Skip to content

Instantly share code, notes, and snippets.

@v1k0d3n
Created September 19, 2016 18:55
Show Gist options
  • Save v1k0d3n/2b7dc9256cf906fc064e7e7e8049c09d to your computer and use it in GitHub Desktop.
Save v1k0d3n/2b7dc9256cf906fc064e7e7e8049c09d to your computer and use it in GitHub Desktop.
bjozsa@megatron ~ ❯❯❯ analyze-local-images 31347bae83b8
2016-09-19 14:54:26.423641 I | Saving 31347bae83b8 to local disk (this may take some time)
2016-09-19 14:54:29.278098 I | Retrieving image history
2016-09-19 14:54:29.278220 I | Analyzing 14 layers...
2016-09-19 14:54:29.278227 I | Analyzing 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
2016-09-19 14:54:29.279617 I | Analyzing 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
2016-09-19 14:54:29.280781 I | Analyzing a42428a792e24fb647ba5dae989e830208905b788ec9fe5ca999af8542511de7
2016-09-19 14:54:29.281745 I | Analyzing 9af0912d5afe6bdae86d1af5d667093ec99db3894a8f577d1ed36c95c83a6be8
2016-09-19 14:54:29.282689 I | Analyzing 5f2b525a42b49d22793547a1d0b419206d7c544bcf5f59f99df02323e0a36c3a
2016-09-19 14:54:29.283579 I | Analyzing 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
2016-09-19 14:54:29.284493 I | Analyzing 5b33d2bda4e270c88ccb24dd56e75f8c8bd69875ce2de9d17b2f7d066c2878c2
2016-09-19 14:54:29.285370 I | Analyzing a3954baecab1f3c6e5c0d32f41f2490cad55e711662af541c94d58b69d32b5e6
2016-09-19 14:54:29.286252 I | Analyzing de4758f98782b37f269d9a475bda92df32291655d5e5a32e36d7ff0265e85c6e
2016-09-19 14:54:29.287204 I | Analyzing 974d96fd3cad322c011b48c5a26978b168537325306c39c4b128933a244e4b5e
2016-09-19 14:54:29.287980 I | Analyzing a6cc704a9f105c84c73febcc771730135a1ca3a43f8548697b9b388f480f41b7
2016-09-19 14:54:29.288843 I | Analyzing a7fc8ee5cc0e4fbea2918ea5443b66aae2c5821fdac655a500478781db12faec
2016-09-19 14:54:29.289715 I | Analyzing f0e2d5ce752bbef8168f54a69e4d638482169041936721864fa34a860f8b97df
2016-09-19 14:54:29.290617 I | Analyzing 08aa3af80935a1ec3c35663f0744ad42571717089882cd9e8f36134c67c4589f
2016-09-19 14:54:29.291504 I | Retrieving image's vulnerabilities
Clair report for image 31347bae83b8 (2016-09-19 18:54:29.297856755 +0000 UTC)
CVE-2016-1951 (High)
Multiple integer overflows in io/prprf.c in Mozilla Netscape Portable Runtime
(NSPR) before 4.12 allow remote attackers to cause a denial of service (buffer
overflow) or possibly have unspecified other impact via a long string to a
PR_*printf function.
Package: nspr @ 2:4.10.7-1+deb8u1
Link: https://security-tracker.debian.org/tracker/CVE-2016-1951
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2016-2182 (High)
The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not
properly validate division results, which allows remote attackers to cause a
denial of service (out-of-bounds write and application crash) or possibly have
unspecified other impact via unknown vectors.
Package: openssl @ 1.0.1t-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-2182
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-0494 (High)
Unspecified vulnerability in the Java SE and Java SE Embedded components in
Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote
attackers to affect confidentiality, integrity, and availability via unknown
vectors related to 2D.
Package: icu @ 52.1-8+deb8u3
Link: https://security-tracker.debian.org/tracker/CVE-2016-0494
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-2834 (High)
Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox
before 47.0, allows remote attackers to cause a denial of service (memory
corruption and application crash) or possibly have unspecified other impact via
unknown vectors.
Package: nss @ 2:3.17.2-1.1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-2834
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2016-6303 (High)
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in
OpenSSL before 1.1.0 allows remote attackers to cause a denial of service
(out-of-bounds write and application crash) or possibly have unspecified other
impact via unknown vectors.
Package: openssl @ 1.0.1t-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-6303
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-1978 (High)
Use-after-free vulnerability in the ssl3_HandleECDHServerKeyExchange function in
Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox
before 44.0, allows remote attackers to cause a denial of service or possibly
have unspecified other impact by making an SSL (1) DHE or (2) ECDHE handshake at
a time of high memory consumption.
Package: nss @ 2:3.17.2-1.1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-1978
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2015-7181 (High)
The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS)
before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and
Firefox ESR 38.x before 38.4 and other products, improperly restricts access to
an unspecified data structure, which allows remote attackers to cause a denial
of service (application crash) or possibly execute arbitrary code via crafted
OCTET STRING data, related to a "use-after-poison" issue.
Package: nss @ 2:3.17.2-1.1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2015-7181
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2015-7182 (High)
Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security
Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox
before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote
attackers to cause a denial of service (application crash) or possibly execute
arbitrary code via crafted OCTET STRING data.
Package: nss @ 2:3.17.2-1.1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2015-7182
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2016-6293 (High)
The uloc_acceptLanguageFromHTTP function in common/uloc.cpp in International
Components for Unicode (ICU) through 57.1 for C/C++ does not ensure that there
is a '\0' character at the end of a certain temporary array, which allows remote
attackers to cause a denial of service (out-of-bounds read) or possibly have
unspecified other impact via a call with a long httpAcceptLanguage argument.
Package: icu @ 52.1-8+deb8u3
Link: https://security-tracker.debian.org/tracker/CVE-2016-6293
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2015-4844 (High)
Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE
Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and
availability via unknown vectors related to 2D.
Package: icu @ 52.1-8+deb8u3
Link: https://security-tracker.debian.org/tracker/CVE-2015-4844
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2014-9761 (High)
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6)
before 2.23 allow context-dependent attackers to cause a denial of service
(application crash) or possibly execute arbitrary code via a long argument to
the (1) nan, (2) nanf, or (3) nanl function.
Package: glibc @ 2.19-18+deb8u4
Link: https://security-tracker.debian.org/tracker/CVE-2014-9761
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2016-4429 (High)
Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in
the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial
of service (crash) or possibly unspecified other impact via a flood of crafted
ICMP and UDP packets.
Package: glibc @ 2.19-18+deb8u4
Fixed version: 2.19-18+deb8u5
Link: https://security-tracker.debian.org/tracker/CVE-2016-4429
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2016-2181 (Medium)
The Anti-Replay feature in the DTLS implementation in OpenSSL before
1.1.0 mishandles early use of a new epoch number in conjunction with a
large sequence number, which allows remote attackers to cause a denial of
service (false-positive packet drops) via spoofed DTLS records, related to
rec_layer_d1.c and ssl3_record.c.
Package: openssl @ 1.0.1t-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-2181
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-6302 (Medium)
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does
not consider the HMAC size during validation of the ticket length, which allows
remote attackers to cause a denial of service via a ticket that is too short.
Package: openssl @ 1.0.1t-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-6302
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-2180 (Medium)
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key
Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through
1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read
and application crash) via a crafted time-stamp file that is mishandled by the
"openssl ts" command.
Package: openssl @ 1.0.1t-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-2180
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2015-5276 (Medium)
The std::random_device class in libstdc++ in the GNU Compiler Collection (aka
GCC) before 4.9.4 does not properly handle short reads from blocking sources,
which makes it easier for context-dependent attackers to predict the random
values via unspecified vectors.
Package: gcc-4.9 @ 4.9.2-10
Link: https://security-tracker.debian.org/tracker/CVE-2015-5276
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2016-6261 (Medium)
The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows
context-dependent attackers to cause a denial of service (out-of-bounds read and
crash) via 64 bytes of input.
Package: libidn @ 1.29-1+deb8u1
Fixed version: 1.29-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-6261
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-1938 (Medium)
The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security
Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly
divides numbers, which might make it easier for remote attackers to defeat
cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2)
mp_exptmod function.
Package: nss @ 2:3.17.2-1.1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-1938
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2016-1234 (Medium)
Stack-based buffer overflow in the glob implementation in GNU C Library (aka
glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent
attackers to cause a denial of service (crash) via a long name.
Package: glibc @ 2.19-18+deb8u4
Fixed version: 2.19-18+deb8u5
Link: https://security-tracker.debian.org/tracker/CVE-2016-1234
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2015-2632 (Medium)
Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote
attackers to affect confidentiality via unknown vectors related to 2D.
Package: icu @ 52.1-8+deb8u3
Link: https://security-tracker.debian.org/tracker/CVE-2015-2632
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-3120 (Medium)
The validate_as_request function in kdc_util.c in the Key Distribution Center
(KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when
restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure,
which allows remote authenticated users to cause a denial of service (NULL
pointer dereference and daemon crash) via an S4U2Self request.
Package: krb5 @ 1.12.1+dfsg-19+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-3120
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2015-2694 (Medium)
The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before
1.13.2 do not properly track whether a client's request has been validated,
which allows remote attackers to bypass an intended preauthentication
requirement by providing (1) zero bytes of data or (2) an arbitrary realm name,
related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.
Package: krb5 @ 1.12.1+dfsg-19+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2015-2694
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-6263 (Medium)
The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33
allows context-dependent attackers to cause a denial of service (out-of-bounds
read and crash) via crafted UTF-8 data.
Package: libidn @ 1.29-1+deb8u1
Fixed version: 1.29-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-6263
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-1950 (Medium)
Heap-based buffer overflow in Mozilla Network Security Services (NSS) before
3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before
45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute
arbitrary code via crafted ASN.1 data in an X.509 certificate.
Package: nss @ 2:3.17.2-1.1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-1950
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2015-5531 (Medium)
Directory traversal vulnerability in Elasticsearch before 1.6.1 allows remote
attackers to read arbitrary files via unspecified vectors related to snapshot
API calls.
Package: elasticsearch @ 2.4.0
Link: https://security-tracker.debian.org/tracker/CVE-2015-5531
Layer: a6cc704a9f105c84c73febcc771730135a1ca3a43f8548697b9b388f480f41b7
CVE-2016-1979 (Medium)
Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey
function in Mozilla Network Security Services (NSS) before 3.21.1, as used
in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of
service or possibly have unspecified other impact via crafted key data with DER
encoding.
Package: nss @ 2:3.17.2-1.1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-1979
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2015-4000 (Medium)
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on
a server but not on a client, does not properly convey a DHE_EXPORT choice,
which allows man-in-the-middle attackers to conduct cipher-downgrade attacks
by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a
ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
Package: nss @ 2:3.17.2-1.1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2015-4000
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2016-4971 (Medium)
GNU wget before 1.18 allows remote servers to write to arbitrary files by
redirecting a request from HTTP to a crafted FTP resource.
Package: wget @ 1.16-1
Fixed version: 1.16-1+deb8u1
Link: https://security-tracker.debian.org/tracker/CVE-2016-4971
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-2179 (Medium)
The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the
lifetime of queue entries associated with unused out-of-order messages, which
allows remote attackers to cause a denial of service (memory consumption) by
maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c,
statem_dtls.c, statem_lib.c, and statem_srvr.c.
Package: openssl @ 1.0.1t-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-2179
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2015-8948 (Medium)
idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive
memory information by reading a zero byte as input, which triggers an
out-of-bounds read.
Package: libidn @ 1.29-1+deb8u1
Fixed version: 1.29-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2015-8948
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-3706 (Medium)
Stack-based buffer overflow in the getaddrinfo function in
sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows
remote attackers to cause a denial of service (crash) via vectors involving
hostent conversion. NOTE: this vulnerability exists because of an incomplete fix
for CVE-2013-4458.
Package: glibc @ 2.19-18+deb8u4
Fixed version: 2.19-18+deb8u5
Link: https://security-tracker.debian.org/tracker/CVE-2016-3706
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2011-3389 (Medium)
The SSL protocol, as used in certain configurations in Microsoft Windows and
Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other
products, encrypts data by using CBC mode with chained initialization vectors,
which allows man-in-the-middle attackers to obtain plaintext HTTP headers via
a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction
with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java
URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
Package: gnutls28 @ 3.3.8-6+deb8u3
Link: https://security-tracker.debian.org/tracker/CVE-2011-3389
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-3075 (Medium)
Stack-based buffer overflow in the nss_dns implementation of the getnetbyname
function in GNU C Library (aka glibc) before 2.24 allows context-dependent
attackers to cause a denial of service (stack consumption and application crash)
via a long name.
Package: glibc @ 2.19-18+deb8u4
Fixed version: 2.19-18+deb8u5
Link: https://security-tracker.debian.org/tracker/CVE-2016-3075
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2015-7575 (Medium)
Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla
Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject
MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol
traffic, which makes it easier for man-in-the-middle attackers to spoof servers
by triggering a collision.
Package: nss @ 2:3.17.2-1.1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2015-7575
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2016-3119 (Low)
The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4
and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote
authenticated users to cause a denial of service (NULL pointer dereference and
daemon crash) via a crafted request to modify a principal.
Package: krb5 @ 1.12.1+dfsg-19+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-3119
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2015-5180 (Low)
Package: glibc @ 2.19-18+deb8u4
Link: https://security-tracker.debian.org/tracker/CVE-2015-5180
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2016-7098 (Low)
Package: wget @ 1.16-1
Link: https://security-tracker.debian.org/tracker/CVE-2016-7098
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-2178 (Low)
The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h
does not properly ensure the use of constant-time operations, which makes it
easier for local users to discover a DSA private key via a timing side-channel
attack.
Package: openssl @ 1.0.1t-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-2178
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-2177 (Low)
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer
boundary checks, which might allow remote attackers to cause a denial of
service (integer overflow and application crash) or possibly have unspecified
other impact by leveraging unexpected malloc behavior, related to s3_srvr.c,
ssl_sess.c, and t1_lib.c.
Package: openssl @ 1.0.1t-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2016-2177
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-3189 (Low)
Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote
attackers to cause a denial of service (crash) via a crafted bzip2 file, related
to block ends set to before the start of the block.
Package: bzip2 @ 1.0.6-7
Link: https://security-tracker.debian.org/tracker/CVE-2016-3189
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2016-6349 (Negligible)
Package: systemd @ 215-17+deb8u4
Link: https://security-tracker.debian.org/tracker/CVE-2016-6349
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2006-6719 (Negligible)
The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget
1.10.2 allows remote attackers to cause a denial of service (application crash)
via a malicious FTP server with a large number of blank 220 responses to the
SYST command.
Package: wget @ 1.16-1
Link: https://security-tracker.debian.org/tracker/CVE-2006-6719
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2013-0340 (Negligible)
expat 2.1.0 and earlier does not properly handle entities expansion unless an
application developer uses the XML_SetEntityDeclHandler function, which allows
remote attackers to cause a denial of service (resource consumption), send
HTTP requests to intranet servers, or read arbitrary files via a crafted XML
document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that
because expat already provides the ability to disable external entity expansion,
the responsibility for resolving this issue lies with application developers;
according to this argument, this entry should be REJECTed, and each affected
application would need its own CVE.
Package: expat @ 2.1.0-6+deb8u3
Link: https://security-tracker.debian.org/tracker/CVE-2013-0340
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2016-6251 (Negligible)
Package: shadow @ 1:4.2-3+deb8u1
Link: https://security-tracker.debian.org/tracker/CVE-2016-6251
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2013-4235 (Negligible)
Package: shadow @ 1:4.2-3+deb8u1
Link: https://security-tracker.debian.org/tracker/CVE-2013-4235
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2015-5218 (Negligible)
Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27
allows local users to cause a denial of service (crash) via a crafted file,
related to the page global variable.
Package: util-linux @ 2.25.2-6
Link: https://security-tracker.debian.org/tracker/CVE-2015-5218
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2010-4051 (Negligible)
The regcomp implementation in the GNU C Library (aka glibc or libc6) through
2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause
a denial of service (application crash) via a regular expression containing
adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation,
as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c
exploit for ProFTPD, related to a "RE_DUP_MAX overflow."
Package: glibc @ 2.19-18+deb8u4
Link: https://security-tracker.debian.org/tracker/CVE-2010-4051
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2015-5377 (Negligible)
Package: elasticsearch @ 2.4.0
Link: https://security-tracker.debian.org/tracker/CVE-2015-5377
Layer: a6cc704a9f105c84c73febcc771730135a1ca3a43f8548697b9b388f480f41b7
CVE-2007-5686 (Negligible)
initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp
file, which allows local users to obtain sensitive information regarding
authentication attempts. NOTE: because sshd detects the insecure permissions
and does not log certain events, this also prevents sshd from logging failed
authentication attempts by remote attackers.
Package: shadow @ 1:4.2-3+deb8u1
Link: https://security-tracker.debian.org/tracker/CVE-2007-5686
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2005-2541 (Negligible)
Tar 1.15.1 does not properly warn the user when extracting setuid or setgid
files, which may allow local users or remote attackers to gain privileges.
Package: tar @ 1.27.1-2
Link: https://security-tracker.debian.org/tracker/CVE-2005-2541
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2015-3276 (Negligible)
The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does
not properly parse OpenSSL-style multi-keyword mode cipher strings, which might
cause a weaker than intended cipher to be used and allow remote attackers to
have unspecified impact via unknown vectors.
Package: openldap @ 2.4.40+dfsg-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2015-3276
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-2779 (Negligible)
Package: util-linux @ 2.25.2-6
Link: https://security-tracker.debian.org/tracker/CVE-2016-2779
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2007-6755 (Negligible)
The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic
Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with
a possible relationship to certain "skeleton key" values, which might allow
context-dependent attackers to defeat cryptographic protection mechanisms by
leveraging knowledge of those values. NOTE: this is a preliminary CVE for
Dual_EC_DRBG; future research may provide additional details about point Q and
associated attacks, and could potentially lead to a RECAST or REJECT of this
CVE.
Package: openssl @ 1.0.1t-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2007-6755
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2016-3739 (Negligible)
The (1) mbed_connect_step1 function in lib/vtls/mbedtls.c and (2)
polarssl_connect_step1 function in lib/vtls/polarssl.c in cURL and libcurl
before 7.49.0, when using SSLv3 or making a TLS connection to a URL that uses a
numerical IP address, allow remote attackers to spoof servers via an arbitrary
valid certificate.
Package: curl @ 7.38.0-4+deb8u4
Link: https://security-tracker.debian.org/tracker/CVE-2016-3739
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2010-4052 (Negligible)
Stack consumption vulnerability in the regcomp implementation in the GNU C
Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows
context-dependent attackers to cause a denial of service (resource exhaustion)
via a regular expression containing adjacent repetition operators, as
demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for
ProFTPD.
Package: glibc @ 2.19-18+deb8u4
Link: https://security-tracker.debian.org/tracker/CVE-2010-4052
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2015-4165 (Negligible)
Package: elasticsearch @ 2.4.0
Link: https://security-tracker.debian.org/tracker/CVE-2015-4165
Layer: a6cc704a9f105c84c73febcc771730135a1ca3a43f8548697b9b388f480f41b7
CVE-2015-5224 (Negligible)
Package: util-linux @ 2.25.2-6
Link: https://security-tracker.debian.org/tracker/CVE-2015-5224
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2010-4756 (Negligible)
The glob implementation in the GNU C Library (aka glibc or libc6) allows remote
authenticated users to cause a denial of service (CPU and memory consumption)
via crafted glob expressions that do not match any pathnames, as demonstrated
by glob expressions in STAT commands to an FTP daemon, a different vulnerability
than CVE-2010-2632.
Package: glibc @ 2.19-18+deb8u4
Link: https://security-tracker.debian.org/tracker/CVE-2010-4756
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2016-6323 (Negligible)
Package: glibc @ 2.19-18+deb8u4
Fixed version: 2.19-18+deb8u6
Link: https://security-tracker.debian.org/tracker/CVE-2016-6323
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2013-4392 (Negligible)
systemd, when updating file permissions, allows local users to change the
permissions and SELinux security contexts for arbitrary files via a symlink
attack on unspecified files.
Package: systemd @ 215-17+deb8u4
Link: https://security-tracker.debian.org/tracker/CVE-2013-4392
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2014-8166 (Negligible)
Package: cups @ 1.7.5-11+deb8u1
Link: https://security-tracker.debian.org/tracker/CVE-2014-8166
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2015-5186 (Negligible)
Package: audit @ 1:2.4-1
Link: https://security-tracker.debian.org/tracker/CVE-2015-5186
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2011-3374 (Negligible)
Package: apt @ 1.0.9.8.3
Link: https://security-tracker.debian.org/tracker/CVE-2011-3374
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2016-3616 (Negligible)
Package: libjpeg-turbo @ 1:1.3.1-12
Link: https://security-tracker.debian.org/tracker/CVE-2016-3616
Layer: 10ecb44384d336384d58f30b0ed98a87a465688370399a871d18c74b9fcc5c71
CVE-2016-6252 (Negligible)
Package: shadow @ 1:4.2-3+deb8u1
Link: https://security-tracker.debian.org/tracker/CVE-2016-6252
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2010-0928 (Negligible)
OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro
FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature
calculations, and does not verify the signature before providing it to a caller,
which makes it easier for physically proximate attackers to determine the
private key via a modified supply voltage for the microprocessor, related to a
"fault-based attack."
Package: openssl @ 1.0.1t-1+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2010-0928
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2011-4116 (Negligible)
Package: perl @ 5.20.2-3+deb8u6
Link: https://security-tracker.debian.org/tracker/CVE-2011-4116
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
CVE-2004-0971 (Negligible)
The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux
1.5 through 2.1, and possibly other operating systems, allows local users to
overwrite files via a symlink attack on temporary files.
Package: krb5 @ 1.12.1+dfsg-19+deb8u2
Link: https://security-tracker.debian.org/tracker/CVE-2004-0971
Layer: 027993a3b5cffd6272f0891e62c8aa2a24c5955c09a56098174234d8452b425d
CVE-2012-3878 (Negligible)
Package: perl @ 5.20.2-3+deb8u6
Link: https://security-tracker.debian.org/tracker/CVE-2012-3878
Layer: 2c0a4e60a7ab30a735c92fbb5310e9477956192bbb065b34a7fcb8e169b0987d
bjozsa@megatron ~ ❯❯❯
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment