Summary
Detail | |||
---|---|---|---|
Vendor | Canonical | First view | 2018-10-31 |
Product | Ubuntu Linux | Last view | 2021-04-17 |
Version | 19.10 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:canonical:ubuntu_linux |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2021-04-17 | CVE-2021-3493 | The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges. |
7.8 | 2021-04-17 | CVE-2021-3492 | Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (kernel memory exhaustion) or gain privileges via executing arbitrary code. AKA ZDI-CAN-13562. |
5.9 | 2020-07-29 | CVE-2020-11934 | It was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2. |
6.8 | 2020-07-29 | CVE-2020-11933 | cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659. |
8.8 | 2020-07-09 | CVE-2020-12420 | When trying to connect to a STUN server, a race condition could have caused a use-after-free of a pointer, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0. |
8.8 | 2020-07-09 | CVE-2020-12417 | Due to confusion about ValueTags on JavaScript Objects, an object may pass through the type barrier, resulting in memory corruption and a potentially exploitable crash. *Note: this issue only affects Firefox on ARM64 platforms.* This vulnerability affects Firefox ESR < 68.10, Firefox < 78, and Thunderbird < 68.10.0. |
8.8 | 2020-07-09 | CVE-2020-12410 | Mozilla developers reported memory safety bugs present in Firefox 76 and Firefox ESR 68.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9. |
5.3 | 2020-07-09 | CVE-2020-12405 | When browsing a malicious page, a race condition in our SharedWorkerService could occur and lead to a potentially exploitable crash. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9. |
7.5 | 2020-07-09 | CVE-2020-12398 | If Thunderbird is configured to use STARTTLS for an IMAP server, and the server sends a PREAUTH response, then Thunderbird will continue with an unencrypted connection, causing email data to be sent without protection. This vulnerability affects Thunderbird < 68.9.0. |
6.5 | 2020-07-06 | CVE-2020-10760 | A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba. |
4.4 | 2020-06-30 | CVE-2020-5973 | NVIDIA Virtual GPU Manager and the guest drivers contain a vulnerability in vGPU plugin, in which there is the potential to execute privileged operations, which may lead to denial of service. This affects vGPU version 8.x (prior to 8.4), version 9.x (prior to 9.4) and version 10.x (prior to 10.3). |
9.8 | 2020-06-30 | CVE-2017-18922 | It was discovered that websockets.c in LibVNCServer prior to 0.9.12 did not properly decode certain WebSocket frames. A malicious attacker could exploit this by sending specially crafted WebSocket frames to a server, causing a heap-based buffer overflow. |
5.9 | 2020-06-15 | CVE-2020-14093 | Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response. |
5.5 | 2020-06-15 | CVE-2020-0543 | Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. |
5.5 | 2020-06-08 | CVE-2020-12049 | An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients. |
7.4 | 2020-06-04 | CVE-2020-13777 | GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application. |
5.9 | 2020-06-03 | CVE-2020-13254 | An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage. |
6.5 | 2020-05-28 | CVE-2020-13645 | In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host. |
5.5 | 2020-05-27 | CVE-2020-13632 | ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query. |
5.5 | 2020-05-27 | CVE-2020-13631 | SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c. |
7 | 2020-05-27 | CVE-2020-13630 | ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature. |
9.8 | 2020-05-26 | CVE-2020-6831 | A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0. |
9.8 | 2020-05-26 | CVE-2020-12395 | Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0. |
5.5 | 2020-05-26 | CVE-2020-12392 | The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in the disclosure of local files. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0. |
5.5 | 2020-05-24 | CVE-2020-13434 | SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
15% (35) | CWE-787 | Out-of-bounds Write |
13% (31) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
10% (25) | CWE-125 | Out-of-bounds Read |
5% (12) | CWE-476 | NULL Pointer Dereference |
5% (12) | CWE-416 | Use After Free |
5% (12) | CWE-190 | Integer Overflow or Wraparound |
3% (7) | CWE-362 | Race Condition |
2% (5) | CWE-269 | Improper Privilege Management |
1% (4) | CWE-755 | Improper Handling of Exceptional Conditions |
1% (4) | CWE-668 | Exposure of Resource to Wrong Sphere |
1% (4) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
1% (4) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
1% (4) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
1% (4) | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
1% (4) | CWE-20 | Improper Input Validation |
1% (3) | CWE-665 | Improper Initialization |
1% (3) | CWE-522 | Insufficiently Protected Credentials |
1% (3) | CWE-502 | Deserialization of Untrusted Data |
1% (3) | CWE-444 | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggli... |
1% (3) | CWE-369 | Divide By Zero |
1% (3) | CWE-367 | Time-of-check Time-of-use (TOCTOU) Race Condition |
1% (3) | CWE-193 | Off-by-one Error |
0% (2) | CWE-674 | Uncontrolled Recursion |
0% (2) | CWE-459 | Incomplete Cleanup |
0% (2) | CWE-319 | Cleartext Transmission of Sensitive Information |
SAINT Exploits
Description | Link |
---|---|
OpenSMTPD MAIL FROM command injection | More info here |
Snort® IPS/IDS
Date | Description |
---|---|
2020-04-14 | OpenSMTPD smtp_mailaddr command injection attempt RuleID : 53432 - Type : SERVER-MAIL - Revision : 1 |
2020-04-14 | OpenSMTPD smtp_mailaddr command injection attempt RuleID : 53431 - Type : SERVER-MAIL - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2020-0985 attack attempt RuleID : 53045 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2020-0984 attack attempt RuleID : 53044 - Type : SERVER-WEBAPP - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2019-0973 attack attempt RuleID : 52571 - Type : FILE-OTHER - Revision : 1 |
2020-12-05 | TRUFFLEHUNTER TALOS-2019-0973 attack attempt RuleID : 52570 - Type : FILE-OTHER - Revision : 1 |
2019-12-10 | PHP FPM env_path_info buffer underflow attempt RuleID : 52123 - Type : SERVER-WEBAPP - Revision : 1 |
2014-01-10 | PHP uri tag injection attempt RuleID : 23111 - Type : POLICY-OTHER - Revision : 12 |
2014-01-10 | PHP function CRLF injection attempt RuleID : 12360 - Type : SERVER-WEBAPP - Revision : 11 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-01-15 | Name: The remote Fedora host is missing a security update. File: fedora_2017-b24ef59f94.nasl - Type: ACT_GATHER_INFO |
2018-01-10 | Name: The remote Fedora host is missing a security update. File: fedora_2017-c28bfe0986.nasl - Type: ACT_GATHER_INFO |