|
|
Subscribe / Log in / New account

Security

Encryption, the NSA, and the front door

By Nathan Willis
April 22, 2015

There are few topics these days that can spark debate in software-development circles as quickly as the US National Security Agency (NSA). Recently, the NSA's director went on the record in public to advocate mandating government access to encrypted software systems. Such mandatory access is an idea that has been floated before, and although this time around the specifics are different, the tech industry has been just as receptive to the potential interference as one would expect. The plan outlined would make it virtually impossible to deploy certain free-software systems without running afoul of regulations and, while it does not seem particularly likely to be written into law any time soon, is has provoked quite a bit of discussion.

NSA Director Michael Rogers made the comments in question during a speech at Princeton University. The Washington Post published a write-up of the talk on April 10. The story quotes Rogers as saying "I don’t want a back door [...] I want a front door. And I want the front door to have multiple locks. Big locks." The distinction Rogers made was that "back doors" are hidden entry points; what he promoted are encryption systems with strong crypto—but where law enforcement has a way to access the keys.

The comments come while the White House is studying encryption policy, the Post story explains. In a February interview with Re/code, President Obama said "there’s no scenario in which we don’t want really strong encryption", but went on to say that law enforcement has a national-security interest in accessing encrypted communication. The difficulty, he said, is that encryption that is too strong makes it impossible for a software company to comply with a court order requesting specific documents.

All of this, of course, is familiar territory. A service provider (such as an email-hosting service) might be asked to turn over the emails and access logs associated with a particular user account. If all of the encryption keys needed to decrypt the account information are held by the user, the service provider cannot turn over any readable documents. What is different, however, is Rogers's suggestion.

For reference, in the mid-1990s the Clinton administration proposed a mandatory "key escrow" system, in which service providers would be required to create decryption keys independent of any keys held by the user or the service provider. Those keys would be turned over to a "trusted party" that would, in turn, release the appropriate key to the US government when required during criminal investigations. The proposal was an extension of the Clipper chip project, which was a hardware-based encryption system for digital phones. Each chip had a backdoor encryption key burned in during the manufacturing process; the backdoor key was held by the government. The Clipper chip failed in the marketplace, however, and was quickly abandoned.

The Wikipedia entry on key escrow links to a copy [PDF] of the 1996 CIA memo advocating a post-Clipper-chip escrow program. It makes for interesting historical reading, but the program was never implemented. The objections to it (apart from the risk driving software development away from the US) were straightforward: fear of abuse by government agencies or individuals, fear of abuse by the "trusted parties," and the general principle that individuals deserve to keep some of their communication private.

What Rogers proposed this time is a "split key" system. As with key escrow, an encryption key independent of the user's would be generated for each account—but in this system each of those keys would then be split into parts. The government would hold one half, and the service provider the other. Both pieces would have to be brought together to access a user account. That way, no single rogue actor could access a user's private data—regardless of whether the actor was from law enforcement or from the service provider.

The Post story cites critics of the proposal from Yahoo and from George Washington University’s Cyberspace Security Policy and Research Institute. There would be technological and logistical challenges to a mandatory form of such a system—imagine how many split keys would need to be generated and delivered to law enforcement on a daily basis for services as popular as Gmail and Facebook, for instance.

There is also the problem of keeping the split keys separate. Even if they are held by separate entities in the long term, they must be generated together and then distributed. That provides an opportunity for an attacker to copy both keys well before they reach the proper hands (including, of course, the service keeping its own copy of the government key from day one). Similarly, any time both key halves are used together, there would be another opportunity to steal or duplicate them.

In addition, critics of US government security policy may understandably have questions about how the government would exercise its right to meet with the service provider and access a suspicious account. Would such meetings be subject to gag orders or secret National Security Letters? Would the government be able to compel the service to turn over its half of the key, if it decided the stakes were particularly high?

Furthermore, under such a plan it might become illegal in the US to run non-compliant Internet services (possibly even for private use), which would put untold numbers of free-software projects in a bind. They would have to choose between implementing the mandatory split-key escrow service and losing US users. Free-software projects not based in the US would hardly be expected to merge in support for a US-government access program. No doubt some users in the US would continue to run their own services as they see fit, but they would do so at significant legal risk.

The Post story notes that, so far, there is no legislation proposed to implement what Rogers is asking for. It would seem to be a hard sell in the current climate; after the Edward Snowden leaks, cooperating with the NSA is a decidedly unpopular proposition in tech circles, and consumer interest in privacy issues is relatively high.

Nevertheless, privacy advocates are not taking anything for granted. The Electronic Frontier Foundation (EFF) criticized Rogers's comments, casting them in the same light as the Clipper chip and related proposals:

Key escrow was a bad idea in 1993. It was a bad idea when the National Security Agency began attempting to covertly insert backdoors into cryptographic standards from 2000 on. It was a bad idea when the Obama administration indicated a desire to legislate key escrow in 2010. And it's a bad idea now [...]

On the plus side, the EFF article is a welcome reminder that past attempts to mandate back (or front) doors in encryption products have failed. Historians will note that the Clipper chip fiasco contributed considerably to the growth of PGP and other software encryption projects, even though at that time encryption was considered "munitions" and was subject to export controls.

Whatever comes of the NSA's interest in split-key escrow technology, it will no doubt provoke considerable work from privacy-conscious software developers—perhaps leading to projects that will have just as much impact in the long term as PGP.

Comments (32 posted)

Brief items

Security quote of the week

Yes, the real issue here is the chilling effects on security research. Security researchers who point out security flaws is a good thing, and should be encouraged.

But to me, the fascinating part of this story is that a computer was monitoring the Twitter feed and understood the obscure references, alerted a person who figured out who wrote them, researched what flight he was on, and sent an FBI team to the Syracuse airport within a couple of hours. There's some serious surveillance going on.

Now, it is possible that Roberts was being specifically monitored. He is already known as a security researcher who is working on avionics hacking. But still...

Bruce Schneier

Comments (2 posted)

How Tor is building a new Dark Net with help from the U.S. military (The Daily Dot)

The Daily Dot reports that the Tor project is receiving some funding from the US Defense Advanced Research Projects Agency (DARPA) to improve Tor's hidden services. "The Dark Net road map moving forward is ambitious. Tor plans to double the encryption strength of hidden service’s identity key and to allow offline storage for that key, a major security upgrade. Next-generation hidden services may be run from multiple hosts to better deal with denial of service attacks and high traffic in general, a potentially big power boost that further closes the gap between the Dark Net and normal websites."

Comments (none posted)

New vulnerabilities

ceph-deploy: information leak

Package(s):ceph-deploy CVE #(s):CVE-2015-3010
Created:April 22, 2015 Updated:April 22, 2015
Description: From the Red Hat bugzilla:

ceph-deploy versions before 1.5.23 had an issue where keyring permissions were world readable.

Alerts:
Fedora FEDORA-2015-5981 ceph-deploy 2015-04-21

Comments (none posted)

chromium: multiple vulnerabilities

Package(s):chromium CVE #(s):CVE-2015-3333 CVE-2015-3334 CVE-2015-3335 CVE-2015-3336
Created:April 22, 2015 Updated:April 28, 2015
Description: From the CVE entries:

Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors. (CVE-2015-3333)

browser/ui/website_settings/website_settings.cc in Google Chrome before 42.0.2311.90 does not always display "Media: Allowed by you" in a Permissions table after the user has granted camera permission to a web site, which might make it easier for user-assisted remote attackers to obtain sensitive video data from a device's physical environment via a crafted web site that turns on the camera at a time when the user believes that camera access is prohibited. (CVE-2015-3334)

The NaClSandbox::InitializeLayerTwoSandbox function in components/nacl/loader/sandbox_linux/nacl_sandbox_linux.cc in Google Chrome before 42.0.2311.90 does not have RLIMIT_AS and RLIMIT_DATA limits for Native Client (aka NaCl) processes, which might make it easier for remote attackers to conduct row-hammer attacks or have unspecified other impact by leveraging the ability to run a crafted program in the NaCl sandbox. (CVE-2015-3335)

Google Chrome before 42.0.2311.90 does not always ask the user before proceeding with CONTENT_SETTINGS_TYPE_FULLSCREEN and CONTENT_SETTINGS_TYPE_MOUSELOCK changes, which allows user-assisted remote attackers to cause a denial of service (UI disruption) by constructing a crafted HTML document containing JavaScript code with requestFullScreen and requestPointerLock calls, and arranging for the user to access this document with a file: URL. (CVE-2015-3336)

Alerts:
Ubuntu USN-2570-1 oxide-qt 2015-04-27
Debian DSA-3238-1 chromium-browser 2015-04-26
Mageia MGASA-2015-0164 chromium-browser-stable 2015-04-23
openSUSE openSUSE-SU-2015:0748-1 Chromium 2015-04-22

Comments (none posted)

chromium: multiple vulnerabilities

Package(s):chromium-browser CVE #(s):CVE-2015-1235 CVE-2015-1236 CVE-2015-1237 CVE-2015-1238 CVE-2015-1240 CVE-2015-1241 CVE-2015-1242 CVE-2015-1244 CVE-2015-1245 CVE-2015-1246 CVE-2015-1247 CVE-2015-1248 CVE-2015-1249
Created:April 16, 2015 Updated:April 28, 2015
Description: From the Red Hat advisory:

Bugs fixed (https://bugzilla.redhat.com/):
1211919 - CVE-2015-1235 chromium-browser: Cross-origin-bypass in HTML parser
1211920 - CVE-2015-1236 chromium-browser: Cross-origin-bypass in Blink
1211921 - CVE-2015-1237 chromium-browser: Use-after-free in IPC
1211922 - CVE-2015-1238 chromium-browser: Out-of-bounds write in Skia
1211923 - CVE-2015-1240 chromium-browser: Out-of-bounds read in WebGL
1211924 - CVE-2015-1241 chromium-browser: tap-jacking vulnerability
1211925 - CVE-2015-1242 chromium-browser: Type confusion in V8
1211926 - CVE-2015-1244 chromium-browser: HSTS bypass in WebSockets
1211927 - CVE-2015-1245 chromium-browser: Use-after-free in PDFium
1211928 - CVE-2015-1246 chromium-browser: Out-of-bounds read in Blink
1211929 - CVE-2015-1247 chromium-browser: Scheme issues in OpenSearch
1211930 - CVE-2015-1248 chromium-browser: SafeBrowsing bypass
1211932 - CVE-2015-1249 chromium-browser: Various fixes from internal audits, fuzzing and other initiatives

Alerts:
openSUSE openSUSE-SU-2015:1887-1 chromium 2015-11-02
Gentoo 201506-04 chromium 2015-06-22
Ubuntu USN-2570-1 oxide-qt 2015-04-27
Debian DSA-3238-1 chromium-browser 2015-04-26
Mageia MGASA-2015-0164 chromium-browser-stable 2015-04-23
openSUSE openSUSE-SU-2015:0748-1 Chromium 2015-04-22
Arch Linux ASA-201504-19 chromium 2015-04-18
Red Hat RHSA-2015:0816-01 chromium-browser 2015-04-16

Comments (none posted)

curl: multiple vulnerabilities

Package(s):curl CVE #(s):CVE-2015-3143 CVE-2015-3144 CVE-2015-3145 CVE-2015-3148
Created:April 22, 2015 Updated:May 4, 2015
Description: From the Debian advisory:

CVE-2015-3143: NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user. This is similar to the issue fixed in DSA-2849-1.

CVE-2015-3144: When parsing URLs with a zero-length hostname (such as "http://:80"), libcurl would try to read from an invalid memory address. This could allow remote attackers to cause a denial of service (crash). This issue only affects the upcoming stable (jessie) and unstable (sid) distributions.

CVE-2015-3145: When parsing HTTP cookies, if the parsed cookie's "path" element consists of a single double-quote, libcurl would try to write to an invalid heap memory address. This could allow remote attackers to cause a denial of service (crash). This issue only affects the upcoming stable (jessie) and unstable (sid) distributions.

CVE-2015-3148: When doing HTTP requests using the Negotiate authentication method along with NTLM, the connection used would not be marked as authenticated, making it possible to reuse it and send requests for one user over the connection authenticated as a different user.

Alerts:
Scientific Linux SLSA-2015:2159-6 curl 2015-12-21
Oracle ELSA-2015-2159 curl 2015-11-23
Red Hat RHSA-2015:2159-06 curl 2015-11-19
Slackware SSA:2015-302-01 curl 2015-10-29
Gentoo 201509-02 curl 2015-09-24
Scientific Linux SLSA-2015:1254-2 curl 2015-08-03
Oracle ELSA-2015-1254 curl 2015-07-29
Red Hat RHSA-2015:1254-02 curl 2015-07-22
Fedora FEDORA-2015-6853 mingw-curl 2015-05-04
Mandriva MDVSA-2015:220 curl 2015-05-04
Mandriva MDVSA-2015:219 curl 2015-05-04
Mageia MGASA-2015-0179 curl 2015-05-03
Fedora FEDORA-2015-6728 curl 2015-05-02
Ubuntu USN-2591-1 curl 2015-04-30
Debian-LTS DLA-211-1 curl 2015-04-29
openSUSE openSUSE-SU-2015:0799-1 curl 2015-04-29
Fedora FEDORA-2015-6712 curl 2015-04-28
Arch Linux ASA-201504-28 curl 2015-04-24
Debian DSA-3232-1 curl 2015-04-22

Comments (none posted)

django-markupfield: information leak

Package(s):django-markupfield CVE #(s):CVE-2015-0846
Created:April 20, 2015 Updated:April 22, 2015
Description: From the Debian advisory:

James P. Turk discovered that the ReST renderer in django-markupfield, a custom Django field for easy use of markup in text fields, didn't disable the ..raw directive, allowing remote attackers to include arbitrary files.

Alerts:
Debian-LTS DLA-206-1 python-django-markupfield 2015-04-20
Debian DSA-3230-1 django-markupfield 2015-04-20

Comments (none posted)

firefox: code execution

Package(s):firefox CVE #(s):CVE-2015-2706
Created:April 22, 2015 Updated:May 14, 2015
Description: From the Arch Linux advisory:

Mozilla developer Robert Kaiser reported that a specially crafted HTML, when loaded by the target user, will trigger a use-after-free race condition when a plugin fails to initialize, which may lead to a memory corruption error in AsyncPaintWaitEvent::AsyncPaintWaitEvent() and arbitrary code execution on the target system.

A remote attacker is able to use a specially crafted HTML that, when loaded by the target user, will trigger a race condition leading to memory corruption and arbitrary code execution.

Alerts:
Gentoo 201512-10 firefox 2015-12-30
Mageia MGASA-2015-0342 iceape 2015-09-08
Fedora FEDORA-2015-8179 thunderbird 2015-05-14
Fedora FEDORA-2015-6621 xulrunner 2015-05-11
Fedora FEDORA-2015-5398 thunderbird 2015-05-11
Fedora FEDORA-2015-6621 firefox 2015-05-11
Fedora FEDORA-2015-6615 xulrunner 2015-04-28
Fedora FEDORA-2015-6615 firefox 2015-04-28
Ubuntu USN-2571-1 firefox 2015-04-24
openSUSE openSUSE-SU-2015:0763-1 firefox 2015-04-24
openSUSE openSUSE-SU-2015:0761-1 firefox 2015-04-24
Arch Linux ASA-201504-24 firefox 2015-04-22

Comments (none posted)

glibc: code execution

Package(s):glibc CVE #(s):CVE-2015-1781
Created:April 21, 2015 Updated:May 28, 2015
Description: From the Red Hat advisory:

A buffer overflow flaw was found in the way glibc's gethostbyname_r() and other related functions computed the size of a buffer when passed a misaligned buffer as input. An attacker able to make an application call any of these functions with a misaligned buffer could use this flaw to crash the application or, potentially, execute arbitrary code with the permissions of the user running the application.

Alerts:
Ubuntu USN-2985-2 eglibc, glibc 2016-05-26
Ubuntu USN-2985-1 eglibc, glibc 2016-05-25
SUSE SUSE-SU-2016:0470-1 glibc 2016-02-16
Gentoo 201602-02 glibc 2016-02-17
Fedora FEDORA-2016-0480defc94 glibc 2016-02-17
Debian DSA-3480-1 eglibc 2016-02-16
Scientific Linux SLSA-2015:2199-7 glibc 2015-12-21
Red Hat RHSA-2015:2589-01 glibc 2015-12-09
Oracle ELSA-2015-2199 glibc 2015-11-25
Red Hat RHSA-2015:2199-07 glibc 2015-11-19
SUSE SUSE-SU-2015:1424-1 glibc 2015-08-21
Mageia MGASA-2015-0195 glibc 2015-05-06
openSUSE openSUSE-SU-2015:0955-1 glibc, glibc-testsuite, glibc-utils, glibc.i686 2015-05-27
Mandriva MDVSA-2015:218 glibc 2015-04-30
Arch Linux ASA-201504-25 glibc 2015-04-23
Oracle ELSA-2015-0863 glibc 2015-04-21
Scientific Linux SLSA-2015:0863-1 glibc 2015-04-21
CentOS CESA-2015:0863 glibc 2015-04-21
Red Hat RHSA-2015:0863-01 glibc 2015-04-21
Debian-LTS DLA-230-1 eglibc 2015-05-27

Comments (none posted)

gnupg2: double-free issue

Package(s):gnupg2 CVE #(s):
Created:April 20, 2015 Updated:April 22, 2015
Description: From the Red Hat bugzilla:

Double-free issue was reported in gnupg2:

in scd/command.c 'cert' is freed twice on ksba_cert_new() failure:

...
 778   rc = ksba_cert_new (&kc);
 779   if (rc)
 780     {
 781       xfree (cert);
 782       goto leave;
 783     }
...
 803  leave:
 804   ksba_cert_release (kc);
 805   xfree (cert);
Alerts:
Fedora FEDORA-2015-5987 gnupg2 2015-04-18

Comments (none posted)

groovy-sandbox: privilege escalation

Package(s):groovy-sandbox CVE #(s):CVE-2015-1806
Created:April 20, 2015 Updated:April 22, 2015
Description: From the Red Hat bugzilla:

This vulnerability allows users with the job configuration privilege to escalate his privileges, resulting in arbitrary code execution to the master.

Alerts:
Red Hat RHSA-2016:0070-01 RHOSE 2016-01-26
Red Hat RHSA-2015:1844-01 OpenShift 2015-09-30
Fedora FEDORA-2015-5637 jenkins-script-security-plugin 2015-04-18
Fedora FEDORA-2015-5637 jenkins-matrix-project-plugin 2015-04-18
Fedora FEDORA-2015-5466 jenkins 2015-04-18
Fedora FEDORA-2015-5637 groovy-sandbox 2015-04-18

Comments (none posted)

gst-plugins-bad: code execution

Package(s):gst-plugins-bad0.10 CVE #(s):CVE-2015-0797
Created:April 16, 2015 Updated:December 30, 2015
Description: From the Debian advisory:

Aki Helin discovered a buffer overflow in the GStreamer plugin for MP4 playback, which could lead in the execution of arbitrary code.

Alerts:
Gentoo 201512-07 gstreamer 2015-12-30
SUSE SUSE-SU-2015:0978-1 firefox 2015-06-01
SUSE SUSE-SU-2015:0960-1 firefox 2015-05-28
SUSE SUSE-SU-2015:0921-1 gstreamer-0_10-plugins-bad 2015-05-20
Debian DSA-3264-1 icedove 2015-05-19
Scientific Linux SLSA-2015:0988-1 firefox 2015-05-13
Debian DSA-3260-1 iceweasel 2015-05-13
CentOS CESA-2015:0988 firefox 2015-05-13
CentOS CESA-2015:0988 firefox 2015-05-13
CentOS CESA-2015:0988 firefox 2015-05-13
Red Hat RHSA-2015:0988-01 firefox 2015-05-12
Mageia MGASA-2015-0188 gstreamer0.10-plugins-bad 2015-05-05
Debian DSA-3225-1 gst-plugins-bad0.10 2015-04-15
openSUSE openSUSE-SU-2015:0935-1 thunderbird 2015-05-24

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2014-8171
Created:April 21, 2015 Updated:April 22, 2015
Description: From the Red Hat advisory:

It was found that the Linux kernel memory resource controller's (memcg) handling of OOM (out of memory) conditions could lead to deadlocks. An attacker able to continuously spawn new processes within a single memory-constrained cgroup during an OOM event could use this flaw to lock up the system.

Alerts:
Scientific Linux SLSA-2015:2152-2 kernel 2015-12-21
Oracle ELSA-2015-2152 kernel 2015-11-25
Red Hat RHSA-2015:2411-01 kernel-rt 2015-11-19
Red Hat RHSA-2015:2152-02 kernel 2015-11-19
Oracle ELSA-2015-3064 kernel 3.8.13 2015-07-31
Oracle ELSA-2015-3064 kernel 3.8.13 2015-07-31
Oracle ELSA-2015-3035 kernel 2015-05-13
Oracle ELSA-2015-3035 kernel 2015-05-13
Oracle ELSA-2015-3032 Unbreakable Enterprise kernel 2015-04-23
Oracle ELSA-2015-3032 Unbreakable Enterprise kernel 2015-04-23
Scientific Linux SLSA-2015:0864-1 kernel 2015-04-21
Oracle ELSA-2015-0864 kernel 2015-04-21
CentOS CESA-2015:0864 kernel 2015-04-22
Red Hat RHSA-2015:0864-01 kernel 2015-04-21

Comments (none posted)

knot: multiple vulnerabilities

Package(s):knot CVE #(s):
Created:April 20, 2015 Updated:April 22, 2015
Description: From the Fedora advisory:

- new upstream release:

  • fix: performance drop for NSEC-signed zones
  • fix: proper handling of TCP short-writes
  • fix: possible out-of-bound reads in zone parser and packet parser
  • feature: CDS and CDNSKEY support in zone parser
  • improvement: add defaults for TCP config options into documentation
  • improvement: detailed error message if zone reload fails
Alerts:
Fedora FEDORA-2015-5812 knot 2015-04-18
Fedora FEDORA-2015-5813 knot 2015-04-18

Comments (none posted)

java: sandbox bypass

Package(s):java-1.8.0-openjdk CVE #(s):CVE-2015-0470
Created:April 16, 2015 Updated:April 22, 2015
Description: From the Red Hat advisory:

Multiple flaws were discovered in the Beans and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-0477, CVE-2015-0470)

Alerts:
Gentoo 201603-11 oracle-jre-bin 2016-03-12
Debian DSA-3316-1 openjdk-7 2015-07-25
Debian-LTS DLA-213-1 openjdk-6 2015-04-30
openSUSE openSUSE-SU-2015:0773-1 java-1_8_0-openjdk 2015-04-27
Debian DSA-3235-1 openjdk-7 2015-04-24
Debian DSA-3234-1 openjdk-6 2015-04-24
Arch Linux ASA-201504-23 jre8-openjdk-headless 2015-04-20
Arch Linux ASA-201504-22 jre8-openjdk 2015-04-20
Arch Linux ASA-201504-21 jdk8-openjdk 2015-04-20
Red Hat RHSA-2015:0854-01 java-1.8.0-oracle 2015-04-17
Scientific Linux SLSA-2015:0809-1 java-1.8.0-openjdk 2015-04-15
Red Hat RHSA-2015:0809-01 java-1.8.0-openjdk 2015-04-15

Comments (none posted)

java: multiple unspecified vulnerabilities

Package(s):java-1.8.0-oracle CVE #(s):CVE-2015-0458 CVE-2015-0459 CVE-2015-0484 CVE-2015-0486 CVE-2015-0491 CVE-2015-0492
Created:April 17, 2015 Updated:January 14, 2016
Description:

From the CVE entries:

CVE-2015-0458 - Unspecified vulnerability in in Oracle Java SE 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.

