-
CVE-2015-6564 openssh: Use-after-free bug with PAM support
CVE ID CVE-2015-6564 DESCRIPTION A use-after-free flaw was found in OpenSSH. An attacker able to fully compromise a non-privileged pre-authentication process using a different flaw could possibly cause sshd to crash or execute arbitrary code with root privileges. RESOLUTION Unitrends Risk Assessment: None with security…
-
CVE-2016-10010 openssh: privilege escalation via Unix domain socket forwarding
CVE ID CVE-2016-10010 DESCRIPTION sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c. RESOLUTION CentOS6 openssh - Not affected, False Positive CentOS7 openssh -…
-
CVE-2016-6329: SWEET32 attacks against 3DES Ciphers (openvpn)
SUMMARY Duplicate of CVE-2016-2183 for SWEET32 CVE ID CVE-2016-6329 DESCRIPTION SWEET32 attacks against 3DES Ciphers (openvpn) A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. This is a duplicate of CVE-2016-2183 to track SWEET32 in the upstream OpenVPN project. RESOLUTION Unitrends…
-
CVE-2015-6563: openssh: Privilege separation weakness
CVE ID CVE-2015-6563 DESCRIPTION A flaw was found in the way OpenSSH handled PAM authentication when using privilege separation. An attacker with valid credentials on the system and able to fully compromise a non-privileged pre-authentication process using a different flaw could use this flaw to authenticate as other…
-
CVE-2011-3389: SSL v3/TLS 1.0 BEAST security vulnerability
SUMMARY The Unitrends system is not vulnerable to attacks from the BEAST vulnerability. CVE ID CVE-2011-3389 DESCRIPTION The SSL protocol, as used in certain configurations, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plain-text HTTP headers via a…
-
CVE-2016-5696: kernel: challenge ACK counter disclosure
CVE ID CVE-2016-5696 DESCRIPTION It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the…
-
Bloomberg: The Big Hack article
CVE ID Bloomberg: The_Big_Hack article DESCRIPTION This morning (10/04/2018) Bloomberg Businessweek published an article this morning titled, "The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies". This article states that a number of technology companies may have been impacted by a hardware vulnerability.…
-
CVE-2018-10933 libssh: Authentication Bypass due to improper message callbacks implementation
SUMMARY not vulnerable CVE ID CVE-2018-10933 DESCRIPTION A vulnerability was found in libssh's server-side state machine. A malicious client could create channels without first performing authentication, resulting in unauthorized access. CVSS3 Base Score 9.1 RESOLUTION Unitrends systems are not vulnerable since libssh is…
-
CVE-2018-10872 kernel: error in exception handling leads to DoS
CVE ID CVE-2018-10872 DESCRIPTION A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack…
-
CVE-2015-7560 samba: Incorrect ACL get/set allowed on symlink path
CVE ID CVE-2015-7560 DESCRIPTION A flaw was found in the way Samba handled ACLs on symbolic links. An authenticated user could use this flaw to gain access to an arbitrary file or directory by overwriting its ACL. CVSS2 Base Score 3.5 Impact: Moderate RESOLUTION Resolution: This was fixed in samba-3.6.23-25.el6_7.x86_64…