</a> states that the researchers could "...remotely controlled some functions..." but that "To FCA’s knowledge, <i>there has not been a single real world incident of an unlawful or unauthorized remote hack</i> into any FCA vehicle."</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an update</b><br>
<br>
FCA has provided an <a href="http://www.driveuconnect.com/software-update/">update</a> to address this vulnerabilities, and has initiated a <a href="http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483033/RCAK-15V461-4967.pdf">safety recall</a> (NHTSA campaign 15V461000). Owners of affected models are advised to update their vehicle's UConnect software immediately. Owners can perform the update themselves or take their vehicle to a dealer to perform the update free of charge. For more information on obtaining the update or finding out if your vehicle is affected, please see FCA's <a href="http://media.fcanorthamerica.com/newsrelease.do?&id=16827&mid=1">news release</a> and the recall notice at <a href="http://www.safercar.gov/Vehicle+Owners">safercar.gov</a>.<br>
<br>
Technical Service Bulletin (TSB)<a href="http://wk2jeeps.com/tsb/tsb_wk2_0807215.pdf"> 08-072-15</a> includes a fix for "Improved Radio security protection to reduce the potential risk of unauthorized and unlawful access to vehicle systems." The UConnect update, among other things, changes the configuration to close the listening services.<br>
<br>
For 2013-2014 model years, update to UConnect radio version 15.26.1 or higher. For 2015 model years, update to UConnect radio version 15.17.5 or higher.<br>
<br>
<b>Restrict network access</b><br>
<br>
Additionally, FCA provided the following statement:<br>
<ul>FCA US has applied network-level security measures to prevent the type of remote manipulation demonstrated in a recent media report. These measures – which required no customer or dealer actions – block remote access to certain vehicle systems and were fully tested and implemented within the cellular network on July 23, 2015.</p></td></tr></table>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table" style="padding-top: 15px;"><tr><td><p><b>Threat modeling and secure architecture</b></ul>
<br>
<br>
Complex software systems contain latent vulnerabilities. Updating software to resolve vulnerabilities as they are discovered is a necessary but insufficient defensive activity. Complex, safety-critical software systems require resilient, secure design considerations.<br>
<br>
Vehicle manufacturers should use threat models that consider skilled and potentially well-funded attackers and remote network communications. Manufacturers should also design vehicle networks to isolate or carefully limit access to safety critical systems from telematics, infotainment, diagnostic and remote communications systems.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Fiat Chrysler Automobiles</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9YQLYH" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">27 Jul 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23819439 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">8.5</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:N/AC:M/Au:S/C:C/I:C/A:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">6.7</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:POC/RL:OF/RC:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">6.2</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:H/TD:M/CR:M/IR:H/AR:H</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483033/RCAK-15V461-4967.pdf">http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483033/RCAK-15V461-4967.pdf</a></li>
<li><a href="http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483036/RCLRPT-15V461-9407.pdf">http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483036/RCLRPT-15V461-9407.pdf</a></li>
<li><a href="http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483034/RMISC-15V461-1264.pdf">http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483034/RMISC-15V461-1264.pdf</a></li>
<li><a href="http://www.safercar.gov/Vehicle+Owners">http://www.safercar.gov/Vehicle+Owners</a></li>
<li><a href="http://media.fcanorthamerica.com/newsrelease.do?&id=16827&mid=1">http://media.fcanorthamerica.com/newsrelease.do?&id=16827&mid=1</a></li>
<li><a href="http://wk2jeeps.com/tsb/tsb_wk2_0807215.pdf">http://wk2jeeps.com/tsb/tsb_wk2_0807215.pdf</a></li>
<li><a href="http://wk2jeeps.com/tsb/tsb_wk2_0803115a.pdf">http://wk2jeeps.com/tsb/tsb_wk2_0803115a.pdf</a></li>
<li><a href="http://blog.fcanorthamerica.com/2015/07/22/unhacking-the-hacked-jeep/">http://blog.fcanorthamerica.com/2015/07/22/unhacking-the-hacked-jeep/</a></li>
<li><a href="https://ics-cert.us-cert.gov/alerts/ICS-ALERT-15-203-01">https://ics-cert.us-cert.gov/alerts/ICS-ALERT-15-203-01</a></li>
<li><a href="http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/">http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/</a></li>
<li><a href="http://www.wired.com/2015/07/patch-chrysler-vehicle-now-wireless-hacking-technique/">http://www.wired.com/2015/07/patch-chrysler-vehicle-now-wireless-hacking-technique/</a></li>
<li><a href="http://www.driveuconnect.com/software-update/">http://www.driveuconnect.com/software-update/</a></li>
<li><a href="http://www.autosec.org/pubs/cars-usenixsec2011.pdf">http://www.autosec.org/pubs/cars-usenixsec2011.pdf</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>This vulnerability was publicly demonstrated by Charlie Miller and Chris Valasek, and initially reported by WIRED magazine. Thanks to FCA for quickly working with us to issue this vulnerability note.</p>
<p>This document was written by Garret Wassermann and Art Manion.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span>Unknown</span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>21 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>24 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>27 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>70</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23819439 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#857948: Honeywell Tuxedo Touch Controller contains multiple vulnerabilitieshttp://www.kb.cert.org/vuls/id/8579482015-07-24T14:17:17-04:002015-07-24T14:17:17-04:00All versions of Honeywell Tuxedo Touch Controller are vulnerable to authentication bypass and cross-site request forgery(CSRF). <h1>Vulnerability Note VU#857948</h1>
<h2>Honeywell Tuxedo Touch Controller contains multiple vulnerabilities</h2>
<p class="meta-text">Original Release date: 24 Jul 2015 | Last revised: 24 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>All versions of Honeywell Tuxedo Touch Controller are vulnerable to authentication bypass and cross-site request forgery (CSRF).</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><a href="https://cwe.mitre.org/data/definitions/603.html"><b>CWE-603</b></a><b>: Use of Client-Side Authentication - </b>CVE-2015-2847
<p>The Honeywell Tuxedo Touch Controller web interface uses JavaScript to check for client authentication and redirect unauthorized users to a login page. By intercepting and dropping requests containing the string <font face="Courier New">USERACCT=USERNAME:_,PASSWORD:_</font>, an unauthenticated user may bypass authentication and access restricted pages.<br>