CVE-2015-0459 - Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0491.

CVE-2015-0484 - Unspecified vulnerability in Oracle Java SE 7u76 and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-0492.

CVE-2015-0486 - Unspecified vulnerability in Oracle Java SE 8u40 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.

CVE-2015-0491 - Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0459.

CVE-2015-0492 - Unspecified vulnerability in Oracle Java SE 7u76 and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-0484.

Alerts:
SUSE SUSE-SU-2016:0113-1 java-1_6_0-ibm 2016-01-13
Gentoo 201603-11 oracle-jre-bin 2016-03-12
SUSE SUSE-SU-2015:2168-2 java-1_7_1-ibm 2015-12-14
SUSE SUSE-SU-2015:2216-1 java-1_7_0-ibm 2015-12-07
SUSE SUSE-SU-2015:2182-1 java-1_7_1-ibm 2015-12-03
SUSE SUSE-SU-2015:2192-1 java-1_6_0-ibm 2015-12-03
SUSE SUSE-SU-2015:2168-1 java-1_7_1-ibm 2015-12-02
SUSE SUSE-SU-2015:2166-1 java-1_6_0-ibm 2015-12-02
SUSE SUSE-SU-2015:1161-1 java-1_6_0-ibm 2015-06-30
SUSE SUSE-SU-2015:1086-4 java-1_7_0-ibm 2015-06-27
SUSE SUSE-SU-2015:1086-3 Java 2015-06-24
SUSE SUSE-SU-2015:1138-1 IBM Java 2015-06-24
SUSE SUSE-SU-2015:1086-2 IBM Java 2015-06-22
SUSE SUSE-SU-2015:1086-1 IBM Java 2015-06-18
SUSE SUSE-SU-2015:1085-1 IBM Java 2015-06-18
Red Hat RHSA-2015:1007-01 java-1.7.0-ibm 2015-05-13
Red Hat RHSA-2015:1006-01 java-1.6.0-ibm 2015-05-13
SUSE SUSE-SU-2015:0833-1 java-1_7_0-openjdk 2015-05-07
Red Hat RHSA-2015:1020-01 java-1.7.1-ibm 2015-05-20
openSUSE openSUSE-SU-2015:0773-1 java-1_8_0-openjdk 2015-04-27
openSUSE openSUSE-SU-2015:0774-1 java-1_7_0-openjdk 2015-04-27
Red Hat RHSA-2015:0857-01 java-1.7.0-oracle 2015-04-20
Red Hat RHSA-2015:0858-01 java-1.6.0-sun 2015-04-20
Red Hat RHSA-2015:0854-01 java-1.8.0-oracle 2015-04-17
Red Hat RHSA-2015:1021-01 java-1.5.0-ibm 2015-05-20

Comments (none posted)

jenkins: multiple vulnerabilities

Package(s):jenkins CVE #(s):CVE-2015-1807 CVE-2015-1813 CVE-2015-1812 CVE-2015-1810 CVE-2015-1808 CVE-2015-1809 CVE-2015-1814 CVE-2015-1811
Created:April 20, 2015 Updated:April 22, 2015
Description: From the Red Hat bugzilla entries:

CVE-2015-1812, CVE-2015-1813: An attacker without any access to Jenkins can navigate the user to a carefully crafted URL and have the user execute unintended actions. This vulnerability can be used to attack Jenkins inside firewalls from outside so long as the location of Jenkins is known to the attacker.

CVE-2015-1814: The part of Jenkins that issues a new API token was not adequately protected against anonymous attackers. This allows an attacker to escalate privileges on Jenkins.

CVE-2015-1807: This vulnerability allows users with the job configuration privilege or users with commit access to the build script to access arbitrary files/directories on the master, resulting in the exposure of sensitive information, such as encryption keys.

CVE-2015-1808: This vulnerability allows authenticated users to disrupt the operation of Jenkins by feeding malicious update center data into Jenkins, affecting plugin installation and tool installation.

CVE-2015-1809: This vulnerability allows users with the read access to Jenkins to retrieve arbitrary XML document on the server, resulting in the exposure of sensitive information inside/outside Jenkins.

CVE-2015-1810: For users using "'Jenkins' own user database" setting, Jenkins doesn't refuse reserved names, thus allowing privilege escalation.

CVE-2015-1811: This vulnerability allows attackers to create malicious XML documents and feed that into Jenkins, which causes Jenkins to retrieve arbitrary XML document on the server, resulting in the exposure of sensitive information inside/outside Jenkins.

Alerts:
Red Hat RHSA-2016:0070-01 RHOSE 2016-01-26
Red Hat RHSA-2015:1844-01 OpenShift 2015-09-30
Fedora FEDORA-2015-5466 jenkins 2015-04-18

Comments (none posted)

mariadb: two unspecified vulnerabilities

Package(s):mariadb CVE #(s):CVE-2014-6474 CVE-2014-6489
Created:April 22, 2015 Updated:August 20, 2015
Description: From the CVE entries:

Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:MEMCACHED. (CVE-2014-6474)

Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect integrity and availability via vectors related to SERVER:SP. (CVE-2014-6489)

Alerts:
Fedora FEDORA-2015-13419 mariadb 2015-08-20
SUSE SUSE-SU-2015:0743-1 mariadb 2015-04-21

Comments (none posted)

mediawiki: cross-site scripting

Package(s):mediawiki CVE #(s):CVE-2014-9714
Created:April 20, 2015 Updated:April 22, 2015
Description: From the CVE entry:

Cross-site scripting (XSS) vulnerability in the WddxPacket::recursiveAddVar function in HHVM (aka the HipHop Virtual Machine) before 3.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted string to the wddx_serialize_value function. (CVE-2014-9714)

Alerts:
Fedora FEDORA-2015-5569 mediawiki 2015-04-18
Fedora FEDORA-2015-5570 mediawiki 2015-04-18

Comments (none posted)

movabletype-opensource: code execution

Package(s):movabletype-opensource CVE #(s):CVE-2015-0845
Created:April 16, 2015 Updated:April 22, 2015
Description: From the Debian advisory:

John Lightsey discovered a format string injection vulnerability in the localisation of templates in Movable Type, a blogging system. An unauthenticated remote attacker could take advantage of this flaw to execute arbitrary code as the web server user.

