CVE-2015-0860 SUSE企业Linux安全更新dpkg (SUSE-SU-2017:1096-1)

漏洞类别:SUSE

漏洞等级:

漏洞信息

SUSE has released security update for dpkg to fix the vulnerabilities.

Affected Products:
SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1

漏洞危害

This vulnerability could be exploited to gain partial access to sensitive information. Malicious users could also use this vulnerability to change partial contents or configuration on the system. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.

解决方案

Upgrade to the latest packages which contain a patch. To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

To install packages using the command line interface, use the command "yum update".

Refer to SUSE security advisory SUSE-SU-2017:1096-1 to address this issue and obtain further details.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

SUSE-SU-2017:1096-1: SUSE Enterprise Linux

0day

CVE-2017-5974 SUSE企业Linux安全更新zziplib (SUSE-SU-2017:1095-1)

漏洞类别:SUSE

漏洞等级:

漏洞信息

SUSE has released security update for zziplib to fix the vulnerabilities.

Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Desktop 12-SP2 SUSE Linux Enterprise Desktop 12-SP1

漏洞危害

This vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.

解决方案

Upgrade to the latest packages which contain a patch. To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

To install packages using the command line interface, use the command "yum update".

Refer to SUSE security advisory SUSE-SU-2017:1095-1 to address this issue and obtain further details.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

SUSE-SU-2017:1095-1: SUSE Enterprise Linux

0day

CVE-2017-3808 思科统一通信管理器拒绝服务漏洞 (cisco-sa-20170419-ucm)

漏洞类别:Cisco

漏洞等级:

漏洞信息

A vulnerability in the Session Initiation Protocol (SIP) UDP throttling process of Cisco Unified Communications Manager (Cisco Unified CM) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to insufficient rate limiting protection.

漏洞危害

An attacker could exploit this vulnerability by sending the affected device a high rate of SIP messages. An exploit could allow the attacker to cause the device to reload unexpectedly. The device and services will restart automatically.

解决方案

Cisco has released fixes to resolve these vulnerabilities. Refer cisco-sa-20170419-ucm to obtain more information.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

cisco-sa-20170419-ucm: Cisco Unified Communications Manager

0day

CVE-2017-6615 Cisco IOS氙软件简单网络管理协议子系统拒绝服务漏洞 (cisco-sa-20170419-ios-xe-snmp)

漏洞类别:Cisco

漏洞等级:

漏洞信息

A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service condition.
The vulnerability is due to a race condition that could occur when the affected software processes an SNMP read request that contains certain criteria for a specific object ID (OID) and an active crypto session is disconnected on an affected device.

漏洞危害

An attacker who can authenticate to an affected device could trigger this vulnerability by issuing an SNMP request for a specific OID on the device. A successful exploit will cause the device to restart due to an attempt to access an invalid memory region. The attacker does not control how or when crypto sessions are disconnected on the device.

解决方案

Refer to Cisco advisory cisco-sa-20170419-ios-xe-snmp for updates and patch information.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

cisco-sa-20170419-ios-xe-snmp: Cisco IOS XE

0day

CVE-2017-3860 Cisco IOS和IOS XE软件energywise拒绝服务漏洞 (cisco-sa-20170419-energywise)

漏洞类别:Cisco

漏洞等级:

漏洞信息

Multiple vulnerabilities in the EnergyWise module of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition.
These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device.

漏洞危害

An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition.

解决方案

Refer to Cisco ASA advisory cisco-sa-20170419-energywise for updates and patch information.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

cisco-sa-20170419-energywise: Cisco IOS

0day

CVE-2017-7219 Citrix NetScaler的堆溢出漏洞(CTX222657)

漏洞类别:Local

漏洞等级:

漏洞信息

A heap overflow vulnerability has been identified in Citrix NetScaler Gateway that could allow a remote, authenticated user to execute arbitrary commands on the NetScaler Gateway appliance as a root user.

The vulnerability affects the following versions of Citrix NetScaler Gateway:
Version 11.1 earlier than 11.1 Build 52.13
Version 11.0 earlier than 11.0 Build 70.12
Version 10.5 earlier than 10.5 Build 65.11
Version 10.1 earlier than 10.1 Build 135.8/135.12

漏洞危害

Heap Overflow vulnerability in Citrix NetScaler Gateway Could Result in Arbitrary Code Execution.

解决方案

Customers are advised to refer to CTX222657 for information pertaining to remediating this vulnerability.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

CTX222657: Citrix NetScaler

0day

CVE-2017-3561 Oracle VM VirtualBox Multiple Vulnerabilities.

漏洞类别:Local

漏洞等级:

漏洞信息

VirtualBox is a general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use.

Multiple vulnerabilities were reported in Oracle VM VirtualBox. A local user can cause denial of service conditions on the target system. A local user can access and modify data on the target system. A local user can obtain elevated privileges on the target system.
A local user can exploit a flaw in the Oracle VM VirtualBox Core component to gain elevated privileges [CVE-2017-3561, CVE-2017-3563, CVE-2017-3576].
A local user can exploit a flaw in the Oracle VM VirtualBox Core component to partially access data, partially modify data, and deny service [CVE-2017-3558].
A local user can exploit a flaw in the Oracle VM VirtualBox Shared Folder component to modify data and cause denial of service conditions [CVE-2017-3587].
A local user can exploit a flaw in the Oracle VM VirtualBox Core component to partially access data, partially modify data, and deny service [CVE-2017-3559].
A local user can exploit a flaw in the Oracle VM VirtualBox Core component to modify data and cause denial of service conditions [CVE-2017-3575].
A local user can exploit a flaw in the Oracle VM VirtualBox Shared Folder component to access and modify data [CVE-2017-3538].
A local user can exploit a flaw in the Oracle VM VirtualBox Core component to partially access data [CVE-2017-3513].

Affected Versions :
Oracle VM VirtualBox prior to 5.0.38, prior to 5.1.20

漏洞危害

A local user can cause denial of service conditions on the target system.
A local user can obtain data on the target system.
A local user can obtain elevated privileges on the target system.
A local user can modify data on the target system.

解决方案

The vendor has issued a fix (5.0.38, 5.1.20). Download latest version from here.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

Oracle VM VirtualBox: Windows

0day

CVE-2017-5057 Google Chrome Prior to 58.0.3029.81 Multiple Vulnerabilities

漏洞类别:Local

漏洞等级:

漏洞信息

Google Chrome is a web browser for multiple platforms developed by Google.

This Google Chrome update fixes the following vulnerabilities:
A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system.
A use-after-free memory error may occur in Print Preview [CVE-2017-5058].
A use-after-free memory error may occur in Chrome Apps [CVE-2017-5062].
A heap use-after-free memory error may occur in Print Preview [CVE-2017-5058].
A heap overflow may occur in Skia [CVE-2017-5063].
A use-after-free memory error may occur in Blink [CVE-2017-5064].
A type confusion error may occur in Blink [CVE-2017-5059].
A type confusion error may occur in PDFium [CVE-2017-5057].
A remote user can spoof URLs in Omnibox [CVE-2017-5060, CVE-2017-5061, CVE-2017-5067].
A remote user can bypass cross-origin restrictions in Blink [CVE-2017-5069].
A signature handing error may occur in Networking [CVE-2017-5066].
A user interface error may occur in Blink [CVE-2017-5065].

漏洞危害

A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim.

解决方案

Customers are advised to upgrade to Google Chrome 58.0.3029.81 or a later version.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

Google Chrome: Windows

Google Chrome: MAC OS X

0day

CVE-2017-2669 Ubuntu Security Notification for Dovecot Vulnerability (USN-3258-1)

漏洞类别:Ubuntu

漏洞等级:

漏洞信息

It was discovered that Dovecot incorrectly handled some usernames.

漏洞危害

An attacker could possibly use this issue to cause Dovecot to hang or crash, resulting in a denial of service.

解决方案

Refer to Ubuntu advisory USN-3258-1 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

USN-3258-1: 16.10 (Yakkety) on src (dovecot-core)

USN-3258-1: 16.04 (Xenial) on src (dovecot-core)

0day

CVE-2017-2636 Red Hat Update for kernel. (RHSA-2017-1125)

漏洞类别:RedHat

漏洞等级:

漏洞信息

The kernel packages contain the Linux kernel, the core of any Linux operating system.

A race condition flaw was found in the N_HLDC Linux kernel driver when accessing n_hdlc.tbuf list that can lead to double free. A local, unprivileged user able to set the HDLC line discipline on the tty device could use this flaw to increase their privileges on the system. (CVE-2017-2636, Important)

漏洞危害

A local, unprivileged user able to set the HDLC line discipline on the tty device could use this flaw to increase their privileges on the system.

解决方案

Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

Refer to Red Hat security advisory RHSA-2017:1125 to address this issue and obtain more information.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

RHSA-2017:1125: Red Hat Enterprise Linux

0day