<br>
<a href="https://cwe.mitre.org/data/definitions/352.html"><b>CWE-353</b></a><b>: Cross-Site Request Forgery (CSRF) - </b>CVE-2015-2848<br>
<br>
Honeywell Tuxedo Touch Controller contains a global cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. Note that these actions may include issuing commands to home automation devices controlled by the Tuxedo Touch Controller, such as unlocking or locking doors.<br>
<br>
The CVSS score reflects CVE-2015-2848.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>A remote, unauthenticated attacker may be able to bypass authentication checks to view restricted pages, or trick an authenticated user into making an unintentional request to the web server which will be treated as an authentic request. Compromised Tuxedo Touch Controllers may be leveraged to operate home automation devices, such as unlocking or locking doors.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an update</b><br>
<br>
Honeywell has released <a href="http://www.tuxedotouchtoolkit.com/software-downloads/tuxedo-touch/index.html">firmware version TUXW_V5.2.19.0_VA</a> to address these vulnerabilities. Since all prior firmware versions are affected, users are strongly encouraged to update their devices.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Honeywell</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9WJGMF" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">15 May 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jun 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23857948 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">6.8</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:N/AC:M/Au:N/C:P/I:P/A:P</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">5.3</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:POC/RL:OF/RC:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">1.8</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:LM/TD:L/CR:ND/IR:H/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="http://www.tuxedotouchtoolkit.com/software-downloads/tuxedo-touch/index.html">http://www.tuxedotouchtoolkit.com/software-downloads/tuxedo-touch/index.html</a></li>
<li><a href="http://www.tuxedotouchtoolkit.com/">http://www.tuxedotouchtoolkit.com/</a></li>
<li><a href="https://cwe.mitre.org/data/definitions/603.html">https://cwe.mitre.org/data/definitions/603.html</a></li>
<li><a href="https://cwe.mitre.org/data/definitions/352.html">https://cwe.mitre.org/data/definitions/352.html</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>Thanks to Maxim Rupp for reporting this vulnerability.</p>
<p>This document was written by Joel Land.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span><A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2847">CVE-2015-2847</A>
<A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2848">CVE-2015-2848</A></span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>24 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>24 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>24 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>17</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23857948 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#912036: N-Able RSMWinService contains hard coded security constants allowing decryption of domain administrator passwordhttp://www.kb.cert.org/vuls/id/9120362015-07-20T15:22:58-04:002015-07-20T15:22:58-04:00SolarWinds N-Able N-Central is an agent-based enterprise support and management solution. N-Able N-Central contains several hard-coded encryption constants in the web interface that allow decryption of the password when combined. <h1>Vulnerability Note VU#912036</h1>
<h2>N-Able RSMWinService contains hard coded security constants allowing decryption of domain administrator password</h2>
<p class="meta-text">Original Release date: 20 Jul 2015 | Last revised: 20 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>SolarWinds N-Able N-Central is an agent-based enterprise support and management solution. N-Able N-Central contains several hard-coded encryption constants in the web interface that allow decryption of the password when combined.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><a href="http://cwe.mitre.org/data/definitions/547.html"><b>CWE-547</b></a><b>: Use of Hard-coded, Security-relevant Constants</b>
<p>N-Able N-Central's RSM service stores the N-Able domain administrator account password in an encrypted (AES128) format. According to the reporter, however, the encrypted password is accessible by any authenticated local or remote user from within from the RSM web page source. The credentials are also available in an encrypted format via local RSM configuration files accessible by any local user with rights to browse program files. The encryption keys as well as other parameters needed for decryption are hard-coded and may be extracted from the N-Able RSM software stored on the local users system. An attacker can use this information to decrypt and obtain the domain administrator password used by the N-Able software.<br>
<br>
The reporter states that N-Able N-Central version 9.5.0 is vulnerable to these problems, and version 9.0 through 9.4 may also be vulnerable.<br>
<br>
The CERT/CC has been unable to confirm these vulnerabilities with SolarWinds.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>According to the reporter, a remote attacker with domain user credentials or access to RSM files on an installed system can obtain domain administrator access.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an Update</b><br>
<br>
According to the reporter, N-Able Support Manager Build 178 and N-Able N-Central Agent version 9.5.1.4514 or above, or 10.0.0.1722 or above, have addressed remote access to this issue. Users are encouraged to update N-Able software as soon as possible.<br>
<br>
The CERT/CC has been unable to confirm with SolarWinds that this update fully addresses these issues.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">SOLARWINDS</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9X7KJJ" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">05 Jun 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">01 Jul 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23912036 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">7.7</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:A/AC:L/Au:S/C:C/I:C/A:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">6.6</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:POC/RL:U/RC:UR</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">4.9</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:ND/TD:M/CR:ND/IR:ND/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li>None</li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>Thanks to Gary Blosser for reporting this vulnerability to us.</p>
<p>This document was written by Garret Wassermann.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span>Unknown</span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>20 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>20 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>20 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>43</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23912036 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#813631: Total Commander File Info plugin vulnerable to denial of service via an out-of-bounds readhttp://www.kb.cert.org/vuls/id/8136312015-07-20T10:18:59-04:002015-07-20T10:18:59-04:00Total Commander's File Info plugin version 2.21 attempts an out-of-bounds read when reading a file carefully crafted by an attacker. <h1>Vulnerability Note VU#813631</h1>
<h2>Total Commander File Info plugin vulnerable to denial of service via an out-of-bounds read</h2>
<p class="meta-text">Original Release date: 20 Jul 2015 | Last revised: 20 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>Total Commander's File Info plugin version 2.21 attempts an out-of-bounds read when reading a file carefully crafted by an attacker.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><a href="http://cwe.mitre.org/data/definitions/125.html"><b>CWE-125</b></a><b>: Out-of-bounds Read</b> - CVE-2015-2869
<p>An attacker that can control the contents of certain file types may be able to cause an out-of-bounds read error in Total Commander File Plugin version 2.21 by specifying overly large values of certain properties. An attacker who successfully exploits this vulnerability may cause the Total Commander application to unexpectedly terminate.<br>
<br>
This attack has been noted in at least two different file types due to the software's improper use of the <tt>strncmp</tt> function.
<li type="disc">COFF Archive Library (.lib) files may be used by specifying overly large values for the 'Size' field of the Archive Member Header or the "Number Of Symbols" field in the 1st Linker Member.
<li type="disc">Linear Executable files may be used by specifying overly large values for the "Resource Table Count" field of the LE Header or the "Object" field at offset 0x8 from a "Resource Table Entry".<br>
<br>
Out-of-bounds reads may allow remote code execution in some circumstances; the CERT/CC is currently unaware of such an attack on the Total Commander File Info plugin, however.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>An attacker may be able to cause the application to terminate.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an update</b><br>
<br>
Total Commander File Info plugin has released version 2.22, which addresses this issue. Affected users are encouraged to update as soon as possible</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Total Commander File Info Plugin</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9YGQCG" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">16 Jul 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23813631 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">4.7</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:L/AC:M/Au:N/C:N/I:N/A:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">3.7</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:POC/RL:OF/RC:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">0.9</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:ND/TD:L/CR:ND/IR:ND/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="http://blogs.cisco.com/security/talos/fileinfo-plugin-dos">http://blogs.cisco.com/security/talos/fileinfo-plugin-dos</a></li>
<li><a href="http://totalcmd.net/plugring/fileinfo.html">http://totalcmd.net/plugring/fileinfo.html</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>Thanks to Cisco TALOS for reporting this vulnerability to us. Cisco Talos credits Marcin Noga for discovering this vulnerability.</p>
<p>This document was written by Garret Wassermann.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span><A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2869">CVE-2015-2869</A></span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>16 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>20 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>20 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>36</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23813631 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#919604: Kaseya Virtual System Administrator contains multiple vulnerabilitieshttp://www.kb.cert.org/vuls/id/9196042015-07-13T13:10:54-04:002015-07-13T13:10:54-04:00Kaseya Virtual System Administrator(VSA),versions R9 and possibly earlier,contains arbitrary file download and open redirect vulnerabilities. <h1>Vulnerability Note VU#919604</h1>
<h2>Kaseya Virtual System Administrator contains multiple vulnerabilities</h2>
<p class="meta-text">Original Release date: 13 Jul 2015 | Last revised: 13 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>Kaseya Virtual System Administrator (VSA), versions R9 and possibly earlier, contains arbitrary file download and open redirect vulnerabilities. </p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><a href="http://cwe.mitre.org/data/definitions/22.html"><b>CWE-22</b></a><b>: Improper Limitation of Pathname to a Restricted Directory ('Path Traversal') </b>- CVE-2015-2862
<p>Kaseya VSA is an IT management platform with a help desk ticketing system. An authenticated attacker can traverse directories and download arbitrary files by submitting a specially crafted HTTP request to the server hosting the VSA software.<br>
<br>
<a href="http://cwe.mitre.org/data/definitions/601.html"><b>CWE-601</b></a><b>: URL Redirection to Untrusted Site ('Open Redirect')</b> - CVE-2015-2863<br>
<br>
Kaseya VSA, versions V7.x, R8.x and R9.x, contain an open redirect vulnerability. An attacker may be able to leverage users' trust in the domain to induce them to visit a site with malicious content.<br>
<br>
The CVSS score below refers to CVE-2015-2862.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>A remote, authenticated attacker can download arbitrary files. A remote, unauthenticated attacker may be able to redirect users to arbitrary web sites.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an update</b><br>
<br>
The vendor has released the following patches to address these issues:<br>
<ul>
<li type="disc">R9.1: install patch 9.1.0.4
<li type="disc">R9.0: install patch 9.0.0.14
<li type="disc">R8.0: install patch 8.0.0.18
<li type="disc">V7.0: install patch 7.0.0.29</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Kaseya, Inc.</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9VYJTS" title="View Vendor Information">Unknown</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">27 Apr 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">27 Apr 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23919604 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">4.3</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:N/AC:M/Au:N/C:N/I:P/A:N</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">3.4</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:POC/RL:OF/RC:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">2.5</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:N/TD:M/CR:ND/IR:ND/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="http://www.kaseya.com/solutions/virtual-administrator">http://www.kaseya.com/solutions/virtual-administrator</a></li>
<li><a href="http://cwe.mitre.org/data/definitions/22.html">http://cwe.mitre.org/data/definitions/22.html</a></li>
<li><a href="http://cwe.mitre.org/data/definitions/601.html">http://cwe.mitre.org/data/definitions/601.html</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>Thanks to Pedro Ribeiro (pedrib@gmail.com) of Agile Information Security for reporting these vulnerabilities.</p>
<p>This document was written by Joel Land.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span><A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2862">CVE-2015-2862</A>
<A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2863">CVE-2015-2863</A></span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>13 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>13 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>13 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>13</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23919604 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#918568: Adobe Flash ActionScript 3 BitmapData memory corruption vulnerabilityhttp://www.kb.cert.org/vuls/id/9185682015-07-12T11:08:54-04:002015-07-14T11:08:54-04:00Adobe Flash Player contains a vulnerability in the ActionScript 3 BitmapData object,which can allow a remote,unauthenticated attacker to execute arbitrary code on a vulnerable system. <h1>Vulnerability Note VU#918568</h1>
<h2>Adobe Flash ActionScript 3 BitmapData memory corruption vulnerability</h2>
<p class="meta-text">Original Release date: 12 Jul 2015 | Last revised: 14 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>Adobe Flash Player contains a vulnerability in the ActionScript 3 BitmapData object, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>Adobe Flash Player versions 9.0 through version 18.0.0.204 contain amemory corruption vulnerability in the <a href="http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/display/BitmapData.html">AS3 BitmapData class</a>. Proof-of-concept exploit code for this vulnerability is publicly available.
<p>Please see Adobe Security Bulletin <a href="https://helpx.adobe.com/security/products/flash-player/apsa15-04.html">APSA15-04</a> for more details about affected Flash versions.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>An attacker may be able to execute arbitrary code in the context of the user running Flash Player. Attacks typically involve enticing a user to visit a web site containing specially-crafted Flash content, or to open a specially-crafted Microsoft Office document.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an update</b><br>
<br>
This issue is addressed in Flash Player Desktop 18.0.0.209. See Adobe Security Bulletin <a href="https://helpx.adobe.com/security/products/flash-player/apsb15-18.html">APSB15-18</a> for more details. Please also consider the following workarounds:</p></td></tr></table>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table" style="padding-top: 15px;"><tr><td><p><b>Do not run untrusted Flash content</b><br>
<br>
To defend against this and other, as yet unknown vulnerabilities, disable Flash in your browser or enable <a href="http://www.howtogeek.com/188059/how-to-enable-click-to-play-plugins-in-every-web-browser">Click-to-Play</a> features. Adobe has also provided instructions for how to <a href="https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-windows.html">uninstall Flash on Windows</a> and <a href="https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-mac-os.html">Mac</a> platforms.<br>
<br>
<b>Use the Microsoft Enhanced Mitigation Experience Toolkit</b><br>
<br>
The <a href="http://www.microsoft.com/emet">Microsoft Enhanced Mitigation Experience Toolkit</a> (EMET) can be used to help prevent exploitation of this vulnerability. In particular, Attack Surface Reduction (ASR) can be configured to help restrict Microsoft Office and Internet Explorer from loading the Flash ActiveX control.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Adobe</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/WDON-9YCUU2" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">12 Jul 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23918568 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">7.5</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:N/AC:L/Au:N/C:P/I:P/A:P</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">6.8</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:POC/RL:U/RC:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">6.7</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="https://helpx.adobe.com/security/products/flash-player/apsb15-18.html">https://helpx.adobe.com/security/products/flash-player/apsb15-18.html</a></li>
<li><a href="https://helpx.adobe.com/security/products/flash-player/apsa15-04.html">https://helpx.adobe.com/security/products/flash-player/apsa15-04.html</a></li>
<li><a href="http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak">http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak</a></li>
<li><a href="http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/display/BitmapData.html">http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/display/BitmapData.html</a></li>
<li><a href="http://www.microsoft.com/emet">http://www.microsoft.com/emet</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>This vulnerability was reported by TrendMicro, based on the HackingTeam leak.</p>
<p>This document was written by Will Dormann.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span><A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5123">CVE-2015-5123</A></span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>05 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>12 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>14 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>19</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23918568 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#338736: Adobe Flash ActionScript 3 opaqueBackground use-after-free vulnerabilityhttp://www.kb.cert.org/vuls/id/3387362015-07-11T10:58:53-04:002015-07-14T10:58:53-04:00Adobe Flash Player contains a vulnerability in the ActionScript 3 opaqueBackground property,which can allow a remote,unauthenticated attacker to execute arbitrary code on a vulnerable system. <h1>Vulnerability Note VU#338736</h1>
<h2>Adobe Flash ActionScript 3 opaqueBackground use-after-free vulnerability</h2>
<p class="meta-text">Original Release date: 11 Jul 2015 | Last revised: 14 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>Adobe Flash Player contains a vulnerability in the ActionScript 3 opaqueBackground property, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>Adobe Flash Player versions 9.0 through version 18.0.0.204 contain a use-after-free vulnerability in the <a href="http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/display/DisplayObject.html#opaqueBackground">AS3 opaqueBackground class</a>. This can allow attacker-controlled memory corruption. Exploit code for this vulnerability is publicly available.
<p>Please see Adobe Security Bulletin <a href="https://helpx.adobe.com/security/products/flash-player/apsa15-04.html">APSA15-04</a> for more details about affected Flash versions.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>An attacker can execute arbitrary code in the context of the user running Flash Player. Attacks typically involve enticing a user to visit a web site containing specially-crafted Flash content, or to open a specially-crafted Microsoft Office document.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an update</b><br>
<br>
This issue is addressed in Flash Player Desktop 18.0.0.209. See Adobe Security Bulletin <a href="https://helpx.adobe.com/security/products/flash-player/apsb15-18.html">APSB15-18</a> for more details. Please also consider the following workarounds:</p></td></tr></table>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table" style="padding-top: 15px;"><tr><td><p><b>Do not run untrusted Flash content</b><br>
<br>
To defend against this and other, as yet unknown vulnerabilities, disable Flash in your browser or enable <a href="http://www.howtogeek.com/188059/how-to-enable-click-to-play-plugins-in-every-web-browser">Click-to-Play</a> features. Adobe has also provided instructions for how to <a href="https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-windows.html">uninstall Flash on Windows</a> and <a href="https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-mac-os.html">Mac</a> platforms.<br>
<br>
<b>Use the Microsoft Enhanced Mitigation Experience Toolkit</b><br>
<br>
The <a href="http://www.microsoft.com/emet">Microsoft Enhanced Mitigation Experience Toolkit</a> (EMET) can be used to help prevent exploitation of this vulnerability. In particular, Attack Surface Reduction (ASR) can be configured to help restrict Microsoft Office and Internet Explorer from loading the Flash ActiveX control.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Adobe</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/WDON-9YB8E6" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">11 Jul 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23338736 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">7.5</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:N/AC:L/Au:N/C:P/I:P/A:P</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">7.5</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:H/RL:U/RC:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">7.5</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="https://helpx.adobe.com/security/products/flash-player/apsb15-18.html">https://helpx.adobe.com/security/products/flash-player/apsb15-18.html</a></li>
<li><a href="https://helpx.adobe.com/security/products/flash-player/apsa15-04.html">https://helpx.adobe.com/security/products/flash-player/apsa15-04.html</a></li>
<li><a href="https://www.fireeye.com/blog/threat-research/2015/07/cve-2015-5122_-_seco.html">https://www.fireeye.com/blog/threat-research/2015/07/cve-2015-5122_-_seco.html</a></li>
<li><a href="https://krebsonsecurity.com/2015/07/adobe-to-fix-another-hacking-team-zero-day/">https://krebsonsecurity.com/2015/07/adobe-to-fix-another-hacking-team-zero-day/</a></li>
<li><a href="http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/display/DisplayObject.html#opaqueBackground">http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/display/DisplayObject.html#opaqueBackground</a></li>
<li><a href="http://www.microsoft.com/emet">http://www.microsoft.com/emet</a></li>
<li><a href="http://www.howtogeek.com/188059/how-to-enable-click-to-play-plugins-in-every-web-browser">http://www.howtogeek.com/188059/how-to-enable-click-to-play-plugins-in-every-web-browser</a></li>
<li><a href="https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-windows.html">https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-windows.html</a></li>
<li><a href="https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-mac-os.html">https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-mac-os.html</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>This document was written by Will Dormann.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span><A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5122">CVE-2015-5122</A></span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>05 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>11 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>14 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>26</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23338736 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#103336: Windows Adobe Type Manager privilege escalation vulnerabilityhttp://www.kb.cert.org/vuls/id/1033362015-07-08T15:20:54-04:002015-07-14T15:20:54-04:00The Adobe Type Manager module contains a memory corruption vulnerability,which can allow an attacker to obtain SYSTEM privileges on an affected Windows system. <h1>Vulnerability Note VU#103336</h1>
<h2>Windows Adobe Type Manager privilege escalation vulnerability</h2>
<p class="meta-text">Original Release date: 08 Jul 2015 | Last revised: 14 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>The Adobe Type Manager module contains a memory corruption vulnerability, which can allow an attacker to obtain SYSTEM privileges on an affected Windows system.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>Adobe Type Manager, which is provided by <tt>atmfd.dll</tt>, is a kernel module that is provided by Windows and provides support for OpenType fonts. A memory-corruption flaw in Adobe Type Manager allows for manipulation of Windows kernel memory, which can result in a wide range of impacts. Although not related to this specific vulnerability, the <a href="http://j00ru.vexillium.org/?p=2520">j00ru//vx tech blog</a> has details about the Adobe Type Manager Font Driver.
<p>Note that exploit code for this vulnerability is publicly available, as part of the HackingTeam compromise. We have confirmed that the exploit code successfully obtains SYSTEM privileges on Windows XP through Windows 8.1 systems, both 32-bit and 64-bit.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>This vulnerability can allow an attacker to gain SYSTEM privileges on an affected Windows system. This can be used to bypass web browser and other OS-level sandboxing and protections.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an update</b><br>
<br>
This issue is addressed in Microsoft Security Bulletin <a href="https://technet.microsoft.com/en-us/library/security/MS15-077">MS15-077</a>. Please see this document for update and workaround information.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Microsoft Corporation</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9Y8KQ9" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">08 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">14 Jul 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23103336 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">6.8</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:L/AC:L/Au:S/C:C/I:C/A:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">6.8</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:H/RL:U/RC:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">6.8</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:ND/TD:H/CR:ND/IR:ND/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="https://technet.microsoft.com/en-us/library/security/MS15-077">https://technet.microsoft.com/en-us/library/security/MS15-077</a></li>
<li><a href="http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/">http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/</a></li>
<li><a href="http://j00ru.vexillium.org/?p=2520">http://j00ru.vexillium.org/?p=2520</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>This document was written by Will Dormann.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span>Unknown</span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>05 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>08 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>14 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>18</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23103336 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#253708: Grandsteam GXV3611_HD camera is vulnerable to SQL injectionhttp://www.kb.cert.org/vuls/id/2537082015-07-07T14:44:26-04:002015-07-07T14:44:26-04:00The Grandsteam GXV3611_HD is an IP network camera used for surveillance and security. The Grandsteam GXV3611_HD is vulnerable to a SQL injection attack. <h1>Vulnerability Note VU#253708</h1>
<h2>Grandsteam GXV3611_HD camera is vulnerable to SQL injection</h2>
<p class="meta-text">Original Release date: 07 Jul 2015 | Last revised: 07 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>The Grandsteam GXV3611_HD is an IP network camera used for surveillance and security. The Grandsteam GXV3611_HD is vulnerable to a SQL injection attack.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><a href="http://cwe.mitre.org/data/definitions/89.html"><b>CWE-89</b></a><b>: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - </b>CVE-2015-2866
<p>The Grandstream GXV3611_HD camera with firmware of 1.0.3.6 or before does not correctly perform input validation on the <tt>username</tt> field of the telnet login. An attacker may exploit this weakness to execute a SQL injection attack on the camera's configuration.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>A remote unauthenticated attacker may be able to perform a SQL injection to view or modify the configuration of the device.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Update the firmware</b><br>
<br>
Grandstream has released firmware <a href="http://www.grandstream.com/support/firmware">1.0.3.9 beta</a> to address this issue. Consider updating your camera's firmware as soon as possible.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Grandstream</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/GWAN-9XYMG6" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">-</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">30 Jun 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23253708 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">6.4</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:N/AC:L/Au:N/C:P/I:P/A:N</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">5.0</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:POC/RL:OF/RC:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">3.8</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:ND/TD:M/CR:ND/IR:ND/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="http://www.grandstream.com/support/firmware">http://www.grandstream.com/support/firmware</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>Thanks to the Living Lab at IUPUI for reporting this vulnerability to us.</p>
<p>This document was written by Garret Wassermann.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span><A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2866">CVE-2015-2866</A></span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>07 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>07 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>07 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>51</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23253708 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#561288: Adobe Flash ActionScript 3 ByteArray use-after-free vulnerabilityhttp://www.kb.cert.org/vuls/id/5612882015-07-07T14:46:54-04:002015-07-11T14:46:54-04:00Adobe Flash Player contains a vulnerability in the ActionScript 3 ByteArray class,which can allow a remote,unauthenticated attacker to execute arbitrary code on a vulnerable system. <h1>Vulnerability Note VU#561288</h1>
<h2>Adobe Flash ActionScript 3 ByteArray use-after-free vulnerability</h2>
<p class="meta-text">Original Release date: 07 Jul 2015 | Last revised: 11 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>Adobe Flash Player contains a vulnerability in the ActionScript 3 ByteArray class, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>Adobe Flash Player versions 9.0 through version 18.0.0.194 contain a use-after-free vulnerability in the <a href="http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/utils/ByteArray.html">AS3 ByteArray class</a>. This can allow attacker-controlled memory corruption. Exploit code for this vulnerability is publicly available.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>An attacker can execute arbitrary code in the context of the user running Flash Player. Attacks typically involve enticing a user to visit a web site containing specially-crafted Flash content, or to open a specially-crafted Microsoft Office document.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an update</b>
<p>This issue is addressed in Flash Player Desktop 18.0.0.203. Please see <a href="https://helpx.adobe.com/security/products/flash-player/apsb15-16.html">Adobe Security Bulletin APSB15-16</a> for more details and fix versions for other platforms.</p></td></tr></table>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table" style="padding-top: 15px;"><tr><td><p><b>Do not run untrusted Flash content</b><br>
<br>
To defend against this and other, as yet unknown vulnerabilities, disable Flash in your browser or enable <a href="http://www.howtogeek.com/188059/how-to-enable-click-to-play-plugins-in-every-web-browser">Click-to-Play</a> features. Adobe has also provided instructions for how to <a href="https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-windows.html">uninstall Flash on Windows</a> and <a href="https://helpx.adobe.com/flash-player/kb/uninstall-flash-player-mac-os.html">Mac</a> platforms.<br>
<br>
<b>Use the Microsoft Enhanced Mitigation Experience Toolkit</b><br>
<br>
The <a href="http://www.microsoft.com/emet">Microsoft Enhanced Mitigation Experience Toolkit</a> (EMET) can be used to help prevent exploitation of this vulnerability. In particular, Attack Surface Reduction (ASR) can be configured to help restrict Microsoft Office and Internet Explorer from loading the Flash ActiveX control.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">Adobe</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9Y6UN9" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">06 Jul 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">08 Jul 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23561288 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">7.5</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:N/AC:L/Au:N/C:P/I:P/A:P</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">7.1</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:H/RL:W/RC:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">7.1</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:ND/TD:H/CR:ND/IR:ND/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li><a href="https://helpx.adobe.com/security/products/flash-player/apsb15-16.html">https://helpx.adobe.com/security/products/flash-player/apsb15-16.html</a></li>
<li><a href="https://helpx.adobe.com/security/products/flash-player/apsa15-03.html">https://helpx.adobe.com/security/products/flash-player/apsa15-03.html</a></li>
<li><a href="https://twitter.com/w3bd3vil/status/618168863708962816">https://twitter.com/w3bd3vil/status/618168863708962816</a></li>
<li><a href="http://malware.dontneedcoffee.com/2015/07/hackingteam-flash-0d-cve-2015-xxxx-and.html">http://malware.dontneedcoffee.com/2015/07/hackingteam-flash-0d-cve-2015-xxxx-and.html</a></li>
<li><a href="http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/utils/ByteArray.html">http://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/utils/ByteArray.html</a></li>
<li><a href="http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/">http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/</a></li>
<li><a href="http://www.microsoft.com/emet">http://www.microsoft.com/emet</a></li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>This vulnerability was discovered by HackingTeam.</p>
<p>This document was written by Will Dormann.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span><A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5119 ">CVE-2015-5119 </A></span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>05 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>07 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>11 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>37</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23561288 Feedback">email</a>.</p>
</div>
</div>
</div>
CERTcert@cert.orgVU#485324: ANTLabs InnGate gateway device contains SQL injection and reflected cross-site scripting vulnerabilitieshttp://www.kb.cert.org/vuls/id/4853242015-07-06T13:20:35-04:002015-07-06T13:20:34-04:00ANTlabs InnGate is a gateway device designed for operating corporate guest/visitor networks. Multiple InnGate models have been confirmed to be vulnerable to SQL injection and cross-site scripting attacks. <h1>Vulnerability Note VU#485324</h1>
<h2>ANTLabs InnGate gateway device contains SQL injection and reflected cross-site scripting vulnerabilities</h2>
<p class="meta-text">Original Release date: 06 Jul 2015 | Last revised: 06 Jul 2015</p><!-- END SOCIAL BUTTONS -->
<div id="vulnerability-note-content">
<a name="overview"></a>
<h3>Overview</h3>
<p>ANTlabs InnGate is a gateway device designed for operating corporate guest/visitor networks. Multiple InnGate models have been confirmed to be vulnerable to SQL injection and cross-site scripting attacks.</p>