Alerts:
Debian DSA-3227-1 movabletype-opensource 2015-04-15

Comments (none posted)

MySQL: multiple unspecified vulnerabilities

Package(s):mysql-5.5 CVE #(s):CVE-2015-0433 CVE-2015-0441 CVE-2015-0499 CVE-2015-0501 CVE-2015-0505 CVE-2015-2568 CVE-2015-2571 CVE-2015-2573
Created:April 20, 2015 Updated:July 10, 2015
Description: From the CVE entries:

Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML. (CVE-2015-0433)

Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption. (CVE-2015-0441)

Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated. (CVE-2015-0499)

Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling. (CVE-2015-0501)

Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL. (CVE-2015-0505)

Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges. (CVE-2015-2568)

Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer. (CVE-2015-2571)

Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL. (CVE-2015-2573)

Alerts:
CentOS CESA-2015:1665 mariadb 2015-08-25
Scientific Linux SLSA-2015:1665-1 mariadb 2015-08-24
Oracle ELSA-2015-1665 mariadb 2015-08-24
Red Hat RHSA-2015:1665-01 mariadb 2015-08-24
Red Hat RHSA-2015:1647-01 mariadb55-mariadb 2015-08-20
Scientific Linux SLSA-2015:1628-1 mysql55-mysql 2015-08-17
Oracle ELSA-2015-1628 mysql55-mysql 2015-08-17
CentOS CESA-2015:1628 mysql55-mysql 2015-08-17
Red Hat RHSA-2015:1629-01 mysql55-mysql 2015-08-17
Red Hat RHSA-2015:1628-01 mysql55-mysql 2015-08-17
SUSE SUSE-SU-2015:1273-1 mariadb 2015-07-21
Debian DSA-3311-1 mariadb-10.0 2015-07-20
openSUSE openSUSE-SU-2015:1216-1 MariaDB 2015-07-09
Gentoo 201507-19 mysql 2015-07-10
Slackware SSA:2015-132-02 mysql 2015-05-12
Slackware SSA:2015-132-01 mariadb 2015-05-12
Arch Linux ASA-201505-3 mariadb 2015-05-08
Mageia MGASA-2015-0193 mariadb 2015-05-06
Mandriva MDVSA-2015:227 mariadb 2015-05-05
SUSE SUSE-SU-2015:0946-1 MySQL 2015-05-26
Ubuntu USN-2575-1 mysql-5.5 2015-04-21
Debian DSA-3229-1 mysql-5.5 2015-04-19

Comments (none posted)

ntop: cross-site-scripting

Package(s):ntop CVE #(s):CVE-2014-4165
Created:April 17, 2015 Updated:April 29, 2015
Description:

From the openSUSE advisory:

Lack of filtering in the title parameter of links to rrdPlugin allowed cross-site-scripting (XSS) attacks against users of the web interface.

Alerts:
Mandriva MDVSA-2015:216 ntop 2015-04-29
Mageia MGASA-2015-0168 ntop 2015-04-23
openSUSE openSUSE-SU-2015:0727-1 ntop 2015-04-16

Comments (none posted)

openstack-nova: multiple vulnerabilities

Package(s):openstack-nova CVE #(s):CVE-2014-3708 CVE-2014-8333
Created:April 17, 2015 Updated:April 22, 2015
Description:

From the Red Hat advisory:

A denial of service flaw was found in the way OpenStack Compute (nova) looked up VM instances based on an IP address filter. An attacker with sufficient privileges on an OpenStack installation with a large amount of VMs could use this flaw to cause the main nova process to block for an extended amount of time. (CVE-2014-3708)

A flaw was found in the OpenStack Compute (nova) VMWare driver, which could allow an authenticated user to delete an instance while it was in the resize state, causing the instance to remain on the back end. A malicious user could use this flaw to cause a denial of service by exhausting all available resources on the system. (CVE-2014-8333)

Alerts:
Red Hat RHSA-2015:0844-01 openstack-nova 2015-04-16
Red Hat RHSA-2015:0843-01 openstack-nova 2015-04-16

Comments (none posted)

openstack-swift: metadata constraint bypass

Package(s):openstack-swift CVE #(s):CVE-2014-7960
Created:April 17, 2015 Updated:August 6, 2015
Description:

From the Red Hat advisory:

A flaw was found in the metadata constraints in OpenStack Object Storage (swift). By adding metadata in several separate calls, a malicious user could bypass the max_meta_count constraint, and store more metadata than allowed by the configuration. (CVE-2014-7960)

Alerts:
SUSE SUSE-SU-2015:1846-1 openstack-swift 2015-10-30
Ubuntu USN-2704-1 swift 2015-08-05
Red Hat RHSA-2015:0836-01 openstack-swift 2015-04-16
Red Hat RHSA-2015:0835-01 openstack-swift 2015-04-16

Comments (none posted)

perl-Module-Signature: multiple vulnerabilities

Package(s):perl-Module-Signature CVE #(s):
Created:April 20, 2015 Updated:April 27, 2015
Description: From the Fedora advisory:

* Module::Signature before version 0.75 could be tricked into interpreting the unsigned portion of a SIGNATURE file as the signed portion due to faulty parsing of the PGP signature boundaries.

* When verifying the contents of a CPAN module, Module::Signature before version 0.75 ignored some files in the extracted tarball that were not listed in the signature file. This included some files in the t/ directory that would execute automatically during "make test".

* Module::Signature before version 0.75 used two argument open() calls to read the files when generating checksums from the signed manifest. This allowed embedding arbitrary shell commands into the SIGNATURE file that would execute during the signature verification process.

* Module::Signature before version 0.75 has been loading several modules at runtime inside the extracted module directory. Modules like Text::Diff are not guaranteed to be available on all platforms and could be added to a malicious module so that they would load from the '.' path in @INC.

Alerts:
Mandriva MDVSA-2015:207 perl-Module-Signature 2015-04-27
Mageia MGASA-2015-0160 perl-Module-Signature 2015-04-18
Fedora FEDORA-2015-5840 perl-Test-Signature 2015-04-18
Fedora FEDORA-2015-5833 perl-Test-Signature 2015-04-18
Fedora FEDORA-2015-5840 perl-Module-Signature 2015-04-18
Fedora FEDORA-2015-5833 perl-Module-Signature 2015-04-18

Comments (none posted)

php: information disclosure

Package(s):php CVE #(s):CVE-2015-2783
Created:April 17, 2015 Updated:June 25, 2015
Description:

From the Arch Linux advisory:

The vulnerability can be triggered when parsing a PHAR file at phar.c:623. The "buf_len" is obtained from the phar file and passed into php_var_unserialize() as the max argument. Under normal php_var_unserialize() circumstances, YYCURSOR will always be <= max. This however can be bypassed when processing a malform phar with a buf_len that is shorter then the string to be unserialized resulting in a memory info leak.

Alerts:
SUSE SUSE-SU-2016:1638-1 php53 2016-06-21
Gentoo 201606-10 php 2016-06-19
Scientific Linux SLSA-2015:1218-1 php 2015-07-09
Oracle ELSA-2015-1218 php 2015-07-09
CentOS CESA-2015:1218 php 2015-07-09
Red Hat RHSA-2015:1218-01 php 2015-07-09
Scientific Linux SLSA-2015:1135-1 php 2015-06-24
Red Hat RHSA-2015:1187-01 rh-php56-php 2015-06-25
Red Hat RHSA-2015:1186-01 php55-php 2015-06-25
Oracle ELSA-2015-1135 php 2015-06-23
CentOS CESA-2015:1135 php 2015-06-24
Red Hat RHSA-2015:1135-01 php 2015-06-23
SUSE SUSE-SU-2015:0868-1 php5 2015-05-13
openSUSE openSUSE-SU-2015:0855-1 php5 2015-05-12
Debian DSA-3280-1 php5 2015-06-07
Debian-LTS DLA-212-1 php5 2015-04-29
Mandriva MDVSA-2015:209 php 2015-04-27
Mageia MGASA-2015-0169 php 2015-04-25
Fedora FEDORA-2015-6399 php 2015-04-27
Fedora FEDORA-2015-6407 php 2015-04-23
Slackware SSA:2015-111-10 php 2015-04-21
Ubuntu USN-2572-1 php5 2015-04-20
Arch Linux ASA-201504-14 php 2015-04-17

Comments (none posted)

php5: code execution

Package(s):php5 CVE #(s):CVE-2015-3330 CVE-2015-3329
Created:April 21, 2015 Updated:June 25, 2015
Description: From the Ubuntu advisory:

It was discovered that PHP incorrectly handled cleanup when used with Apache 2.4. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2015-3330)

It was discovered that PHP incorrectly handled opening tar, zip or phar archives through the PHAR extension. A remote attacker could use this issue to cause PHP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2015-3329)

Alerts:
SUSE SUSE-SU-2016:1638-1 php53 2016-06-21
Gentoo 201606-10 php 2016-06-19
Scientific Linux SLSA-2015:1218-1 php 2015-07-09
Oracle ELSA-2015-1218 php 2015-07-09
CentOS CESA-2015:1218 php 2015-07-09
Red Hat RHSA-2015:1218-01 php 2015-07-09
Scientific Linux SLSA-2015:1135-1 php 2015-06-24
Red Hat RHSA-2015:1187-01 rh-php56-php 2015-06-25
Red Hat RHSA-2015:1186-01 php55-php 2015-06-25
Oracle ELSA-2015-1135 php 2015-06-23
CentOS CESA-2015:1135 php 2015-06-24
Red Hat RHSA-2015:1135-01 php 2015-06-23
SUSE SUSE-SU-2015:0868-1 php5 2015-05-13
openSUSE openSUSE-SU-2015:0855-1 php5 2015-05-12
Debian DSA-3280-1 php5 2015-06-07
Debian-LTS DLA-212-1 php5 2015-04-29
Mandriva MDVSA-2015:209 php 2015-04-27
Mageia MGASA-2015-0169 php 2015-04-25
Fedora FEDORA-2015-6399 php 2015-04-27
Slackware SSA:2015-111-10 php 2015-04-21
Ubuntu USN-2572-1 php5 2015-04-20

Comments (none posted)

php-symfony: two vulnerabilities

Package(s):php-symfony CVE #(s):CVE-2015-2308 CVE-2015-2309
Created:April 20, 2015 Updated:April 22, 2015
Description: From the Fedora advisory:

- Update to 2.5.11

- security fix for CVE-2015-2308 and CVE-2015-2309

Alerts:
Fedora FEDORA-2015-5464 php-symfony 2015-04-18
Fedora FEDORA-2015-5457 php-symfony 2015-04-18

Comments (none posted)

postgis: multiple unspecified vulnerabilities

Package(s):postgis CVE #(s):
Created:April 20, 2015 Updated:May 12, 2015
Description: There are evidently security fixes in this list from the PostGIS 2.1.6 release announcement:

Bug Fixes

  • #2941, allow geography columns with SRID other than 4326
  • #3069, small objects getting inappropriately fluffed up w/ boxes
  • #3068, Have postgis_typmod_dims return NULL for unconstrained dims
  • #3061, Allow duplicate points in JSON, GML, GML ST_GeomFrom* functions
  • #3058, Fix ND-GiST picksplit method to split on the best plane
  • #3052, Make operators <-> and <#> available for PostgreSQL < 9.1
  • #3045, Fix dimensionality confusion in &&& operator
  • #3016, Allow unregistering layers of corrupted topologies
  • #3015, Avoid exceptions from TopologySummary
  • #3020, ST_AddBand out-db bug where height using width value
  • #3031, Allow restore of Geometry(Point) tables dumped with empties in them
Alerts:
Mageia MGASA-2015-0207 postgis 2015-05-11
Fedora FEDORA-2015-5575 postgis 2015-04-18

Comments (none posted)

ppp: denial of service

Package(s):ppp CVE #(s):CVE-2015-3310
Created:April 16, 2015 Updated:January 23, 2017
Description: From the Debian advisory:

Emanuele Rocca discovered that ppp, a daemon implementing the Point-to-Point Protocol, was subject to a buffer overflow when communicating with a RADIUS server. This would allow unauthenticated users to cause a denial-of-service by crashing the daemon.

Alerts:
Gentoo 201701-50 ppp 2017-01-23
openSUSE openSUSE-SU-2015:2121-1 ppp 2015-11-27
Arch Linux ASA-201508-3 ppp 2015-08-11
Ubuntu USN-2595-1 ppp 2015-05-05
Mandriva MDVSA-2015:222 ppp 2015-05-04
Mageia MGASA-2015-0173 ppp 2015-04-30
Slackware SSA:2015-111-11 ppp 2015-04-21
Debian-LTS DLA-205-1 ppp 2015-04-19
Debian DSA-3228-1 ppp 2015-04-16

Comments (none posted)

proftpd: unauthenticated copying of files

Package(s):proftpd CVE #(s):CVE-2015-3306
Created:April 22, 2015 Updated:May 20, 2015
Description: From the Slackware advisory:

Patched an issue where mod_copy allowed unauthenticated copying of files via SITE CPFR/CPTO.

Alerts:
openSUSE openSUSE-SU-2015:1031-1 proftpd 2015-06-11
Fedora FEDORA-2015-7086 proftpd 2015-05-10
Fedora FEDORA-2015-6401 proftpd 2015-05-03
Slackware SSA:2015-111-12 proftpd 2015-04-21
Debian DSA-3263-1 proftpd-dfsg 2015-05-19

Comments (none posted)

python-virtualenv: insecure software download

Package(s):python-virtualenv CVE #(s):CVE-2013-5123
Created:April 22, 2015 Updated:April 22, 2015
Description: From the Red Hat bugzilla:

The mirroring support (-M, --use-mirrors) was implemented without any sort of authenticity checks and is downloaded over plaintext HTTP. Further more by default it will dynamically discover the list of available mirrors by querying a DNS entry and extrapolating from that data. It does not attempt to use any sort of method of securing this querying of the DNS like DNSSEC. Software packages are downloaded over these insecure links, unpacked, and then typically the setup.py python file inside of them is executed.

Alerts:
Mageia MGASA-2015-0180 python-pip 2015-05-03
Fedora FEDORA-2015-6006 python-virtualenv 2015-04-21
Fedora FEDORA-2015-5974 python-virtualenv 2015-04-21

Comments (none posted)

qt: multiple vulnerabilities

Package(s):qt CVE #(s):CVE-2015-1858 CVE-2015-1859 CVE-2015-1860
Created:April 22, 2015 Updated:March 14, 2016
Description: From the Slackware advisory:

Fixed issues with BMP, ICO, and GIF handling that could lead to a denial of service or the execution of arbitrary code when processing malformed images.

Alerts:
Gentoo 201603-10 qtgui 2016-03-12
Ubuntu USN-2626-1 qt4-x11, qtbase-opensource-src 2015-06-03
Mageia MGASA-2015-0198 qt3, qt4, and qtbase5 2015-05-06
Fedora FEDORA-2015-6925 mingw-qt5-qtbase 2015-05-04
Fedora FEDORA-2015-6573 qt3 2015-05-01
Fedora FEDORA-2015-6661 qt3 2015-05-01
Fedora FEDORA-2015-6252 qt 2015-04-30
Debian-LTS DLA-210-1 qt4-x11 2015-04-30
Fedora FEDORA-2015-6315 qt5-qtbase 2015-04-26
Fedora FEDORA-2015-6364 qt5-qtbase 2015-04-26
Slackware SSA:2015-111-13 qt 2015-04-21

Comments (none posted)

rest: denial of service

Package(s):rest CVE #(s):CVE-2015-2675
Created:April 20, 2015 Updated:December 22, 2015
Description: From the Red Hat bugzilla:

It was reported that the OAuth implementation in librest, a helper library for RESTful services part of the GNOME project, incorrectly truncates the pointer returned by the rest_proxy_call_get_url function call, leading to an application crash, or worse.

Alerts:
Scientific Linux SLSA-2015:2237-3 rest 2015-12-21
Oracle ELSA-2015-2237 rest 2015-11-23
Red Hat RHSA-2015:2237-03 rest 2015-11-19
Fedora FEDORA-2015-4554 rest 2015-04-18
Fedora FEDORA-2015-4596 rest 2015-04-18

Comments (none posted)

rubygem-rest-client: plaintext password logging

Package(s):rubygem-rest-client CVE #(s):CVE-2015-3448
Created:April 16, 2015 Updated:May 18, 2015
Description: From the SUSE bugzilla entry:

REST Client for Ruby contains a flaw that is due to the application logging password information in plaintext. This may allow a local attacker to gain access to password information.

Alerts:
openSUSE openSUSE-SU-2015:0724-1 rubygem-rest-client 2015-04-16
Mageia MGASA-2015-0227 ruby-rest-client 2015-05-15

Comments (none posted)

tcpdump: denial of service

Package(s):tcpdump CVE #(s):CVE-2015-3138
Created:April 21, 2015 Updated:April 22, 2015
Description: From the Arch Linux advisory:

A vulnerability was discovered in print-wb.c that is leading to a segmentation fault triggered through feeding into tcpdump a crafted packet, either from a live network interface or from a .pcap file.

A remote attacker is able to send specially crafted packets to cause a segmentation fault leading to denial of service.

Alerts:
Arch Linux ASA-201504-20 tcpdump 2015-04-20

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2015, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds