nessus
via4
|
NASL family | Web Servers | NASL id | ORACLE_HTTP_SERVER_CPU_OCT_2015.NASL | description | The version of Oracle HTTP Server installed on the remote host is
affected by multiple vulnerabilities :
- (CVE-2003-1418)
- A denial of service vulnerability exists in libxml2,
related to the xmlParserHandlePEReference() function in
file parser.c, due to loading external parameter
entities without regard to entity substitution or
validation being enabled, as in the case of entity
substitution in the doctype prolog. An unauthenticated,
remote attacker can exploit this, via specially crafted
XML content, to exhaust the system CPU, memory, or file
descriptor resources. (CVE-2014-0191)
- An unspecified vulnerability exists in the Web Listener
component that allows an unauthenticated, remote
attacker to impact availability. (CVE-2015-1829)
- (CVE-2015-2808)
- An unspecified vulnerability exists in the OSSL Module
that allows an unauthenticated, remote attacker to
impact confidentiality. (CVE-2015-4812)
- An unspecified vulnerability exists in the Web Listener
component that allows an authenticated, remote attacker
to impact confidentiality. (CVE-2015-4914)
- (CVE-2016-2183) | last seen | 2019-01-16 | modified | 2018-07-16 | plugin id | 86569 | published | 2015-10-23 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=86569 | title | Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (October 2015 CPU) |
NASL family | Databases | NASL id | MYSQL_5_7_16_RPM.NASL | description | The version of MySQL running on the remote host is 5.7.x prior to
5.7.16. It is, therefore, affected by multiple vulnerabilities :
- Multiple integer overflow conditions exist in s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit this to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the DTLS
implementation due to a failure to properly restrict the
lifetime of queue entries associated with unused
out-of-order messages. An unauthenticated, remote
attacker can exploit this, by maintaining multiple
crafted DTLS sessions simultaneously, to exhaust memory.
(CVE-2016-2179)
- An out-of-bounds read error exists in the X.509 Public
Key Infrastructure Time-Stamp Protocol (TSP)
implementation. An unauthenticated, remote attacker can
exploit this, via a crafted time-stamp file that is
mishandled by the 'openssl ts' command, to cause
denial of service or to disclose sensitive information.
(CVE-2016-2180)
- A denial of service vulnerability exists in the
Anti-Replay feature in the DTLS implementation due to
improper handling of epoch sequence numbers in records.
An unauthenticated, remote attacker can exploit this,
via spoofed DTLS records, to cause legitimate packets to
be dropped. (CVE-2016-2181)
- An overflow condition exists in the BN_bn2dec() function
in bn_print.c due to improper validation of
user-supplied input when handling BIGNUM values. An
unauthenticated, remote attacker can exploit this to
crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- An unspecified flaw exists in the Security: Encryption
subcomponent that allows an authenticated, remote
attacker to disclose sensitive information.
(CVE-2016-5584)
- A flaw exists in the tls_decrypt_ticket() function in
t1_lib.c due to improper handling of ticket HMAC
digests. An unauthenticated, remote attacker can exploit
this, via a ticket that is too short, to crash the
process, resulting in a denial of service.
(CVE-2016-6302)
- An integer overflow condition exists in the
MDC2_Update() function in mdc2dgst.c due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a heap-based
buffer overflow, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6303)
- A flaw exists in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources, resulting in a denial of service condition.
(CVE-2016-6304)
- An out-of-bounds read error exists in the certificate
parser that allows an unauthenticated, remote attacker
to cause a denial of service via crafted certificate
operations. (CVE-2016-6306)
- A flaw exists in the check_log_path() function within
file sql/sys_vars.cc due to inadequate restrictions on
the ability to write to the my.cnf configuration file
and allowing the loading of configuration files from
path locations not used by current versions. An
authenticated, remote attacker can exploit this issue
by using specially crafted queries that utilize logging
functionality to create new files or append custom
content to existing files. This allows the attacker to
gain root privileges by inserting a custom .cnf file
with a 'malloc_lib=' directive pointing to specially
crafted mysql_hookandroot_lib.so file and thereby cause
MySQL to load a malicious library the next time it is
started. (CVE-2016-6662)
- A flaw exists in wolfSSL, specifically within the C
software version of AES Encryption and Decryption, due
to table lookups not properly considering cache-bank
access times. A local attacker can exploit this, via a
specially crafted application, to disclose AES keys.
(CVE-2016-7440)
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number. | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 94198 | published | 2016-10-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=94198 | title | MySQL 5.7.x < 5.7.16 Multiple Vulnerabilities (October 2016 CPU) (SWEET32) |
NASL family | CGI abuses | NASL id | MYSQL_ENTERPRISE_MONITOR_3_1_5_7958.NASL | description | According to its self-reported version, the MySQL Enterprise Monitor
application running on the remote host is 3.1.x prior to 3.1.5.7958.
It is, therefore, affected by multiple vulnerabilities :
- An information disclosure vulnerability exists in the
bundled version of Apache Tomcat in the Manager and Host
Manager web applications due to a flaw in the index page
when issuing redirects in response to unauthenticated
requests for the root directory of the application. An
authenticated, remote attacker can exploit this to gain
access to the XSRF token information stored in the index
page. (CVE-2015-5351)
- A remote code execution vulnerability exists in the
Framework subcomponent that allows an authenticated,
remote attacker to execute arbitrary code.
(CVE-2016-0635)
- An information disclosure vulnerability exists in the
bundled version of Apache Tomcat that allows a specially
crafted web application to load the
StatusManagerServlet. An authenticated, remote attacker
can exploit this to gain unauthorized access to a list
of all deployed applications and a list of the HTTP
request lines for all requests currently being
processed. (CVE-2016-0706)
- A remote code execution vulnerability exists in the
bundled version of Apache Tomcat due to a flaw in the
StandardManager, PersistentManager, and cluster
implementations that is triggered when handling
persistent sessions. An authenticated, remote attacker
can exploit this, via a crafted object in a session, to
bypass the security manager and execute arbitrary code.
(CVE-2016-0714)
- A security bypass vulnerability exists in the bundled
version of Apache Tomcat due to a failure to consider
whether ResourceLinkFactory.setGlobalContext callers are
authorized. An authenticated, remote attacker can
exploit this, via a web application that sets a crafted
global context, to bypass intended SecurityManager
restrictions and read or write to arbitrary application
data or cause a denial of service condition.
(CVE-2016-0763)
- Multiple integer overflow conditions exist in the
bundled version of OpenSSL in s3_srvr.c, ssl_sess.c, and
t1_lib.c due to improper use of pointer arithmetic for
heap-buffer boundary checks. An unauthenticated, remote
attacker can exploit this to cause a denial of service.
(CVE-2016-2177)
- An information disclosure vulnerability exists in the
bundled version of OpenSSL in the dsa_sign_setup()
function in dsa_ossl.c due to a failure to properly
ensure the use of constant-time operations. An
unauthenticated, remote attacker can exploit this, via a
timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the bundled
version of OpenSSL in the DTLS implementation due to a
failure to properly restrict the lifetime of queue
entries associated with unused out-of-order messages. An
unauthenticated, remote attacker can exploit this, by
maintaining multiple crafted DTLS sessions
simultaneously, to exhaust memory. (CVE-2016-2179)
- An out-of-bounds read error exists in the bundled
version of OpenSSL in the X.509 Public Key
Infrastructure Time-Stamp Protocol (TSP) implementation.
An unauthenticated, remote attacker can exploit this,
via a crafted time-stamp file that is mishandled by the
'openssl ts' command, to cause denial of service or to
disclose sensitive information. (CVE-2016-2180)
- A denial of service vulnerability exists in the bundled
version of OpenSSL in the Anti-Replay feature in the
DTLS implementation due to improper handling of epoch
sequence numbers in records. An unauthenticated, remote
attacker can exploit this, via spoofed DTLS records, to
cause legitimate packets to be dropped. (CVE-2016-2181)
- An overflow condition exists in the bundled version of
OpenSSL in the BN_bn2dec() function in bn_print.c due to
improper validation of user-supplied input when handling
BIGNUM values. An unauthenticated, remote attacker can
exploit this to crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the bundled
version of OpenSSL in the 3DES and Blowfish algorithms
due to the use of weak 64-bit block ciphers by default.
A man-in-the-middle attacker who has sufficient
resources can exploit this vulnerability, via a
'birthday' attack, to detect a collision that leaks the
XOR between the fixed secret and a known plaintext,
allowing the disclosure of the secret text, such as
secure HTTPS cookies, and possibly resulting in the
hijacking of an authenticated session. (CVE-2016-2183)
- A flaw exists in the bundled version of OpenSSL in the
tls_decrypt_ticket() function in t1_lib.c due to
improper handling of ticket HMAC digests. An
unauthenticated, remote attacker can exploit this, via a
ticket that is too short, to crash the process,
resulting in a denial of service. (CVE-2016-6302)
- An integer overflow condition exists in the bundled
version of OpenSSL in the MDC2_Update() function in
mdc2dgst.c due to improper validation of user-supplied
input. An unauthenticated, remote attacker can exploit
this to cause a heap-based buffer overflow, resulting in
a denial of service condition or possibly the execution
of arbitrary code. (CVE-2016-6303)
- A denial of service vulnerability exists in the bundled
version of OpenSSL in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources. (CVE-2016-6304)
- An out-of-bounds read error exists in the bundled
version of OpenSSL in the certificate parser that allows
an unauthenticated, remote attacker to cause a denial of
service via crafted certificate operations.
(CVE-2016-6306) | last seen | 2019-01-16 | modified | 2018-06-14 | plugin id | 96767 | published | 2017-01-25 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96767 | title | MySQL Enterprise Monitor 3.1.x < 3.1.5.7958 Multiple Vulnerabilities (SWEET32) (January 2017 CPU) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2017-1216.NASL | description | An update for java-1.7.1-ibm is now available for Red Hat Satellite
5.7 and Red Hat Satellite 5.6.
Red Hat Product Security has rated this update as having a security
impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
IBM Java SE version 7 Release 1 includes the IBM Java Runtime
Environment and the IBM Java Software Development Kit.
This update upgrades IBM Java SE 7 to version 7R1 SR4-FP1.
Security Fix(es) :
* This update fixes multiple vulnerabilities in the IBM Java Runtime
Environment and the IBM Java Software Development Kit. Further
information about these flaws can be found on the IBM Java Security
alerts page, listed in the References section. (CVE-2016-2183,
CVE-2017-3272, CVE-2017-3289, CVE-2017-3253, CVE-2017-3261,
CVE-2017-3231, CVE-2016-5547, CVE-2016-5552, CVE-2017-3252,
CVE-2016-5546, CVE-2016-5548, CVE-2016-5549, CVE-2017-3241,
CVE-2017-3259, CVE-2016-5573, CVE-2016-5554, CVE-2016-5542,
CVE-2016-5597, CVE-2016-5556, CVE-2016-3598, CVE-2016-3511,
CVE-2016-0363, CVE-2016-0686, CVE-2016-0687, CVE-2016-3426,
CVE-2016-3427, CVE-2016-3443, CVE-2016-3449, CVE-2016-3422,
CVE-2016-0376, CVE-2016-0264) | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 100094 | published | 2017-05-10 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=100094 | title | RHEL 6 : java-1.7.1-ibm (RHSA-2017:1216) |
NASL family | Misc. | NASL id | ORACLE_E-BUSINESS_CPU_JUL_2017.NASL | description | The version of Oracle E-Business installed on the remote host is
missing the July 2017 Oracle Critical Patch Update (CPU). It is,
therefore, affected by the following vulnerabilities :
- Multiple integer overflow conditions exist in the
OpenSSL component in s3_srvr.c, ssl_sess.c, and t1_lib.c
due to improper use of pointer arithmetic for
heap-buffer boundary checks. An unauthenticated, remote
attacker can exploit this to cause a denial of service.
(CVE-2016-2177)
- An information disclosure vulnerability exists in the
OpenSSL component in the dsa_sign_setup() function in
dsa_ossl.c due to a failure to properly ensure the use
of constant-time operations. An unauthenticated, remote
attacker can exploit this, via a timing side-channel
attack, to disclose DSA key information. (CVE-2016-2178)
- A denial of service vulnerability exists in the OpennSSL
component in the DTLS implementation due to a failure to
properly restrict the lifetime of queue entries
associated with unused out-of-order messages. An
unauthenticated, remote attacker can exploit this, by
maintaining multiple crafted DTLS sessions
simultaneously, to exhaust memory. (CVE-2016-2179)
- An out-of-bounds read error exists in the OpenSSL
component in the X.509 Public Key Infrastructure
Time-Stamp Protocol (TSP) implementation. An
unauthenticated, remote attacker can exploit this, via a
crafted time-stamp file that is mishandled by the
'openssl ts' command, to cause a denial of service or to
disclose sensitive information. (CVE-2016-2180)
- A denial of service vulnerability exists in the OpenSSL
component in the Anti-Replay feature in the DTLS
implementation due to improper handling of epoch
sequence numbers in records. An unauthenticated, remote
attacker can exploit this, via spoofed DTLS records, to
cause legitimate packets to be dropped. (CVE-2016-2181)
- An overflow condition exists in the OpenSSL component in
the BN_bn2dec() function in bn_print.c due to improper
validation of user-supplied input when handling BIGNUM
values. An unauthenticated, remote attacker can exploit
this to crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the OpenSSL
component in the 3DES and Blowfish algorithms due to the
use of weak 64-bit block ciphers by default. A
man-in-the-middle attacker who has sufficient resources
can exploit this vulnerability, via a 'birthday' attack,
to detect a collision that leaks the XOR between the
fixed secret and a known plaintext, allowing the
disclosure of the secret text, such as secure HTTPS
cookies, and possibly resulting in the hijacking of an
authenticated session. (CVE-2016-2183)
- A flaw exists in the OpenSSL component in the
tls_decrypt_ticket() function in t1_lib.c due to
improper handling of ticket HMAC digests. An
unauthenticated, remote attacker can exploit this, via a
ticket that is too short, to crash the process,
resulting in a denial of service. (CVE-2016-6302)
- An integer overflow condition exists in the OpenSSL
component in the MDC2_Update() function in mdc2dgst.c
due to improper validation of user-supplied input. An
unauthenticated, remote attacker can exploit this to
cause a heap-based buffer overflow, resulting in a
denial of service condition or possibly the execution of
arbitrary code. (CVE-2016-6303)
- A flaw exists in the OpenSSL component in the
ssl_parse_clienthello_tlsext() function in t1_lib.c due
to improper handling of overly large OCSP Status Request
extensions from clients. An unauthenticated, remote
attacker can exploit this, via large OCSP Status Request
extensions, to exhaust memory resources, resulting in a
denial of service condition. (CVE-2016-6304)
- A flaw exists in the OpenSSL component in the SSL_peek()
function in rec_layer_s3.c due to improper handling of
empty records. An unauthenticated, remote attacker can
exploit this, by triggering a zero-length record in an
SSL_peek call, to cause an infinite loop, resulting in a
denial of service condition. (CVE-2016-6305)
- An out-of-bounds read error exists in the OpenSSL
component in the certificate parser that allows an
unauthenticated, remote attacker to cause a denial of
service via crafted certificate operations.
(CVE-2016-6306)
- A denial of service vulnerability exists in the OpenSSL
component in the state-machine implementation due to a
failure to check for an excessive length before
allocating memory. An unauthenticated, remote attacker
can exploit this, via a crafted TLS message, to exhaust
memory resources. (CVE-2016-6307)
- A denial of service vulnerability exists in the OpenSSL
component in the DTLS implementation due to improper
handling of excessively long DTLS messages. An
unauthenticated, remote attacker can exploit this, via a
crafted DTLS message, to exhaust available memory
resources. (CVE-2016-6308)
- A remote code execution vulnerability exists in the
OpenSSL component in the read_state_machine() function
in statem.c due to improper handling of messages larger
than 16k. An unauthenticated, remote attacker can
exploit this, via a specially crafted message, to cause
a use-after-free error, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6309)
- A denial of service vulnerability exists in the OpenSSL
component in x509_vfy.c due to improper handling of
certificate revocation lists (CRLs). An unauthenticated,
remote attacker can exploit this, via a specially
crafted CRL, to cause a NULL pointer dereference,
resulting in a crash of the service. (CVE-2016-7052)
- An unspecified flaw exists in the AD Utilities component
that allows an authenticated, remote attacker to impact
confidentiality and integrity. (CVE-2017-3562)
- An unspecified flaw exists in the Registration component
that allows an unauthenticated, remote attacker to
impact confidentiality and integrity. (CVE-2017-10112)
- An unspecified flaw exists in the CRM User Management
Framework component that allows an unauthenticated,
remote attacker to impact confidentiality and integrity.
(CVE-2017-10113)
- An unspecified flaw exists in the User Management
component that allows an unauthenticated, remote
attacker to impact confidentiality and integrity.
(CVE-2017-10130)
- An unspecified flaw exists in the Preferences component
that allows an unauthenticated, remote attacker to
impact confidentiality and integrity. (CVE-2017-10143)
- An unspecified flaw exists in the Oracle Diagnostics
component that allows an unauthenticated, remote
attacker to cause a denial of service condition.
(CVE-2017-10144)
- An unspecified flaw exists in the Wireless/WAP component
that allows an unauthenticated, remote attacker to
impact confidentiality and integrity. (CVE-2017-10170)
- An unspecified flaw exists in the Home Page component
that allows an unauthenticated, remote attacker to
impact confidentiality and integrity. (CVE-2017-10171)
- An unspecified flaw exists in the Service Request
component that allows an unauthenticated, remote
attacker to impact confidentiality and integrity.
(CVE-2017-10174)
- An unspecified flaw exists in the Profiles component
that allows an authenticated, remote attacker to impact
confidentiality and integrity. (CVE-2017-10175)
- An unspecified flaw exists in the Flexfields component
that allows an authenticated, remote attacker to impact
confidentiality and integrity. (CVE-2017-10177)
- An unspecified flaw exists in the Monitoring component
that allows an unauthenticated, remote attacker to
impact confidentiality and integrity. (CVE-2017-10179)
- A cross-site scripting (XSS) vulnerability exists in the
CMRO component due to improper validation of
user-supplied input to multiple parameters before
returning it to users. An unauthenticated, remote
attacker can exploit this, via a specially crafted
request, to execute arbitrary script code in a user's
browser session. (CVE-2017-10180)
- An information disclosure vulnerability exists in the
Wireless/WAP component due to improper sanitization of
user-supplied input. An unauthenticated, remote attacker
can exploit this, via a directory traversal attack, to
disclose arbitrary files. (CVE-2017-10184)
- A cross-site scripting (XSS) vulnerability exists in the
User Management component due to improper validation of
user-supplied input. An unauthenticated, remote attacker
can exploit this, via a specially crafted request, to
execute arbitrary script code in a user's browser
session. (CVE-2017-10185)
- An information disclosure vulnerability exists in the
User and Company Profile component due to improper
sanitization of user-supplied input. An unauthenticated,
remote attacker can exploit this, via a directory
traversal attack, to disclose arbitrary files.
(CVE-2017-10186)
- A cross-site scripting (XSS) vulnerability exists in the
Web Analytics component due to improper validation of
user-supplied input. An unauthenticated, remote attacker
can exploit this, via a specially crafted request, to
execute arbitrary script code in a user's browser
session. (CVE-2017-10191)
- An information disclosure vulnerability exists in the
Shopping Cart component due to improper sanitization of
user-supplied input. An unauthenticated, remote attacker
can exploit this, via a directory traversal attack, to
disclose arbitrary files. (CVE-2017-10192)
- An information disclosure vulnerability exists in the
Attachments component that allows an unauthenticated,
remote attacker to disclose any document stored on the
system. (CVE-2017-10244)
- An information disclosure vulnerability exists in the
Account Hierarchy Manager component that allows an
unauthenticated, remote attacker to disclose sensitive
information in the DBC configuration file.
(CVE-2017-10245)
- An unspecified flaw exists in the iHelp component that
allows an unauthenticated, remote attacker to impact
confidentiality and integrity. (CVE-2017-10246) | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 101845 | published | 2017-07-20 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=101845 | title | Oracle E-Business Multiple Vulnerabilities (July 2017 CPU) (SWEET32) |
NASL family | CGI abuses | NASL id | IBM_BIGFIX_REMOTE_CONTROL_9_1_3.NASL | description | The version of IBM BigFix Remote Control running on the remote host is
prior to 9.1.3. It is, therefore, affected by the multiple
vulnerabilities :
- Multiple integer overflow conditions exist in the
bundled version of OpenSSL in files s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit this to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
bundled version of OpenSSL in the dsa_sign_setup()
function in dsa_ossl.c due to a failure to properly
ensure the use of constant-time operations. An
unauthenticated, remote attacker can exploit this, via a
timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A vulnerability exists, known as SWEET32, in the bundled
version of OpenSSL in the 3DES and Blowfish algorithms
due to the use of weak 64-bit block ciphers by default.
A man-in-the-middle attacker who has sufficient
resources can exploit this vulnerability, via a
'birthday' attack, to detect a collision that leaks the
XOR between the fixed secret and a known plaintext,
allowing the disclosure of the secret text, such as
secure HTTPS cookies, and possibly resulting in the
hijacking of an authenticated session. (CVE-2016-2183)
- An information disclosure vulnerability exists due to
the inclusion of sensitive information in error logs. An
authenticated, remote attacker can exploit this to
disclose information. (CVE-2016-2928)
- An information disclosure vulnerability exists due to
the transmission of information in cleartext. A
man-in-the-middle attacker can exploit this to disclose
sensitive information. (CVE-2016-2931)
- An unspecified flaw exists that allows an
unauthenticated, remote attacker to inject arbitrary XML
content. (CVE-2016-2932)
- An information disclosure vulnerability exists due to a
flaw that allows traversing outside of a restricted
path. An authenticated, remote attacker can exploit
this, via a specially crafted request, to disclose
arbitrary files. (CVE-2016-2933)
- A cross-site scripting (XSS) vulnerability exists due to
improper validation of user-supplied input. An
unauthenticated, remote attacker can exploit this, via a
specially crafted request, to execute arbitrary script
code in a user's browser session. (CVE-2016-2934)
- An unspecified flaw exists that allows an
unauthenticated, remote attacker to submit invalid HTTP
requests, resulting in a denial of service condition for
the broker application. (CVE-2016-2935)
- An information disclosure vulnerability exists due to
the storage of information in log files in plaintext. A
local attacker can exploit this to disclose sensitive
information. (CVE-2016-2943)
- A flaw exists in the bundled version of OpenSSL in the
ssl_parse_clienthello_tlsext() function in t1_lib.c due
to improper handling of overly large OCSP Status Request
extensions from clients. An unauthenticated, remote
attacker can exploit this, via large OCSP Status Request
extensions, to exhaust memory resources, resulting in a
denial of service condition. (CVE-2016-6304)
- An out-of-bounds read error exists the bundled version
of OpenSSL in the certificate parser that allows an
unauthenticated, remote attacker to cause a denial of
service via crafted certificate operations.
(CVE-2016-6306)
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number. | last seen | 2019-01-16 | modified | 2018-06-14 | plugin id | 96145 | published | 2016-12-27 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96145 | title | IBM BigFix Remote Control < 9.1.3 Multiple Vulnerabilities (SWEET32) |
NASL family | Web Servers | NASL id | ORACLE_HTTP_SERVER_CPU_JAN_2015.NASL | description | The version of Oracle HTTP Server installed on the remote host is
affected by multiple vulnerabilities in the Web Listener
subcomponent :
- An integer overflow condition exists in libxml2 within
file xpath.c, related to XPath expressions when adding a
new namespace note. An unauthenticated, remote attacker
can exploit this, via a crafted XML file, to cause a
denial of service condition or the execution of arbitary
code. (CVE-2011-1944)
- An integer overflow condition exists in the HTTP server,
specifically in the ap_pregsub() function within file
server/util.c, when the mod_setenvif module is enabled.
A local attacker can exploit this to gain elevated
privileges by using an .htaccess file with a crafted
combination of SetEnvIf directives and HTTP request
headers. (CVE-2011-3607)
- A flaw exists in libxml2, known as the 'internal entity
expansion' with linear complexity issue, that allows
specially crafted XML files to consume excessive CPU and
memory resources. An unauthenticated, remote attacker
can exploit this to cause a denial of service condition
by using a specially crafted XML file containing an
entity declaration with long replacement text and many
references to this entity. (CVE-2013-0338)
- An out-of-bounds read error exists in libxml2 within
file parser.c due to a failure to check for the
XML_PARSER_EOF state. An unauthenticated, remote
attacker can exploit this, via a specially crafted
document that ends abruptly, to cause a denial of
service condition. (CVE-2013-2877)
- A flaw exists within the mod_headers module in the
HTTP server which allows bypassing the 'RequestHeader
unset' directives. An unauthenticated, remote attacker
can exploit this to inject arbitrary headers. This is
done by placing a header in the trailer portion of data
being sent using chunked transfer encoding.
(CVE-2013-5704)
- A flaw exists in the dav_xml_get_cdata() function in
file main/util.c within the HTTP server mod_dav module
due to incorrect stripping of whitespace characters from
the CDATA sections. An unauthenticated, remote attacker
via a specially crafted DAV WRITE request, can exploit
this to cause a denial of service condition.
(CVE-2013-6438)
- A flaw exists in the log_cookie() function in file
mod_log_config.c within the HTTP server mod_log_config
module due to improper handling of specially crafted
cookies during truncation. An unauthenticated, remote
attacker can exploit this to cause a denial of service
condition via a segmentation fault. (CVE-2014-0098)
- A flaw exists in libxml2, specifically in the
xmlParserHandlePEReference() function in file parser.c,
due to loading external parameter entities even when
entity substitution is disabled. An unauthenticated,
remote attacker can exploit this issue, via a specially
crafted XML file, to conduct XML External Entity (XXE)
attacks that exhaust CPU and memory resources, resulting
in a denial of service condition. (CVE-2014-0191)
- A race condition exists in the HTTP server within the
mod_status module when using a threaded Multi-Processing
Module (MPM). If an unauthenticated, remote attacker is
able to access status pages served by mod_status, the
attacker can exploit this issue, by sending specially
crafted requests, to cause the httpd child process to
crash or possibly execute arbitrary code with the
privileges of the user running the web server.
(CVE-2014-0226)
- An unspecified flaw exists in the Web Listener
subcomponent that allows an unauthenticated, remote
attacker to impact confidentiality, integrity, and
availability. (CVE-2014-6571)
- An unspecified flaw exists in the J2EE subcomponent that
allows an unauthenticated, remote attacker to disclose
potentially sensitive information. (CVE-2015-0372)
- An unspecified flaw exists in the Web Listener
subcomponent that allows an unauthenticated, remote
attacker to cause a denial of service condition.
(CVE-2015-0386) | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 81002 | published | 2015-01-27 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=81002 | title | Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (January 2015 CPU) |
NASL family | Junos Local Security Checks | NASL id | JUNIPER_JSA10759.NASL | description | According to its self-reported version number, the remote Juniper
Junos device is affected by the following vulnerabilities related to
OpenSSL :
- A flaw exists in the ssl3_get_key_exchange() function
in file s3_clnt.c when handling a ServerKeyExchange
message for an anonymous DH ciphersuite with the value
of 'p' set to 0. A attacker can exploit this, by causing
a segmentation fault, to crash an application linked
against the library, resulting in a denial of service.
(CVE-2015-1794)
- A carry propagating flaw exists in the x86_64 Montgomery
squaring implementation that may cause the BN_mod_exp()
function to produce incorrect results. An attacker can
exploit this to obtain sensitive information regarding
private keys. (CVE-2015-3193)
- A NULL pointer dereference flaw exists in file
rsa_ameth.c due to improper handling of ASN.1 signatures
that are missing the PSS parameter. A remote attacker
can exploit this to cause the signature verification
routine to crash, resulting in a denial of service
condition. (CVE-2015-3194)
- A flaw exists in the ASN1_TFLG_COMBINE implementation in
file tasn_dec.c related to handling malformed
X509_ATTRIBUTE structures. A remote attacker can exploit
this to cause a memory leak by triggering a decoding
failure in a PKCS#7 or CMS application, resulting in a
denial of service. (CVE-2015-3195)
- A race condition exists in s3_clnt.c that is triggered
when PSK identity hints are incorrectly updated in the
parent SSL_CTX structure when they are received by a
multi-threaded client. A remote attacker can exploit
this, via a crafted ServerKeyExchange message, to cause
a double-free memory error, resulting in a denial of
service. (CVE-2015-3196)
- A cipher algorithm downgrade vulnerability exists due to
a flaw that is triggered when handling cipher
negotiation. A remote attacker can exploit this to
negotiate SSLv2 ciphers and complete SSLv2 handshakes
even if all SSLv2 ciphers have been disabled on the
server. Note that this vulnerability only exists if the
SSL_OP_NO_SSLv2 option has not been disabled.
(CVE-2015-3197)
- A key disclosure vulnerability exists due to improper
handling of cache-bank conflicts on the Intel
Sandy-bridge microarchitecture. An attacker can exploit
this to gain access to RSA key information.
(CVE-2016-0702)
- A flaw exists in the SSLv2 implementation,
specifically in the get_client_master_key() function
within file s2_srvr.c, due to accepting a nonzero
CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an
arbitrary cipher. A man-in-the-middle attacker can
exploit this to determine the MASTER-KEY value and
decrypt TLS ciphertext by leveraging a Bleichenbacher
RSA padding oracle. (CVE-2016-0703)
- A flaw exists in the SSLv2 oracle protection mechanism,
specifically in the get_client_master_key() function
within file s2_srvr.c, due to incorrectly overwriting
MASTER-KEY bytes during use of export cipher suites.
A remote attackers can exploit this to more easily
decrypt TLS ciphertext by leveraging a Bleichenbacher
RSA padding oracle. (CVE-2016-0704)
- A double-free error exists due to improper validation of
user-supplied input when parsing malformed DSA private
keys. A remote attacker can exploit this to corrupt
memory, resulting in a denial of service condition or
the execution of arbitrary code. (CVE-2016-0705)
- A NULL pointer dereference flaw exists in the
BN_hex2bn() and BN_dec2bn() functions. A remote attacker
can exploit this to trigger a heap corruption, resulting
in the execution of arbitrary code. (CVE-2016-0797)
- A denial of service vulnerability exists due to improper
handling of invalid usernames. A remote attacker can
exploit this, via a specially crafted username, to leak
300 bytes of memory per connection, exhausting available
memory resources. (CVE-2016-0798)
- Multiple memory corruption issues exist that allow a
remote attacker to cause a denial of service condition
or the execution of arbitrary code. (CVE-2016-0799)
- A heap buffer overflow condition exists in the
EVP_EncodeUpdate() function within file
crypto/evp/encode.c that is triggered when handling
a large amount of input data. An unauthenticated, remote
attacker can exploit this to cause a denial of service
condition. (CVE-2016-2105)
- A heap buffer overflow condition exists in the
EVP_EncryptUpdate() function within file
crypto/evp/evp_enc.c that is triggered when handling a
large amount of input data after a previous call occurs
to the same function with a partial block. An
unauthenticated, remote attacker can exploit this to
cause a denial of service condition. (CVE-2016-2106)
- A remote code execution vulnerability exists in the
ASN.1 encoder due to an underflow condition that occurs
when attempting to encode the value zero represented as
a negative integer. An unauthenticated, remote attacker
can exploit this to corrupt memory, resulting in the
execution of arbitrary code. (CVE-2016-2108)
- Multiple unspecified flaws exist in the d2i BIO
functions when reading ASN.1 data from a BIO due to
invalid encoding causing a large allocation of memory.
An unauthenticated, remote attacker can exploit these to
cause a denial of service condition through resource
exhaustion. (CVE-2016-2109)
- Multiple integer overflow conditions exist in s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit this to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- An out-of-bounds read error exists in the X.509 Public
Key Infrastructure Time-Stamp Protocol (TSP)
implementation. An unauthenticated, remote attacker can
exploit this, via a crafted time-stamp file that is
mishandled by the 'openssl ts' command, to cause
denial of service or to disclose sensitive information.
(CVE-2016-2180)
- An overflow condition exists in the BN_bn2dec() function
in bn_print.c due to improper validation of
user-supplied input when handling BIGNUM values. An
unauthenticated, remote attacker can exploit this to
crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- A flaw exists in the tls_decrypt_ticket() function in
t1_lib.c due to improper handling of ticket HMAC
digests. An unauthenticated, remote attacker can exploit
this, via a ticket that is too short, to crash the
process, resulting in a denial of service.
(CVE-2016-6302)
- An integer overflow condition exists in the
MDC2_Update() function in mdc2dgst.c due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a heap-based
buffer overflow, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6303)
- A flaw exists in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources, resulting in a denial of service condition.
(CVE-2016-6304)
- A flaw exists in the SSL_peek() function in
rec_layer_s3.c due to improper handling of empty
records. An unauthenticated, remote attacker can exploit
this, by triggering a zero-length record in an SSL_peek
call, to cause an infinite loop, resulting in a denial
of service condition. (CVE-2016-6305)
- An out-of-bounds read error exists in the certificate
parser that allows an unauthenticated, remote attacker
to cause a denial of service via crafted certificate
operations. (CVE-2016-6306)
- A denial of service vulnerability exists in the
state-machine implementation due to a failure to check
for an excessive length before allocating memory. An
unauthenticated, remote attacker can exploit this, via a
crafted TLS message, to exhaust memory resources.
(CVE-2016-6307)
Note that these issues only affects devices with J-Web or the SSL
service for JUNOScript enabled. | last seen | 2019-01-16 | modified | 2018-08-10 | plugin id | 96316 | published | 2017-01-05 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96316 | title | Juniper Junos Multiple OpenSSL Vulnerabilities (JSA10759) (SWEET32) |
NASL family | Databases | NASL id | MYSQL_5_7_16.NASL | description | The version of MySQL running on the remote host is 5.7.x prior to
5.7.16. It is, therefore, affected by multiple vulnerabilities :
- Multiple integer overflow conditions exist in s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit this to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the DTLS
implementation due to a failure to properly restrict the
lifetime of queue entries associated with unused
out-of-order messages. An unauthenticated, remote
attacker can exploit this, by maintaining multiple
crafted DTLS sessions simultaneously, to exhaust memory.
(CVE-2016-2179)
- An out-of-bounds read error exists in the X.509 Public
Key Infrastructure Time-Stamp Protocol (TSP)
implementation. An unauthenticated, remote attacker can
exploit this, via a crafted time-stamp file that is
mishandled by the 'openssl ts' command, to cause
denial of service or to disclose sensitive information.
(CVE-2016-2180)
- A denial of service vulnerability exists in the
Anti-Replay feature in the DTLS implementation due to
improper handling of epoch sequence numbers in records.
An unauthenticated, remote attacker can exploit this,
via spoofed DTLS records, to cause legitimate packets to
be dropped. (CVE-2016-2181)
- An overflow condition exists in the BN_bn2dec() function
in bn_print.c due to improper validation of
user-supplied input when handling BIGNUM values. An
unauthenticated, remote attacker can exploit this to
crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- An unspecified flaw exists in the Security: Encryption
subcomponent that allows an authenticated, remote
attacker to disclose sensitive information.
(CVE-2016-5584)
- A flaw exists in the tls_decrypt_ticket() function in
t1_lib.c due to improper handling of ticket HMAC
digests. An unauthenticated, remote attacker can exploit
this, via a ticket that is too short, to crash the
process, resulting in a denial of service.
(CVE-2016-6302)
- An integer overflow condition exists in the
MDC2_Update() function in mdc2dgst.c due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a heap-based
buffer overflow, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6303)
- A flaw exists in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources, resulting in a denial of service condition.
(CVE-2016-6304)
- An out-of-bounds read error exists in the certificate
parser that allows an unauthenticated, remote attacker
to cause a denial of service via crafted certificate
operations. (CVE-2016-6306)
- A flaw exists in the check_log_path() function within
file sql/sys_vars.cc due to inadequate restrictions on
the ability to write to the my.cnf configuration file
and allowing the loading of configuration files from
path locations not used by current versions. An
authenticated, remote attacker can exploit this issue
by using specially crafted queries that utilize logging
functionality to create new files or append custom
content to existing files. This allows the attacker to
gain root privileges by inserting a custom .cnf file
with a 'malloc_lib=' directive pointing to specially
crafted mysql_hookandroot_lib.so file and thereby cause
MySQL to load a malicious library the next time it is
started. (CVE-2016-6662)
- A flaw exists in wolfSSL, specifically within the C
software version of AES Encryption and Decryption, due
to table lookups not properly considering cache-bank
access times. A local attacker can exploit this, via a
specially crafted application, to disclose AES keys.
(CVE-2016-7440)
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number. | last seen | 2019-01-16 | modified | 2018-07-17 | plugin id | 94167 | published | 2016-10-20 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=94167 | title | MySQL 5.7.x < 5.7.16 Multiple Vulnerabilities (October 2016 CPU) (SWEET32) |
NASL family | FreeBSD Local Security Checks | NASL id | FREEBSD_PKG_43EAA65680BC11E6BF52B499BAEBFEAF.NASL | description | OpenSSL reports :
High: OCSP Status Request extension unbounded memory growth
SSL_peek() hang on empty record
SWEET32 Mitigation
OOB write in MDC2_Update()
Malformed SHA512 ticket DoS
OOB write in BN_bn2dec()
OOB read in TS_OBJ_print_bio()
Pointer arithmetic undefined behaviour
Constant time flag not preserved in DSA signing
DTLS buffered message DoS
DTLS replay protection DoS
Certificate message OOB reads
Excessive allocation of memory in tls_get_message_header()
Excessive allocation of memory in dtls1_preprocess_fragment()
NB: LibreSSL is only affected by CVE-2016-6304 | last seen | 2018-11-13 | modified | 2018-11-10 | plugin id | 93674 | published | 2016-09-23 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93674 | title | FreeBSD : OpenSSL -- multiple vulnerabilities (43eaa656-80bc-11e6-bf52-b499baebfeaf) |
NASL family | Databases | NASL id | MYSQL_5_6_34_RPM.NASL | description | The version of MySQL running on the remote host is 5.6.x prior to
5.6.34. It is, therefore, affected by multiple vulnerabilities :
- Multiple integer overflow conditions exist in s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit this to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the DTLS
implementation due to a failure to properly restrict the
lifetime of queue entries associated with unused
out-of-order messages. An unauthenticated, remote
attacker can exploit this, by maintaining multiple
crafted DTLS sessions simultaneously, to exhaust memory.
(CVE-2016-2179)
- An out-of-bounds read error exists in the X.509 Public
Key Infrastructure Time-Stamp Protocol (TSP)
implementation. An unauthenticated, remote attacker can
exploit this, via a crafted time-stamp file that is
mishandled by the 'openssl ts' command, to cause
denial of service or to disclose sensitive information.
(CVE-2016-2180)
- A denial of service vulnerability exists in the
Anti-Replay feature in the DTLS implementation due to
improper handling of epoch sequence numbers in records.
An unauthenticated, remote attacker can exploit this,
via spoofed DTLS records, to cause legitimate packets to
be dropped. (CVE-2016-2181)
- An overflow condition exists in the BN_bn2dec() function
in bn_print.c due to improper validation of
user-supplied input when handling BIGNUM values. An
unauthenticated, remote attacker can exploit this to
crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- An unspecified flaw exists in the Optimizer subcomponent
that allows an authenticated, remote attacker to cause a
denial of service condition. (CVE-2016-3492)
- An unspecified flaw exists in the Security: Encryption
subcomponent that allows an authenticated, remote
attacker to disclose sensitive information.
(CVE-2016-5584)
- An unspecified flaw exists in the MyISAM subcomponent
that allows a local attacker to gain elevated
privileges. (CVE-2016-5616)
- An unspecified flaw exists in the Error Handling
subcomponent that allows a local attacker to gain
elevated privileges. (CVE-2016-5617)
- An unspecified flaw exists in the GIS subcomponent that
allows an authenticated, remote attacker to cause a
denial of service condition. (CVE-2016-5626)
- An unspecified flaw exists in the Federated subcomponent
that allows an authenticated, remote attacker to cause a
denial of service condition. (CVE-2016-5629)
- A flaw exists in the tls_decrypt_ticket() function in
t1_lib.c due to improper handling of ticket HMAC
digests. An unauthenticated, remote attacker can exploit
this, via a ticket that is too short, to crash the
process, resulting in a denial of service.
(CVE-2016-6302)
- An integer overflow condition exists in the
MDC2_Update() function in mdc2dgst.c due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a heap-based
buffer overflow, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6303)
- A flaw exists in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources, resulting in a denial of service condition.
(CVE-2016-6304)
- An out-of-bounds read error exists in the certificate
parser that allows an unauthenticated, remote attacker
to cause a denial of service via crafted certificate
operations. (CVE-2016-6306)
- A flaw exists in the check_log_path() function within
file sql/sys_vars.cc due to inadequate restrictions on
the ability to write to the my.cnf configuration file
and allowing the loading of configuration files from
path locations not used by current versions. An
authenticated, remote attacker can exploit this issue
by using specially crafted queries that utilize logging
functionality to create new files or append custom
content to existing files. This allows the attacker to
gain root privileges by inserting a custom .cnf file
with a 'malloc_lib=' directive pointing to specially
crafted mysql_hookandroot_lib.so file and thereby cause
MySQL to load a malicious library the next time it is
started. (CVE-2016-6662)
- A flaw exists in wolfSSL, specifically within the C
software version of AES Encryption and Decryption, due
to table lookups not properly considering cache-bank
access times. A local attacker can exploit this, via a
specially crafted application, to disclose AES keys.
(CVE-2016-7440)
- An unspecified flaw exists in the Types subcomponent
that allows an authenticated, remote attacker to cause
a denial of service condition.(CVE-2016-8283)
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number. | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 94197 | published | 2016-10-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=94197 | title | MySQL 5.6.x < 5.6.34 Multiple Vulnerabilities (October 2016 CPU) (SWEET32) |
NASL family | SuSE Local Security Checks | NASL id | OPENSUSE-2017-201.NASL | description | This update for java-1_8_0-openjdk fixes the following issues: Oracle
Critical Patch Update of January 2017 (bsc#1020905) Upgrade to version
jdk8u121 (icedtea 3.3.0) :
- S8138725: Add options for Javadoc generation
- S8140353: Improve signature checking
- S8151934, CVE-2017-3231: Resolve class resolution
- S8156804, CVE-2017-3241: Better constraint checking
- S8158406: Limited Parameter Processing
- S8158997: JNDI Protocols Switch
- S8159507: RuntimeVisibleAnnotation validation
- S8161218: Better bytecode loading
- S8161743, CVE-2017-3252: Provide proper login context
- S8162577: Standardize logging levels
- S8162973: Better component components
- S8164143, CVE-2017-3260: Improve components for menu
items
- S8164147, CVE-2017-3261: Improve streaming socket output
- S8165071, CVE-2016-2183: Expand TLS support
- S8165344, CVE-2017-3272: Update concurrency support
- S8166988, CVE-2017-3253: Improve image processing
performance
- S8167104, CVE-2017-3289: Additional class construction
refinements
- S8167223, CVE-2016-5552: URL handling improvements
- S8168705, CVE-2016-5547: Better ObjectIdentifier
validation
- S8168714, CVE-2016-5546: Tighten ECDSA validation
- S8168728, CVE-2016-5548: DSA signing improvements
- S8168724, CVE-2016-5549: ECDSA signing improvements
This update was imported from the SUSE:SLE-12-SP1:Update update
project. | last seen | 2019-01-16 | modified | 2017-02-06 | plugin id | 97002 | published | 2017-02-06 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97002 | title | openSUSE Security Update : java-1_8_0-openjdk (openSUSE-2017-201) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2017-0336.NASL | description | An update for java-1.7.1-ibm is now available for Red Hat Enterprise
Linux 6 Supplementary and Red Hat Enterprise Linux 7 Supplementary.
Red Hat Product Security has rated this update as having a security
impact of Critical. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
IBM Java SE version 7 Release 1 includes the IBM Java Runtime
Environment and the IBM Java Software Development Kit.
This update upgrades IBM Java SE 7 to version 7R1 SR4-FP1.
Security Fix(es) :
* This update fixes multiple vulnerabilities in the IBM Java Runtime
Environment and the IBM Java Software Development Kit. Further
information about these flaws can be found on the IBM Java Security
alerts page, listed in the References section. (CVE-2016-2183,
CVE-2016-5546, CVE-2016-5547, CVE-2016-5548, CVE-2016-5549,
CVE-2016-5552, CVE-2017-3231, CVE-2017-3241, CVE-2017-3252,
CVE-2017-3253, CVE-2017-3259, CVE-2017-3261, CVE-2017-3272,
CVE-2017-3289) | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 97460 | published | 2017-03-01 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97460 | title | RHEL 6 / 7 : java-1.7.1-ibm (RHSA-2017:0336) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2017-2710.NASL | description | An update is now available for JBoss Core Services on Red Hat
Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
Red Hat JBoss Core Services is a set of supplementary software for Red
Hat JBoss middleware products. This software, such as Apache HTTP
Server, is common to multiple JBoss middleware products, and is
packaged under Red Hat JBoss Core Services to allow for faster
distribution of updates, and for a more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23
Service Pack 2 serves as an update for Red Hat JBoss Core Services
Apache HTTP Server 2.4.23 Service Pack 1, and includes bug fixes,
which are documented in the Release Notes document linked to in the
References.
Security Fix(es) :
* It was discovered that the httpd's mod_auth_digest module did not
properly initialize memory before using it when processing certain
headers related to digest authentication. A remote attacker could
possibly use this flaw to disclose potentially sensitive information
or cause httpd child process to crash by sending specially crafted
requests to a server. (CVE-2017-9788)
* It was discovered that in httpd 2.4, the internal API function
ap_some_auth_required() could incorrectly indicate that a request was
authenticated even when no authentication was used. An httpd module
using this API function could consequently allow access that should
have been denied. (CVE-2015-3185)
* A flaw was found in the way the DES/3DES cipher was used as part of
the TLS /SSL protocol. A man-in-the-middle attacker could use this
flaw to recover some plaintext data by capturing large amounts of
encrypted traffic between TLS/SSL server and client if the
communication used a DES/3DES based ciphersuite. (CVE-2016-2183)
Red Hat would like to thank OpenVPN for reporting CVE-2016-2183.
Upstream acknowledges Karthikeyan Bhargavan (Inria) and Gaetan
Leurent (Inria) as the original reporters of CVE-2016-2183. | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 103241 | published | 2017-09-15 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=103241 | title | RHEL 6 : JBoss Core Services (RHSA-2017:2710) |
NASL family | SuSE Local Security Checks | NASL id | OPENSUSE-2017-278.NASL | description | This update for java-1_7_0-openjdk fixes the following issues :
- Oracle Critical Patch Update of January 2017 to OpenJDK
7u131 (bsc#1020905) :
- Security Fixes
- S8138725: Add options for Javadoc generation
- S8140353: Improve signature checking
- S8151934, CVE-2017-3231: Resolve class resolution
- S8156804, CVE-2017-3241: Better constraint checking
- S8158406: Limited Parameter Processing
- S8158997: JNDI Protocols Switch
- S8159507: RuntimeVisibleAnnotation validation
- S8161218: Better bytecode loading
- S8161743, CVE-2017-3252: Provide proper login context
- S8162577: Standardize logging levels
- S8162973: Better component components
- S8164143, CVE-2017-3260: Improve components for menu
items
- S8164147, CVE-2017-3261: Improve streaming socket output
- S8165071, CVE-2016-2183: Expand TLS support
- S8165344, CVE-2017-3272: Update concurrency support
- S8166988, CVE-2017-3253: Improve image processing
performance
- S8167104, CVE-2017-3289: Additional class construction
refinements
- S8167223, CVE-2016-5552: URL handling improvements
- S8168705, CVE-2016-5547: Better ObjectIdentifier
validation
- S8168714, CVE-2016-5546: Tighten ECDSA validation
- S8168728, CVE-2016-5548: DSA signing improvments
- S8168724, CVE-2016-5549: ECDSA signing improvments
- S6253144: Long narrowing conversion should describe the
algorithm used and implied 'risks'
- S6328537: Improve javadocs for Socket class by adding
references to SocketOptions
- S6978886: javadoc shows stacktrace after print error
resulting from disk full
- S6995421: Eliminate the static dependency to
sun.security.ec.ECKeyFactory
- S6996372: synchronizing handshaking hash
- S7027045: (doc) java/awt/Window.java has several typos
in javadoc
- S7054969: Null-check-in-finally pattern in java/security
documentation
- S7072353: JNDI libraries do not build with javac
-Xlint:all -Werror
- S7075563: Broken link in 'javax.swing.SwingWorker'
- S7077672: jdk8_tl nightly fail in step-2 build on
8/10/11
- S7088502: Security libraries don't build with javac
-Werror
- S7092447: Clarify the default locale used in each locale
sensitive operation
- S7093640: Enable client-side TLS 1.2 by default
- S7103570: AtomicIntegerFieldUpdater does not work when
SecurityManager is installed
- S7117360: Warnings in java.util.concurrent.atomic
package
- S7117465: Warning cleanup for IMF classes
- S7187144: JavaDoc for ScriptEngineFactory.getProgram()
contains an error
- S8000418: javadoc should used a standard 'generated by
javadoc' string
- S8000666: javadoc should write directly to Writer
instead of composing strings
- S8000673: remove dead code from HtmlWriter and subtypes
- S8000970: break out auxiliary classes that will prevent
multi-core compilation of the JDK
- S8001669: javadoc internal DocletAbortException should
set cause when appropriate
- S8008949: javadoc stopped copying doc-files
- S8011402: Move blacklisting certificate logic from hard
code to data
- S8011547: Update XML Signature implementation to Apache
Santuario 1.5.4
- S8012288: XML DSig API allows wrong tag names and extra
elements in SignedInfo
- S8016217: More javadoc warnings
- S8017325: Cleanup of the javadoc tag in
java.security.cert
- S8017326: Cleanup of the javadoc tag in
java.security.spec
- S8019772: Fix doclint issues in javax.crypto and
javax.security subpackages
- S8020557: javadoc cleanup in javax.security
- S8020688: Broken links in documentation at
http://docs.oracle.com/javase/6/docs/api/index.
- S8021108: Clean up doclint warnings and errors in
java.text package
- S8021417: Fix doclint issues in java.util.concurrent
- S8021833: javadoc cleanup in java.net
- S8022120: JCK test
api/javax_xml/crypto/dsig/TransformService/index_ParamMe
thods fails
- S8022175: Fix doclint warnings in javax.print
- S8022406: Fix doclint issues in java.beans
- S8022746: List of spelling errors in API doc
- S8024779: [macosx] SwingNode crashes on exit
- S8025085: [javadoc] some errors in javax/swing
- S8025218: [javadoc] some errors in java/awt classes
- S8025249: [javadoc] fix some javadoc errors in
javax/swing/
- S8025409: Fix javadoc comments errors and warning
reported by doclint report
- S8026021: more fix of javadoc errors and warnings
reported by doclint, see the description
- S8037099: [macosx] Remove all references to GC from
native OBJ-C code
- S8038184: XMLSignature throws
StringIndexOutOfBoundsException if ID attribute value is
empty String
- S8038349: Signing XML with DSA throws Exception when key
is larger than 1024 bits
- S8049244: XML Signature performance issue caused by
unbuffered signature data
- S8049432: New tests for TLS property
jdk.tls.client.protocols
- S8050893: (smartcardio) Invert reset argument in tests
in sun/security/smartcardio
- S8059212: Modify regression tests so that they do not
just fail if no cardreader found
- S8068279: (typo in the spec)
javax.script.ScriptEngineFactory.getLanguageName
- S8068491: Update the protocol for references of
docs.oracle.com to HTTPS.