<a name="description"></a>
<h3>Description</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><a href="http://cwe.mitre.org/data/definitions/89.html"><b>CWE-89</b></a><b>: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') - </b> CVE-2015-2849
<p>The <tt>ppli</tt> URL parameter of the <tt>main.ant</tt> page is vulnerable to SQL injection. A remote attacker can perform arbitrary queries on the underlying database. According to ANTLabs, only <tt>https</tt> connections are vulnerable to this attack.<br>
<br>
<a href="http://cwe.mitre.org/data/definitions/79.html"><b>CWE-79</b></a><b>: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - </b>CVE-2015-2850<br>
<br>
A reflected cross-site scripting vulnerability also exists in the <tt>msg</tt> URL parameter of the <tt>index-login.ant</tt> page.<br>
<br>
Affected models include the following:
<ul type="disc">
<li>InnGate 3.01 E-Series
<li>InnGate 3.10 E-Series
<li>InnGate 3.10 M-Series
<li>IG3100
<li>SG 4
<li>SSG 4</ul>
<br>
The CVSS score below is based on CVE-2015-2849.</p></td></tr></table>
<a name="impact"></a>
<h3>Impact</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p>A remote attacker may be able exploit CVE-2015-2849 to execute arbitrary queries on the backend datastore.<br>
<br>
A remote attacker may be able to exploit CVE-2015-2850 to obtain user credentials to the administrator panel if a user can be enticed to click an XSS-injected link.</p></td></tr></table>
<a name="solution"></a>
<h3>Solution</h3>
<table cellspacing="0" cellpadding="0" border="0" class="wrapper-table"><tr><td><p><b>Apply an update</b><br>
<br>
ANTLabs has released a firmware update addressing these issues for affected models. All affected users are encouraged to update as soon as possible. The update is available on the ANTlabs customer portal or via the system update mechanism.</p></td></tr></table>
<a name="vendors"></a><a name="systems"></a>
<h3>Vendor Information <span class="learn-more">(<a href="/vuls/html/fieldhelp#vendorinfo">Learn More</a>)</span></h3>
<table id="vendor-info2" style="margin: 10px 0 20px 0;"><tr><th style="width: 250px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da;border-right: none; padding: 5px 10px; margin:0;">Vendor</th><th style="width: 110px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Status</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Date Notified</th><th style="width: 125px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none;margin:0;">Date Updated</th></tr><tr><td class="vendor" style="width: 250px; text-align: left;padding: 5px 10px; margin:0;">ANTlabs</td><td class="status" style="width: 110px; text-align: center;padding: 5px 10px; margin:0;"><a href="/vuls/id/BLUU-9VRRXP" title="View Vendor Information">Affected</a></td><td class="notified" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">20 Apr 2015</td><td class="updated" style="width: 125px; text-align: center;padding: 5px 10px; margin:0;">06 Jul 2015</td></tr></table><span class="my-product-affected">If you are a vendor and your product is affected, <a href="mailto:cert@cert.org?Subject=VU%23485324 Vendor Status Inquiry">let
us know</a>.</span>
<a name="cvss"></a>
<h3 style="clear: both !important;">CVSS Metrics <span class="learn-more">(<a href="/vuls/html/fieldhelp#cvss">Learn More</a>)</span></h3>
<table id="cvss-score" style="margin: 10px 0 10px 0;">
<tr>
<th style="width: 100px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-right: none; padding: 5px 10px; margin:0;">Group</th>
<th style="width: 100px; text-align: center;padding: 5px 10px; background-color: #EBEBEB; border-top: 1px solid #d5d7da; border-bottom: 1px solid #d5d7da; margin:0;">Score</th>
<th style="width: 470px; text-align: left; background-color: #EBEBEB; border: 1px solid #d5d7da; border-left: none; padding: 5px 10px; margin:0;">Vector</th>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Base</td>
<td class="cvss-score" style="width: 100px; text-align: center; padding: 5px 10px;">7.8</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">AV:A/AC:L/Au:N/C:C/I:C/A:N</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Temporal</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">6.1</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">E:POC/RL:OF/RC:C</td>
</tr>
<tr>
<td class="cvss-metric-group" style="width: 100px; text-align: left; padding: 5px 10px; margin:0;">Environmental</td>
<td class="cvss-score" style="width: 100px; padding: 5px 10px; text-align: center">4.6</td>
<td class="cvss-vector" style="width: 470px; text-align: left; padding: 5px 10px; margin:0;">CDP:ND/TD:M/CR:ND/IR:ND/AR:ND</td>
</tr>
</table>
<a name="references"></a>
<h3>References</h3>
<ul>
<li>None</li>
</ul>
<a name="credit"></a>
<h3>Credit</h3>
<p>Thanks to Devesh Logendran for reporting these vulnerabilities.</p>
<p>This document was written by Garret Wassermann.</p>
<a name="other"></a>
<h3>Other Information</h3>
<ul id="other-info">
<li>
<span class="field-title">CVE IDs:</span>
<span><A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2849">CVE-2015-2849</A>
<A HREF="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2850">CVE-2015-2850</A></span>
</li>
<li>
<span class="field-title">Date Public:</span>
<span>06 Jul 2015</span>
</li>
<li>
<span class="field-title">Date First Published:</span>
<span>06 Jul 2015</span>
</li>
<li>
<span class="field-title">Date Last Updated:</span>
<span>06 Jul 2015</span>
</li>
<li>
<span class="field-title">Document Revision:</span>
<span>42</span>
</li>
</ul>
<div id="provide-feedback">
<h3>Feedback</h3><p>If you have feedback, comments, or additional information about this vulnerability, please send us <a href="mailto:cert@cert.org?Subject=VU%23485324 Feedback">email</a>.</p>
</div>
</div>
</div>