Weekly Vulnerabilities Reports > July 30 to August 5, 2012

Overview

17 new vulnerabilities reported during this period, including 2 critical vulnerabilities and 3 high severity vulnerabilities. This weekly summary report vulnerabilities in 20 products from 10 vendors including Sonicwall, Djangoproject, IBM, Siemens, and Mozilla. Vulnerabilities are notably categorized as "Permissions, Privileges, and Access Controls", "Improper Restriction of Operations within the Bounds of a Memory Buffer", "SQL Injection", "Cross-site Scripting", and "Improper Input Validation".

  • 15 reported vulnerabilities are remotely exploitables.
  • 1 reported vulnerabilities have public exploit available.
  • 5 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
  • 14 reported vulnerabilities are exploitable by an anonymous user.
  • Sonicwall has the most reported vulnerabilities, with 5 reported vulnerabilities.
  • IBM has the most reported critical vulnerabilities, with 1 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

Expand/Hide

2 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2012-07-31 CVE-2012-2627 Sonicwall Unspecified vulnerability in Sonicwall Scrutinizer 8.6.2/9.0.0/9.0.1

d4d/uploader.php in the web console in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.0 allows remote attackers to create or overwrite arbitrary files in %PROGRAMFILES%\Scrutinizer\snmp\mibs\ via a multipart/form-data POST request.

9.4
2012-07-30 CVE-2012-2163 IBM Permissions, Privileges, and Access Controls vulnerability in IBM Scale OUT Network Attached Storage 1.1/1.3.1

IBM Scale Out Network Attached Storage (SONAS) 1.1 through 1.3.1 allows remote authenticated administrators to execute arbitrary Linux commands via the (1) Command Line Interface or (2) Graphical User Interface, related to a "code injection" issue.

9.0

3 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2012-07-31 CVE-2012-3017 Siemens Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Siemens products

Siemens SIMATIC S7-400 PN CPU devices with firmware 5.x allow remote attackers to cause a denial of service (defect-mode transition and service outage) via (1) malformed HTTP traffic or (2) malformed IP packets.

7.8
2012-07-31 CVE-2012-3016 Siemens Unspecified vulnerability in Siemens products

Siemens SIMATIC S7-400 PN CPU devices with firmware 6 before 6.0.3 allow remote attackers to cause a denial of service (defect-mode transition and service outage) via crafted ICMP packets.

7.8
2012-07-31 CVE-2012-3951 Sonicwall SQL Injection vulnerability in Sonicwall Scrutinizer 8.6.2/9.0.0/9.0.1

The MySQL component in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) 9.0.1.19899 and earlier has a default password of admin for the (1) scrutinizer and (2) scrutremote accounts, which allows remote attackers to execute arbitrary SQL commands via a TCP session.

7.5

12 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2012-07-30 CVE-2012-2962 Sonicwall SQL Injection vulnerability in Sonicwall Scrutinizer

SQL injection vulnerability in d4d/statusFilter.php in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.2 allows remote authenticated users to execute arbitrary SQL commands via the q parameter.

6.5
2012-07-31 CVE-2012-2647 Yahoo
Apple
Google
Information Exposure vulnerability in Yahoo Toolbar 1.0.0.5

Yahoo! Toolbar 1.0.0.5 and earlier for Chrome and Safari allows remote attackers to modify the configured search URL, and intercept search terms, via a crafted web page.

5.8
2012-07-31 CVE-2012-3444 Djangoproject Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Djangoproject Django

The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image.

5.0
2012-07-31 CVE-2012-3443 Djangoproject Improper Input Validation vulnerability in Djangoproject Django

The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.

5.0
2012-07-31 CVE-2012-2626 Sonicwall Improper Authentication vulnerability in Sonicwall Scrutinizer 8.6.2/9.0.0/9.0.1

cgi-bin/admin.cgi in the web console in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.0 does not require token authentication, which allows remote attackers to add administrative accounts via a userprefs action.

5.0
2012-07-31 CVE-2012-3426 Openstack Permissions, Privileges, and Access Controls vulnerability in Openstack Essex, Horizon and Keystone

OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenStack Essex, does not properly implement token expiration, which allows remote authenticated users to bypass intended authorization restrictions by (1) creating new tokens through token chaining, (2) leveraging possession of a token for a disabled user account, or (3) leveraging possession of a token for an account with a changed password.

4.9
2012-07-30 CVE-2012-0723 IBM Improper Input Validation vulnerability in IBM AIX and Vios

The kernel in IBM AIX 5.3, 6.1, and 7.1, and VIOS 2.2.1.4-FP-25 SP-02, does not properly implement the dupmsg system call, which allows local users to cause a denial of service (system crash) via a crafted application.

4.9
2012-07-31 CVE-2012-3018 Iconics Cryptographic Issues vulnerability in Iconics Bizviz and Genesis32

The lockout-recovery feature in the Security Configurator component in ICONICS GENESIS32 9.22 and earlier and BizViz 9.22 and earlier uses an improper encryption algorithm for generation of an authentication code, which allows local users to bypass intended access restrictions and obtain administrative access by predicting a challenge response.

4.4
2012-07-31 CVE-2012-3442 Djangoproject Cross-Site Scripting vulnerability in Djangoproject Django

The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL.

4.3
2012-07-31 CVE-2012-3848 Sonicwall Cross-Site Scripting vulnerability in Sonicwall Scrutinizer 8.6.2/9.0.0/9.0.1

Multiple cross-site scripting (XSS) vulnerabilities in the web console in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.0 allow remote attackers to inject arbitrary web script or HTML via (1) the query string to d4d/exporters.php, (2) the HTTP Referer header to d4d/exporters.php, or (3) unspecified input to d4d/contextMenu.php.

4.3
2012-07-30 CVE-2012-1969 Mozilla Permissions, Privileges, and Access Controls vulnerability in Mozilla Bugzilla

The get_attachment_link function in Template.pm in Bugzilla 2.x and 3.x before 3.6.10, 3.7.x and 4.0.x before 4.0.7, 4.1.x and 4.2.x before 4.2.2, and 4.3.x before 4.3.2 does not check whether an attachment is private before presenting the attachment description within a public comment, which allows remote attackers to obtain sensitive description information by reading a comment.

4.3
2012-07-30 CVE-2012-1968 Mozilla Permissions, Privileges, and Access Controls vulnerability in Mozilla Bugzilla

Bugzilla 4.1.x and 4.2.x before 4.2.2 and 4.3.x before 4.3.2 uses bug-editor privileges instead of bugmail-recipient privileges during construction of HTML bugmail documents, which allows remote attackers to obtain sensitive description information by reading the tooltip portions of an HTML e-mail message.

4.3

0 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS