Tagged: not-affected

VU#457759: glibc vulnerable to stack buffer overflow in DNS resolver 0

VU#457759: glibc vulnerable to stack buffer overflow in DNS resolver

Vulnerability Note VU#457759 glibc vulnerable to stack buffer overflow in DNS resolver Original Release date: 17 Feb 2016 | Last revised: 18 Feb 2016 Overview GNU glibc contains a buffer overflow vulnerability in the DNS resolver, which may allow a remote attacker to execute arbitrary code. Description CWE-121 : Stack-based Buffer Overflow – CVE-2015-7547 According to a Google security blog post : “The glibc DNS client side resolver is vulnerable to a stack-based buffer overflow when the getaddrinfo() library function is used. Software using this function may be exploited with attacker-controlled domain names, attacker-controlled DNS servers, or through a man-in-the-middle attack.” According to glibc developers, the vulnerable code was initially added in May 2008 as part of the development for glibc 2.9.

0

VU#550620: Multicast DNS (mDNS) implementations may respond to unicast queries originating outside the local link

Vulnerability Note VU#550620 Multicast DNS (mDNS) implementations may respond to unicast queries originating outside the local link Original Release date: 31 Mar 2015 | Last revised: 31 Mar 2015 Overview Multicast DNS implementations may respond to unicast queries that originate from sources outside of the local link network. Such responses may disclose information about network devices or be used in denial-of-service (DoS) amplification attacks. Description Multicast DNS (mDNS) is a way for devices on a local link network to automatically discover other services and devices.

VU#631788: Multiple BIOS implementations permit unsafe SMM function calls to memory locations outside of SMRAM 0

VU#631788: Multiple BIOS implementations permit unsafe SMM function calls to memory locations outside of SMRAM

Vulnerability Note VU#631788 Multiple BIOS implementations permit unsafe SMM function calls to memory locations outside of SMRAM Original Release date: 20 Mar 2015 | Last revised: 20 Mar 2015 Overview Multiple BIOS implementations permit unsafe System Management Mode (SMM) function calls to memory locations outside of SMRAM. Description Multiple BIOS implementations permit unsafe System Management Mode (SMM) function calls to memory locations outside of SMRAM

0

VU#243585: SSL/TLS implementations accept export-grade RSA keys (FREAK attack)

Vulnerability Note VU#243585 SSL/TLS implementations accept export-grade RSA keys (FREAK attack) Original Release date: 06 Mar 2015 | Last revised: 06 Mar 2015 Overview Some implementations of SSL/TLS accept export-grade (512-bit or smaller) RSA keys even when not specifically requesting export grade ciphers. An attacker able to act as a Man-in-The-Middle (MiTM) could factor weak temporary RSA keys, obtain session keys, and decrypt SSL/TLS trafflc. This issue has been dubbed the “FREAK” (Factoring Attack on RSA-EXPORT Keys) attack

VU#695940: Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability 0

VU#695940: Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability

Vulnerability Note VU#695940 Henry Spencer regular expressions (regex) library contains a heap overflow vulnerability Original Release date: 13 Feb 2015 | Last revised: 13 Feb 2015 Overview A regular expressions C library originally written by Henry Spencer is vulnerable to a heap overflow in some circumstances. Description CWE-122 : Heap-based Buffer Overflow From the researcher, the variable len that holds the length of a regular expression string is “enlarged to such an extent that, in the process of enlarging (multiplication and addition), causes the 32 bit register/variable to overflow.” It may be possible for an attacker to use this overflow to change data in memory

VU#533140: Tianocore UEFI implementation reclaim function vulnerable to buffer overflow 0

VU#533140: Tianocore UEFI implementation reclaim function vulnerable to buffer overflow

Vulnerability Note VU#533140 Tianocore UEFI implementation reclaim function vulnerable to buffer overflow Original Release date: 05 Jan 2015 | Last revised: 12 Jan 2015 Overview The reclaim function in the Tianocore open source implementation of UEFI contains a buffer overflow vulnerability. Description The open source Tianocore project provides a reference implementation of the Unified Extensible Firmware Interface (UEFI). Some commercial UEFI implementations incorporate portions of the Tianocore source code

VU#533140: UEFI EDK1 vulnerable to buffer overflow 0

VU#533140: UEFI EDK1 vulnerable to buffer overflow

Vulnerability Note VU#533140 UEFI EDK1 vulnerable to buffer overflow Original Release date: 05 Jan 2015 | Last revised: 05 Jan 2015 Overview The EDK1 UEFI reference implementation contains a buffer overflow vulnerability. Description The open source EDK1 project provides a reference implementation of the Unified Extensible Firmware Interface (UEFI). Commercial UEFI implementations may incorporate portions of the EDK1 source code.

VU#852879: Network Time Protocol (NTP) Project NTP daemon (ntpd) contains multiple vulnerabilities 0

VU#852879: Network Time Protocol (NTP) Project NTP daemon (ntpd) contains multiple vulnerabilities

Vulnerability Note VU#852879 Network Time Protocol (NTP) Project NTP daemon (ntpd) contains multiple vulnerabilities Original Release date: 19 Dec 2014 | Last revised: 22 Dec 2014 Overview The NTP Project ntpd version 4.2.7 and pervious versions allow attackers to overflow several buffers in a way that may allow malicious code to be executed. ntp-keygen prior to version 4.2.7p230 also uses a non-cryptographic random number generator when generating symmetric keys. These vulnerabilities affect ntpd acting as a server or client.

VU#852879: NTP Project Network Time Protocol daemon (ntpd) contains multiple vulnerabilities (Updated) 0

VU#852879: NTP Project Network Time Protocol daemon (ntpd) contains multiple vulnerabilities (Updated)

Vulnerability Note VU#852879 NTP Project Network Time Protocol daemon (ntpd) contains multiple vulnerabilities (Updated) Original Release date: 19 Dec 2014 | Last revised: 04 Feb 2015 Overview The NTP Project ntpd version 4.2.7 and pervious versions contain several vulnerabilities. ntp-keygen prior to version 4.2.7p230 also uses a non-cryptographic random number generator when generating symmetric keys.