gitea -- privilege escalation, XSS gitea 1.6.2

The Gitea project reports:

Security

  • Sanitize uploaded file names
  • HTMLEncode user added text
https://github.com/go-gitea/gitea/issues/5569 https://github.com/go-gitea/gitea/issues/5565 2018-12-19 2018-12-21
rpm4 -- regression in -setperms, -setugids and -restore rpm4 4.14.2.1

rpm4 reports:

Regression in -setperms, -setugids and -restore

Note that this update can not automatically fix possible damage done by using -setperms, -setugids or -restore with rpm 4.14.2, it merely fixes the functionlity itself. Any damage needs to be investigated and fixed manually, such as using -verify and -restore or reinstalling packages.

http://rpm.org/wiki/Releases/4.14.2.1 2018-10-22 2018-12-26
Gitlab -- Arbitrary File read in Gitlab project import gitlab-ce 11.5.011.5.5 11.4.011.4.12 8.9.011.3.14

Gitlab reports:

Arbitrary File read in Gitlab project import

https://about.gitlab.com/2018/12/20/critical-security-release-gitlab-11-dot-5-dot-5-released/ CVE-2018-20229 2018-12-20 2018-12-22
shibboleth-sp -- crashes on malformed date/time content shibboleth-sp 3.0.03.0.3

The Shibboleth Consortium reports:

SAML messages, assertions, and metadata all commonly contain date/time information in a standard XML format.

Invalid formatted data in such fields cause an exception of a type that was not handled properly in the V3 software and causes a crash (usually to the shibd daemon process, but possibly to Apache in rare cases). Note that the crash occurs prior to evaluation of a message's authenticity, so can be exploited by an untrusted attacker.

The problem is believed to be specific to the V3 software and would not cause a crash in the older, now unsupported, V2 software.

https://shibboleth.net/community/advisories/secadv_20181219a.txt 2018-12-19 2018-12-20
couchdb -- administrator privilege escalation couchdb 2.3.0,2 couchdb2 2.3.0

Apache CouchDB PMC reports:

Database Administrator could achieve privilege escalation to the account that CouchDB runs under, by abusing insufficient validation in the HTTP API, escaping security controls implemented in previous releases.

http://docs.couchdb.org/en/stable/cve/2018-17188.html CVE-2018-17188 2018-12-01 2018-12-13
bro -- "Magellan" remote code execution vulnerability in bundled sqlite bro 2.6.1

Bro Network security Monitor reports:

Bro 2.6.1 updates the embedded SQLite to version 3.26.0 to address the "Magellan" remote code execution vulnerability. The stock Bro configuration/scripts don't use SQLite by default, but custom user scripts/packages may.

https://www.bro.org/download/NEWS.bro.html 2018-12-01 2018-12-20
FreeBSD -- bootpd buffer overflow FreeBSD 12.012.0_1 11.211.2_7

Problem Description:

Due to insufficient validation of network-provided data it may be possible for a malicious attacker to craft a bootp packet which could cause a stack buffer overflow.

Impact:

It is possible that the buffer overflow could lead to a Denial of Service or remote code execution.

CVE-2018-1716 SA-18:15.bootpd 2018-12-19 2018-12-19
wordpress -- multiple issues wordpress fr-wordpress 5.0.1,1 de-wordpress zh_CN-wordpress zh_TW-wordpress ja-wordpress ru-wordpress 5.0.1

wordpress developers reports:

WordPress versions 5.0 and earlier are affected by the following bugs, which are fixed in version 5.0.1. Updated versions of WordPress 4.9 and older releases are also available, for users who have not yet updated to 5.0.

Karim El Ouerghemmi discovered that authors could alter meta data to delete files that they weren’t authorized to.

Simon Scannell of RIPS Technologies discovered that authors could create posts of unauthorized post types with specially crafted input.

Sam Thomas discovered that contributors could craft meta data in a way that resulted in PHP object injection.

Tim Coen discovered that contributors could edit new comments from higher-privileged users, potentially leading to a cross-site scripting vulnerability.

Tim Coen also discovered that specially crafted URL inputs could lead to a cross-site scripting vulnerability in some circumstances. WordPress itself was not affected, but plugins could be in some situations.

Team Yoast discovered that the user activation screen could be indexed by search engines in some uncommon configurations, leading to exposure of email addresses, and in some rare cases, default generated passwords.

Tim Coen and Slavco discovered that authors on Apache-hosted sites could upload specifically crafted files that bypass MIME verification, leading to a cross-site scripting vulnerability.

https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/ 2018-12-13 2018-12-15
Mbed TLS -- Local timing attack on RSA decryption mbedtls 2.14.1

Janos Follath reports:

An attacker who can run code on the same machine that is performing an RSA decryption can potentially recover the plaintext through a Bleichenbacher-like oracle.

https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-03 CVE-2018-19608 2018-11-28 2018-12-14
typo3 -- multiple vulnerabilities typo3-8 8.7.21 typo3-9 9.5.2

Typo3 core team reports:

CKEditor 4.11 fixes an XSS vulnerability in the HTML parser reported by maxarr. The vulnerability stemmed from the fact that it was possible to execute XSS inside the CKEditor source area after persuading the victim to: (i) switch CKEditor to source mode, then (ii) paste a specially crafted HTML code, prepared by the attacker, into the opened CKEditor source area, and (iii) switch back to WYSIWYG mode. Although this is an unlikely scenario, we recommend to upgrade to the latest editor version.

Failing to properly encode user input, online media asset rendering (*.youtube and *.vimeo files) is vulnerable to cross-site scripting. A valid backend user account or write access on the server system (e.g. SFTP) is needed in order to exploit this vulnerability.

Failing to properly encode user input, notifications shown in modal windows in the TYPO3 backend are vulnerable to cross-site scripting. A valid backend user account is needed in order to exploit this vulnerability.

Failing to properly encode user input, login status display is vulnerable to cross-site scripting in the website frontend. A valid user account is needed in order to exploit this vulnerability - either a backend user or a frontend user having the possibility to modify their user profile.

Template patterns that are affected are:

  • ###FEUSER_[fieldName]### using system extension felogin
  • <!--###USERNAME###--> for regular frontend rendering (pattern can be defined individually using TypoScript setting config.USERNAME_substToken)

It has been discovered that cookies created in the Install Tool are not hardened to be submitted only via HTTP. In combination with other vulnerabilities such as cross-site scripting it can lead to hijacking an active and valid session in the Install Tool.

The Install Tool exposes the current TYPO3 version number to non-authenticated users.

Online Media Asset Handling (*.youtube and *.vimeo files) in the TYPO3 backend is vulnerable to denial of service. Putting large files with according file extensions results in high consumption of system resources. This can lead to exceeding limits of the current PHP process which results in a dysfunctional backend component. A valid backend user account or write access on the server system (e.g. SFTP) is needed in order to exploit this vulnerability.

TYPO3’s built-in record registration functionality (aka “basic shopping cart”) using recs URL parameters is vulnerable to denial of service. Failing to properly ensure that anonymous user sessions are valid, attackers can use this vulnerability in order to create an arbitrary amount of individual session-data records in the database.

https://typo3.org/article/typo3-952-8721-and-7632-security-releases-published/ 2018-12-11 2018-12-14
Gitlab -- Arbitrary File read in GitLab project import with Git LFS gitlab-ce 11.5.011.5.4 11.4.011.4.11 11.0.011.4.0

Gitlab reports:

Arbitrary File read in GitLab project import with Git LFS

https://about.gitlab.com/2018/12/13/critical-security-release-gitlab-11-dot-5-dot-4-released/ CVE-2018-20144 2018-12-13 2018-12-14
phpMyAdmin -- multiple vulnerabilities phpMyAdmin phpMyAdmin-php56 phpMyAdmin-php70 phpMyAdmin-php71 phpMyAdmin-php72 4.8.4

The phpMyAdmin development team reports:

Summary

Local file inclusion through transformation feature

Description

A flaw has been found where an attacker can exploit phpMyAdmin to leak the contents of a local file. The attacker must have access to the phpMyAdmin Configuration Storage tables, although these can easily be created in any database to which the attacker has access. An attacker must have valid credentials to log in to phpMyAdmin; this vulnerability does not allow an attacker to circumvent the login system.

Severity

We consider this vulnerability to be severe.

Summary

XSRF/CSRF vulnerability in phpMyAdmin

Description

By deceiving a user to click on a crafted URL, it is possible to perform harmful SQL operations such as renaming databases, creating new tables/routines, deleting designer pages, adding/deleting users, updating user passwords, killing SQL processes, etc.

Severity

We consider this vulnerability to be of moderate severity.

Summary

XSS vulnerability in navigation tree

Description

A Cross-Site Scripting vulnerability was found in the navigation tree, where an attacker can deliver a payload to a user through a specially-crafted database/table name.

Severity

We consider this attack to be of moderate severity.

Mitigation factor

The stored XSS vulnerabilities can be triggered only by someone who logged in to phpMyAdmin, as the usual token protection prevents non-logged-in users from accessing the required forms.

https://www.phpmyadmin.net/security/PMASA-2018-6/ https://www.phpmyadmin.net/security/PMASA-2018-7/ https://www.phpmyadmin.net/security/PMASA-2018-8/ 2018-12-11 2018-12-12
mozilla -- multiple vulnerabilities firefox 64.0_3,1 waterfox 56.2.6 seamonkey linux-seamonkey 2.53.0 firefox-esr 60.4.0,1 linux-firefox 60.4.0,2 libxul thunderbird linux-thunderbird 60.4.0

Mozilla Foundation reports:

CVE-2018-12407: Buffer overflow with ANGLE library when using VertexBuffer11 module

CVE-2018-17466: Buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11

CVE-2018-18492: Use-after-free with select element

CVE-2018-18493: Buffer overflow in accelerated 2D canvas with Skia

CVE-2018-18494: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs

CVE-2018-18495: WebExtension content scripts can be loaded in about: pages

CVE-2018-18496: Embedded feed preview page can be abused for clickjacking

CVE-2018-18497: WebExtensions can load arbitrary URLs through pipe separators

CVE-2018-18498: Integer overflow when calculating buffer sizes for images

CVE-2018-12406: Memory safety bugs fixed in Firefox 64

CVE-2018-12405: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4

CVE-2018-12405 CVE-2018-12406 CVE-2018-12407 CVE-2018-17466 CVE-2018-18492 CVE-2018-18493 CVE-2018-18494 CVE-2018-18495 CVE-2018-18496 CVE-2018-18497 CVE-2018-18498 https://www.mozilla.org/en-US/security/advisories/mfsa2018-29/ https://www.mozilla.org/en-US/security/advisories/mfsa2018-30/ 2018-12-11 2018-12-11 2019-07-23
FreeBSD -- Insufficient bounds checking in bhyve(8) device model FreeBSD 11.211.2_6

Problem Description:

Insufficient bounds checking in one of the device models provided by bhyve(8) can permit a guest operating system to overwrite memory in the bhyve(8) processing possibly permitting arbitary code execution.

Impact:

A guest OS using a firmware image can cause the bhyve process to crash, or possibly execute arbitrary code on the host as root.

CVE-2018-1716 SA-18:14.bhyve 2018-12-04 2018-12-10
FreeBSD -- Multiple vulnerabilities in NFS server code FreeBSD 11.211.2_5

Problem Description:

Insufficient and improper checking in the NFS server code could cause a denial of service or possibly remote code execution via a specially crafted network packet.

Impact:

A remote attacker could cause the NFS server to crash, resulting in a denial of service, or possibly execute arbitrary code on the server.

CVE-2018-1715 SA-18:13.nfs 2018-11-27 2018-12-10
node.js -- multiple vulnerabilities node6 6.15.0 node8 8.14.0 node10 10.14.0 node 11.3.0

Node.js reports:

Updates are now available for all active Node.js release lines. These include fixes for the vulnerabilities identified in the initial announcement. They also include upgrades of Node.js 6 and 8 to OpenSSL 1.0.2q, and upgrades of Node.js 10 and 11 to OpenSSL 1.1.0j.

We recommend that all Node.js users upgrade to a version listed below as soon as possible.

Debugger port 5858 listens on any interface by default (CVE-2018-12120)

All versions of Node.js 6 are vulnerable and the severity is HIGH. When the debugger is enabled with node --debug or node debug, it listens to port 5858 on all interfaces by default. This may allow remote computers to attach to the debug port and evaluate arbitrary JavaScript. The default interface is now localhost. It has always been possible to start the debugger on a specific interface, such as node --debug=localhost. The debugger was removed in Node.js 8 and replaced with the inspector, so no versions from 8 and later are vulnerable.

Denial of Service with large HTTP headers (CVE-2018-12121)

All versions of 6 and later are vulnerable and the severity is HIGH. By using a combination of many requests with maximum sized headers (almost 80 KB per connection), and carefully timed completion of the headers, it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer.

The total size of HTTP headers received by Node.js now must not exceed 8192 bytes.

"Slowloris" HTTP Denial of Service (CVE-2018-12122)

All versions of Node.js 6 and later are vulnerable and the severity is LOW. An attacker can cause a Denial of Service (DoS) by sending headers very slowly keeping HTTP or HTTPS connections and associated resources alive for a long period of time. Attack potential is mitigated by the use of a load balancer or other proxy layer.

A timeout of 40 seconds now applies to servers receiving HTTP headers. This value can be adjusted with server.headersTimeout. Where headers are not completely received within this period, the socket is destroyed on the next received chunk. In conjunction with server.setTimeout(), this aids in protecting against excessive resource retention and possible Denial of Service.

Hostname spoofing in URL parser for javascript protocol (CVE-2018-12123)

All versions of Node.js 6 and later are vulnerable and the severity is LOW. If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case "javascript:" (e.g. "javAscript:") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.

HTTP request splitting (CVE-2018-12116)

Node.js 6 and 8 are vulnerable and the severity is MEDIUM. If Node.js can be convinced to use unsanitized user-provided Unicode data for the path option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.

OpenSSL Timing vulnerability in ECDSA signature generation (CVE-2018-0735)

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side-channel attack. An attacker could use variations in the signing algorithm to recover the private key.

OpenSSL Timing vulnerability in DSA signature generation (CVE-2018-0734)

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side-channel attack. An attacker could use variations in the signing algorithm to recover the private key.

OpenSSL Microarchitecture timing vulnerability in ECC scalar multiplication (CVE-2018-5407)

OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has been shown to be vulnerable to a microarchitecture timing side-channel attack. An attacker with sufficient access to mount local timing attacks during ECDSA signature generation could recover the private key.

https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ CVE-2018-12120 CVE-2018-12121 CVE-2018-12122 CVE-2018-12123 CVE-2018-12116 CVE-2018-0735 CVE-2018-0734 CVE-2018-5407 2018-11-27 2018-12-10
powerdns-recursor -- Crafted query can cause a denial of service powerdns-recursor 4.1.8

powerdns Team reports:

CVE-2018-16855: An issue has been found in PowerDNS Recursor where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash. When the PowerDNS Recursor is run inside a supervisor like supervisord or systemd, a crash will lead to an automatic restart, limiting the impact to a somewhat degraded service.

https://doc.powerdns.com/recursor/changelog/4.1.html CVE-2018-16855 2018-11-26 2018-12-09
py-asyncssh -- Allows bypass of authentication py-asyncssh 1.12.1

mitre.org Reports:

The SSH server implementation of AsyncSSH before 1.12.1 does not properly check whether authentication is completed before processing other requests A customized SSH client can simply skip the authentication step.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7749 2018-03-07 2018-12-08
Gitlab -- Multiple vulnerabilities gitlab-ce 11.5.011.5.3 11.4.011.4.10 8.11.011.3.12

Gitlab reports:

Directory Traversal in Templates API

https://about.gitlab.com/2018/12/06/critical-security-release-gitlab-11-dot-5-dot-3-released/ CVE-2018-19856 2018-12-06 2018-12-06
Flash Player -- multiple vulnerabilities linux-flashplayer 32.0.0.101

Adobe reports:

  • This update resolves a use-after-free vulnerability that could lead to arbitrary code execution (CVE-2018-15982).
  • This update resolves an insecure library loading vulnerability that could lead to privilege escalation (CVE-2018-15983).
CVE-2018-15982 CVE-2018-15983 https://helpx.adobe.com/security/products/flash-player/apsb18-42.html 2018-12-05 2018-12-06
jenkins -- multiple vulnerabilities jenkins 2.154 jenkins-lts 2.138.3

Jenkins Security Advisory:

Description

(Critical) SECURITY-595

Code execution through crafted URLs

(Medium) SECURITY-904

Forced migration of user records

(Medium) SECURITY-1072

Workspace browser allowed accessing files outside the workspace

(Medium) SECURITY-1193

Potential denial of service through cron expression form validation

https://jenkins.io/security/advisory/2018-12-05/ 2018-12-05 2018-12-05
moodle -- Login CSRF vulnerability moodle31 3.1.15 moodle33 3.3.9 moodle34 3.4.6 moodle35 3.5.3

moodle reports:

The login form is not protected by a token to prevent login cross-site request forgery.

CVE-2018-16854 https://moodle.org/mod/forum/discuss.php?d=378731 2018-11-06 2018-12-03
Rails -- Active Job vulnerability rubygem-activejob4 4.2.11 rubygem-activejob5 5.1.6.1 rubygem-activejob50 5.0.7.1

Ruby on Rails blog:

Rails 4.2.11, 5.0.7.1, 5.1.6.1 and 5.2.1.1 have been released! These contain the following important security fixes, and it is recommended that users upgrade as soon as possible

CVE-2018-16476 Broken Access Control vulnerability in Active Job: Carefully crafted user input can cause Active Job to deserialize it using GlobalId and allow an attacker to have access to information that they should not have.

https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/ CVE-2018-16476 2018-11-27 2018-12-02
uriparser -- Multiple vulnerabilities uriparser 0.9.0

The upstream project reports:

* Fixed: Out-of-bounds write in uriComposeQuery* and uriComposeQueryEx* Commit 864f5d4c127def386dd5cc926ad96934b297f04e Thanks to Google Autofuzz team for the report!

* Fixed: Detect integer overflow in uriComposeQuery* and uriComposeQueryEx* Commit f76275d4a91b28d687250525d3a0c5509bbd666f Thanks to Google Autofuzz team for the report!

* Fixed: Protect uriResetUri* against acting on NULL input Commit f58c25069cf4a986fe17a80c5b38687e31feb539

CVE-2018-19198 CVE-2018-19199 CVE-2018-19200 https://github.com/uriparser/uriparser/blob/uriparser-0.9.0/ChangeLog 2018-10-27 2018-12-02
messagelib -- HTML email can open browser window automatically messagelib 18.08.3_2

Albert Astals Cid reports:

messagelib is the library used by KMail to display emails.

messagelib by default displays emails as plain text, but gives the user an option to "Prefer HTML to plain text" in the settings and if that option is not enabled there is way to enable HTML display when an email contains HTML.

Some HTML emails can trick messagelib into opening a new browser window when displaying said email as HTML.

This happens even if the option to allow the HTML emails to access remote servers is disabled in KMail settings.

This means that the owners of the servers referred in the email can see in their access logs your IP address.

CVE-2018-19516 https://www.kde.org/info/security/advisory-20181128-1.txt 2018-11-28 2018-11-28
payara -- Default typing issue in Jackson Databind payara 4.1.2.181.3 4.1.2.182 5.181.3 5.182

FasterXML jackson-databind before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7489 CVE-2018-7489 2018-02-26 2018-11-28
payara -- Code execution via crafted PUT requests to JSPs payara 4.1.2.174

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12615 CVE-2017-12615 2017-08-07 2018-11-28
payara -- Multiple vulnerabilities payara 4.1.2.173

Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution.

Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Administration). Supported versions that are affected are 3.0.1 and 3.1.2. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle GlassFish Server executes to compromise Oracle GlassFish Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GlassFish Server accessible data. CVSS v3.0 Base Score 3.3 (Confidentiality impacts).

Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Core). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via SMTP to compromise Oracle GlassFish Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle GlassFish Server accessible data. CVSS v3.0 Base Score 4.3 (Integrity impacts).

Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via LDAP to compromise Oracle GlassFish Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle GlassFish Server accessible data as well as unauthorized read access to a subset of Oracle GlassFish Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle GlassFish Server. CVSS v3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).

Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle GlassFish Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle GlassFish Server accessible data as well as unauthorized read access to a subset of Oracle GlassFish Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle GlassFish Server. CVSS v3.0 Base Score 7.3 (Confidentiality, Integrity and Availability impacts).

Vulnerability in the Oracle GlassFish Server component of Oracle Fusion Middleware (subcomponent: Security). Supported versions that are affected are 2.1.1, 3.0.1 and 3.1.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GlassFish Server. While the vulnerability is in Oracle GlassFish Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle GlassFish Server. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031 CVE-2016-1000031 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3239 CVE-2017-3239 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3247 CVE-2017-3247 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3249 CVE-2017-3249 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3250 CVE-2017-3250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5528 CVE-2016-5528 2016-06-16 2018-11-28
Gitlab -- Multiple vulnerabilities gitlab-ce 11.5.011.5.1 11.4.011.4.8 011.3.11

Gitlab reports:

View Names of Private Groups

Persistent XSS in Environments

SSRF in Prometheus integration

Unauthorized Promotion of Milestones

Exposure of Confidential Issue Title

Persisent XSS in Markdown Fields via Mermaid Script

Persistent XSS in Markdown Fields via Unrecognized HTML Tags

Symlink Race Condition in Pages

Unauthorized Changes by Guest User in Issues

Unauthorized Comments on Locked Issues

Improper Enforcement of Token Scope

CRLF Injection in Project Mirroring

XSS in OAuth Authorization

SSRF in Webhooks

Send Email on Email Address Change

Workhorse Logs Contained Tokens

Unauthorized Publishing of Draft Comments

Guest Can Set Weight of a New Issue

Disclosure of Private Group's Members and Milestones

Persisent XSS in Operations

Reporter Can View Operations Page

https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/ CVE-2018-19494 CVE-2018-19493 CVE-2018-19495 CVE-2018-19496 CVE-2018-19577 CVE-2018-19573 CVE-2018-19570 CVE-2018-19572 CVE-2018-19576 CVE-2018-19575 CVE-2018-19569 CVE-2018-19585 CVE-2018-19574 CVE-2018-19571 CVE-2018-19580 CVE-2018-19583 CVE-2018-19582 CVE-2018-19581 CVE-2018-19584 CVE-2018-19579 CVE-2018-19578 2018-11-28 2018-11-28
samba -- multiple vulnerabilities samba46 4.6.16 samba47 4.7.12 samba48 4.8.7 samba49 4.9.3

The samba project reports:

All versions of Samba from 4.0.0 onwards are vulnerable to infinite query recursion caused by CNAME loops. Any dns record can be added via ldap by an unprivileged user using the ldbadd tool, so this is a security issue.

When configured to accept smart-card authentication, Samba's KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ.

During the processing of an LDAP search before Samba's AD DC returns the LDAP entries to the client, the entries are cached in a single memory object with a maximum size of 256MB. When this size is reached, the Samba process providing the LDAP service will follow the NULL pointer, terminating the process.

During the processing of an DNS zone in the DNS management DCE/RPC server, the internal DNS server or the Samba DLZ plugin for BIND9, if the DSPROPERTY_ZONE_MASTER_SERVERS property or DSPROPERTY_ZONE_SCAVENGING_SERVERS property is set, the server will follow a NULL pointer and terminate

A user in a Samba AD domain can crash the KDC when Samba is built in the non-default MIT Kerberos configuration.

AD DC Configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all.

https://www.samba.org/samba/security/CVE-2018-14629.html CVE-2018-14629 https://www.samba.org/samba/security/CVE-2018-16841.html CVE-2018-16841 https://www.samba.org/samba/security/CVE-2018-16851.html CVE-2018-16851 https://www.samba.org/samba/security/CVE-2018-16852.html CVE-2018-16852 https://www.samba.org/samba/security/CVE-2018-16853.html CVE-2018-16853 https://www.samba.org/samba/security/CVE-2018-16857.html CVE-2018-16857 2018-08-14 2018-08-14
php-imap -- imap_open allows to run arbitrary shell commands via mailbox parameter php56-imap 5.6.38_1 php70-imap * php71-imap * php72-imap * php73-imap *

The PHP team reports:

imap_open allows to run arbitrary shell commands via mailbox parameter.

https://bugs.php.net/bug.php?id=77153 2018-10-23 2018-11-22 2018-11-22
phpmailer -- Multiple vulnerability phpmailer 5.2.27 phpmailer6 6.0.6

SO-AND-SO reports:

CVE-2018-19296:Fix potential object injection vulnerability.

https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27 https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6 CVE-2018-19296 2018-11-16 2018-11-21 2018-11-23
Flash Player -- arbitrary code execution linux-flashplayer 31.0.0.153

Adobe reports:

  • This update resolves a type confusion vulnerability that could lead to arbitrary code execution (CVE-2018-15981).
CVE-2018-15981 https://helpx.adobe.com/security/products/flash-player/apsb18-44.html 2018-11-20 2018-11-20
Gitlab -- Multiple vulnerabilities gitlab-ce 11.4.011.4.6 8.9.011.3.10

Gitlab reports:

Persistent XSS Autocompletion

Unauthorized service template creation

https://about.gitlab.com/2018/11/19/critical-security-release-gitlab-11-dot-4-dot-6-released/ CVE-2018-18643 CVE-2018-19359 2018-11-19 2018-11-20
powerdns -- Multiple vulnerabilities powerdns 4.1.5

PowerDNS Team reports:

CVE-2018-10851: An issue has been found in PowerDNS Authoritative Server allowing an authorized user to cause a memory leak by inserting a specially crafted record in a zone under their control, then sending a DNS query for that record. The issue is due to the fact that some memory is allocated before the parsing and is not always properly released if the record is malformed. When the PowerDNS Authoritative Server is run inside the guardian (--guardian), or inside a supervisor like supervisord or systemd, an out-of-memory crash will lead to an automatic restart, limiting the impact to a somewhat degraded service.

CVE-2018-14626: An issue has been found in PowerDNS Authoritative Server allowing a remote user to craft a DNS query that will cause an answer without DNSSEC records to be inserted into the packet cache and be returned to clients asking for DNSSEC records, thus hiding the presence of DNSSEC signatures for a specific qname and qtype. For a DNSSEC-signed domain, this means that DNSSEC validating clients will consider the answer to be bogus until it expires from the packet cache, leading to a denial of service.

https://doc.powerdns.com/authoritative/changelog/4.1.html CVE-2018-10851 CVE-2018-14626 2018-11-06 2018-11-19
powerdns-recursor -- Multiple vulnerabilities powerdns-recursor 4.1.7 powerdns-recursor40 4.0.9

powerdns Team reports:

CVE-2018-10851: An issue has been found in PowerDNS Recursor allowing a malicious authoritative server to cause a memory leak by sending specially crafted records. The issue is due to the fact that some memory is allocated before the parsing and is not always properly released if the record is malformed. When the PowerDNS Recursor is run inside a supervisor like supervisord or systemd, an out-of-memory crash will lead to an automatic restart, limiting the impact to a somewhat degraded service.

CVE-2018-14626: An issue has been found in PowerDNS Recursor allowing a remote user to craft a DNS query that will cause an answer without DNSSEC records to be inserted into the packet cache and be returned to clients asking for DNSSEC records, thus hiding the presence of DNSSEC signatures for a specific qname and qtype. For a DNSSEC-signed domain, this means that clients performing DNSSEC validation by themselves might consider the answer to be bogus until it expires from the packet cache, leading to a denial of service.

CVE-2018-14644: An issue has been found in PowerDNS Recursor where a remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail.

https://doc.powerdns.com/recursor/changelog/4.1.html CVE-2018-10851 CVE-2018-14626 CVE-2018-14644 2018-11-06 2018-11-17 2018-11-19
asterisk -- Remote crash vulnerability DNS SRV and NAPTR lookups asterisk15 15.6.1 asterisk16 16.0.1

The Asterisk project reports:

There is a buffer overflow vulnerability in dns_srv and dns_naptr functions of Asterisk that allows an attacker to crash Asterisk via a specially crafted DNS SRV or NAPTR response. The attackers request causes Asterisk to segfault and crash.

https://downloads.asterisk.org/pub/security/AST-2018-010.html 2018-10-23 2018-11-14
Flash Player -- information disclosure linux-flashplayer 31.0.0.148

Adobe reports:

  • This update resolves a out-of-bounds vulnerability that could lead to information disclosure (CVE-2018-15978).
CVE-2018-15978 https://helpx.adobe.com/security/products/flash-player/apsb18-39.html 2018-11-13 2018-11-13
OpenSSL -- timing vulnerability openssl 1.0.2p_2

The OpenSSL project reports:

Microarchitecture timing vulnerability in ECC scalar multiplication. Severity: Low
OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has been shown to be vulnerable to a microarchitecture timing side channel attack. An attacker with sufficient access to mount local timing attacks during ECDSA signature generation could recover the private key.

https://www.openssl.org/news/secadv/20181112.txt CVE-2018-5407 2018-11-12 2018-11-12
kio-extras -- HTML Thumbnailer automatic remote file access kio-extras 18.08.3_2

Albert Astals Cid reports:

Various KDE applications share a plugin system to create thumbnails of various file types for displaying in file managers, file dialogs, etc. kio-extras contains a thumbnailer plugin for HTML files.

The HTML thumbnailer was incorrectly accessing some content of remote URLs listed in HTML files. This meant that the owners of the servers referred in HTML files in your system could have seen in their access logs your IP address every time the thumbnailer tried to create the thumbnail.

The HTML thumbnailer has been removed in upcoming KDE Applications 18.12.0 because it was actually not creating thumbnails for files at all.

CVE-2018-19120 https://www.kde.org/info/security/advisory-20181012-1.txt 2018-11-12 2018-11-12
patch -- multiple vulnerabilities patch 2.7.6_1

NVD reports:

An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.

A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

CVE-2018-6951 CVE-2018-6952 CVE-2018-1000156 https://savannah.gnu.org/bugs/?53132 https://savannah.gnu.org/bugs/?53133 https://savannah.gnu.org/bugs/?53566 2018-04-16 2018-11-11 2018-11-11
lighttpd - use-after-free vulnerabilities lighttpd 1.4.51

Lighttpd Project reports:

Security fixes for Lighttpd:

  • security: process headers after combining folded headers

https://www.lighttpd.net/2018/10/14/1.4.51/ ports/232278 2018-08-26 2018-11-09
PostgreSQL -- SQL injection in pg_upgrade and pg_dump postgresql10-server 10.6 postgresql96-server 9.6.11 postgresql95-server 9.5.15 postgresql94-server 9.4.20 postgresql93-server 9.3.25

The PostgreSQL project reports:

CVE-2018-16850: SQL injection in pg_upgrade and pg_dump, via CREATE TRIGGER ... REFERENCING.

Using a purpose-crafted trigger definition, an attacker can run arbitrary SQL statements with superuser privileges when a superuser runs pg_upgrade on the database or during a pg_dump dump/restore cycle. This attack requires a CREATE privilege on some non-temporary schema or a TRIGGER privilege on a table. This is exploitable in the default PostgreSQL configuration, where all users have CREATE privilege on public schema.

https://www.postgresql.org/about/news/1905/ CVE-2018-16850 2018-11-08 2018-11-08
NGINX -- Multiple vulnerabilities nginx 1.14.1 nginx-devel 1.15.6

NGINX Team reports:

Two security issues were identified in nginx HTTP/2 implementation, which might cause excessive memory consumption (CVE-2018-16843) and CPU usage (CVE-2018-16844).

The issues affect nginx compiled with the ngx_http_v2_module (not compiled by default) if the "http2" option of the "listen" directive is used in a configuration file.

A security issue was identified in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory isclosure by using a specially crafted mp4 file (CVE-2018-16845).

The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the "mp4" directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.

http://nginx.org/en/security_advisories.html CVE-2018-16843 CVE-2018-16844 CVE-2018-16845 2018-11-06 2018-11-06
gitea -- remote code exeution gitea 1.5.3

The Gitea project reports:

[This release] contains crit[i]cal security fix for vulnerability that could potentially allow for authorized users to do remote code ex[e]cution.

https://github.com/go-gitea/gitea/pull/5177 https://github.com/go-gitea/gitea/pull/5196 https://github.com/go-macaron/session/commit/084f1e5c1071f585902a7552b483cee04bc00a14 2018-10-25 2018-11-01
curl -- multiple vulnerabilities curl 7.14.17.60.0

curl security problems:

CVE-2018-16839: SASL password overflow via integer overflow

libcurl contains a buffer overrun in the SASL authentication code.

The internal function Curl_auth_create_plain_message fails to correctly verify that the passed in lengths for name and password aren't too long, then calculates a buffer size to allocate.

On systems with a 32 bit size_t, the math to calculate the buffer size triggers an integer overflow when the user name length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow.

This bug is very similar to CVE-2017-14618.

It affects curl 7.33.0 to 7.61.1.

CVE-2018-16840: use-after-free in handle close

libcurl contains a heap use-after-free flaw in code related to closing an easy handle.

When closing and cleaning up an "easy" handle in the Curl_close() function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.

It affects curl 7.59.0 to 7.61.1.

CVE-2018-16842: warning message out-of-buffer read

curl contains a heap out of buffer read vulnerability.

The command line tool has a generic function for displaying warning and informational messages to stderr for various situations. For example if an unknown command line argument is used, or passed to it in a "config" file.

This display function formats the output to wrap at 80 columns. The wrap logic is however flawed, so if a single word in the message is itself longer than 80 bytes the buffer arithmetic calculates the remainder wrong and will end up reading behind the end of the buffer. This could lead to information disclosure or crash.

This vulnerability could lead to a security issue if used in this or similar situations:

1. a server somewhere uses the curl command line to run something

2. if it fails, it shows stderr to the user

3. the server takes user input for parts of its command line input

4. user provides something overly long that triggers this crash

5. the stderr output may now contain user memory contents that wasn't meant to be available

It affects curl 7.14.1 to 7.61.1.

https://curl.haxx.se/docs/security.html https://curl.haxx.se/docs/CVE-2018-16839.html https://curl.haxx.se/docs/CVE-2018-16840.html https://curl.haxx.se/docs/CVE-2018-16842.html CVE-2018-16839 CVE-2018-16840 CVE-2018-16842 2018-10-31 2018-11-01
Gitlab -- SSRF in Kubernetes integration gitlab-ce 11.4.011.4.4 11.3.011.3.9 11.0.011.2.8

SO-AND-SO reports:

SSRF in Kubernetes integration

https://about.gitlab.com/2018/11/01/critical-security-release-gitlab-11-dot-4-dot-4-released/ CVE-2018-18843 2018-11-01 2018-11-01
Loofah -- XSS vulnerability rubygem-loofah 2.2.3

GitHub issue:

This issue has been created for public disclosure of an XSS vulnerability that was responsibly reported (independently) by Shubham Pathak and @yasinS (Yasin Soliman).

In the Loofah gem, through v2.2.2, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.

https://github.com/flavorjones/loofah/releases https://github.com/flavorjones/loofah/issues/154 CVE-2018-16468 2018-10-30 2018-11-01
Gitlab -- multiple vulnerabilities gitlab-ce 11.4.011.4.3 11.3.011.3.8 5.3.011.2.7

Gitlab reports:

RCE in Gitlab Wiki API

SSRF in Hipchat integration

Cleartext storage of personal access tokens

Information exposure through stack trace error message

Persistent XSS autocomplete

Information exposure in stored browser history

Information exposure when replying to issues through email

Persistent XSS in License Management and Security Reports

Metrics information disclosure in Prometheus integration

Unauthorized changes to a protected branch's access levels

https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/ CVE-2018-18649 CVE-2018-18646 CVE-2018-18641 CVE-2018-18648 CVE-2018-18643 CVE-2018-18640 CVE-2018-18645 CVE-2018-18642 CVE-2018-18644 CVE-2018-18647 2018-10-29 2018-10-29
OpenSSL -- Multiple vulnerabilities in 1.1 branch openssl-devel 1.1.0i_1 openssl111 1.1.1_2 libressl 2.8.02.8.3 libressl-devel 2.8.02.8.3

The OpenSSL project reports:

Timing vulnerability in ECDSA signature generation (CVE-2018-0735): The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key (Low).

Timing vulnerability in DSA signature generation (CVE-2018-0734): Avoid a timing attack that leaks information via a side channel that triggers when a BN is resized. Increasing the size of the BNs prior to doing anything with them suppresses the attack (Low).

https://www.openssl.org/news/secadv/20181029.txt https://github.com/openssl/openssl/commit/8abfe72e CVE-2018-0735 CVE-2018-0734 2018-10-29 2018-10-29 2018-11-10
liveMedia -- potential remote code execution liveMedia 2018.10.17,2

Talos reports:

An exploitable code execution vulnerability exists in the HTTP packet-parsing functionality of the LIVE555 RTSP server library. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability.

CVE-2018-4013 https://talosintelligence.com/vulnerability_reports/TALOS-2018-0684 http://lists.live555.com/pipermail/live-devel/2018-October/021071.html 2018-10-18 2018-10-28
mini_httpd -- disclose arbitrary files is some circumstances mini_httpd 1.30

Jef Poskanzer reports:

Prior versions allowed remote users to read arbitrary files in some circumstances.

http://acme.com/updates/archive/211.html 2018-10-26 2018-10-26
salt -- multiple vulnerabilities py27-salt py32-salt py33-salt py34-salt py35-salt py36-salt py37-salt 2017.7.8 2018.3.02018.3.3

SaltStack reports:

Remote command execution and incorrect access control when using salt-api.

Directory traversal vulnerability when using salt-api. Allows an attacker to determine what files exist on a server when querying /run or /events.

CVE-2018-15751 CVE-2018-15750 https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html 2018-10-24 2018-10-27
mozilla -- multiple vulnerabilities firefox 63.0_1,1 waterfox 56.2.5 seamonkey linux-seamonkey 2.53.0 firefox-esr 60.3.0,1 linux-firefox 60.3.0,2 libxul thunderbird linux-thunderbird 60.3.0

Mozilla Foundation reports:

CVE-2018-12391: HTTP Live Stream audio data is accessible cross-origin

CVE-2018-12392: Crash with nested event loops

CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript

CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting

CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts

CVE-2018-12397:

CVE-2018-12398: CSP bypass through stylesheet injection in resource URIs

CVE-2018-12399: Spoofing of protocol registration notification bar

CVE-2018-12400: Favicons are cached in private browsing mode on Firefox for Android

CVE-2018-12401: DOS attack through special resource URI parsing

CVE-2018-12402: SameSite cookies leak when pages are explicitly saved

CVE-2018-12403: Mixed content warning is not displayed when HTTPS page loads a favicon over HTTP

CVE-2018-12388: Memory safety bugs fixed in Firefox 63

CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3

CVE-2018-12388 CVE-2018-12390 CVE-2018-12391 CVE-2018-12392 CVE-2018-12393 CVE-2018-12395 CVE-2018-12396 CVE-2018-12397 CVE-2018-12398 CVE-2018-12399 CVE-2018-12400 CVE-2018-12401 CVE-2018-12402 CVE-2018-12403 https://www.mozilla.org/en-US/security/advisories/mfsa2018-26/ https://www.mozilla.org/en-US/security/advisories/mfsa2018-27/ 2018-10-23 2018-10-23 2019-07-23
drupal -- Drupal Core - Multiple Vulnerabilities drupal7 7.60 drupal8 8.6.2

Drupal Security Team reports:

he path module allows users with the 'administer paths' to create pretty URLs for content. In certain circumstances the user can enter a particular path that triggers an open redirect to a malicious url.The issue is mitigated by the fact that the user needs the administer paths permission to exploit.

When sending email some variables were not being sanitized for shell arguments, which could lead to remote code execution.

https://www.drupal.org/SA-CORE-2018-006 2018-10-17 2018-10-22 2018-11-04
ruby -- multiple vulnerabilities ruby 2.3.0,12.3.8,1 2.4.0,12.4.5,1 2.5.0,12.5.2,1

Ruby news:

CVE-2018-16395: OpenSSL::X509::Name equality check does not work correctly

An instance of OpenSSL::X509::Name contains entities such as CN, C and so on. Some two instances of OpenSSL::X509::Name are equal only when all entities are exactly equal. However, there is a bug that the equality check is not correct if the value of an entity of the argument (right-hand side) starts with the value of the receiver (left-hand side). So, if a malicious X.509 certificate is passed to compare with an existing certificate, there is a possibility to be judged incorrectly that they are equal.

CVE-2018-16396: Tainted flags are not propagated in Array#pack and String#unpack with some directives

Array#pack method converts the receiver's contents into a string with specified format. If the receiver contains some tainted objects, the returned string also should be tainted. String#unpack method which converts the receiver into an array also should propagate its tainted flag to the objects contained in the returned array. But, with B, b, H and h directives, the tainted flags are not propagated. So, if a script processes unreliable inputs by Array#pack and/or String#unpack with these directives and checks the reliability with tainted flags, the check might be wrong.

https://www.ruby-lang.org/en/news/2018/10/17/ruby-2-5-2-released/ https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/ https://www.ruby-lang.org/en/news/2018/10/17/not-propagated-taint-flag-in-some-formats-of-pack-cve-2018-16396/ CVE-2018-16395 CVE-2018-16396 2018-10-17 2018-10-20
MySQL -- multiple vulnerabilities mariadb55-server 5.5.62 mariadb100-server 10.0.37 mariadb101-server 10.1.37 mariadb102-server 10.2.19 mariadb103-server 10.3.11 mysql55-server 5.5.62 mysql56-server 5.6.42 mysql57-server 5.7.24 mysql80-server 8.0.13 percona55-server 5.5.62 percona56-server 5.6.42 percona57-server 5.7.24

Oracle reports:

Please reference CVE/URL list for details

https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html#AppendixMSQL CVE-2016-9843 CVE-2018-3155 CVE-2018-3143 CVE-2018-3156 CVE-2018-3251 CVE-2018-3182 CVE-2018-3137 CVE-2018-3203 CVE-2018-3133 CVE-2018-3145 CVE-2018-3144 CVE-2018-3185 CVE-2018-3195 CVE-2018-3247 CVE-2018-3187 CVE-2018-3174 CVE-2018-3171 CVE-2018-3277 CVE-2018-3162 CVE-2018-3173 CVE-2018-3200 CVE-2018-3170 CVE-2018-3212 CVE-2018-3280 CVE-2018-3186 CVE-2018-3161 CVE-2018-3278 CVE-2018-3279 CVE-2018-3282 CVE-2018-3284 CVE-2018-3283 CVE-2018-3286 2018-10-16 2018-10-20 2018-11-08
matomo -- XSS vulnerability matomo 3.6.1

Matomo reports:

Several XSS issues have been fixed thanks to the great work of security researchers who responsible disclosed issues to us.

https://matomo.org/changelog/matomo-3-6-1/ 2018-10-18 2018-10-19
libssh -- authentication bypass vulnerability libssh 0.60.7.6 0.80.8.4

gladiac reports:

libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication, the attacker could successfully authentciate without any credentials.

https://www.libssh.org/2018/10/16/libssh-0-8-4-and-0-7-6-security-and-bugfix-release/ CVE-2018-10933 2018-10-16 2018-10-17
Libgit2 -- multiple vulnerabilities libgit2 0.27.5

The Git community reports:

Multiple vulnerabilities.

https://github.com/libgit2/libgit2/releases/tag/v0.27.5 CVE-2018-17456 2018-10-05 2018-10-15
Memory leak bug in Toxcore toxcore 0.2.8,1

The Tox project blog reports:

A memory leak bug was discovered in Toxcore that can be triggered remotely to exhaust one’s system memory, resulting in a denial of service attack. The bug is present in the TCP Server module of Toxcore and therefore it affects mostly bootstrap nodes. Regular Tox clients generally have the TCP Server functionality disabled by default, leaving them unaffected.

https://blog.tox.chat/2018/10/memory-leak-bug-and-new-toxcore-release-fixing-it/ 2018-09-29 2018-10-11
gitea -- multiple vulnerabilities gitea 1.5.2

Gitea project reports:

CSRF Vulnerability on API.

Enforce token on api routes.

https://github.com/go-gitea/gitea/issues/4357 ttps://github.com/go-gitea/gitea/pull/4840 2018-10-01 2018-10-11
jenkins -- multiple vulnerabilities jenkins 2.146 jenkins-lts 2.138.2

Jenkins Security Advisory:

Description

(Low) SECURITY-867

Path traversal vulnerability in Stapler allowed accessing internal data

(Medium) SECURITY-1074

Arbitrary file write vulnerability using file parameter definitions

(Medium) SECURITY-1129

Reflected XSS vulnerability

(Medium) SECURITY-1162

Ephemeral user record was created on some invalid authentication attempts

(Medium) SECURITY-1128

Ephemeral user record creation

(Medium) SECURITY-1158

Session fixation vulnerability on user signup

(Medium) SECURITY-765

Failures to process form submission data could result in secrets being displayed or written to logs

https://jenkins.io/security/advisory/2018-10-10/ 2018-10-10 2018-10-11
tinc -- Buffer overflow tinc 1.0.35 tinc-devel 1.1pre17

tinc-vpn.org reports:

The authentication protocol allows an oracle attack that could potentially be exploited.

If a man-in-the-middle has intercepted the TCP connection it might be able to force plaintext UDP packets between two nodes for up to a PingInterval period.

https://www.tinc-vpn.org/git/browse?p=tinc;a=commit;h=d3297fbd3b8c8c8a4661f5bbf89aca5cacba8b5a https://www.tinc-vpn.org/git/browse?p=tinc;a=commit;h=e97943b7cc9c851ae36f5a41e2b6102faa74193f CVE-2018-16737 CVE-2018-16738 CVE-2018-16758 2018-10-08 2018-10-09
Gitlab -- multiple vulnerabilities gitlab-ce 11.3.011.3.4 11.2.011.2.5 10.2.011.1.8

Gitlab reports:

Merge request information disclosure

Private project namespace information disclosure

Gitlab Flavored Markdown API information disclosure

https://about.gitlab.com/2018/10/05/critical-security-release-11-3-4/ CVE-2018-17939 CVE-2018-17976 CVE-2018-17975 2018-10-05 2018-10-05
clamav -- multiple vulnerabilities clamav 0.100.2

Joel Esler reports:

  • CVE-2018-15378:
    • Vulnerability in ClamAV's MEW unpacking feature that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
    • Reported by Secunia Research at Flexera.
  • Fix for a 2-byte buffer over-read bug in ClamAV&s PDF parsing code.
    • Reported by Alex Gaynor.
  • CVE-2018-14680:
    • An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
  • CVE-2018-14681:
    • An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.
  • CVE-2018-14682:
    • An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression. Additionally, 0.100.2 reverted 0.100.1's patch for CVE-2018-14679, and applied libmspack's version of the fix in its place.
https://blog.clamav.net/2018/10/clamav-01002-has-been-released.html CVE-2018-15378 CVE-2018-14680 CVE-2018-14681 CVE-2018-14682 2018-10-03 2018-10-03 2020-06-24
Django -- password hash disclosure py34-django21 py35-django21 py36-django21 py37-django21 2.1.2

Django release notes:

CVE-2018-16984: Password hash disclosure to "view only" admin users

If an admin user has the change permission to the user model, only part of the password hash is displayed in the change form. Admin users with the view (but not change) permission to the user model were displayed the entire hash. While it's typically infeasible to reverse a strong password hash, if your site uses weaker password hashing algorithms such as MD5 or SHA1, it could be a problem.

https://docs.djangoproject.com/en/2.1/releases/2.1.2/ CVE-2018-16984 2018-10-02 2018-10-03
mozilla -- multiple vulnerabilities firefox 62.0.3,1 waterfox 56.2.4 seamonkey linux-seamonkey 2.53.0 firefox-esr 60.2.2,1 linux-firefox 60.2.2,2 libxul thunderbird linux-thunderbird 60.2.2

Mozilla Foundation reports:

CVE-2018-12386: Type confusion in JavaScript

A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered.

CVE-2018-12387:

A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process.

CVE-2018-12386 CVE-2018-12387 https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/ 2018-10-02 2018-10-02 2019-07-23
Gitlab -- multiple vulnerabilities gitlab-ce 11.3.011.3.1 11.2.011.2.4 7.6.011.1.7

Gitlab reports:

SSRF GCP access token disclosure

Persistent XSS on issue details

Diff formatter DoS in Sidekiq jobs

Confidential information disclosure in events API endpoint

validate_localhost function in url_blocker.rb could be bypassed

Slack integration CSRF Oauth2

GRPC::Unknown logging token disclosure

IDOR merge request approvals

Persistent XSS package.json

Persistent XSS merge request project import

https://about.gitlab.com/2018/10/01/security-release-gitlab-11-dot-3-dot-1-released/ CVE-2018-17450 CVE-2018-17454 CVE-2018-15472 CVE-2018-17449 CVE-2018-17452 CVE-2018-17451 CVE-2018-17453 CVE-2018-17455 CVE-2018-17537 CVE-2018-17536 2018-10-01 2018-10-01
pango -- remote DoS vulnerability pango 1.42.4

libpango in Pango 1.40.8 through 1.42.3, as used in hexchat and other products, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted text with invalid Unicode sequences.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15120 https://www.exploit-db.com/exploits/45263/ https://mail.gnome.org/archives/distributor-list/2018-August/msg00001.html https://github.com/GNOME/pango/commit/71aaeaf020340412b8d012fe23a556c0420eda5f CVE-2018-15120 2018-08-06 2018-10-01
Serendipity -- multiple vulnerabilities serendipity 2.1.4

Serendipity reports:

Security: Fix XSS for pagination, when multi-category selection is used.

https://blog.s9y.org/archives/280-Serendipity-2.1.4-and-2.2.1-alpha1-released.html 2018-09-20 2018-09-30
bitcoin -- Denial of Service and Possible Mining Inflation bitcoin bitcoin-daemon 0.16.3

Bitcoin Core reports:

CVE-2018-17144, a fix for which was released on September 18th in Bitcoin Core versions 0.16.3 and 0.17.0rc4, includes both a Denial of Service component and a critical inflation vulnerability. It was originally reported to several developers working on Bitcoin Core, as well as projects supporting other cryptocurrencies, including ABC and Unlimited on September 17th as a Denial of Service bug only, however we quickly determined that the issue was also an inflation vulnerability with the same root cause and fix.

https://bitcoincore.org/en/2018/09/20/notice/ CVE-2018-17144 2018-09-17 2018-09-29
spamassassin -- multiple vulnerabilities spamassassin 3.4.2

the Apache Spamassassin project reports:

In Apache SpamAssassin, using HTML::Parser, we setup an object and hook into the begin and end tag event handlers In both cases, the "open" event is immediately followed by a "close" event - even if the tag *does not* close in the HTML being parsed.

Because of this, we are missing the "text" event to deal with the object normally. This can cause carefully crafted emails that might take more scan time than expected leading to a Denial of Service.

Fix a reliance on "." in @INC in one configuration script. Whether this can be exploited in any way is uncertain.

Fix a potential Remote Code Execution bug with the PDFInfo plugin. Thanks to cPanel Security Team for their report of this issue.

Fourth, this release fixes a local user code injection in the meta rule syntax. Thanks again to cPanel Security Team for their report of this issue.

https://seclists.org/oss-sec/2018/q3/242 CVE-2017-15705 CVE-2016-1238 CVE-2018-11780 CVE-2018-11781 2018-09-16 2018-09-26
wesnoth -- Code Injection vulnerability wesnoth 1.7.01.14.4,1

shadowm reports:

A severe bug was found in the game client which could allow a malicious user to execute arbitrary code through the Lua engine by using specially-crafted code in add-ons, saves, replays, or networked games. This issue affects all platforms and all existing releases since Wesnoth version 1.7.0. Users of all previous version should upgrade immediately.

CVE-2018-1999023 https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380 2018-07-14 2018-09-26
Apache -- Denial of service vulnerability in HTTP/2 apache24 2.4.35

The Apache httpd project reports:

low: DoS for HTTP/2 connections by continuous SETTINGS

By sending continous SETTINGS frames of maximum size an ongoing HTTP/2 connection could be kept busy and would never time out. This can be abused for a DoS on the server. This only affect a server that has enabled the h2 protocol.

http://httpd.apache.org/security/vulnerabilities_24.html CVE-2018-11763 2018-09-25 2018-09-26
mantis -- XSS vulnerability mantis-php56 mantis-php70 mantis-php71 mantis-php72 2.17.1,1

Brian Carpenter reports:

Reflected XSS in view_filters_page.php via core/filter_form_api.php

CVE-2018-16514 2018-09-03 2018-09-25
smart_proxy_dynflow -- authentication bypass vulnerability rubygem-smart_proxy_dynflow 0.2.1

MITRE reports:

An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14643 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14643 CVE-2018-14643 2018-09-20 2018-09-22
mediawiki -- multiple vulnerabilities mediawiki127 1.27.5 mediawiki129 1.29.3 mediawiki130 1.30.1 mediawiki131 1.31.1

Mediawiki reports:

Security fixes:

T169545: $wgRateLimits entry for 'user' overrides 'newbie'.

T194605: BotPasswords can bypass CentralAuth's account lock.

T187638: When a log event is (partially) hidden Special:Redirect/logid can link to the incorrect log and reveal hidden

T193237: Special:BotPasswords should require reauthenticate.

CVE-2018-0503 CVE-2018-0505 CVE-2018-0504 https://lists.wikimedia.org/pipermail/mediawiki-announce/2018-September/000223.html 2018-08-29 2018-09-22
firefox -- Crash in TransportSecurityInfo due to cached data firefox 62.0.2,1 firefox-esr 60.2.1,1

The Mozilla Foundation reports:

A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used.

CVE-2018-12385 https://www.mozilla.org/security/advisories/mfsa2018-22/ 2018-09-21 2018-09-21
asterisk -- Remote crash vulnerability in HTTP websocket upgrade asterisk13 13.23.1 asterisk15 15.6.1

The Asterisk project reports:

There is a stack overflow vulnerability in the res_http_websocket.so module of Asterisk that allows an attacker to crash Asterisk via a specially crafted HTTP request to upgrade the connection to a websocket. The attackers request causes Asterisk to run out of stack space and crash.

As a workaround disable HTTP websocket access by not loading the res_http_websocket.so module.

https://downloads.asterisk.org/pub/security/AST-2018-009.html CVE-2018-17281 2018-08-16 2018-09-21
moodle -- multiple vulnerabilities moodle31 3.1.14 moodle33 3.3.8 moodle34 3.4.5 moodle35 3.5.2

moodle reports:

Moodle XML import of ddwtos could lead to intentional remote code execution

QuickForm library remote code vulnerability (upstream)

Boost theme - blog search GET parameter insufficiently filtered

CVE-2018-14630 CVE-2018-1999022 CVE-2018-14631 https://moodle.org/mod/forum/discuss.php?d=376023 2018-09-05 2018-09-18
joomla3 -- vulnerabilitiesw joomla3 3.8.12

JSST reports: Multiple low-priority Vulnerabilities

Inadequate checks in the InputFilter class could allow specifically prepared PHAR files to pass the upload filter.

Inadequate output filtering on the user profile page could lead to a stored XSS attack.

Inadequate checks regarding disabled fields can lead to an ACL violation.

CVE-2018-15860 CVE-2018-15881 CVE-2018-15882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15880 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15881 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15882 https://developer.joomla.org/security-centre/743-20180801-core-hardening-the-inputfilter-for-phar-stubs.html https://developer.joomla.org/security-centre/744-20180802-core-stored-xss-vulnerability-in-the-frontend-profile.html https://developer.joomla.org/security-centre/745-20180803-core-acl-violation-in-custom-fields.html 2018-08-23 2018-09-15
mybb -- vulnerabilities mybb 1.8.19

mybb Team reports:

High risk: Email field SQL Injection.

Medium risk: Video MyCode Persistent XSS in Visual Editor.

Low risk: Insufficient permission check in User CP’s attachment management.

Low risk: Insufficient email address verification.

https://blog.mybb.com/2018/09/11/mybb-1-8-19-released-security-maintenance-release/ 2018-09-11 2018-09-13
FreeBSD -- Improper ELF header parsing FreeBSD-kernel 11.211.2_3 11.111.1_14 10.410.4_12

Problem Description:

Insufficient validation was performed in the ELF header parser, and malformed or otherwise invalid ELF binaries were not rejected as they should be.

Impact:

Execution of a malicious ELF binary may result in a kernel crash or may disclose kernel memory.

CVE-2018-6924 SA-18:12.elf 2018-09-12 2018-09-12
Containous Traefik -- exposes the configuration and secret traefik 1.6.6

MITRE reports:

Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the configuration and secret if authentication is missing and the API's port is publicly reachable.

CVE-2018-15598 https://github.com/containous/traefik/pull/3790 https://github.com/containous/traefik/releases/tag/v1.6.6 2018-08-20 2018-09-11
Flash Player -- information disclosure linux-flashplayer 31.0.0.108

Adobe reports:

  • This update resolves a privilege escalation vulnerability that could lead to information disclosure (CVE-2018-15967).
CVE-2018-15967 https://helpx.adobe.com/security/products/flash-player/apsb18-31.html 2018-09-11 2018-09-11
Plex Media Server -- Information Disclosure Vulnerability plexmediaserver plexmediaserver-plexpass 1.13.5.5332

Chris reports:

The XML parsing engine for Plex Media Server's SSDP/UPNP functionality is vulnerable to an XML External Entity Processing (XXE) attack. Unauthenticated attackers on the same LAN can use this vulnerability to:

  • Access arbitrary files from the filesystem with the same permission as the user account running Plex.
  • Initiate SMB connections to capture NetNTLM challenge/response and crack to clear-text password.
  • Initiate SMB connections to relay NetNTLM challenge/response and achieve Remote Command Execution in Windows domains.
https://seclists.org/fulldisclosure/2018/Aug/1 CVE-2018-13415 2018-08-01 2018-09-11
X11 Session -- SDDM allows unauthorised unlocking sddm 0.17.0_1

MITRE reports:

An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session.

The default configuration of SDDM on FreeBSD is not affected, since it has ReuseSession=false.

https://www.suse.com/security/cve/CVE-2018-14345/ CVE-2018-14345 2018-08-13 2018-09-11
mybb -- vulnerabilities mybb 1.8.18

mybb Team reports:

High risk: Image MyCode “alt” attribute persistent XSS.

Medium risk: RSS Atom 1.0 item title persistent XSS.

https://blog.mybb.com/2018/08/22/mybb-1-8-18-released-security-maintenance-release/ 2018-08-22 2018-09-11
Information disclosure - Gitea leaks email addresses gitea 1.5.1

The Gitea project reports:

[Privacy] Gitea leaks hidden email addresses #4417

A fix has been implemented in Gitea 1.5.1.

https://github.com/go-gitea/gitea/issues/4417 https://github.com/go-gitea/gitea/pull/4784 2018-07-10 2018-09-05
links -- denial of service links 2.16,1

NIST reports:

The put_chars function in html_r.c in Twibright Links 2.14 allows remote attackers to cause a denial of service (buffer over-read) via a crafted HTML file.

https://nvd.nist.gov/vuln/detail/CVE-2017-11114 CVE-2017-11114 2017-07-31 2018-08-23
curl -- password overflow vulnerability curl 7.15.47.61.1 linux-c7-curl 7.29.0_6

curl security problems:

CVE-2018-14618: NTLM password overflow via integer overflow

The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap.

The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow.

This bug is almost identical to CVE-2017-8816.

https://curl.haxx.se/docs/security.html https://curl.haxx.se/docs/CVE-2018-14618.html CVE-2018-14618 2018-09-05 2018-09-05 2019-08-03
mozilla -- multiple vulnerabilities firefox 62.0_1,1 waterfox 56.2.3 seamonkey linux-seamonkey 2.49.5 firefox-esr 60.2.0_1,1 linux-firefox 60.2.0,2 libxul thunderbird linux-thunderbird 60.2

Mozilla Foundation reports:

CVE-2018-12377: Use-after-free in refresh driver timers

CVE-2018-12378: Use-after-free in IndexedDB

CVE-2018-12379: Out-of-bounds write with malicious MAR file

CVE-2017-16541: Proxy bypass using automount and autofs

CVE-2018-12381: Dragging and dropping Outlook email message results in page navigation

CVE-2018-12382: Addressbar spoofing with javascript URI on Firefox for Android

CVE-2018-12383: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords

CVE-2018-12375: Memory safety bugs fixed in Firefox 62

CVE-2018-12376: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2

CVE-2017-16541 CVE-2018-12375 CVE-2018-12376 CVE-2018-12377 CVE-2018-12378 CVE-2018-12379 CVE-2018-12381 CVE-2018-12382 CVE-2018-12383 https://www.mozilla.org/en-US/security/advisories/mfsa2018-20/ https://www.mozilla.org/en-US/security/advisories/mfsa2018-21/ 2018-09-05 2018-09-05 2018-09-15
Ghostscript -- arbitrary code execution ghostscript9-agpl-base ghostscript9-agpl-x11 9.24

CERT reports:

Ghostscript contains an optional -dSAFER option, which is supposed to prevent unsafe PostScript operations. Multiple PostScript operations bypass the protections provided by -dSAFER, which can allow an attacker to execute arbitrary commands with arbitrary arguments. This vulnerability can also be exploited in applications that leverage Ghostscript, such as ImageMagick, GraphicsMagick, evince, Okular, Nautilus, and others.

Exploit code for this vulnerability is publicly available.

https://www.kb.cert.org/vuls/id/332928 CVE-2018-15908 CVE-2018-15909 CVE-2018-15910 CVE-2018-15911 2018-08-21 2018-09-04
grafana -- LDAP and OAuth login vulnerability grafana5 5.0.05.2.3 grafana4 4.0.04.6.4 grafana3 3.0.0 grafana2 2.0.0

Grafana Labs reports:

On the 20th of August at 1800 CEST we were contacted about a potential security issue with the “remember me” cookie Grafana sets upon login. The issue targeted users without a local Grafana password (LDAP & OAuth users) and enabled a potential attacker to generate a valid cookie knowing only a username.

All installations which use the Grafana LDAP or OAuth authentication features must be upgraded as soon as possible. If you cannot upgrade, you should switch authentication mechanisms or put additional protections in front of Grafana such as a reverse proxy.

https://community.grafana.com/t/grafana-5-2-3-and-4-6-4-security-update/10050 CVE-2018-558213 2018-08-20 2018-08-31
Gitlab -- multiple vulnerabilities gitlab-ce 11.2.011.2.3 11.1.011.1.6 2.7.011.0.6

Gitlab reports:

Persistent XSS in Pipeline Tooltip

GitLab.com GCP Endpoints Exposure

Persistent XSS in Merge Request Changes View

Sensitive Data Disclosure in Sidekiq Logs

Missing CSRF in System Hooks

Orphaned Upload Files Exposure

Missing Authorization Control API Repository Storage

https://about.gitlab.com/2018/08/28/security-release-gitlab-11-dot-2-dot-2-released/ 2018-08-28 2018-08-30
bro -- array bounds and potential DOS issues bro 2.5.5

Corelight reports:

Bro 2.5.5 primarily addresses security issues:

  • Fix array bounds checking in BinPAC: for arrays that are fields within a record, the bounds check was based on a pointer to the start of the record rather than the start of the array field, potentially resulting in a buffer over-read.
  • Fix SMTP command string comparisons: the number of bytes compared was based on the user-supplied string length and can lead to incorrect matches. e.g. giving a command of "X" incorrectly matched "X-ANONYMOUSTLS" (and an empty commands match anything).

Address potential vectors for Denial of Service:

  • "Weird" events are now generally suppressed/sampled by default according to some tunable parameters.
  • Improved handling of empty lines in several text protocol analyzers that can cause performance issues when seen in long sequences.
  • Add `smtp_excessive_pending_cmds' weird which serves as a notification for when the "pending command" queue has reached an upper limit and been cleared to prevent one from attempting to slowly exhaust memory.
https://www.bro.org/download/NEWS.bro.html 2018-08-28 2018-08-29
node.js -- multiple vulnerabilities node 10.9.0 node8 8.11.4 node6 6.14.4

Node.js reports:

OpenSSL: Client DoS due to large DH parameter

This fixes a potential denial of service (DoS) attack against client connections by a malicious server. During a TLS communication handshake, where both client and server agree to use a cipher-suite using DH or DHE (Diffie-Hellman, in both ephemeral and non-ephemeral modes), a malicious server can send a very large prime value to the client. Because this has been unbounded in OpenSSL, the client can be forced to spend an unreasonably long period of time to generate a key, potentially causing a denial of service.

OpenSSL: ECDSA key extraction via local side-channel

Attackers with access to observe cache-timing may be able to extract DSA or ECDSA private keys by causing the victim to create several signatures and watching responses. This flaw does not have a CVE due to OpenSSL policy to not assign itself CVEs for local-only vulnerabilities that are more academic than practical. This vulnerability was discovered by Keegan Ryan at NCC Group and impacts many cryptographic libraries including OpenSSL.

Unintentional exposure of uninitialized memory

Only Node.js 10 is impacted by this flaw.

Node.js TSC member Nikita Skovoroda discovered an argument processing flaw that causes Buffer.alloc() to return uninitialized memory. This method is intended to be safe and only return initialized, or cleared, memory. The third argument specifying encoding can be passed as a number, this is misinterpreted by Buffer's internal "fill" method as the start to a fill operation. This flaw may be abused where Buffer.alloc() arguments are derived from user input to return uncleared memory blocks that may contain sensitive information.

Out of bounds (OOB) write

Node.js TSC member Nikita Skovoroda discovered an OOB write in Buffer that can be used to write to memory outside of a Buffer's memory space. This can corrupt unrelated Buffer objects or cause the Node.js process to crash.

When used with UCS-2 encoding (recognized by Node.js under the names 'ucs2', 'ucs-2', 'utf16le' and 'utf-16le'), Buffer#write() can be abused to write outside of the bounds of a single Buffer. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.

https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/ CVE-2018-0732 CVE-2018-7166 CVE-2018-12115 2018-08-16 2018-08-25
FreeBSD -- Unauthenticated EAPOL-Key Decryption Vulnerability FreeBSD 11.211.2_2 11.111.1_13 10.410.4_11

Problem Description:

When using WPA2, EAPOL-Key frames with the Encrypted flag and without the MIC flag set, the data field was decrypted first without verifying the MIC. When the dta field was encrypted using RC4, for example, when negotiating TKIP as a pairwise cipher, the unauthenticated but decrypted data was subsequently processed. This opened wpa_supplicant(8) to abuse by decryption and recovery of sensitive information contained in EAPOL-Key messages.

See https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt for a detailed description of the bug.

Impact:

All users of the WPA2 TKIP pairwise cipher are vulnerable to information, for example, the group key.

CVE-2018-1452 SA-18:11.hostapd 2018-08-14 2018-08-22
FreeBSD -- Resource exhaustion in IP fragment reassembly FreeBSD-kernel 11.211.2_2 11.111.1_13

Problem Description:

A researcher has notified us of a DoS attack applicable to another operating system. While FreeBSD may not be vulnerable to that exact attack, we have identified several places where inadequate DoS protection could allow an attacker to consume system resources.

It is not necessary that the attacker be able to establish two-way communication to carry out these attacks. These attacks impact both IPv4 and IPv6 fragment reassembly.

Impact:

In the worst case, an attacker could send a stream of crafted fragments with a low packet rate which would consume a substantial amount of CPU.

Other attack vectors allow an attacker to send a stream of crafted fragments which could consume a large amount of CPU or all available mbuf clusters on the system.

These attacks could temporarily render a system unreachable through network interfaces or temporarily render a system unresponsive. The effects of the attack should clear within 60 seconds after the attack stops.

CVE-2018-6923 SA-18:10.ip 2018-08-14 2018-08-22
FreeBSD -- L1 Terminal Fault (L1TF) Kernel Information Disclosure FreeBSD-kernel 11.211.2_2 11.111.1_13

Problem Description:

On certain Intel 64-bit x86 systems there is a period of time during terminal fault handling where the CPU may use speculative execution to try to load data. The CPU may speculatively access the level 1 data cache (L1D). Data which would otherwise be protected may then be determined by using side channel methods.

This issue affects bhyve on FreeBSD/amd64 systems.

Impact:

An attacker executing user code, or kernel code inside of a virtual machine, may be able to read secret data from the kernel or from another virtual machine.

CVE-2018-3620 CVE-2018-3646 SA-18:09.l1tf 2018-08-14 2018-08-22
gogs -- open redirect vulnerability gogs 0.11.53_1

bluecatli (Tencent's Xuanwu Lab) reports:

The function isValidRedirect in gogs/routes/user/auth.go is used in login action to validate if url is on the same site.

If the Location header startswith /\, it will be transformed to // by browsers.

https://github.com/gogs/gogs/issues/5364 https://github.com/gogs/gogs/pull/5365 https://github.com/gogs/gogs/commit/1f247cf8139cb483276cd8dd06385a800ce9d4b2 2018-08-06 2018-08-22
phpmyadmin -- XSS in the import dialog phpMyAdmin phpMyAdmin-php56 phpMyAdmin-php70 phpMyAdmin-php71 phpMyAdmin-php72 4.8.3

The phpMyAdmin development team reports:

Description

A Cross-Site Scripting vulnerability was found in the file import feature, where an attacker can deliver a payload to a user through importing a specially-crafted file.

Severity

We consider this attack to be of moderate severity.

https://www.phpmyadmin.net/security/PMASA-2018-5/ CVE-2018-15605 2018-08-21 2018-08-22
libX11 -- Multiple vulnerabilities libX11 1.6.6,1

The freedesktop.org project reports:

The functions XGetFontPath, XListExtensions, and XListFonts are vulnerable to an off-by-one override on malicious server responses. The server replies consist of chunks consisting of a length byte followed by actual string, which is not NUL-terminated. While parsing the response, the length byte is overridden with '\0', thus the memory area can be used as storage of C strings later on. To be able to NUL-terminate the last string, the buffer is reserved with an additional byte of space. For a boundary check, the variable chend (end of ch) was introduced, pointing at the end of the buffer which ch initially points to. Unfortunately there is a difference in handling "the end of ch". While chend points at the first byte that must not be written to, the for-loop uses chend as the last byte that can be written to. Therefore, an off-by-one can occur.

The length value is interpreted as signed char on many systems (depending on default signedness of char), which can lead to an out of boundary write up to 128 bytes in front of the allocated storage, but limited to NUL byte(s).

If the server sends a reply in which even the first string would overflow the transmitted bytes, list[0] (or flist[0]) will be set to NULL and a count of 0 is returned. If the resulting list is freed with XFreeExtensionList or XFreeFontPath later on, the first Xfree call is turned into Xfree (NULL-1) which will most likely trigger a segmentation fault. Casting the length value to unsigned char fixes the problem and allows string values with up to 255 characters.

https://lists.x.org/archives/xorg-announce/2018-August/002915.html CVE-2018-14598 CVE-2018-14599 CVE-2018-14600 2018-08-21 2018-08-22
couchdb -- administrator privilege escalation couchdb 2.2.0,2

Apache CouchDB PMC reports:

Database Administrator could achieve privilege escalation to the account that CouchDB runs under, by abusing insufficient validation in the HTTP API, escaping security controls implemented in previous releases.

http://docs.couchdb.org/en/stable/cve/2018-11769.html CVE-2018-11769 2018-06-05 2018-08-08
botan2 -- ECDSA side channel botan2 2.5.02.7.0

botan2 developers report:

A side channel in the ECDSA signature operation could allow a local attacker to recover the secret key. Found by Keegan Ryan of NCC Group.

Bug introduced in 2.5.0, fixed in 2.7.0. The 1.10 branch is not affected.

https://botan.randombit.net/security.html#id1 https://github.com/randombit/botan/pull/1604 CVE-2018-12435 2018-06-13 2018-08-17
jenkins -- multiple vulnerabilities jenkins 2.138 jenkins-lts 2.121.3

Jenkins Security Advisory:

Description

(Low) SECURITY-637

Jenkins allowed deserialization of URL objects with host components

(Medium) SECURITY-672

Ephemeral user record was created on some invalid authentication attempts

(Medium) SECURITY-790

Cron expression form validation could enter infinite loop, potentially resulting in denial of service

(Low) SECURITY-996

"Remember me" cookie was evaluated even if that feature is disabled

(Medium) SECURITY-1071

Unauthorized users could access agent logs

(Low) SECURITY-1076

Unauthorized users could cancel scheduled restarts initiated from the update center

https://jenkins.io/security/advisory/2018-08-15/ 2018-08-15 2018-08-15
Flash Player -- multiple vulnerabilities linux-flashplayer 30.0.0.154

Adobe reports:

  • This update resolves out-of-bounds read vulnerabilities that could lead to information disclosure (CVE-2018-12824, CVE-2018-12826, CVE-2018-12827).
  • This update resolves a security bypass vulnerability that could lead to security mitigation bypass (CVE-2018-12825).
  • This update resolves a component vulnerability that could lead to privilege escalation (CVE-2018-12828).
CVE-2018-12824 CVE-2018-12825 CVE-2018-12826 CVE-2018-12827 CVE-2018-12828 https://helpx.adobe.com/security/products/flash-player/apsb18-25.html 2018-08-14 2018-08-14
samba -- multiple vulnerabilities samba46 4.6.16 samba47 4.7.9 samba48 4.8.4

The samba project reports:

Samba releases 4.7.0 to 4.8.3 (inclusive) contain an error which allows authentication using NTLMv1 over an SMB1 transport (either directory or via NETLOGON SamLogon calls from a member server), even when NTLMv1 is explicitly disabled on the server.

Missing input sanitization checks on some of the input parameters to LDB database layer cause the LDAP server and DNS server to crash when following a NULL pointer.

Samba releases 3.2.0 to 4.8.3 (inclusive) contain an error in libsmbclient that could allow a malicious server to overwrite client heap memory by returning an extra long filename in a directory listing.

Missing database output checks on the returned directory attributes from the LDB database layer cause the DsCrackNames call in the DRSUAPI server to crash when following a NULL pointer.

All versions of the Samba Active Directory LDAP server from 4.0.0 onwards are vulnerable to the disclosure of confidential attribute values, both of attributes where the schema SEARCH_FLAG_CONFIDENTIAL (0x80) searchFlags bit and where an explicit Access Control Entry has been specified on the ntSecurityDescriptor.

https://www.samba.org/samba/security/CVE-2018-1139.html CVE-2018-1139 https://www.samba.org/samba/security/CVE-2018-1140.html CVE-2018-1140 https://www.samba.org/samba/security/CVE-2018-10858.html CVE-2018-10858 https://www.samba.org/samba/security/CVE-2018-10918.html CVE-2018-10918 https://www.samba.org/samba/security/CVE-2018-10919.html CVE-2018-10919 2018-08-14 2018-08-14
GraphicsMagick -- SVG/Rendering vulnerability GraphicsMagick 1.3.30,1

GraphicsMagick News:

Fix heap write overflow of PrimitiveInfo and PointInfo arrays. This is another manefestation of CVE-2016-2317, which should finally be fixed correctly due to active detection/correction of pending overflow rather than using estimation.

http://www.graphicsmagick.org/NEWS.html CVE-2016-2317 2018-06-23 2018-08-11
chicken -- multiple vulnerabilities chicken 4.13.0,1

CHICKEN reports:

  • CVE-2017-6949: Unchecked malloc() call in SRFI-4 constructors when allocating in non-GC memory, resulting in potential 1-word buffer overrun and/or segfault
  • CVE-2017-9334: "length" crashes on improper lists
  • CVE-2017-11343: The randomization factor of the symbol table was set before the random seed was set, causing it to have a fixed value on many platforms
https://code.call-cc.org/releases/4.13.0/NEWS CVE-2017-6949 CVE-2017-9334 CVE-2017-11343 2017-03-16 2018-08-12
gitea -- TOTP passcode reuse gitea 1.5.0

The Gitea project reports:

TOTP passcodes can be reused.

https://github.com/go-gitea/gitea/pull/3878 2018-05-01 2018-08-12
mbed TLS -- plaintext recovery vulnerabilities mbedtls 2.12

Simon Butcher reports:

  • When using a CBC based ciphersuite, a remote attacker can partially recover the plaintext.
  • When using a CBC based ciphersuite, an attacker with the ability to execute arbitrary code on the machine under attack can partially recover the plaintext by use of cache based side-channels.
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-02 CVE-2018-0497 CVE-2018-0498 2018-07-24 2018-08-10
PostgreSQL -- two vulnerabilities postgresql10-server 10.5 postgresql96-server 9.6.10 postgresql95-server 9.5.14 postgresql94-server 9.4.19 postgresql93-server 9.3.24

The PostgreSQL project reports:

CVE-2018-10915: Certain host connection parameters defeat client-side security defenses

libpq, the client connection API for PostgreSQL that is also used by other connection libraries, had an internal issue where it did not reset all of its connection state variables when attempting to reconnect. In particular, the state variable that determined whether or not a password is needed for a connection would not be reset, which could allow users of features requiring libpq, such as the "dblink" or "postgres_fdw" extensions, to login to servers they should not be able to access.

CVE-2018-10925: Memory disclosure and missing authorization in `INSERT ... ON CONFLICT DO UPDATE`

An attacker able to issue CREATE TABLE can read arbitrary bytes of server memory using an upsert (`INSERT ... ON CONFLICT DO UPDATE`) query. By default, any user can exploit that. A user that has specific INSERT privileges and an UPDATE privilege on at least one column in a given table can also update other columns using a view and an upsert query.

https://www.postgresql.org/about/news/1878/ CVE-2018-10915 CVE-2018-10925 2018-08-09 2018-08-10
MySQL -- multiple vulnerabilities mariadb55-server 5.5.61 mariadb100-server 10.0.36 mariadb101-server 10.1.35 mariadb102-server 10.2.17 mariadb103-server 10.3.9 mysql55-server 5.5.61 mysql56-server 5.6.41 mysql57-server 5.7.23 mysql80-server 8.0.12 percona55-server 5.5.61 percona56-server 5.6.41 percona57-server 5.7.23

Oracle reports:

Multiple vulnerabilities have been disclosed by Oracle without further detail. CVSS scores 7.1 - 2.7

http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html CVE-2018-3064 CVE-2018-0739 CVE-2018-3070 CVE-2018-3060 CVE-2018-3065 CVE-2018-3073 CVE-2018-3074 CVE-2018-3081 CVE-2018-3071 CVE-2018-3079 CVE-2018-3054 CVE-2018-3077 CVE-2018-3078 CVE-2018-3080 CVE-2018-3061 CVE-2018-3067 CVE-2018-3063 CVE-2018-3075 CVE-2018-3058 CVE-2018-3056 CVE-2018-3066 CVE-2018-2767 CVE-2018-3084 CVE-2018-3082 2018-07-17 2018-08-08
xml-security-c -- crashes on malformed KeyInfo content apache-xml-security-c 2.0.1

The shibboleth project reports:

SAML messages, assertions, and metadata all commonly make use of the XML Signature KeyInfo construct, which expresses information about keys and certificates used in signing or encrypting XML.

The Apache Santuario XML Security for C++ library contained code paths at risk of dereferencing null pointers when processing various kinds of malformed KeyInfo hints typically found in signed or encrypted XML. The usual effect is a crash, and in the case of the Shibboleth SP software, a crash in the shibd daemon, which prevents access to protected resources until the daemon is restarted.

https://shibboleth.net/community/advisories/secadv_20180803.txt 2018-08-03 2018-08-07
FreeBSD -- Resource exhaustion in TCP reassembly FreeBSD-kernel 11.211.2_1 11.111.1_12 10.410.4_10

Problem Description:

One of the data structures that holds TCP segments uses an inefficient algorithm to reassemble the data. This causes the CPU time spent on segment processing to grow linearly with the number of segments in the reassembly queue.

Impact:

An attacker who has the ability to send TCP traffic to a victim system can degrade the victim system's network performance and/or consume excessive CPU by exploiting the inefficiency of TCP reassembly handling, with relatively small bandwidth cost.

CVE-2018-6922 SA-18:08.tcp 2018-08-06 2018-08-06
py-cryptography -- tag forgery vulnerability py27-cryptography py34-cryptography py35-cryptography py36-cryptography py37-cryptography 2.3

The Python Cryptographic Authority (PyCA) project reports:

finalize_with_tag() allowed tag truncation by default which can allow tag forgery in some cases. The method now enforces the min_tag_length provided to the GCM constructor

CVE-2018-10903 2018-07-17 2018-08-06
cgit -- directory traversal vulnerability cgit 1.2.1

Jann Horn reports:

cgit_clone_objects in CGit before 1.2.1 has a directory traversal vulnerability when `enable-http-clone=1` is not turned off, as demonstrated by a cgit/cgit.cgi/git/objects/?path=../ request.

https://lists.zx2c4.com/pipermail/cgit/2018-August/004176.html CVE-2018-14912 2018-08-03 2018-08-04
rubygem-doorkeeper -- token revocation vulnerability rubygem-doorkeeper rubygem-doorkeeper43 rubygem-doorkeeper-rails5 rubygem-doorkeeper-rails50 4.4.0

NVD reports:

Doorkeeper version 4.2.0 and later contains a Incorrect Access Control vulnerability in Token revocation API's authorized method that can result in Access tokens are not revoked for public OAuth apps, leaking access until expiry.

https://nvd.nist.gov/vuln/detail/CVE-2018-1000211 https://github.com/doorkeeper-gem/doorkeeper/pull/1120 CVE-2018-1000211 2018-07-13 2018-07-31 2018-08-03
sinatra -- XSS vulnerability rubygem-sinatra 2.0.02.0.2

Sinatra blog:

Sinatra had a critical vulnerability since v2.0.0. The purpose of this release is to fix CVE-2018-11627.

The vulnerability is that XSS can be executed by using illegal parameters.

http://sinatrarb.com/2018/06/09/sinatra-2.0.2-and-2.0.3.html https://github.com/sinatra/sinatra/blob/master/CHANGELOG.md CVE-2018-11627 2018-06-09 2018-07-31
mailman -- content spoofing with invalid list names in web UI mailman 2.1.28 mailman-with-htdig2.1.28 ja-mailman 2.1.14.j7_6,1

Mark Sapiro reports:

A URL with a very long text listname such as

http://www.example.com/mailman/listinfo/This_is_a_long_string_with_some_phishing_text

will echo the text in the "No such list" error response. This can be used to make a potential victim think the phishing text comes from a trusted site.

This issue was discovered by Hammad Qureshi.

https://bugs.launchpad.net/mailman/+bug/1780874 https://mail.python.org/pipermail/mailman-announce/2018-July/000241.html CVE-2018-13796 2018-07-09 2018-07-31
mantis -- multiple vulnerabilities mantis 2.15.0,1

mantis reports:

Teun Beijers reported a cross-site scripting (XSS) vulnerability in the Edit Filter page which allows execution of arbitrary code (if CSP settings permit it) when displaying a filter with a crafted name. Prevent the attack by sanitizing the filter name before display.

Ömer Cıtak, Security Researcher at Netsparker, reported this vulnerability, allowing remote attackers to inject arbitrary code (if CSP settings permit it) through a crafted PATH_INFO on view_filters_page.php. Prevent the attack by sanitizing the output of $_SERVER['PHP_SELF'] before display.

https://github.com/mantisbt/mantisbt/commit/8b5fa243dbf04344a55fe880135ec149fc1f439f https://github.com/mantisbt/mantisbt/commit/4efac90ed89a5c009108b641e2e95683791a165a CVE-2018-14504 CVE-2018-13066 2018-07-13 2018-07-29 2018-08-24
py-bleach -- unsanitized character entities py27-bleach py36-bleach 2.1.02.1.3

bleach developer reports:

Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized.

This security issue was introduced in Bleach 2.1. Anyone using Bleach 2.1 is highly encouraged to upgrade.

https://github.com/mozilla/bleach/blob/v2.1.3/CHANGES 2018-03-05 2018-07-27
lshell -- Shell autocomplete reveals forbidden directories lshell 0.9.18

lshell reports:

The autocomplete feature allows users to list directories, while they do not have access to those paths (issue #109).

https://github.com/ghantoos/lshell/issues/109 2015-07-25 2018-07-27
lshell -- Multiple security issues lshell 0.9.18

lshell reports:

It is possible to escape lshell if an allowed command can execute an arbitrary non allowed one (issue #122).

Inappropriate parsing of commands can lead to arbitrary command execution (issue #147, #149, #151).

https://github.com/ghantoos/lshell/issues/122 https://github.com/ghantoos/lshell/issues/147 https://github.com/ghantoos/lshell/issues/149 https://github.com/ghantoos/lshell/issues/151 2016-02-04 2018-07-27
OpenJPEG -- multiple vulnerabilities openjpeg 2.3.0_3

OpenJPEG reports:

Multiple vulnerabilities have been found in OpenJPEG, the opensource JPEG 2000 codec. Please consult the CVE list for further details.

CVE-2017-17479 and CVE-2017-17480 were fixed in r477112.

CVE-2018-5785 was fixed in r480624.

CVE-2018-6616 was fixed in r489415.

https://nvd.nist.gov/vuln/detail/CVE-2017-17479 https://nvd.nist.gov/vuln/detail/CVE-2017-17480 https://nvd.nist.gov/vuln/detail/CVE-2018-5785 https://nvd.nist.gov/vuln/detail/CVE-2018-6616 CVE-2017-17479 CVE-2017-17480 CVE-2018-5785 CVE-2018-6616 2017-12-08 2018-07-27 2019-02-11
ffmpeg -- multiple vulnerabilities ffmpeg 3.3.5_1,1 3.4,13.4.1_4,1

MITRE reports:

Multiple vulnerabilities have been found in FFmpeg. Please refer to CVE list for details.

Note: CVE-2017-15186 and CVE-2017-15672 affect only the 3.3 branch before 3.3.5, CVE-2017-16840 and CVE-2017-17081 have been fixed in 3.4.1. They're listed here for completeness of the record.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15186 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15672 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16840 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17081 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6392 http://ffmpeg.org/security.html CVE-2017-15186 CVE-2017-15672 CVE-2017-16840 CVE-2017-17081 CVE-2018-6392 2017-10-09 2018-07-27
GIMP - Heap Buffer Overflow Vulnerability gimp 2.8.22,2

GNOME reports:

CVE-2017-17786 Out of bounds read / heap overflow in tga importer / function bgr2rgb.part.1

https://bugzilla.gnome.org/show_bug.cgi?id=739134 CVE-2017-17786 2017-12-21 2018-07-27
chromium -- multiple vulnerabilities chromium 68.0.3440.75

Google Chrome Releases reports:

42 security fixes in this release, including:

  • [850350] High CVE-2018-6153: Stack buffer overflow in Skia. Reported by Zhen Zhou of NSFOCUS Security Team on 2018-06-07
  • [848914] High CVE-2018-6154: Heap buffer overflow in WebGL. Reported by Omair on 2018-06-01
  • [842265] High CVE-2018-6155: Use after free in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2018-05-11
  • [841962] High CVE-2018-6156: Heap buffer overflow in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2018-05-10
  • [840536] High CVE-2018-6157: Type confusion in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2018-05-07
  • [812667] Medium CVE-2018-6150: Cross origin information disclosure in Service Workers. Reported by Rob Wu on 2018-02-15
  • [805905] Medium CVE-2018-6151: Bad cast in DevTools. Reported by Rob Wu on 2018-01-25
  • [805445] Medium CVE-2018-6152: Local file write in DevTools. Reported by Rob Wu on 2018-01-24
  • [841280] Medium CVE-2018-6158: Use after free in Blink. Reported by Zhe Jin, Luyao Liu from Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd on 2018-05-09
  • [837275] Medium CVE-2018-6159: Same origin policy bypass in ServiceWorker. Reported by Jun Kokatsu (@shhnjk) on 2018-04-26
  • [839822] Medium CVE-2018-6160: URL spoof in Chrome on iOS. Reported by evi1m0 of Bilibili Security Team on 2018-05-04
  • [826552] Medium CVE-2018-6161: Same origin policy bypass in WebAudio. Reported by Jun Kokatsu (@shhnjk) on 2018-03-27
  • [804123] Medium CVE-2018-6162: Heap buffer overflow in WebGL. Reported by Omair on 2018-01-21
  • [849398] Medium CVE-2018-6163: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-06-04
  • [848786] Medium CVE-2018-6164: Same origin policy bypass in ServiceWorker. Reported by Jun Kokatsu (@shhnjk) on 2018-06-01
  • [847718] Medium CVE-2018-6165: URL spoof in Omnibox. Reported by evi1m0 of Bilibili Security Team on 2018-05-30
  • [835554] Medium CVE-2018-6166: URL spoof in Omnibox. Reported by Lnyas Zhang on 2018-04-21
  • [833143] Medium CVE-2018-6167: URL spoof in Omnibox. Reported by Lnyas Zhang on 2018-04-15
  • [828265] Medium CVE-2018-6168: CORS bypass in Blink. Reported by Gunes Acar and Danny Y. Huang of Princeton University, Frank Li of UC Berkeley on 2018-04-03
  • [394518] Medium CVE-2018-6169: Permissions bypass in extension installation. Reported by Sam P on 2014-07-16
  • [862059] Medium CVE-2018-6170: Type confusion in PDFium. Reported by Anonymous on 2018-07-10
  • [851799] Medium CVE-2018-6171: Use after free in WebBluetooth. Reported by amazon@mimetics.ca on 2018-06-12
  • [847242] Medium CVE-2018-6172: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-05-28
  • [836885] Medium CVE-2018-6173: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-04-25
  • [835299] Medium CVE-2018-6174: Integer overflow in SwiftShader. Reported by Mark Brand of Google Project Zero on 2018-04-20
  • [826019] Medium CVE-2018-6175: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-03-26
  • [666824] Medium CVE-2018-6176: Local user privilege escalation in Extensions. Reported by Jann Horn of Google Project Zero on 2016-11-18
  • [826187] Low CVE-2018-6177: Cross origin information leak in Blink. Reported by Ron Masas (Imperva) on 2018-03-27
  • [823194] Low CVE-2018-6178: UI spoof in Extensions. Reported by Khalil Zhani on 2018-03-19
  • [816685] Low CVE-2018-6179: Local file information leak in Extensions. Reported by Anonymous on 2018-02-26
  • [797461] Low CVE-2018-6044: Request privilege escalation in Extensions. Reported by Wob Wu on 2017-12-23
  • [791324] Low CVE-2018-4117: Cross origin information leak in Blink. Reported by AhsanEjaz - @AhsanEjazA on 2017-12-03
  • [866821] Various fixes from internal audits, fuzzing and other initiatives
CVE-2018-4117 CVE-2018-6044 CVE-2018-6150 CVE-2018-6151 CVE-2018-6152 CVE-2018-6153 CVE-2018-6154 CVE-2018-6155 CVE-2018-6156 CVE-2018-6157 CVE-2018-6158 CVE-2018-6159 CVE-2018-6160 CVE-2018-6161 CVE-2018-6162 CVE-2018-6163 CVE-2018-6164 CVE-2018-6165 CVE-2018-6166 CVE-2018-6167 CVE-2018-6168 CVE-2018-6169 CVE-2018-6170 CVE-2018-6171 CVE-2018-6172 CVE-2018-6173 CVE-2018-6174 CVE-2018-6175 CVE-2018-6176 CVE-2018-6177 CVE-2018-6178 CVE-2018-6179 https://chromereleases.googleblog.com/2018/07/stable-channel-update-for-desktop.html 2018-07-24 2018-07-27
curl -- SMTP send heap buffer overflow curl 7.54.17.61.0

Peter Wu reports:

curl might overflow a heap based memory buffer when sending data over SMTP and using a reduced read buffer.

https://curl.haxx.se/docs/adv_2018-70a2.html CVE-2018-0500 2018-07-11 2018-07-27 2018-07-28
Gitlab -- multiple vulnerabilities gitlab-ce 11.1.011.1.2 11.0.011.0.5 2.7.010.8.7

Gitlab reports:

Markdown DoS

Information Disclosure Prometheus Metrics

CSRF in System Hooks

Persistent XSS Pipeline Tooltip

Persistent XSS in Branch Name via Web IDE

Persistent XSS in Branch Name via Web IDE

CVE-2018-14601 CVE-2018-14602 CVE-2018-14603 CVE-2018-14604 CVE-2018-14605 CVE-2018-14606 https://about.gitlab.com/2018/07/26/security-release-gitlab-11-dot-1-dot-2-released/ 2018-07-26 2018-07-27
Fix a buffer overflow in the tiff reader vips 8.6.5

libvips reports:

A buffer overflow was found and fixed in the libvips code

https://github.com/jcupitt/libvips/releases/tag/v8.6.5 2018-07-22 2018-07-26
Memory leak in different components libsixel 1.8.2,1

MITRE reports:

bsixel 1.8.1 has a memory leak in sixel_decoder_decode in decoder.c, image_buffer_resize in fromsixel.c, sixel_decode_raw in fromsixel.c and sixel_allocator_new in allocator.c

CVE-2018-14072 CVE-2018-14073 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14072 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14073 2018-07-15 2018-07-24
vlc -- Use after free vulnerability vlc 2.2.8_6,4 vlc-qt4 2.2.8_6,4

Mitre reports:

VideoLAN VLC media player 2.2.x is prone to a use after free vulnerability which an attacker can leverage to execute arbitrary code via crafted MKV files. Failed exploit attempts will likely result in denial of service conditions.

CVE-2018-11529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11529 http://seclists.org/fulldisclosure/2018/Jul/28 https://github.com/rapid7/metasploit-framework/pull/10335 https://github.com/videolan/vlc-3.0/commit/c472668ff873cfe29281822b4548715fb7bb0368 https://github.com/videolan/vlc-3.0/commit/d2dadb37e7acc25ae08df71e563855d6e17b5b42 2018-06-06 2018-07-21
mutt -- remote code injection and path traversal vulnerability mutt 1.10.1

Kevin J. McCarthy reports:

Fixes a remote code injection vulnerability when "subscribing" to an IMAP mailbox, either via $imap_check_subscribed, or via the <subscribe> function in the browser menu. Mutt was generating a "mailboxes" command and sending that along to the muttrc parser. However, it was not escaping "`", which executes code and inserts the result. This would allow a malicious IMAP server to execute arbitrary code (for $imap_check_subscribed).

Fixes POP body caching path traversal vulnerability.

Fixes IMAP header caching path traversal vulnerability.

CVE-2018-14349 - NO Response Heap Overflow

CVE-2018-14350 - INTERNALDATE Stack Overflow

CVE-2018-14351 - STATUS Literal Length relative write

CVE-2018-14352 - imap_quote_string off-by-one stack overflow

CVE-2018-14353 - imap_quote_string int underflow

CVE-2018-14354 - imap_subscribe Remote Code Execution

CVE-2018-14355 - STATUS mailbox header cache directory traversal

CVE-2018-14356 - POP empty UID NULL deref

CVE-2018-14357 - LSUB Remote Code Execution

CVE-2018-14358 - RFC822.SIZE Stack Overflow

CVE-2018-14359 - base64 decode Stack Overflow

CVE-2018-14362 - POP Message Cache Directory Traversal

CVE-2018-14349 CVE-2018-14350 CVE-2018-14351 CVE-2018-14352 CVE-2018-14353 CVE-2018-14354 CVE-2018-14355 CVE-2018-14356 CVE-2018-14357 CVE-2018-14358 CVE-2018-14359 CVE-2018-14362 http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20180716/000004.html 2018-07-15 2018-07-17
mutt/neomutt -- multiple vulnerabilities neomutt 20180716 mutt 1.10.1 mutt14 *

NeoMutt report:

Description

CVE-2018-14349

NO Response Heap Overflow

CVE-2018-14350

INTERNALDATE Stack Overflow

CVE-2018-14351

STATUS Literal Length relative write

CVE-2018-14352

imap_quote_string off-by-one stack overflow

CVE-2018-14353

imap_quote_string int underflow

CVE-2018-14354

imap_subscribe Remote Code Execution

CVE-2018-14355

STATUS mailbox header cache directory traversal

CVE-2018-14356

POP empty UID NULL deref

CVE-2018-14357

LSUB Remote Code Execution

CVE-2018-14358

RFC822.SIZE Stack Overflow

CVE-2018-14359

base64 decode Stack Overflow

CVE-2018-14360

NNTP Group Stack Overflow

CVE-2018-14361

NNTP Write 1 where via GROUP response

CVE-2018-14362

POP Message Cache Directory Traversal

CVE-2018-14363

NNTP Header Cache Directory Traversal

CVE-2018-14349 CVE-2018-14350 CVE-2018-14351 CVE-2018-14352 CVE-2018-14353 CVE-2018-14354 CVE-2018-14355 CVE-2018-14356 CVE-2018-14357 CVE-2018-14358 CVE-2018-14359 CVE-2018-14360 CVE-2018-14361 CVE-2018-14362 CVE-2018-14363 https://github.com/neomutt/neomutt/releases/tag/neomutt-20180716 2018-07-10 2018-07-19
jenkins -- multiple vulnerabilities jenkins 2.133 jenkins-lts 2.121.2

Jenkins Security Advisory:

Description

(High) SECURITY-897 / CVE-2018-1999001

Users without Overall/Read permission can have Jenkins reset parts of global configuration on the next restart

(High) SECURITY-914 / CVE-2018-1999002

Arbitrary file read vulnerability

(Medium) SECURITY-891 / CVE-2018-1999003

Unauthorized users could cancel queued builds

(Medium) SECURITY-892 / CVE-2018-1999004

Unauthorized users could initiate and abort agent launches

(Medium) SECURITY-944 / CVE-2018-1999005

Stored XSS vulnerability

(Medium) SECURITY-925 / CVE-2018-1999006

Unauthorized users are able to determine when a plugin was extracted from its JPI package

(Medium) SECURITY-390 / CVE-2018-1999007

XSS vulnerability in Stapler debug mode

CVE-2018-1999001 CVE-2018-1999002 CVE-2018-1999003 CVE-2018-1999004 CVE-2018-1999005 CVE-2018-1999006 CVE-2018-1999007 https://jenkins.io/security/advisory/2018-07-18/ 2018-07-18 2018-07-18
znc -- multiple vulnerabilities znc 1.7.1

Mitre reports:

ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming from the network, allowing a non-admin user to escalate his privilege and inject rogue values into znc.conf.

ZNC before 1.7.1-rc1 is prone to a path traversal flaw via ../ in a web skin name to access files outside of the intended skins directories.

CVE-2018-14055 CVE-2018-14056 https://wiki.znc.in/ChangeLog/1.7.1 2018-07-14 2018-07-18
Apache httpd -- multiple vulnerabilities apache24 2.4.34

The Apache project reports:

  • DoS for HTTP/2 connections by crafted requests (CVE-2018-1333). By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. (low)
  • mod_md, DoS via Coredumps on specially crafted requests (CVE-2018-8011). By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. (moderate)
http://httpd.apache.org/security/vulnerabilities_24.html CVE-2018-1333 CVE-2018-8011 2018-07-18 2018-07-18
Gitlab -- Remote Code Execution Vulnerability in GitLab Projects Import gitlab-ce gitlab 11.0.011.0.4 10.8.010.8.6 8.9.010.7.7

Gitlab reports:

Remote Code Execution Vulnerability in GitLab Projects Import

CVE-2018-14364 https://about.gitlab.com/2018/07/17/critical-security-release-gitlab-11-dot-0-dot-4-released/ 2018-07-17 2018-07-18
typo3 -- multiple vulnerabilities typo3-7 7.6.30 typo3-8 8.7.17

Typo3 core team reports:

It has been discovered that TYPO3’s Salted Password system extension (which is a mandatory system component) is vulnerable to Authentication Bypass when using hashing methods which are related by PHP class inheritance. In standard TYPO3 core distributions stored passwords using the blowfish hashing algorithm can be overridden when using MD5 as the default hashing algorithm by just knowing a valid username. Per default the Portable PHP hashing algorithm (PHPass) is used which is not vulnerable.

Phar files (formerly known as "PHP archives") can act als self extracting archives which leads to the fact that source code is executed when Phar files are invoked. The Phar file format is not limited to be stored with a dedicated file extension - "bundle.phar" would be valid as well as "bundle.txt" would be. This way, Phar files can be obfuscated as image or text file which would not be denied from being uploaded and persisted to a TYPO3 installation. Due to a missing sanitization of user input, those Phar files can be invoked by manipulated URLs in TYPO3 backend forms. A valid backend user account is needed to exploit this vulnerability. In theory the attack vector would be possible in the TYPO3 frontend as well, however no functional exploit has been identified so far.

Failing to properly dissociate system related configuration from user generated configuration, the Form Framework (system extension "form") is vulnerable to SQL injection and Privilege Escalation. Basically instructions can be persisted to a form definition file that were not configured to be modified - this applies to definitions managed using the form editor module as well as direct file upload using the regular file list module. A valid backend user account as well as having system extension form activated are needed in order to exploit this vulnerability.

It has been discovered that the Form Framework (system extension "form") is vulnerable to Insecure Deserialization when being used with the additional PHP PECL package “yaml”, which is capable of unserializing YAML contents to PHP objects. A valid backend user account as well as having PHP setting "yaml.decode_php" enabled is needed to exploit this vulnerability.

https://typo3.org/security/advisory/typo3-core-sa-2018-001/ https://typo3.org/security/advisory/typo3-core-sa-2018-002/ https://typo3.org/security/advisory/typo3-core-sa-2018-003/ https://typo3.org/security/advisory/typo3-core-sa-2018-004/ 2018-07-12 2018-07-17
Several Security Defects in the Bouncy Castle Crypto APIs bouncycastle 1.60 bouncycastle15 1.60 puppetserver 0 puppetserver5 5.3.8 puppetserver6 6.2.1

The Legion of the Bouncy Castle reports:

Release 1.60 is now available for download.

CVE-2018-1000180: issue around primality tests for RSA key pair generation if done using only the low-level API.

CVE-2018-1000613: lack of class checking in deserialization of XMSS/XMSS^MT private keys with BDS state information.

CVE-2018-1000180 CVE-2018-1000613 https://www.bouncycastle.org/latest_releases.html 2018-06-30 2018-07-15
qutebrowser -- Remote code execution due to CSRF qutebrowser 1.4.01.4.1 1.0.01.3.3_1

qutebrowser team reports:

Due to a CSRF vulnerability affecting the qute://settings page, it was possible for websites to modify qutebrowser settings. Via settings like editor.command, this possibly allowed websites to execute arbitrary code.

http://seclists.org/oss-sec/2018/q3/29 CVE-2018-10895 2018-07-11 2018-07-14
Flash Player -- multiple vulnerabilities linux-flashplayer 30.0.0.134

Adobe reports:

  • This update resolves an out-of-bounds read vulnerability that could lead to information disclosure (CVE-2018-5008).
  • This update resolves a type confusion vulnerability that could lead to arbitrary code execution (CVE-2018-5007).
CVE-2018-5007 CVE-2018-5008 https://helpx.adobe.com/security/products/flash-player/apsb18-24.html 2018-07-10 2018-07-11
couchdb -- multiple vulnerabilities couchdb 1.7.2,2

Apache CouchDB PMC reports:

Database Administrator could achieve privilege escalation to the account that CouchDB runs under, by abusing insufficient validation in the HTTP API, escaping security controls implemented in previous releases.

https://blog.couchdb.org/2018/07/10/cve-2018-8007/ CVE-2018-8007 https://blog.couchdb.org/2017/11/14/apache-couchdb-cve-2017-12635-and-cve-2017-12636/ CVE-2017-12636 CVE-2017-12635 https://lists.apache.org/thread.html/6fa798e96686b7b0013ec2088140d00aeb7d34487d3f5ad032af6934@%3Cdev.couchdb.apache.org%3E 2017-11-14 2018-07-10
Libgit2 -- multiple vulnerabilities libgit2 0.27.3

The Git community reports:

Out-of-bounds reads when reading objects from a packfile

https://github.com/libgit2/libgit2/releases/tag/v0.27.3 CVE-2018-10887 CVE-2018-10888 2018-07-09 2018-07-11
clamav -- multiple vulnerabilities clamav 0.100.1

Joel Esler reports:

3 security fixes in this release:

  • CVE-2017-16932: Vulnerability in libxml2 dependency (affects ClamAV on Windows only).
  • CVE-2018-0360: HWP integer overflow, infinite loop vulnerability. Reported by Secunia Research at Flexera.
  • CVE-2018-0361: ClamAV PDF object length check, unreasonably long time to parse relatively small file. Report ed by aCaB.
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html CVE-2017-16932 CVE-2018-0360 CVE-2018-0361 2018-07-09 2018-07-09
zziplib - multiple vulnerabilities zziplib 0.13.68

NIST reports (by search in the range 2017/01/01 - 2018/07/06):

17 security fixes in this release:

  • Heap-based buffer overflow in the __zzip_get32 function in fetch.c.
  • Heap-based buffer overflow in the __zzip_get64 function in fetch.c.
  • Heap-based buffer overflow in the zzip_mem_entry_extra_block function in memdisk.c.
  • The zzip_mem_entry_new function in memdisk.c allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted ZIP file.
  • The prescan_entry function in fseeko.c allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via crafted ZIP file.
  • The zzip_mem_entry_new function in memdisk.c cause a NULL pointer dereference and crash via a crafted ZIP file.
  • seeko.c cause a denial of service (assertion failure and crash) via a crafted ZIP file.
  • A segmentation fault caused by invalid memory access in the zzip_disk_fread function because the size variable is not validated against the amount of file->stored data.
  • A memory alignment error and bus error in the __zzip_fetch_disk_trailer function of zzip/zip.c.
  • A bus error caused by loading of a misaligned address in the zzip_disk_findfirst function.
  • An uncontrolled memory allocation and a crash in the __zzip_parse_root_directory function.
  • An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c.
  • A memory leak triggered in the function zzip_mem_disk_new in memdisk.c.
CVE-2017-5974 CVE-2017-5975 CVE-2017-5976 CVE-2017-5977 CVE-2017-5978 CVE-2017-5979 CVE-2017-5980 CVE-2017-5981 CVE-2018-6381 CVE-2018-6484 CVE-2018-6540 CVE-2018-6541 CVE-2018-6542 CVE-2018-6869 CVE-2018-7725 CVE-2018-7726 CVE-2018-7727 https://nvd.nist.gov/vuln/search/results?form_type=Advanced&results_type=overview&query=zziplib&search_type=all&pub_start_date=01%2F01%2F2017&pub_end_date=07%2F06%2F2018" 2017-03-01 2018-07-06
wordpress -- multiple issues wordpress fr-wordpress 4.9.7,1 de-wordpress zh_CN-wordpress zh_TW-wordpress ja-wordpress ru-wordpress 4.9.7

wordpressdevelopers reports:

Taxonomy: Improve cache handling for term queries.

Posts, Post Types: Clear post password cookie when logging out.

Widgets: Allow basic HTML tags in sidebar descriptions on Widgets admin screen.

Community Events Dashboard: Always show the nearest WordCamp if one is coming up, even if there are multiple Meetups happening first.

Privacy: Make sure default privacy policy content does not cause a fatal error when flushing rewrite rules outside of the admin context.

https://wordpress.org/news/2018/07/wordpress-4-9-7-security-and-maintenance-release/ 2018-07-05 2018-07-08
mybb -- vulnerabilities mybb 1.8.16

mybb Team reports:

High risk: Image and URL MyCode Persistent XSS

Medium risk: Multipage Reflected XSS

Low risk: ACP logs XSS

Low risk: Arbitrary file deletion via ACP’s Settings

Low risk: Login CSRF

Low risk: Non-video content embedding via Video MyCode

https://blog.mybb.com/2018/07/04/mybb-1-8-16-released-security-maintenance-release/ 2018-07-04 2018-07-07
expat -- multiple vulnerabilities expat 2.2.1 libwww 5.4.2

Mitre reports:

An integer overflow during the parsing of XML using the Expat library.

XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.

CVE-2016-9063 CVE-2017-9233 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233 https://libexpat.github.io/doc/cve-2017-9233/ 2016-10-27 2018-07-05
h2o -- heap buffer overflow during logging h2o 2.2.5

Marlies Ruck reports:

Fix heap buffer overflow while trying to emit access log - see references for full details.

CVE-2018-0608: Buffer overflow in H2O version 2.2.4 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via unspecified vectors.

CVE-2018-0608 https://github.com/h2o/h2o/issues/1775 https://github.com/h2o/h2o/releases/tag/v2.2.5 2018-06-01 2018-07-03
SQLite -- Corrupt DB can cause a NULL pointer dereference upp 11540

MITRE reports:

SQLite databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.

CVE-2018-8740 http://openwall.com/lists/oss-security/2018/03/17/1 2018-03-16 2018-07-01
mozilla -- multiple vulnerabilities firefox 61.0_1,1 waterfox 56.2.1.19_2 seamonkey linux-seamonkey 2.49.4 firefox-esr 60.0,160.1.0_1,1 52.9.0_1,1 linux-firefox 52.9.0,2 libxul thunderbird linux-thunderbird 52.9.0

Mozilla Foundation reports:

CVE-2018-12359: Buffer overflow using computed size of canvas element

CVE-2018-12360: Use-after-free when using focus()

CVE-2018-12361: Integer overflow in SwizzleData

CVE-2018-12358: Same-origin bypass using service worker and redirection

CVE-2018-12362: Integer overflow in SSSE3 scaler

CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture

CVE-2018-12363: Use-after-free when appending DOM nodes

CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins

CVE-2018-12365: Compromised IPC child process can list local filenames

CVE-2018-12371: Integer overflow in Skia library during edge builder allocation

CVE-2018-12366: Invalid data handling during QCMS transformations

CVE-2018-12367: Timing attack mitigation of PerformanceNavigationTiming

CVE-2018-12368: No warning when opening executable SettingContent-ms files

CVE-2018-12369: WebExtension security permission checks bypassed by embedded experiments

CVE-2018-12370: SameSite cookie protections bypassed when exiting Reader View

CVE-2018-5186: Memory safety bugs fixed in Firefox 61

CVE-2018-5187: Memory safety bugs fixed in Firefox 60 and Firefox ESR 60.1

CVE-2018-5188: Memory safety bugs fixed in Firefox 60, Firefox ESR 60.1, and Firefox ESR 52.9

CVE-2018-5156 CVE-2018-5186 CVE-2018-5187 CVE-2018-5188 CVE-2018-12358 CVE-2018-12359 CVE-2018-12360 CVE-2018-12361 CVE-2018-12362 CVE-2018-12363 CVE-2018-12364 CVE-2018-12365 CVE-2018-12366 CVE-2018-12367 CVE-2018-12368 CVE-2018-12369 CVE-2018-12370 CVE-2018-12371 https://www.mozilla.org/en-US/security/advisories/mfsa2018-15/ https://www.mozilla.org/en-US/security/advisories/mfsa2018-16/ https://www.mozilla.org/en-US/security/advisories/mfsa2018-17/ 2018-06-26 2018-06-26 2018-07-07
mailman -- hardening against malicious listowners injecting evil HTML scripts mailman 2.1.27 mailman-with-htdig 2.1.27 ja-mailman 2.1.14.j7_5,1

Mark Sapiro reports:

Existing protections against malicious listowners injecting evil scripts into listinfo pages have had a few more checks added.

A few more error messages have had their values HTML escaped.

The hash generated when SUBSCRIBE_FORM_SECRET is set could have been the same as one generated at the same time for a different list and IP address.

https://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/head:/NEWS#L8 https://www.mail-archive.com/mailman-users@python.org/ CVE-2018-0618 2018-03-09 2018-06-25
Gitlab -- multiple vulnerabilities gitlab 11.0.011.0.1 10.8.010.8.5 4.110.7.6

Gitlab reports:

Wiki XSS

Sanitize gem updates

XSS in url_for(params)

Content injection via username

Activity feed publicly displaying internal project names

Persistent XSS in charts

CVE-2018-12606 CVE-2018-3740 CVE-2018-12605 CVE-2018-12607 https://about.gitlab.com/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/ 2018-06-25 2018-06-25
phpmyadmin -- remote code inclusion and XSS scripting phpmyadmin 4.8.2

The phpMyAdmin development team reports:

Summary

XSS in Designer feature

Description

A Cross-Site Scripting vulnerability was found in the Designer feature, where an attacker can deliver a payload to a user through a specially-crafted database name.

Severity

We consider this attack to be of moderate severity.

Summary

File inclusion and remote code execution attack

Description

A flaw has been discovered where an attacker can include (view and potentially execute) files on the server.

The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages.

An attacker must be authenticated, except in these situations:

  • $cfg['AllowArbitraryServer'] = true: attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin
  • $cfg['ServerDefault'] = 0: this bypasses the login and runs the vulnerable code without any authentication

Severity

We consider this to be severe.

Mitigation factor

Configuring PHP with a restrictive `open_basedir` can greatly restrict an attacker's ability to view files on the server. Vulnerable systems should not be run with the phpMyAdmin directives $cfg['AllowArbitraryServer'] = true or $cfg['ServerDefault'] = 0

https://www.phpmyadmin.net/security/PMASA-2018-3/ https://www.phpmyadmin.net/security/PMASA-2018-4/ CVE-2018-12581 CVE-2018-12613 2018-06-21 2018-06-22
FreeBSD -- Lazy FPU State Restore Information Disclosure FreeBSD-kernel 11.111.1_11

Problem Description:

A subset of Intel processors can allow a local thread to infer data from another thread through a speculative execution side channel when Lazy FPU state restore is used.

Impact:

Any local thread can potentially read FPU state information from other threads running on the host. This could include cryptographic keys when the AES-NI CPU feature is present.

CVE-2018-3665 SA-18:07.lazyfpu 2018-06-21 2018-06-21
GraphicsMagick -- multiple vulnerabilities GraphicsMagick 1.3.26,1

GraphicsMagick reports:

Multiple vulnerabilities have been found in GraphicsMagick 1.3.26 or earlier. Please refer to the CVE list for details.

http://www.graphicsmagick.org/NEWS.html CVE-2016-7800 CVE-2016-7996 CVE-2016-7997 CVE-2016-9830 CVE-2017-6335 CVE-2017-8350 CVE-2017-10794 CVE-2017-10799 CVE-2017-10800 2017-07-04 2018-06-18
slurm -- insecure handling of user_name and gid fields slurm-wlm 17.02.11

SchedMD reports:

Insecure handling of user_name and gid fields (CVE-2018-10995)

While fixes are only available for the supported 17.02 and 17.11 releases, it is believed that similar vulnerabilities do affect past versions as well. The only resolution is to upgrade Slurm to a fixed release.

https://lists.schedmd.com/pipermail/slurm-announce/2018/000008.html 2018-05-30 2018-06-16
node.js -- multiple vulnerabilities node6 6.14.3 node8 8.11.3 node 10.4.1

Node.js reports:

Denial of Service Vulnerability in HTTP/2 (CVE-2018-7161)

All versions of 8.x and later are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation. Thanks to Jordan Zebor at F5 Networks for reporting this issue.

Denial of Service, nghttp2 dependency (CVE-2018-1000168)

All versions of 9.x and later are vulnerable and the severity is HIGH. Under certain conditions, a malicious client can trigger an uninitialized read (and a subsequent segfault) by sending a malformed ALTSVC frame. This has been addressed through an by updating nghttp2.

Denial of Service Vulnerability in TLS (CVE-2018-7162)

All versions of 9.x and later are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node process which provides an http server supporting TLS server to crash. This can be accomplished by sending duplicate/unexpected messages during the handshake. This vulnerability has been addressed by updating the TLS implementation. Thanks to Jordan Zebor at F5 Networks all of his help investigating this issue with the Node.js team.

Memory exhaustion DoS on v9.x (CVE-2018-7164)

Versions 9.7.0 and later are vulnerable and the severity is MEDIUM. A bug introduced in 9.7.0 increases the memory consumed when reading from the network into JavaScript using the net.Socket object directly as a stream. An attacker could use this cause a denial of service by sending tiny chunks of data in short succession. This vulnerability was restored by reverting to the prior behaviour.

Calls to Buffer.fill() and/or Buffer.alloc() may hang (CVE-2018-7167)

Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases.

https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/ https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/ CVE-2018-7161 CVE-2018-7162 CVE-2018-7164 CVE-2018-7167 CVE-2018-1000168 2018-06-12 2018-06-15
password-store -- GPG parsing vulnerabilities password-store 1.7.2

Jason A. Donenfeld reports:

Markus Brinkmann discovered that [the] parsing of gpg command line output with regexes isn't anchored to the beginning of the line, which means an attacker can generate a malicious key that simply has the verification string as part of its username.

This has a number of nasty consequences:

  • an attacker who manages to write into your ~/.password-store and also inject a malicious key into your keyring can replace your .gpg-id key and have your passwords encrypted under additional keys;
  • if you have extensions enabled (disabled by default), an attacker who manages to write into your ~/.password-store and also inject a malicious key into your keyring can replace your extensions and hence execute code.
https://lists.zx2c4.com/pipermail/password-store/2018-June/003308.html CVE-2018-12356 2018-06-14 2018-06-14
libgcrypt -- side-channel attack vulnerability libgcrypt 1.8.3

GnuPG reports:

Mitigate a local side-channel attack on ECDSA signature as described in the white paper "Return on the Hidden Number Problem".

CVE-2018-0495 https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495 https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.4-relnotes.txt 2018-06-13 2018-06-13 2018-06-14
OpenSSL -- Client DoS due to large DH parameter libressl libressl-devel 2.6.5 2.7.02.7.4 openssl 1.0.2o_4,1 openssl-devel 1.1.0h_2

The OpenSSL project reports:

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack.

https://www.openssl.org/news/secadv/20180612.txt CVE-2018-0732 2018-06-12 2018-06-12 2018-07-24
asterisk -- PJSIP endpoint presence disclosure when using ACL asterisk13 13.21.1 asterisk15 15.4.1

The Asterisk project reports:

When endpoint specific ACL rules block a SIP request they respond with a 403 forbidden. However, if an endpoint is not identified then a 401 unauthorized response is sent. This vulnerability just discloses which requests hit a defined endpoint. The ACL rules cannot be bypassed to gain access to the disclosed endpoints.

https://downloads.asterisk.org/pub/security/AST-2018-008.html 2018-06-11 2018-06-11
asterisk -- Infinite loop when reading iostreams asterisk15 15.4.1

The Asterisk project reports:

When connected to Asterisk via TCP/TLS if the client abruptly disconnects, or sends a specially crafted message then Asterisk gets caught in an infinite loop while trying to read the data stream. Thus rendering the system as unusable.

https://downloads.asterisk.org/pub/security/AST-2018-007.html 2018-06-11 2018-06-11
chromium -- Incorrect handling of CSP header chromium 67.0.3396.79

Google Chrome Releases reports:

1 security fix contributed by external researchers:

  • [845961] High CVE-2018-6148: Incorrect handling of CSP header. Reported by Michal Bentkowski on 2018-05-23
CVE-2018-6148 https://chromereleases.googleblog.com/2018/06/stable-channel-update-for-desktop.html 2018-06-06 2018-06-10
gnupg -- unsanitized output (CVE-2018-12020) gnupg 2.2.8 gnupg1 1.4.23

GnuPG reports:

GnuPG did not sanitize input file names, which may then be output to the terminal. This could allow terminal control sequences or fake status messages to be injected into the output.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020 CVE-2018-12020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526 CVE-2017-7526 2018-06-07 2018-06-08
firefox -- Heap buffer overflow rasterizing paths in SVG with Skia firefox 60.0.2,1 waterfox 56.2.0.13_5 firefox-esr 52.8.1,1 seamonkey linux-seamonkey 2.49.4

The Mozilla Foundation reports:

A heap buffer overflow can occur in the Skia library when rasterizing paths using a maliciously crafted SVG file with anti-aliasing turned off. This results in a potentially exploitable crash.

https://www.mozilla.org/security/advisories/mfsa2018-14/ 2018-06-06 2018-06-08
Flash Player -- multiple vulnerabilities linux-flashplayer 30.0.0.113

Adobe reports:

  • This update resolves a type confusion vulnerability that could lead to arbitrary code execution (CVE-2018-4945).
  • This update resolves an integer overflow vulnerability that could lead to information disclosure (CVE-2018-5000).
  • This update resolves an out-of-bounds read vulnerability that could lead to information disclosure (CVE-2018-5001).
  • This update resolves a stack-based buffer overflow vulnerability that could lead to arbitrary code execution (CVE-2018-5002).
CVE-2018-4945 CVE-2018-5000 CVE-2018-5001 CVE-2018-5002 https://helpx.adobe.com/security/products/flash-player/apsb18-19.html 2018-06-07 2018-06-07 2018-07-11
bro -- multiple memory allocation issues bro 2.5.4

Corelight reports:

Bro 2.5.4 primarily fixes security issues

Multiple fixes and improvements to BinPAC generated code related to array parsing, with potential impact to all Bro's BinPAC-generated analyzers in the form of buffer over-reads or other invalid memory accesses depending on whether a particular analyzer incorrectly assumed that the evaulated-array-length expression is actually the number of elements that were parsed out from the input.

The NCP analyzer (not enabled by default and also updated to actually work with newer Bro APIs in the release) performed a memory allocation based directly on a field in the input packet and using signed integer storage. This could result in a signed integer overflow and memory allocations of negative or very large size, leading to a crash or memory exhaustion. The new NCP::max_frame_size tuning option now limits the maximum amount of memory that can be allocated.

https://www.bro.org/download/NEWS.bro.html 2018-05-29 2018-06-06
Libgit2 -- Fixing insufficient validation of submodule names libgit2 py-pygit2 0.27.1

The Git community reports:

Insufficient validation of submodule names

https://github.com/libgit2/libgit2/releases/tag/v0.27.1 CVE-2018-11235 2018-05-29 2018-06-05
Git -- Fix memory out-of-bounds and remote code execution vulnerabilities (CVE-2018-11233 and CVE-2018-11235) git git-lite 2.13.7 2.142.14.4 2.152.15.2 2.162.16.4 2.172.17.1

The Git community reports:

  • In affected versions of Git, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.
  • In affected versions of Git, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11233 CVE-2018-11233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235 CVE-2018-11235 2018-05-29 2018-06-02
Gitlab -- multiple vulnerabilities gitlab 10.8.010.8.2 10.7.010.7.5 1.010.6.6

GitLab reports:

Removing public deploy keys regression

Users can update their password without entering current password

Persistent XSS - Selecting users as allowed merge request approvers

Persistent XSS - Multiple locations of user selection drop downs

include directive in .gitlab-ci.yml allows SSRF requests

Permissions issue in Merge Requests Create Service

Arbitrary assignment of project fields using "Import project"

https://about.gitlab.com/2018/05/29/security-release-gitlab-10-dot-8-dot-2-released/ 2018-05-29 2018-05-31
strongswan -- Fix Denial-of-Service Vulnerability strongSwan (CVE-2018-10811, CVE-2018-5388) strongswan 5.6.3

strongSwan security team reports:

  • A denial-of-service vulnerability in the IKEv2 key derivation was fixed if the openssl plugin is used in FIPS mode and HMAC-MD5 is negotiated as PRF (which is not FIPS-compliant). So this should only affect very specific setups, but in such configurations all strongSwan versions since 5.0.1 may be affected.
  • A denial-of-service vulnerability in the stroke plugin was fixed. When reading a message from the socket the plugin did not check the received length. Unless a group is configured, root privileges are required to access that socket, so in the default configuration this shouldn't be an issue, but all strongSwan versions may be affected.
https://www.strongswan.org/blog/2018/05/28/strongswan-vulnerability-(cve-2018-10811).html CVE-2018-10811 https://www.strongswan.org/blog/2018/05/28/strongswan-vulnerability-(cve-2018-5388).html CVE-2018-5388 2018-05-16 2018-05-31
chromium -- multiple vulnerabilities chromium 67.0.3396.62

Google Chrome Releases reports:

34 security fixes in this release, including:

  • [835639] High CVE-2018-6123: Use after free in Blink. Reported by Looben Yang on 2018-04-22
  • [840320] High CVE-2018-6124: Type confusion in Blink. Reported by Guang Gong of Alpha Team, Qihoo 360 on 2018-05-07
  • [818592] High CVE-2018-6125: Overly permissive policy in WebUSB. Reported by Yubico, Inc on 2018-03-05
  • [844457] High CVE-2018-6126: Heap buffer overflow in Skia. Reported by Ivan Fratric of Google Project Zero on 2018-05-18
  • [842990] High CVE-2018-6127: Use after free in indexedDB. Reported by Looben Yang on 2018-05-15
  • [841105] High CVE-2018-6128: uXSS in Chrome on iOS. Reported by Tomasz Bojarski on 2018-05-09
  • [838672] High CVE-2018-6129: Out of bounds memory access in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2018-05-01
  • [838402] High CVE-2018-6130: Out of bounds memory access in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2018-04-30
  • [826434] High CVE-2018-6131: Incorrect mutability protection in WebAssembly. Reported by Natalie Silvanovich of Google Project Zero on 2018-03-27
  • [839960] Medium CVE-2018-6132: Use of uninitialized memory in WebRTC. Reported by Ronald E. Crane on 2018-05-04
  • [817247] Medium CVE-2018-6133: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-28
  • [797465] Medium CVE-2018-6134: Referrer Policy bypass in Blink. Reported by Jun Kokatsu (@shhnjk) on 2017-12-23
  • [823353] Medium CVE-2018-6135: UI spoofing in Blink. Reported by Jasper Rebane on 2018-03-19
  • [831943] Medium CVE-2018-6136: Out of bounds memory access in V8. Reported by Peter Wong on 2018-04-12
  • [835589] Medium CVE-2018-6137: Leak of visited status of page in Blink. Reported by Michael Smith (spinda.net) on 2018-04-21
  • [810220] Medium CVE-2018-6138: Overly permissive policy in Extensions. Reported by Francois Lajeunesse-Robert on 2018-02-08
  • [805224] Medium CVE-2018-6139: Restrictions bypass in the debugger extension API. Reported by Rob Wu on 2018-01-24
  • [798222] Medium CVE-2018-6140: Restrictions bypass in the debugger extension API. Reported by Rob Wu on 2018-01-01
  • [796107] Medium CVE-2018-6141: Heap buffer overflow in Skia. Reported by Yangkang (@dnpushme) and Wanglu of Qihoo360 Qex Team on 2017-12-19
  • [837939] Medium CVE-2018-6142: Out of bounds memory access in V8. Reported by Choongwoo Han of Naver Corporation on 2018-04-28
  • [843022] Medium CVE-2018-6143: Out of bounds memory access in V8. Reported by Guang Gong of Alpha Team, Qihoo 360 on 2018-05-15
  • [828049] Low CVE-2018-6144: Out of bounds memory access in PDFium. Reported by pdknsk on 2018-04-02
  • [805924] Low CVE-2018-6145: Incorrect escaping of MathML in Blink. Reported by Masato Kinugawa on 2018-01-25
  • [818133] Low CVE-2018-6147: Password fields not taking advantage of OS protections in Views. Reported by Michail Pishchagin (Yandex) on 2018-03-02
  • [847542] Various fixes from internal audits, fuzzing and other initiatives
CVE-2018-6123 CVE-2018-6124 CVE-2018-6125 CVE-2018-6126 CVE-2018-6127 CVE-2018-6128 CVE-2018-6129 CVE-2018-6130 CVE-2018-6131 CVE-2018-6132 CVE-2018-6133 CVE-2018-6134 CVE-2018-6135 CVE-2018-6136 CVE-2018-6137 CVE-2018-6138 CVE-2018-6139 CVE-2018-6140 CVE-2018-6141 CVE-2018-6142 CVE-2018-6143 CVE-2018-6144 CVE-2018-6145 CVE-2018-6147 https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop_58.html 2018-05-29 2018-05-30
BIND -- multiple vulnerabilities bind912 9.12.1P2

ISC reports:

An error in zone database reference counting can lead to an assertion failure if a server which is running an affected version of BIND attempts several transfers of a slave zone in quick succession.

A problem with the implementation of the new serve-stale feature in BIND 9.12 can lead to an assertion failure in rbtdb.c, even when stale-answer-enable is off. Additionally, problematic interaction between the serve-stale feature and NSEC aggressive negative caching can in some cases cause undesirable behavior from named, such as a recursion loop or excessive logging.

CVE-2018-5736 CVE-2018-5737 https://kb.isc.org/article/AA-01602 https://kb.isc.org/article/AA-01606 2018-05-18 2018-05-21
cURL -- multiple vulnerabilities curl 7.60.0

cURL security problems:

CVE-2018-1000300: FTP shutdown response buffer overflow

curl might overflow a heap based memory buffer when closing down an FTP connection with very long server command replies.

When doing FTP transfers, curl keeps a spare "closure handle" around internally that will be used when an FTP connection gets shut down since the original curl easy handle is then already removed.

FTP server response data that gets cached from the original transfer might then be larger than the default buffer size (16 KB) allocated in the "closure handle", which can lead to a buffer overwrite. The contents and size of that overwrite is controllable by the server.

This situation was detected by an assert() in the code, but that was of course only preventing bad stuff in debug builds. This bug is very unlikely to trigger with non-malicious servers.

We are not aware of any exploit of this flaw.

CVE-2018-1000301: RTSP bad headers buffer over-read

curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded content.

When servers send RTSP responses back to curl, the data starts out with a set of headers. curl parses that data to separate it into a number of headers to deal with those appropriately and to find the end of the headers that signal the start of the "body" part.

The function that splits up the response into headers is called Curl_http_readwrite_headers() and in situations where it can't find a single header in the buffer, it might end up leaving a pointer pointing into the buffer instead of to the start of the buffer which then later on may lead to an out of buffer read when code assumes that pointer points to a full buffer size worth of memory to use.

This could potentially lead to information leakage but most likely a crash/denial of service for applications if a server triggers this flaw.

We are not aware of any exploit of this flaw.

https://curl.haxx.se/docs/security.html https://curl.haxx.se/docs/adv_2018-82c2.html https://curl.haxx.se/docs/adv_2018-b138.html CVE-2018-1000300 CVE-2018-1000301 2018-05-16 2018-05-16
wavpack -- multiple vulnerabilities wavpack 5.1.0_1

Sebastian Ramacher reports:

A stack-based buffer over-read in the ParseRiffHeaderConfig function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service attack or possibly have unspecified other impact via a maliciously crafted RF64 file.

The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.

The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file.

Thuan Pham reports:

An issue was discovered in WavPack 5.1.0 and earlier. The WAV parser component contains a vulnerability that allows writing to memory because ParseRiffHeaderConfig in riff.c does not reject multiple format chunks.

An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks.

An issue was discovered in WavPack 5.1.0 and earlier for WAV input. Out-of-bounds writes can occur because ParseRiffHeaderConfig in riff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.

An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.

An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.

CVE-2018-6767 CVE-2018-7253 CVE-2018-7254 CVE-2018-10536 CVE-2018-10537 CVE-2018-10538 CVE-2018-10539 CVE-2018-10540 https://www.debian.org/security/2018/dsa-4125 https://www.debian.org/security/2018/dsa-4197 228141 2018-05-09 2018-05-11
chromium -- multiple vulnerabilities chromium 66.0.3359.170

Google Chrome Releases reports:

4 security fixes in this release:

  • [835887] Critical: Chain leading to sandbox escape. Reported by Anonymous on 2018-04-23
  • [836858] High CVE-2018-6121: Privilege Escalation in extensions
  • [836141] High CVE-2018-6122: Type confusion in V8
  • [833721] High CVE-2018-6120: Heap buffer overflow in PDFium. Reported by Zhou Aiting(@zhouat1) of Qihoo 360 Vulcan Team on 2018-04-17
  • [841841] Various fixes from internal audits, fuzzing and other initiatives
CVE-2018-6120 CVE-2018-6121 CVE-2018-6122 https://chromereleases.googleblog.com/2018/05/stable-channel-update-for-desktop.html 2018-04-14 2018-05-11
jenkins -- multiple vulnerabilities jenkins 2.120 jenkins-lts 2.107.2

Jenkins developers report:

The agent to master security subsystem ensures that the Jenkins master is protected from maliciously configured agents. A path traversal vulnerability allowed agents to escape whitelisted directories to read and write to files they should not be able to access.

Black Duck Hub Plugin's API endpoint was affected by an XML External Entity (XXE) processing vulnerability. This allowed an attacker with Overall/Read access to have Jenkins parse a maliciously crafted file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks.

Several other lower severity issues were reported, see reference url for details.

https://jenkins.io/security/advisory/2018-05-09/ 2018-05-09 2018-05-10
mozilla -- multiple vulnerabilities firefox 60.0,1 waterfox 56.1.0_18 seamonkey linux-seamonkey 2.49.4 firefox-esr 52.8.0,1 linux-firefox 52.8.0,2 libxul thunderbird linux-thunderbird 52.8.0

Mozilla Foundation reports:

CVE-2018-5183: Backport critical security fixes in Skia

CVE-2018-5154: Use-after-free with SVG animations and clip paths

CVE-2018-5155: Use-after-free with SVG animations and text paths

CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files

CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer

CVE-2018-5159: Integer overflow and out-of-bounds write in Skia

CVE-2018-5160: Uninitialized memory use by WebRTC encoder

CVE-2018-5152: WebExtensions information leak through webRequest API

CVE-2018-5153: Out-of-bounds read in mixed content websocket messages

CVE-2018-5163: Replacing cached data in JavaScript Start-up Bytecode Cache

CVE-2018-5164: CSP not applied to all multipart content sent with multipart/x-mixed-replace

CVE-2018-5166: WebExtension host permission bypass through filterReponseData

CVE-2018-5167: Improper linkification of chrome: and javascript: content in web console and JavaScript debugger

CVE-2018-5168: Lightweight themes can be installed without user interaction

CVE-2018-5169: Dragging and dropping link text onto home button can set home page to include chrome pages

CVE-2018-5172: Pasted script from clipboard can run in the Live Bookmarks page or PDF viewer

CVE-2018-5173: File name spoofing of Downloads panel with Unicode characters

CVE-2018-5174: Windows Defender SmartScreen UI runs with less secure behavior for downloaded files in Windows 10 April 2018 Update

CVE-2018-5175: Universal CSP bypass on sites using strict-dynamic in their policies

CVE-2018-5176: JSON Viewer script injection

CVE-2018-5177: Buffer overflow in XSLT during number formatting

CVE-2018-5165: Checkbox for enabling Flash protected mode is inverted in 32-bit Firefox

CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension

CVE-2018-5180: heap-use-after-free in mozilla::WebGLContext::DrawElementsInstanced

CVE-2018-5181: Local file can be displayed in noopener tab through drag and drop of hyperlink

CVE-2018-5182: Local file can be displayed from hyperlink dragged and dropped on addressbar

CVE-2018-5151: Memory safety bugs fixed in Firefox 60

CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8

CVE-2018-5150 CVE-2018-5151 CVE-2018-5152 CVE-2018-5153 CVE-2018-5154 CVE-2018-5155 CVE-2018-5157 CVE-2018-5158 CVE-2018-5159 CVE-2018-5160 CVE-2018-5163 CVE-2018-5164 CVE-2018-5165 CVE-2018-5166 CVE-2018-5167 CVE-2018-5168 CVE-2018-5169 CVE-2018-5172 CVE-2018-5173 CVE-2018-5174 CVE-2018-5175 CVE-2018-5176 CVE-2018-5177 CVE-2018-5178 CVE-2018-5180 CVE-2018-5181 CVE-2018-5182 CVE-2018-5183 https://www.mozilla.org/security/advisories/mfsa2018-11/ https://www.mozilla.org/security/advisories/mfsa2018-12/ 2018-05-09 2018-05-09
kamailio - buffer overflow kamailio 5.1.2

A specially crafted REGISTER message with a malformed branch or From tag triggers an off-by-one heap-based buffer overflow in the tmx_check_pretran function in modules/tmx/tmx_pretran.c

CVE-2018-8828 https://www.kamailio.org/w/2018/03/kamailio-security-announcement-tmx-lcr/ https://github.com/EnableSecurity/advisories/tree/master/ES2018-05-kamailio-heap-overflow 2018-02-10 2018-05-06
wget -- cookie injection vulnerability wget 1.19.5

Harry Sintonen of F-Secure Corporation reports:

GNU Wget is susceptible to a malicious web server injecting arbitrary cookies to the cookie jar file.

https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt CVE-2018-0494 ports/228071 2018-04-26 2018-05-08
Flash Player -- arbitrary code execution linux-flashplayer 29.0.0.171

Adobe reports:

  • This update resolves a type confusion vulnerability that could lead to arbitrary code execution (CVE-2018-4944).
CVE-2018-4944 https://helpx.adobe.com/security/products/flash-player/apsb18-16.html 2018-05-08 2018-05-09
FreeBSD -- Mishandling of x86 debug exceptions FreeBSD-kernel 11.111.1_10 10.410.4_9

Problem Description:

The MOV SS and POP SS instructions inhibit debug exceptions until the instruction boundary following the next instruction. If that instruction is a system call or similar instruction that transfers control to the operating system, the debug exception will be handled in the kernel context instead of the user context.

Impact:

An authenticated local attacker may be able to read sensitive data in kernel memory, control low-level operating system functions, or may panic the system.

CVE-2018-8897 SA-18:06.debugreg 2018-05-08 2018-05-08
python 2.7 -- multiple vulnerabilities python27 2.7.15

python release notes:

Multiple vulnerabilities has been fixed in this release. Please refer to the CVE list for details.

https://github.com/python/cpython/blob/2.7/Misc/NEWS.d/2.7.15rc1.rst https://github.com/python/cpython/blob/2.7/Misc/NEWS.d/2.7.15.rst CVE-2012-0876 CVE-2016-0718 CVE-2016-4472 CVE-2016-9063 CVE-2017-9233 CVE-2018-1060 CVE-2018-1061 2018-05-01 2018-05-05
KWallet-PAM -- Access to privileged files plasma5-kwallet-pam 5.12.5_1

The KDE Community reports:

kwallet-pam was doing file writing and permission changing as root that with correct timing and use of carefully crafted symbolic links could allow a non privileged user to become the owner of any file on the system.

https://www.kde.org/info/security/advisory-20180503-1.txt 2018-05-04 2018-05-04
drupal -- Drupal Core - Multiple Vulnerabilities drupal7 7.58 drupal8 8.5.2

Drupal Security Team reports:

A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.

https://www.drupal.org/SA-CORE-2018-004 2018-04-25 2018-05-03
Gitlab -- multiple vulnerabilities gitlab 10.7.010.7.2 10.6.010.6.5 9.5.010.5.8

GitLab reports:

Persistent XSS in Move Issue using project namespace

Download Archive allowing unauthorized private repo access

Mattermost Updates

CVE-2018-10379 https://about.gitlab.com/2018/04/30/security-release-gitlab-10-dot-7-dot-2-released 2018-04-30 2018-05-01
chromium -- vulnerability chromium 66.0.3359.139

Google Chrome Releases reports:

3 security fixes in this release:

  • [831963] Critical CVE-2018-6118: Use after free in Media Cache. Reported by Ned Williamson on 2018-04-12
  • [837635] Various fixes from internal audits, fuzzing and other initiatives
CVE-2018-6118 https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop_26.html 2018-04-12 2018-04-30
quassel -- multiple vulnerabilities quassel 0.12.5 quassel-core 0.12.5

Gentoo reports:

quasselcore: corruption of heap metadata caused by qdatastream leading to preauth remote code execution.

  • Severity: high, by default the server port is publicly open and the address can be requested using the /WHOIS command of IRC protocol.
  • Description: In Qdatastream protocol each object is prepended with 4 bytes for the object size, this can be used to trigger allocation errors.

quasselcore DDOS

  • Severity: low, only impacts unconfigured quasselcore instances.
  • Description: A login attempt causes a NULL pointer dereference when the database is not initialized.
https://bugs.gentoo.org/653834 https://github.com/quassel/quassel/commit/08bace4e9ecf08273f094c0c6aa8b3363d38ac3e https://github.com/quassel/quassel/commit/18389a713a6810f57ab237b945e8ee03df857b8b 2018-04-24 2018-04-26
chromium -- vulnerability chromium 66.0.3359.117

Google Chrome Releases reports:

62 security fixes in this release:

  • [826626] Critical CVE-2018-6085: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-28
  • [827492] Critical CVE-2018-6086: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-30
  • [813876] High CVE-2018-6087: Use after free in WebAssembly. Reported by Anonymous on 2018-02-20
  • [822091] High CVE-2018-6088: Use after free in PDFium. Reported by Anonymous on 2018-03-15
  • [808838] High CVE-2018-6089: Same origin policy bypass in Service Worker. Reported by Rob Wu on 2018-02-04
  • [820913] High CVE-2018-6090: Heap buffer overflow in Skia. Reported by ZhanJia Song on 2018-03-12
  • [771933] High CVE-2018-6091: Incorrect handling of plug-ins by Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-10-05
  • [819869] High CVE-2018-6092: Integer overflow in WebAssembly. Reported by Natalie Silvanovich of Google Project Zero on 2018-03-08
  • [780435] Medium CVE-2018-6093: Same origin bypass in Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-11-01
  • [633030] Medium CVE-2018-6094: Exploit hardening regression in Oilpan. Reported by Chris Rohlf on 2016-08-01
  • [637098] Medium CVE-2018-6095: Lack of meaningful user interaction requirement before file upload. Reported by Abdulrahman Alqabandi (@qab) on 2016-08-11
  • [776418] Medium CVE-2018-6096: Fullscreen UI spoof. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-19
  • [806162] Medium CVE-2018-6097: Fullscreen UI spoof. Reported by xisigr of Tencent's Xuanwu Lab on 2018-01-26
  • [798892] Medium CVE-2018-6098: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-01-03
  • [808825] Medium CVE-2018-6099: CORS bypass in ServiceWorker. Reported by Jun Kokatsu (@shhnjk) on 2018-02-03
  • [811117] Medium CVE-2018-6100: URL spoof in Omnibox. Reported by Lnyas Zhang on 2018-02-11
  • [813540] Medium CVE-2018-6101: Insufficient protection of remote debugging prototol in DevTools . Reported by Rob Wu on 2018-02-19
  • [813814] Medium CVE-2018-6102: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-20
  • [816033] Medium CVE-2018-6103: UI spoof in Permissions. Reported by Khalil Zhani on 2018-02-24
  • [820068] Medium CVE-2018-6104: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-03-08
  • [803571] Medium CVE-2018-6105: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-01-18
  • [805729] Medium CVE-2018-6106: Incorrect handling of promises in V8. Reported by lokihardt of Google Project Zero on 2018-01-25
  • [808316] Medium CVE-2018-6107: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-02
  • [816769] Medium CVE-2018-6108: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-27
  • [710190] Low CVE-2018-6109: Incorrect handling of files by FileAPI. Reported by Dominik Weber (@DoWeb_) on 2017-04-10
  • [777737] Low CVE-2018-6110: Incorrect handling of plaintext files via file:// . Reported by Wenxiang Qian (aka blastxiang) on 2017-10-24
  • [780694] Low CVE-2018-6111: Heap-use-after-free in DevTools. Reported by Khalil Zhani on 2017-11-02
  • [798096] Low CVE-2018-6112: Incorrect URL handling in DevTools. Reported by Rob Wu on 2017-12-29
  • [805900] Low CVE-2018-6113: URL spoof in Navigation. Reported by Khalil Zhani on 2018-01-25
  • [811691] Low CVE-2018-6114: CSP bypass. Reported by Lnyas Zhang on 2018-02-13
  • [819809] Low CVE-2018-6115: SmartScreen bypass in downloads. Reported by James Feher on 2018-03-07
  • [822266] Low CVE-2018-6116: Incorrect low memory handling in WebAssembly. Reported by Jin from Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd. on 2018-03-15
  • [822465] Low CVE-2018-6117: Confusing autofill settings. Reported by Spencer Dailey on 2018-03-15
  • [822424] Low CVE-2018-6084: Incorrect use of Distributed Objects in Google Software Updater on MacOS. Reported by Ian Beer of Google Project Zero on 2018-03-15
https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html CVE-2018-6085 CVE-2018-6086 CVE-2018-6087 CVE-2018-6088 CVE-2018-6089 CVE-2018-6090 CVE-2018-6091 CVE-2018-6092 CVE-2018-6093 CVE-2018-6094 CVE-2018-6095 CVE-2018-6096 CVE-2018-6097 CVE-2018-6098 CVE-2018-6099 CVE-2018-6100 CVE-2018-6101 CVE-2018-6102 CVE-2018-6103 CVE-2018-6104 CVE-2018-6105 CVE-2018-6106 CVE-2018-6107 CVE-2018-6108 CVE-2018-6109 CVE-2018-6110 CVE-2018-6111 CVE-2018-6112 CVE-2018-6113 CVE-2018-6114 CVE-2018-6115 CVE-2018-6116 CVE-2018-6117 CVE-2018-6084 2017-04-10 2018-04-24
mbed TLS (PolarSSL) -- multiple vulnerabilities mbedtls 2.7.2 polarssl13 *

Simon Butcher reports:

  • Defend against Bellcore glitch attacks by verifying the results of RSA private key operations.
  • Fix implementation of the truncated HMAC extension. The previous implementation allowed an offline 2^80 brute force attack on the HMAC key of a single, uninterrupted connection (with no resumption of the session).
  • Reject CRLs containing unsupported critical extensions. Found by Falko Strenzke and Evangelos Karatsiolis.
  • Fix a buffer overread in ssl_parse_server_key_exchange() that could cause a crash on invalid input.
  • Fix a buffer overread in ssl_parse_server_psk_hint() that could cause a crash on invalid input.
https://tls.mbed.org/tech-updates/releases/mbedtls-2.8.0-2.7.2-and-2.1.11-released 2018-03-21 2018-04-23
MySQL -- multiple vulnerabilities mariadb55-server 5.5.60 mariadb100-server 10.0.35 mariadb101-server 10.1.33 mariadb102-server 10.2.15 mysql55-server 5.5.60 mysql56-server 5.6.40 mysql57-server 5.7.22 percona55-server 5.5.60 percona56-server 5.6.40 percona57-server 5.7.22

Oracle reports:

MySQL Multiple Flaws Let Remote Authenticated Users Access and Modify Data, Remote and Local Users Deny Service, and Local Users Access Data and Gain Elevated Privileges

  • A local user can exploit a flaw in the Replication component to gain elevated privileges [CVE-2018-2755].
  • A remote authenticated user can exploit a flaw in the GIS Extension component to cause denial of service conditions [CVE-2018-2805].
  • A remote authenticated user can exploit a flaw in the InnoDB component to cause denial of service conditions [CVE-2018-2782, CVE-2018-2784, CVE-2018-2819].
  • A remote authenticated user can exploit a flaw in the Security Privileges component to cause denial of service conditions [CVE-2018-2758, CVE-2018-2818].
  • A remote authenticated user can exploit a flaw in the DDL component to cause denial of service conditions [CVE-2018-2817].
  • A remote authenticated user can exploit a flaw in the Optimizer component to cause denial of service conditions [CVE-2018-2775, CVE-2018-2778, CVE-2018-2779, CVE-2018-2780, CVE-2018-2781, CVE-2018-2816].
  • A remote user can exploit a flaw in the Client programs component to cause denial of service conditions [CVE-2018-2761, CVE-2018-2773].
  • A remote authenticated user can exploit a flaw in the InnoDB component to partially modify data and cause denial of service conditions [CVE-2018-2786, CVE-2018-2787].
  • A remote authenticated user can exploit a flaw in the Optimizer component to partially modify data and cause denial of service conditions [CVE-2018-2812].
  • A local user can exploit a flaw in the Cluster ndbcluster/plugin component to cause denial of service conditions [CVE-2018-2877].
  • A remote authenticated user can exploit a flaw in the InnoDB component to cause denial of service conditions [CVE-2018-2759, CVE-2018-2766, CVE-2018-2777, CVE-2018-2810].
  • A remote authenticated user can exploit a flaw in the DML component to cause denial of service conditions [CVE-2018-2839].
  • A remote authenticated user can exploit a flaw in the Performance Schema component to cause denial of service conditions [CVE-2018-2846].
  • A remote authenticated user can exploit a flaw in the Pluggable Auth component to cause denial of service conditions [CVE-2018-2769].
  • A remote authenticated user can exploit a flaw in the Group Replication GCS component to cause denial of service conditions [CVE-2018-2776].
  • A local user can exploit a flaw in the Connection component to cause denial of service conditions [CVE-2018-2762].
  • A remote authenticated user can exploit a flaw in the Locking component to cause denial of service conditions [CVE-2018-2771].
  • A remote authenticated user can exploit a flaw in the DDL component to partially access data [CVE-2018-2813].
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html CVE-2018-2755 CVE-2018-2805 CVE-2018-2782 CVE-2018-2784 CVE-2018-2819 CVE-2018-2758 CVE-2018-2817 CVE-2018-2775 CVE-2018-2780 CVE-2018-2761 CVE-2018-2786 CVE-2018-2787 CVE-2018-2812 CVE-2018-2877 CVE-2018-2759 CVE-2018-2766 CVE-2018-2777 CVE-2018-2810 CVE-2018-2818 CVE-2018-2839 CVE-2018-2778 CVE-2018-2779 CVE-2018-2781 CVE-2018-2816 CVE-2018-2846 CVE-2018-2769 CVE-2018-2776 CVE-2018-2762 CVE-2018-2771 CVE-2018-2813 CVE-2018-2773 2018-04-17 2018-04-21
wordpress -- multiple issues wordpress fr-wordpress 4.9.5,1 de-wordpress zh_CN-wordpress zh_TW-wordpress ja-wordpress 4.9.5

wordpress developers reports:

Don't treat localhost as same host by default.

Use safe redirects when redirecting the login page if SSL is forced.

Make sure the version string is correctly escaped for use in generator tags.

https://wordpress.org/news/2018/04/wordpress-4-9-5-security-and-maintenance-release/ 2018-04-03 2018-04-20
phpmyadmin -- CSRF vulnerability allowing arbitrary SQL execution phpmyadmin 4.8.04.8.0.1

The phpMyAdmin development team reports:

Summary

CSRF vulnerability allowing arbitrary SQL execution

Description

By deceiving a user to click on a crafted URL, it is possible for an attacker to execute arbitrary SQL commands.

Severity

We consider this vulnerability to be critical.

https://www.phpmyadmin.net/security/PMASA-2018-2/ 2018-04-17 2018-04-19
drupal -- Drupal core - Moderately critical drupal8 8.5.2

The Drupal security team reports:

CKEditor, a third-party JavaScript library included in Drupal core, has fixed a cross-site scripting (XSS) vulnerability. The vulnerability stemmed from the fact that it was possible to execute XSS inside CKEditor when using the image2 plugin (which Drupal 8 core also uses).

https://www.drupal.org/sa-core-2018-003 2018-04-18 2018-04-19
OpenSSL -- Cache timing vulnerability openssl 1.0.2o_2,1 openssl-devel 1.1.0h_1

The OpenSSL project reports:

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key.

https://www.openssl.org/news/secadv/20180416.txt CVE-2018-0737 2018-04-16 2018-04-16
drupal -- Drupal Core - Multiple Vulnerabilities drupal7 7.57

Drupal Security Team reports:

CVE-2018-7600: Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.

CVE-2018-7600 2018-03-13 2018-04-16
perl -- multiple vulnerabilities perl5 5.24.05.24.4 5.26.05.26.2

perldelta:

CVE-2018-6797: heap-buffer-overflow (WRITE of size 1) in S_regatom (regcomp.c)

A crafted regular expression could cause a heap buffer write overflow, with control over the bytes written. [perl #132227]

CVE-2018-6798: Heap-buffer-overflow in Perl__byte_dump_string (utf8.c)

Matching a crafted locale dependent regular expression could cause a heap buffer read overflow and potentially information disclosure. [perl #132063]

CVE-2018-6913: heap-buffer-overflow in S_pack_rec

pack() could cause a heap buffer write overflow with a large item count. [perl #131844]

https://metacpan.org/changes/release/SHAY/perl-5.26.2 https://metacpan.org/changes/release/SHAY/perl-5.24.4 CVE-2018-6797 CVE-2018-6798 CVE-2018-6913 2018-04-14 2018-04-15
ipsec-tools -- remotely exploitable computational-complexity attack ipsec-tools 0.8.2_3

Robert Foggia via NetBSD GNATS reports:

The ipsec-tools racoon daemon contains a remotely exploitable computational complexity attack when parsing and storing isakmp fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending isakmp fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.

https://gnats.netbsd.org/cgi-bin/query-pr-single.pl?number=51682 CVE-2016-10396 2016-12-02 2018-04-14
nghttp2 -- Denial of service due to NULL pointer dereference libnghttp2 nghttp2 1.10.01.31.1

nghttp2 blog:

If ALTSVC frame is received by libnghttp2 and it is larger than it can accept, the pointer field which points to ALTSVC frame payload is left NULL. Later libnghttp2 attempts to access another field through the pointer, and gets segmentation fault.

ALTSVC frame is defined by RFC 7838.

The largest frame size libnghttp2 accept is by default 16384 bytes.

Receiving ALTSVC frame is disabled by default. Application has to enable it explicitly by calling nghttp2_option_set_builtin_recv_extension_type(opt, NGHTTP2_ALTSVC).

Transmission of ALTSVC is always enabled, and it does not cause this vulnerability.

ALTSVC frame is expected to be sent by server, and received by client as defined in RFC 7838.

Client and server are both affected by this vulnerability if the reception of ALTSVC frame is enabled. As written earlier, it is useless to enable reception of ALTSVC frame on server side. So, server is generally safe unless application accidentally enabled the reception of ALTSVC frame.

https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/ CVE-2018-1000168 2018-04-04 2018-04-13
roundcube -- IMAP command injection vulnerability roundcube 1.3.5,1

Upstream reports:

This update primarily fixes a recently discovered IMAP-cmd-injection vulnerability caused by insufficient input validation within the archive plugin. Details about the vulnerability are published under CVE-2018-9846.

CVE-2018-9846 https://roundcube.net/news/2018/04/11/security-update-1.3.6 2018-04-11 2018-04-13
jenkins -- multiple vulnerabilities jenkins 2.115 jenkins-lts 2.107.1

Jenkins developers report:

The Jenkins CLI sent different error responses for commands with view and agent arguments depending on the existence of the specified views or agents to unauthorized users. This allowed attackers to determine whether views or agents with specified names exist.

The Jenkins CLI now returns the same error messages to unauthorized users independent of the existence of specified view or agent names

Some JavaScript confirmation dialogs included the item name in an unsafe manner, resulting in a possible cross-site scripting vulnerability exploitable by users with permission to create or configure items.

JavaScript confirmation dialogs that include the item name now properly escape it, so it can be safely displayed.

https://jenkins.io/security/advisory/2018-04-11/ 2018-04-11 2018-04-12
Flash Player -- multiple vulnerabilities linux-flashplayer 29.0.0.140

Adobe reports:

  • This update resolves a use-after-free vulnerability that could lead to remote code execution (CVE-2018-4932).
  • This update resolves out-of-bounds read vulnerabilities that could lead to information disclosure (CVE-2018-4933, CVE-2018-4934).
  • This update resolves out-of-bounds write vulnerabilities that could lead to remote code execution (CVE-2018-4935, CVE-2018-4937).
  • This update resolves a heap overflow vulnerability that could lead to information disclosure (CVE-2018-4936).
CVE-2018-4932 CVE-2018-4933 CVE-2018-4934 CVE-2018-4935 CVE-2018-4936 CVE-2018-4937 https://helpx.adobe.com/security/products/flash-player/apsb18-08.html 2018-04-10 2018-04-10 2018-07-11
Gitlab -- multiple vulnerabilities gitlab 10.6.010.6.3 10.5.010.5.7 8.610.4.7

GitLab reports:

Confidential issue comments in Slack, Mattermost, and webhook integrations.

Persistent XSS in milestones data-milestone-id.

Persistent XSS in filename of merge request.

https://about.gitlab.com/2018/04/04/security-release-gitlab-10-dot-6-dot-3-released/ 2018-04-04 2018-04-05
FreeBSD -- ipsec crash or denial of service FreeBSD-kernel 11.111.1_9 10.410.4_8 10.310.3_29

Problem Description:

The length field of the option header does not count the size of the option header itself. This causes a problem when the length is zero, the count is then incremented by zero, which causes an infinite loop.

In addition there are pointer/offset mistakes in the handling of IPv4 options.

Impact:

A remote attacker who is able to send an arbitrary packet, could cause the remote target machine to crash.

CVE-2018-6918 SA-18:05.ipsec 2018-04-04 2018-04-05
FreeBSD -- vt console memory disclosure FreeBSD-kernel 11.111.1_9 10.410.4_8 10.310.3_29

Problem Description:

Insufficient validation of user-provided font parameters can result in an integer overflow, leading to the use of arbitrary kernel memory as glyph data. Characters that reference this data can be displayed on the screen, effectively disclosing kernel memory.

Impact:

Unprivileged users may be able to access privileged kernel data.

Such memory might contain sensitive information, such as portions of the file cache or terminal buffers. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way; for example, a terminal buffer might include a user-entered password.

CVE-2018-6917 SA-18:04.vt 2018-04-04 2018-04-05
moodle -- multiple vulnerabilities moodle31 3.1.11 moodle32 3.2.8 moodle33 3.3.5 moodle34 3.4.2

moodle reports:

Unauthenticated users can trigger custom messages to admin via paypal enrol script.

Suspended users with OAuth 2 authentication method can still log in to the site.

CVE-2018-1081 CVE-2018-1082 https://moodle.org/mod/forum/discuss.php?d=367938 2018-03-14 2018-03-31
ruby -- multiple vulnerabilities ruby 2.3.0,12.3.7,1 2.4.0,12.4.4,1 2.5.0,12.5.1,1

Ruby news:

CVE-2017-17742: HTTP response splitting in WEBrick

If a script accepts an external input and outputs it without modification as a part of HTTP responses, an attacker can use newline characters to deceive the clients that the HTTP response header is stopped at there, and can inject fake HTTP responses after the newline characters to show malicious contents to the clients.

CVE-2018-6914: Unintentional file and directory creation with directory traversal in tempfile and tmpdir

Dir.mktmpdir method introduced by tmpdir library accepts the prefix and the suffix of the directory which is created as the first parameter. The prefix can contain relative directory specifiers "../", so this method can be used to target any directory. So, if a script accepts an external input as the prefix, and the targeted directory has inappropriate permissions or the ruby process has inappropriate privileges, the attacker can create a directory or a file at any directory.

CVE-2018-8777: DoS by large request in WEBrick

If an attacker sends a large request which contains huge HTTP headers, WEBrick try to process it on memory, so the request causes the out-of-memory DoS attack.

CVE-2018-8778: Buffer under-read in String#unpack

String#unpack receives format specifiers as its parameter, and can be specified the position of parsing the data by the specifier @. If a big number is passed with @, the number is treated as the negative value, and out-of-buffer read is occurred. So, if a script accepts an external input as the argument of String#unpack, the attacker can read data on heaps.

CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket

UNIXServer.open accepts the path of the socket to be created at the first parameter. If the path contains NUL (\0) bytes, this method recognize that the path is completed before the NUL bytes. So, if a script accepts an external input as the argument of this method, the attacker can make the socket file in the unintentional path. And, UNIXSocket.open also accepts the path of the socket to be created at the first parameter without checking NUL bytes like UNIXServer.open. So, if a script accepts an external input as the argument of this method, the attacker can accepts the socket file in the unintentional path.

CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in Dir

Dir.open, Dir.new, Dir.entries and Dir.empty? accept the path of the target directory as their parameter. If the parameter contains NUL (\0) bytes, these methods recognize that the path is completed before the NUL bytes. So, if a script accepts an external input as the argument of these methods, the attacker can make the unintentional directory traversal.

https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/ https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/ https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/ https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/ https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/ https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/ https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/ https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/ https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/ CVE-2017-17742 CVE-2018-6914 CVE-2018-8777 CVE-2018-8778 CVE-2018-8779 CVE-2018-8780 2018-03-28 2018-03-29
node.js -- multiple vulnerabilities node4 4.9.0 node6 6.14.0 node8 8.11.0 node 9.10.0

Node.js reports:

Node.js Inspector DNS rebinding vulnerability (CVE-2018-7160)

Node.js 6.x and later include a debugger protocol (also known as "inspector") that can be activated by the --inspect and related command line flags. This debugger service was vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution.

'path' module regular expression denial of service (CVE-2018-7158)

The 'path' module in the Node.js 4.x release line contains a potential regular expression denial of service (ReDoS) vector. The code in question was replaced in Node.js 6.x and later so this vulnerability only impacts all versions of Node.js 4.x.

Spaces in HTTP Content-Length header values are ignored (CVE-2018-7159)

The HTTP parser in all current versions of Node.js ignores spaces in the Content-Length header, allowing input such as Content-Length: 1 2 to be interpreted as having a value of 12. The HTTP specification does not allow for spaces in the Content-Length value and the Node.js HTTP parser has been brought into line on this particular difference.

https://nodejs.org/en/blog/vulnerability/march-2018-security-releases/ CVE-2018-7158 CVE-2018-7159 CVE-2018-7160 2018-03-21 2018-03-28 2018-03-28
webkit2-gtk3 -- multiple vulnerabilities webkit2-gtk3 2.16.62.20.0

The WebKit team reports many vulnerabilities.

Please reference the CVE/URL list for details.

https://webkitgtk.org/security/WSA-2017-0008.html https://webkitgtk.org/security/WSA-2017-0009.html https://webkitgtk.org/security/WSA-2017-0010.html https://webkitgtk.org/security/WSA-2018-0001.html https://webkitgtk.org/security/WSA-2018-0002.html CVE-2017-7087 CVE-2017-7089 CVE-2017-7090 CVE-2017-7091 CVE-2017-7092 CVE-2017-7092 CVE-2017-7093 CVE-2017-7095 CVE-2017-7096 CVE-2017-7098 CVE-2017-7100 CVE-2017-7102 CVE-2017-7104 CVE-2017-7107 CVE-2017-7109 CVE-2017-7111 CVE-2017-7117 CVE-2017-7120 CVE-2017-13783 CVE-2017-13784 CVE-2017-13785 CVE-2017-13788 CVE-2017-13791 CVE-2017-13792 CVE-2017-13794 CVE-2017-13795 CVE-2017-13796 CVE-2017-13798 CVE-2017-13802 CVE-2017-13803 CVE-2017-7156 CVE-2017-7157 CVE-2017-13856 CVE-2017-13866 CVE-2017-13870 CVE-2017-5753 CVE-2017-5715 CVE-2018-4088 CVE-2018-4089 CVE-2018-4096 CVE-2017-7153 CVE-2017-7160 CVE-2017-7161 CVE-2017-7165 CVE-2017-13884 CVE-2017-13885 2017-10-18 2018-03-28 2018-03-28
chromium -- vulnerability chromium 65.0.3325.181

Google Chrome Releases reports:

1 security fix in this release, including:

  • [823553] Various fixes from internal audits, fuzzing and other initiatives
https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop_20.html 2018-03-20 2018-03-27
OpenSSL -- multiple vulnerabilities openssl 1.0.2o,1 openssl-devel 1.1.0h

The OpenSSL project reports:

  • Constructed ASN.1 types with a recursive definition could exceed the stack (CVE-2018-0739)
    Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe.
  • rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
    There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation).
https://www.openssl.org/news/secadv/20180327.txt CVE-2018-0739 CVE-2017-3738 2018-03-27 2018-03-27
Gitlab -- multiple vulnerabilities gitlab 10.5.010.5.6 10.4.010.4.6 8.310.3.9

GitLab reports:

SSRF in services and web hooks

There were multiple server-side request forgery issues in the Services feature. An attacker could make requests to servers within the same network of the GitLab instance. This could lead to information disclosure, authentication bypass, or potentially code execution. This issue has been assigned CVE-2018-8801.

Gitlab Auth0 integration issue

There was an issue with the GitLab omniauth-auth0 configuration which resulted in the Auth0 integration signing in the wrong users.

CVE-2018-8801 https://about.gitlab.com/2018/03/20/critical-security-release-gitlab-10-dot-5-dot-6-released/ 2018-03-20 2018-03-27 2018-04-07
mozilla -- use-after-free in compositor firefox 59.0.2,1 waterfox 56.0.4.36_3 seamonkey linux-seamonkey 2.49.3 firefox-esr 52.7.3,1 linux-firefox 52.7.3,2 libxul 52.7.3 linux-thunderbird 52.7.1 thunderbird 52.7.0_1

The Mozilla Foundation reports:

CVE-2018-5148: Use-after-free in compositor

A use-after-free vulnerability can occur in the compositor during certain graphics operations when a raw pointer is used instead of a reference counted one. This results in a potentially exploitable crash.

CVE-2018-5148 https://www.mozilla.org/security/advisories/mfsa2018-10/ 2018-03-26 2018-03-27 2018-03-31
rails-html-sanitizer -- possible XSS vulnerability rubygem-rails-html-sanitizer 1.0.4

OSS-Security list:

There is a possible XSS vulnerability in rails-html-sanitizer. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications.

This issue is similar to CVE-2018-8048 in Loofah.

http://www.openwall.com/lists/oss-security/2018/03/22/4 CVE-2018-3741 2018-03-22 2018-03-24
apache -- multiple vulnerabilities apache24 2.4.30 apache22 2.2.34_5

The Apache httpd reports:

Out of bound write in mod_authnz_ldap with AuthLDAPCharsetConfig enabled (CVE-2017-15710)

mod_session: CGI-like applications that intend to read from mod_session's 'SessionEnv ON' could be fooled into reading user-supplied data instead. (CVE-2018-1283)

mod_cache_socache: Fix request headers parsing to avoid a possible crash with specially crafted input data. (CVE-2018-1303)

core: Possible crash with excessively long HTTP request headers. Impractical to exploit with a production build and production LogLevel. (CVE-2018-1301)

core: Configure the regular expression engine to match '$' to the end of the input string only, excluding matching the end of any embedded newline characters. Behavior can be changed with new directive 'RegexDefaultOptions'. (CVE-2017-15715)

mod_auth_digest: Fix generation of nonce values to prevent replay attacks across servers using a common Digest domain. This change may cause problems if used with round robin load balancers. (CVE-2018-1312)

mod_http2: Potential crash w/ mod_http2. (CVE-2018-1302)

https://www.apache.org/dist/httpd/CHANGES_2.4.33 CVE-2017-15710 CVE-2018-1283 CVE-2018-1303 CVE-2018-1301 CVE-2017-15715 CVE-2018-1312 CVE-2018-1302 2018-03-23 2018-03-24 2018-03-27
mybb -- multiple vulnerabilities mybb 1.8.15

mybb Team reports:

Medium risk: Tasks Local File Inclusion

Medium risk: Forum Password Check Bypass

Low risk: Admin Permissions Group Title XSS

Low risk: Attachment types file extension XSS

Low risk: Moderator Tools XSS

Low risk: Security Questions XSS

Low risk: Settings Management XSS

Low risk: Templates Set Name XSS

Low risk: Usergroup Promotions XSS

Low risk: Warning Types XSS

https://blog.mybb.com/2018/03/15/mybb-1-8-15-released-security-maintenance-release/ 2018-03-15 2018-03-24
SQLite -- Corrupt DB can cause a NULL pointer dereference sqlite3 3.22.0_1

MITRE reports:

SQLite databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.

CVE-2018-8740 http://openwall.com/lists/oss-security/2018/03/17/1 2018-03-16 2018-03-22
Sanitize -- XSS vulnerability rubygem-sanitize 2.6.3

Sanitize release:

Fixed an HTML injection vulnerability that could allow XSS.

When Sanitize <= 4.6.2 is used in combination with libxml2 >= 2.9.2, a specially crafted HTML fragment can cause libxml2 to generate improperly escaped output, allowing non-whitelisted attributes to be used on whitelisted elements.

Sanitize now performs additional escaping on affected attributes to prevent this.

https://github.com/rgrove/sanitize/releases https://github.com/rgrove/sanitize/issues/176 CVE-2018-3740 2018-03-19 2018-03-21
Loofah -- XSS vulnerability rubygem-loofah 2.2.1

GitHub issue:

This issue has been created for public disclosure of an XSS / code injection vulnerability that was responsibly reported by the Shopify Application Security Team.

Loofah allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments.

https://github.com/flavorjones/loofah/releases https://github.com/flavorjones/loofah/issues/144 CVE-2018-8048 2018-03-15 2018-03-20
Jupyter Notebook -- vulnerability py27-notebook py34-notebook py35-notebook py36-notebook 5.4.1

MITRE reports:

In Jupyter Notebook before 5.4.1, a maliciously forged notebook file can bypass sanitization to execute JavaScript in the notebook context. Specifically, invalid HTML is 'fixed' by jQuery after sanitization, making it dangerous.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8768 CVE-2018-8768 2018-03-18 2018-03-19
SquirrelMail -- post-authentication access privileges squirrelmail 20170705

Florian Grunow reports:

An attacker able to exploit this vulnerability can extract files of the server the application is running on. This may include configuration files, log files and additionally all files that are readable for all users on the system. This issue is post-authentication. That means an attacker would need valid credentials for the application to log in or needs to exploit an additional vulnerability of which we are not aware of at this point of time.

An attacker would also be able to delete files on the system, if the user running the application has the rights to do so.

Does this issue affect me?

Likely yes, if you are using Squirrelmail. We checked the latest development version, which is 1.5.2-svn and the latest version available for download at this point of time, 1.4.22. Both contain the vulnerable code.

http://www.openwall.com/lists/oss-security/2018/03/17/2 https://nvd.nist.gov/vuln/detail/CVE-2018-8741 CVE-2018-8741 2017-05-21 2018-03-17
slurm-wlm -- SQL Injection attacks against SlurmDBD slurm-wlm 17.02.10

SchedMD reports:

Several issues were discovered with incomplete sanitization of user-provided text strings, which could potentially lead to SQL injection attacks against SlurmDBD itself. Such exploits could lead to a loss of accounting data, or escalation of user privileges on the cluster.

CVE-2018-7033 https://nvd.nist.gov/vuln/detail/CVE-2018-7033 2018-03-15 2018-03-17
libvorbis -- multiple vulnerabilities libvorbis 1.3.6,3

NVD reports:

Xiph.Org libvorbis 1.3.5 allows Remote Code Execution upon freeing uninitialized memory in the function vorbis_analysis_headerout() in info.c when vi->channels<=0, a similar issue to Mozilla bug 550184.

In Xiph.Org libvorbis 1.3.5, an out-of-bounds array read vulnerability exists in the function mapping0_forward() in mapping0.c, which may lead to DoS when operating on a crafted audio file with vorbis_analysis().

CVE-2017-14632 CVE-2017-14633 2018-03-16 2018-03-16
mozilla -- multiple vulnerabilities libvorbis 1.3.6,3 libtremor 1.2.1.s20180316 firefox 59.0.1,1 waterfox 56.0.4.36_3 seamonkey linux-seamonkey 2.49.3 firefox-esr 52.7.2,1 linux-firefox 52.7.2,2 libxul 52.7.3 thunderbird linux-thunderbird 52.7.0

The Mozilla Foundation reports:

CVE-2018-5146: Out of bounds memory write in libvorbis

An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest.

CVE-2018-5147: Out of bounds memory write in libtremor

The libtremor library has the same flaw as CVE-2018-5146. This library is used by Firefox in place of libvorbis on Android and ARM platforms.

CVE-2018-5146 CVE-2018-5147 https://www.mozilla.org/security/advisories/mfsa2018-08/ https://www.mozilla.org/security/advisories/mfsa2018-09/ 2018-03-16 2018-03-16 2018-03-31
e2fsprogs -- potential buffer overrun bugs in the blkid library and in the fsck program e2fsprogs 1.44.0 e2fsprogs-libblkid 1.44.0

Theodore Y. Ts'o reports:

Fixed some potential buffer overrun bugs in the blkid library and in the fsck program.

http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.44.0 2018-03-07 2018-03-14
FreeBSD -- Speculative Execution Vulnerabilities FreeBSD-kernel 11.111.1_8

Problem Description:

A number of issues relating to speculative execution were found last year and publicly announced January 3rd. Two of these, known as Meltdown and Spectre V2, are addressed here.

CVE-2017-5754 (Meltdown) - ------------------------

This issue relies on an affected CPU speculatively executing instructions beyond a faulting instruction. When this happens, changes to architectural state are not committed, but observable changes may be left in micro- architectural state (for example, cache). This may be used to infer privileged data.

CVE-2017-5715 (Spectre V2) - --------------------------

Spectre V2 uses branch target injection to speculatively execute kernel code at an address under the control of an attacker.

Impact:

An attacker may be able to read secret data from the kernel or from a process when executing untrusted code (for example, in a web browser).

CVE-2017-5715 CVE-2017-5754 SA-18:03.speculative_execution 2018-03-14 2018-03-14
FreeBSD -- ipsec validation and use-after-free FreeBSD-kernel 11.111.1_7 10.410.4_7 10.310.3_28

Problem Description:

Due to a lack of strict checking, an attacker from a trusted host can send a specially constructed IP packet that may lead to a system crash.

Additionally, a use-after-free vulnerability in the AH handling code could cause unpredictable results.

Impact:

Access to out of bounds or freed mbuf data can lead to a kernel panic or other unpredictable results.

CVE-2018-6916 SA-18:01.ipsec 2018-03-07 2018-03-14
Flash Player -- multiple vulnerabilities linux-flashplayer 29.0.0.113

Adobe reports:

  • This update resolves a use-after-free vulnerability that could lead to remote code execution (CVE-2018-4919).
  • This update resolves a type confusion vulnerability that could lead to remote code execution (CVE-2018-4920).
CVE-2018-4919 CVE-2018-4920 https://helpx.adobe.com/security/products/flash-player/apsb18-05.html 2018-03-13 2018-03-13
mozilla -- multiple vulnerabilities firefox 59.0_1,1 waterfox 56.0.4.36_3 seamonkey linux-seamonkey 2.49.3 firefox-esr 52.7.0,1 linux-firefox 52.7.0,2 libxul thunderbird linux-thunderbird 52.7.0

Mozilla Foundation reports:

CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList

CVE-2018-5128: Use-after-free manipulating editor selection ranges

CVE-2018-5129: Out-of-bounds write with malformed IPC messages

CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption

CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources

CVE-2018-5132: WebExtension Find API can search privileged pages

CVE-2018-5133: Value of the app.support.baseURL preference is not properly sanitized

CVE-2018-5134: WebExtensions may use view-source: URLs to bypass content restrictions

CVE-2018-5135: WebExtension browserAction can inject scripts into unintended contexts

CVE-2018-5136: Same-origin policy violation with data: URL shared workers

CVE-2018-5137: Script content can access legacy extension non-contentaccessible resources

CVE-2018-5138: Android Custom Tab address spoofing through long domain names

CVE-2018-5140: Moz-icon images accessible to web content through moz-icon: protocol

CVE-2018-5141: DOS attack through notifications Push API

CVE-2018-5142: Media Capture and Streams API permissions display incorrect origin with data: and blob: URLs

CVE-2018-5143: Self-XSS pasting javascript: URL with embedded tab into addressbar

CVE-2018-5126: Memory safety bugs fixed in Firefox 59

CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7

CVE-2018-5125 CVE-2018-5126 CVE-2018-5127 CVE-2018-5128 CVE-2018-5129 CVE-2018-5130 CVE-2018-5131 CVE-2018-5132 CVE-2018-5133 CVE-2018-5134 CVE-2018-5135 CVE-2018-5136 CVE-2018-5137 CVE-2018-5138 CVE-2018-5140 CVE-2018-5141 CVE-2018-5142 CVE-2018-5143 https://www.mozilla.org/security/advisories/mfsa2018-06/ https://www.mozilla.org/security/advisories/mfsa2018-07/ 2018-03-13 2018-03-13 2018-03-16
samba -- multiple vulnerabilities samba44 4.4.17 samba45 4.5.16 samba46 4.6.14 samba47 4.7.6

The samba project reports:

Missing null pointer checks may crash the external print server process.

On a Samba 4 AD DC any authenticated user can change other user's passwords over LDAP, including the passwords of administrative users and service accounts.

https://www.samba.org/samba/security/CVE-2018-1050.html CVE-2018-1050 https://www.samba.org/samba/security/CVE-2018-1057.html CVE-2018-1057 2018-01-03 2018-03-13
mbed TLS (PolarSSL) -- remote code execution mbedtls 2.7.0 polarssl13 1.3.22

Simon Butcher reports:

  • When the truncated HMAC extension is enabled and CBC is used, sending a malicious application packet can be used to selectively corrupt 6 bytes on the peer's heap, potentially leading to a crash or remote code execution. This can be triggered remotely from either side in both TLS and DTLS.
  • When RSASSA-PSS signature verification is enabled, sending a maliciously constructed certificate chain can be used to cause a buffer overflow on the peer's stack, potentially leading to crash or remote code execution. This can be triggered remotely from either side in both TLS and DTLS.
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2018-01 CVE-2018-0487 CVE-2018-0488 2018-02-05 2018-03-10
chromium -- vulnerability chromium 65.0.3325.146

Google Chrome Releases reports:

45 security fixes in this release:

  • [758848] High CVE-2017-11215: Use after free in Flash. Reported by JieZeng of Tencent Zhanlu Lab on 2017-08-25
  • [758863] High CVE-2017-11225: Use after free in Flash. Reported by JieZeng of Tencent Zhanlu Lab on 2017-08-25
  • [780919] High CVE-2018-6060: Use after free in Blink. Reported by Omair on 2017-11-02
  • [794091] High CVE-2018-6061: Race condition in V8. Reported by Guang Gong of Alpha Team, Qihoo 360 on 2017-12-12
  • [780104] High CVE-2018-6062: Heap buffer overflow in Skia. Reported by Anonymous on 2017-10-31
  • [789959] High CVE-2018-6057: Incorrect permissions on shared memory. Reported by Gal Beniamini of Google Project Zero on 2017-11-30
  • [792900] High CVE-2018-6063: Incorrect permissions on shared memory. Reported by Gal Beniamini of Google Project Zero on 2017-12-07
  • [798644] High CVE-2018-6064: Type confusion in V8. Reported by lokihardt of Google Project Zero on 2018-01-03
  • [808192] High CVE-2018-6065: Integer overflow in V8. Reported by Mark Brand of Google Project Zero on 2018-02-01
  • [799477] Medium CVE-2018-6066: Same Origin Bypass via canvas. Reported by Masato Kinugawa on 2018-01-05
  • [779428] Medium CVE-2018-6067: Buffer overflow in Skia. Reported by Ned Williamson on 2017-10-30
  • [779428] Medium CVE-2018-6067: Buffer overflow in Skia. Reported by Ned Williamson on 2017-10-30
  • [799918] Medium CVE-2018-6069: Stack buffer overflow in Skia. Reported by Wanglu and Yangkang(@dnpushme) of Qihoo360 Qex Team on 2018-01-08
  • [668645] Medium CVE-2018-6070: CSP bypass through extensions. Reported by Rob Wu on 2016-11-25
  • [777318] Medium CVE-2018-6071: Heap bufffer overflow in Skia. Reported by Anonymous on 2017-10-23
  • [791048] Medium CVE-2018-6072: Integer overflow in PDFium. Reported by Atte Kettunen of OUSPG on 2017-12-01
  • [804118] Medium CVE-2018-6073: Heap bufffer overflow in WebGL. Reported by Omair on 2018-01-20
  • [809759] Medium CVE-2018-6074: Mark-of-the-Web bypass. Reported by Abdulrahman Alqabandi (@qab) on 2018-02-06
  • [608669] Medium CVE-2018-6075: Overly permissive cross origin downloads. Reported by Inti De Ceukelaire (intigriti.com) on 2016-05-03
  • [758523] Medium CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink. Reported by Mateusz Krzeszowiec on 2017-08-24
  • [778506] Medium CVE-2018-6077: Timing attack using SVG filters. Reported by Khalil Zhani on 2017-10-26
  • [793628] Medium CVE-2018-6078: URL Spoof in OmniBox. Reported by Khalil Zhani on 2017-12-10
  • [788448] Medium CVE-2018-6079: Information disclosure via texture data in WebGL. Reported by Ivars Atteka on 2017-11-24
  • [792028] Medium CVE-2018-6080: Information disclosure in IPC call. Reported by Gal Beniamini of Google Project Zero on 2017-12-05
  • [797525] Low CVE-2018-6081: XSS in interstitials. Reported by Rob Wu on 2017-12-24
  • [767354] Low CVE-2018-6082: Circumvention of port blocking. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-09-21
  • [771709] Low CVE-2018-6083: Incorrect processing of AppManifests. Reported by Jun Kokatsu (@shhnjk) on 2017-10-04
CVE-2017-11215 CVE-2017-11225 CVE-2018-6060 CVE-2018-6061 CVE-2018-6060 CVE-2018-6061 CVE-2018-6062 CVE-2018-6057 CVE-2018-6063 CVE-2018-6064 CVE-2018-6065 CVE-2018-6066 CVE-2018-6067 CVE-2018-6069 CVE-2018-6070 CVE-2018-6071 CVE-2018-6072 CVE-2018-6073 CVE-2018-6074 CVE-2018-6075 CVE-2018-6076 CVE-2018-6077 CVE-2018-6078 CVE-2018-6079 CVE-2018-6080 CVE-2018-6081 CVE-2018-6082 CVE-2018-6083 https://chromereleases.googleblog.com/2018/03/stable-channel-update-for-desktop.html 2016-05-03 2018-03-08
wireshark -- multiple security issues wireshark 2.2.02.2.13 2.4.02.4.5 wireshark-lite 2.2.02.2.13 2.4.02.4.5 wireshark-qt5 2.2.02.2.13 2.4.02.4.5 tshark 2.2.02.2.13 2.4.02.4.5 tshark-lite 2.2.02.2.13 2.4.02.4.5

wireshark developers reports:

wnpa-sec-2018-05. IEEE 802.11 dissector crash. (CVE-2018-7335)

wnpa-sec-2018-06. Large or infinite loops in multiple dissectors. (CVE-2018-7321 through CVE-2018-7333)

wnpa-sec-2018-07. UMTS MAC dissector crash. (CVE-2018-7334)

wnpa-sec-2018-08. DOCSIS dissector crash. (CVE-2018-7337)

wnpa-sec-2018-09. FCP dissector crash. (CVE-2018-7336)

wnpa-sec-2018-10. SIGCOMP dissector crash. (CVE-2018-7320)

wnpa-sec-2018-11. Pcapng file parser crash.

wnpa-sec-2018-12. IPMI dissector crash.

wnpa-sec-2018-13. SIGCOMP dissector crash.

wnpa-sec-2018-14. NBAP dissector crash.

https://www.wireshark.org/security/ https://www.wireshark.org/security/wnpa-sec-2018-05.html https://www.wireshark.org/security/wnpa-sec-2018-06.html https://www.wireshark.org/security/wnpa-sec-2018-07.html https://www.wireshark.org/security/wnpa-sec-2018-08.html https://www.wireshark.org/security/wnpa-sec-2018-09.html https://www.wireshark.org/security/wnpa-sec-2018-10.html https://www.wireshark.org/security/wnpa-sec-2018-11.html https://www.wireshark.org/security/wnpa-sec-2018-12.html https://www.wireshark.org/security/wnpa-sec-2018-13.html https://www.wireshark.org/security/wnpa-sec-2018-14.html CVE-2018-7320 CVE-2018-7321 CVE-2018-7322 CVE-2018-7323 CVE-2018-7324 CVE-2018-7325 CVE-2018-7326 CVE-2018-7327 CVE-2018-7328 CVE-2018-7329 CVE-2018-7330 CVE-2018-7331 CVE-2018-7332 CVE-2018-7333 CVE-2018-7334 CVE-2018-7335 CVE-2018-7336 CVE-2018-7337 CVE-2018-7417 2018-02-23 2018-03-04
isc-dhcp -- Multiple vulnerabilities isc-dhcp44-server 4.4.1 isc-dhcp44-client 4.4.1 isc-dhcp43-server 4.3.6 isc-dhcp43-client 4.3.6

ISC reports:

Failure to properly bounds check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section.

A malicious client which is allowed to send very large amounts of traffic (billions of packets) to a DHCP server can eventually overflow a 32-bit reference counter, potentially causing dhcpd to crash.

CVE-2018-5732 CVE-2018-5733 https://kb.isc.org/article/AA-01565 https://kb.isc.org/article/AA-01567 2018-02-21 2018-03-02
libsndfile -- out-of-bounds reads libsndfile linux-c6-libsndfile linux-c7-libsndfile 1.0.28_2

Xin-Jiang on Github reports:

CVE-2017-14245 (Medium): An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values.

CVE-2017-14246 (Medium): An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values.

my123px on Github reports:

CVE-2017-17456 (Medium): The function d2alaw_array() in alaw.c of libsndfile 1.0.29pre1 may lead to a remote DoS attack (SEGV on unknown address 0x000000000000), a different vulnerability than CVE-2017-14245.

CVE-2017-17457 (Medium): The function d2ulaw_array() in ulaw.c of libsndfile 1.0.29pre1 may lead to a remote DoS attack (SEGV on unknown address 0x000000000000), a different vulnerability than CVE-2017-14246.

CVE-2017-14245 CVE-2017-14246 https://github.com/erikd/libsndfile/issues/317 CVE-2017-17456 CVE-2017-17457 https://github.com/erikd/libsndfile/issues/344 2017-09-11 2018-03-01
libsndfile -- multiple vulnerabilities libsndfile linux-c6-libsndfile linux-c7-libsndfile 1.0.28_2

Agostino Sarubbo, Gentoo reports:

CVE-2017-8361 (Medium): The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.

CVE-2017-8362 (Medium): The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted audio file.

CVE-2017-8363 (Medium): The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.

CVE-2017-8365 (Medium): The i2les_array function in pcm.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file.

manxorist on Github reports:

CVE-2017-12562 (High): Heap-based Buffer Overflow in the psf_binheader_writef function in common.c in libsndfile through 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.

Xin-Jiang on Github reports:

CVE-2017-14634 (Medium): In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file.

CVE-2017-8361 https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-flac_buffer_copy-flac-c/ https://github.com/erikd/libsndfile/issues/232 https://github.com/erikd/libsndfile/commit/fd0484aba8e51d16af1e3a880f9b8b857b385eb3 CVE-2017-8362 https://blogs.gentoo.org/ago/2017/04/29/libsndfile-invalid-memory-read-in-flac_buffer_copy-flac-c/ https://github.com/erikd/libsndfile/issues/231 https://github.com/erikd/libsndfile/commit/ef1dbb2df1c0e741486646de40bd638a9c4cd808 CVE-2017-8363 https://blogs.gentoo.org/ago/2017/04/29/libsndfile-heap-based-buffer-overflow-in-flac_buffer_copy-flac-c/ https://github.com/erikd/libsndfile/issues/233 https://github.com/erikd/libsndfile/commit/fd0484aba8e51d16af1e3a880f9b8b857b385eb3 https://github.com/erikd/libsndfile/commit/cd7da8dbf6ee4310d21d9e44b385d6797160d9e8 CVE-2017-8365 https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-i2les_array-pcm-c/ https://github.com/erikd/libsndfile/issues/230 https://github.com/erikd/libsndfile/commit/fd0484aba8e51d16af1e3a880f9b8b857b385eb3 CVE-2017-12562 https://github.com/erikd/libsndfile/issues/292/ https://github.com/erikd/libsndfile/commit/cf7a8182c2642c50f1cf90dddea9ce96a8bad2e8 CVE-2017-14634 https://github.com/erikd/libsndfile/issues/318 https://github.com/erikd/libsndfile/commit/85c877d5072866aadbe8ed0c3e0590fbb5e16788 2017-04-12 2018-03-01
PostgreSQL vulnerabilities postgresql93-server 9.3.09.3.22 postgresql94-server 9.4.09.4.17 postgresql95-server 9.5.09.5.12 postgresql96-server 9.6.09.6.8 postgresql10-server 10.010.3

The PostgreSQL project reports:

  • CVE-2018-1058: Uncontrolled search path element in pg_dump and other client applications
https://wiki.postgresql.org/wiki/A_Guide_to_CVE-2018-1058:_Protect_Your_Search_Path CVE-2018-1058 2018-03-01 2018-03-01
strongswan - Insufficient input validation in RSASSA-PSS signature parser strongswan 5.6.1

Strongswan Release Notes reports:

Fixed a DoS vulnerability in the parser for PKCS#1 RSASSA-PSS signatures that was caused by insufficient input validation. One of the configurable parameters in algorithm identifier structures for RSASSA-PSS signatures is the mask generation function (MGF). Only MGF1 is currently specified for this purpose. However, this in turn takes itself a parameter that specifies the underlying hash function. strongSwan's parser did not correctly handle the case of this parameter being absent, causing an undefined data read. his vulnerability has been registered as CVE-2018-6459.

CVE-2018-6459 https://github.com/strongswan/strongswan/commit/40da179f28b768ffcf6ff7e2f68675eb44806668 2018-01-31 2018-02-19
libsndfile -- out-of-bounds read memory access libsndfile linux-c6-libsndfile linux-c7-libsndfile 1.0.28_2

Laurent Delosieres, Secunia Research at Flexera Software reports:

Secunia Research has discovered a vulnerability in libsndfile, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to an error in the "aiff_read_chanmap()" function (src/aiff.c), which can be exploited to cause an out-of-bounds read memory access via a specially crafted AIFF file. The vulnerability is confirmed in version 1.0.28. Other versions may also be affected.

CVE-2017-6892 https://nvd.nist.gov/vuln/detail/CVE-2017-6892 https://secuniaresearch.flexerasoftware.com/secunia_research/2017-13/ https://github.com/erikd/libsndfile/commit/f833c53cb596e9e1792949f762e0b33661822748 2017-05-23 2018-03-01
ntp -- multiple vulnerabilities FreeBSD 11.111.1_7 10.410.4_6 10.310.3_27 ntp 4.2.8p11 ntp-devel 0

Network Time Foundation reports:

The NTP Project at Network Time Foundation is releasing ntp-4.2.8p11.

This release addresses five security issues in ntpd:

  • LOW/MEDIUM: Sec 3012 / CVE-2016-1549 / VU#961909: Sybil vulnerability: ephemeral association attack
  • INFO/MEDIUM: Sec 3412 / CVE-2018-7182 / VU#961909: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak
  • LOW: Sec 3415 / CVE-2018-7170 / VU#961909: Multiple authenticated ephemeral associations
  • LOW: Sec 3453 / CVE-2018-7184 / VU#961909: Interleaved symmetric mode cannot recover from bad state
  • LOW/MEDIUM: Sec 3454 / CVE-2018-7185 / VU#961909: Unauthenticated packet can reset authenticated interleaved association

one security issue in ntpq:

  • MEDIUM: Sec 3414 / CVE-2018-7183 / VU#961909: ntpq:decodearr() can write beyond its buffer limit

and provides over 33 bugfixes and 32 other improvements.

CVE-2016-1549 CVE-2018-7182 CVE-2018-7170 CVE-2018-7184 CVE-2018-7185 CVE-2018-7183 SA-18:02.ntp http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S 2018-02-27 2018-02-28 2018-03-14
chromium -- vulnerability chromium 64.0.3282.167

Google Chrome Releases reports:

1 security fix in this release:

  • [806388] High CVE-2018-6056: Incorrect derived class instantiation in V8. Reported by lokihardt of Google Project Zero on 2018-01-26
CVE-2018-6056 https://chromereleases.googleblog.com/2018/02/stable-channel-update-for-desktop_13.html 2018-01-26 2018-02-27
chromium -- multiple vulnerabilities chromium 64.0.3282.119

Google Chrome Releases reports:

Several security fixes in this release, including:

  • [780450] High CVE-2018-6031: Use after free in PDFium. Reported by Anonymous on 2017-11-01
  • [787103] High CVE-2018-6032: Same origin bypass in Shared Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-11-20
  • [793620] High CVE-2018-6033: Race when opening downloaded files. Reported by Juho Nurminen on 2017-12-09
  • [784183] Medium CVE-2018-6034: Integer overflow in Blink. Reported by Tobias Klein (www.trapkit.de) on 2017-11-12
  • [797500] Medium CVE-2018-6035: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23
  • [797500] Medium CVE-2018-6035: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23
  • [753645] Medium CVE-2018-6037: Insufficient user gesture requirements in autofill. Reported by Paul Stone of Context Information Security on 2017-08-09
  • [774174] Medium CVE-2018-6038: Heap buffer overflow in WebGL. Reported by cloudfuzzer on 2017-10-12
  • [775527] Medium CVE-2018-6039: XSS in DevTools. Reported by Juho Nurminen on 2017-10-17
  • [778658] Medium CVE-2018-6040: Content security policy bypass. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-26
  • [760342] Medium CVE-2018-6041: URL spoof in Navigation. Reported by Luan Herrera on 2017-08-29
  • [773930] Medium CVE-2018-6042: URL spoof in OmniBox. Reported by Khalil Zhani on 2017-10-12
  • [785809] Medium CVE-2018-6043: Insufficient escaping with external URL handlers. Reported by 0x09AL on 2017-11-16
  • [797497] Medium CVE-2018-6045: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23
  • [798163] Medium CVE-2018-6046: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-31
  • [799847] Medium CVE-2018-6047: Cross origin URL leak in WebGL. Reported by Masato Kinugawa on 2018-01-08
  • [763194] Low CVE-2018-6048: Referrer policy bypass in Blink. Reported by Jun Kokatsu (@shhnjk) on 2017-09-08
  • [771848] Low CVE-2017-15420: URL spoofing in Omnibox. Reported by Drew Springall (@_aaspring_) on 2017-10-05
  • [774438] Low CVE-2018-6049: UI spoof in Permissions. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-13
  • [774842] Low CVE-2018-6050: URL spoof in OmniBox. Reported by Jonathan Kew on 2017-10-15
  • [441275] Low CVE-2018-6051: Referrer leak in XSS Auditor. Reported by Antonio Sanso (@asanso) on 2014-12-11
  • [615608] Low CVE-2018-6052: Incomplete no-referrer policy implementation. Reported by Tanner Emek on 2016-05-28
  • [758169] Low CVE-2018-6053: Leak of page thumbnails in New Tab Page. Reported by Asset Kabdenov on 2017-08-23
  • [797511] Low CVE-2018-6054: Use after free in WebUI. Reported by Rob Wu on 2017-12-24
CVE-2018-6031 CVE-2018-6032 CVE-2018-6033 CVE-2018-6034 CVE-2018-6035 CVE-2018-6036 CVE-2018-6037 CVE-2018-6038 CVE-2018-6039 CVE-2018-6040 CVE-2018-6041 CVE-2018-6042 CVE-2018-6043 CVE-2018-6045 CVE-2018-6046 CVE-2018-6047 CVE-2018-6048 CVE-2017-15420 CVE-2018-6049 CVE-2018-6050 CVE-2018-6051 CVE-2018-6052 CVE-2018-6053 CVE-2018-6054 https://chromereleases.googleblog.com/2018/01/stable-channel-update-for-desktop_24.html 2017-08-09 2018-02-27
tomcat -- Security constraints ignored or applied too late tomcat 7.0.07.0.84 8.0.08.0.49 8.5.08.5.27 9.0.09.0.4

The Apache Software Foundation reports:

Security constraints defined by annotations of Servlets were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.

The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.

http://tomcat.apache.org/security-9.html http://tomcat.apache.org/security-8.html http://tomcat.apache.org/security-7.html CVE-2018-1304 CVE-2018-1305 2018-02-23 2018-02-23
shibboleth-sp -- vulnerable to forged user attribute data xmltooling 1.6.4 xerces-c3 3.1.4

Shibboleth consortium reports:

Shibboleth SP software vulnerable to additional data forgery flaws

The XML processing performed by the Service Provider software has been found to be vulnerable to new flaws similar in nature to the one addressed in an advisory last month.

These bugs involve the use of other XML constructs rather than entity references, and therefore required additional mitigation once discovered. As with the previous issue, this flaw allows for changes to an XML document that do not break a digital signature but can alter the user data passed through to applications behind the SP and result in impersonation attacks and exposure of protected information.

As before, the use of XML Encryption is a significant mitigation, but we have not dismissed the possibility that attacks on the Response "envelope" may be possible, in both the original and this new case. No actual attacks of this nature are known, so deployers should prioritize patching systems that expect to handle unencrypted SAML assertions.

An updated version of XMLTooling-C (V1.6.4) is available that protects against these new attacks, and should help prevent similar vulnerabilities in the future.

Unlike the previous case, these bugs are NOT prevented by any existing Xerces-C parser version on any platform and cannot be addressed by any means other than the updated XMLTooling-C library.

The Service Provider software relies on a generic XML parser to process SAML responses and there are limitations in older versions of the parser that make it impossible to fully disable Document Type Definition (DTD) processing.

Through addition/manipulation of a DTD, it's possible to make changes to an XML document that do not break a digital signature but are mishandled by the SP and its libraries. These manipulations can alter the user data passed through to applications behind the SP and result in impersonation attacks and exposure of protected information.

While newer versions of the xerces-c3 parser are configured by the SP into disallowing the use of a DTD via an environment variable, this feature is not present in the xerces-c3 parser before version 3.1.4, so an additional fix is being provided now that an actual DTD exploit has been identified. Xerces-c3-3.1.4 was committed to the ports tree already on 2016-07-26.

https://shibboleth.net/community/advisories/secadv_20180227.txt CVE-2018-0489 2018-02-27 2018-02-27
drupal -- Drupal Core - Multiple Vulnerabilities drupal7 7.56 drupal8 8.4.4

Drupal Security Team reports:

CVE-2017-6926: Comment reply form allows access to restricted content

CVE-2017-6927: JavaScript cross-site scripting prevention is incomplete

CVE-2017-6928: Private file access bypass - Moderately Critical

CVE-2017-6929: jQuery vulnerability with untrusted domains - Moderately Critical

CVE-2017-6930: Language fallback can be incorrect on multilingual sites with node access restrictions

CVE-2017-6931: Settings Tray access bypass

CVE-2017-6932: External link injection on 404 pages when linking to the current page

CVE-2017-6926 CVE-2017-6927 CVE-2017-6928 CVE-2017-6929 CVE-2017-6930 CVE-2017-6931 CVE-2017-6932 2018-02-21 2018-02-25
cvs -- Remote code execution via ssh command injection cvs 1.20120905_5

Hank Leininger reports:

Bugs in Git, Subversion, and Mercurial were just announced and patched which allowed arbitrary local command execution if a malicious name was used for the remote server, such as starting with - to pass options to the ssh client: git clone ssh://-oProxyCommand=some-command... CVS has a similar problem with the -d option:

Tested vanilla CVS 1.12.13, and Gentoo CVS 1.12.12-r11.

http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871810#10 CVE-2017-12836 ports/226088 2017-08-10 2018-02-24
LibreOffice -- Remote arbitrary file disclosure vulnerability via WEBSERVICE formula libreoffice 5.4.5 6.0.06.0.1

LibreOffice reports:

LibreOffice Calc supports a WEBSERVICE function to obtain data by URL. Vulnerable versions of LibreOffice allow WEBSERVICE to take a local file URL (e.g file://) which can be used to inject local files into the spreadsheet without warning the user. Subsequent formulas can operate on that inserted data and construct a remote URL whose path leaks the local data to a remote attacker.

In later versions of LibreOffice without this flaw, WEBSERVICE has now been limited to accessing http and https URLs along with bringing WEBSERVICE URLs under LibreOffice Calc's link management infrastructure.

Note: This vulnerability has been identified upstream as CVE-2018-1055, but NVD/Mitre are advising it's a reservation duplicate of CVE-2018-6871 which should be used instead.

https://www.libreoffice.org/about-us/security/advisories/cve-2018-1055/ https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure CVE-2018-6871 ports/225797 2018-02-09 2018-02-23
squid -- Vulnerable to Denial of Service attack squid 3.5.27_3 squid-devel 4.0.23

Louis Dion-Marcil reports:

Due to incorrect pointer handling Squid is vulnerable to denial of service attack when processing ESI responses.

This problem allows a remote server delivering certain ESI response syntax to trigger a denial of service for all clients accessing the Squid service.

Due to unrelated changes Squid-3.5 has become vulnerable to some regular ESI server responses also triggering this issue.

This problem is limited to the Squid custom ESI parser. Squid built to use libxml2 or libexpat XML parsers do not have this problem.

Due to incorrect pointer handling Squid is vulnerable to denial of service attack when processing ESI responses or downloading intermediate CA certificates.

This problem allows a remote client delivering certain HTTP requests in conjunction with certain trusted server responses to trigger a denial of service for all clients accessing the Squid service.

http://www.squid-cache.org/Advisories/SQUID-2018_1.txt http://www.squid-cache.org/Advisories/SQUID-2018_2.txt CVE-2018-1000024 CVE-2018-1000027 https://www.debian.org/security/2018/dsa-4122 ports/226138 2017-12-13 2018-02-23
asterisk -- multiple vulnerabilities asterisk13 13.19.2

The Asterisk project reports:

AST-2018-004 - When processing a SUBSCRIBE request the res_pjsip_pubsub module stores the accepted formats present in the Accept headers of the request. This code did not limit the number of headers it processed despite having a fixed limit of 32. If more than 32 Accept headers were present the code would write outside of its memory and cause a crash.

AST-2018-005 - A crash occurs when a number of authenticated INVITE messages are sent over TCP or TLS and then the connection is suddenly closed. This issue leads to a segmentation fault.

https://downloads.asterisk.org/pub/security/AST-2018-004.html CVE-2018-7284 https://downloads.asterisk.org/pub/security/AST-2018-005.html CVE-2018-7286 2018-02-21 2018-02-22 2018-06-12
asterisk and pjsip -- multiple vulnerabilities asterisk13 13.19.2 pjsip 2.7.2 pjsip-extsrtp 2.7.2

The Asterisk project reports:

AST-2018-002 - By crafting an SDP message with an invalid media format description Asterisk crashes when using the pjsip channel driver because pjproject's sdp parsing algorithm fails to catch the invalid media format description.

AST-2018-003 - By crafting an SDP message body with an invalid fmtp attribute Asterisk crashes when using the pjsip channel driver because pjproject's fmtp retrieval function fails to check if fmtp value is empty (set empty if previously parsed as invalid).

https://downloads.asterisk.org/pub/security/AST-2018-002.html https://downloads.asterisk.org/pub/security/AST-2018-003.html 2018-02-21 2018-02-22
phpMyAdmin -- self XSS in central columns feature phpMyAdmin 4.7.04.7.8

The phpMyAdmin team reports:

Summary

Self XSS in central columns feature

Description

A self-cross site scripting (XSS) vulnerability has been reported relating to the central columns feature.

Severity

We consider this vulnerability to be of moderate severity.

Mitigation factor

A valid token must be used in the attack

https://www.phpmyadmin.net/security/PMASA-2018-1/ CVE-2018-7260 2018-02-21 2018-02-22
GitLab -- multiple vulnerabilities gitlab 6.1.010.2.7 10.3.010.3.6 10.4.010.4.2

GitLab reports:

SnippetFinder information disclosure

The GitLab SnippetFinder component contained an information disclosure which allowed access to snippets restricted to Only team members or configured as disabled. The issue is now resolved in the latest version.

LDAP API authorization issue

An LDAP API endpoint contained an authorization vulnerability which unintentionally disclosed bulk LDAP groups data. This issue is now fixed in the latest release.

Persistent XSS mermaid markdown

The mermaid markdown feature contained a persistent XSS issue that is now resolved in the latest release.

Insecure direct object reference Todo API

The Todo API was vulnerable to an insecure direct object reference issue which resulted in an information disclosure of confidential data.

GitHub import access control issue

An improper access control weakness issue was discovered in the GitHub import feature. The issue allowed an attacker to create projects under other accounts which they shouldn't have access to. The issue is now resolved in the latest version.

Protected variables information disclosure

The CI jobs protected tag feature contained a vulnerability which resulted in an information disclosure of protected variables. The issue is now resolved in the latest release.

https://about.gitlab.com/2018/02/07/gitlab-security-10-4-3-plus-10-3-7-plus-10-2-8-blog/ 2018-02-07 2018-02-21
irssi -- multiple vulnerabilities irssi 1.1.1,1

Irssi reports:

Use after free when server is disconnected during netsplits. Found by Joseph Bisch.

Use after free when SASL messages are received in unexpected order. Found by Joseph Bisch.

Null pointer dereference when an “empty” nick has been observed by Irssi. Found by Joseph Bisch.

When the number of windows exceed the available space, Irssi would crash due to Null pointer dereference. Found by Joseph Bisch.

Certain nick names could result in out of bounds access when printing theme strings. Found by Oss-Fuzz.

https://irssi.org/security/irssi_sa_2018_02.txt CVE-2018-7054 CVE-2018-7053 CVE-2018-7052 CVE-2018-7051 CVE-2018-7050 ports/226001 2018-02-15 2018-02-19 2018-02-22
p5-Mojolicious -- cookie-handling vulnerability p5-Mojolicious 7.66

Upstream commit:

Vulnerabilities existed in cookie handling.

https://github.com/kraih/mojo/issues/1185 2018-01-31 2018-02-17
Bugzilla security issues bugzilla44 4.4.13 bugzilla50 5.0.4

Bugzilla Security Advisory

A CSRF vulnerability in report.cgi would allow a third-party site to extract confidential information from a bug the victim had access to.

CVE-2018-5123 https://bugzilla.mozilla.org/show_bug.cgi?id=1433400 2018-02-16 2018-02-16
bro -- integer overflow allows remote DOS bro 2.5.3

Philippe Antoine of Catena cyber:

This is a security release that fixes an integer overflow in code generated by binpac. This issue can be used by remote attackers to crash Bro (i.e. a DoS attack). There also is a possibility this can be exploited in other ways. (CVE pending.)

http://blog.bro.org/2018/02/bro-253-released-security-update.html 2018-02-14 2018-02-16
consul -- vulnerability in embedded DNS library consul 1.0.5

Consul developers report:

A flaw was found in the embedded DNS library used in consul which may allow a denial of service attack. Consul was updated to include the fixed version.

https://github.com/hashicorp/consul/issues/3859 https://github.com/hashicorp/consul/blob/master/CHANGELOG.md#105-february-7-2018 https://github.com/miekg/dns/pull/631 https://github.com/miekg/dns/issues/627 CVE-2017-15133 2018-01-17 2018-02-16
bro -- out of bounds write allows remote DOS bro 2.5.2

Frank Meier:

Bro before Bro v2.5.2 is vulnerable to an out of bounds write in the ContentLine analyzer allowing remote attackers to cause a denial of service (crash) and possibly other exploitation.

http://blog.bro.org/2017/10/bro-252-242-release-security-update.html 2017-10-16 2018-02-16
quagga -- several security issues quagga 1.2.3

Quagga reports:

The Quagga BGP daemon, bgpd, does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or it may crash.

The Quagga BGP daemon, bgpd, can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes.

The Quagga BGP daemon, bgpd, can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.

The Quagga BGP daemon, bgpd, can enter an infinite loop if sent an invalid OPEN message by a configured peer.

https://www.quagga.net/security/Quagga-2018-0543.txt https://www.quagga.net/security/Quagga-2018-1114.txt https://www.quagga.net/security/Quagga-2018-1550.txt https://www.quagga.net/security/Quagga-2018-1975.txt CVE-2018-5378 CVE-2018-5379 CVE-2018-5380 CVE-2018-5381 2018-01-31 2018-02-15
libraw -- multiple DoS vulnerabilities libraw 0.18.7

Secunia Research reports:

CVE-2018-5800: An off-by-one error within the "LibRaw::kodak_ycbcr_load_raw()" function (internal/dcraw_common.cpp) can be exploited to cause a heap-based buffer overflow and subsequently cause a crash.

CVE-2017-5801: An error within the "LibRaw::unpack()" function (src/libraw_cxx.cpp) can be exploited to trigger a NULL pointer dereference.

CVE-2017-5802: An error within the "kodak_radc_load_raw()" function (internal/dcraw_common.cpp) related to the "buf" variable can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash.

https://www.securityfocus.com/archive/1/541732 CVE-2018-5800 CVE-2018-5801 CVE-2018-5802 2018-01-16 2018-02-15
libraw -- multiple DoS vulnerabilities libraw 0.18.6

Secunia Research reports:

CVE-2017-16909: An error related to the "LibRaw::panasonic_load_raw()" function (dcraw_common.cpp) can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image.

CVE-2017-16910: An error within the "LibRaw::xtrans_interpolate()" function (internal/dcraw_common.cpp) can be exploited to cause an invalid read memory access.

https://www.securityfocus.com/archive/1/541583 CVE-2017-16909 CVE-2017-16910 2017-12-04 2018-02-15
bitmessage -- remote code execution vulnerability bitmessage 0.6.2

Bitmessage developers report:

A remote code execution vulnerability has been spotted in use against some users running PyBitmessage v0.6.2. The cause was identified and a fix has been added and released as 0.6.3.2. (Will be updated if/when CVE will be available.)

https://github.com/Bitmessage/PyBitmessage/releases/tag/v0.6.3 https://bitmessage.org/wiki/Main_Page 2018-02-13 2018-02-14
jenkins -- Path traversal vulnerability allows access to files outside plugin resources jenkins 2.106 jenkins-lts 2.89.3

Jenkins developers report:

Jenkins did not properly prevent specifying relative paths that escape a base directory for URLs accessing plugin resource files. This allowed users with Overall/Read permission to download files from the Jenkins master they should not have access to.

https://jenkins.io/security/advisory/2018-02-14/ https://jenkins.io/blog/2018/02/14/security-updates/ CVE-2018-6356 2018-02-14 2018-02-14
bchunk -- access violation near NULL on destination operand and crash bchunk 1.2.01.2.1

Mitre reports:

bchunk 1.2.0 and 1.2.1 is vulnerable to an "Access violation near NULL on destination operand" and crash when processing a malformed CUE (.cue) file.

CVE-2017-15955 https://nvd.nist.gov/vuln/detail/CVE-2017-15955 2017-10-28 2018-02-13
bchunk -- heap-based buffer overflow (with invalid free) and crash bchunk 1.2.01.2.1

Mitre reports:

bchunk 1.2.0 and 1.2.1 is vulnerable to a heap-based buffer overflow (with a resultant invalid free) and crash when processing a malformed CUE (.cue) file.

CVE-2017-15954 https://nvd.nist.gov/vuln/detail/CVE-2017-15954 2017-10-28 2018-02-13
bchunk -- heap-based buffer overflow and crash bchunk 1.2.01.2.1

Mitre reports:

bchunk 1.2.0 and 1.2.1 vulnerable to a heap-based buffer overflow and crash when processing a malformed CUE (.cue) file.

CVE-2017-15953 https://nvd.nist.gov/vuln/detail/CVE-2017-15953 2017-10-28 2018-02-13
uwsgi -- a stack-based buffer overflow uwsgi 2.0.16

Uwsgi developers report:

It was discovered that the uwsgi_expand_path function in utils.c in Unbit uWSGI, an application container server, has a stack-based buffer overflow via a large directory length that can cause a denial-of-service (application crash) or stack corruption.

http://lists.unbit.it/pipermail/uwsgi/2018-February/008835.html https://lists.debian.org/debian-lts-announce/2018/02/msg00010.html CVE-2018-6758 2018-02-06 2018-02-13
python -- possible integer overflow vulnerability python34 3.4.8 python35 3.5.5

Python issue:

There is a possible integer overflow in PyString_DecodeEscape function of the file stringobject.c, which can be abused to gain a heap overflow, possibly leading to arbitrary code execution.

https://bugs.python.org/issue30657 https://docs.python.org/3.4/whatsnew/changelog.html https://docs.python.org/3.5/whatsnew/changelog.html CVE-2017-1000158 2017-06-03 2018-02-11
electrum -- JSONRPC vulnerability electrum-py36 2.63.0.5 electrum2 2.63.0.5

MITRE reports:

JSONRPC vulnerability

CVE-2018-6353 https://github.com/spesmilo/electrum-docs/blob/master/cve.rst https://bitcointalk.org/index.php?topic=2702103.0 2018-01-27 2018-02-11
libtorrent -- remote DoS libtorrent 0.13.6_5

X-cela reports:

Calls into build_benocde that use %zu could crash on 64 bit machines due to the size change of size_t. Someone can force READ_ENC_IA to fail allowing an internal_error to be thrown and bring down the client.

https://github.com/rakshasa/libtorrent/pull/99 ports/224664 2015-12-01 2018-02-10
exim -- a buffer overflow vulnerability, remote code execution exim 4.90.1

Exim developers report:

There is a buffer overflow in base64d(), if some pre-conditions are met. Using a handcrafted message, remote code execution seems to be possible.

https://exim.org/static/doc/security/CVE-2018-6789.txt 2018-02-05 2018-02-10
p7zip-codec-rar -- insufficient error handling p7zip-codec-rar 16.02_1

MITRE reports:

Insufficient exception handling in the method NCompress::NRar3::CDecoder::Code of 7-Zip before 18.00 and p7zip can lead to multiple memory corruptions within the PPMd code, alows remote attackers to cause a denial of service (segmentation fault) or execute arbitrary code via a crafted RAR archive.

CVE-2018-5996 https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5996 https://nvd.nist.gov/vuln/detail/CVE-2018-5996 2018-01-23 2018-02-10
p7zip -- heap-based buffer overflow p7zip 16.02_1

MITRE reports:

Heap-based buffer overflow in the NCompress::NShrink::CDecoder::CodeReal method in 7-Zip before 18.00 and p7zip allows remote attackers to cause a denial of service (out-of-bounds write) or potentially execute arbitrary code via a crafted ZIP archive.

CVE-2017-17969 https://landave.io/2018/01/7-zip-multiple-memory-corruptions-via-rar-and-zip/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17969 https://nvd.nist.gov/vuln/detail/CVE-2017-17969 https://marc.info/?l=bugtraq&=151782582216805&=2 2018-01-23 2018-02-10
mpv -- arbitrary code execution via crafted website mpv 0.27.1

mpv developers report:

mpv through 0.28.0 allows remote attackers to execute arbitrary code via a crafted web site, because it reads HTML documents containing VIDEO elements, and accepts arbitrary URLs in a src attribute without a protocol whitelist in player/lua/ytdl_hook.lua. For example, an av://lavfi:ladspa=file= URL signifies that the product should call dlopen on a shared object file located at an arbitrary local pathname. The issue exists because the product does not consider that youtube-dl can provide a potentially unsafe URL.

https://github.com/mpv-player/mpv/issues/5456 CVE-2018-6360 2018-01-28 2018-02-09 2018-02-11
Mailman -- Cross-site scripting (XSS) vulnerability in the web UI mailman 2.1.26 mailman-with-htdig 2.1.26 ja-mailman 2.1.14.j7_3,1

Mark Sapiro reports:

An XSS vulnerability in the user options CGI could allow a crafted URL to execute arbitrary javascript in a user's browser. A related issue could expose information on a user's options page without requiring login.

https://www.mail-archive.com/mailman-users@python.org/msg70478.html CVE-2018-5950 2018-01-20 2018-02-08
PostgreSQL vulnerabilities postgresql93-server 9.3.09.3.21 postgresql94-server 9.4.09.4.16 postgresql95-server 9.5.09.5.11 postgresql96-server 9.6.09.6.7 postgresql10-server 10.010.2

The PostgreSQL project reports:

  • CVE-2018-1052: Fix the processing of partition keys containing multiple expressions (only for PostgreSQL-10.x)
  • CVE-2018-1053: Ensure that all temporary files made with "pg_upgrade" are non-world-readable
CVE-2018-1052 CVE-2018-1053 2018-02-05 2018-02-08
tiff -- multiple vulnerabilities tiff 4.0.9

Debian Security Advisory reports:

Multiple vulnerabilities have been discovered in the libtiff library and the included tools, which may result in denial of service or the execution of arbitrary code.

CVE-2017-9935 http://bugzilla.maptools.org/show_bug.cgi?id=2704 CVE-2017-18013 http://bugzilla.maptools.org/show_bug.cgi?id=2770 225544 2017-06-22 2018-01-29
Flash Player -- multiple vulnerabilities linux-flashplayer 28.0.0.161

Adobe reports:

  • This update resolves use-after-free vulnerabilities that could lead to remote code execution (CVE-2018-4877, CVE-2018-4878).
CVE-2018-4877 CVE-2018-4878 https://helpx.adobe.com/security/products/flash-player/apsa18-01.html https://helpx.adobe.com/security/products/flash-player/apsb18-03.html 2018-01-31 2018-02-06
mini_httpd,thttpd -- Buffer overflow in htpasswd mini_httpd 1.28 thttpd 2.28

Alessio Santoru reports:

Buffer overflow in htpasswd.

http://acme.com/updates/archive/199.html 2017-12-13 2018-02-06
shadowsocks-libev -- command injection via shell metacharacters shadowsocks-libev 3.1.03.1.1

MITRE reports:

Improper parsing allows command injection via shell metacharacters in a JSON configuration request received via 127.0.0.1 UDP traffic.

https://nvd.nist.gov/vuln/detail/CVE-2017-15924 2017-10-27 2018-02-05
palemoon -- multiple vulnerabilities palemoon 27.7.2

Pale Moon reports:

CVE-2018-5102: Use-after-free in HTML media elements

CVE-2018-5122: Potential integer overflow in DoCrypt

CVE-2018-5102 CVE-2018-5122 2018-01-23 2018-02-03
Django -- information leakage py27-django111 py34-django111 py35-django111 py36-django111 1.11.10 py27-django20 py34-django20 py35-django20 py36-django20 2.0.2

Django release notes:

CVE-2018-6188: Information leakage in AuthenticationForm

A regression in Django 1.11.8 made AuthenticationForm run its confirm_login_allowed() method even if an incorrect password is entered. This can leak information about a user, depending on what messages confirm_login_allowed() raises. If confirm_login_allowed() isn't overridden, an attacker enter an arbitrary username and see if that user has been set to is_active=False. If confirm_login_allowed() is overridden, more sensitive details could be leaked.

This issue is fixed with the caveat that AuthenticationForm can no longer raise the "This account is inactive." error if the authentication backend rejects inactive users (the default authentication backend, ModelBackend, has done that since Django 1.10). This issue will be revisited for Django 2.1 as a fix to address the caveat will likely be too invasive for inclusion in older versions.

https://docs.djangoproject.com/en/1.11/releases/1.11.10/ https://docs.djangoproject.com/en/2.0/releases/2.0.2/ CVE-2018-6188 2018-02-01 2018-02-02
w3m - multiple vulnerabilities w3m w3m-img ja-w3m ja-w3m-img 0.5.3.20180125

Tatsuya Kinoshita reports:

CVE-2018-6196 * table.c: Prevent negative indent value in feed_table_block_tag().

CVE-2018-6197 * form.c: Prevent invalid columnPos() call in formUpdateBuffer().

CVE-2018-6198 * config.h.dist, config.h.in, configure, configure.ac, main.c, rc.c: Make temporary directory safely when ~/.w3m is unwritable.

https://github.com/tats/w3m/commit/e773a0e089276f82c546447c0fd1e6c0f9156628 CVE-2018-6196 CVE-2018-6197 CVE-2018-6198 2018-01-25 2018-02-01 2018-02-03
firefox -- Arbitrary code execution through unsanitized browser UI firefox 58.0.1,1 waterfox 56.0.3.65

The Mozilla Foundation reports:

Mozilla developer Johann Hofmann reported that unsanitized output in the browser UI can lead to arbitrary code execution.

https://bugzilla.mozilla.org/show_bug.cgi?id=1432966 2018-01-29 2018-01-29 2018-01-31
gcab -- stack overflow gcab 0.8

Upstream reports:

A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.

https://nvd.nist.gov/vuln/detail/CVE-2018-5345 https://mail.gnome.org/archives/ftp-release-list/2018-January/msg00066.html CVE-2018-5345 2018-01-23 2018-01-27
dovecot -- abort of SASL authentication results in a memory leak dovecot 2.02.2.33.2_3 2.32.3.0

Pedro Sampaio reports:

A flaw was found in dovecot 2.0 up to 2.2.33 and 2.3.0. A abort of SASL authentication results in a memory leak in Dovecot auth client used by login processes. The leak has impact in high performance configuration where same login processes are reused and can cause the process to crash due to memory exhaustion.

CVE-2017-15132 https://bugzilla.redhat.com/show_bug.cgi?id=1532768 https://github.com/dovecot/core/commit/1a29ed2f96da1be22fa5a4d96c7583aa81b8b060.patch 2018-01-09 2018-01-26 2018-02-01
cURL -- Multiple vulnerabilities curl 7.58.0

The cURL project reports:

libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. Sending the same set of headers to subsequest hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request.

https://curl.haxx.se/docs/adv_2018-b3bf.html CVE-2018-1000007 2018-01-24 2018-01-26
clamav -- multiple vulnerabilities clamav 0.99.3

ClamAV project reports:

Join us as we welcome ClamAV 0.99.3 to the family!.

This release is a security release and is recommended for all ClamAV users.

CVE-2017-12374 ClamAV UAF (use-after-free) Vulnerabilities

CVE-2017-12375 ClamAV Buffer Overflow Vulnerability

CVE-2017-12376 ClamAV Buffer Overflow in handle_pdfname Vulnerability

CVE-2017-12377 ClamAV Mew Packet Heap Overflow Vulnerability

CVE-2017-12378 ClamAV Buffer Over Read Vulnerability

CVE-2017-12379 ClamAV Buffer Overflow in messageAddArgument Vulnerability

CVE-2017-12380 ClamAV Null Dereference Vulnerability

http://blog.clamav.net/2018/01/clamav-0993-has-been-released.html CVE-2017-12374 CVE-2017-12375 CVE-2017-12376 CVE-2017-12377 CVE-2017-12378 CVE-2017-12379 CVE-2017-12380 2018-01-25 2018-01-26
mozilla -- multiple vulnerabilities firefox 58.0_1,1 waterfox 56.0.3.63 seamonkey linux-seamonkey 2.49.2 firefox-esr 52.6.0_1,1 linux-firefox 52.6.0,2 libxul thunderbird linux-thunderbird 52.6.0

Mozilla Foundation reports:

CVE-2018-5091: Use-after-free with DTMF timers

CVE-2018-5092: Use-after-free in Web Workers

CVE-2018-5093: Buffer overflow in WebAssembly during Memory/Table resizing

CVE-2018-5094: Buffer overflow in WebAssembly with garbage collection on uninitialized memory

CVE-2018-5095: Integer overflow in Skia library during edge builder allocation

CVE-2018-5097: Use-after-free when source document is manipulated during XSLT

CVE-2018-5098: Use-after-free while manipulating form input elements

CVE-2018-5099: Use-after-free with widget listener

CVE-2018-5100: Use-after-free when IsPotentiallyScrollable arguments are freed from memory

CVE-2018-5101: Use-after-free with floating first-letter style elements

CVE-2018-5102: Use-after-free in HTML media elements

CVE-2018-5103: Use-after-free during mouse event handling

CVE-2018-5104: Use-after-free during font face manipulation

CVE-2018-5105: WebExtensions can save and execute files on local file system without user prompts

CVE-2018-5106: Developer Tools can expose style editor information cross-origin through service worker

CVE-2018-5107: Printing process will follow symlinks for local file access

CVE-2018-5108: Manually entered blob URL can be accessed by subsequent private browsing tabs

CVE-2018-5109: Audio capture prompts and starts with incorrect origin attribution

CVE-2018-5110: Cursor can be made invisible on OS X

CVE-2018-5111: URL spoofing in addressbar through drag and drop

CVE-2018-5112: Extension development tools panel can open a non-relative URL in the panel

CVE-2018-5113: WebExtensions can load non-HTTPS pages with browser.identity.launchWebAuthFlow

CVE-2018-5114: The old value of a cookie changed to HttpOnly remains accessible to scripts

CVE-2018-5115: Background network requests can open HTTP authentication in unrelated foreground tabs

CVE-2018-5116: WebExtension ActiveTab permission allows cross-origin frame content access

CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right

CVE-2018-5118: Activity Stream images can attempt to load local content through file:

CVE-2018-5119: Reader view will load cross-origin content in violation of CORS headers

CVE-2018-5121: OS X Tibetan characters render incompletely in the addressbar

CVE-2018-5122: Potential integer overflow in DoCrypt

CVE-2018-5090: Memory safety bugs fixed in Firefox 58

CVE-2018-5089: Memory safety bugs fixed in Firefox 58 and Firefox ESR 52.6

CVE-2018-5089 CVE-2018-5090 CVE-2018-5091 CVE-2018-5092 CVE-2018-5093 CVE-2018-5094 CVE-2018-5095 CVE-2018-5097 CVE-2018-5098 CVE-2018-5099 CVE-2018-5100 CVE-2018-5101 CVE-2018-5102 CVE-2018-5103 CVE-2018-5104 CVE-2018-5105 CVE-2018-5106 CVE-2018-5107 CVE-2018-5108 CVE-2018-5109 CVE-2018-5110 CVE-2018-5111 CVE-2018-5112 CVE-2018-5113 CVE-2018-5114 CVE-2018-5115 CVE-2018-5116 CVE-2018-5117 CVE-2018-5118 CVE-2018-5119 CVE-2018-5121 CVE-2018-5122 https://www.mozilla.org/security/advisories/mfsa2018-02/ https://www.mozilla.org/security/advisories/mfsa2018-03/ 2018-01-23 2018-01-23 2018-01-29
powerdns-recursor -- insufficient validation of DNSSEC signatures powerdns-recursor 4.1.1

PowerDNS Security Advisory reports:

An issue has been found in the DNSSEC validation component of PowerDNS Recursor, allowing an ancestor delegation NSEC or NSEC3 record to be used to wrongfully prove the non-existence of a RR below the owner name of that record. This would allow an attacker in position of man-in-the-middle to send a NXDOMAIN answer for a name that does exist.

CVE-2018-1000003 https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-01.html 2018-01-22 2018-01-23
chromium -- multiple vulnerabilities chromium 63.0.3239.108

Google Chrome Releases reports:

2 security fixes in this release, including:

  • [788453] High CVE-2017-15429: UXSS in V8. Reported by Anonymous on 2017-11-24
  • [794792] Various fixes from internal audits, fuzzing and other initiatives
CVE-2017-15429 https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop_14.html 2017-12-14 2018-01-23
chromium -- multiple vulnerabilities chromium 63.0.3239.84

Google Chrome Releases reports:

37 security fixes in this release, including:

  • [778505] Critical CVE-2017-15407: Out of bounds write in QUIC. Reported by Ned Williamson on 2017-10-26
  • [762374] High CVE-2017-15408: Heap buffer overflow in PDFium. Reported by Ke Liu of Tencent's Xuanwu LAB on 2017-09-06
  • [763972] High CVE-2017-15409: Out of bounds write in Skia. Reported by Anonymous on 2017-09-11
  • [765921] High CVE-2017-15410: Use after free in PDFium. Reported by Luat Nguyen of KeenLab, Tencent on 2017-09-16
  • [770148] High CVE-2017-15411: Use after free in PDFium. Reported by Luat Nguyen of KeenLab, Tencent on 2017-09-29
  • [727039] High CVE-2017-15412: Use after free in libXML. Reported by Nick Wellnhofer on 2017-05-27
  • [766666] High CVE-2017-15413: Type confusion in WebAssembly. Reported by Gaurav Dewan of Adobe Systems India Pvt. Ltd. on 2017-09-19
  • [765512] Medium CVE-2017-15415: Pointer information disclosure in IPC call. Reported by Viktor Brange of Microsoft Offensive Security Research Team on 2017-09-15
  • [779314] Medium CVE-2017-15416: Out of bounds read in Blink. Reported by Ned Williamson on 2017-10-28
  • [699028] Medium CVE-2017-15417: Cross origin information disclosure in Skia. Reported by Max May on 2017-03-07
  • [765858] Medium CVE-2017-15418: Use of uninitialized value in Skia. Reported by Kushal Arvind Shah of Fortinet's FortiGuard Labs on 2017-09-15
  • [780312] Medium CVE-2017-15419: Cross origin leak of redirect URL in Blink. Reported by Jun Kokatsu on 2017-10-31
  • [777419] Medium CVE-2017-15420: URL spoofing in Omnibox. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-23
  • [774382] Medium CVE-2017-15422: Integer overflow in ICU. Reported by Yuan Deng of Ant-financial Light-Year Security Lab on 2017-10-13
  • [780484] Medium CVE-2017-15430: Unsafe navigation in Chromecast Plugin. Reported by jinmo123 on 2017-01-11
  • [778101] Low CVE-2017-15423: Issue with SPAKE implementation in BoringSSL. Reported by Greg Hudson on 2017-10-25
  • [756226] Low CVE-2017-15424: URL Spoof in Omnibox. Reported by Khalil Zhani on 2017-08-16
  • [756456] Low CVE-2017-15425: URL Spoof in Omnibox. Reported by xisigr of Tencent's Xuanwu Lab on 2017-08-17
  • [757735] Low CVE-2017-15426: URL Spoof in Omnibox. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-08-18
  • [768910] Low CVE-2017-15427: Insufficient blocking of Javascript in Omnibox. Reported by Junaid Farhan on 2017-09-26
  • [792099] Various fixes from internal audits, fuzzing and other initiatives
CVE-2017-15407 CVE-2017-15408 CVE-2017-15409 CVE-2017-15410 CVE-2017-15411 CVE-2017-15412 CVE-2017-15413 CVE-2017-15415 CVE-2017-15416 CVE-2017-15417 CVE-2017-15418 CVE-2017-15419 CVE-2017-15420 CVE-2017-15422 CVE-2017-15430 CVE-2017-15423 CVE-2017-15424 CVE-2017-15425 CVE-2017-15426 CVE-2017-15427 https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html 2017-12-06 2018-01-23
chromium -- out of bounds read chromium 62.0.3202.94

Google Chrome Releases reports:

1 security fix in this release, including:

  • [782145] High CVE-2017-15428: Out of bounds read in V8. Reported by Zhao Qixun of Qihoo 360 Vulcan Team on 2017-11-07
CVE-2017-15428 https://chromereleases.googleblog.com/2017/11/stable-channel-update-for-desktop_13.html 2017-11-13 2018-01-23
unbound -- vulnerability in the processing of wildcard synthesized NSEC records unbound 1.6.8

Unbound reports:

We discovered a vulnerability in the processing of wildcard synthesized NSEC records. While synthesis of NSEC records is allowed by RFC4592, these synthesized owner names should not be used in the NSEC processing. This does, however, happen in Unbound 1.6.7 and earlier versions.

https://unbound.net/downloads/CVE-2017-15105.txt CVE-2017-15105 ports/225313 2017-10-08 2018-01-19
phpbb3 -- multiple issues phpbb3 3.2.2

phpbb developers reports:

Password updater working with PostgreSQL - The cron for updating legacy password hashes was running invalid queries on PostgreSQL.

Deleting orphaned attachments w/ large number of orphaned attachments - Orphaned attachment deletion was improved to be able to delete them when a large number of orphaned attachments exist.

Multiple bugfixes for retrieving image size - Multiple issues with retrieving the image size of JPEGs and temporary files were resolved.

Issues with updating from phpBB 3.0.6 - Inconsistencies in the way parent modules were treated caused issues with updating from older phpBB 3.0 versions.

Forum / topic icon blurriness - Fixed issues with forum and topic icons looking blurry on some browsers.

https://wiki.phpbb.com/Release_Highlights/3.2.2 2018-01-07 2018-01-19
MySQL -- multiple vulnerabilities mariadb55-server 5.5.59 mariadb100-server 10.0.34 mariadb101-server 10.1.31 mariadb102-server 10.2.13 mysql55-server 5.5.59 mysql56-server 5.6.39 mysql57-server 5.7.21 percona55-server 5.5.59 percona56-server 5.6.39 percona57-server 5.7.21

Oracle reports:

Not all vulnerabilities are relevant for all flavors/versions of the servers and clients

  • Vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. GIS: CVE-2018-2573, DDL CVE-2018-2622, Optimizer: CVE-2018-2640, CVE-2018-2665, CVE-2018-2668, Security:Privileges: CVE-2018-2703, Partition: CVE-2018-2562.
  • Vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. InnoDB: CVE-2018-2565, CVE-2018-2612 DML: CVE-2018-2576, CVE-2018-2646, Stored Procedure: CVE-2018-2583, Performance Schema: CVE-2018-2590, Partition: CVE-2018-2591, Optimizer: CVE-2018-2600, CVE-2018-2667, Security:Privileges: CVE-2018-2696, Replication: CVE-2018-2647.
  • Vulnerability allows a low or high privileged attacker with network access via multiple protocols to compromise MySQL Server with unauthorized creation, deletion, modification or access to data/ critical data. InnoDB: CVE-2018-2612, Performance Schema: CVE-2018-2645, Replication: CVE-2018-2647, Partition: CVE-2018-2562.
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixMSQL https://mariadb.com/kb/en/library/mariadb-5559-release-notes/ CVE-2018-2562 CVE-2018-2565 CVE-2018-2573 CVE-2018-2576 CVE-2018-2583 CVE-2018-2586 CVE-2018-2590 CVE-2018-2591 CVE-2018-2600 CVE-2018-2612 CVE-2018-2622 CVE-2018-2640 CVE-2018-2645 CVE-2018-2646 CVE-2018-2647 CVE-2018-2665 CVE-2018-2667 CVE-2018-2668 CVE-2018-2696 CVE-2018-2703 2017-01-18 2018-01-19
wordpress -- multiple issues wordpress fr-wordpress 4.9.2,1 de-wordpress ja-wordpress ru-wordpress zh-wordpress-zh_CN zh-wordpress-zh_TW 4.9.2

wordpress developers reports:

JavaScript errors that prevented saving posts in Firefox have been fixed.

The previous taxonomy-agnostic behavior of get_category_link() and category_description() was restored.

Switching themes will now attempt to restore previous widget assignments, even when there are no sidebars to map.

https://wordpress.org/news/2018/01/wordpress-4-9-2-security-and-maintenance-release/ 2018-01-16 2018-01-19
gitlab -- Remote code execution on project import gitlab 10.1.6

GitLab developers report:

Today we are releasing versions 10.3.4, 10.2.6, and 10.1.6 for GitLab Community Edition (CE) and Enterprise Edition (EE).

These versions contain a number of important security fixes, including two that prevent remote code execution, and we strongly recommend that all GitLab installations be upgraded to one of these versions immediately.

https://about.gitlab.com/2018/01/16/gitlab-10-dot-3-dot-4-released/ CVE-2017-0915 CVE-2018-3710 2018-01-16 2018-01-17
transmission-daemon -- vulnerable to dns rebinding attacks transmission-daemon 2.92_3

Google Project Zero reports:

The transmission bittorrent client uses a client/server architecture, the user interface is the client which communicates to the worker daemon using JSON RPC requests.

As with all HTTP RPC schemes like this, any website can send requests to the daemon listening on localhost with XMLHttpRequest(), but the theory is they will be ignored because clients must prove they can read and set a specific header, X-Transmission-Session-Id. Unfortunately, this design doesn't work because of an attack called "DNS rebinding". Any website can simply create a dns name that they are authorized to communicate with, and then make it resolve to localhost.

Exploitation is simple, you could set script-torrent-done-enabled and run any command, or set download-dir to /home/user/ and then upload a torrent for .bashrc.

https://bugs.chromium.org/p/project-zero/issues/detail?id=1447 https://github.com/transmission/transmission/pull/468 2017-11-30 2018-01-14
shibboleth-sp -- vulnerable to forged user attribute data xmltooling 1.6.3 xerces-c3 3.1.4

Shibboleth consortium reports:

Shibboleth SP software vulnerable to forged user attribute data

The Service Provider software relies on a generic XML parser to process SAML responses and there are limitations in older versions of the parser that make it impossible to fully disable Document Type Definition (DTD) processing.

Through addition/manipulation of a DTD, it's possible to make changes to an XML document that do not break a digital signature but are mishandled by the SP and its libraries. These manipulations can alter the user data passed through to applications behind the SP and result in impersonation attacks and exposure of protected information.

While newer versions of the xerces-c3 parser are configured by the SP into disallowing the use of a DTD via an environment variable, this feature is not present in the xerces-c3 parser before version 3.1.4, so an additional fix is being provided now that an actual DTD exploit has been identified. Xerces-c3-3.1.4 was committed to the ports tree already on 2016-07-26.

https://shibboleth.net/community/advisories/secadv_20180112.txt CVE-2018-0486 2018-01-12 2018-01-12
Flash Player -- information disclosure linux-flashplayer 28.0.0.137

Adobe reports:

  • This update resolves an out-of-bounds read vulnerability that could lead to information disclosure (CVE-2018-4871).
CVE-2018-4871 https://helpx.adobe.com/security/products/flash-player/apsb18-01.html 2018-01-09 2018-01-09
awstats -- remote code execution awstats 7.7,1

Mitre reports:

Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000501 CVE-2017-1000501 ports/225007 2018-01-03 2018-01-08
irssi -- multiple vulnerabilities irssi 1.0.6,1

Irssi reports:

When the channel topic is set without specifying a sender, Irssi may dereference NULL pointer. Found by Joseph Bisch.

When using incomplete escape codes, Irssi may access data beyond the end of the string. Found by Joseph Bisch.

A calculation error in the completion code could cause a heap buffer overflow when completing certain strings. Found by Joseph Bisch.

When using an incomplete variable argument, Irssi may access data beyond the end of the string. Found by Joseph Bisch.

https://irssi.org/security/irssi_sa_2018_01.txt CVE-2018-5205 CVE-2018-5206 CVE-2018-5207 CVE-2018-5208 ports/224954 2018-01-03 2018-01-06
mozilla -- Speculative execution side-channel attack firefox 57.0.4,1 waterfox 56.0.2

Mozilla Foundation reports:

Jann Horn of Google Project Zero Security reported that speculative execution performed by modern CPUs could leak information through a timing side-channel attack. Microsoft Vulnerability Research extended this attack to browser JavaScript engines and demonstrated that code on a malicious web page could read data from other web sites (violating the same-origin policy) or private data from the browser itself.

Since this new class of attacks involves measuring precise time intervals, as a parti al, short-term, mitigation we are disabling or reducing the precision of several time sources in Firefox. The precision of performance.now() has been reduced from 5μs to 20μs, and the SharedArrayBuffer feature has been disabled because it can be used to construct a high-resolution timer.

https://www.mozilla.org/security/advisories/mfsa2018-01/ 2018-01-04 2018-01-05