ID

VAR-201410-1143


CVE

CVE-2014-3565


TITLE

Net-SNMP of snmplib/mib.c Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2014-004588

DESCRIPTION

snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message. Net-SNMP is prone to a remote denial-of-service vulnerability. A remote attacker may exploit this issue to crash the application, resulting in a denial-of-service condition. Net-SNMP is a set of open source Simple Network Management Protocol (Simple Network Management Protocol) software. The software is used to monitor network equipment, computer equipment, UPS equipment, etc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-10-21-4 OS X El Capitan 10.11.1 and Security Update 2015-007 OS X El Capitan 10.11.1 and Security Update 2015-007 are now available and address the following: Accelerate Framework Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: A memory corruption issue existed in the Accelerate Framework in multi-threading mode. This issue was addressed through improved accessor element validation and improved object locking. CVE-ID CVE-2015-5940 : Apple apache_mod_php Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP versions prior to 5.5.29 and 5.4.45. These were addressed by updating PHP to versions 5.5.29 and 5.4.45. CVE-ID CVE-2015-0235 CVE-2015-0273 CVE-2015-6834 CVE-2015-6835 CVE-2015-6836 CVE-2015-6837 CVE-2015-6838 ATS Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 Impact: Visiting a maliciously crafted webpage may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in ATS. This issue was addressed through improved memory handling. CVE-ID CVE-2015-6985 : John Villamil (@day6reak), Yahoo Pentest Team Audio Available for: OS X El Capitan 10.11 Impact: A malicious application may be able to execute arbitrary code Description: An uninitialized memory issue existed in coreaudiod. This issue was addressed through improved memory initialization. CVE-ID CVE-2015-7003 : Mark Brand of Google Project Zero Audio Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 Impact: Playing a malicious audio file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the handling of audio files. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5933 : Apple CVE-2015-5934 : Apple Bom Available for: OS X El Capitan 10.11 Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution Description: A file traversal vulnerability existed in the handling of CPIO archives. This issue was addressed through improved validation of metadata. CVE-ID CVE-2015-7006 : Mark Dowd of Azimuth Security CFNetwork Available for: OS X El Capitan 10.11 Impact: Visiting a maliciously crafted website may lead to cookies being overwritten Description: A parsing issue existed when handling cookies with different letter casing. This issue was addressed through improved parsing. CVE-ID CVE-2015-7023 : Marvin Scholz; Xiaofeng Zheng and Jinjin Liang of Tsinghua University, Jian Jiang of University of California, Berkeley, Haixin Duan of Tsinghua University and International Computer Science Institute, Shuo Chen of Microsoft Research Redmond, Tao Wan of Huawei Canada, Nicholas Weaver of International Computer Science Institute and University of California, Berkeley, coordinated via CERT/CC configd Available for: OS X El Capitan 10.11 Impact: A malicious application may be able to elevate privileges Description: A heap based buffer overflow issue existed in the DNS client library. A malicious application with the ability to spoof responses from the local configd service may have been able to cause arbitrary code execution in DNS clients. CVE-ID CVE-2015-7015 : PanguTeam CoreGraphics Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: Multiple memory corruption issues existed in CoreGraphics. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5925 : Apple CVE-2015-5926 : Apple CoreText Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-6992 : John Villamil (@day6reak), Yahoo Pentest Team CoreText Available for: OS X Yosemite v10.10.5 and OS X El Capitan 10.11 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-6975 : John Villamil (@day6reak), Yahoo Pentest Team CoreText Available for: OS X El Capitan 10.11 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-7017 : John Villamil (@day6reak), Yahoo Pentest Team CoreText Available for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-5944 : John Villamil (@day6reak), Yahoo Pentest Team Disk Images Available for: OS X El Capitan 10.11 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in the parsing of disk images. This issue was addressed through improved memory handling. CVE-ID CVE-2015-6995 : Ian Beer of Google Project Zero EFI Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 Impact: An attacker can exercise unused EFI functions Description: An issue existed with EFI argument handling. This was addressed by removing the affected functions. CVE-ID CVE-2015-7035 : Corey Kallenberg, Xeno Kovah, John Butterworth, and Sam Cornwell of The MITRE Corporation, coordinated via CERT/CC File Bookmark Available for: OS X El Capitan 10.11 Impact: Browsing to a folder with malformed bookmarks may cause unexpected application termination Description: An input validation issue existed in parsing bookmark metadata. This issue was addressed through improved validation checks. CVE-ID CVE-2015-6987 : Luca Todesco (@qwertyoruiop) FontParser Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-5927 : Apple CVE-2015-5942 CVE-2015-6976 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-6977 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-6978 : Jaanus Kp, Clarified Security, working with HP's Zero Day Initiative CVE-2015-6991 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-6993 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-7009 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-7010 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-7018 : John Villamil (@day6reak), Yahoo Pentest Team FontParser Available for: OS X El Capitan 10.11 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-6990 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-7008 : John Villamil (@day6reak), Yahoo Pentest Team Grand Central Dispatch Available for: OS X Yosemite v10.10.5 and OS X El Capitan 10.11 Impact: Processing a maliciously crafted package may lead to arbitrary code execution Description: A memory corruption issue existed in the handling of dispatch calls. This issue was addressed through improved memory handling. CVE-ID CVE-2015-6989 : Apple Graphics Drivers Available for: OS X El Capitan 10.11 Impact: A local user may be able to cause unexpected system termination or read kernel memory Description: Multiple out of bounds read issues existed in the NVIDIA graphics driver. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-7019 : Ian Beer of Google Project Zero CVE-2015-7020 : Moony Li of Trend Micro Graphics Drivers Available for: OS X El Capitan 10.11 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7021 : Moony Li of Trend Micro ImageIO Available for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5 Impact: Processing a maliciously crafted image file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the parsing of image metadata. These issues were addressed through improved metadata validation. CVE-ID CVE-2015-5935 : Apple CVE-2015-5938 : Apple ImageIO Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 Impact: Processing a maliciously crafted image file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the parsing of image metadata. These issues were addressed through improved metadata validation. CVE-ID CVE-2015-5936 : Apple CVE-2015-5937 : Apple CVE-2015-5939 : Apple IOAcceleratorFamily Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in IOAcceleratorFamily. This issue was addressed through improved memory handling. CVE-ID CVE-2015-6996 : Ian Beer of Google Project Zero IOHIDFamily Available for: OS X El Capitan 10.11 Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-6974 : Luca Todesco (@qwertyoruiop) Kernel Available for: OS X Yosemite v10.10.5 Impact: A local user may be able to execute arbitrary code with system privileges Description: A type confusion issue existed in the validation of Mach tasks. This issue was addressed through improved Mach task validation. CVE-ID CVE-2015-5932 : Luca Todesco (@qwertyoruiop), Filippo Bigarella Kernel Available for: OS X El Capitan 10.11 Impact: An attacker with a privileged network position may be able to execute arbitrary code Description: An uninitialized memory issue existed in the kernel. This issue was addressed through improved memory initialization. CVE-ID CVE-2015-6988 : The Brainy Code Scanner (m00nbsd) Kernel Available for: OS X El Capitan 10.11 Impact: A local application may be able to cause a denial of service Description: An issue existed when reusing virtual memory. This issue was addressed through improved validation. CVE-ID CVE-2015-6994 : Mark Mentovai of Google Inc. libarchive Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 Impact: A malicious application may be able to overwrite arbitrary files Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization. CVE-ID CVE-2015-6984 : Christopher Crone of Infinit, Jonathan Schleifer MCX Application Restrictions Available for: OS X Yosemite v10.10.5 and OS X El Capitan 10.11 Impact: A developer-signed executable may acquire restricted entitlements Description: An entitlement validation issue existed in Managed Configuration. A developer-signed app could bypass restrictions on use of restricted entitlements and elevate privileges. This issue was addressed through improved provisioning profile validation. CVE-ID CVE-2015-7016 : Apple Net-SNMP Available for: OS X El Capitan 10.11 Impact: An attacker in a privileged network position may be able to cause a denial of service Description: Multiple issues existed in netsnmp version 5.6. These issues were addressed by using patches affecting OS X from upstream. CVE-ID CVE-2012-6151 CVE-2014-3565 OpenGL Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: A memory corruption issue existed in OpenGL. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5924 : Apple OpenSSH Available for: OS X El Capitan 10.11 Impact: A local user may be able to conduct impersonation attacks Description: A privilege separation issue existed in PAM support. This issue was addressed with improved authorization checks. CVE-ID CVE-2015-6563 : Moritz Jodeit of Blue Frost Security GmbH Sandbox Available for: OS X El Capitan 10.11 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: An input validation issue existed when handling NVRAM parameters. This issue was addressed through improved validation. CVE-ID CVE-2015-5945 : Rich Trouton (@rtrouton), Howard Hughes Medical Institute, Apple Script Editor Available for: OS X El Capitan 10.11 Impact: An attacker may trick a user into running arbitrary AppleScript Description: In some circumstances, Script Editor did not ask for user confirmation before executing AppleScripts. This issue was addressed by prompting for user confirmation before executing AppleScripts. CVE-ID CVE-2015-7007 : Joe Vennix of Rapid7 Security Available for: OS X El Capitan 10.11 Impact: A malicious application may be able to overwrite arbitrary files Description: A double free issue existed in the handling of AtomicBufferedFile descriptors. This issue was addressed through improved validation of AtomicBufferedFile descriptors. CVE-ID CVE-2015-6983 : David Benjamin, Greg Kerr, Mark Mentovai and Sergey Ulanov from the Chrome Team SecurityAgent Available for: OS X El Capitan 10.11 Impact: A malicious application can programmatically control keychain access prompts Description: A method existed for applications to create synthetic clicks on keychain prompts. This was addressed by disabling synthetic clicks for keychain access windows. CVE-ID CVE-2015-5943 Installation note: OS X El Capitan v10.11.1 includes the security content of Safari 9.0.1: https://support.apple.com/kb/HT205377 OS X El Capitan 10.11.1 and Security Update 2015-007 