- S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java
needs to be updated for JDK-8061210
- S8076369: Introduce the jdk.tls.client.protocols system
property for JDK 7u
- S8139565: Restrict certificates with DSA keys less than
1024 bits
- S8140422: Add mechanism to allow non default root CAs to
be not subject to algorithm restrictions
- S8140587: Atomic*FieldUpdaters should use
Class.isInstance instead of direct class check
- S8143959: Certificates requiring blacklisting
- S8145984: [macosx] sun.lwawt.macosx.CAccessible leaks
- S8148516: Improve the default strength of EC in JDK
- S8149029: Secure validation of XML based digital
signature always enabled when checking wrapping attacks
- S8151893: Add security property to configure XML
Signature secure validation mode
- S8155760: Implement Serialization Filtering
- S8156802: Better constraint checking
- S8161228: URL objects with custom protocol handlers have
port changed after deserializing
- S8161571: Verifying ECDSA signatures permits trailing
bytes
- S8163304: jarsigner -verbose -verify should print the
algorithms used to sign the jar
- S8164908: ReflectionFactory support for IIOP and custom
serialization
- S8165230: RMIConnection addNotificationListeners failing
with specific inputs
- S8166393: disabledAlgorithms property should not be
strictly parsed
- S8166591: [macos 10.12] Trackpad scrolling of text on OS
X 10.12 Sierra is very fast (Trackpad, Retina only)
- S8166739: Improve extensibility of ObjectInputFilter
information passed to the filter
- S8166875: (tz) Support tzdata2016g
- S8166878: Connection reset during TLS handshake
- S8167356: Follow up fix for jdk8 backport of 8164143.
Changes for CMenuComponent.m were missed
- S8167459: Add debug output for indicating if a chosen
ciphersuite was legacy
- S8167472: Chrome interop regression with JDK-8148516
- S8167591: Add MD5 to signed JAR restrictions
- S8168861: AnchorCertificates uses hardcoded password for
cacerts keystore
- S8168993: JDK8u121 L10n resource file update
- S8169191: (tz) Support tzdata2016i
- S8169688: Backout (remove) MD5 from
jdk.jar.disabledAlgorithms for January CPU
- S8169911: Enhanced tests for jarsigner -verbose -verify
after JDK-8163304
- S8170131: Certificates not being blocked by
jdk.tls.disabledAlgorithms property
- S8170268: 8u121 L10n resource file update - msgdrop 20
- S8173622: Backport of 7180907 is incomplete
- S8173849: Fix use of java.util.Base64 in test cases
- S8173854: [TEST] Update DHEKeySizing test case following
8076328 & 8081760
- CVE-2017-3259 Vulnerability allows unauthenticated
attacker with network access via multiple protocols to
compromise Java SE.
- Backports
- S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef
on __APPLE__and _LLP64 systems.
- S8000351, PR3316, RH1390708: Tenuring threshold should
be unsigned
- S8153711, PR3315, RH1284948: [REDO] GlobalRefs never
deleted when processing invokeMethod command
- S8170888, PR3316, RH1390708: [linux] support for cgroup
memory limits in container (ie Docker) environments
- Bug fixes
- PR3318: Replace 'infinality' with 'improved font
rendering' (--enable-improved-font-rendering)
- PR3318: Fix compatibility with vanilla Fontconfig
- PR3318: Fix glyph y advance
- PR3318: Always round glyph advance in 26.6 space
- PR3318: Simplify glyph advance handling
- PR3324: Fix NSS_LIBDIR substitution in
make_generic_profile.sh broken by PR1989
- AArch64 port
- S8165673, PR3320: AArch64: Fix JNI floating point
argument handling
This update was imported from the SUSE:SLE-12:Update update project. | last seen | 2019-01-16 | modified | 2018-12-18 | plugin id | 97287 | published | 2017-02-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97287 | title | openSUSE Security Update : java-1_7_0-openjdk (openSUSE-2017-278) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2017-0337.NASL | description | An update for java-1.7.0-ibm is now available for Red Hat Enterprise
Linux 5 Supplementary.
Red Hat Product Security has rated this update as having a security
impact of Critical. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
IBM Java SE version 7 includes the IBM Java Runtime Environment and
the IBM Java Software Development Kit.
This update upgrades IBM Java SE 7 to version 7 SR10-FP1.
Security Fix(es) :
* This update fixes multiple vulnerabilities in the IBM Java Runtime
Environment and the IBM Java Software Development Kit. Further
information about these flaws can be found on the IBM Java Security
alerts page, listed in the References section. (CVE-2016-2183,
CVE-2016-5546, CVE-2016-5547, CVE-2016-5548, CVE-2016-5549,
CVE-2016-5552, CVE-2017-3231, CVE-2017-3241, CVE-2017-3252,
CVE-2017-3253, CVE-2017-3259, CVE-2017-3261, CVE-2017-3272,
CVE-2017-3289) | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 97461 | published | 2017-03-01 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97461 | title | RHEL 5 : java-1.7.0-ibm (RHSA-2017:0337) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2017-1444-1.NASL | description | This update for java-1_6_0-ibm fixes the following issues :
- CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in
inftrees.c
- CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in
inffast.c
- CVE-2016-9842: zlib: Undefined left shift of negative
number
- CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
- CVE-2017-1289: IBM JDK: XML External Entity Injection
(XXE) error when processing XML data
- CVE-2017-3509: OpenJDK: improper re-use of NTLM
authenticated connections
- CVE-2017-3539: OpenJDK: MD5 allowed for jar verification
- CVE-2017-3533: OpenJDK: newline injection in the FTP
client
- CVE-2017-3544: OpenJDK: newline injection in the SMTP
client
- Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-30 | plugin id | 100540 | published | 2017-05-31 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=100540 | title | SUSE SLES11 Security Update : java-1_6_0-ibm (SUSE-SU-2017:1444-1) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2017-2709.NASL | description | An update is now available for JBoss Core Services on Red Hat
Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
Red Hat JBoss Core Services is a set of supplementary software for Red
Hat JBoss middleware products. This software, such as Apache HTTP
Server, is common to multiple JBoss middleware products, and is
packaged under Red Hat JBoss Core Services to allow for faster
distribution of updates, and for a more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23
Service Pack 2 serves as an update for Red Hat JBoss Core Services
Apache HTTP Server 2.4.23 Service Pack 1, and includes bug fixes,
which are documented in the Release Notes document linked to in the
References.
Security Fix(es) :
* It was discovered that the httpd's mod_auth_digest module did not
properly initialize memory before using it when processing certain
headers related to digest authentication. A remote attacker could
possibly use this flaw to disclose potentially sensitive information
or cause httpd child process to crash by sending specially crafted
requests to a server. (CVE-2017-9788)
* It was discovered that in httpd 2.4, the internal API function
ap_some_auth_required() could incorrectly indicate that a request was
authenticated even when no authentication was used. An httpd module
using this API function could consequently allow access that should
have been denied. (CVE-2015-3185)
* A flaw was found in the way the DES/3DES cipher was used as part of
the TLS /SSL protocol. A man-in-the-middle attacker could use this
flaw to recover some plaintext data by capturing large amounts of
encrypted traffic between TLS/SSL server and client if the
communication used a DES/3DES based ciphersuite. (CVE-2016-2183)
Red Hat would like to thank OpenVPN for reporting CVE-2016-2183.
Upstream acknowledges Karthikeyan Bhargavan (Inria) and Gaetan
Leurent (Inria) as the original reporters of CVE-2016-2183. | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 103240 | published | 2017-09-15 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=103240 | title | RHEL 7 : JBoss Core Services (RHSA-2017:2709) |
NASL family | General | NASL id | SSL_64BITBLOCK_SUPPORTED_CIPHERS.NASL | description | The remote host supports the use of a block cipher with 64-bit blocks
in one or more cipher suites. It is, therefore, affected by a
vulnerability, known as SWEET32, due to the use of weak 64-bit block
ciphers. A man-in-the-middle attacker who has sufficient resources can
exploit this vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret and a known
plaintext, allowing the disclosure of the secret text, such as secure
HTTPS cookies, and possibly resulting in the hijacking of an
authenticated session.
Proof-of-concepts have shown that attackers can recover authentication
cookies from an HTTPS session in as little as 30 hours.
Note that the ability to send a large number of requests over the
same TLS connection between the client and server is an important
requirement for carrying out this attack. If the number of requests
allowed for a single connection were limited, this would mitigate the
vulnerability. This plugin requires report paranoia as Nessus has not
checked for such a mitigation. | last seen | 2019-01-16 | modified | 2018-11-08 | plugin id | 94437 | published | 2016-11-01 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=94437 | title | SSL 64-bit Block Size Cipher Suites Supported (SWEET32) |
NASL family | Databases | NASL id | ORACLE_RDBMS_CPU_JUL_2017.NASL | description | The remote Oracle Database Server is missing the July 2017 Critical
Patch Update (CPU). It is, therefore, affected by multiple
vulnerabilities :
- A man-in-the-middle (MitM) information disclosure
vulnerability, known as POODLE, exists due to the way
SSL 3.0 handles padding bytes when decrypting messages
encrypted using block ciphers in cipher block chaining
(CBC) mode. A MitM attacker can decrypt a selected byte
of a cipher text in as few as 256 tries if they are able
to force a victim application to repeatedly send the
same data over newly created SSL 3.0 connections.
(CVE-2014-3566)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- An unspecified vulnerability exists in the RDBMS
Security component that allows a local attacker to
impact integrity. Note that the attacker would need to
have Create Session or Select Any Dictionary privileges.
(CVE-2017-10120)
- An unspecified vulnerability exists in the OJVM
component that allows an authenticated, remote attacker
to impact confidentiality, integrity, and availability.
Note that the attacker would need to have Create
Session or Create Procedure privileges. (CVE-2017-10202) | last seen | 2019-01-16 | modified | 2018-11-27 | plugin id | 101836 | published | 2017-07-20 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=101836 | title | Oracle Database Multiple Vulnerabilities (July 2017 CPU) (POODLE) (SWEET32) |
NASL family | Slackware Local Security Checks | NASL id | SLACKWARE_SSA_2016-363-01.NASL | description | New python packages are available for Slackware 14.0, 14.1, 14.2, and
-current to fix security issues. | last seen | 2018-09-05 | modified | 2018-09-04 | plugin id | 96165 | published | 2016-12-29 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96165 | title | Slackware 14.0 / 14.1 / 14.2 / current : python (SSA:2016-363-01) (httpoxy) |
NASL family | Databases | NASL id | MYSQL_5_6_34.NASL | description | The version of MySQL running on the remote host is 5.6.x prior to
5.6.34. It is, therefore, affected by multiple vulnerabilities :
- Multiple integer overflow conditions exist in s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit this to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the DTLS
implementation due to a failure to properly restrict the
lifetime of queue entries associated with unused
out-of-order messages. An unauthenticated, remote
attacker can exploit this, by maintaining multiple
crafted DTLS sessions simultaneously, to exhaust memory.
(CVE-2016-2179)
- An out-of-bounds read error exists in the X.509 Public
Key Infrastructure Time-Stamp Protocol (TSP)
implementation. An unauthenticated, remote attacker can
exploit this, via a crafted time-stamp file that is
mishandled by the 'openssl ts' command, to cause
denial of service or to disclose sensitive information.
(CVE-2016-2180)
- A denial of service vulnerability exists in the
Anti-Replay feature in the DTLS implementation due to
improper handling of epoch sequence numbers in records.
An unauthenticated, remote attacker can exploit this,
via spoofed DTLS records, to cause legitimate packets to
be dropped. (CVE-2016-2181)
- An overflow condition exists in the BN_bn2dec() function
in bn_print.c due to improper validation of
user-supplied input when handling BIGNUM values. An
unauthenticated, remote attacker can exploit this to
crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- An unspecified flaw exists in the Optimizer subcomponent
that allows an authenticated, remote attacker to cause a
denial of service condition. (CVE-2016-3492)
- An unspecified flaw exists in the Security: Encryption
subcomponent that allows an authenticated, remote
attacker to disclose sensitive information.
(CVE-2016-5584)
- An unspecified flaw exists in the MyISAM subcomponent
that allows a local attacker to gain elevated
privileges. (CVE-2016-5616)
- An unspecified flaw exists in the Error Handling
subcomponent that allows a local attacker to gain
elevated privileges. (CVE-2016-5617)
- An unspecified flaw exists in the GIS subcomponent that
allows an authenticated, remote attacker to cause a
denial of service condition. (CVE-2016-5626)
- An unspecified flaw exists in the Federated subcomponent
that allows an authenticated, remote attacker to cause a
denial of service condition. (CVE-2016-5629)
- A flaw exists in the tls_decrypt_ticket() function in
t1_lib.c due to improper handling of ticket HMAC
digests. An unauthenticated, remote attacker can exploit
this, via a ticket that is too short, to crash the
process, resulting in a denial of service.
(CVE-2016-6302)
- An integer overflow condition exists in the
MDC2_Update() function in mdc2dgst.c due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a heap-based
buffer overflow, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6303)
- A flaw exists in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources, resulting in a denial of service condition.
(CVE-2016-6304)
- An out-of-bounds read error exists in the certificate
parser that allows an unauthenticated, remote attacker
to cause a denial of service via crafted certificate
operations. (CVE-2016-6306)
- A flaw exists in the check_log_path() function within
file sql/sys_vars.cc due to inadequate restrictions on
the ability to write to the my.cnf configuration file
and allowing the loading of configuration files from
path locations not used by current versions. An
authenticated, remote attacker can exploit this issue
by using specially crafted queries that utilize logging
functionality to create new files or append custom
content to existing files. This allows the attacker to
gain root privileges by inserting a custom .cnf file
with a 'malloc_lib=' directive pointing to specially
crafted mysql_hookandroot_lib.so file and thereby cause
MySQL to load a malicious library the next time it is
started. (CVE-2016-6662)
- A flaw exists in wolfSSL, specifically within the C
software version of AES Encryption and Decryption, due
to table lookups not properly considering cache-bank
access times. A local attacker can exploit this, via a
specially crafted application, to disclose AES keys.
(CVE-2016-7440)
- An unspecified flaw exists in the Types subcomponent
that allows an authenticated, remote attacker to cause
a denial of service condition.(CVE-2016-8283) | last seen | 2019-01-16 | modified | 2018-07-17 | plugin id | 94166 | published | 2016-10-20 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=94166 | title | MySQL 5.6.x < 5.6.34 Multiple Vulnerabilities (October 2016 CPU) (SWEET32) |
NASL family | Web Servers | NASL id | OPENSSL_1_1_0.NASL | description | According to its banner, the version of OpenSSL running on the remote
host is prior to 1.0.2i. It is, therefore, affected by a vulnerability,
known as SWEET32, in the 3DES and Blowfish algorithms due to the use
of weak 64-bit block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this vulnerability, via a
'birthday' attack, to detect a collision that leaks the XOR between
the fixed secret and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly resulting in
the hijacking of an authenticated session. | last seen | 2019-01-16 | modified | 2018-09-17 | plugin id | 93112 | published | 2016-08-25 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93112 | title | OpenSSL < 1.0.2i Default Weak 64-bit Block Cipher (SWEET32) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2017-0460-1.NASL | description | This update for java-1_8_0-ibm to version 8.0-4.0 fixes a lot of
security issues (bsc#1024218): Following CVEs are fixed: CVE-2016-5552
CVE-2017-3231 CVE-2017-3241 CVE-2017-3253 CVE-2017-3259 CVE-2017-3261
CVE-2017-3272 CVE-2017-3289 CVE-2016-2183 CVE-2016-5547 CVE-2016-5548
CVE-2016-5549 CVE-2017-3252 More information can be found on:
https://developer.ibm.com/javasdk/support/security-vulnerabilities/
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-30 | plugin id | 97187 | published | 2017-02-15 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97187 | title | SUSE SLES12 Security Update : java-1_8_0-ibm (SUSE-SU-2017:0460-1) |
NASL family | Scientific Linux Local Security Checks | NASL id | SL_20160927_OPENSSL_ON_SL6_X.NASL | description | Security Fix(es) :
- A memory leak flaw was found in the way OpenSSL handled
TLS status request extension data during session
renegotiation. A remote attacker could cause a TLS
server using OpenSSL to consume an excessive amount of
memory and, possibly, exit unexpectedly after exhausting
all available memory, if it enabled OCSP stapling
support. (CVE-2016-6304)
- It was discovered that OpenSSL did not always use
constant time operations when computing Digital
Signature Algorithm (DSA) signatures. A local attacker
could possibly use this flaw to obtain a private DSA key
belonging to another user or service running on the same
system. (CVE-2016-2178)
- It was discovered that the Datagram TLS (DTLS)
implementation could fail to release memory in certain
cases. A malicious DTLS client could cause a DTLS server
using OpenSSL to consume an excessive amount of memory
and, possibly, exit unexpectedly after exhausting all
available memory. (CVE-2016-2179)
- A flaw was found in the Datagram TLS (DTLS) replay
protection implementation in OpenSSL. A remote attacker
could possibly use this flaw to make a DTLS server using
OpenSSL to reject further packets sent from a DTLS
client over an established DTLS connection.
(CVE-2016-2181)
- An out of bounds write flaw was discovered in the
OpenSSL BN_bn2dec() function. An attacker able to make
an application using OpenSSL to process a large BIGNUM
could cause the application to crash or, possibly,
execute arbitrary code. (CVE-2016-2182)
- A flaw was found in the DES/3DES cipher was used as part
of the TLS/SSL protocol. A man-in-the-middle attacker
could use this flaw to recover some plaintext data by
capturing large amounts of encrypted traffic between
TLS/SSL server and client if the communication used a
DES/3DES based ciphersuite. (CVE-2016-2183)
This update mitigates the CVE-2016-2183 issue by lowering priority of
DES cipher suites so they are not preferred over cipher suites using
AES. For compatibility reasons, DES cipher suites remain enabled by
default and included in the set of cipher suites identified by the
HIGH cipher string. Future updates may move them to MEDIUM or not
enable them by default.
- An integer underflow flaw leading to a buffer over-read
was found in the way OpenSSL parsed TLS session tickets.
A remote attacker could use this flaw to crash a TLS
server using OpenSSL if it used SHA-512 as HMAC for
session tickets. (CVE-2016-6302)
- Multiple integer overflow flaws were found in the way
OpenSSL performed pointer arithmetic. A remote attacker
could possibly use these flaws to cause a TLS/SSL server
or client using OpenSSL to crash. (CVE-2016-2177)
- An out of bounds read flaw was found in the way OpenSSL
formatted Public Key Infrastructure Time-Stamp Protocol
data for printing. An attacker could possibly cause an
application using OpenSSL to crash if it printed time
stamp data from the attacker. (CVE-2016-2180)
- Multiple out of bounds read flaws were found in the way
OpenSSL handled certain TLS/SSL protocol handshake
messages. A remote attacker could possibly use these
flaws to crash a TLS/SSL server or client using OpenSSL.
(CVE-2016-6306) | last seen | 2019-01-16 | modified | 2018-12-28 | plugin id | 93795 | published | 2016-09-29 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93795 | title | Scientific Linux Security Update : openssl on SL6.x, SL7.x i386/x86_64 |
NASL family | Amazon Linux Local Security Checks | NASL id | ALA_ALAS-2016-755.NASL | description | It was discovered that OpenSSL did not always use constant time
operations when computing Digital Signature Algorithm (DSA)
signatures. A local attacker could possibly use this flaw to obtain a
private DSA key belonging to another user or service running on the
same system. (CVE-2016-2178)
It was discovered that the Datagram TLS (DTLS) implementation could
fail to release memory in certain cases. A malicious DTLS client could
cause a DTLS server using OpenSSL to consume an excessive amount of
memory and, possibly, exit unexpectedly after exhausting all available
memory. (CVE-2016-2179)
A flaw was found in the Datagram TLS (DTLS) replay protection
implementation in OpenSSL. A remote attacker could possibly use this
flaw to make a DTLS server using OpenSSL to reject further packets
sent from a DTLS client over an established DTLS connection.
(CVE-2016-2181)
An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec()
function. An attacker able to make an application using OpenSSL to
process a large BIGNUM could cause the application to crash or,
possibly, execute arbitrary code. (CVE-2016-2182)
A flaw was found in the DES/3DES cipher was used as part of the
TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to
recover some plaintext data by capturing large amounts of encrypted
traffic between TLS/SSL server and client if the communication used a
DES/3DES based ciphersuite. (CVE-2016-2183)
An integer underflow flaw leading to a buffer over-read was found in
the way OpenSSL parsed TLS session tickets. A remote attacker could
use this flaw to crash a TLS server using OpenSSL if it used SHA-512
as HMAC for session tickets. (CVE-2016-6302)
Multiple integer overflow flaws were found in the way OpenSSL
performed pointer arithmetic. A remote attacker could possibly use
these flaws to cause a TLS/SSL server or client using OpenSSL to
crash. (CVE-2016-2177)
An out of bounds read flaw was found in the way OpenSSL formatted
Public Key Infrastructure Time-Stamp Protocol data for printing. An
attacker could possibly cause an application using OpenSSL to crash if
it printed time stamp data from the attacker. (CVE-2016-2180)
Multiple out of bounds read flaws were found in the way OpenSSL
handled certain TLS/SSL protocol handshake messages. A remote attacker
could possibly use these flaws to crash a TLS/SSL server or client
using OpenSSL. (CVE-2016-6306)
This update mitigates the CVE-2016-2183 issue by lowering priority of
DES cipher suites so they are not preferred over cipher suites using
AES. For compatibility reasons, DES cipher suites remain enabled by
default and included in the set of cipher suites identified by the
HIGH cipher string. Future updates may move them to MEDIUM or not
enable them by default. | last seen | 2019-01-16 | modified | 2018-04-18 | plugin id | 94021 | published | 2016-10-13 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=94021 | title | Amazon Linux AMI : openssl (ALAS-2016-755) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2017-3240.NASL | description | An update is now available for Red Hat JBoss Enterprise Application
Platform 6.4 for RHEL 6 and Red Hat JBoss Enterprise Application
Platform 6.4 for RHEL 7.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
[Updated 21st November 2017] Previously, this erratum was marked as a
replacement of the JBoss Enterprise Application Platform 6.4.16
Natives. This was incorrect; the erratum is an update, not a
replacement. The erratum text has been modified to reflect this.
Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.
This release provides an update to httpd and OpenSSL. The updates are
documented in the Release Notes document linked to in the References.
The httpd packages provide the Apache HTTP Server, a powerful,
efficient, and extensible web server.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL)
and Transport Layer Security (TLS) protocols, as well as a
full-strength general-purpose cryptography library.
This release of JBoss Enterprise Application Platform 6.4.18 Natives
serves as an update to the JBoss Enterprise Application Platform
6.4.16 Natives and includes bug fixes which are documented in the
Release Notes document linked to in the References.
All users of Red Hat JBoss Enterprise Application Platform 6.4 Natives
are advised to upgrade to these updated packages.
Security Fix(es) :
* It was discovered that the httpd's mod_auth_digest module did not
properly initialize memory before using it when processing certain
headers related to digest authentication. A remote attacker could
possibly use this flaw to disclose potentially sensitive information
or cause httpd child process to crash by sending specially crafted
requests to a server. (CVE-2017-9788)
* A flaw was found in the way the DES/3DES cipher was used as part of
the TLS /SSL protocol. A man-in-the-middle attacker could use this
flaw to recover some plaintext data by capturing large amounts of
encrypted traffic between TLS/SSL server and client if the
communication used a DES/3DES based ciphersuite. (CVE-2016-2183)
* A use-after-free flaw was found in the way httpd handled invalid and
previously unregistered HTTP methods specified in the Limit directive
used in an .htaccess file. A remote attacker could possibly use this
flaw to disclose portions of the server memory, or cause httpd child
process to crash. (CVE-2017-9798)
Red Hat would like to thank OpenVPN for reporting CVE-2016-2183 and
Hanno Bock for reporting CVE-2017-9798. Upstream acknowledges
Karthikeyan Bhargavan (Inria) and Gaetan Leurent (Inria) as the
original reporters of CVE-2016-2183.
Bug Fix(es) :
* CRL checking of very large CRLs fails with OpenSSL 1.0.2
(BZ#1508880)
* mod_cluster segfaults in process_info() due to wrongly generated
assembler instruction movslq (BZ#1508884)
* Corruption in nodestatsmem in multiple core dumps but in different
functions of each core dump. (BZ#1508885) | last seen | 2019-01-16 | modified | 2018-12-20 | plugin id | 104699 | published | 2017-11-20 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=104699 | title | RHEL 6 / 7 : JBoss EAP (RHSA-2017:3240) (Optionsbleed) |
NASL family | Ubuntu Local Security Checks | NASL id | UBUNTU_USN-3194-1.NASL | description | Karthik Bhargavan and Gaetan Leurent discovered that the DES and
Triple DES ciphers were vulnerable to birthday attacks. A remote
attacker could possibly use this flaw to obtain clear text data from
long encrypted sessions. This update moves those algorithms to the
legacy algorithm set and causes them to be used only if no non-legacy
algorithms can be negotiated. (CVE-2016-2183)
It was discovered that OpenJDK accepted ECSDA signatures using
non-canonical DER encoding. An attacker could use this to modify or
expose sensitive data. (CVE-2016-5546)
It was discovered that OpenJDK did not properly verify object
identifier (OID) length when reading Distinguished Encoding Rules
(DER) records, as used in x.509 certificates and elsewhere. An
attacker could use this to cause a denial of service (memory
consumption). (CVE-2016-5547)
It was discovered that covert timing channel vulnerabilities existed
in the DSA implementations in OpenJDK. A remote attacker could use
this to expose sensitive information. (CVE-2016-5548)
It was discovered that the URLStreamHandler class in OpenJDK did not
properly parse user information from a URL. A remote attacker could
use this to expose sensitive information. (CVE-2016-5552)
It was discovered that the URLClassLoader class in OpenJDK did not
properly check access control context when downloading class files. A
remote attacker could use this to expose sensitive information.
(CVE-2017-3231)
It was discovered that the Remote Method Invocation (RMI)
implementation in OpenJDK performed deserialization of untrusted
inputs. A remote attacker could use this to execute arbitrary code.
(CVE-2017-3241)
It was discovered that the Java Authentication and Authorization
Service (JAAS) component of OpenJDK did not properly perform user
search LDAP queries. An attacker could use a specially constructed
LDAP entry to expose or modify sensitive information. (CVE-2017-3252)
It was discovered that the PNGImageReader class in OpenJDK did not
properly handle iTXt and zTXt chunks. An attacker could use this to
cause a denial of service (memory consumption). (CVE-2017-3253)
It was discovered that integer overflows existed in the
SocketInputStream and SocketOutputStream classes of OpenJDK. An
attacker could use this to expose sensitive information.
(CVE-2017-3261)
It was discovered that the atomic field updaters in the
java.util.concurrent.atomic package in OpenJDK did not properly
restrict access to protected field members. An attacker could use this
to specially craft a Java application or applet that could bypass Java
sandbox restrictions. (CVE-2017-3272)
It was discovered that a vulnerability existed in the class
construction implementation in OpenJDK. An attacker could use this to
specially craft a Java application or applet that could bypass Java
sandbox restrictions. (CVE-2017-3289).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-12-01 | plugin id | 97084 | published | 2017-02-09 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97084 | title | Ubuntu 12.04 LTS / 14.04 LTS : openjdk-7 vulnerabilities (USN-3194-1) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2017-0716-1.NASL | description | This update for java-1_7_1-ibm fixes the following issues: Security
issue fixed :
- CVE-2016-2183: The DES and Triple DES ciphers, as used
in the TLS, SSH, and IPSec protocols and other protocols
and products, have a birthday bound of approximately
four billion blocks, which makes it easier for remote
attackers to obtain cleartext data via a birthday attack
against a long-duration encrypted session, as
demonstrated by an HTTPS session using Triple DES in CBC
mode, aka a 'Sweet32' attack. (bsc#1027038)
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-30 | plugin id | 97826 | published | 2017-03-20 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97826 | title | SUSE SLES11 Security Update : java-1_7_0-ibm (SUSE-SU-2017:0716-1) |
NASL family | Misc. | NASL id | ORACLE_ENTERPRISE_MANAGER_APR_2017_CPU.NASL | description | The version of Oracle Enterprise Manager Grid Control installed on
the remote host is missing a security patch. It is, therefore,
affected by multiple vulnerabilities :
- Multiple integer overflow conditions exist in the
OpenSSL component in s3_srvr.c, ssl_sess.c, and t1_lib.c
due to improper use of pointer arithmetic for
heap-buffer boundary checks. An unauthenticated, remote
attacker can exploit this to cause a denial of service
condition. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
OpenSSL component in dsa_sign_setup() function in
dsa_ossl.c due to a failure to properly ensure the use
of constant-time operations. An unauthenticated, remote
attacker can exploit this, via a timing side-channel
attack, to disclose DSA key information. (CVE-2016-2178)
- A denial of service vulnerability exists in the OpenSSL
component in the DTLS implementation due to a failure to
properly restrict the lifetime of queue entries
associated with unused out-of-order messages. An
unauthenticated, remote attacker can exploit this, by
maintaining multiple crafted DTLS sessions
simultaneously, to exhaust memory. (CVE-2016-2179)
- An out-of-bounds read error exists in the OpenSSL
component in the X.509 Public Key Infrastructure
Time-Stamp Protocol (TSP) implementation. An
unauthenticated, remote attacker can exploit this, via a
crafted time-stamp file that is mishandled by the
'openssl ts' command, to cause denial of service or to
disclose sensitive information. (CVE-2016-2180)
- A denial of service vulnerability exists in the OpenSSL
component in the Anti-Replay feature in the DTLS
implementation due to improper handling of epoch
sequence numbers in records. An unauthenticated, remote
attacker can exploit this, via spoofed DTLS records, to
cause legitimate packets to be dropped. (CVE-2016-2181)
- An overflow condition exists in the OpenSSL component in
the BN_bn2dec() function in bn_print.c due to improper
validation of user-supplied input when handling BIGNUM
values. An unauthenticated, remote attacker can exploit
this to crash the process. (CVE-2016-2182)
- A vulnerability exists in the OpenSSL component, known
as SWEET32, in the 3DES and Blowfish algorithms due to
the use of weak 64-bit block ciphers by default. A
man-in-the-middle attacker who has sufficient resources
can exploit this vulnerability, via a 'birthday' attack,
to detect a collision that leaks the XOR between the
fixed secret and a known plaintext, allowing the
disclosure of the secret text, such as secure HTTPS
cookies, and possibly resulting in the hijacking of an
authenticated session. (CVE-2016-2183)
- A denial of service vulnerability exists in the Apache
Commons FileUpload component due to improper handling of
boundaries in content-type headers when handling file
upload requests. An unauthenticated, remote attacker can
exploit this to cause processes linked against the
library to become unresponsive. (CVE-2016-3092)
- A flaw exists in the OpenSSL component in the
tls_decrypt_ticket() function in t1_lib.c due to
improper handling of ticket HMAC digests. An
unauthenticated, remote attacker can exploit this, via a
ticket that is too short, to crash the process,
resulting in a denial of service. (CVE-2016-6302)
- An integer overflow condition exists in the OpenSSL
component in the MDC2_Update() function in mdc2dgst.c
due to improper validation of user-supplied input. An
unauthenticated, remote attacker can exploit this to
cause a heap-based buffer overflow, resulting in a
denial of service condition or possibly the execution of
arbitrary code. (CVE-2016-6303)
- A flaw exists in the OpenSSL component in the
ssl_parse_clienthello_tlsext() function in t1_lib.c due
to improper handling of overly large OCSP Status Request
extensions from clients. An unauthenticated, remote
attacker can exploit this, via large OCSP Status Request
extensions, to exhaust memory resources, resulting in a
denial of service condition. (CVE-2016-6304)
- A flaw exists in the OpenSSL component in the SSL_peek()
function in rec_layer_s3.c due to improper handling of
empty records. An unauthenticated, remote attacker can
exploit this, by triggering a zero-length record in an
SSL_peek call, to cause an infinite loop, resulting in a
denial of service condition. (CVE-2016-6305)
- An out-of-bounds read error exists in the OpenSSL
component in the certificate parser that allows an
unauthenticated, remote attacker to cause a denial of
service via crafted certificate operations.
(CVE-2016-6306)
- A denial of service vulnerability exists in the OpenSSL
component in the state-machine implementation due to a
failure to check for an excessive length before
allocating memory. An unauthenticated, remote attacker
can exploit this, via a crafted TLS message, to exhaust
memory resources. (CVE-2016-6307)
- A denial of service vulnerability exists in the OpenSSL
component in the DTLS implementation due to improper
handling of excessively long DTLS messages. An
unauthenticated, remote attacker can exploit this, via a
crafted DTLS message, to exhaust available memory
resources. (CVE-2016-6308)
- A remote code execution vulnerability exists in the
OpenSSL component in the read_state_machine() function
in statem.c due to improper handling of messages larger
than 16k. An unauthenticated, remote attacker can
exploit this, via a specially crafted message, to cause
a use-after-free error, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6309)
- A denial of service vulnerability exists in the OpenSSL
component in x509_vfy.c due to improper handling of
certificate revocation lists (CRLs). An unauthenticated,
remote attacker can exploit this, via a specially
crafted CRL, to cause a NULL pointer dereference,
resulting in a crash of the service condition.
(CVE-2016-7052)
- An unspecified flaw exists in the Discovery Framework
subcomponent that allows an unauthenticated, remote
attacker to cause a denial of service condition.
(CVE-2017-3518) | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 99594 | published | 2017-04-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=99594 | title | Oracle Enterprise Manager Grid Control Multiple Vulnerabilities (April 2017 CPU) (SWEET32) |
NASL family | OracleVM Local Security Checks | NASL id | ORACLEVM_OVMSA-2016-0135.NASL | description | The remote OracleVM system is missing necessary patches to address
critical security updates :
- fix CVE-2016-2177 - possible integer overflow
- fix CVE-2016-2178 - non-constant time DSA operations
- fix CVE-2016-2179 - further DoS issues in DTLS
- fix CVE-2016-2180 - OOB read in TS_OBJ_print_bio
- fix CVE-2016-2181 - DTLS1 replay protection and
unprocessed records issue
- fix CVE-2016-2182 - possible buffer overflow in
BN_bn2dec
- fix CVE-2016-6302 - insufficient TLS session ticket HMAC
length check
- fix CVE-2016-6304 - unbound memory growth with OCSP
status request
- fix CVE-2016-6306 - certificate message OOB reads
- mitigate CVE-2016-2183 - degrade all 64bit block ciphers
and RC4 to 112 bit effective strength
- replace expired testing certificates
- fix CVE-2016-2105 - possible overflow in base64 encoding
- fix CVE-2016-2106 - possible overflow in
EVP_EncryptUpdate
- fix CVE-2016-2107 - padding oracle in stitched AES-NI
CBC-MAC
- fix CVE-2016-2108 - memory corruption in ASN.1 encoder
- fix CVE-2016-2109 - possible DoS when reading ASN.1 data
from BIO
- fix CVE-2016-0799 - memory issues in BIO_printf | last seen | 2019-01-16 | modified | 2018-07-24 | plugin id | 93761 | published | 2016-09-28 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93761 | title | OracleVM 3.3 / 3.4 : openssl (OVMSA-2016-0135) |
NASL family | Web Servers | NASL id | OPENSSL_1_0_2I.NASL | description | According to its banner, the remote host is running a version of
OpenSSL 1.0.2 prior to 1.0.2i. It is, therefore, affected by the
following vulnerabilities :
- Multiple integer overflow conditions exist in s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit this to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the DTLS
implementation due to a failure to properly restrict the
lifetime of queue entries associated with unused
out-of-order messages. An unauthenticated, remote
attacker can exploit this, by maintaining multiple
crafted DTLS sessions simultaneously, to exhaust memory.
(CVE-2016-2179)
- An out-of-bounds read error exists in the X.509 Public
Key Infrastructure Time-Stamp Protocol (TSP)
implementation. An unauthenticated, remote attacker can
exploit this, via a crafted time-stamp file that is
mishandled by the 'openssl ts' command, to cause
denial of service or to disclose sensitive information.
(CVE-2016-2180)
- A denial of service vulnerability exists in the
Anti-Replay feature in the DTLS implementation due to
improper handling of epoch sequence numbers in records.
An unauthenticated, remote attacker can exploit this,
via spoofed DTLS records, to cause legitimate packets to
be dropped. (CVE-2016-2181)
- An overflow condition exists in the BN_bn2dec() function
in bn_print.c due to improper validation of
user-supplied input when handling BIGNUM values. An
unauthenticated, remote attacker can exploit this to
crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- A flaw exists in the tls_decrypt_ticket() function in
t1_lib.c due to improper handling of ticket HMAC
digests. An unauthenticated, remote attacker can exploit
this, via a ticket that is too short, to crash the
process, resulting in a denial of service.
(CVE-2016-6302)
- An integer overflow condition exists in the
MDC2_Update() function in mdc2dgst.c due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a heap-based
buffer overflow, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6303)
- A flaw exists in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources, resulting in a denial of service condition.
(CVE-2016-6304)
- An out-of-bounds read error exists in the certificate
parser that allows an unauthenticated, remote attacker
to cause a denial of service via crafted certificate
operations. (CVE-2016-6306)
- A flaw exists in the GOST ciphersuites due to the use of
long-term keys to establish an encrypted connection. A
man-in-the-middle attacker can exploit this, via a Key
Compromise Impersonation (KCI) attack, to impersonate
the server. | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 93815 | published | 2016-09-30 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93815 | title | OpenSSL 1.0.2 < 1.0.2i Multiple Vulnerabilities (SWEET32) |
NASL family | Misc. | NASL id | VMWARE_ESXI_6_0_BUILD_5485776_REMOTE.NASL | description | The version of the remote VMware ESXi 6.0 host is prior to build
5224529. It is, therefore, affected by multiple vulnerabilities in
VMWare Tools and the bundled OpenSSL and Python packages, as well
as a NULL pointer dereference vulnerability related to handling RPC
requests that could allow an attacker to crash a virtual machine. | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 102698 | published | 2017-09-20 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=102698 | title | ESXi 6.0 < Build 5485776 Multiple Vulnerabilities (VMSA-2017-0015) (remote check) |
NASL family | Ubuntu Local Security Checks | NASL id | UBUNTU_USN-3270-1.NASL | description | Karthik Bhargavan and Gaetan Leurent discovered that the DES and
Triple DES ciphers were vulnerable to birthday attacks. A remote
attacker could possibly use this flaw to obtain clear text data from
long encrypted sessions. This update causes NSS to limit use of the
same symmetric key. (CVE-2016-2183)
It was discovered that NSS incorrectly handled Base64 decoding. A
remote attacker could use this flaw to cause NSS to crash, resulting
in a denial of service, or possibly execute arbitrary code.
(CVE-2017-5461)
This update refreshes the NSS package to version 3.28.4 which includes
the latest CA certificate bundle.
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-12-01 | plugin id | 99724 | published | 2017-04-28 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=99724 | title | Ubuntu 14.04 LTS / 16.04 LTS / 16.10 / 17.04 : nss vulnerabilities (USN-3270-1) |
NASL family | Misc. | NASL id | ORACLE_JAVA_CPU_JAN_2017_UNIX.NASL | description | The version of Oracle (formerly Sun) Java SE or Java for Business
installed on the remote host is prior to 8 Update 121, 7 Update 131,
or 6 Update 141. It is, therefore, affected by multiple
vulnerabilities :
- A vulnerability exists in the Libraries subcomponent,
known as SWEET32, in the 3DES and Blowfish algorithms
due to the use of weak 64-bit block ciphers by default.
A man-in-the-middle attacker who has sufficient
resources can exploit this vulnerability, via a
'birthday' attack, to detect a collision that leaks the
XOR between the fixed secret and a known plaintext,
allowing the disclosure of the secret text, such as
secure HTTPS cookies, and possibly resulting in the
hijacking of an authenticated session. (CVE-2016-2183)
- An unspecified flaw exists in the Libraries subcomponent
that allows an unauthenticated, remote attacker to
impact integrity. (CVE-2016-5546)
- An unspecified flaw exists in the Libraries subcomponent
that allows an unauthenticated, remote attacker to cause
a denial of service condition. (CVE-2016-5547)
- Multiple unspecified flaws exist in the Libraries
subcomponent that allow an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2016-5548, CVE-2016-5549)
- An unspecified flaw exists in the Networking
subcomponent that allows an unauthenticated, remote
attacker to impact integrity. (CVE-2016-5552)
- An unspecified flaw exists in the Mission Control
subcomponent that allows an unauthenticated, remote
attacker to impact integrity. (CVE-2016-8328)
- Multiple unspecified flaws exist in the Networking
subcomponent that allow an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2017-3231, CVE-2017-3261)
- An unspecified flaw exists in the RMI subcomponent that
allows an unauthenticated, remote attacker to execute
arbitrary code. (CVE-2017-3241)
- An unspecified flaw exists in the JAAS subcomponent that
allows an unauthenticated, remote attacker to impact
integrity. (CVE-2017-3252)
- An unspecified flaw exists in the 2D subcomponent that
allows an unauthenticated, remote attacker to cause a
denial of service condition. (CVE-2017-3253)
- An unspecified flaw exists in the Deployment
subcomponent that allows an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2017-3259)
- An unspecified flaw exists in the AWT subcomponent that
allows an unauthenticated, remote attacker to execute
arbitrary code. (CVE-2017-3260)
- An unspecified flaw exists in the Java Mission Control
subcomponent that allows an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2017-3262)
- An unspecified flaw exists in the Libraries subcomponent
that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-3272)
- An unspecified flaw exists in the Hotspot subcomponent
that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-3289)
Note that CVE-2017-3241 can only be exploited by supplying data to
APIs in the specified component without using untrusted Java Web Start
applications or untrusted Java applets, such as through a web service.
Note that CVE-2016-2183, CVE-2016-5546, CVE-2016-5547, CVE-2016-5552,
CVE-2017-3252, and CVE-2017-3253 can be exploited through sandboxed
Java Web Start applications and sandboxed Java applets. They can also
be exploited by supplying data to APIs in the specified component
without using sandboxed Java Web Start applications or sandboxed Java
applets, such as through a web service. | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 96629 | published | 2017-01-19 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96629 | title | Oracle Java SE Multiple Vulnerabilities (January 2017 CPU) (Unix) (SWEET32) |
NASL family | Misc. | NASL id | ORACLE_SECURE_GLOBAL_DESKTOP_APR_2017_CPU.NASL | description | The version of Oracle Secure Global Desktop installed on the remote
host is 4.71, 5.2, or 5.3 and is missing a security patch from the
April 2017 Critical Patch Update (CPU). It is, therefore, affected by
multiple vulnerabilities :
- An integer overflow condition exists in the Window System
(X11) subcomponent in multiple functions in X.Org libExt
due to improper validation of user-supplied input when
calculating the amount of memory required to handle
return data. An unauthenticated, remote attacker can
exploit this to cause a denial of service condition or
the execution of arbitrary code. Note that this issue
only affects version 4.71. (CVE-2013-1982)
- An integer overflow condition exists in X.Org libXfixes
in the XFixesGetCursorImage() function when handling
large cursor dimensions or name lengths due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a denial of
service condition or the execution of arbitrary code.
(CVE-2013-1983)
- An integer overflow condition exists within multiple
functions in X.Org libXi due to improper validation of
user-supplied input when calculating the amount of
memory needed to handle return data. An unauthenticated,
remote attacker can exploit this to cause a denial of
service condition or the execution of arbitrary code.
(CVE-2013-1984)
- An integer overflow condition exists in X.Org
libXinerama in the XineramaQueryScreens() function due
to improper validation of user-supplied input when
calculating the amount of memory needed to handle return
data. An unauthenticated, remote attacker can exploit
this to cause a denial of service condition or the
execution of arbitrary code. (CVE-2013-1985)
- An integer overflow condition exists in multiple
functions in X.Org libXrandr due to improper validation
of user-supplied input when calculating the amount of
memory needed to handle return data. An unauthenticated,
remote attacker can exploit this to cause a denial of
service condition or the execution of arbitrary code.
(CVE-2013-1986)
- An integer overflow condition exists in multiple
functions in X.Org libXrender due to improper validation
of user-supplied input when calculating the amount of
memory needed to handle return data. An unauthenticated,
remote attacker can exploit this to cause a denial of
service condition or the execution of arbitrary code.
(CVE-2013-1987)
- An overflow condition exists in X.Org libXi in the
XListInputDevices() function, related to an unexpected
sign extension, due to improper checking of the amount
of memory needed to handle returned data when converting
smaller integer types to larger ones. An
unauthenticated, remote attacker can exploit this to
cause a denial of service condition or the execution of
arbitrary code. (CVE-2013-1995)
- An overflow condition exists within multiple functions
in X.Org LibXi due to improper validation of
user-supplied input. An unauthenticated, remote attacker
can exploit this, via a specially crafted length or
index, to cause a denial of service condition or the
execution of arbitrary code. (CVE-2013-1998)
- An overflow condition exists in X.Org LibXt in the
_XtResourceConfigurationEH() function due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this, via a specially
crafted length or index, to cause a denial of service
condition or the execution of arbitrary code.
(CVE-2013-2002)
- An integer overflow condition exists in X.Org libXcursor
in the _XcursorFileHeaderCreate() function due to
improper validation of user-supplied input. An
unauthenticated, remote attacker can exploit this, via
a specially crafted file, to cause a denial of service
condition or the execution of arbitrary code.
(CVE-2013-2003)
- An uninitialized pointer flaw exists within multiple
functions in X.Org LibXt due to a failure to check for
proper initialization of pointers. An unauthenticated,
remote attacker can exploit this to corrupt memory,
resulting in a denial of service condition or the
possible execution of arbitrary code. (CVE-2013-2005)
- A flaw exists in the Application Server subcomponent
(Apache Tomcat) due to a failure to process passwords
when they are paired with non-existent usernames. An
authenticated, remote attacker can exploit this, via a
timing attack, to enumerate user account names.
(CVE-2016-0762)
- Multiple integer overflow conditions exist in s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit these to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the DTLS
implementation due to a failure to properly restrict the
lifetime of queue entries associated with unused
out-of-order messages. An unauthenticated, remote
attacker can exploit this, by maintaining multiple
crafted DTLS sessions simultaneously, to exhaust memory.
(CVE-2016-2179)
- An out-of-bounds read error exists in the X.509 Public
Key Infrastructure Time-Stamp Protocol (TSP)
implementation. An unauthenticated, remote attacker can
exploit this, via a crafted time-stamp file that is
mishandled by the 'openssl ts' command, to cause a
denial of service or to disclose sensitive information.
(CVE-2016-2180)
- A denial of service vulnerability exists in the
Anti-Replay feature in the DTLS implementation due to
improper handling of epoch sequence numbers in records.
An unauthenticated, remote attacker can exploit this,
via spoofed DTLS records, to cause legitimate packets to
be dropped. (CVE-2016-2181)
- An overflow condition exists in the BN_bn2dec() function
in bn_print.c due to improper validation of
user-supplied input when handling BIGNUM values. An
unauthenticated, remote attacker can exploit this to
crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- A flaw exists in the Core subcomponent, specifically in
the libcurl library, due to improper validation of TLS
certificates. An authenticated, remote attacker with the
ability to intercept network traffic can exploit this
issue to disclose or manipulate transmitted data by
spoofing the TLS/SSL server using a certificate that
appears valid. Note that this issue only affects
versions 5.2 and 5.3. (CVE-2016-3739)
- A flaw exists in cURL and libcurl when loading dynamic
link library (DLL) files security.dll, secur32.dll, or
ws2_32.dll due searching an insecure path which may not
be trusted or under user control. A local attacker can
exploit this, via a Trojan DLL file placed in the search
path, to execute arbitrary code with the privileges of
the user running the program. (CVE-2016-4802)
- A security bypass vulnerability exists in Apache Tomcat
due to an unspecified flaw related to web applications.
A local attacker can exploit this, via a utility method
that is available to web applications, to bypass a
configured SecurityManager. (CVE-2016-5018)
- An out-of-bounds access error exists in the Window
System (X11) subcomponent, specifically in the
XvQueryAdaptors() function in file Xv.c, when handling
server responses. An authenticated, remote attacker can
exploit this to impact confidentiality, integrity, and
availability. (CVE-2016-5407)
- A use-after-free error exists in cURL and libcurl within
file lib/vtls/vtls.c due to the program attempting to
resume TLS sessions even if the client certificate
fails. An unauthenticated, remote attacker can exploit
this to bypass validation mechanisms, allowing the
attacker to possibly control which connection is used.
(CVE-2016-5419)
- A flaw exists in cURL and libcurl in the
Curl_ssl_config_matches() function within file
lib/vtls/vtls.c due to the program reusing TLS
connections with different client certificates. An
unauthenticated, remote attacker can exploit this to
disclose sensitive cross-realm information.
(CVE-2016-5420)
- A use-after-free error exists in cURL and libcurl in
in the close_all_connections() function within file
lib/multi.c due to connection pointers not being
properly cleared. An unauthenticated, remote attacker
can exploit this to have an unspecified impact on
confidentiality, integrity, and availability.
(CVE-2016-5421)
- A flaw exists in the tls_decrypt_ticket() function
in t1_lib.c due to improper handling of ticket HMAC
digests. An unauthenticated, remote attacker can exploit
this, via a ticket that is too short, to crash the
process, resulting in a denial of service.
(CVE-2016-6302)
- An integer overflow condition exists in the
MDC2_Update() function in mdc2dgst.c due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a heap-based
buffer overflow, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6303)
- A flaw exists in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources, resulting in a denial of service condition.
(CVE-2016-6304)
- A flaw exists in the SSL_peek() function in
rec_layer_s3.c due to improper handling of empty
records. An unauthenticated, remote attacker can exploit
this, by triggering a zero-length record in an SSL_peek
call, to cause an infinite loop, resulting in a denial
of service condition. (CVE-2016-6305)
- An out-of-bounds read error exists in the certificate
parser that allows an unauthenticated, remote attacker
to cause a denial of service via crafted certificate
operations. (CVE-2016-6306)
- A denial of service vulnerability exists in the
state-machine implementation due to a failure to check
for an excessive length before allocating memory. An
unauthenticated, remote attacker can exploit this, via a
crafted TLS message, to exhaust memory resources.
(CVE-2016-6307)
- A denial of service vulnerability exists in the DTLS
implementation due to improper handling of excessively
long DTLS messages. An unauthenticated, remote attacker
can exploit this, via a crafted DTLS message, to exhaust
available memory resources. (CVE-2016-6308)
- A flaw exists in Apache Tomcat within SecurityManager
due to improper restriction of access to system
properties by the configuration files system property
replacement feature. A local attacker can exploit this,
via a crafted web application, to bypass SecurityManager
restrictions and disclose system properties.
(CVE-2016-6794)
- A flaw exists in Apache Tomcat that allows a local
attacker to bypass a configured SecurityManager by
changing the configuration parameters for the JSP
Servlet. (CVE-2016-6796)
- A flaw exists in Apache Tomcat due to a failure to limit
web application access to global JNDI resources. A local
attacker can exploit this to gain unauthorized access to
resources. (CVE-2016-6797)
- A flaw exists in Apache Tomcat when handling request
lines containing certain invalid characters. An
unauthenticated, remote attacker can exploit this to
conduct HTTP response splitting attacks by injecting
additional headers into responses. (CVE-2016-6816)
- An infinite loop condition exists in Apache Tomcat in
the HTTP/2 parser when handling overly large headers. An
unauthenticated, remote attacker can exploit this, via a
specially crafted request, to cause a denial of service
condition. (CVE-2016-6817)
- A carry propagation error exists in the
Broadwell-specific Montgomery multiplication procedure
when handling input lengths divisible by but longer than
256 bits. This can result in transient authentication
and key negotiation failures or reproducible erroneous
outcomes of public-key operations with specially crafted
input. A man-in-the-middle attacker can possibly exploit
this issue to compromise ECDH key negotiations that
utilize Brainpool P-512 curves. (CVE-2016-7055)
- A flaw exists in cURL in the Curl_cookie_init() function
within file lib/cookie.c when handling cookies. An
unauthenticated, remote attacker can exploit this to
inject new cookies for arbitrary domains.
(CVE-2016-8615)
- A flaw exists in cURL in the ConnectionExists() function
within file lib/url.c when checking credentials supplied
for reused connections due to the comparison being
case-insensitive. An unauthenticated, remote attacker
can exploit this to authenticate without knowing the
proper case of the username and password.
(CVE-2016-8616)
- An integer overflow condition exists in cURL in the
base64_encode() function within file lib/base64.c due to
improper validation of certain input. An
unauthenticated, remote attacker can exploit this to
cause a denial of service condition or the execution of
arbitrary code. (CVE-2016-8617)
- A denial of service vulnerability exists in cURL in the
alloc_addbyter() function within file lib/mprintf.c due
to improper validation of overly long input when it is
supplied to the curl_maprintf() API method. An
unauthenticated, remote attacker can exploit this to
free already freed memory and thereby crash the program.
(CVE-2016-8618)
- A double-free error exists in cURL in the read_data()
function within file lib/security.c when handling
Kerberos authentication. An unauthenticated, remote
attacker can exploit this to free already freed memory,
resulting in an unspecified impact on confidentiality,
integrity, and availability. (CVE-2016-8619)
- An out-of-bounds access error exists in cURL in file
tool_urlglob.c within the globbing feature. An
unauthenticated, remote attacker can exploit this to
disclose memory contents or execute arbitrary code.
(CVE-2016-8620)
- An out-of-bounds error exists in cURL in the parsedate()
function within file lib/parsedate.c when handling
dates. An unauthenticated, remote attacker can exploit
this to disclose memory contents or cause a denial of
service condition. (CVE-2016-8621)
- An integer truncation error exists in cURL in the
curl_easy_unescape() function within file lib/escape.c
when handling overly large URLs. An unauthenticated,
remote attacker can exploit this to cause a denial of
service condition or the execution of arbitrary code.
(CVE-2016-8622)
- A use-after-free error exists in cURL within file
lib/cookie.c when handling shared cookies. An
unauthenticated, remote attacker can exploit this to
disclose memory contents. (CVE-2016-8623)
- A flaw exists in cURL in the parseurlandfillconn()
function within file lib/url.c when parsing the
authority component of a URL with the host name part
ending in a '#' character. An unauthenticated, remote
attacker can exploit this to establish a connection to
a different host than intended. (CVE-2016-8624)
- A flaw exists in cURL within International Domain Names
(IDNA) handling when translating domain names to puny
code for DNS resolving due to using the outdated IDNA
2003 standard instead of the IDNA 2008 standard, which
can result in incorrect translation of a domain name.
An unauthenticated, remote attacker can exploit this to
cause network traffic to be redirected to a different
host than intended. (CVE-2016-8625)
- A flaw exists in Apache Tomcat within the
catalina/mbeans/JmxRemoteLifecycleListener.java class
that is triggered during the deserialization of Java
objects. An unauthenticated, remote attacker can exploit
this to execute arbitrary code. (CVE-2016-8735)
- A flaw exists in the Web Server component (Apache HTTP
Server) when handling whitespace patterns in User-Agent
headers. An authenticated, remote attacker can exploit
this, via a specially crafted User-Agent header, to
cause incorrect processing of sequences of requests,
resulting in incorrectly interpreting responses,
polluting the cache, or disclosing content from one
request to a second downstream user-agent.
(CVE-2016-8743)
- A NULL pointer dereference flaw exists within file
ssl/statem/statem_clnt.c when handling parameters for
the DHE or ECDHE key exchanges. An unauthenticated,
remote attacker can exploit this, via specially crafted
parameters, to cause a denial of service condition.
(CVE-2017-3730)
- A out-of-bounds read error exists exists in the Core
subcomponent, specifically in OpenSSL, when handling
packets using the CHACHA20/POLY1305 or RC4-MD5 ciphers.
An unauthenticated, remote attacker can exploit this,
via specially crafted truncated packets, to cause a
denial of service condition. (CVE-2017-3731)
- A carry propagating error exists in the x86_64
Montgomery squaring implementation that may cause the
BN_mod_exp() function to produce incorrect results. An
unauthenticated, remote attacker with sufficient
resources can exploit this to obtain sensitive
information regarding private keys. Note that this issue
is very similar to CVE-2015-3193. Moreover, the attacker
would additionally need online access to an unpatched
system using the target private key in a scenario with
persistent DH parameters and a private key that is
shared between multiple clients. For example, this can
occur by default in OpenSSL DHE based SSL/TLS cipher
suites. (CVE-2017-3732)
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number. | last seen | 2019-01-16 | modified | 2018-07-18 | plugin id | 99930 | published | 2017-05-02 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=99930 | title | Oracle Secure Global Desktop Multiple Vulnerabilities (April 2017 CPU) (SWEET32) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2017-1389-1.NASL | description | This update for java-1_6_0-ibm fixes the following issues :
- Version update to 6.0-16.45 bsc#1038505
- CVE-2016-9840: zlib: Out-of-bounds pointer arithmetic in
inftrees.c
- CVE-2016-9841: zlib: Out-of-bounds pointer arithmetic in
inffast.c
- CVE-2016-9842: zlib: Undefined left shift of negative
number
- CVE-2016-9843: zlib: Big-endian out-of-bounds pointer
- CVE-2017-1289: IBM JDK: XML External Entity Injection
(XXE) error when processing XML data
- CVE-2017-3509: OpenJDK: improper re-use of NTLM
authenticated connections
- CVE-2017-3539: OpenJDK: MD5 allowed for jar verification
- CVE-2017-3533: OpenJDK: newline injection in the FTP
client
- CVE-2017-3544: OpenJDK: newline injection in the SMTP
client
- Version update to 6.0-16.40 bsc#1027038 CVE-2016-2183
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 119998 | published | 2019-01-02 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=119998 | title | SUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2017:1389-1) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2017-0490-1.NASL | description | This update for java-1_7_0-openjdk fixes the following issues :
- Oracle Critical Patch Update of January 2017 to OpenJDK
7u131 (bsc#1020905) :
- Security Fixes
- S8138725: Add options for Javadoc generation
- S8140353: Improve signature checking
- S8151934, CVE-2017-3231: Resolve class resolution
- S8156804, CVE-2017-3241: Better constraint checking
- S8158406: Limited Parameter Processing
- S8158997: JNDI Protocols Switch
- S8159507: RuntimeVisibleAnnotation validation
- S8161218: Better bytecode loading
- S8161743, CVE-2017-3252: Provide proper login context
- S8162577: Standardize logging levels
- S8162973: Better component components
- S8164143, CVE-2017-3260: Improve components for menu
items
- S8164147, CVE-2017-3261: Improve streaming socket output
- S8165071, CVE-2016-2183: Expand TLS support
- S8165344, CVE-2017-3272: Update concurrency support
- S8166988, CVE-2017-3253: Improve image processing
performance
- S8167104, CVE-2017-3289: Additional class construction
refinements
- S8167223, CVE-2016-5552: URL handling improvements
- S8168705, CVE-2016-5547: Better ObjectIdentifier
validation
- S8168714, CVE-2016-5546: Tighten ECDSA validation
- S8168728, CVE-2016-5548: DSA signing improvments
- S8168724, CVE-2016-5549: ECDSA signing improvments
- S6253144: Long narrowing conversion should describe the
algorithm used and implied 'risks'
- S6328537: Improve javadocs for Socket class by adding
references to SocketOptions
- S6978886: javadoc shows stacktrace after print error
resulting from disk full
- S6995421: Eliminate the static dependency to
sun.security.ec.ECKeyFactory
- S6996372: synchronizing handshaking hash
- S7027045: (doc) java/awt/Window.java has several typos
in javadoc
- S7054969: Null-check-in-finally pattern in java/security
documentation
- S7072353: JNDI libraries do not build with javac
-Xlint:all -Werror
- S7075563: Broken link in 'javax.swing.SwingWorker'
- S7077672: jdk8_tl nightly fail in step-2 build on
8/10/11
- S7088502: Security libraries don't build with javac
-Werror
- S7092447: Clarify the default locale used in each locale
sensitive operation
- S7093640: Enable client-side TLS 1.2 by default
- S7103570: AtomicIntegerFieldUpdater does not work when
SecurityManager is installed
- S7117360: Warnings in java.util.concurrent.atomic
package
- S7117465: Warning cleanup for IMF classes
- S7187144: JavaDoc for ScriptEngineFactory.getProgram()
contains an error
- S8000418: javadoc should used a standard 'generated by
javadoc' string
- S8000666: javadoc should write directly to Writer
instead of composing strings
- S8000673: remove dead code from HtmlWriter and subtypes
- S8000970: break out auxiliary classes that will prevent
multi-core compilation of the JDK
- S8001669: javadoc internal DocletAbortException should
set cause when appropriate
- S8008949: javadoc stopped copying doc-files
- S8011402: Move blacklisting certificate logic from hard
code to data
- S8011547: Update XML Signature implementation to Apache
Santuario 1.5.4
- S8012288: XML DSig API allows wrong tag names and extra
elements in SignedInfo
- S8016217: More javadoc warnings
- S8017325: Cleanup of the javadoc tag in
java.security.cert
- S8017326: Cleanup of the javadoc tag in
java.security.spec
- S8019772: Fix doclint issues in javax.crypto and
javax.security subpackages
- S8020557: javadoc cleanup in javax.security
- S8020688: Broken links in documentation at
http://docs.oracle.com/javase/6/docs/api/index.
- S8021108: Clean up doclint warnings and errors in
java.text package
- S8021417: Fix doclint issues in java.util.concurrent
- S8021833: javadoc cleanup in java.net
- S8022120: JCK test
api/javax_xml/crypto/dsig/TransformService/index_ParamMe
thods fails
- S8022175: Fix doclint warnings in javax.print
- S8022406: Fix doclint issues in java.beans
- S8022746: List of spelling errors in API doc
- S8024779: [macosx] SwingNode crashes on exit
- S8025085: [javadoc] some errors in javax/swing
- S8025218: [javadoc] some errors in java/awt classes
- S8025249: [javadoc] fix some javadoc errors in
javax/swing/
- S8025409: Fix javadoc comments errors and warning
reported by doclint report
- S8026021: more fix of javadoc errors and warnings
reported by doclint, see the description
- S8037099: [macosx] Remove all references to GC from
native OBJ-C code
- S8038184: XMLSignature throws
StringIndexOutOfBoundsException if ID attribute value is
empty String
- S8038349: Signing XML with DSA throws Exception when key
is larger than 1024 bits
- S8049244: XML Signature performance issue caused by
unbuffered signature data
- S8049432: New tests for TLS property
jdk.tls.client.protocols
- S8050893: (smartcardio) Invert reset argument in tests
in sun/security/smartcardio
- S8059212: Modify regression tests so that they do not
just fail if no cardreader found
- S8068279: (typo in the spec)
javax.script.ScriptEngineFactory.getLanguageName
- S8068491: Update the protocol for references of
docs.oracle.com to HTTPS.
- S8069038: javax/net/ssl/TLS/TLSClientPropertyTest.java
needs to be updated for JDK-8061210
- S8076369: Introduce the jdk.tls.client.protocols system
property for JDK 7u
- S8139565: Restrict certificates with DSA keys less than
1024 bits
- S8140422: Add mechanism to allow non default root CAs to
be not subject to algorithm restrictions
- S8140587: Atomic*FieldUpdaters should use
Class.isInstance instead of direct class check
- S8143959: Certificates requiring blacklisting
- S8145984: [macosx] sun.lwawt.macosx.CAccessible leaks
- S8148516: Improve the default strength of EC in JDK
- S8149029: Secure validation of XML based digital
signature always enabled when checking wrapping attacks
- S8151893: Add security property to configure XML
Signature secure validation mode
- S8155760: Implement Serialization Filtering
- S8156802: Better constraint checking
- S8161228: URL objects with custom protocol handlers have
port changed after deserializing
- S8161571: Verifying ECDSA signatures permits trailing
bytes
- S8163304: jarsigner -verbose -verify should print the
algorithms used to sign the jar
- S8164908: ReflectionFactory support for IIOP and custom
serialization
- S8165230: RMIConnection addNotificationListeners failing
with specific inputs
- S8166393: disabledAlgorithms property should not be
strictly parsed
- S8166591: [macos 10.12] Trackpad scrolling of text on OS
X 10.12 Sierra is very fast (Trackpad, Retina only)
- S8166739: Improve extensibility of ObjectInputFilter
information passed to the filter
- S8166875: (tz) Support tzdata2016g
- S8166878: Connection reset during TLS handshake
- S8167356: Follow up fix for jdk8 backport of 8164143.
Changes for CMenuComponent.m were missed
- S8167459: Add debug output for indicating if a chosen
ciphersuite was legacy
- S8167472: Chrome interop regression with JDK-8148516
- S8167591: Add MD5 to signed JAR restrictions
- S8168861: AnchorCertificates uses hard-coded password
for cacerts keystore
- S8168993: JDK8u121 L10n resource file update
- S8169191: (tz) Support tzdata2016i
- S8169688: Backout (remove) MD5 from
jdk.jar.disabledAlgorithms for January CPU
- S8169911: Enhanced tests for jarsigner -verbose -verify
after JDK-8163304
- S8170131: Certificates not being blocked by
jdk.tls.disabledAlgorithms property
- S8170268: 8u121 L10n resource file update - msgdrop 20
- S8173622: Backport of 7180907 is incomplete
- S8173849: Fix use of java.util.Base64 in test cases
- S8173854: [TEST] Update DHEKeySizing test case following
8076328 & 8081760
- CVE-2017-3259 Vulnerability allows unauthenticated
attacker with network access via multiple protocols to
compromise Java SE.
- Backports
- S7102489, PR3316, RH1390708: RFE: cleanup jlong typedef
on __APPLE__and _LLP64 systems.
- S8000351, PR3316, RH1390708: Tenuring threshold should
be unsigned
- S8153711, PR3315, RH1284948: [REDO] GlobalRefs never
deleted when processing invokeMethod command
- S8170888, PR3316, RH1390708: [linux] support for cgroup
memory limits in container (ie Docker) environments
- Bug fixes
- PR3318: Replace 'infinality' with 'improved font
rendering' (--enable-improved-font-rendering)
- PR3318: Fix compatibility with vanilla Fontconfig
- PR3318: Fix glyph y advance
- PR3318: Always round glyph advance in 26.6 space
- PR3318: Simplify glyph advance handling
- PR3324: Fix NSS_LIBDIR substitution in
make_generic_profile.sh broken by PR1989
- AArch64 port
- S8165673, PR3320: AArch64: Fix JNI floating point
argument handling
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-12-18 | plugin id | 97296 | published | 2017-02-21 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97296 | title | SUSE SLED12 / SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2017:0490-1) |
NASL family | Windows | NASL id | ORACLE_JAVA_CPU_JAN_2017.NASL | description | The version of Oracle (formerly Sun) Java SE or Java for Business
installed on the remote host is prior to 8 Update 121, 7 Update 131,
or 6 Update 141. It is, therefore, affected by multiple
vulnerabilities :
- A vulnerability exists in the Libraries subcomponent,
known as SWEET32, in the 3DES and Blowfish algorithms
due to the use of weak 64-bit block ciphers by default.
A man-in-the-middle attacker who has sufficient
resources can exploit this vulnerability, via a
'birthday' attack, to detect a collision that leaks the
XOR between the fixed secret and a known plaintext,
allowing the disclosure of the secret text, such as
secure HTTPS cookies, and possibly resulting in the
hijacking of an authenticated session. (CVE-2016-2183)
- An unspecified flaw exists in the Libraries subcomponent
that allows an unauthenticated, remote attacker to
impact integrity. (CVE-2016-5546)
- An unspecified flaw exists in the Libraries subcomponent
that allows an unauthenticated, remote attacker to cause
a denial of service condition. (CVE-2016-5547)
- Multiple unspecified flaws exist in the Libraries
subcomponent that allow an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2016-5548, CVE-2016-5549)
- An unspecified flaw exists in the Networking
subcomponent that allows an unauthenticated, remote
attacker to impact integrity. (CVE-2016-5552)
- An unspecified flaw exists in the Mission Control
subcomponent that allows an unauthenticated, remote
attacker to impact integrity. (CVE-2016-8328)
- Multiple unspecified flaws exist in the Networking
subcomponent that allow an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2017-3231, CVE-2017-3261)
- An unspecified flaw exists in the RMI subcomponent that
allows an unauthenticated, remote attacker to execute
arbitrary code. (CVE-2017-3241)
- An unspecified flaw exists in the JAAS subcomponent that
allows an unauthenticated, remote attacker to impact
integrity. (CVE-2017-3252)
- An unspecified flaw exists in the 2D subcomponent that
allows an unauthenticated, remote attacker to cause a
denial of service condition. (CVE-2017-3253)
- An unspecified flaw exists in the Deployment
subcomponent that allows an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2017-3259)
- An unspecified flaw exists in the AWT subcomponent that
allows an unauthenticated, remote attacker to execute
arbitrary code. (CVE-2017-3260)
- An unspecified flaw exists in the Java Mission Control
subcomponent that allows an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2017-3262)
- An unspecified flaw exists in the Libraries subcomponent
that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-3272)
- An unspecified flaw exists in the Hotspot subcomponent
that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-3289)
Note that CVE-2017-3241 can only be exploited by supplying data to
APIs in the specified component without using untrusted Java Web Start
applications or untrusted Java applets, such as through a web service.
Note that CVE-2016-2183, CVE-2016-5546, CVE-2016-5547, CVE-2016-5552,
CVE-2017-3252, and CVE-2017-3253 can be exploited through sandboxed
Java Web Start applications and sandboxed Java applets. They can also
be exploited by supplying data to APIs in the specified component
without using sandboxed Java Web Start applications or sandboxed Java
applets, such as through a web service. | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 96628 | published | 2017-01-19 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96628 | title | Oracle Java SE Multiple Vulnerabilities (January 2017 CPU) (SWEET32) |
NASL family | SuSE Local Security Checks | NASL id | OPENSUSE-2018-168.NASL | description | This update for openssl-steam fixes the following issues :
- Merged changes from upstream openssl (Factory rev 137)
into this fork for Steam.
Updated to openssl 1.0.2k :
- CVE-2016-7055: Montgomery multiplication may produce
incorrect results (boo#1009528)
- CVE-2016-7056: ECSDA P-256 timing attack key recovery
(boo#1019334)
- CVE-2017-3731: Truncated packet could crash via OOB read
(boo#1022085)
- CVE-2017-3732: BN_mod_exp may produce incorrect results
on x86_64 (boo#1022086)
Update to openssl-1.0.2j :
- CVE-2016-7052: Missing CRL sanity check (boo#1001148)
OpenSSL Security Advisory [22 Sep 2016] (boo#999665)
- Severity: High
- CVE-2016-6304: OCSP Status Request extension unbounded
memory growth (boo#999666)
- Severity: Low
- CVE-2016-2177: Pointer arithmetic undefined behaviour
(boo#982575)
- CVE-2016-2178: Constant time flag not preserved in DSA
signing (boo#983249)
- CVE-2016-2179: DTLS buffered message DoS (boo#994844)
- CVE-2016-2180: OOB read in TS_OBJ_print_bio()
(boo#990419)
- CVE-2016-2181: DTLS replay protection DoS (boo#994749)
- CVE-2016-2182: OOB write in BN_bn2dec() (boo#993819)
- CVE-2016-2183: Birthday attack against 64-bit block
ciphers (SWEET32) (boo#995359)
- CVE-2016-6302: Malformed SHA512 ticket DoS (boo#995324)
- CVE-2016-6303: OOB write in MDC2_Update() (boo#995377)
- CVE-2016-6306: Certificate message OOB reads
(boo#999668)
ALso fixed :
- fixed a crash in print_notice (boo#998190)
- fix X509_CERT_FILE path (boo#1022271) and rename
- resume reading from /dev/urandom when interrupted by a
signal (boo#995075)
- fix problems with locking in FIPS mode (boo#992120)
- duplicates: boo#991877, boo#991193, boo#990392,
boo#990428 and boo#990207
- drop openssl-fips_RSA_compute_d_with_lcm.patch
(upstream) (boo#984323)
- don't check for /etc/system-fips (boo#982268) | last seen | 2019-01-16 | modified | 2018-02-16 | plugin id | 106863 | published | 2018-02-16 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=106863 | title | openSUSE Security Update : openssl-steam (openSUSE-2018-168) |
NASL family | Oracle Linux Local Security Checks | NASL id | ORACLELINUX_ELSA-2016-3627.NASL | description | Description of changes:
[0.9.8e-40.0.3]
- fix CVE-2016-2177 - possible integer overflow
- fix CVE-2016-2178 - non-constant time DSA operations
- fix CVE-2016-2182 - possible buffer overflow in BN_bn2dec()
- fix CVE-2016-6306 - certificate message OOB reads
- mitigate CVE-2016-2183 - degrade all 64bit block ciphers and RC4 to
112 bit effective strength | last seen | 2019-01-16 | modified | 2016-10-19 | plugin id | 94094 | published | 2016-10-17 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=94094 | title | Oracle Linux 5 : openssl (ELSA-2016-3627) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2016-2387-1.NASL | description | This update for openssl fixes the following issues: OpenSSL Security
Advisory [22 Sep 2016] (bsc#999665) Severity: High
- OCSP Status Request extension unbounded memory growth
(CVE-2016-6304) (bsc#999666) Severity: Low
- Pointer arithmetic undefined behaviour (CVE-2016-2177)
(bsc#982575)
- Constant time flag not preserved in DSA signing
(CVE-2016-2178) (bsc#983249)
- DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
- OOB read in TS_OBJ_print_bio() (CVE-2016-2180)
(bsc#990419)
- DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
- OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
- Birthday attack against 64-bit block ciphers (SWEET32)
(CVE-2016-2183) (bsc#995359)
- Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
- OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
- Certificate message OOB reads (CVE-2016-6306)
(bsc#999668) More information can be found on:
https://www.openssl.org/news/secadv/20160922.txt Also
following bugs were fixed :
- update expired S/MIME certs (bsc#979475)
- improve s390x performance (bsc#982745)
- allow >= 64GB AESGCM transfers (bsc#988591)
- fix crash in print_notice (bsc#998190)
- resume reading from /dev/urandom when interrupted by a
signal (bsc#995075)
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-29 | plugin id | 93734 | published | 2016-09-27 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93734 | title | SUSE SLES12 Security Update : openssl (SUSE-SU-2016:2387-1) |
NASL family | Misc. | NASL id | PVS_5_2_0.NASL | description | The version of Tenable Passive Vulnerability Scanner (PVS) installed
on the remote host is 5.x < 5.2.0. It is, therefore, affected by
multiple vulnerabilities :
- Multiple denial of service vulnerabilities exist in
Expat within file xmlparse.c due to a logical error in
hash computations. An unauthenticated, remote attacker
can exploit these, via a specially crafted XML file
containing many identifiers with the same value, to
cause the service to exhaust CPU resources.
(CVE-2012-0876, CVE-2016-5300)
- A flaw exists in the generate_hash_secret_salt()
function in file lib/xmlparse.c within Expat due to the
generation of non-random output by the PRNG. An
unauthenticated, remote attacker can exploit this to
more easily predict the PRNG output. (CVE-2012-6702)
- Multiple buffer overflow conditions exist within Expat,
specifically in the XML_GetBuffer() function in file
lib/xmlparse.c, due to improper validation of
user-supplied input when handling compressed XML
content. An unauthenticated, remote attacker can exploit
these to execute arbitrary code. (CVE-2015-1283,
CVE-2016-4472)
- Multiple buffer overflow conditions exist within the
Expat XML parser when handling malformed input documents
due to improper validation of user-supplied input. An
unauthenticated, remote attacker can exploit these to
cause a denial of service condition or the execution of
arbitrary code. (CVE-2016-0718, CVE-2016-0719)
- Multiple integer overflow conditions exist in s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit these to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the DTLS
implementation due to a failure to properly restrict the
lifetime of queue entries associated with unused
out-of-order messages. An unauthenticated, remote
attacker can exploit this, by maintaining multiple
crafted DTLS sessions simultaneously, to exhaust memory.
(CVE-2016-2179)
- An out-of-bounds read error exists in the X.509 Public
Key Infrastructure Time-Stamp Protocol (TSP)
implementation. An unauthenticated, remote attacker can
exploit this, via a crafted time-stamp file that is
mishandled by the 'openssl ts' command, to cause
denial of service or to disclose sensitive information.
(CVE-2016-2180)
- A denial of service vulnerability exists in the
Anti-Replay feature in the DTLS implementation due to
improper handling of epoch sequence numbers in records.
An unauthenticated, remote attacker can exploit this,
via spoofed DTLS records, to cause legitimate packets to
be dropped. (CVE-2016-2181)
- An overflow condition exists in the BN_bn2dec() function
in bn_print.c due to improper validation of
user-supplied input when handling BIGNUM values. An
unauthenticated, remote attacker can exploit this to
crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- A flaw exists in SQLite due to the use of insecure
temporary directories. A local attacker can exploit this
to cause a denial of service condition or possibly have
other more severe impact. (CVE-2016-6153)
- A flaw exists in the tls_decrypt_ticket() function in
t1_lib.c due to improper handling of ticket HMAC
digests. An unauthenticated, remote attacker can exploit
this, via a ticket that is too short, to crash the
process, resulting in a denial of service.
(CVE-2016-6302)
- An integer overflow condition exists in the
MDC2_Update() function in mdc2dgst.c due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a heap-based
buffer overflow, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6303)
- A flaw exists in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources, resulting in a denial of service condition.
(CVE-2016-6304)
- A flaw exists in the SSL_peek() function in
rec_layer_s3.c due to improper handling of empty
records. An unauthenticated, remote attacker can exploit
this, by triggering a zero-length record in an SSL_peek
call, to cause an infinite loop, resulting in a denial
of service condition. (CVE-2016-6305)
- An out-of-bounds read error exists in the certificate
parser that allows an unauthenticated, remote attacker
to cause a denial of service via crafted certificate
operations. (CVE-2016-6306)
- A denial of service vulnerability exists in the
state-machine implementation due to a failure to check
for an excessive length before allocating memory. An
unauthenticated, remote attacker can exploit this, via a
crafted TLS message, to exhaust memory resources.
(CVE-2016-6307)
- A denial of service vulnerability exists in the DTLS
implementation due to improper handling of excessively
long DTLS messages. An unauthenticated, remote attacker
can exploit this, via a crafted DTLS message, to exhaust
available memory resources. (CVE-2016-6308)
- A remote code execution vulnerability exists in the
read_state_machine() function in statem.c due to
improper handling of messages larger than 16k. An
unauthenticated, remote attacker can exploit this, via a
specially crafted message, to cause a use-after-free
error, resulting in a denial of service condition or
possibly the execution of arbitrary code.
(CVE-2016-6309)
- A cross-site scripting (XSS) vulnerability exists within
the JQuery UI dialog() function due to improper
validation of input to the 'closeText' parameter before
returning it to users. An unauthenticated, remote
attacker can exploit this, via a specially crafted
request, to execute arbitrary script code in a user's
browser session. (CVE-2016-7103)
- A denial of service vulnerability exists in x509_vfy.c
due to improper handling of certificate revocation lists
(CRLs). An unauthenticated, remote attacker can exploit
this, via a specially crafted CRL, to cause a NULL
pointer dereference, resulting in a crash of the
service. (CVE-2016-7052)
- An unspecified cross-site scripting (XSS) vulnerability
exists in the web interface due to improper validation
of input before returning it to users. An
unauthenticated, remote attacker can exploit this, via a
specially crafted request, to execute arbitrary script
code in a user's browser session. | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 96337 | published | 2017-01-06 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96337 | title | Tenable Passive Vulnerability Scanner 5.x < 5.2.0 Multiple Vulnerabilities (SWEET32) |
NASL family | CGI abuses | NASL id | MYSQL_ENTERPRISE_MONITOR_3_3_1_1112.NASL | description | According to its self-reported version, the MySQL Enterprise Monitor
application running on the remote host is 3.3.x prior to 3.3.1.1112.
It is, therefore, affected by multiple vulnerabilities in the bundled
version of OpenSSL :
- Multiple integer overflow conditions exist in s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit this to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the DTLS
implementation due to a failure to properly restrict the
lifetime of queue entries associated with unused
out-of-order messages. An unauthenticated, remote
attacker can exploit this, by maintaining multiple
crafted DTLS sessions simultaneously, to exhaust memory.
(CVE-2016-2179)
- An out-of-bounds read error exists in the X.509 Public
Key Infrastructure Time-Stamp Protocol (TSP)
implementation. An unauthenticated, remote attacker can
exploit this, via a crafted time-stamp file that is
mishandled by the 'openssl ts' command, to cause
denial of service or to disclose sensitive information.
(CVE-2016-2180)
- A denial of service vulnerability exists in the
Anti-Replay feature in the DTLS implementation due to
improper handling of epoch sequence numbers in records.
An unauthenticated, remote attacker can exploit this,
via spoofed DTLS records, to cause legitimate packets to
be dropped. (CVE-2016-2181)
- An overflow condition exists in the BN_bn2dec() function
in bn_print.c due to improper validation of
user-supplied input when handling BIGNUM values. An
unauthenticated, remote attacker can exploit this to
crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- A flaw exists in the tls_decrypt_ticket() function in
t1_lib.c due to improper handling of ticket HMAC
digests. An unauthenticated, remote attacker can exploit
this, via a ticket that is too short, to crash the
process, resulting in a denial of service.
(CVE-2016-6302)
- An integer overflow condition exists in the
MDC2_Update() function in mdc2dgst.c due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a heap-based
buffer overflow, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6303)
- A denial of service vulnerability exists in the
ssl_parse_clienthello_tlsext() function in t1_lib.c due
to improper handling of overly large OCSP Status Request
extensions from clients. An unauthenticated, remote
attacker can exploit this, via large OCSP Status Request
extensions, to exhaust memory resources. (CVE-2016-6304)
- An out-of-bounds read error exists in the certificate
parser that allows an unauthenticated, remote attacker
to cause a denial of service via crafted certificate
operations. (CVE-2016-6306) | last seen | 2019-01-16 | modified | 2018-06-14 | plugin id | 96771 | published | 2017-01-25 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96771 | title | MySQL Enterprise Monitor 3.3.x < 3.3.1.1112 Multiple Vulnerabilities (SWEET32) (January 2017 CPU) |
NASL family | SuSE Local Security Checks | NASL id | OPENSUSE-2016-1172.NASL | description | This update brings the new upstream nodejs LTS version 4.6.0, fixing
bugs and security issues :
- Nodejs embedded openssl version update
+ upgrade to 1.0.2j (CVE-2016-6304, CVE-2016-2183,
CVE-2016-2178, CVE-2016-6306, CVE-2016-7052)
+ remove support for dynamic 3rd party engine modules
- http: Properly validate for allowable characters in input
user data. This introduces a new case where throw may occur
when configuring HTTP responses, users should already
be adopting try/catch here.
(CVE-2016-5325, bsc#985201)
- tls: properly validate wildcard certificates
(CVE-2016-7099, bsc#1001652)
- buffer: Zero-fill excess bytes in new Buffer objects
created with Buffer.concat() | last seen | 2019-01-16 | modified | 2016-10-14 | plugin id | 94002 | published | 2016-10-12 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=94002 | title | openSUSE Security Update : nodejs (openSUSE-2016-1172) |
NASL family | Amazon Linux Local Security Checks | NASL id | ALA_ALAS-2017-791.NASL | description | It was discovered that the RMI registry and DCG implementations in the
RMI component of OpenJDK performed deserialization of untrusted
inputs. A remote attacker could possibly use this flaw to execute
arbitrary code with the privileges of RMI registry or a Java RMI
application. (CVE-2017-3241) This issue was addressed by introducing
whitelists of classes that can be deserialized by RMI registry or DCG.
These whitelists can be customized using the newly introduced
sun.rmi.registry.registryFilter and sun.rmi.transport.dgcFilter
security properties.
Multiple flaws were discovered in the Libraries and Hotspot components
in OpenJDK. An untrusted Java application or applet could use these
flaws to completely bypass Java sandbox restrictions. (CVE-2017-3272 ,
CVE-2017-3289)
A covert timing channel flaw was found in the DSA implementation in
the Libraries component of OpenJDK. A remote attacker could possibly
use this flaw to extract certain information about the used key via a
timing side channel. (CVE-2016-5548)
It was discovered that the Libraries component of OpenJDK accepted
ECSDA signatures using non-canonical DER encoding. This could cause a
Java application to accept signature in an incorrect format not
accepted by other cryptographic tools. (CVE-2016-5546)
It was discovered that the 2D component of OpenJDK performed parsing
of iTXt and zTXt PNG image chunks even when configured to ignore
metadata. An attacker able to make a Java application parse a
specially crafted PNG image could cause the application to consume an
excessive amount of memory. (CVE-2017-3253)
It was discovered that the Libraries component of OpenJDK did not
validate the length of the object identifier read from the DER input
before allocating memory to store the OID. An attacker able to make a
Java application decode a specially crafted DER input could cause the
application to consume an excessive amount of memory. (CVE-2016-5547)
It was discovered that the JAAS component of OpenJDK did not use the
correct way to extract user DN from the result of the user search LDAP
query. A specially crafted user LDAP entry could cause the application
to use an incorrect DN. (CVE-2017-3252)
It was discovered that the Networking component of OpenJDK failed to
properly parse user info from the URL. A remote attacker could cause a
Java application to incorrectly parse an attacker supplied URL and
interpret it differently from other applications processing the same
URL. (CVE-2016-5552)
Multiple flaws were found in the Networking components in OpenJDK. An
untrusted Java application or applet could use these flaws to bypass
certain Java sandbox restrictions. (CVE-2017-3261 , CVE-2017-3231)
A flaw was found in the way the DES/3DES cipher was used as part of
the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw
to recover some plaintext data by capturing large amounts of encrypted
traffic between TLS/SSL server and client if the communication used a
DES/3DES based ciphersuite. (CVE-2016-2183) This update mitigates the
CVE-2016-2183 issue by adding 3DES cipher suites to the list of legacy
algorithms (defined using the jdk.tls.legacyAlgorithms security
property) so they are only used if connecting TLS/SSL client and
server do not share any other non-legacy cipher suite. | last seen | 2019-01-16 | modified | 2018-04-18 | plugin id | 96809 | published | 2017-01-27 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96809 | title | Amazon Linux AMI : java-1.8.0-openjdk (ALAS-2017-791) |
NASL family | CentOS Local Security Checks | NASL id | CENTOS_RHSA-2018-2123.NASL | description | An update for python is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security
impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
Python is an interpreted, interactive, object-oriented programming
language, which includes modules, classes, exceptions, very high level
dynamic data types and dynamic typing. Python supports interfaces to
many system calls and libraries, as well as to various windowing
systems.
Security Fix(es) :
* A flaw was found in the way the DES/3DES cipher was used as part of
the TLS /SSL protocol. A man-in-the-middle attacker could use this
flaw to recover some plaintext data by capturing large amounts of
encrypted traffic between TLS/SSL server and client if the
communication used a DES/3DES based ciphersuite. (CVE-2016-2183)
Note: This update modifies the Python ssl module to disable 3DES
cipher suites by default.
Red Hat would like to thank OpenVPN for reporting this issue. Upstream
acknowledges Karthikeyan Bhargavan (Inria) and Gaetan Leurent (Inria)
as the original reporters. | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 111075 | published | 2018-07-16 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=111075 | title | CentOS 7 : python (CESA-2018:2123) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2017-0839-1.NASL | description | This update for java-1_8_0-ibm fixes the following issues: Security
issue fixed :
- CVE-2016-2183: The DES and Triple DES ciphers, as used
in the TLS, SSH, and IPSec protocols and other protocols
and products, have a birthday bound of approximately
four billion blocks, which makes it easier for remote
attackers to obtain cleartext data via a birthday attack
against a long-duration encrypted session, as
demonstrated by an HTTPS session using Triple DES in CBC
mode, aka a 'Sweet32' attack. (bsc#1027038) Bugfixes :
- Require the main pkg in post phase of devel
(bsc#1025506)
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-30 | plugin id | 99083 | published | 2017-03-30 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=99083 | title | SUSE SLES12 Security Update : java-1_8_0-ibm (SUSE-SU-2017:0839-1) |
NASL family | Misc. | NASL id | ARISTA_EOS_SA0024_4_17.NASL | description | The version of Arista Networks EOS running on the remote device is
affected by multiple vulnerabilities in the included OpenSSL library :
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- A flaw exists in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources, resulting in a denial of service condition.
(CVE-2016-6304) | last seen | 2019-01-16 | modified | 2018-08-09 | plugin id | 107067 | published | 2018-02-28 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=107067 | title | Arista Networks EOS 4.17 Multiple Vulnerabilities (SA0024) (SWEET32) |
NASL family | OracleVM Local Security Checks | NASL id | ORACLEVM_OVMSA-2016-0141.NASL | description | The remote OracleVM system is missing necessary patches to address
critical security updates :
- fix CVE-2016-2177 - possible integer overflow
- fix CVE-2016-2178 - non-constant time DSA operations
- fix CVE-2016-2182 - possible buffer overflow in
BN_bn2dec
- fix CVE-2016-6306 - certificate message OOB reads
- mitigate CVE-2016-2183 - degrade all 64bit block ciphers
and RC4 to 112 bit effective strength | last seen | 2019-01-16 | modified | 2018-07-24 | plugin id | 94095 | published | 2016-10-17 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=94095 | title | OracleVM 3.2 : openssl (OVMSA-2016-0141) |
NASL family | Slackware Local Security Checks | NASL id | SLACKWARE_SSA_2016-266-01.NASL | description | New openssl packages are available for Slackware 14.0, 14.1, 14.2,
and -current to fix security issues. | last seen | 2019-01-16 | modified | 2017-09-21 | plugin id | 93663 | published | 2016-09-23 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93663 | title | Slackware 14.0 / 14.1 / 14.2 / current : openssl (SSA:2016-266-01) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2016-2394-1.NASL | description | This update for openssl fixes the following issues: OpenSSL Security
Advisory [22 Sep 2016] (bsc#999665) Severity: High
- OCSP Status Request extension unbounded memory growth
(CVE-2016-6304) (bsc#999666) Severity: Low
- Pointer arithmetic undefined behaviour (CVE-2016-2177)
(bsc#982575)
- Constant time flag not preserved in DSA signing
(CVE-2016-2178) (bsc#983249)
- DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
- OOB read in TS_OBJ_print_bio() (CVE-2016-2180)
(bsc#990419)
- DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
- OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
- Birthday attack against 64-bit block ciphers (SWEET32)
(CVE-2016-2183) (bsc#995359)
- Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
- OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
- Certificate message OOB reads (CVE-2016-6306)
(bsc#999668) More information can be found on:
https://www.openssl.org/news/secadv/20160922.txt Also
following bugs were fixed :
- update expired S/MIME certs (bsc#979475)
- improve s390x performance (bsc#982745)
- allow >= 64GB AESGCM transfers (bsc#988591)
- fix crash in print_notice (bsc#998190)
- resume reading from /dev/urandom when interrupted by a
signal (bsc#995075)
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-29 | plugin id | 93765 | published | 2016-09-28 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93765 | title | SUSE SLED12 / SLES12 Security Update : openssl (SUSE-SU-2016:2394-1) |
NASL family | Web Servers | NASL id | ORACLE_HTTP_SERVER_CPU_JUL_2016.NASL | description | The version of Oracle HTTP Server installed on the remote host is
affected by multiple vulnerabilities as noted in the July 2016
CPU advisory. | last seen | 2019-01-16 | modified | 2018-11-15 | plugin id | 92542 | published | 2016-07-25 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=92542 | title | Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (July 2016 CPU) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2017-3113.NASL | description | An update is now available for Red Hat JBoss Enterprise Web Server
2.1.2 for RHEL 6 and Red Hat JBoss Enterprise Web Server 2.1.2 for
RHEL 7.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
The httpd packages provide the Apache HTTP Server, a powerful,
efficient, and extensible web server.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL)
and Transport Layer Security (TLS) protocols, as well as a
full-strength general-purpose cryptography library.
Apache Tomcat is a servlet container for the Java Servlet and
JavaServer Pages (JSP) technologies.
This release provides an update to httpd, OpenSSL and Tomcat 6/7 for
Red Hat JBoss Web Server 2.1.2. The updates are documented in the
Release Notes document linked to in the References.
This release of Red Hat JBoss Web Server 2.1.2 Service Pack 2 serves
as a update for Red Hat JBoss Web Server 2, and includes bug fixes,
which are documented in the Release Notes document linked to in the
References.
Users of Red Hat JBoss Web Server 2 should upgrade to these updated
packages, which resolve several security issues.
Security Fix(es) :
* It was discovered that the httpd's mod_auth_digest module did not
properly initialize memory before using it when processing certain
headers related to digest authentication. A remote attacker could
possibly use this flaw to disclose potentially sensitive information
or cause httpd child process to crash by sending specially crafted
requests to a server. (CVE-2017-9788)
* A vulnerability was discovered in Tomcat where if a servlet context
was configured with readonly=false and HTTP PUT requests were allowed,
an attacker could upload a JSP file to that context and achieve code
execution. (CVE-2017-12615)
* A vulnerability was discovered in Tomcat where if a servlet context
was configured with readonly=false and HTTP PUT requests were allowed,
an attacker could upload a JSP file to that context and achieve code
execution. (CVE-2017-12617)
* A flaw was found in the way the DES/3DES cipher was used as part of
the TLS /SSL protocol. A man-in-the-middle attacker could use this
flaw to recover some plaintext data by capturing large amounts of
encrypted traffic between TLS/SSL server and client if the
communication used a DES/3DES based ciphersuite. (CVE-2016-2183)
* A use-after-free flaw was found in the way httpd handled invalid and
previously unregistered HTTP methods specified in the Limit directive
used in an .htaccess file. A remote attacker could possibly use this
flaw to disclose portions of the server memory, or cause httpd child
process to crash. (CVE-2017-9798)
Red Hat would like to thank OpenVPN for reporting CVE-2016-2183 and
Hanno Bock for reporting CVE-2017-9798. Upstream acknowledges
Karthikeyan Bhargavan (Inria) and Gaetan Leurent (Inria) as the
original reporters of CVE-2016-2183.
Bug Fix(es) :
* Corruption in nodestatsmem in multiple core dumps but in different
functions of each core dump. (BZ#1338640)
* mod_cluster segfaults in process_info() due to wrongly generated
assembler instruction movslq (BZ#1448709)
* CRL checking of very large CRLs fails with OpenSSL 1.0.2
(BZ#1493075) | last seen | 2019-02-08 | modified | 2019-02-07 | plugin id | 104456 | published | 2017-11-08 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=104456 | title | RHEL 6 / 7 : Red Hat JBoss Web Server (RHSA-2017:3113) (Optionsbleed) |
NASL family | Scientific Linux Local Security Checks | NASL id | SL_20170120_JAVA_1_8_0_OPENJDK_ON_SL6_X.NASL | description | Security Fix(es) :
- It was discovered that the RMI registry and DCG
implementations in the RMI component of OpenJDK
performed deserialization of untrusted inputs. A remote
attacker could possibly use this flaw to execute
arbitrary code with the privileges of RMI registry or a
Java RMI application. (CVE-2017-3241)
This issue was addressed by introducing whitelists of classes that can
be deserialized by RMI registry or DCG. These whitelists can be
customized using the newly introduced sun.rmi.registry.registryFilter
and sun.rmi.transport.dgcFilter security properties.
- Multiple flaws were discovered in the Libraries and
Hotspot components in OpenJDK. An untrusted Java
application or applet could use these flaws to
completely bypass Java sandbox restrictions.
(CVE-2017-3272, CVE-2017-3289)
- A covert timing channel flaw was found in the DSA
implementation in the Libraries component of OpenJDK. A
remote attacker could possibly use this flaw to extract
certain information about the used key via a timing side
channel. (CVE-2016-5548)
- It was discovered that the Libraries component of
OpenJDK accepted ECSDA signatures using non-canonical
DER encoding. This could cause a Java application to
accept signature in an incorrect format not accepted by
other cryptographic tools. (CVE-2016-5546)
- It was discovered that the 2D component of OpenJDK
performed parsing of iTXt and zTXt PNG image chunks even
when configured to ignore metadata. An attacker able to
make a Java application parse a specially crafted PNG
image could cause the application to consume an
excessive amount of memory. (CVE-2017-3253)
- It was discovered that the Libraries component of
OpenJDK did not validate the length of the object
identifier read from the DER input before allocating
memory to store the OID. An attacker able to make a Java
application decode a specially crafted DER input could
cause the application to consume an excessive amount of
memory. (CVE-2016-5547)
- It was discovered that the JAAS component of OpenJDK did
not use the correct way to extract user DN from the
result of the user search LDAP query. A specially
crafted user LDAP entry could cause the application to
use an incorrect DN. (CVE-2017-3252)
- It was discovered that the Networking component of
OpenJDK failed to properly parse user info from the URL.
A remote attacker could cause a Java application to
incorrectly parse an attacker supplied URL and interpret
it differently from other applications processing the
same URL. (CVE-2016-5552)
- Multiple flaws were found in the Networking components
in OpenJDK. An untrusted Java application or applet
could use these flaws to bypass certain Java sandbox
restrictions. (CVE-2017-3261, CVE-2017-3231)
- A flaw was found in the way the DES/3DES cipher was used
as part of the TLS/SSL protocol. A man-in-the-middle
attacker could use this flaw to recover some plaintext
data by capturing large amounts of encrypted traffic
between TLS/SSL server and client if the communication
used a DES/3DES based ciphersuite. (CVE-2016-2183)
This update mitigates the CVE-2016-2183 issue by adding 3DES cipher
suites to the list of legacy algorithms (defined using the
jdk.tls.legacyAlgorithms security property) so they are only used if
connecting TLS/SSL client and server do not share any other non-legacy
cipher suite.
Note: If the web browser plug-in provided by the icedtea-web package
was installed, the issues exposed via Java applets could have been
exploited without user interaction if a user visited a malicious
website. | last seen | 2019-01-16 | modified | 2018-12-27 | plugin id | 96757 | published | 2017-01-25 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96757 | title | Scientific Linux Security Update : java-1.8.0-openjdk on SL6.x, SL7.x i386/x86_64 |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2016-2470-1.NASL | description | This update brings the new upstream nodejs LTS version 4.6.0, fixing
bugs and security issues :
- Nodejs embedded openssl version update
+ upgrade to 1.0.2j (CVE-2016-6304, CVE-2016-2183,
CVE-2016-2178, CVE-2016-6306, CVE-2016-7052)
+ remove support for dynamic 3rd party engine modules
- http: Properly validate for allowable characters in input user data.
This introduces a new case where throw may occur when configuring HTTP
responses, users should already be adopting try/catch here.
(CVE-2016-5325, bsc#985201)
- tls: properly validate wildcard certificates
(CVE-2016-7099, bsc#1001652)
- buffer: Zero-fill excess bytes in new Buffer objects
created with Buffer.concat()
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 119982 | published | 2019-01-02 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=119982 | title | SUSE SLES12 Security Update : nodejs4 (SUSE-SU-2016:2470-1) |
NASL family | Scientific Linux Local Security Checks | NASL id | SL_20170213_JAVA_1_7_0_OPENJDK_ON_SL5_X.NASL | description | Security Fix(es) :
- It was discovered that the RMI registry and DCG
implementations in the RMI component of OpenJDK
performed deserialization of untrusted inputs. A remote
attacker could possibly use this flaw to execute
arbitrary code with the privileges of RMI registry or a
Java RMI application. (CVE-2017-3241)
This issue was addressed by introducing whitelists of classes that can
be deserialized by RMI registry or DCG. These whitelists can be
customized using the newly introduced sun.rmi.registry.registryFilter
and sun.rmi.transport.dgcFilter security properties.
- Multiple flaws were discovered in the Libraries and
Hotspot components in OpenJDK. An untrusted Java
application or applet could use these flaws to
completely bypass Java sandbox restrictions.
(CVE-2017-3272, CVE-2017-3289)
- A covert timing channel flaw was found in the DSA
implementation in the Libraries component of OpenJDK. A
remote attacker could possibly use this flaw to extract
certain information about the used key via a timing side
channel. (CVE-2016-5548)
- It was discovered that the Libraries component of
OpenJDK accepted ECSDA signatures using non-canonical
DER encoding. This could cause a Java application to
accept signature in an incorrect format not accepted by
other cryptographic tools. (CVE-2016-5546)
- It was discovered that the 2D component of OpenJDK
performed parsing of iTXt and zTXt PNG image chunks even
when configured to ignore metadata. An attacker able to
make a Java application parse a specially crafted PNG
image could cause the application to consume an
excessive amount of memory. (CVE-2017-3253)
- It was discovered that the Libraries component of
OpenJDK did not validate the length of the object
identifier read from the DER input before allocating
memory to store the OID. An attacker able to make a Java
application decode a specially crafted DER input could
cause the application to consume an excessive amount of
memory. (CVE-2016-5547)
- It was discovered that the JAAS component of OpenJDK did
not use the correct way to extract user DN from the
result of the user search LDAP query. A specially
crafted user LDAP entry could cause the application to
use an incorrect DN. (CVE-2017-3252)
- It was discovered that the Networking component of
OpenJDK failed to properly parse user info from the URL.
A remote attacker could cause a Java application to
incorrectly parse an attacker supplied URL and interpret
it differently from other applications processing the
same URL. (CVE-2016-5552)
- Multiple flaws were found in the Networking components
in OpenJDK. An untrusted Java application or applet
could use these flaws to bypass certain Java sandbox
restrictions. (CVE-2017-3261, CVE-2017-3231)
- A flaw was found in the way the DES/3DES cipher was used
as part of the TLS/SSL protocol. A man-in-the-middle
attacker could use this flaw to recover some plaintext
data by capturing large amounts of encrypted traffic
between TLS/SSL server and client if the communication
used a DES/3DES based ciphersuite. (CVE-2016-2183)
This update mitigates the CVE-2016-2183 issue by adding 3DES cipher
suites to the list of legacy algorithms (defined using the
jdk.tls.legacyAlgorithms security property) so they are only used if
connecting TLS/SSL client and server do not share any other non-legacy
cipher suite. | last seen | 2019-01-16 | modified | 2018-12-27 | plugin id | 97122 | published | 2017-02-13 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97122 | title | Scientific Linux Security Update : java-1.7.0-openjdk on SL5.x, SL6.x, SL7.x i386/x86_64 |
NASL family | CGI abuses | NASL id | MYSQL_ENTERPRISE_MONITOR_3_2_5_1141.NASL | description | According to its self-reported version, the MySQL Enterprise Monitor
application running on the remote host is 3.2.x prior to 3.2.5.1141.
It is, therefore, affected by multiple vulnerabilities :
- Multiple integer overflow conditions exist in the
bundled version of OpenSSL in s3_srvr.c, ssl_sess.c, and
t1_lib.c due to improper use of pointer arithmetic for
heap-buffer boundary checks. An unauthenticated, remote
attacker can exploit this to cause a denial of service.
(CVE-2016-2177)
- An information disclosure vulnerability exists in the
bundled version of OpenSSL in the dsa_sign_setup()
function in dsa_ossl.c due to a failure to properly
ensure the use of constant-time operations. An
unauthenticated, remote attacker can exploit this, via a
timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the bundled
version of OpenSSL in the DTLS implementation due to a
failure to properly restrict the lifetime of queue
entries associated with unused out-of-order messages. An
unauthenticated, remote attacker can exploit this, by
maintaining multiple crafted DTLS sessions
simultaneously, to exhaust memory. (CVE-2016-2179)
- An out-of-bounds read error exists in the bundled
version of OpenSSL in the X.509 Public Key
Infrastructure Time-Stamp Protocol (TSP) implementation.
An unauthenticated, remote attacker can exploit this,
via a crafted time-stamp file that is mishandled by the
'openssl ts' command, to cause denial of service or to
disclose sensitive information. (CVE-2016-2180)
- A denial of service vulnerability exists in the bundled
version of OpenSSL in the Anti-Replay feature in the
DTLS implementation due to improper handling of epoch
sequence numbers in records. An unauthenticated, remote
attacker can exploit this, via spoofed DTLS records, to
cause legitimate packets to be dropped. (CVE-2016-2181)
- An overflow condition exists in the bundled version of
OpenSSL in the BN_bn2dec() function in bn_print.c due to
improper validation of user-supplied input when handling
BIGNUM values. An unauthenticated, remote attacker can
exploit this to crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the bundled
version of OpenSSL in the 3DES and Blowfish algorithms
due to the use of weak 64-bit block ciphers by default.
A man-in-the-middle attacker who has sufficient
resources can exploit this vulnerability, via a
'birthday' attack, to detect a collision that leaks the
XOR between the fixed secret and a known plaintext,
allowing the disclosure of the secret text, such as
secure HTTPS cookies, and possibly resulting in the
hijacking of an authenticated session. (CVE-2016-2183)
- A flaw exists in the bundled version of OpenSSL in the
tls_decrypt_ticket() function in t1_lib.c due to
improper handling of ticket HMAC digests. An
unauthenticated, remote attacker can exploit this, via a
ticket that is too short, to crash the process,
resulting in a denial of service. (CVE-2016-6302)
- An integer overflow condition exists in the bundled
version of OpenSSL in the MDC2_Update() function in
mdc2dgst.c due to improper validation of user-supplied
input. An unauthenticated, remote attacker can exploit
this to cause a heap-based buffer overflow, resulting in
a denial of service condition or possibly the execution
of arbitrary code. (CVE-2016-6303)
- A denial of service vulnerability exists in the bundled
version of OpenSSL in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources. (CVE-2016-6304)
- An out-of-bounds read error exists in the bundled
version of OpenSSL in the certificate parser that allows
an unauthenticated, remote attacker to cause a denial of
service via crafted certificate operations.
(CVE-2016-6306) | last seen | 2019-01-16 | modified | 2018-06-14 | plugin id | 96770 | published | 2017-01-25 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96770 | title | MySQL Enterprise Monitor 3.2.x < 3.2.5.1141 Multiple Vulnerabilities (SWEET32) (January 2017 CPU) |
NASL family | Ubuntu Local Security Checks | NASL id | UBUNTU_USN-3087-2.NASL | description | USN-3087-1 fixed vulnerabilities in OpenSSL. The fix for CVE-2016-2182
was incomplete and caused a regression when parsing certificates. This
update fixes the problem.
We apologize for the inconvenience.
Shi Lei discovered that OpenSSL incorrectly handled the OCSP Status
Request extension. A remote attacker could possibly use this issue to
cause memory consumption, resulting in a denial of service.
(CVE-2016-6304)
Guido Vranken discovered that OpenSSL used undefined
behaviour when performing pointer arithmetic. A remote
attacker could possibly use this issue to cause OpenSSL to
crash, resulting in a denial of service. This issue has only
been addressed in Ubuntu 16.04 LTS in this update.
(CVE-2016-2177)
Cesar Pereida, Billy Brumley, and Yuval Yarom discovered
that OpenSSL did not properly use constant-time operations
when performing DSA signing. A remote attacker could
possibly use this issue to perform a cache-timing attack and
recover private DSA keys. (CVE-2016-2178)
Quan Luo discovered that OpenSSL did not properly restrict
the lifetime of queue entries in the DTLS implementation. A
remote attacker could possibly use this issue to consume
memory, resulting in a denial of service. (CVE-2016-2179)
Shi Lei discovered that OpenSSL incorrectly handled memory
in the TS_OBJ_print_bio() function. A remote attacker could
possibly use this issue to cause a denial of service.
(CVE-2016-2180)
It was discovered that the OpenSSL incorrectly handled the
DTLS anti-replay feature. A remote attacker could possibly
use this issue to cause a denial of service. (CVE-2016-2181)
Shi Lei discovered that OpenSSL incorrectly validated
division results. A remote attacker could possibly use this
issue to cause a denial of service. (CVE-2016-2182)
Karthik Bhargavan and Gaetan Leurent discovered that the DES
and Triple DES ciphers were vulnerable to birthday attacks.
A remote attacker could possibly use this flaw to obtain
clear text data from long encrypted sessions. This update
moves DES from the HIGH cipher list to MEDIUM.
(CVE-2016-2183)
Shi Lei discovered that OpenSSL incorrectly handled certain
ticket lengths. A remote attacker could use this issue to
cause a denial of service. (CVE-2016-6302)
Shi Lei discovered that OpenSSL incorrectly handled memory
in the MDC2_Update() function. A remote attacker could
possibly use this issue to cause a denial of service.
(CVE-2016-6303)
Shi Lei discovered that OpenSSL incorrectly performed
certain message length checks. A remote attacker could
possibly use this issue to cause a denial of service.
(CVE-2016-6306).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-12-01 | plugin id | 93715 | published | 2016-09-26 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93715 | title | Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : openssl regression (USN-3087-2) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2017-0462.NASL | description | An update for java-1.8.0-ibm is now available for Red Hat Enterprise
Linux 6 Supplementary and Red Hat Enterprise Linux 7 Supplementary.
Red Hat Product Security has rated this update as having a security
impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
IBM Java SE version 8 includes the IBM Java Runtime Environment and
the IBM Java Software Development Kit.
This update upgrades IBM Java SE 8 to version 8 SR4-FP1.
Security Fix(es) :
* This update fixes a vulnerability in the IBM Java Runtime
Environment and the IBM Java Software Development Kit. Further
information about this flaw can be found on the IBM Java Security
alerts page, listed in the References section. (CVE-2016-2183) | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 97630 | published | 2017-03-09 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97630 | title | RHEL 6 / 7 : java-1.8.0-ibm (RHSA-2017:0462) |
NASL family | AIX Local Security Checks | NASL id | AIX_OPENSSL_ADVISORY21.NASL | description | The version of OpenSSL installed on the remote AIX host is affected by
the following vulnerabilities :
- Multiple integer overflow conditions exist in s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit this to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the DTLS
implementation due to a failure to properly restrict the
lifetime of queue entries associated with unused
out-of-order messages. An unauthenticated, remote
attacker can exploit this, by maintaining multiple
crafted DTLS sessions simultaneously, to exhaust memory.
(CVE-2016-2179)
- An out-of-bounds read error exists in the X.509 Public
Key Infrastructure Time-Stamp Protocol (TSP)
implementation. An unauthenticated, remote attacker can
exploit this, via a crafted time-stamp file that is
mishandled by the 'openssl ts' command, to cause
denial of service or to disclose sensitive information.
(CVE-2016-2180)
- A denial of service vulnerability exists in the
Anti-Replay feature in the DTLS implementation due to
improper handling of epoch sequence numbers in records.
An unauthenticated, remote attacker can exploit this,
via spoofed DTLS records, to cause legitimate packets to
be dropped. (CVE-2016-2181)
- An overflow condition exists in the BN_bn2dec() function
in bn_print.c due to improper validation of
user-supplied input when handling BIGNUM values. An
unauthenticated, remote attacker can exploit this to
crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- A flaw exists in the tls_decrypt_ticket() function in
t1_lib.c due to improper handling of ticket HMAC
digests. An unauthenticated, remote attacker can exploit
this, via a ticket that is too short, to crash the
process, resulting in a denial of service.
(CVE-2016-6302)
- An integer overflow condition exists in the
MDC2_Update() function in mdc2dgst.c due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a heap-based
buffer overflow, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6303)
- A flaw exists in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources, resulting in a denial of service condition.
(CVE-2016-6304)
- An out-of-bounds read error exists in the certificate
parser that allows an unauthenticated, remote attacker
to cause a denial of service via crafted certificate
operations. (CVE-2016-6306)
- A flaw exists in the GOST ciphersuites due to the use of
long-term keys to establish an encrypted connection. A
man-in-the-middle attacker can exploit this, via a Key
Compromise Impersonation (KCI) attack, to impersonate
the server.
- A denial of service vulnerability exists in x509_vfy.c
due to improper handling of certificate revocation lists
(CRLs). An unauthenticated, remote attacker can exploit
this, via a specially crafted CRL, to cause a NULL
pointer dereference, resulting in a crash of the
service. (CVE-2016-7052) | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 95255 | published | 2016-11-22 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=95255 | title | AIX OpenSSL Advisory : openssl_advisory21.asc (SWEET32) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2017-0720-1.NASL | description | This update for java-1_7_1-ibm fixes the following issues: Security
issue fixed :
- CVE-2016-2183: The DES and Triple DES ciphers, as used
in the TLS, SSH, and IPSec protocols and other protocols
and products, have a birthday bound of approximately
four billion blocks, which makes it easier for remote
attackers to obtain cleartext data via a birthday attack
against a long-duration encrypted session, as
demonstrated by an HTTPS session using Triple DES in CBC
mode, aka a 'Sweet32' attack. (bsc#1027038)
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-30 | plugin id | 97830 | published | 2017-03-20 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97830 | title | SUSE SLES12 Security Update : java-1_7_1-ibm (SUSE-SU-2017:0720-1) |
NASL family | Gentoo Local Security Checks | NASL id | GENTOO_GLSA-201612-16.NASL | description | The remote host is affected by the vulnerability described in GLSA-201612-16
(OpenSSL: Multiple vulnerabilities)
Multiple vulnerabilities have been discovered in OpenSSL. Please review
the CVE identifiers and the International Association for Cryptologic
Research’s (IACR) paper, “Make Sure DSA Signing Exponentiations
Really are Constant-Time” for further details.
Impact :
Remote attackers could cause a Denial of Service condition or have other
unspecified impacts. Additionally, a time based side-channel attack may
allow a local attacker to recover a private DSA key.
Workaround :
There is no known workaround at this time. | last seen | 2019-01-16 | modified | 2017-10-02 | plugin id | 95602 | published | 2016-12-07 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=95602 | title | GLSA-201612-16 : OpenSSL: Multiple vulnerabilities |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2016-2468-1.NASL | description | This update for compat-openssl098 fixes the following issues: OpenSSL
Security Advisory [22 Sep 2016] (bsc#999665) Severity: High
- OCSP Status Request extension unbounded memory growth
(CVE-2016-6304) (bsc#999666) Severity: Low
- Pointer arithmetic undefined behaviour (CVE-2016-2177)
(bsc#982575)
- Constant time flag not preserved in DSA signing
(CVE-2016-2178) (bsc#983249)
- DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
- DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
- OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
- Birthday attack against 64-bit block ciphers (SWEET32)
(CVE-2016-2183) (bsc#995359)
- Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
- OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
- Certificate message OOB reads (CVE-2016-6306)
(bsc#999668) More information can be found on:
https://www.openssl.org/news/secadv/20160922.txt Bugs
fixed :
- update expired S/MIME certs (bsc#979475)
- fix crash in print_notice (bsc#998190)
- resume reading from /dev/urandom when interrupted by a
signal (bsc#995075)
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 93909 | published | 2016-10-07 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93909 | title | SUSE SLED12 / SLES12 Security Update : compat-openssl098 (SUSE-SU-2016:2468-1) |
NASL family | Databases | NASL id | IBM_INFORMIX_SERVER_SWG22002897.NASL | description | The version of IBM Informix Dynamic Server installed on the remote
host is 11.50.xCn prior to 11.50.xC9, 11.70.xCn prior to 11.70.xC9, or
12.10.xCn prior to 12.10.xC8W2. It is, therefore, affected by a
multiple vulnerabilities :
- A vulnerability, known as SWEET32, exists in the OpenSSL
component in the 3DES and Blowfish algorithms due to the
use of weak 64-bit block ciphers by default. A
man-in-the-middle attacker who has sufficient resources
can exploit this vulnerability, via a 'birthday' attack,
to detect a collision that leaks the XOR between the
fixed secret and a known plaintext, allowing the
disclosure of the secret text, such as secure HTTPS
cookies, and possibly resulting in the hijacking of an
authenticated session. (CVE-2016-2183)
- A remote code execution vulnerability exists in the Open
Admin Tool that allows an unauthenticated, remote
attacker to execute arbitrary code with administrator
privileges. (CVE-2017-1092)
- A denial of service vulnerability exists due to an
overflow condition in the FORMAT_UNITS() function caused
by improper validation of user-supplied input. An
authenticated, remote attacker can exploit this to write
large assertion failure files to the server, resulting
in a crash of the server. Note that this vulnerability
only affects the 12.10 version branch. (CVE-2017-1310) | last seen | 2019-01-16 | modified | 2018-07-12 | plugin id | 100380 | published | 2017-05-24 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=100380 | title | IBM Informix Dynamic Server 11.50.xCn < 11.50.xC9 / 11.70.xCn < 11.70.xC9 / 12.10.xCn < 12.10.xC8W2 Multiple Vulnerabilities (SWEET32) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2017-0346-1.NASL | description | This update for java-1_8_0-openjdk fixes the following issues: Oracle
Critical Patch Update of January 2017 (bsc#1020905) Upgrade to version
jdk8u121 (icedtea 3.3.0) :
- S8138725: Add options for Javadoc generation
- S8140353: Improve signature checking
- S8151934, CVE-2017-3231: Resolve class resolution
- S8156804, CVE-2017-3241: Better constraint checking
- S8158406: Limited Parameter Processing
- S8158997: JNDI Protocols Switch
- S8159507: RuntimeVisibleAnnotation validation
- S8161218: Better bytecode loading
- S8161743, CVE-2017-3252: Provide proper login context
- S8162577: Standardize logging levels
- S8162973: Better component components
- S8164143, CVE-2017-3260: Improve components for menu
items
- S8164147, CVE-2017-3261: Improve streaming socket output
- S8165071, CVE-2016-2183: Expand TLS support
- S8165344, CVE-2017-3272: Update concurrency support
- S8166988, CVE-2017-3253: Improve image processing
performance
- S8167104, CVE-2017-3289: Additional class construction
refinements
- S8167223, CVE-2016-5552: URL handling improvements
- S8168705, CVE-2016-5547: Better ObjectIdentifier
validation
- S8168714, CVE-2016-5546: Tighten ECDSA validation
- S8168728, CVE-2016-5548: DSA signing improvements
- S8168724, CVE-2016-5549: ECDSA signing improvements
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-30 | plugin id | 96926 | published | 2017-02-01 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96926 | title | SUSE SLED12 / SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2017:0346-1) |
NASL family | Gentoo Local Security Checks | NASL id | GENTOO_GLSA-201707-01.NASL | description | The remote host is affected by the vulnerability described in GLSA-201707-01
(IcedTea: Multiple vulnerabilities)
Multiple vulnerabilities have been discovered in IcedTea. Please review
the CVE identifiers referenced below for details.
Note: If the web browser plug-in provided by the dev-java/icedtea-web
package was installed, the issues exposed via Java applets could have
been exploited without user interaction if a user visited a malicious
website.
Impact :
A remote attacker could possibly execute arbitrary code with the
privileges of the process, gain access to information, or cause a Denial
of Service condition.
Workaround :
There is no known workaround at this time. | last seen | 2019-01-16 | modified | 2017-07-06 | plugin id | 101248 | published | 2017-07-06 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=101248 | title | GLSA-201707-01 : IcedTea: Multiple vulnerabilities |
NASL family | CGI abuses : XSS | NASL id | NESSUS_TNS_2016_16.NASL | description | According to its self-reported version number, the Tenable Nessus
application running on the remote host is 6.x prior to 6.9. It is,
therefore, affected by multiple vulnerabilities :
- Multiple integer overflow conditions exist in the
OpenSSL component in s3_srvr.c, ssl_sess.c, and t1_lib.c
due to improper use of pointer arithmetic for
heap-buffer boundary checks. An unauthenticated, remote
attacker can exploit this to cause a denial of service.
(CVE-2016-2177)
- An information disclosure vulnerability exists in the
OpenSSL component in the dsa_sign_setup() function in
dsa_ossl.c due to a failure to properly ensure the use
of constant-time operations. An unauthenticated, remote
attacker can exploit this, via a timing side-channel
attack, to disclose DSA key information. (CVE-2016-2178)
- A denial of service vulnerability exists in the OpenSSL
component in the DTLS implementation due to a failure to
properly restrict the lifetime of queue entries
associated with unused out-of-order messages. An
unauthenticated, remote attacker can exploit this, by
maintaining multiple crafted DTLS sessions
simultaneously, to exhaust memory. (CVE-2016-2179)
- An out-of-bounds read error exists in the OpenSSL
component in the X.509 Public Key Infrastructure
Time-Stamp Protocol (TSP) implementation. An
unauthenticated, remote attacker can exploit this, via a
crafted time-stamp file that is mishandled by the
'openssl ts' command, to cause denial of service or to
disclose sensitive information. (CVE-2016-2180)
- A denial of service vulnerability exists in the OpenSSL
component in the Anti-Replay feature in the DTLS
implementation due to improper handling of epoch
sequence numbers in records. An unauthenticated, remote
attacker can exploit this, via spoofed DTLS records, to
cause legitimate packets to be dropped. (CVE-2016-2181)
- An overflow condition exists in the OpenSSL component in
the BN_bn2dec() function in bn_print.c due to improper
validation of user-supplied input when handling BIGNUM
values. An unauthenticated, remote attacker can exploit
this to crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the OpenSSL
component in the 3DES and Blowfish algorithms due to the
use of weak 64-bit block ciphers by default. A
man-in-the-middle attacker who has sufficient resources
can exploit this vulnerability, via a 'birthday' attack,
to detect a collision that leaks the XOR between the
fixed secret and a known plaintext, allowing the
disclosure of the secret text, such as secure HTTPS
cookies, and possibly resulting in the hijacking of an
authenticated session. (CVE-2016-2183)
- A flaw exists in the OpenSSL component in the
tls_decrypt_ticket() function in t1_lib.c due to
improper handling of ticket HMAC digests.
An unauthenticated, remote attacker can exploit this,
via a ticket that is too short, to crash the process,
resulting in a denial of service. (CVE-2016-6302)
- An integer overflow condition exists in the OpenSSL
component in the MDC2_Update() function in mdc2dgst.c
due to improper validation of user-supplied input. An
unauthenticated, remote attacker can exploit this to
cause a heap-based buffer overflow, resulting in a
denial of service condition or possibly the execution of
arbitrary code. (CVE-2016-6303)
- A flaw exists in the OpenSSL component in the
ssl_parse_clienthello_tlsext() function in t1_lib.c due
to improper handling of overly large OCSP Status Request
extensions from clients. An unauthenticated, remote
attacker can exploit this, via large OCSP Status Request
extensions, to exhaust memory resources, resulting in a
denial of service condition. (CVE-2016-6304)
- A flaw exists in the OpenSSL component in the SSL_peek()
function in rec_layer_s3.c due to improper handling of
empty records. An unauthenticated, remote attacker can
exploit this, by triggering a zero-length record in an
SSL_peek call, to cause an infinite loop, resulting in a
denial of service condition. (CVE-2016-6305)
- An out-of-bounds read error exists in the OpenSSL
component in the certificate parser that allows an
unauthenticated, remote attacker to cause a denial of
service via crafted certificate operations.
(CVE-2016-6306)
- A denial of service vulnerability exists in the OpenSSL
component in the state-machine implementation due to a
failure to check for an excessive length before
allocating memory. An unauthenticated, remote attacker
can exploit this, via a crafted TLS message, to exhaust
memory resources. (CVE-2016-6307)
- A denial of service vulnerability exists in the OpenSSL
component in the DTLS implementation due to improper
handling of excessively long DTLS messages. An
unauthenticated, remote attacker can exploit this, via a
crafted DTLS message, to exhaust available memory
resources. (CVE-2016-6308)
- A remote code execution vulnerability exists in the
OpenSSL component in the read_state_machine() function
in statem.c due to improper handling of messages larger
than 16k. An unauthenticated, remote attacker can
exploit this, via a specially crafted message, to cause
a use-after-free error, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6309)
- A denial of service vulnerability exists in the OpenSSL
component in x509_vfy.c due to improper handling of
certificate revocation lists (CRLs). An unauthenticated,
remote attacker can exploit this, via a specially
crafted CRL, to cause a NULL pointer dereference,
resulting in a crash of the service. (CVE-2016-7052)
- A cross-site scripting (XSS) vulnerability exists due to
improper validation of user-supplied input. An
authenticated, remote attacker can exploit this, via a
specially crafted request, to execute arbitrary script
code in a user's browser session. (CVE-2016-9260) | last seen | 2019-01-16 | modified | 2018-07-16 | plugin id | 97192 | published | 2017-02-15 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97192 | title | Tenable Nessus 6.x < 6.9 Multiple Vulnerabilities (TNS-2016-16) (SWEET32) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2016-2458-1.NASL | description | This update for openssl fixes the following issues: OpenSSL Security
Advisory [22 Sep 2016] (bsc#999665) Severity: High
- OCSP Status Request extension unbounded memory growth
(CVE-2016-6304) (bsc#999666) Severity: Low
- Pointer arithmetic undefined behavior (CVE-2016-2177)
(bsc#982575)
- Constant time flag not preserved in DSA signing
(CVE-2016-2178) (bsc#983249)
- DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
- DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
- OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
- Birthday attack against 64-bit block ciphers (SWEET32)
(CVE-2016-2183) (bsc#995359)
- Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
- OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
- Certificate message OOB reads (CVE-2016-6306)
(bsc#999668) More information can be found on:
https://www.openssl.org/news/secadv/20160922.txt Bugs
fixed :
- Update expired S/MIME certs (bsc#979475)
- Fix crash in print_notice (bsc#998190)
- Resume reading from /dev/urandom when interrupted by a
signal (bsc#995075)
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-29 | plugin id | 93893 | published | 2016-10-06 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93893 | title | SUSE SLES11 Security Update : openssl (SUSE-SU-2016:2458-1) |
NASL family | SuSE Local Security Checks | NASL id | OPENSUSE-2016-1130.NASL | description | This update for openssl fixes the following issues :
OpenSSL Security Advisory [22 Sep 2016] (boo#999665)
Severity: High
- OCSP Status Request extension unbounded memory growth
(CVE-2016-6304) (boo#999666)
Severity: Low
- Pointer arithmetic undefined behaviour (CVE-2016-2177)
(boo#982575)
- Constant time flag not preserved in DSA signing
(CVE-2016-2178) (boo#983249)
- DTLS buffered message DoS (CVE-2016-2179) (boo#994844)
- OOB read in TS_OBJ_print_bio() (CVE-2016-2180)
(boo#990419)
- DTLS replay protection DoS (CVE-2016-2181) (boo#994749)
- OOB write in BN_bn2dec() (CVE-2016-2182) (boo#993819)
- Birthday attack against 64-bit block ciphers (SWEET32)
(CVE-2016-2183) (boo#995359)
- Malformed SHA512 ticket DoS (CVE-2016-6302) (boo#995324)
- OOB write in MDC2_Update() (CVE-2016-6303) (boo#995377)
- Certificate message OOB reads (CVE-2016-6306)
(boo#999668)
More information can be found on
https://www.openssl.org/news/secadv/20160922.txt
- update expired S/MIME certs (boo#979475)
- allow >= 64GB AESGCM transfers (boo#988591)
- fix crash in print_notice (boo#998190)
- resume reading from /dev/urandom when interrupted by a
signal (boo#995075) | last seen | 2019-01-16 | modified | 2016-10-13 | plugin id | 93756 | published | 2016-09-28 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93756 | title | openSUSE Security Update : openssl (openSUSE-2016-1130) |
NASL family | Gentoo Local Security Checks | NASL id | GENTOO_GLSA-201701-65.NASL | description | The remote host is affected by the vulnerability described in GLSA-201701-65
(Oracle JRE/JDK: Multiple vulnerabilities)
Multiple vulnerabilities have been discovered in in Oracle’s JRE and
JDK. Please review the CVE identifiers referenced below for details.
Impact :
A remote attacker could possibly execute arbitrary code with the
privileges of the process, gain access to information, or cause a Denial
of Service condition.
Workaround :
There is no known workaround at this time. | last seen | 2019-01-16 | modified | 2017-10-02 | plugin id | 96787 | published | 2017-01-26 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96787 | title | GLSA-201701-65 : Oracle JRE/JDK: Multiple vulnerabilities |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2017-0719-1.NASL | description | This update for java-1_7_1-ibm fixes the following issues: Security
issue fixed :
- CVE-2016-2183: The DES and Triple DES ciphers, as used
in the TLS, SSH, and IPSec protocols and other protocols
and products, have a birthday bound of approximately
four billion blocks, which makes it easier for remote
attackers to obtain cleartext data via a birthday attack
against a long-duration encrypted session, as
demonstrated by an HTTPS session using Triple DES in CBC
mode, aka a 'Sweet32' attack. (bsc#1027038)
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-30 | plugin id | 97829 | published | 2017-03-20 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97829 | title | SUSE SLES11 Security Update : java-1_7_1-ibm (SUSE-SU-2017:0719-1) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2018-2123.NASL | description | An update for python is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security
impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
Python is an interpreted, interactive, object-oriented programming
language, which includes modules, classes, exceptions, very high level
dynamic data types and dynamic typing. Python supports interfaces to
many system calls and libraries, as well as to various windowing
systems.
Security Fix(es) :
* A flaw was found in the way the DES/3DES cipher was used as part of
the TLS /SSL protocol. A man-in-the-middle attacker could use this
flaw to recover some plaintext data by capturing large amounts of
encrypted traffic between TLS/SSL server and client if the
communication used a DES/3DES based ciphersuite. (CVE-2016-2183)
Note: This update modifies the Python ssl module to disable 3DES
cipher suites by default.
Red Hat would like to thank OpenVPN for reporting this issue. Upstream
acknowledges Karthikeyan Bhargavan (Inria) and Gaetan Leurent (Inria)
as the original reporters. | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 110919 | published | 2018-07-05 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=110919 | title | RHEL 7 : python (RHSA-2018:2123) |
NASL family | Web Servers | NASL id | OPENSSL_1_0_1U.NASL | description | According to its banner, the remote host is running a version of
OpenSSL 1.0.1 prior to 1.0.1u. It is, therefore, affected by the
following vulnerabilities :
- Multiple integer overflow conditions exist in s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit this to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the DTLS
implementation due to a failure to properly restrict the
lifetime of queue entries associated with unused
out-of-order messages. An unauthenticated, remote
attacker can exploit this, by maintaining multiple
crafted DTLS sessions simultaneously, to exhaust memory.
(CVE-2016-2179)
- An out-of-bounds read error exists in the X.509 Public
Key Infrastructure Time-Stamp Protocol (TSP)
implementation. An unauthenticated, remote attacker can
exploit this, via a crafted time-stamp file that is
mishandled by the 'openssl ts' command, to cause
denial of service or to disclose sensitive information.
(CVE-2016-2180)
- A denial of service vulnerability exists in the
Anti-Replay feature in the DTLS implementation due to
improper handling of epoch sequence numbers in records.
An unauthenticated, remote attacker can exploit this,
via spoofed DTLS records, to cause legitimate packets to
be dropped. (CVE-2016-2181)
- An overflow condition exists in the BN_bn2dec() function
in bn_print.c due to improper validation of
user-supplied input when handling BIGNUM values. An
unauthenticated, remote attacker can exploit this to
crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- A flaw exists in the tls_decrypt_ticket() function in
t1_lib.c due to improper handling of ticket HMAC
digests. An unauthenticated, remote attacker can exploit
this, via a ticket that is too short, to crash the
process, resulting in a denial of service.
(CVE-2016-6302)
- An integer overflow condition exists in the
MDC2_Update() function in mdc2dgst.c due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a heap-based
buffer overflow, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6303)
- A flaw exists in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources, resulting in a denial of service condition.
(CVE-2016-6304)
- An out-of-bounds read error exists in the certificate
parser that allows an unauthenticated, remote attacker
to cause a denial of service via crafted certificate
operations. (CVE-2016-6306)
- A flaw exists in the GOST ciphersuites due to the use of
long-term keys to establish an encrypted connection. A
man-in-the-middle attacker can exploit this, via a Key
Compromise Impersonation (KCI) attack, to impersonate
the server. | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 93814 | published | 2016-09-30 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93814 | title | OpenSSL 1.0.1 < 1.0.1u Multiple Vulnerabilities (SWEET32) |
NASL family | Red Hat Local Security Checks | NASL id | REDHAT-RHSA-2017-0338.NASL | description | An update for java-1.6.0-ibm is now available for Red Hat Enterprise
Linux 5 Supplementary and Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security
impact of Critical. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
IBM Java SE version 6 includes the IBM Java Runtime Environment and
the IBM Java Software Development Kit.
This update upgrades IBM Java SE 6 to version 6 SR16-FP41.
Security Fix(es) :
* This update fixes multiple vulnerabilities in the IBM Java Runtime
Environment and the IBM Java Software Development Kit. Further
information about these flaws can be found on the IBM Java Security
alerts page, listed in the References section. (CVE-2016-2183,
CVE-2016-5546, CVE-2016-5548, CVE-2016-5549, CVE-2016-5552,
CVE-2017-3231, CVE-2017-3241, CVE-2017-3252, CVE-2017-3253,
CVE-2017-3259, CVE-2017-3261, CVE-2017-3272) | last seen | 2019-01-16 | modified | 2018-12-27 | plugin id | 97462 | published | 2017-03-01 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97462 | title | RHEL 5 / 6 : java-1.6.0-ibm (RHSA-2017:0338) |
NASL family | Ubuntu Local Security Checks | NASL id | UBUNTU_USN-3198-1.NASL | description | Karthik Bhargavan and Gaetan Leurent discovered that the DES and
Triple DES ciphers were vulnerable to birthday attacks. A remote
attacker could possibly use this flaw to obtain clear text data from
long encrypted sessions. This update moves those algorithms to the
legacy algorithm set and causes them to be used only if no non-legacy
algorithms can be negotiated. (CVE-2016-2183)
It was discovered that OpenJDK accepted ECSDA signatures using
non-canonical DER encoding. An attacker could use this to modify or
expose sensitive data. (CVE-2016-5546)
It was discovered that covert timing channel vulnerabilities existed
in the DSA implementations in OpenJDK. A remote attacker could use
this to expose sensitive information. (CVE-2016-5548)
It was discovered that the URLStreamHandler class in OpenJDK did not
properly parse user information from a URL. A remote attacker could
use this to expose sensitive information. (CVE-2016-5552)
It was discovered that the URLClassLoader class in OpenJDK did not
properly check access control context when downloading class files. A
remote attacker could use this to expose sensitive information.
(CVE-2017-3231)
It was discovered that the Remote Method Invocation (RMI)
implementation in OpenJDK performed deserialization of untrusted
inputs. A remote attacker could use this to execute arbitrary code.
(CVE-2017-3241)
It was discovered that the Java Authentication and Authorization
Service (JAAS) component of OpenJDK did not properly perform user
search LDAP queries. An attacker could use a specially constructed
LDAP entry to expose or modify sensitive information. (CVE-2017-3252)
It was discovered that the PNGImageReader class in OpenJDK did not
properly handle iTXt and zTXt chunks. An attacker could use this to
cause a denial of service (memory consumption). (CVE-2017-3253)
It was discovered that integer overflows existed in the
SocketInputStream and SocketOutputStream classes of OpenJDK. An
attacker could use this to expose sensitive information.
(CVE-2017-3261)
It was discovered that the atomic field updaters in the
java.util.concurrent.atomic package in OpenJDK did not properly
restrict access to protected field members. An attacker could use this
to specially craft a Java application or applet that could bypass Java
sandbox restrictions. (CVE-2017-3272).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-12-01 | plugin id | 97209 | published | 2017-02-16 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97209 | title | Ubuntu 12.04 LTS : openjdk-6 vulnerabilities (USN-3198-1) |
NASL family | F5 Networks Local Security Checks | NASL id | F5_BIGIP_SOL13167034.NASL | description | The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec
protocols and other protocols and products, have a birthday bound of
approximately four billion blocks, which makes it easier for remote
attackers to obtain cleartext data via a birthday attack against a
long-duration encrypted session, as demonstrated by an HTTPS session
using Triple DES in CBC mode, aka a 'Sweet32' attack.(CVE-2016-2183) | last seen | 2019-01-16 | modified | 2019-01-04 | plugin id | 97477 | published | 2017-03-02 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=97477 | title | F5 Networks BIG-IP : OpenSSL vulnerability (K13167034) |
NASL family | Scientific Linux Local Security Checks | NASL id | SL_20180703_PYTHON_ON_SL7_X.NASL | description | Security Fix(es) :
- A flaw was found in the way the DES/3DES cipher was used
as part of the TLS/SSL protocol. A man-in-the-middle
attacker could use this flaw to recover some plaintext
data by capturing large amounts of encrypted traffic
between TLS/SSL server and client if the communication
used a DES/3DES based ciphersuite. (CVE-2016-2183)
Note: This update modifies the Python ssl module to disable 3DES
cipher suites by default. | last seen | 2019-01-16 | modified | 2018-12-27 | plugin id | 110920 | published | 2018-07-05 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=110920 | title | Scientific Linux Security Update : python on SL7.x x86_64 |
NASL family | Ubuntu Local Security Checks | NASL id | UBUNTU_USN-3087-1.NASL | description | Shi Lei discovered that OpenSSL incorrectly handled the OCSP Status
Request extension. A remote attacker could possibly use this issue to
cause memory consumption, resulting in a denial of service.
(CVE-2016-6304)
Guido Vranken discovered that OpenSSL used undefined behaviour when
performing pointer arithmetic. A remote attacker could possibly use
this issue to cause OpenSSL to crash, resulting in a denial of
service. This issue has only been addressed in Ubuntu 16.04 LTS in
this update. (CVE-2016-2177)
Cesar Pereida, Billy Brumley, and Yuval Yarom discovered that OpenSSL
did not properly use constant-time operations when performing DSA
signing. A remote attacker could possibly use this issue to perform a
cache-timing attack and recover private DSA keys. (CVE-2016-2178)
Quan Luo discovered that OpenSSL did not properly restrict the
lifetime of queue entries in the DTLS implementation. A remote
attacker could possibly use this issue to consume memory, resulting in
a denial of service. (CVE-2016-2179)
Shi Lei discovered that OpenSSL incorrectly handled memory in the
TS_OBJ_print_bio() function. A remote attacker could possibly use this
issue to cause a denial of service. (CVE-2016-2180)
It was discovered that the OpenSSL incorrectly handled the DTLS
anti-replay feature. A remote attacker could possibly use this issue
to cause a denial of service. (CVE-2016-2181)
Shi Lei discovered that OpenSSL incorrectly validated division
results. A remote attacker could possibly use this issue to cause a
denial of service. (CVE-2016-2182)
Karthik Bhargavan and Gaetan Leurent discovered that the DES and
Triple DES ciphers were vulnerable to birthday attacks. A remote
attacker could possibly use this flaw to obtain clear text data from
long encrypted sessions. This update moves DES from the HIGH cipher
list to MEDIUM. (CVE-2016-2183)
Shi Lei discovered that OpenSSL incorrectly handled certain ticket
lengths. A remote attacker could use this issue to cause a denial of
service. (CVE-2016-6302)
Shi Lei discovered that OpenSSL incorrectly handled memory in the
MDC2_Update() function. A remote attacker could possibly use this
issue to cause a denial of service. (CVE-2016-6303)
Shi Lei discovered that OpenSSL incorrectly performed certain message
length checks. A remote attacker could possibly use this issue to
cause a denial of service. (CVE-2016-6306).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-12-01 | plugin id | 93684 | published | 2016-09-23 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93684 | title | Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : openssl vulnerabilities (USN-3087-1) |
NASL family | SuSE Local Security Checks | NASL id | SUSE_SU-2017-0726-1.NASL | description | This update for java-1_6_0-ibm to 8.0-4.1 fixes the following issues:
Security issue fixed :
- CVE-2016-2183: The DES and Triple DES ciphers, as used
in the TLS, SSH, and IPSec protocols and other protocols
and products, have a birthday bound of approximately
four billion blocks, which makes it easier for remote
attackers to obtain cleartext data via a birthday attack
against a long-duration encrypted session, as
demonstrated by an HTTPS session using Triple DES in CBC
mode, aka a 'Sweet32' attack. (bsc#1027038)
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 119995 | published | 2019-01-02 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=119995 | title | SUSE SLES12 Security Update : java-1_6_0-ibm (SUSE-SU-2017:0726-1) |
NASL family | SuSE Local Security Checks | NASL id | OPENSUSE-2016-1189.NASL | description | This update for compat-openssl098 fixes the following issues :
OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)
Severity: High
- OCSP Status Request extension unbounded memory growth
(CVE-2016-6304) (bsc#999666)
Severity: Low
- Pointer arithmetic undefined behaviour (CVE-2016-2177)
(bsc#982575)
- Constant time flag not preserved in DSA signing
(CVE-2016-2178) (bsc#983249)
- DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
- DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
- OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
- Birthday attack against 64-bit block ciphers (SWEET32)
(CVE-2016-2183) (bsc#995359)
- Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
- OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
- Certificate message OOB reads (CVE-2016-6306)
(bsc#999668)
More information can be found on:
https://www.openssl.org/news/secadv/20160922.txt
Bugs fixed :
- update expired S/MIME certs (bsc#979475)
- fix crash in print_notice (bsc#998190)
- resume reading from /dev/urandom when interrupted by a
signal (bsc#995075)
This update was imported from the SUSE:SLE-12:Update update project. | last seen | 2019-01-16 | modified | 2016-10-17 | plugin id | 94086 | published | 2016-10-17 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=94086 | title | openSUSE Security Update : compat-openssl098 (openSUSE-2016-1189) |
NASL family | SuSE Local Security Checks | NASL id | OPENSUSE-2016-1134.NASL | description | This update for openssl fixes the following issues :
OpenSSL Security Advisory [22 Sep 2016] (bsc#999665)
Severity: High
- OCSP Status Request extension unbounded memory growth
(CVE-2016-6304) (bsc#999666)
Severity: Low
- Pointer arithmetic undefined behaviour (CVE-2016-2177)
(bsc#982575)
- Constant time flag not preserved in DSA signing
(CVE-2016-2178) (bsc#983249)
- DTLS buffered message DoS (CVE-2016-2179) (bsc#994844)
- OOB read in TS_OBJ_print_bio() (CVE-2016-2180)
(bsc#990419)
- DTLS replay protection DoS (CVE-2016-2181) (bsc#994749)
- OOB write in BN_bn2dec() (CVE-2016-2182) (bsc#993819)
- Birthday attack against 64-bit block ciphers (SWEET32)
(CVE-2016-2183) (bsc#995359)
- Malformed SHA512 ticket DoS (CVE-2016-6302) (bsc#995324)
- OOB write in MDC2_Update() (CVE-2016-6303) (bsc#995377)
- Certificate message OOB reads (CVE-2016-6306)
(bsc#999668)
More information can be found on:
https://www.openssl.org/news/secadv/20160922.txt
Also following bugs were fixed :
- update expired S/MIME certs (bsc#979475)
- improve s390x performance (bsc#982745)
- allow >= 64GB AESGCM transfers (bsc#988591)
- fix crash in print_notice (bsc#998190)
- resume reading from /dev/urandom when interrupted by a
signal (bsc#995075)
This update was imported from the SUSE:SLE-12-SP1:Update update
project. | last seen | 2019-01-16 | modified | 2016-10-13 | plugin id | 93783 | published | 2016-09-28 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93783 | title | openSUSE Security Update : openssl (openSUSE-2016-1134) |
NASL family | Debian Local Security Checks | NASL id | DEBIAN_DSA-3673.NASL | description | Several vulnerabilities were discovered in OpenSSL :
- CVE-2016-2177
Guido Vranken discovered that OpenSSL uses undefined
pointer arithmetic. Additional information can be found
at
https://www.openssl.org/blog/blog/2016/06/27/undefined-p
ointer-arithmetic/
- CVE-2016-2178
Cesar Pereida, Billy Brumley and Yuval Yarom discovered
a timing leak in the DSA code.
- CVE-2016-2179 / CVE-2016-2181
Quan Luo and the OCAP audit team discovered denial of
service vulnerabilities in DTLS.
- CVE-2016-2180 / CVE-2016-2182 / CVE-2016-6303
Shi Lei discovered an out-of-bounds memory read in
TS_OBJ_print_bio() and an out-of-bounds write in
BN_bn2dec() and MDC2_Update().
- CVE-2016-2183
DES-based cipher suites are demoted from the HIGH group
to MEDIUM as a mitigation for the SWEET32 attack.
- CVE-2016-6302
Shi Lei discovered that the use of SHA512 in TLS session
tickets is susceptible to denial of service.
- CVE-2016-6304
Shi Lei discovered that excessively large OCSP status
request may result in denial of service via memory
exhaustion.
- CVE-2016-6306
Shi Lei discovered that missing message length
validation when parsing certificates may potentially
result in denial of service. | last seen | 2019-01-16 | modified | 2018-11-10 | plugin id | 93668 | published | 2016-09-23 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=93668 | title | Debian DSA-3673-1 : openssl - security update |
NASL family | Misc. | NASL id | SECURITYCENTER_OPENSSL_1_0_1U.NASL | description | The Tenable SecurityCenter application installed on the remote host
is missing a security patch. It is, therefore, affected by multiple
vulnerabilities in the bundled version of OpenSSL :
- Multiple integer overflow conditions exist in s3_srvr.c,
ssl_sess.c, and t1_lib.c due to improper use of pointer
arithmetic for heap-buffer boundary checks. An
unauthenticated, remote attacker can exploit this to
cause a denial of service. (CVE-2016-2177)
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A denial of service vulnerability exists in the DTLS
implementation due to a failure to properly restrict the
lifetime of queue entries associated with unused
out-of-order messages. An unauthenticated, remote
attacker can exploit this, by maintaining multiple
crafted DTLS sessions simultaneously, to exhaust memory.
(CVE-2016-2179)
- An out-of-bounds read error exists in the X.509 Public
Key Infrastructure Time-Stamp Protocol (TSP)
implementation. An unauthenticated, remote attacker can
exploit this, via a crafted time-stamp file that is
mishandled by the 'openssl ts' command, to cause
denial of service or to disclose sensitive information.
(CVE-2016-2180)
- A denial of service vulnerability exists in the
Anti-Replay feature in the DTLS implementation due to
improper handling of epoch sequence numbers in records.
An unauthenticated, remote attacker can exploit this,
via spoofed DTLS records, to cause legitimate packets to
be dropped. (CVE-2016-2181)
- An overflow condition exists in the BN_bn2dec() function
in bn_print.c due to improper validation of
user-supplied input when handling BIGNUM values. An
unauthenticated, remote attacker can exploit this to
crash the process. (CVE-2016-2182)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183)
- A flaw exists in the tls_decrypt_ticket() function in
t1_lib.c due to improper handling of ticket HMAC
digests. An unauthenticated, remote attacker can exploit
this, via a ticket that is too short, to crash the
process, resulting in a denial of service.
(CVE-2016-6302)
- An integer overflow condition exists in the
MDC2_Update() function in mdc2dgst.c due to improper
validation of user-supplied input. An unauthenticated,
remote attacker can exploit this to cause a heap-based
buffer overflow, resulting in a denial of service
condition or possibly the execution of arbitrary code.
(CVE-2016-6303)
- A flaw exists in the ssl_parse_clienthello_tlsext()
function in t1_lib.c due to improper handling of overly
large OCSP Status Request extensions from clients. An
unauthenticated, remote attacker can exploit this, via
large OCSP Status Request extensions, to exhaust memory
resources, resulting in a denial of service condition.
(CVE-2016-6304)
- An out-of-bounds read error exists in the certificate
parser that allows an unauthenticated, remote attacker
to cause a denial of service via crafted certificate
operations. (CVE-2016-6306)
- A flaw exists in the GOST ciphersuites due to the use of
long-term keys to establish an encrypted connection. A
man-in-the-middle attacker can exploit this, via a Key
Compromise Impersonation (KCI) attack, to impersonate
the server. | last seen | 2019-01-16 | modified | 2019-01-02 | plugin id | 101045 | published | 2017-06-26 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=101045 | title | Tenable SecurityCenter OpenSSL 1.0.1 < 1.0.1u Multiple Vulnerabilities (SWEET32) |
NASL family | Ubuntu Local Security Checks | NASL id | UBUNTU_USN-3179-1.NASL | description | Karthik Bhargavan and Gaetan Leurent discovered that the DES and
Triple DES ciphers were vulnerable to birthday attacks. A remote
attacker could possibly use this flaw to obtain clear text data from
long encrypted sessions. This update moves those algorithms to the
legacy algorithm set and causes them to be used only if no non-legacy
algorithms can be negotiated. (CVE-2016-2183)
It was discovered that OpenJDK accepted ECSDA signatures using
non-canonical DER encoding. An attacker could use this to modify or
expose sensitive data. (CVE-2016-5546)
It was discovered that OpenJDK did not properly verify object
identifier (OID) length when reading Distinguished Encoding Rules
(DER) records, as used in x.509 certificates and elsewhere. An
attacker could use this to cause a denial of service (memory
consumption). (CVE-2016-5547)
It was discovered that covert timing channel vulnerabilities existed
in the DSA and ECDSA implementations in OpenJDK. A remote attacker
could use this to expose sensitive information. (CVE-2016-5548,
CVE-2016-5549)
It was discovered that the URLStreamHandler class in OpenJDK did not
properly parse user information from a URL. A remote attacker could
use this to expose sensitive information. (CVE-2016-5552)
It was discovered that the URLClassLoader class in OpenJDK did not
properly check access control context when downloading class files. A
remote attacker could use this to expose sensitive information.
(CVE-2017-3231)
It was discovered that the Remote Method Invocation (RMI)
implementation in OpenJDK performed deserialization of untrusted
inputs. A remote attacker could use this to execute arbitrary code.
(CVE-2017-3241)
It was discovered that the Java Authentication and Authorization
Service (JAAS) component of OpenJDK did not properly perform user
search LDAP queries. An attacker could use a specially constructed
LDAP entry to expose or modify sensitive information. (CVE-2017-3252)
It was discovered that the PNGImageReader class in OpenJDK did not
properly handle iTXt and zTXt chunks. An attacker could use this to
cause a denial of service (memory consumption). (CVE-2017-3253)
It was discovered that integer overflows existed in the
SocketInputStream and SocketOutputStream classes of OpenJDK. An
attacker could use this to expose sensitive information.
(CVE-2017-3261)
It was discovered that the atomic field updaters in the
java.util.concurrent.atomic package in OpenJDK did not properly
restrict access to protected field members. An attacker could use this
to specially craft a Java application or applet that could bypass Java
sandbox restrictions. (CVE-2017-3272)
It was discovered that a vulnerability existed in the class
construction implementation in OpenJDK. An attacker could use this to
specially craft a Java application or applet that could bypass Java
sandbox restrictions. (CVE-2017-3289).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-12-01 | plugin id | 96796 | published | 2017-01-26 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=96796 | title | Ubuntu 16.04 LTS / 16.10 : openjdk-8 vulnerabilities (USN-3179-1) |
NASL family | Huawei Local Security Checks | NASL id | EULEROS_SA-2016-1090.NASL | description | According to the version of the python packages installed, the
EulerOS installation on the remote host is affected by the following
vulnerability :
- The DES and Triple DES ciphers, as used in the TLS,
SSH, and IPSec protocols and other protocols and
products, have a birthday bound of approximately four
billion blocks, which makes it easier for remote
attackers to obtain cleartext data via a birthday
attack against a long-duration encrypted session, as
demonstrated by an HTTPS session using Triple DES in
CBC mode, aka a 'Sweet32' attack.(CVE-2016-2183)
Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues. | last seen | 2019-01-16 | modified | 2018-11-14 | plugin id | 99847 | published | 2017-05-01 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=99847 | title | EulerOS 2.0 SP1 : python (EulerOS-SA-2016-1090) |
NASL family | Oracle Linux Local Security Checks | NASL id | ORACLELINUX_ELSA-2018-2123.NASL | description | From Red Hat Security Advisory 2018:2123 :
An update for python is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security
impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
Python is an interpreted, interactive, object-oriented programming
language, which includes modules, classes, exceptions, very high level
dynamic data types and dynamic typing. Python supports interfaces to
many system calls and libraries, as well as to various windowing
systems.
Security Fix(es) :
* A flaw was found in the way the DES/3DES cipher was used as part of
the TLS /SSL protocol. A man-in-the-middle attacker could use this
flaw to recover some plaintext data by capturing large amounts of
encrypted traffic between TLS/SSL server and client if the
communication used a DES/3DES based ciphersuite. (CVE-2016-2183)
Note: This update modifies the Python ssl module to disable 3DES
cipher suites by default.
Red Hat would like to thank OpenVPN for reporting this issue. Upstream
acknowledges Karthikeyan Bhargavan (Inria) and Gaetan Leurent (Inria)
as the original reporters. | last seen | 2019-01-16 | modified | 2018-09-05 | plugin id | 110918 | published | 2018-07-05 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=110918 | title | Oracle Linux 7 : python (ELSA-2018-2123) |
NASL family | Misc. | NASL id | ARISTA_EOS_SA0024.NASL | description | The version of Arista Networks EOS running on the remote device is
affected by multiple vulnerabilities in the included OpenSSL library :
- An information disclosure vulnerability exists in the
dsa_sign_setup() function in dsa_ossl.c due to a failure
to properly ensure the use of constant-time operations.
An unauthenticated, remote attacker can exploit this,
via a timing side-channel attack, to disclose DSA key
information. (CVE-2016-2178)
- A vulnerability exists, known as SWEET32, in the 3DES
and Blowfish algorithms due to the use of weak 64-bit
block ciphers by default. A man-in-the-middle attacker
who has sufficient resources can exploit this
vulnerability, via a 'birthday' attack, to detect a
collision that leaks the XOR between the fixed secret
and a known plaintext, allowing the disclosure of the
secret text, such as secure HTTPS cookies, and possibly
resulting in the hijacking of an authenticated session.
(CVE-2016-2183) | last seen | 2019-01-16 | modified | 2018-08-09 | plugin id | 107066 | published | 2018-02-28 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=107066 | title | Arista Networks EOS Multiple Vulnerabilities (SA0024) (SWEET32) |
NASL family | AIX Local Security Checks | NASL id | AIX_JAVA_JAN2017_ADVISORY.NASL | description | The version of Java SDK installed on the remote AIX host is affected
by multiple vulnerabilities in the following subcomponents :
- A vulnerability exists in the Libraries subcomponent,
known as SWEET32, in the 3DES and Blowfish algorithms
due to the use of weak 64-bit block ciphers by default.
A man-in-the-middle attacker who has sufficient
resources can exploit this vulnerability, via a
'birthday' attack, to detect a collision that leaks the
XOR between the fixed secret and a known plaintext,
allowing the disclosure of the secret text, such as
secure HTTPS cookies, and possibly resulting in the
hijacking of an authenticated session. (CVE-2016-2183)
- An unspecified flaw exists in the Libraries subcomponent
that allows an unauthenticated, remote attacker to
impact integrity. (CVE-2016-5546)
- An unspecified flaw exists in the Libraries subcomponent
that allows an unauthenticated, remote attacker to cause
a denial of service condition. (CVE-2016-5547)
- Multiple unspecified flaws exist in the Libraries
subcomponent that allow an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2016-5548, CVE-2016-5549)
- An unspecified flaw exists in the Networking
subcomponent that allows an unauthenticated, remote
attacker to impact integrity. (CVE-2016-5552)
- Multiple unspecified flaws exist in the Networking
subcomponent that allow an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2017-3231, CVE-2017-3261)
- An unspecified flaw exists in the RMI subcomponent that
allows an unauthenticated, remote attacker to execute
arbitrary code. (CVE-2017-3241)
- An unspecified flaw exists in the JAAS subcomponent that
allows an unauthenticated, remote attacker to impact
integrity. (CVE-2017-3252)
- An unspecified flaw exists in the 2D subcomponent that
allows an unauthenticated, remote attacker to cause a
denial of service condition. (CVE-2017-3253)
- An unspecified flaw exists in the Deployment
subcomponent that allows an unauthenticated, remote
attacker to disclose sensitive information.
(CVE-2017-3259)
- An unspecified flaw exists in the AWT subcomponent that
allows an unauthenticated, remote attacker to execute
arbitrary code. (CVE-2017-3260)
- An unspecified flaw exists in the Libraries subcomponent
that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-3272)
- An unspecified flaw exists in the Hotspot subcomponent
that allows an unauthenticated, remote attacker to
execute arbitrary code. (CVE-2017-3289)
Note that CVE-2017-3241 can only be exploited by supplying data to
APIs in the specified component without using untrusted Java Web Start
applications or untrusted Java applets, such as through a web service.
Note that CVE-2016-2183, CVE-2016-5546, CVE-2016-5547, CVE-2016-5552,
CVE-2017-3252, and CVE-2017-3253 can be exploited through sandboxed
Java Web Start applications and sandboxed Java applets. They can also
be exploited by supplying data to APIs in the specified component
without using sandboxed Java Web Start applications or sandboxed Java
applets, such as through a web service. | last seen | 2019-01-16 | modified | 2018-07-17 | plugin id | 103190 | published | 2017-09-13 | reporter | Tenable | source | https://www.tenable.com/plugins/index.php?view=single&id=103190 | title | AIX Java Advisory : java_jan2017_advisory.asc (January 2017 CPU) (SWEET32) |
|