Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-14855
Vulnerability from cvelistv5
Published
2020-03-20 00:00
Modified
2024-08-05 00:26
Severity ?
EPSS score ?
Summary
A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T00:26:39.140Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-4516-1", tags: [ "vendor-advisory", "x_transferred", ], url: "https://usn.ubuntu.com/4516-1/", }, { tags: [ "x_transferred", ], url: "https://rwc.iacr.org/2020/slides/Leurent.pdf", }, { tags: [ "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855", }, { tags: [ "x_transferred", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html", }, { tags: [ "x_transferred", ], url: "https://dev.gnupg.org/T4755", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "gnupg2", vendor: "Red Hat", versions: [ { status: "affected", version: "2.2.18", }, ], }, ], descriptions: [ { lang: "en", value: "A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-326", description: "CWE-326", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-07T00:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "USN-4516-1", tags: [ "vendor-advisory", ], url: "https://usn.ubuntu.com/4516-1/", }, { url: "https://rwc.iacr.org/2020/slides/Leurent.pdf", }, { url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855", }, { url: "https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html", }, { url: "https://dev.gnupg.org/T4755", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2019-14855", datePublished: "2020-03-20T00:00:00", dateReserved: "2019-08-10T00:00:00", dateUpdated: "2024-08-05T00:26:39.140Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.2.18\", \"matchCriteriaId\": \"D7D8D63F-BCE0-446D-BC8D-56231FFAAF8D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.\"}, {\"lang\": \"es\", \"value\": \"Se detect\\u00f3 un fallo en la manera en que podr\\u00edan ser falsificadas las firmas de certificados usando colisiones encontradas en el algoritmo SHA-1. Un atacante podr\\u00eda usar esta debilidad para crear firmas de certificados falsificadas. Este problema afecta a GnuPG versiones anteriores a 2.2.18.\"}]", id: "CVE-2019-14855", lastModified: "2024-11-21T04:27:30.367", metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV30\": [{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2020-03-20T16:15:14.680", references: "[{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://dev.gnupg.org/T4755\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://rwc.iacr.org/2020/slides/Leurent.pdf\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4516-1/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://dev.gnupg.org/T4755\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://rwc.iacr.org/2020/slides/Leurent.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4516-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-326\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-326\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2019-14855\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2020-03-20T16:15:14.680\",\"lastModified\":\"2024-11-21T04:27:30.367\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.\"},{\"lang\":\"es\",\"value\":\"Se detectó un fallo en la manera en que podrían ser falsificadas las firmas de certificados usando colisiones encontradas en el algoritmo SHA-1. Un atacante podría usar esta debilidad para crear firmas de certificados falsificadas. Este problema afecta a GnuPG versiones anteriores a 2.2.18.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-326\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-326\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.2.18\",\"matchCriteriaId\":\"D7D8D63F-BCE0-446D-BC8D-56231FFAAF8D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://dev.gnupg.org/T4755\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://rwc.iacr.org/2020/slides/Leurent.pdf\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4516-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://dev.gnupg.org/T4755\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://rwc.iacr.org/2020/slides/Leurent.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4516-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
fkie_cve-2019-14855
Vulnerability from fkie_nvd
Published
2020-03-20 16:15
Modified
2024-11-21 04:27
Severity ?
Summary
A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnupg | gnupg | * | |
fedoraproject | fedora | 30 | |
fedoraproject | fedora | 31 | |
canonical | ubuntu_linux | 18.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*", matchCriteriaId: "D7D8D63F-BCE0-446D-BC8D-56231FFAAF8D", versionEndExcluding: "2.2.18", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", matchCriteriaId: "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.", }, { lang: "es", value: "Se detectó un fallo en la manera en que podrían ser falsificadas las firmas de certificados usando colisiones encontradas en el algoritmo SHA-1. Un atacante podría usar esta debilidad para crear firmas de certificados falsificadas. Este problema afecta a GnuPG versiones anteriores a 2.2.18.", }, ], id: "CVE-2019-14855", lastModified: "2024-11-21T04:27:30.367", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 1.6, impactScore: 3.6, source: "secalert@redhat.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-03-20T16:15:14.680", references: [ { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "https://dev.gnupg.org/T4755", }, { source: "secalert@redhat.com", tags: [ "Mailing List", "Release Notes", "Vendor Advisory", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://rwc.iacr.org/2020/slides/Leurent.pdf", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4516-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://dev.gnupg.org/T4755", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Release Notes", "Vendor Advisory", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://rwc.iacr.org/2020/slides/Leurent.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4516-1/", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-326", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-326", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
opensuse-su-2024:10815-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
dirmngr-2.2.27-2.4 on GA media
Notes
Title of the patch
dirmngr-2.2.27-2.4 on GA media
Description of the patch
These are all security issues fixed in the dirmngr-2.2.27-2.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10815
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "dirmngr-2.2.27-2.4 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the dirmngr-2.2.27-2.4 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10815", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10815-1.json", }, { category: "self", summary: "SUSE CVE CVE-2006-0455 page", url: "https://www.suse.com/security/cve/CVE-2006-0455/", }, { category: "self", summary: "SUSE CVE CVE-2006-3746 page", url: "https://www.suse.com/security/cve/CVE-2006-3746/", }, { category: "self", summary: "SUSE CVE CVE-2006-6169 page", url: "https://www.suse.com/security/cve/CVE-2006-6169/", }, { category: "self", summary: "SUSE CVE CVE-2008-1530 page", url: "https://www.suse.com/security/cve/CVE-2008-1530/", }, { category: "self", summary: "SUSE CVE CVE-2018-12020 page", url: "https://www.suse.com/security/cve/CVE-2018-12020/", }, { category: "self", summary: "SUSE CVE CVE-2018-9234 page", url: "https://www.suse.com/security/cve/CVE-2018-9234/", }, { category: "self", summary: "SUSE CVE CVE-2019-14855 page", url: "https://www.suse.com/security/cve/CVE-2019-14855/", }, { category: "self", summary: "SUSE CVE CVE-2020-25125 page", url: "https://www.suse.com/security/cve/CVE-2020-25125/", }, ], title: "dirmngr-2.2.27-2.4 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10815-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "dirmngr-2.2.27-2.4.aarch64", product: { name: "dirmngr-2.2.27-2.4.aarch64", product_id: "dirmngr-2.2.27-2.4.aarch64", }, }, { category: "product_version", name: "gpg2-2.2.27-2.4.aarch64", product: { name: "gpg2-2.2.27-2.4.aarch64", product_id: "gpg2-2.2.27-2.4.aarch64", }, }, { category: "product_version", name: "gpg2-lang-2.2.27-2.4.aarch64", product: { name: "gpg2-lang-2.2.27-2.4.aarch64", product_id: "gpg2-lang-2.2.27-2.4.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "dirmngr-2.2.27-2.4.ppc64le", product: { name: "dirmngr-2.2.27-2.4.ppc64le", product_id: "dirmngr-2.2.27-2.4.ppc64le", }, }, { category: "product_version", name: "gpg2-2.2.27-2.4.ppc64le", product: { name: "gpg2-2.2.27-2.4.ppc64le", product_id: "gpg2-2.2.27-2.4.ppc64le", }, }, { category: "product_version", name: "gpg2-lang-2.2.27-2.4.ppc64le", product: { name: "gpg2-lang-2.2.27-2.4.ppc64le", product_id: "gpg2-lang-2.2.27-2.4.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "dirmngr-2.2.27-2.4.s390x", product: { name: "dirmngr-2.2.27-2.4.s390x", product_id: "dirmngr-2.2.27-2.4.s390x", }, }, { category: "product_version", name: "gpg2-2.2.27-2.4.s390x", product: { name: "gpg2-2.2.27-2.4.s390x", product_id: "gpg2-2.2.27-2.4.s390x", }, }, { category: "product_version", name: "gpg2-lang-2.2.27-2.4.s390x", product: { name: "gpg2-lang-2.2.27-2.4.s390x", product_id: "gpg2-lang-2.2.27-2.4.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "dirmngr-2.2.27-2.4.x86_64", product: { name: "dirmngr-2.2.27-2.4.x86_64", product_id: "dirmngr-2.2.27-2.4.x86_64", }, }, { category: "product_version", name: "gpg2-2.2.27-2.4.x86_64", product: { name: "gpg2-2.2.27-2.4.x86_64", product_id: "gpg2-2.2.27-2.4.x86_64", }, }, { category: "product_version", name: "gpg2-lang-2.2.27-2.4.x86_64", product: { name: "gpg2-lang-2.2.27-2.4.x86_64", product_id: "gpg2-lang-2.2.27-2.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "dirmngr-2.2.27-2.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", }, product_reference: "dirmngr-2.2.27-2.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "dirmngr-2.2.27-2.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", }, product_reference: "dirmngr-2.2.27-2.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "dirmngr-2.2.27-2.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", }, product_reference: "dirmngr-2.2.27-2.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "dirmngr-2.2.27-2.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", }, product_reference: "dirmngr-2.2.27-2.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gpg2-2.2.27-2.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", }, product_reference: "gpg2-2.2.27-2.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gpg2-2.2.27-2.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", }, product_reference: "gpg2-2.2.27-2.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gpg2-2.2.27-2.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", }, product_reference: "gpg2-2.2.27-2.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gpg2-2.2.27-2.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", }, product_reference: "gpg2-2.2.27-2.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gpg2-lang-2.2.27-2.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", }, product_reference: "gpg2-lang-2.2.27-2.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gpg2-lang-2.2.27-2.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", }, product_reference: "gpg2-lang-2.2.27-2.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gpg2-lang-2.2.27-2.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", }, product_reference: "gpg2-lang-2.2.27-2.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "gpg2-lang-2.2.27-2.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", }, product_reference: "gpg2-lang-2.2.27-2.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2006-0455", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-0455", }, ], notes: [ { category: "general", text: "gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command \"gpg --verify\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-0455", url: "https://www.suse.com/security/cve/CVE-2006-0455", }, { category: "external", summary: "SUSE Bug 150742 for CVE-2006-0455", url: "https://bugzilla.suse.com/150742", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2006-0455", }, { cve: "CVE-2006-3746", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-3746", }, ], notes: [ { category: "general", text: "Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-3746", url: "https://www.suse.com/security/cve/CVE-2006-3746", }, { category: "external", summary: "SUSE Bug 195569 for CVE-2006-3746", url: "https://bugzilla.suse.com/195569", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2006-3746", }, { cve: "CVE-2006-6169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-6169", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with \"C-escape\" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-6169", url: "https://www.suse.com/security/cve/CVE-2006-6169", }, { category: "external", summary: "SUSE Bug 224108 for CVE-2006-6169", url: "https://bugzilla.suse.com/224108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2006-6169", }, { cve: "CVE-2008-1530", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-1530", }, ], notes: [ { category: "general", text: "GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers \"memory corruption around deduplication of user IDs.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-1530", url: "https://www.suse.com/security/cve/CVE-2008-1530", }, { category: "external", summary: "SUSE Bug 374254 for CVE-2008-1530", url: "https://bugzilla.suse.com/374254", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2008-1530", }, { cve: "CVE-2018-12020", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-12020", }, ], notes: [ { category: "general", text: "mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the \"--status-fd 2\" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-12020", url: "https://www.suse.com/security/cve/CVE-2018-12020", }, { category: "external", summary: "SUSE Bug 1096745 for CVE-2018-12020", url: "https://bugzilla.suse.com/1096745", }, { category: "external", summary: "SUSE Bug 1101134 for CVE-2018-12020", url: "https://bugzilla.suse.com/1101134", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-12020", }, { cve: "CVE-2018-9234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-9234", }, ], notes: [ { category: "general", text: "GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-9234", url: "https://www.suse.com/security/cve/CVE-2018-9234", }, { category: "external", summary: "SUSE Bug 1088255 for CVE-2018-9234", url: "https://bugzilla.suse.com/1088255", }, { category: "external", summary: "SUSE Bug 1090647 for CVE-2018-9234", url: "https://bugzilla.suse.com/1090647", }, { category: "external", summary: "SUSE Bug 1217431 for CVE-2018-9234", url: "https://bugzilla.suse.com/1217431", }, { category: "external", summary: "SUSE Bug 1217437 for CVE-2018-9234", url: "https://bugzilla.suse.com/1217437", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.2, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2018-9234", }, { cve: "CVE-2019-14855", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-14855", }, ], notes: [ { category: "general", text: "A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-14855", url: "https://www.suse.com/security/cve/CVE-2019-14855", }, { category: "external", summary: "SUSE Bug 1157900 for CVE-2019-14855", url: "https://bugzilla.suse.com/1157900", }, { category: "external", summary: "SUSE Bug 1160243 for CVE-2019-14855", url: "https://bugzilla.suse.com/1160243", }, { category: "external", summary: "SUSE Bug 1181233 for CVE-2019-14855", url: "https://bugzilla.suse.com/1181233", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-14855", }, { cve: "CVE-2020-25125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25125", }, ], notes: [ { category: "general", text: "GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25125", url: "https://www.suse.com/security/cve/CVE-2020-25125", }, { category: "external", summary: "SUSE Bug 1176034 for CVE-2020-25125", url: "https://bugzilla.suse.com/1176034", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.s390x", "openSUSE Tumbleweed:dirmngr-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-2.2.27-2.4.x86_64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.aarch64", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.ppc64le", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.s390x", "openSUSE Tumbleweed:gpg2-lang-2.2.27-2.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-25125", }, ], }
ghsa-cpvm-f36g-55vg
Vulnerability from github
Published
2022-05-24 17:12
Modified
2022-10-07 18:15
Severity ?
Details
A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
{ affected: [], aliases: [ "CVE-2019-14855", ], database_specific: { cwe_ids: [ "CWE-326", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2020-03-20T16:15:00Z", severity: "MODERATE", }, details: "A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.", id: "GHSA-cpvm-f36g-55vg", modified: "2022-10-07T18:15:56Z", published: "2022-05-24T17:12:00Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-14855", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855", }, { type: "WEB", url: "https://dev.gnupg.org/T4755", }, { type: "WEB", url: "https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html", }, { type: "WEB", url: "https://rwc.iacr.org/2020/slides/Leurent.pdf", }, { type: "WEB", url: "https://usn.ubuntu.com/4516-1", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", type: "CVSS_V3", }, ], }
gsd-2019-14855
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
Aliases
Aliases
{ GSD: { alias: "CVE-2019-14855", description: "A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.", id: "GSD-2019-14855", references: [ "https://www.suse.com/security/cve/CVE-2019-14855.html", "https://ubuntu.com/security/CVE-2019-14855", "https://advisories.mageia.org/CVE-2019-14855.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2019-14855", ], details: "A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.", id: "GSD-2019-14855", modified: "2023-12-13T01:23:52.627509Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2019-14855", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "gnupg2", version: { version_data: [ { version_value: "2.2.18", }, ], }, }, ], }, vendor_name: "Red Hat", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.", }, ], }, impact: { cvss: [ [ { vectorString: "5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-326", }, ], }, ], }, references: { reference_data: [ { name: "USN-4516-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4516-1/", }, { name: "https://rwc.iacr.org/2020/slides/Leurent.pdf", refsource: "MISC", url: "https://rwc.iacr.org/2020/slides/Leurent.pdf", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855", }, { name: "https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html", refsource: "MISC", url: "https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html", }, { name: "https://dev.gnupg.org/T4755", refsource: "MISC", url: "https://dev.gnupg.org/T4755", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:gnupg:gnupg:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "2.2.18", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2019-14855", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-326", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855", refsource: "CONFIRM", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855", }, { name: "https://rwc.iacr.org/2020/slides/Leurent.pdf", refsource: "MISC", tags: [ "Exploit", "Third Party Advisory", ], url: "https://rwc.iacr.org/2020/slides/Leurent.pdf", }, { name: "https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html", refsource: "MISC", tags: [ "Mailing List", "Release Notes", "Vendor Advisory", ], url: "https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html", }, { name: "https://dev.gnupg.org/T4755", refsource: "MISC", tags: [ "Vendor Advisory", ], url: "https://dev.gnupg.org/T4755", }, { name: "USN-4516-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4516-1/", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, }, }, lastModifiedDate: "2022-11-08T02:28Z", publishedDate: "2020-03-20T16:15Z", }, }, }
icsa-24-284-16
Vulnerability from csaf_cisa
Published
2024-10-10 06:00
Modified
2024-10-10 06:00
Summary
Rockwell Automation DataMosaix Private Cloud
Notes
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could cause a denial-of-service condition, view customer data, or perform remote code execution.
Critical infrastructure sectors
Critical Manufacturing
Countries/areas deployed
Worldwide
Company headquarters location
United States
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:
Recommended Practices
Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
Recommended Practices
Locate control system networks and remote devices behind firewalls and isolating them from business networks.
Recommended Practices
When remote access is required, use more secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
Recommended Practices
No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.
{ document: { acknowledgments: [ { organization: "Rockwell Automation", summary: "reporting these vulnerabilities to CISA", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of these vulnerabilities could cause a denial-of-service condition, view customer data, or perform remote code execution.", title: "Risk evaluation", }, { category: "other", text: "Critical Manufacturing", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "United States", title: "Company headquarters location", }, { category: "general", text: "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:", title: "Recommended Practices", }, { category: "general", text: "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", title: "Recommended Practices", }, { category: "general", text: "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", title: "Recommended Practices", }, { category: "general", text: "When remote access is required, use more secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.", title: "Recommended Practices", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", title: "Recommended Practices", }, { category: "general", text: "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", title: "Recommended Practices", }, { category: "general", text: "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "general", text: "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.", title: "Recommended Practices", }, ], publisher: { category: "coordinator", contact_details: "central@cisa.dhs.gov", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "self", summary: "ICS Advisory ICSA-24-284-16 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-284-16.json", }, { category: "self", summary: "ICSA Advisory ICSA-24-284-16 - Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-16", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/topics/industrial-control-systems", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ncas/tips/ST04-014", }, ], title: "Rockwell Automation DataMosaix Private Cloud", tracking: { current_release_date: "2024-10-10T06:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-24-284-16", initial_release_date: "2024-10-10T06:00:00.000000Z", revision_history: [ { date: "2024-10-10T06:00:00.000000Z", legacy_version: "Initial", number: "1", summary: "Initial Publication", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<=7.07", product: { name: "Rockwell Automation DataMosaix Private Cloud: <=7.07", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "DataMosaix Private Cloud", }, ], category: "vendor", name: "Rockwell Automation", }, ], }, vulnerabilities: [ { cve: "CVE-2019-14855", cwe: { id: "CWE-326", name: "Inadequate Encryption Strength", }, notes: [ { category: "summary", text: "DataMosaix Private Cloud utilizes GnuPG which contains a certificate signature vulnerability found in the SHA-1 algorithm. A threat actor could use this weakness to create forged certificate signatures. If exploited, a malicious user could view customer data. ", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "www.cve.org", url: "https://www.cve.org/CVERecord?id=CVE-2019-14855", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", }, ], remediations: [ { category: "mitigation", details: "Rockwell Automation has addressed this issue in version v7.09 and encourages users to update to the newest available version. Rockwell Automation encourages users of the affected software to apply risk mitigations, if possible.", product_ids: [ "CSAFPID-0001", ], }, { category: "mitigation", details: "Rockwell Automation encourages users to implement security best practices to minimize the risk of the vulnerability.", product_ids: [ "CSAFPID-0001", ], url: "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight", }, { category: "mitigation", details: "For more information about this issue, please see the advisory on the Rockwell Automation security page.", product_ids: [ "CSAFPID-0001", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-17543", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "DataMosaix Private Cloud utilizes LZ4 which contains a heap-based buffer overflow vulnerability in versions before 1.9.2 (related to LZ4_compress_destSize), that affects applications that call LZ4_compress_fast with a large input. This issue can also lead to data corruption. If exploited, a malicious actor could perform a remote code execution. ", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "www.cve.org", url: "https://www.cve.org/CVERecord?id=CVE-2019-17543", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", }, ], remediations: [ { category: "mitigation", details: "Rockwell Automation has addressed this issue in version v7.09 and encourages users to update to the newest available version. Rockwell Automation encourages users of the affected software to apply risk mitigations, if possible.", product_ids: [ "CSAFPID-0001", ], }, { category: "mitigation", details: "Rockwell Automation encourages users to implement security best practices to minimize the risk of the vulnerability.", product_ids: [ "CSAFPID-0001", ], url: "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight", }, { category: "mitigation", details: "For more information about this issue, please see the advisory on the Rockwell Automation security page.", product_ids: [ "CSAFPID-0001", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-18276", cwe: { id: "CWE-273", name: "Improper Check for Dropped Privileges", }, notes: [ { category: "summary", text: "DataMosaix Private Cloud utilizes shell.c which contains a vulnerability in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. A threat actor with command execution in the shell can use \"enable -f\" for runtime loading to gain privileges. If exploited, a malicious actor could perform a remote code execution. ", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "www.cve.org", url: "https://www.cve.org/CVERecord?id=CVE-2019-18276", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", }, ], remediations: [ { category: "mitigation", details: "Rockwell Automation has addressed this issue in version v7.09 and encourages users to update to the newest available version. Rockwell Automation encourages users of the affected software to apply risk mitigations, if possible.", product_ids: [ "CSAFPID-0001", ], }, { category: "mitigation", details: "Rockwell Automation encourages users to implement security best practices to minimize the risk of the vulnerability.", product_ids: [ "CSAFPID-0001", ], url: "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight", }, { category: "mitigation", details: "For more information about this issue, please see the advisory on the Rockwell Automation security page.", product_ids: [ "CSAFPID-0001", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-19244", cwe: { id: "CWE-1357", name: "Reliance on Insufficiently Trustworthy Component", }, notes: [ { category: "summary", text: "DataMosaix Private Cloud utilizes SQLite 3.30.1 which contains a vulnerability in sqlite3Select in select.c that allows a crash if a subselect uses both DISTINCT and window functions and has certain ORDER BY usage. If exploited, a malicious actor could perform a denial of service, which would require the use to restart the software to recover it. ", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "www.cve.org", url: "https://www.cve.org/CVERecord?id=CVE-2019-19244", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", }, ], remediations: [ { category: "mitigation", details: "Rockwell Automation has addressed this issue in version v7.09 and encourages users to update to the newest available version. Rockwell Automation encourages users of the affected software to apply risk mitigations, if possible.", product_ids: [ "CSAFPID-0001", ], }, { category: "mitigation", details: "Rockwell Automation encourages users to implement security best practices to minimize the risk of the vulnerability.", product_ids: [ "CSAFPID-0001", ], url: "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight", }, { category: "mitigation", details: "For more information about this issue, please see the advisory on the Rockwell Automation security page.", product_ids: [ "CSAFPID-0001", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-9893", cwe: { id: "CWE-1357", name: "Reliance on Insufficiently Trustworthy Component", }, notes: [ { category: "summary", text: "DataMosaix Private Cloud utilizes libseccomp, which contains a vulnerability in versions 2.4.0 and earlier that does not correctly generate 64-bit syscall argument comparisons using the arithmetic operators (LT, GT, LE, GE). This vulnerability could lead to bypassing seccomp filters and potential privilege escalations. If exploited, a malicious actor could perform a remote code execution. ", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "www.cve.org", url: "https://www.cve.org/CVERecord?id=CVE-2019-9893", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", }, ], remediations: [ { category: "mitigation", details: "Rockwell Automation has addressed this issue in version v7.09 and encourages users to update to the newest available version. Rockwell Automation encourages users of the affected software to apply risk mitigations, if possible.", product_ids: [ "CSAFPID-0001", ], }, { category: "mitigation", details: "Rockwell Automation encourages users to implement security best practices to minimize the risk of the vulnerability.", product_ids: [ "CSAFPID-0001", ], url: "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight", }, { category: "mitigation", details: "For more information about this issue, please see the advisory on the Rockwell Automation security page.", product_ids: [ "CSAFPID-0001", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-9923", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "DataMosaix Private Cloud utilizes GNU Tar, which contains a vulnerability in pax_decode_header in sparse.c in versions before 1.32. pax_decode_header has a NULL pointer dereference when parsing certain archives that have malformed extended headers. If exploited, a malicious actor could perform a denial of service, which would require the use to restart the software to recover it. ", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "www.cve.org", url: "https://www.cve.org/CVERecord?id=CVE-2019-9923", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", }, ], remediations: [ { category: "mitigation", details: "Rockwell Automation has addressed this issue in version v7.09 and encourages users to update to the newest available version. Rockwell Automation encourages users of the affected software to apply risk mitigations, if possible.", product_ids: [ "CSAFPID-0001", ], }, { category: "mitigation", details: "Rockwell Automation encourages users to implement security best practices to minimize the risk of the vulnerability.", product_ids: [ "CSAFPID-0001", ], url: "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight", }, { category: "mitigation", details: "For more information about this issue, please see the advisory on the Rockwell Automation security page.", product_ids: [ "CSAFPID-0001", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], }, ], }
ICSA-24-284-16
Vulnerability from csaf_cisa
Published
2024-10-10 06:00
Modified
2024-10-10 06:00
Summary
Rockwell Automation DataMosaix Private Cloud
Notes
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could cause a denial-of-service condition, view customer data, or perform remote code execution.
Critical infrastructure sectors
Critical Manufacturing
Countries/areas deployed
Worldwide
Company headquarters location
United States
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:
Recommended Practices
Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
Recommended Practices
Locate control system networks and remote devices behind firewalls and isolating them from business networks.
Recommended Practices
When remote access is required, use more secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.
Recommended Practices
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
Recommended Practices
No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.
{ document: { acknowledgments: [ { organization: "Rockwell Automation", summary: "reporting these vulnerabilities to CISA", }, ], category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Disclosure is not limited", tlp: { label: "WHITE", url: "https://us-cert.cisa.gov/tlp/", }, }, lang: "en-US", notes: [ { category: "legal_disclaimer", text: "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", title: "Legal Notice", }, { category: "summary", text: "Successful exploitation of these vulnerabilities could cause a denial-of-service condition, view customer data, or perform remote code execution.", title: "Risk evaluation", }, { category: "other", text: "Critical Manufacturing", title: "Critical infrastructure sectors", }, { category: "other", text: "Worldwide", title: "Countries/areas deployed", }, { category: "other", text: "United States", title: "Company headquarters location", }, { category: "general", text: "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:", title: "Recommended Practices", }, { category: "general", text: "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.", title: "Recommended Practices", }, { category: "general", text: "Locate control system networks and remote devices behind firewalls and isolating them from business networks.", title: "Recommended Practices", }, { category: "general", text: "When remote access is required, use more secure methods, such as virtual private networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.", title: "Recommended Practices", }, { category: "general", text: "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", title: "Recommended Practices", }, { category: "general", text: "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", title: "Recommended Practices", }, { category: "general", text: "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", title: "Recommended Practices", }, { category: "general", text: "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", title: "Recommended Practices", }, { category: "general", text: "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", title: "Recommended Practices", }, { category: "general", text: "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.", title: "Recommended Practices", }, ], publisher: { category: "coordinator", contact_details: "central@cisa.dhs.gov", name: "CISA", namespace: "https://www.cisa.gov/", }, references: [ { category: "self", summary: "ICS Advisory ICSA-24-284-16 JSON", url: "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-284-16.json", }, { category: "self", summary: "ICSA Advisory ICSA-24-284-16 - Web Version", url: "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-16", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/topics/industrial-control-systems", }, { category: "external", summary: "Recommended Practices", url: "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf", }, { category: "external", summary: "Recommended Practices", url: "https://www.cisa.gov/uscert/ncas/tips/ST04-014", }, ], title: "Rockwell Automation DataMosaix Private Cloud", tracking: { current_release_date: "2024-10-10T06:00:00.000000Z", generator: { engine: { name: "CISA CSAF Generator", version: "1.0.0", }, }, id: "ICSA-24-284-16", initial_release_date: "2024-10-10T06:00:00.000000Z", revision_history: [ { date: "2024-10-10T06:00:00.000000Z", legacy_version: "Initial", number: "1", summary: "Initial Publication", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<=7.07", product: { name: "Rockwell Automation DataMosaix Private Cloud: <=7.07", product_id: "CSAFPID-0001", }, }, ], category: "product_name", name: "DataMosaix Private Cloud", }, ], category: "vendor", name: "Rockwell Automation", }, ], }, vulnerabilities: [ { cve: "CVE-2019-14855", cwe: { id: "CWE-326", name: "Inadequate Encryption Strength", }, notes: [ { category: "summary", text: "DataMosaix Private Cloud utilizes GnuPG which contains a certificate signature vulnerability found in the SHA-1 algorithm. A threat actor could use this weakness to create forged certificate signatures. If exploited, a malicious user could view customer data. ", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "www.cve.org", url: "https://www.cve.org/CVERecord?id=CVE-2019-14855", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", }, ], remediations: [ { category: "mitigation", details: "Rockwell Automation has addressed this issue in version v7.09 and encourages users to update to the newest available version. Rockwell Automation encourages users of the affected software to apply risk mitigations, if possible.", product_ids: [ "CSAFPID-0001", ], }, { category: "mitigation", details: "Rockwell Automation encourages users to implement security best practices to minimize the risk of the vulnerability.", product_ids: [ "CSAFPID-0001", ], url: "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight", }, { category: "mitigation", details: "For more information about this issue, please see the advisory on the Rockwell Automation security page.", product_ids: [ "CSAFPID-0001", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-17543", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "summary", text: "DataMosaix Private Cloud utilizes LZ4 which contains a heap-based buffer overflow vulnerability in versions before 1.9.2 (related to LZ4_compress_destSize), that affects applications that call LZ4_compress_fast with a large input. This issue can also lead to data corruption. If exploited, a malicious actor could perform a remote code execution. ", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "www.cve.org", url: "https://www.cve.org/CVERecord?id=CVE-2019-17543", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", }, ], remediations: [ { category: "mitigation", details: "Rockwell Automation has addressed this issue in version v7.09 and encourages users to update to the newest available version. Rockwell Automation encourages users of the affected software to apply risk mitigations, if possible.", product_ids: [ "CSAFPID-0001", ], }, { category: "mitigation", details: "Rockwell Automation encourages users to implement security best practices to minimize the risk of the vulnerability.", product_ids: [ "CSAFPID-0001", ], url: "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight", }, { category: "mitigation", details: "For more information about this issue, please see the advisory on the Rockwell Automation security page.", product_ids: [ "CSAFPID-0001", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-18276", cwe: { id: "CWE-273", name: "Improper Check for Dropped Privileges", }, notes: [ { category: "summary", text: "DataMosaix Private Cloud utilizes shell.c which contains a vulnerability in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. A threat actor with command execution in the shell can use \"enable -f\" for runtime loading to gain privileges. If exploited, a malicious actor could perform a remote code execution. ", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "www.cve.org", url: "https://www.cve.org/CVERecord?id=CVE-2019-18276", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", }, ], remediations: [ { category: "mitigation", details: "Rockwell Automation has addressed this issue in version v7.09 and encourages users to update to the newest available version. Rockwell Automation encourages users of the affected software to apply risk mitigations, if possible.", product_ids: [ "CSAFPID-0001", ], }, { category: "mitigation", details: "Rockwell Automation encourages users to implement security best practices to minimize the risk of the vulnerability.", product_ids: [ "CSAFPID-0001", ], url: "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight", }, { category: "mitigation", details: "For more information about this issue, please see the advisory on the Rockwell Automation security page.", product_ids: [ "CSAFPID-0001", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-19244", cwe: { id: "CWE-1357", name: "Reliance on Insufficiently Trustworthy Component", }, notes: [ { category: "summary", text: "DataMosaix Private Cloud utilizes SQLite 3.30.1 which contains a vulnerability in sqlite3Select in select.c that allows a crash if a subselect uses both DISTINCT and window functions and has certain ORDER BY usage. If exploited, a malicious actor could perform a denial of service, which would require the use to restart the software to recover it. ", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "www.cve.org", url: "https://www.cve.org/CVERecord?id=CVE-2019-19244", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", }, ], remediations: [ { category: "mitigation", details: "Rockwell Automation has addressed this issue in version v7.09 and encourages users to update to the newest available version. Rockwell Automation encourages users of the affected software to apply risk mitigations, if possible.", product_ids: [ "CSAFPID-0001", ], }, { category: "mitigation", details: "Rockwell Automation encourages users to implement security best practices to minimize the risk of the vulnerability.", product_ids: [ "CSAFPID-0001", ], url: "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight", }, { category: "mitigation", details: "For more information about this issue, please see the advisory on the Rockwell Automation security page.", product_ids: [ "CSAFPID-0001", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-9893", cwe: { id: "CWE-1357", name: "Reliance on Insufficiently Trustworthy Component", }, notes: [ { category: "summary", text: "DataMosaix Private Cloud utilizes libseccomp, which contains a vulnerability in versions 2.4.0 and earlier that does not correctly generate 64-bit syscall argument comparisons using the arithmetic operators (LT, GT, LE, GE). This vulnerability could lead to bypassing seccomp filters and potential privilege escalations. If exploited, a malicious actor could perform a remote code execution. ", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "www.cve.org", url: "https://www.cve.org/CVERecord?id=CVE-2019-9893", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", }, ], remediations: [ { category: "mitigation", details: "Rockwell Automation has addressed this issue in version v7.09 and encourages users to update to the newest available version. Rockwell Automation encourages users of the affected software to apply risk mitigations, if possible.", product_ids: [ "CSAFPID-0001", ], }, { category: "mitigation", details: "Rockwell Automation encourages users to implement security best practices to minimize the risk of the vulnerability.", product_ids: [ "CSAFPID-0001", ], url: "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight", }, { category: "mitigation", details: "For more information about this issue, please see the advisory on the Rockwell Automation security page.", product_ids: [ "CSAFPID-0001", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], }, { cve: "CVE-2019-9923", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "summary", text: "DataMosaix Private Cloud utilizes GNU Tar, which contains a vulnerability in pax_decode_header in sparse.c in versions before 1.32. pax_decode_header has a NULL pointer dereference when parsing certain archives that have malformed extended headers. If exploited, a malicious actor could perform a denial of service, which would require the use to restart the software to recover it. ", title: "Vulnerability Summary", }, ], product_status: { known_affected: [ "CSAFPID-0001", ], }, references: [ { category: "external", summary: "www.cve.org", url: "https://www.cve.org/CVERecord?id=CVE-2019-9923", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", }, { category: "external", summary: "www.first.org", url: "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", }, ], remediations: [ { category: "mitigation", details: "Rockwell Automation has addressed this issue in version v7.09 and encourages users to update to the newest available version. Rockwell Automation encourages users of the affected software to apply risk mitigations, if possible.", product_ids: [ "CSAFPID-0001", ], }, { category: "mitigation", details: "Rockwell Automation encourages users to implement security best practices to minimize the risk of the vulnerability.", product_ids: [ "CSAFPID-0001", ], url: "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight", }, { category: "mitigation", details: "For more information about this issue, please see the advisory on the Rockwell Automation security page.", product_ids: [ "CSAFPID-0001", ], url: "https://www.rockwellautomation.com/en-us/trust-center/security-advisories.html", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-0001", ], }, ], }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.