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIcBAEBCAAGBQJWJuKsAAoJEBcWfLTuOo7t8e0P/igVHKDXeLNib2eEzbS2BMVV Ee968BgEDw1xnHK8zzh3bbRNxxAUT9lwe8RuSYECfp8sUYySb51/VIWpmidewsqB az7mJ4Gohldppejc5tykHDoTYesQL7iySLn74PdxZfZXbtz2EGJK19cA6hIHcO5x ZiMCbJzTaAOylKRQRRi3kMdNWEzxbtm90247vNx/zMSjs1bhGlQbJsCVDmX/Q9uH Xja9aPCHDfaQueTw5idbXwT+Y/+I9ytBlL5JXVrjRUDYCtuewC4DNsQxZY0qcDyE A7/0G7iYW5vOECNhpoLA0+1MbdHxJXhwJtmIKX8zucYqe/Vr4j41oGey/HJW55ER USJ2RBpMtGhDEolyvxz7FlSPYOIpp05mwMB0GWQWAmkWDAxnagkQm9xwKBMt4eq4 CNdI0YaX0iPPWYIkI3HpZHdzuwbE5b053cw1hLKc0OVQBiqLUQxe3W5s64ZqTSe0 whlm9lt/9EUwyfXHEiXTYi/d+CF8+JthY4ieXRJ4mwz77udafmgA5Pbl71SqB8pE 7TBByuCOFdou6JmdJPahLDxoGRA+i7Z+a8Myn4WtbemkjrO9iZ/VsdAdl/Db+7cz rEgSPjelEC5z5WxQspiuohxU1NkDnMgWm2Tnx+pFBOfZMheE4xnTfve3vqY+gQdN 4GbuRXld4PbxeDdel0Nk =snJ4 -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201507-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: SNMP: Denial of Service Date: July 10, 2015 Bugs: #522062 ID: 201507-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A vulnerability in SNMP could lead to Denial of Service condition. Background ========== SNMP is a widely used protocol for monitoring the health and welfare of network equipment. Workaround ========== There is no known workaround at this time. Resolution ========== All SNMP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=net-analyzer/net-snmp-5.7.3_pre5-r1" References ========== [ 1 ] CVE-2014-3565 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3565 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201507-17 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . Remotely exploitable denial of service vulnerability in Net-SNMP, in snmptrapd, due to how it handles trap requests with an empty community string when the perl handler is enabled (CVE-2014-2285). The verification of md5 checksums and GPG signatures is performed automatically for you. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFVFnIkmqjQ0CJFipgRApj2AJ4siseZB35ENesBHXAJd354ztjc2wCg4i9a CVlceu1C+yhzzsfXCVXUd5g= =mTTW -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: net-snmp security and bug fix update Advisory ID: RHSA-2015:1385-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1385.html Issue date: 2015-07-22 Updated on: 2015-03-02 CVE Names: CVE-2014-3565 ===================================================================== 1. Summary: Updated net-snmp packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. A denial of service flaw was found in the way snmptrapd handled certain SNMP traps when started with the "-OQ" option. (CVE-2014-3565) This update also fixes the following bugs: * The HOST-RESOURCES-MIB::hrSystemProcesses object was not implemented because parts of the HOST-RESOURCES-MIB module were rewritten in an earlier version of net-snmp. Consequently, HOST-RESOURCES-MIB::hrSystemProcesses did not provide information on the number of currently loaded or running processes. With this update, HOST-RESOURCES-MIB::hrSystemProcesses has been implemented, and the net-snmp daemon reports as expected. (BZ#1134335) * The Net-SNMP agent daemon, snmpd, reloaded the system ARP table every 60 seconds. As a consequence, snmpd could cause a short CPU usage spike on busy systems with a large APR table. With this update, snmpd does not reload the full ARP table periodically, but monitors the table changes using a netlink socket. (BZ#789500) * Previously, snmpd used an invalid pointer to the current time when periodically checking certain conditions specified by the "monitor" option in the /etc/snmpd/snmpd.conf file. Consequently, snmpd terminated unexpectedly on start with a segmentation fault if a certain entry with the "monitor" option was used. Now, snmpd initializes the correct pointer to the current time, and snmpd no longer crashes on start. (BZ#1050970) * Previously, snmpd expected 8-bit network interface indices when processing HOST-RESOURCES-MIB::hrDeviceTable. If an interface index of a local network interface was larger than 30,000 items, snmpd could terminate unexpectedly due to accessing invalid memory. Now, processing of all network sizes is enabled, and snmpd no longer crashes in the described situation. (BZ#1195547) * The snmpdtrapd service incorrectly checked for errors when forwarding a trap with a RequestID value of 0, and logged "Forward failed" even though the trap was successfully forwarded. This update fixes snmptrapd checks and the aforementioned message is now logged only when appropriate. (BZ#1146948) * Previously, snmpd ignored the value of the "storageUseNFS" option in the /etc/snmpd/snmpd.conf file. As a consequence, NFS drivers were shown as "Network Disks", even though "storageUseNFS" was set to "2" to report them as "Fixed Disks" in HOST-RESOURCES-MIB::hrStorageTable. With this update, snmpd takes the "storageUseNFS" option value into account, and "Fixed Disks" NFS drives are reported correctly. (BZ#1125793) * Previously, the Net-SNMP python binding used an incorrect size (8 bytes instead of 4) for variables of IPADDRESS type. Consequently, applications that were using Net-SNMP Python bindings could send malformed SNMP messages. With this update, the bindings now use 4 bytes for variables with IPADRESS type, and only valid SNMP messages are sent. (BZ#1100099) * Previously, the snmpd service did not cut values in HOST-RESOURCES-MIB::hrStorageTable to signed 32-bit integers, as required by SNMP standards, and provided the values as unsigned integers. As a consequence, the HOST-RESOURCES-MIB::hrStorageTable implementation did not conform to RFC 2790. The values are now cut to 32-bit signed integers, and snmpd is therefore standard compliant. (BZ#1104293) Users of net-snmp are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 886468 - snmpd does not report error when clientaddr <ip>:<port> cannot bind to the specified port 967871 - net-snmp does not display correct lm_sensors sensor data / missing CPU cores 1023570 - libnetsnmpagent.so crash under certain conditions - patched upstream in 2009 1034441 - Net-SNMP libraries and headers are invalid due to hyphens. 1069046 - snmpd returns truncated value for Counter64 taken from smuxpeer 1070075 - SNMP HRPROCESSORLOAD RETURNS INCORRECT VALUES FOR PROCESSOR #'S > 100 1073544 - net-snmp.rpm is not multilib safe 1100099 - net-snmp-python adds zeros to end of IP address (IPADDR type), which is not valid 1119567 - After installation of net-snmp-devel-5.5-44.el6_4.4.x86_64 the command '$ man snmp_read' fails 1125155 - CVE-2014-3565 net-snmp: snmptrapd crash when handling an SNMP trap containing a ifMtu with a NULL type 1125793 - [RHEL6] net-snmp "storageUseNFS 2" option does not report NFS mount as "Fixed Disks" 1126914 - Ocetets Truncated with Python Bindings 1134335 - hrSystemProcesses is missing (net-snmp-5.5-49.el6_5.2) 1157373 - README file in net-snmp-python package is wrong 1181994 - net-snmp package does not compile on Fedora 21 1188295 - net-snmp snmpd fork() overhead [fix available] 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: net-snmp-5.5-54.el6.src.rpm i386: net-snmp-5.5-54.el6.i686.rpm net-snmp-debuginfo-5.5-54.el6.i686.rpm net-snmp-libs-5.5-54.el6.i686.rpm x86_64: net-snmp-5.5-54.el6.x86_64.rpm net-snmp-debuginfo-5.5-54.el6.i686.rpm net-snmp-debuginfo-5.5-54.el6.x86_64.rpm net-snmp-libs-5.5-54.el6.i686.rpm net-snmp-libs-5.5-54.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: net-snmp-debuginfo-5.5-54.el6.i686.rpm net-snmp-devel-5.5-54.el6.i686.rpm net-snmp-perl-5.5-54.el6.i686.rpm net-snmp-python-5.5-54.el6.i686.rpm net-snmp-utils-5.5-54.el6.i686.rpm x86_64: net-snmp-debuginfo-5.5-54.el6.i686.rpm net-snmp-debuginfo-5.5-54.el6.x86_64.rpm net-snmp-devel-5.5-54.el6.i686.rpm net-snmp-devel-5.5-54.el6.x86_64.rpm net-snmp-perl-5.5-54.el6.x86_64.rpm net-snmp-python-5.5-54.el6.x86_64.rpm net-snmp-utils-5.5-54.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: net-snmp-5.5-54.el6.src.rpm x86_64: net-snmp-5.5-54.el6.x86_64.rpm net-snmp-debuginfo-5.5-54.el6.i686.rpm net-snmp-debuginfo-5.5-54.el6.x86_64.rpm net-snmp-libs-5.5-54.el6.i686.rpm net-snmp-libs-5.5-54.el6.x86_64.rpm net-snmp-perl-5.5-54.el6.x86_64.rpm net-snmp-python-5.5-54.el6.x86_64.rpm net-snmp-utils-5.5-54.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: net-snmp-debuginfo-5.5-54.el6.i686.rpm net-snmp-debuginfo-5.5-54.el6.x86_64.rpm net-snmp-devel-5.5-54.el6.i686.rpm net-snmp-devel-5.5-54.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: net-snmp-5.5-54.el6.src.rpm i386: net-snmp-5.5-54.el6.i686.rpm net-snmp-debuginfo-5.5-54.el6.i686.rpm net-snmp-devel-5.5-54.el6.i686.rpm net-snmp-libs-5.5-54.el6.i686.rpm net-snmp-perl-5.5-54.el6.i686.rpm net-snmp-python-5.5-54.el6.i686.rpm net-snmp-utils-5.5-54.el6.i686.rpm ppc64: net-snmp-5.5-54.el6.ppc64.rpm net-snmp-debuginfo-5.5-54.el6.ppc.rpm net-snmp-debuginfo-5.5-54.el6.ppc64.rpm net-snmp-devel-5.5-54.el6.ppc.rpm net-snmp-devel-5.5-54.el6.ppc64.rpm net-snmp-libs-5.5-54.el6.ppc.rpm net-snmp-libs-5.5-54.el6.ppc64.rpm net-snmp-perl-5.5-54.el6.ppc64.rpm net-snmp-python-5.5-54.el6.ppc64.rpm net-snmp-utils-5.5-54.el6.ppc64.rpm s390x: net-snmp-5.5-54.el6.s390x.rpm net-snmp-debuginfo-5.5-54.el6.s390.rpm net-snmp-debuginfo-5.5-54.el6.s390x.rpm net-snmp-devel-5.5-54.el6.s390.rpm net-snmp-devel-5.5-54.el6.s390x.rpm net-snmp-libs-5.5-54.el6.s390.rpm net-snmp-libs-5.5-54.el6.s390x.rpm net-snmp-perl-5.5-54.el6.s390x.rpm net-snmp-python-5.5-54.el6.s390x.rpm net-snmp-utils-5.5-54.el6.s390x.rpm x86_64: net-snmp-5.5-54.el6.x86_64.rpm net-snmp-debuginfo-5.5-54.el6.i686.rpm net-snmp-debuginfo-5.5-54.el6.x86_64.rpm net-snmp-devel-5.5-54.el6.i686.rpm net-snmp-devel-5.5-54.el6.x86_64.rpm net-snmp-libs-5.5-54.el6.i686.rpm net-snmp-libs-5.5-54.el6.x86_64.rpm net-snmp-perl-5.5-54.el6.x86_64.rpm net-snmp-python-5.5-54.el6.x86_64.rpm net-snmp-utils-5.5-54.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: net-snmp-5.5-54.el6.src.rpm i386: net-snmp-5.5-54.el6.i686.rpm net-snmp-debuginfo-5.5-54.el6.i686.rpm net-snmp-devel-5.5-54.el6.i686.rpm net-snmp-libs-5.5-54.el6.i686.rpm net-snmp-perl-5.5-54.el6.i686.rpm net-snmp-python-5.5-54.el6.i686.rpm net-snmp-utils-5.5-54.el6.i686.rpm x86_64: net-snmp-5.5-54.el6.x86_64.rpm net-snmp-debuginfo-5.5-54.el6.i686.rpm net-snmp-debuginfo-5.5-54.el6.x86_64.rpm net-snmp-devel-5.5-54.el6.i686.rpm net-snmp-devel-5.5-54.el6.x86_64.rpm net-snmp-libs-5.5-54.el6.i686.rpm net-snmp-libs-5.5-54.el6.x86_64.rpm net-snmp-perl-5.5-54.el6.x86_64.rpm net-snmp-python-5.5-54.el6.x86_64.rpm net-snmp-utils-5.5-54.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-3565 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVrzYVXlSAg2UNWIIRAh4WAJ9qV50d0M2RuutHtf3bGj5Gz7Z9pgCfVPGq mY6TkK/8TscxmjL7zjvCerk= =3pS+ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 7) - x86_64 3. With this release, outgoing IPv6 messages are correctly sent from the interface specified by clientaddr. (BZ#1190679) * The Net-SNMP daemon, snmpd, did not properly clean memory when reloading its configuration file with multiple "exec" entries. Consequently, the daemon terminated unexpectedly. (BZ#1228893) * Prior to this update, snmpd did not parse complete IPv4 traffic statistics, but reported the number of received or sent bytes in the IP-MIB::ipSystemStatsTable only for IPv6 packets and not for IPv4. Now, the statistics reported by snmpd are collected for IPv4 as well. (BZ#1235697) * The Net-SNMP daemon, snmpd, did not correctly detect the file system change from read-only to read-write. Consequently, after remounting the file system into the read-write mode, the daemon reported it to be still in the read-only mode. A patch has been applied, and snmpd now detects the mode changes as expected. Bugs fixed (https://bugzilla.redhat.com/): 1092308 - backport diskio device filtering 1125155 - CVE-2014-3565 net-snmp: snmptrapd crash when handling an SNMP trap containing a ifMtu with a NULL type 1151310 - snmptrap can't create (or write to) /var/lib/net-snmp/snmpapp.conf if isn't run under root 1184433 - udpTable has wrong indices 1190679 - In IPv6, snmp packet does not send from specified interface assigned by clientaddr option in snmpd.conf

Trust: 2.61

sources: NVD: CVE-2014-3565 // JVNDB: JVNDB-2014-004588 // BID: 69477 // VULHUB: VHN-71505 // VULMON: CVE-2014-3565 // PACKETSTORM: 134055 // PACKETSTORM: 132631 // PACKETSTORM: 128398 // PACKETSTORM: 131097 // PACKETSTORM: 132798 // PACKETSTORM: 134454

AFFECTED PRODUCTS

vendor:net snmpmodel:net-snmpscope:lteversion:5.7.0

Trust: 1.8

vendor:applemodel:mac os xscope:eqversion:10.11.0

Trust: 1.6

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.0.2

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.1

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.5

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.0.1

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.6

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.0.6

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.4

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.0.4

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.0.5

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.0.8

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.3

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.2

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.3.0.1

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.0

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.1.2

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.04

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.0.9

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.0.7

Trust: 1.0

vendor:net snmpmodel:net-snmpscope:eqversion:5.0.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.11

Trust: 0.8

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:redmodel:hat enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:oraclemodel:linuxscope:eqversion:0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:net snmpmodel:net-snmpscope:eqversion:0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

sources: BID: 69477 // JVNDB: JVNDB-2014-004588 // CNNVD: CNNVD-201408-506 // NVD: CVE-2014-3565

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-3565
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-3565
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201408-506
value: MEDIUM

Trust: 0.6

VULHUB: VHN-71505
value: MEDIUM

Trust: 0.1

VULMON: CVE-2014-3565
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-3565
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-71505
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-71505 // VULMON: CVE-2014-3565 // JVNDB: JVNDB-2014-004588 // CNNVD: CNNVD-201408-506 // NVD: CVE-2014-3565

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-71505 // JVNDB: JVNDB-2014-004588 // NVD: CVE-2014-3565

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 128398 // PACKETSTORM: 131097 // CNNVD: CNNVD-201408-506

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201408-506

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004588

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-71505

PATCH

title:APPLE-SA-2015-10-21-4 OS X El Capitan 10.11.1 and Security Update 2015-007url:http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html

Trust: 0.8

title:HT205375url:https://support.apple.com/en-us/HT205375

Trust: 0.8

title:HT205375url:https://support.apple.com/ja-jp/HT205375

Trust: 0.8

title:Bug 1125155url:https://bugzilla.redhat.com/show_bug.cgi?id=1125155

Trust: 0.8

title:CVE-2014-3565 Resource Management Errors vulnerability in Net-SNMPurl:https://blogs.oracle.com/sunsecurity/entry/cve_2014_3565_resource_management

Trust: 0.8

title:#48 Official patch for CVE-2014-3565url:http://sourceforge.net/p/net-snmp/official-patches/48/

Trust: 0.8

title:Added checks for printing variables with wrong types.url:http://sourceforge.net/p/net-snmp/code/ci/7f4a7b891332899cea26e95be0337aae01648742/

Trust: 0.8

title:Net-SNMP snmptrapd Remediation of resource management error vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=107160

Trust: 0.6

title:Ubuntu Security Notice: net-snmp vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2711-1

Trust: 0.1

title:Debian CVElist Bug Report Logs: net-snmp: CVE-2014-3565url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=2bd7f48925de9c49802e60041e14827e

Trust: 0.1

title:Red Hat: CVE-2014-3565url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2014-3565

Trust: 0.1

title:Apple: OS X El Capitan 10.11.1, Security Update 2015-004 Yosemite, and Security Update 2015-007 Mavericksurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=fd51407c33ee29c59223888703327538

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - October 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=435ed9abc2fb1e74ce2a69605a01e326

Trust: 0.1

sources: VULMON: CVE-2014-3565 // JVNDB: JVNDB-2014-004588 // CNNVD: CNNVD-201408-506

EXTERNAL IDS

db:NVDid:CVE-2014-3565

Trust: 3.5

db:BIDid:69477

Trust: 2.1

db:JVNid:JVNVU92655282

Trust: 0.8

db:JVNDBid:JVNDB-2014-004588

Trust: 0.8

db:CNNVDid:CNNVD-201408-506

Trust: 0.7

db:AUSCERTid:ESB-2020.0096

Trust: 0.6

db:JUNIPERid:JSA10991

Trust: 0.6

db:PACKETSTORMid:132631

Trust: 0.2

db:PACKETSTORMid:128398

Trust: 0.2

db:PACKETSTORMid:134454

Trust: 0.2

db:PACKETSTORMid:132798

Trust: 0.2

db:PACKETSTORMid:133115

Trust: 0.1

db:VULHUBid:VHN-71505

Trust: 0.1

db:VULMONid:CVE-2014-3565

Trust: 0.1

db:PACKETSTORMid:134055

Trust: 0.1

db:PACKETSTORMid:131097

Trust: 0.1

sources: VULHUB: VHN-71505 // VULMON: CVE-2014-3565 // BID: 69477 // JVNDB: JVNDB-2014-004588 // PACKETSTORM: 134055 // PACKETSTORM: 132631 // PACKETSTORM: 128398 // PACKETSTORM: 131097 // PACKETSTORM: 132798 // PACKETSTORM: 134454 // CNNVD: CNNVD-201408-506 // NVD: CVE-2014-3565

REFERENCES

url:http://sourceforge.net/p/net-snmp/code/ci/7f4a7b891332899cea26e95be0337aae01648742/

Trust: 2.1

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html

Trust: 2.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=1125155

Trust: 2.1

url:https://security.gentoo.org/glsa/201507-17

Trust: 1.9

url:http://rhn.redhat.com/errata/rhsa-2015-1385.html

Trust: 1.9

url:http://www.securityfocus.com/bid/69477

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2015/oct/msg00005.html

Trust: 1.8

url:http://www.ubuntu.com/usn/usn-2711-1

Trust: 1.8

url:http://sourceforge.net/p/net-snmp/official-patches/48/

Trust: 1.8

url:https://support.apple.com/ht205375

Trust: 1.8

url:http://lists.opensuse.org/opensuse-updates/2014-09/msg00013.html

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3565

Trust: 1.0

url:https://access.redhat.com/security/cve/cve-2014-3565

Trust: 0.9

url:http://jvn.jp/vu/jvnvu92655282/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3565

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-3565

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2015:2345

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2015:1385

Trust: 0.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10991

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0096/

Trust: 0.6

url:http://net-snmp.sourceforge.net/

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1020946

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21965877

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21968047

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21980969

Trust: 0.3

url:http://www.mandriva.com/en/support/security/

Trust: 0.2

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.2

url:http://advisories.mageia.org/mgasa-2014-0371.html

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=35560

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/2711-1/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5925

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5936

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6836

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0235

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5943

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5924

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5945

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6834

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5935

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5944

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5942

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6837

Trust: 0.1

url:http://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5940

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5927

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5933

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5939

Trust: 0.1

url:https://support.apple.com/kb/ht205377

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5934

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6835

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6838

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6563

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-6151

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5938

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6974

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0273

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5926

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5937

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5932

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-3565

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://advisories.mageia.org/mgasa-2014-0122.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2284

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-2285

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2284

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2285

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2015-2345.html

Trust: 0.1

sources: VULHUB: VHN-71505 // VULMON: CVE-2014-3565 // BID: 69477 // JVNDB: JVNDB-2014-004588 // PACKETSTORM: 134055 // PACKETSTORM: 132631 // PACKETSTORM: 128398 // PACKETSTORM: 131097 // PACKETSTORM: 132798 // PACKETSTORM: 134454 // CNNVD: CNNVD-201408-506 // NVD: CVE-2014-3565

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 69477

SOURCES

db:VULHUBid:VHN-71505
db:VULMONid:CVE-2014-3565
db:BIDid:69477
db:JVNDBid:JVNDB-2014-004588
db:PACKETSTORMid:134055
db:PACKETSTORMid:132631
db:PACKETSTORMid:128398
db:PACKETSTORMid:131097
db:PACKETSTORMid:132798
db:PACKETSTORMid:134454
db:CNNVDid:CNNVD-201408-506
db:NVDid:CVE-2014-3565

LAST UPDATE DATE

2025-01-03T19:38:53.752000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-71505date:2023-02-13T00:00:00
db:VULMONid:CVE-2014-3565date:2016-12-24T00:00:00
db:BIDid:69477date:2016-07-06T14:35:00
db:JVNDBid:JVNDB-2014-004588date:2015-10-27T00:00:00
db:CNNVDid:CNNVD-201408-506date:2023-04-12T00:00:00
db:NVDid:CVE-2014-3565date:2024-11-21T02:08:22.947

SOURCES RELEASE DATE

db:VULHUBid:VHN-71505date:2014-10-07T00:00:00
db:VULMONid:CVE-2014-3565date:2014-10-07T00:00:00
db:BIDid:69477date:2014-08-31T00:00:00
db:JVNDBid:JVNDB-2014-004588date:2014-10-09T00:00:00
db:PACKETSTORMid:134055date:2015-10-21T19:32:22
db:PACKETSTORMid:132631date:2015-07-10T15:42:32
db:PACKETSTORMid:128398date:2014-09-25T15:11:24
db:PACKETSTORMid:131097date:2015-03-30T21:24:57
db:PACKETSTORMid:132798date:2015-07-22T17:59:04
db:PACKETSTORMid:134454date:2015-11-20T00:43:10
db:CNNVDid:CNNVD-201408-506date:2014-08-31T00:00:00
db:NVDid:CVE-2014-3565date:2014-10-07T14:55:04.640