BDU:2019-02195
Vulnerability from fstec - Published: 15.06.2019
VLAI Severity ?
Title
Уязвимость механизма TCP Selective Acknowledgement ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость механизма TCP Selective Acknowledgement ядра операционной системы Linux вызвана ошибкой фрагментации очереди повторной передачи (TCP retransmission). Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, вызвать отказ в обслуживании посредством отправки специально сформированной последовательности SACK-пакетов
Severity ?
Vendor
ООО «РусБИТех-Астра», Canonical Ltd., АО «ИВК», Siemens AG, Oracle Corp., Novell Inc., VMware Inc., ООО «Открытая мобильная платформа», Сообщество свободного программного обеспечения
Software Name
Astra Linux Special Edition (запись в едином реестре российских программ №369), Ubuntu, Альт Линукс СПТ (запись в едином реестре российских программ №9), TIM 1531 IRC, SIMATIC RF188C, SIMATIC RF600R, SIMATIC RF185C, SIMATIC RF186C, SIMATIC Teleservice Adapter IE Advanced, SIMATIC Teleservice Adapter IE Basic, Альт 8 СП Рабочая станция, Enterprise Communications Broker, OpenSUSE Leap, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP, SINUMERIK 828D, SIMATIC CM 1542-1, SIMATIC CP 1242-7, SIMATIC CP 1243-1, SIMATIC CP 1243-7 LTE EU, SIMATIC CP 1243-7 LTE/US, SIMATIC CP 1243-8 IRC, SIMATIC CM 1542SP-1, SIMATIC CP 1543-1, SIMATIC CP 1543SP-1, CloudConnect 712, RUGGEDCOM RM1224, SCALANCE M800, SCALANCE M875, SCALANCE S615, SCALANCE SC-600, SCALANCE W-700, SCALANCE W1700, SCALANCE WLC711, SCALANCE WLC712, SIMATIC ITC1500, SIMATIC ITC1500 PRO, SIMATIC ITC1900, SIMATIC ITC2200 PRO, SIMATIC ITC2200, SIMATIC MV500, SIMATIC RF166C, SIMATIC RF186CI, SIMATIC RF188CI, SINUMERIK 808D, SINUMERIK 840D sl, SINEMA Remote Connect Server, SIMATIC CP 1542SP-1 IRC, SIMATIC ITC1900 PRO, Oracle Communications Session Border Controller, Oracle Enterprise Session Border Controller, Oracle Communications Session Router, Oracle Communications Subscriber-Aware Load Balancer, VMware vCenter Server Appliance, vCloud Director (vCD), vCloud Usage Meter, vRealize Automation, vRealize Network Insight, vRealize Orchestrator Appliance, vRealize Suite Lifecycle Manager, ОС Аврора (запись в едином реестре российских программ №1543), Linux
Software Version
1.5 «Смоленск» (Astra Linux Special Edition), 16.04 LTS (Ubuntu), 7.0 (Альт Линукс СПТ), 18.04 LTS (Ubuntu), 12.04 ESM (Ubuntu), - (TIM 1531 IRC), - (SIMATIC RF188C), - (SIMATIC RF600R), - (SIMATIC RF185C), - (SIMATIC RF186C), - (SIMATIC Teleservice Adapter IE Advanced), - (SIMATIC Teleservice Adapter IE Basic), - (Альт 8 СП Рабочая станция), PCz3.0 (Enterprise Communications Broker), 15.0 (OpenSUSE Leap), 15.1 (OpenSUSE Leap), 14.04 ESM (Ubuntu), - (SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP), до V4.8 SP5 (SINUMERIK 828D), - (SIMATIC CM 1542-1), - (SIMATIC CP 1242-7), - (SIMATIC CP 1243-1), - (SIMATIC CP 1243-7 LTE EU), - (SIMATIC CP 1243-7 LTE/US), - (SIMATIC CP 1243-8 IRC), - (SIMATIC CM 1542SP-1), - (SIMATIC CP 1543-1), - (SIMATIC CP 1543SP-1), до V1.1.5 (CloudConnect 712), - (RUGGEDCOM RM1224), - (SCALANCE M800), - (SCALANCE M875), - (SCALANCE S615), до V2.0.1 (SCALANCE SC-600), - (SCALANCE W-700), - (SCALANCE W1700), - (SCALANCE WLC711), - (SCALANCE WLC712), - (SIMATIC ITC1500), - (SIMATIC ITC1500 PRO), - (SIMATIC ITC1900), - (SIMATIC ITC2200 PRO), - (SIMATIC ITC2200), - (SIMATIC MV500), - (SIMATIC RF166C), - (SIMATIC RF186CI), - (SIMATIC RF188CI), до V4.92 (SINUMERIK 808D), до V4.8 SP5 (SINUMERIK 840D sl), до 2.0 SP1 (SINEMA Remote Connect Server), - (SIMATIC CP 1542SP-1 IRC), - (SIMATIC ITC1900 PRO), PCz3.1 (Enterprise Communications Broker), PCz3.2 (Enterprise Communications Broker), 8.0 (Oracle Communications Session Border Controller), 8.1 (Oracle Communications Session Border Controller), 8.2 (Oracle Communications Session Border Controller), 8.3 (Oracle Communications Session Border Controller), 7.5 (Oracle Enterprise Session Border Controller), 8.0 (Oracle Enterprise Session Border Controller), 8.1 (Oracle Enterprise Session Border Controller), 8.2 (Oracle Enterprise Session Border Controller), 8.3 (Oracle Enterprise Session Border Controller), 7.4 (Oracle Communications Session Router), 8.0 (Oracle Communications Session Router), 8.1 (Oracle Communications Session Router), 8.2 (Oracle Communications Session Router), 7.4 (Oracle Communications Session Border Controller), 7.3 (Oracle Communications Subscriber-Aware Load Balancer), 8.1 (Oracle Communications Subscriber-Aware Load Balancer), 8.3 (Oracle Communications Subscriber-Aware Load Balancer), 6.0 (VMware vCenter Server Appliance), 6.5 (VMware vCenter Server Appliance), 6.7 (VMware vCenter Server Appliance), 9.7.0.0 (vCloud Director (vCD)), 9.7.0.1 (vCloud Director (vCD)), от 9.5.0.0 до 9.5.0.4 (vCloud Director (vCD)), от 4.0 до 4.1.0.1 (vCloud Usage Meter), от 7.0 до 8.0.0 (vRealize Automation), от 4.0 до 4.2 (vRealize Network Insight), от 7.0 до 8.0.0 (vRealize Orchestrator Appliance), до 8.0 (vRealize Suite Lifecycle Manager), 3.2.3.10 (ОС Аврора), от 4.0 до 4.4.181 включительно (Linux), от 4.5 до 4.9.181 включительно (Linux), от 4.10 до 4.14.126 включительно (Linux), от 4.15 до 4.19.51 включительно (Linux), от 4.20 до 5.1.10 включительно (Linux)
Possible Mitigations
Использование рекомендаций:
Для Linux:
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11
Для Альт 8 СП:
https://cve.basealt.ru/
Для openSUSE:
https://www.suse.com/security/cve/CVE-2019-11478/
Для продуктов Oracle:
https://www.oracle.com/security-alerts/cpujan2020.html
Для Ubuntu:
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
Для Siemens:
https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
Для VMware:
https://www.vmware.com/security/advisories/VMSA-2019-0010.html
Для Astra Linux:
https://wiki.astralinux.ru/astra-linux-se15-bulletin-20201201SE15
Для ОС Аврора:
https://cve.omprussia.ru/bb6323
Reference
http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.openwall.com/lists/oss-security/2019/07/06/3
http://www.openwall.com/lists/oss-security/2019/07/06/4
http://www.openwall.com/lists/oss-security/2019/10/24/1
http://www.openwall.com/lists/oss-security/2019/10/29/3
http://www.vmware.com/security/advisories/VMSA-2019-0010.html
https://access.redhat.com/errata/RHSA-2019:1594
https://access.redhat.com/errata/RHSA-2019:1602
https://access.redhat.com/errata/RHSA-2019:1699
https://access.redhat.com/security/vulnerabilities/tcpsack
https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf
https://cve.basealt.ru/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
https://cve.omprussia.ru/bb6323
https://exchange.xforce.ibmcloud.com/vulnerabilities/162664
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
https://kc.mcafee.com/corporate/index?page=content&id=SB10287
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182
https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11
https://launchpad.net/bugs/1831638
https://nvd.nist.gov/vuln/detail/CVE-2019-11478
https://patchwork.ozlabs.org/patch/1117156/
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0007
https://seclists.org/bugtraq/2019/Jul/30
https://security.netapp.com/advisory/ntap-20190625-0001/
https://support.f5.com/csp/article/K26618426
https://ubuntu.com/security/notices/USN-4017-1
https://ubuntu.com/security/notices/USN-4017-2
https://usn.ubuntu.com/usn/usn-4017-1
https://usn.ubuntu.com/usn/usn-4017-2
https://wiki.astralinux.ru/astra-linux-se15-bulletin-20201201SE15
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic
https://www.cve.org/CVERecord?id=CVE-2019-11478
https://www.kb.cert.org/vuls/id/905115
https://www.opennet.ru/openforum/vsluhforumID3/117645.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.suse.com/security/cve/CVE-2019-11478/
https://www.synology.com/security/advisory/Synology_SA_19_28
https://www.us-cert.gov/ics/advisories/icsa-19-253-03
https://www.vmware.com/security/advisories/VMSA-2019-0010.html
CWE
CWE-400, CWE-770
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Canonical Ltd., \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, Siemens AG, Oracle Corp., Novell Inc., VMware Inc., \u041e\u041e\u041e \u00ab\u041e\u0442\u043a\u0440\u044b\u0442\u0430\u044f \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u0430\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 16.04 LTS (Ubuntu), 7.0 (\u0410\u043b\u044c\u0442 \u041b\u0438\u043d\u0443\u043a\u0441 \u0421\u041f\u0422), 18.04 LTS (Ubuntu), 12.04 ESM (Ubuntu), - (TIM 1531 IRC), - (SIMATIC RF188C), - (SIMATIC RF600R), - (SIMATIC RF185C), - (SIMATIC RF186C), - (SIMATIC Teleservice Adapter IE Advanced), - (SIMATIC Teleservice Adapter IE Basic), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f \u0420\u0430\u0431\u043e\u0447\u0430\u044f \u0441\u0442\u0430\u043d\u0446\u0438\u044f), PCz3.0 (Enterprise Communications Broker), 15.0 (OpenSUSE Leap), 15.1 (OpenSUSE Leap), 14.04 ESM (Ubuntu), - (SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP), \u0434\u043e V4.8 SP5 (SINUMERIK 828D), - (SIMATIC CM 1542-1), - (SIMATIC CP 1242-7), - (SIMATIC CP 1243-1), - (SIMATIC CP 1243-7 LTE EU), - (SIMATIC CP 1243-7 LTE/US), - (SIMATIC CP 1243-8 IRC), - (SIMATIC CM 1542SP-1), - (SIMATIC CP 1543-1), - (SIMATIC CP 1543SP-1), \u0434\u043e V1.1.5 (CloudConnect 712), - (RUGGEDCOM RM1224), - (SCALANCE M800), - (SCALANCE M875), - (SCALANCE S615), \u0434\u043e V2.0.1 (SCALANCE SC-600), - (SCALANCE W-700), - (SCALANCE W1700), - (SCALANCE WLC711), - (SCALANCE WLC712), - (SIMATIC ITC1500), - (SIMATIC ITC1500 PRO), - (SIMATIC ITC1900), - (SIMATIC ITC2200 PRO), - (SIMATIC ITC2200), - (SIMATIC MV500), - (SIMATIC RF166C), - (SIMATIC RF186CI), - (SIMATIC RF188CI), \u0434\u043e V4.92 (SINUMERIK 808D), \u0434\u043e V4.8 SP5 (SINUMERIK 840D sl), \u0434\u043e 2.0 SP1 (SINEMA Remote Connect Server), - (SIMATIC CP 1542SP-1 IRC), - (SIMATIC ITC1900 PRO), PCz3.1 (Enterprise Communications Broker), PCz3.2 (Enterprise Communications Broker), 8.0 (Oracle Communications Session Border Controller), 8.1 (Oracle Communications Session Border Controller), 8.2 (Oracle Communications Session Border Controller), 8.3 (Oracle Communications Session Border Controller), 7.5 (Oracle Enterprise Session Border Controller), 8.0 (Oracle Enterprise Session Border Controller), 8.1 (Oracle Enterprise Session Border Controller), 8.2 (Oracle Enterprise Session Border Controller), 8.3 (Oracle Enterprise Session Border Controller), 7.4 (Oracle Communications Session Router), 8.0 (Oracle Communications Session Router), 8.1 (Oracle Communications Session Router), 8.2 (Oracle Communications Session Router), 7.4 (Oracle Communications Session Border Controller), 7.3 (Oracle Communications Subscriber-Aware Load Balancer), 8.1 (Oracle Communications Subscriber-Aware Load Balancer), 8.3 (Oracle Communications Subscriber-Aware Load Balancer), 6.0 (VMware vCenter Server Appliance), 6.5 (VMware vCenter Server Appliance), 6.7 (VMware vCenter Server Appliance), 9.7.0.0 (vCloud Director (vCD)), 9.7.0.1 (vCloud Director (vCD)), \u043e\u0442 9.5.0.0 \u0434\u043e 9.5.0.4 (vCloud Director (vCD)), \u043e\u0442 4.0 \u0434\u043e 4.1.0.1 (vCloud Usage Meter), \u043e\u0442 7.0 \u0434\u043e 8.0.0 (vRealize Automation), \u043e\u0442 4.0 \u0434\u043e 4.2 (vRealize Network Insight), \u043e\u0442 7.0 \u0434\u043e 8.0.0 (vRealize Orchestrator Appliance), \u0434\u043e 8.0 (vRealize Suite Lifecycle Manager), 3.2.3.10 (\u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430), \u043e\u0442 4.0 \u0434\u043e 4.4.181 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.5 \u0434\u043e 4.9.181 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.10 \u0434\u043e 4.14.126 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.15 \u0434\u043e 4.19.51 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.20 \u0434\u043e 5.1.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f Linux:\nhttps://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11\n\n\u0414\u043b\u044f \u0410\u043b\u044c\u0442 8 \u0421\u041f:\nhttps://cve.basealt.ru/\n\n\u0414\u043b\u044f openSUSE:\nhttps://www.suse.com/security/cve/CVE-2019-11478/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Oracle:\nhttps://www.oracle.com/security-alerts/cpujan2020.html\n\n\u0414\u043b\u044f Ubuntu:\nhttps://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic\n\n\u0414\u043b\u044f Siemens:\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf\n\n\u0414\u043b\u044f VMware:\nhttps://www.vmware.com/security/advisories/VMSA-2019-0010.html\n\n\u0414\u043b\u044f Astra Linux:\nhttps://wiki.astralinux.ru/astra-linux-se15-bulletin-20201201SE15\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430:\nhttps://cve.omprussia.ru/bb6323",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.06.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "29.05.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "21.06.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-02195",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-11478",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Ubuntu, \u0410\u043b\u044c\u0442 \u041b\u0438\u043d\u0443\u043a\u0441 \u0421\u041f\u0422 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21169), TIM 1531 IRC, SIMATIC RF188C, SIMATIC RF600R, SIMATIC RF185C, SIMATIC RF186C, SIMATIC Teleservice Adapter IE Advanced, SIMATIC Teleservice Adapter IE Basic, \u0410\u043b\u044c\u0442 8 \u0421\u041f \u0420\u0430\u0431\u043e\u0447\u0430\u044f \u0441\u0442\u0430\u043d\u0446\u0438\u044f, Enterprise Communications Broker, OpenSUSE Leap, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP, SINUMERIK 828D, SIMATIC CM 1542-1, SIMATIC CP 1242-7, SIMATIC CP 1243-1, SIMATIC CP 1243-7 LTE EU, SIMATIC CP 1243-7 LTE/US, SIMATIC CP 1243-8 IRC, SIMATIC CM 1542SP-1, SIMATIC CP 1543-1, SIMATIC CP 1543SP-1, CloudConnect 712, RUGGEDCOM RM1224, SCALANCE M800, SCALANCE M875, SCALANCE S615, SCALANCE SC-600, SCALANCE W-700, SCALANCE W1700, SCALANCE WLC711, SCALANCE WLC712, SIMATIC ITC1500, SIMATIC ITC1500 PRO, SIMATIC ITC1900, SIMATIC ITC2200 PRO, SIMATIC ITC2200, SIMATIC MV500, SIMATIC RF166C, SIMATIC RF186CI, SIMATIC RF188CI, SINUMERIK 808D, SINUMERIK 840D sl, SINEMA Remote Connect Server, SIMATIC CP 1542SP-1 IRC, SIMATIC ITC1900 PRO, Oracle Communications Session Border Controller, Oracle Enterprise Session Border Controller, Oracle Communications Session Router, Oracle Communications Subscriber-Aware Load Balancer, VMware vCenter Server Appliance, vCloud Director (vCD), vCloud Usage Meter, vRealize Automation, vRealize Network Insight, vRealize Orchestrator Appliance, vRealize Suite Lifecycle Manager, \u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161543), Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Canonical Ltd. Ubuntu 16.04 LTS , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 \u041b\u0438\u043d\u0443\u043a\u0441 \u0421\u041f\u0422 7.0 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21169), Canonical Ltd. Ubuntu 18.04 LTS , Canonical Ltd. Ubuntu 12.04 ESM , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f \u0420\u0430\u0431\u043e\u0447\u0430\u044f \u0441\u0442\u0430\u043d\u0446\u0438\u044f - , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 4.4.182 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 4.9.182 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 4.14.127 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 4.19.52 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 5.1.11 , Novell Inc. OpenSUSE Leap 15.0 , Novell Inc. OpenSUSE Leap 15.1 , Canonical Ltd. Ubuntu 14.04 ESM , \u041e\u041e\u041e \u00ab\u041e\u0442\u043a\u0440\u044b\u0442\u0430\u044f \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u0430\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u00bb \u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430 3.2.3.10 F+ Life Tab Plus (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161543)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 TCP Selective Acknowledgement \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0440\u0430\u0441\u0445\u043e\u0434 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0418\u0441\u0442\u043e\u0449\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u00bb) (CWE-400), \u041d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0435 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0438\u043b\u0438 \u0434\u0440\u043e\u0441\u0441\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 (CWE-770)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 TCP Selective Acknowledgement \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438 \u043e\u0447\u0435\u0440\u0435\u0434\u0438 \u043f\u043e\u0432\u0442\u043e\u0440\u043d\u043e\u0439 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 (TCP retransmission). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 SACK-\u043f\u0430\u043a\u0435\u0442\u043e\u0432",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html\nhttp://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html\nhttp://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html\nhttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt\nhttp://www.openwall.com/lists/oss-security/2019/06/28/2\nhttp://www.openwall.com/lists/oss-security/2019/07/06/3\nhttp://www.openwall.com/lists/oss-security/2019/07/06/4\nhttp://www.openwall.com/lists/oss-security/2019/10/24/1\nhttp://www.openwall.com/lists/oss-security/2019/10/29/3\nhttp://www.vmware.com/security/advisories/VMSA-2019-0010.html\nhttps://access.redhat.com/errata/RHSA-2019:1594\nhttps://access.redhat.com/errata/RHSA-2019:1602\nhttps://access.redhat.com/errata/RHSA-2019:1699\nhttps://access.redhat.com/security/vulnerabilities/tcpsack\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf\nhttps://cve.basealt.ru/\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478\nhttps://cve.omprussia.ru/bb6323\nhttps://exchange.xforce.ibmcloud.com/vulnerabilities/162664\nhttps://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e\nhttps://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md\nhttps://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193\nhttps://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11\nhttps://launchpad.net/bugs/1831638\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-11478\nhttps://patchwork.ozlabs.org/patch/1117156/\nhttps://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0007\nhttps://seclists.org/bugtraq/2019/Jul/30\nhttps://security.netapp.com/advisory/ntap-20190625-0001/\nhttps://support.f5.com/csp/article/K26618426\nhttps://ubuntu.com/security/notices/USN-4017-1\nhttps://ubuntu.com/security/notices/USN-4017-2\nhttps://usn.ubuntu.com/usn/usn-4017-1\nhttps://usn.ubuntu.com/usn/usn-4017-2\nhttps://wiki.astralinux.ru/astra-linux-se15-bulletin-20201201SE15\nhttps://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic\nhttps://www.cve.org/CVERecord?id=CVE-2019-11478\nhttps://www.kb.cert.org/vuls/id/905115\nhttps://www.opennet.ru/openforum/vsluhforumID3/117645.html\nhttps://www.oracle.com/security-alerts/cpujan2020.html\nhttps://www.oracle.com/security-alerts/cpuoct2020.html\nhttps://www.suse.com/security/cve/CVE-2019-11478/\nhttps://www.synology.com/security/advisory/Synology_SA_19_28\nhttps://www.us-cert.gov/ics/advisories/icsa-19-253-03\nhttps://www.vmware.com/security/advisories/VMSA-2019-0010.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0410\u0421\u0423 \u0422\u041f, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-400, CWE-770",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…