Weekly Vulnerabilities Reports > November 10 to 16, 2014

Overview

12 new vulnerabilities reported during this period, including 0 critical vulnerabilities and 6 high severity vulnerabilities. This weekly summary report vulnerabilities in 19 products from 9 vendors including Linux, Opensuse, Suse, Debian, and Canonical. Vulnerabilities are notably categorized as "Resource Exhaustion", "Out-of-bounds Read", "NULL Pointer Dereference", "Improper Restriction of Operations within the Bounds of a Memory Buffer", and "Improper Input Validation".

  • 2 reported vulnerabilities are remotely exploitables.
  • 5 reported vulnerabilities are exploitable by an anonymous user.
  • Linux has the most reported vulnerabilities, with 11 reported vulnerabilities.

TOTAL
VULNERABILITIES
CRITICAL RISK
VULNERABILITIES
HIGH RISK
VULNERABILITIES
MEDIUM RISK
VULNERABILITIES
LOW RISK
VULNERABILITIES
REMOTELY
EXPLOITABLE
LOCALLY
EXPLOITABLE
EXPLOIT
AVAILABLE
EXPLOITABLE
ANONYMOUSLY
AFFECTING
WEB APPLICATION

Vulnerability Details

The following table list reported vulnerabilities for the period covered by this report:

0 Critical Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS

6 High Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2014-11-11 CVE-2014-4077 Microsoft Unspecified vulnerability in Microsoft products

Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Office 2007 SP3, when IMJPDCT.EXE (aka IME for Japanese) is installed, allow remote attackers to bypass a sandbox protection mechanism via a crafted PDF document, aka "Microsoft IME (Japanese) Elevation of Privilege Vulnerability," as exploited in the wild in 2014.

7.8
2014-11-10 CVE-2014-8369 Linux
Debian
Opensuse
Suse
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privileges.

7.8
2014-11-10 CVE-2014-7826 Linux
Opensuse
Suse
NULL Pointer Dereference vulnerability in multiple products

kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.

7.8
2014-11-10 CVE-2014-7825 Linux Out-of-bounds Read vulnerability in Linux Kernel

kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the perf subsystem, which allows local users to cause a denial of service (out-of-bounds read and OOPS) or bypass the ASLR protection mechanism via a crafted application.

7.8
2014-11-10 CVE-2014-3687 Linux
Redhat
Canonical
Opensuse
Novell
Suse
Debian
Oracle
Resource Exhaustion vulnerability in multiple products

The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.

7.5
2014-11-10 CVE-2014-3673 Linux
Redhat
Canonical
Debian
Opensuse
Suse
Oracle
Improper Input Validation vulnerability in multiple products

The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.

7.5

6 Medium Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS
2014-11-10 CVE-2014-8559 Linux
Canonical
Opensuse
Novell
Suse
Oracle
Resource Exhaustion vulnerability in multiple products

The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.

5.5
2014-11-10 CVE-2014-3690 Linux
Opensuse
Suse
Novell
Redhat
Debian
Canonical
Resource Exhaustion vulnerability in multiple products

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.

5.5
2014-11-10 CVE-2014-3647 Linux
Redhat
Canonical
Debian
Opensuse
Suse
Oracle
arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
5.5
2014-11-10 CVE-2014-3646 Linux
Redhat
Canonical
Debian
Opensuse
Suse
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
5.5
2014-11-10 CVE-2014-3610 Linux
Canonical
Debian
Opensuse
Suse
The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.
5.5
2014-11-10 CVE-2014-3611 Linux
Redhat
Canonical
Debian
Race Condition vulnerability in multiple products

Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.

4.7

0 Low Vulnerabilities

DATE CVE VENDOR VULNERABILITY CVSS