BDU:2019-02195

Vulnerability from fstec - Published: 15.06.2019
VLAI Severity ?
Title
Уязвимость механизма TCP Selective Acknowledgement ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость механизма TCP Selective Acknowledgement ядра операционной системы Linux вызвана ошибкой фрагментации очереди повторной передачи (TCP retransmission). Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, вызвать отказ в обслуживании посредством отправки специально сформированной последовательности SACK-пакетов
Vendor
ООО «РусБИТех-Астра», Canonical Ltd., АО «ИВК», Siemens AG, Oracle Corp., Novell Inc., VMware Inc., ООО «Открытая мобильная платформа», Сообщество свободного программного обеспечения
Software Name
Astra Linux Special Edition (запись в едином реестре российских программ №369), Ubuntu, Альт Линукс СПТ (запись в едином реестре российских программ №9), TIM 1531 IRC, SIMATIC RF188C, SIMATIC RF600R, SIMATIC RF185C, SIMATIC RF186C, SIMATIC Teleservice Adapter IE Advanced, SIMATIC Teleservice Adapter IE Basic, Альт 8 СП Рабочая станция, Enterprise Communications Broker, OpenSUSE Leap, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP, SINUMERIK 828D, SIMATIC CM 1542-1, SIMATIC CP 1242-7, SIMATIC CP 1243-1, SIMATIC CP 1243-7 LTE EU, SIMATIC CP 1243-7 LTE/US, SIMATIC CP 1243-8 IRC, SIMATIC CM 1542SP-1, SIMATIC CP 1543-1, SIMATIC CP 1543SP-1, CloudConnect 712, RUGGEDCOM RM1224, SCALANCE M800, SCALANCE M875, SCALANCE S615, SCALANCE SC-600, SCALANCE W-700, SCALANCE W1700, SCALANCE WLC711, SCALANCE WLC712, SIMATIC ITC1500, SIMATIC ITC1500 PRO, SIMATIC ITC1900, SIMATIC ITC2200 PRO, SIMATIC ITC2200, SIMATIC MV500, SIMATIC RF166C, SIMATIC RF186CI, SIMATIC RF188CI, SINUMERIK 808D, SINUMERIK 840D sl, SINEMA Remote Connect Server, SIMATIC CP 1542SP-1 IRC, SIMATIC ITC1900 PRO, Oracle Communications Session Border Controller, Oracle Enterprise Session Border Controller, Oracle Communications Session Router, Oracle Communications Subscriber-Aware Load Balancer, VMware vCenter Server Appliance, vCloud Director (vCD), vCloud Usage Meter, vRealize Automation, vRealize Network Insight, vRealize Orchestrator Appliance, vRealize Suite Lifecycle Manager, ОС Аврора (запись в едином реестре российских программ №1543), Linux
Software Version
1.5 «Смоленск» (Astra Linux Special Edition), 16.04 LTS (Ubuntu), 7.0 (Альт Линукс СПТ), 18.04 LTS (Ubuntu), 12.04 ESM (Ubuntu), - (TIM 1531 IRC), - (SIMATIC RF188C), - (SIMATIC RF600R), - (SIMATIC RF185C), - (SIMATIC RF186C), - (SIMATIC Teleservice Adapter IE Advanced), - (SIMATIC Teleservice Adapter IE Basic), - (Альт 8 СП Рабочая станция), PCz3.0 (Enterprise Communications Broker), 15.0 (OpenSUSE Leap), 15.1 (OpenSUSE Leap), 14.04 ESM (Ubuntu), - (SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP), до V4.8 SP5 (SINUMERIK 828D), - (SIMATIC CM 1542-1), - (SIMATIC CP 1242-7), - (SIMATIC CP 1243-1), - (SIMATIC CP 1243-7 LTE EU), - (SIMATIC CP 1243-7 LTE/US), - (SIMATIC CP 1243-8 IRC), - (SIMATIC CM 1542SP-1), - (SIMATIC CP 1543-1), - (SIMATIC CP 1543SP-1), до V1.1.5 (CloudConnect 712), - (RUGGEDCOM RM1224), - (SCALANCE M800), - (SCALANCE M875), - (SCALANCE S615), до V2.0.1 (SCALANCE SC-600), - (SCALANCE W-700), - (SCALANCE W1700), - (SCALANCE WLC711), - (SCALANCE WLC712), - (SIMATIC ITC1500), - (SIMATIC ITC1500 PRO), - (SIMATIC ITC1900), - (SIMATIC ITC2200 PRO), - (SIMATIC ITC2200), - (SIMATIC MV500), - (SIMATIC RF166C), - (SIMATIC RF186CI), - (SIMATIC RF188CI), до V4.92 (SINUMERIK 808D), до V4.8 SP5 (SINUMERIK 840D sl), до 2.0 SP1 (SINEMA Remote Connect Server), - (SIMATIC CP 1542SP-1 IRC), - (SIMATIC ITC1900 PRO), PCz3.1 (Enterprise Communications Broker), PCz3.2 (Enterprise Communications Broker), 8.0 (Oracle Communications Session Border Controller), 8.1 (Oracle Communications Session Border Controller), 8.2 (Oracle Communications Session Border Controller), 8.3 (Oracle Communications Session Border Controller), 7.5 (Oracle Enterprise Session Border Controller), 8.0 (Oracle Enterprise Session Border Controller), 8.1 (Oracle Enterprise Session Border Controller), 8.2 (Oracle Enterprise Session Border Controller), 8.3 (Oracle Enterprise Session Border Controller), 7.4 (Oracle Communications Session Router), 8.0 (Oracle Communications Session Router), 8.1 (Oracle Communications Session Router), 8.2 (Oracle Communications Session Router), 7.4 (Oracle Communications Session Border Controller), 7.3 (Oracle Communications Subscriber-Aware Load Balancer), 8.1 (Oracle Communications Subscriber-Aware Load Balancer), 8.3 (Oracle Communications Subscriber-Aware Load Balancer), 6.0 (VMware vCenter Server Appliance), 6.5 (VMware vCenter Server Appliance), 6.7 (VMware vCenter Server Appliance), 9.7.0.0 (vCloud Director (vCD)), 9.7.0.1 (vCloud Director (vCD)), от 9.5.0.0 до 9.5.0.4 (vCloud Director (vCD)), от 4.0 до 4.1.0.1 (vCloud Usage Meter), от 7.0 до 8.0.0 (vRealize Automation), от 4.0 до 4.2 (vRealize Network Insight), от 7.0 до 8.0.0 (vRealize Orchestrator Appliance), до 8.0 (vRealize Suite Lifecycle Manager), 3.2.3.10 (ОС Аврора), от 4.0 до 4.4.181 включительно (Linux), от 4.5 до 4.9.181 включительно (Linux), от 4.10 до 4.14.126 включительно (Linux), от 4.15 до 4.19.51 включительно (Linux), от 4.20 до 5.1.10 включительно (Linux)
Possible Mitigations
Использование рекомендаций: Для Linux: https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182 https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11 Для Альт 8 СП: https://cve.basealt.ru/ Для openSUSE: https://www.suse.com/security/cve/CVE-2019-11478/ Для продуктов Oracle: https://www.oracle.com/security-alerts/cpujan2020.html Для Ubuntu: https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic Для Siemens: https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf Для VMware: https://www.vmware.com/security/advisories/VMSA-2019-0010.html Для Astra Linux: https://wiki.astralinux.ru/astra-linux-se15-bulletin-20201201SE15 Для ОС Аврора: https://cve.omprussia.ru/bb6323
Reference
http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt http://www.openwall.com/lists/oss-security/2019/06/28/2 http://www.openwall.com/lists/oss-security/2019/07/06/3 http://www.openwall.com/lists/oss-security/2019/07/06/4 http://www.openwall.com/lists/oss-security/2019/10/24/1 http://www.openwall.com/lists/oss-security/2019/10/29/3 http://www.vmware.com/security/advisories/VMSA-2019-0010.html https://access.redhat.com/errata/RHSA-2019:1594 https://access.redhat.com/errata/RHSA-2019:1602 https://access.redhat.com/errata/RHSA-2019:1699 https://access.redhat.com/security/vulnerabilities/tcpsack https://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf https://cve.basealt.ru/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478 https://cve.omprussia.ru/bb6323 https://exchange.xforce.ibmcloud.com/vulnerabilities/162664 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 https://kc.mcafee.com/corporate/index?page=content&id=SB10287 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182 https://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11 https://launchpad.net/bugs/1831638 https://nvd.nist.gov/vuln/detail/CVE-2019-11478 https://patchwork.ozlabs.org/patch/1117156/ https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0007 https://seclists.org/bugtraq/2019/Jul/30 https://security.netapp.com/advisory/ntap-20190625-0001/ https://support.f5.com/csp/article/K26618426 https://ubuntu.com/security/notices/USN-4017-1 https://ubuntu.com/security/notices/USN-4017-2 https://usn.ubuntu.com/usn/usn-4017-1 https://usn.ubuntu.com/usn/usn-4017-2 https://wiki.astralinux.ru/astra-linux-se15-bulletin-20201201SE15 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic https://www.cve.org/CVERecord?id=CVE-2019-11478 https://www.kb.cert.org/vuls/id/905115 https://www.opennet.ru/openforum/vsluhforumID3/117645.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.suse.com/security/cve/CVE-2019-11478/ https://www.synology.com/security/advisory/Synology_SA_19_28 https://www.us-cert.gov/ics/advisories/icsa-19-253-03 https://www.vmware.com/security/advisories/VMSA-2019-0010.html
CWE
CWE-400, CWE-770

{
  "CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
  "CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Canonical Ltd., \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, Siemens AG, Oracle Corp., Novell Inc., VMware Inc., \u041e\u041e\u041e \u00ab\u041e\u0442\u043a\u0440\u044b\u0442\u0430\u044f \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u0430\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 16.04 LTS (Ubuntu), 7.0 (\u0410\u043b\u044c\u0442 \u041b\u0438\u043d\u0443\u043a\u0441 \u0421\u041f\u0422), 18.04 LTS (Ubuntu), 12.04 ESM (Ubuntu), - (TIM 1531 IRC), - (SIMATIC RF188C), - (SIMATIC RF600R), - (SIMATIC RF185C), - (SIMATIC RF186C), - (SIMATIC Teleservice Adapter IE Advanced), - (SIMATIC Teleservice Adapter IE Basic), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f \u0420\u0430\u0431\u043e\u0447\u0430\u044f \u0441\u0442\u0430\u043d\u0446\u0438\u044f), PCz3.0 (Enterprise Communications Broker), 15.0 (OpenSUSE Leap), 15.1 (OpenSUSE Leap), 14.04 ESM (Ubuntu), - (SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP), \u0434\u043e V4.8 SP5 (SINUMERIK 828D), - (SIMATIC CM 1542-1), - (SIMATIC CP 1242-7), - (SIMATIC CP 1243-1), - (SIMATIC CP 1243-7 LTE EU), - (SIMATIC CP 1243-7 LTE/US), - (SIMATIC CP 1243-8 IRC), - (SIMATIC CM 1542SP-1), - (SIMATIC CP 1543-1), - (SIMATIC CP 1543SP-1), \u0434\u043e V1.1.5 (CloudConnect 712), - (RUGGEDCOM RM1224), - (SCALANCE M800), - (SCALANCE M875), - (SCALANCE S615), \u0434\u043e V2.0.1 (SCALANCE SC-600), - (SCALANCE W-700), - (SCALANCE W1700), - (SCALANCE WLC711), - (SCALANCE WLC712), - (SIMATIC ITC1500), - (SIMATIC ITC1500 PRO), - (SIMATIC ITC1900), - (SIMATIC ITC2200 PRO), - (SIMATIC ITC2200), - (SIMATIC MV500), - (SIMATIC RF166C), - (SIMATIC RF186CI), - (SIMATIC RF188CI), \u0434\u043e V4.92 (SINUMERIK 808D), \u0434\u043e V4.8 SP5 (SINUMERIK 840D sl), \u0434\u043e 2.0 SP1 (SINEMA Remote Connect Server), - (SIMATIC CP 1542SP-1 IRC), - (SIMATIC ITC1900 PRO), PCz3.1 (Enterprise Communications Broker), PCz3.2 (Enterprise Communications Broker), 8.0 (Oracle Communications Session Border Controller), 8.1 (Oracle Communications Session Border Controller), 8.2 (Oracle Communications Session Border Controller), 8.3 (Oracle Communications Session Border Controller), 7.5 (Oracle Enterprise Session Border Controller), 8.0 (Oracle Enterprise Session Border Controller), 8.1 (Oracle Enterprise Session Border Controller), 8.2 (Oracle Enterprise Session Border Controller), 8.3 (Oracle Enterprise Session Border Controller), 7.4 (Oracle Communications Session Router), 8.0 (Oracle Communications Session Router), 8.1 (Oracle Communications Session Router), 8.2 (Oracle Communications Session Router), 7.4 (Oracle Communications Session Border Controller), 7.3 (Oracle Communications Subscriber-Aware Load Balancer), 8.1 (Oracle Communications Subscriber-Aware Load Balancer), 8.3 (Oracle Communications Subscriber-Aware Load Balancer), 6.0 (VMware vCenter Server Appliance), 6.5 (VMware vCenter Server Appliance), 6.7 (VMware vCenter Server Appliance), 9.7.0.0 (vCloud Director (vCD)), 9.7.0.1 (vCloud Director (vCD)), \u043e\u0442 9.5.0.0 \u0434\u043e 9.5.0.4 (vCloud Director (vCD)), \u043e\u0442 4.0 \u0434\u043e 4.1.0.1 (vCloud Usage Meter), \u043e\u0442 7.0 \u0434\u043e 8.0.0 (vRealize Automation), \u043e\u0442 4.0 \u0434\u043e 4.2 (vRealize Network Insight), \u043e\u0442 7.0 \u0434\u043e 8.0.0 (vRealize Orchestrator Appliance), \u0434\u043e 8.0 (vRealize Suite Lifecycle Manager), 3.2.3.10 (\u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430), \u043e\u0442 4.0 \u0434\u043e 4.4.181 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.5 \u0434\u043e 4.9.181 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.10 \u0434\u043e 4.14.126 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.15 \u0434\u043e 4.19.51 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.20 \u0434\u043e 5.1.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f Linux:\nhttps://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11\n\n\u0414\u043b\u044f \u0410\u043b\u044c\u0442 8 \u0421\u041f:\nhttps://cve.basealt.ru/\n\n\u0414\u043b\u044f openSUSE:\nhttps://www.suse.com/security/cve/CVE-2019-11478/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Oracle:\nhttps://www.oracle.com/security-alerts/cpujan2020.html\n\n\u0414\u043b\u044f Ubuntu:\nhttps://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic\n\n\u0414\u043b\u044f Siemens:\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf\n\n\u0414\u043b\u044f VMware:\nhttps://www.vmware.com/security/advisories/VMSA-2019-0010.html\n\n\u0414\u043b\u044f Astra Linux:\nhttps://wiki.astralinux.ru/astra-linux-se15-bulletin-20201201SE15\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430:\nhttps://cve.omprussia.ru/bb6323",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.06.2019",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "29.05.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "21.06.2019",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-02195",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-11478",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Ubuntu, \u0410\u043b\u044c\u0442 \u041b\u0438\u043d\u0443\u043a\u0441 \u0421\u041f\u0422 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21169), TIM 1531 IRC, SIMATIC RF188C, SIMATIC RF600R, SIMATIC RF185C, SIMATIC RF186C, SIMATIC Teleservice Adapter IE Advanced, SIMATIC Teleservice Adapter IE Basic, \u0410\u043b\u044c\u0442 8 \u0421\u041f \u0420\u0430\u0431\u043e\u0447\u0430\u044f \u0441\u0442\u0430\u043d\u0446\u0438\u044f, Enterprise Communications Broker, OpenSUSE Leap, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP, SINUMERIK 828D, SIMATIC CM 1542-1, SIMATIC CP 1242-7, SIMATIC CP 1243-1, SIMATIC CP 1243-7 LTE EU, SIMATIC CP 1243-7 LTE/US, SIMATIC CP 1243-8 IRC, SIMATIC CM 1542SP-1, SIMATIC CP 1543-1, SIMATIC CP 1543SP-1, CloudConnect 712, RUGGEDCOM RM1224, SCALANCE M800, SCALANCE M875, SCALANCE S615, SCALANCE SC-600, SCALANCE W-700, SCALANCE W1700, SCALANCE WLC711, SCALANCE WLC712, SIMATIC ITC1500, SIMATIC ITC1500 PRO, SIMATIC ITC1900, SIMATIC ITC2200 PRO, SIMATIC ITC2200, SIMATIC MV500, SIMATIC RF166C, SIMATIC RF186CI, SIMATIC RF188CI, SINUMERIK 808D, SINUMERIK 840D sl, SINEMA Remote Connect Server, SIMATIC CP 1542SP-1 IRC, SIMATIC ITC1900 PRO, Oracle Communications Session Border Controller, Oracle Enterprise Session Border Controller, Oracle Communications Session Router, Oracle Communications Subscriber-Aware Load Balancer, VMware vCenter Server Appliance, vCloud Director (vCD), vCloud Usage Meter, vRealize Automation, vRealize Network Insight, vRealize Orchestrator Appliance, vRealize Suite Lifecycle Manager, \u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161543), Linux",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb  (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Canonical Ltd. Ubuntu 16.04 LTS , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 \u041b\u0438\u043d\u0443\u043a\u0441 \u0421\u041f\u0422 7.0  (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21169), Canonical Ltd. Ubuntu 18.04 LTS , Canonical Ltd. Ubuntu 12.04 ESM , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f \u0420\u0430\u0431\u043e\u0447\u0430\u044f \u0441\u0442\u0430\u043d\u0446\u0438\u044f - , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 4.4.182 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 4.9.182 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 4.14.127 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 4.19.52 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 5.1.11 , Novell Inc. OpenSUSE Leap 15.0 , Novell Inc. OpenSUSE Leap 15.1 , Canonical Ltd. Ubuntu 14.04 ESM , \u041e\u041e\u041e \u00ab\u041e\u0442\u043a\u0440\u044b\u0442\u0430\u044f \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u0430\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u00bb \u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430 3.2.3.10 F+ Life Tab Plus (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161543)",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 TCP Selective Acknowledgement \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0440\u0430\u0441\u0445\u043e\u0434 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0418\u0441\u0442\u043e\u0449\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u00bb) (CWE-400), \u041d\u0435\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0435 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0438\u043b\u0438 \u0434\u0440\u043e\u0441\u0441\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 (CWE-770)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 TCP Selective Acknowledgement \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438 \u043e\u0447\u0435\u0440\u0435\u0434\u0438 \u043f\u043e\u0432\u0442\u043e\u0440\u043d\u043e\u0439 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 (TCP retransmission). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 SACK-\u043f\u0430\u043a\u0435\u0442\u043e\u0432",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://packetstormsecurity.com/files/153346/Kernel-Live-Patch-Security-Notice-LSN-0052-1.html\nhttp://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html\nhttp://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html\nhttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-010.txt\nhttp://www.openwall.com/lists/oss-security/2019/06/28/2\nhttp://www.openwall.com/lists/oss-security/2019/07/06/3\nhttp://www.openwall.com/lists/oss-security/2019/07/06/4\nhttp://www.openwall.com/lists/oss-security/2019/10/24/1\nhttp://www.openwall.com/lists/oss-security/2019/10/29/3\nhttp://www.vmware.com/security/advisories/VMSA-2019-0010.html\nhttps://access.redhat.com/errata/RHSA-2019:1594\nhttps://access.redhat.com/errata/RHSA-2019:1602\nhttps://access.redhat.com/errata/RHSA-2019:1699\nhttps://access.redhat.com/security/vulnerabilities/tcpsack\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-462066.pdf\nhttps://cve.basealt.ru/\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478\nhttps://cve.omprussia.ru/bb6323\nhttps://exchange.xforce.ibmcloud.com/vulnerabilities/162664\nhttps://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e\nhttps://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md\nhttps://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193\nhttps://kc.mcafee.com/corporate/index?page=content\u0026id=SB10287\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.127\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.52\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.182\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.182\nhttps://kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.11\nhttps://launchpad.net/bugs/1831638\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-11478\nhttps://patchwork.ozlabs.org/patch/1117156/\nhttps://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0007\nhttps://seclists.org/bugtraq/2019/Jul/30\nhttps://security.netapp.com/advisory/ntap-20190625-0001/\nhttps://support.f5.com/csp/article/K26618426\nhttps://ubuntu.com/security/notices/USN-4017-1\nhttps://ubuntu.com/security/notices/USN-4017-2\nhttps://usn.ubuntu.com/usn/usn-4017-1\nhttps://usn.ubuntu.com/usn/usn-4017-2\nhttps://wiki.astralinux.ru/astra-linux-se15-bulletin-20201201SE15\nhttps://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic\nhttps://www.cve.org/CVERecord?id=CVE-2019-11478\nhttps://www.kb.cert.org/vuls/id/905115\nhttps://www.opennet.ru/openforum/vsluhforumID3/117645.html\nhttps://www.oracle.com/security-alerts/cpujan2020.html\nhttps://www.oracle.com/security-alerts/cpuoct2020.html\nhttps://www.suse.com/security/cve/CVE-2019-11478/\nhttps://www.synology.com/security/advisory/Synology_SA_19_28\nhttps://www.us-cert.gov/ics/advisories/icsa-19-253-03\nhttps://www.vmware.com/security/advisories/VMSA-2019-0010.html",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0410\u0421\u0423 \u0422\u041f, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-400, CWE-770",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…