Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Update Details

Security Intelligence Center
Print

Update #3097 (09/06/2018)

5 new signatures:

MEDIUMHTTP:DIR:CVE-2018-14912-INF-DISHTTP: Cgit Path Parameter Directory Traversal Information Disclosure
MEDIUMHTTP:STC:ADOBE:CVE-2018-12827IDHTTP: Adobe Flash CVE-2018-12827 Information Disclosure
MEDIUMHTTP:APACHE:CVE-2018-8026-IDHTTP: Apache Solr ConfigSets XML External Entity Expansion Information Disclosure
HIGHHTTP:SQL:INJ:CVE-2018-12464-PRIHTTP: Micro Focus Secure Messaging Gateway enginelist.php SQL Injection
HIGHHTTP:STC:FOXIT-UAFHTTP: Foxit Reader Annotations borderEffectIntensity Use After Free

1 updated signature:

HIGHSMB:SAMBA:CVE-2017-7494-ILLSMB: Samba Writeable Share Insecure Library Loading


Details of the signatures included within this bulletin:


HTTP:STC:ADOBE:CVE-2018-12827ID - HTTP: Adobe Flash CVE-2018-12827 Information Disclosure

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to information disclosure.

Supported On:

idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1

References:

  • cve: CVE-2018-12827

HTTP:STC:FOXIT-UAF - HTTP: Foxit Reader Annotations borderEffectIntensity Use After Free

Severity: HIGH

Description:

This signature detects attempt to exploit use after free vulnerability which has been reported in Foxit Reader. A remote attacker could exploit this vulnerability by enticing a user to open a crafted PDF document. Successful exploitation could allow the attacker to execute arbitrary code in the context of the application.

Supported On:

idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1

References:

  • cve: CVE-2018-14300

HTTP:DIR:CVE-2018-14912-INF-DIS - HTTP: Cgit Path Parameter Directory Traversal Information Disclosure

Severity: MEDIUM

Description:

This signature detects directory traversal attempts within HTTP GET or POST of Cgit Web application. Successful exploitation could lead to the disclosure of arbitrary file content which is readable by the web server process from the target server's file system.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • url: https://bugzilla.redhat.com/show_bug.cgi?id=1612379
  • url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1627
  • url: https://lists.zx2c4.com/pipermail/cgit/2018-august/004176.html
  • cve: CVE-2018-14912

HTTP:SQL:INJ:CVE-2018-12464-PRI - HTTP: Micro Focus Secure Messaging Gateway enginelist.php SQL Injection

Severity: HIGH

Description:

This signature detects attempts to exploit a known SQL injection vulnerability in Micro Focus Secure Messaging Gateway. It is due to insufficient validation of user-supplied input. Successful exploitation results in the execution of arbitrary SQL queries on the underlying database, allowing for the creation of an attacker controlled account with administrator privileges.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • url: https://pentest.blog/unexpected-journey-6-all-ways-lead-to-rome-remote-code-execution-on-microfocus-secure-messaging-gateway/
  • url: https://support.microfocus.com/kb/doc.php?id=7023132
  • cve: CVE-2018-12464

HTTP:APACHE:CVE-2018-8026-ID - HTTP: Apache Solr ConfigSets XML External Entity Expansion Information Disclosure

Severity: MEDIUM

Description:

This signature detects the information disclosure vulnerability against Apache Solar. Successful exploitation results in the disclosure of file or directory contents for any file or directory readable by the Apache Solr service.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-8026
  • url: https://mail-archives.apache.org/mod_mbox/lucene-solr-user/201807.mbox/%3c0cdc01d413b7%24f97ba580%24ec72f080%24%40apache.org%3e

SMB:SAMBA:CVE-2017-7494-ILL - SMB: Samba Writeable Share Insecure Library Loading

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Samba. A successful exploitation attempt could result in the execution of arbitrary code in the security context of root.

Supported On:

idp-5.1.110161014, idp-4.1.110110719, mx-11.4, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, isg-3.4.139899, j-series-9.5, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.0.110121210, vsrx-15.1, idp-4.1.110110609

References:

  • cve: CVE-2017-7494

Affected Products:

  • Samba samba 4.0.2
  • Samba samba 4.1.19
  • Samba samba 3.5.2
  • Samba samba 4.2.14
  • Samba samba 4.0.4
  • Samba samba 4.2.9
  • Samba samba 4.0.25
  • Samba samba 3.6.25
  • Samba samba 3.5.0
  • Samba samba 4.6.0
  • Samba samba 4.0.10
  • Samba samba 4.0.6
  • Samba samba 4.0.12
  • Samba samba 4.0.8
  • Samba samba 4.0.21
  • Samba samba 3.5.21
  • Samba samba 4.0.14
  • Samba samba 4.3.10
  • Samba samba 4.0.23
  • Samba samba 4.1.23
  • Samba samba 4.1.18
  • Samba samba 4.0.16
  • Samba samba 3.6.18
  • Samba samba 4.3.6
  • Samba samba 4.1.21
  • Samba samba 4.4.9
  • Samba samba 4.3.4
  • Samba samba 4.3.2
  • Samba samba 4.4.10
  • Samba samba 3.6.12
  • Samba samba 4.1.5
  • Samba samba 4.3.0
  • Samba samba 4.4.12
  • Samba samba 4.4.4
  • Samba samba 3.6.10
  • Samba samba 4.1.7
  • Samba samba 3.5.17
  • Samba samba 4.4.1
  • Samba samba 4.1.1
  • Samba samba 3.5.15
  • Samba samba 4.4.3
  • Samba samba 4.1.3
  • Samba samba 3.5.13
  • Samba samba 4.4.5
  • Samba samba 4.1.16
  • Samba samba 4.3.8
  • Samba samba 3.5.11
  • Samba samba 4.1.14
  • Samba samba 4.5.0
  • Samba samba 4.2.2
  • Samba samba 4.1.12
  • Samba samba 4.1.9
  • Samba samba 4.5.2
  • Samba samba 3.6.0
  • Samba samba 4.2.0
  • Samba samba 4.4.6
  • Samba samba 4.1.10
  • Samba samba 4.5.4
  • Samba samba 3.6.2
  • Samba samba 4.2.6
  • Samba samba 3.6.22
  • Samba samba 3.5.9
  • Samba samba 3.6.4
  • Samba samba 4.2.13
  • Samba samba 3.5.19
  • Samba samba 4.2.4
  • Samba samba 4.6.5
  • Samba samba 3.6.20
  • Samba samba 4.5.8
  • Samba samba 3.6.6
  • Samba samba 4.2.11
  • Samba samba 4.0.1
  • Samba samba 4.4.7
  • Samba samba 4.6.3
  • Samba samba 3.5.5
  • Samba samba 3.6.8
  • Samba samba 4.0.3
  • Samba samba 4.2.8
  • Samba samba 4.6.1
  • Samba samba 3.6.24
  • Samba samba 3.5.3
  • Samba samba 4.0.5
  • Samba samba 4.0.24
  • Samba samba 3.5.1
  • Samba samba 4.0.11
  • Samba samba 4.0.7
  • Samba samba 4.4.0
  • Samba samba 4.0.26
  • Samba samba 3.5.8
  • Samba samba 3.5.22
  • Samba samba 4.0.13
  • Samba samba 4.0.9
  • Samba samba 4.3.11
  • Samba samba 4.0.20
  • Samba samba 4.1.22
  • Samba samba 3.5.20
  • Samba samba 4.0.15
  • Samba samba 3.6.19
  • Samba samba 4.3.7
  • Samba samba 4.0.22
  • Samba samba 4.1.20
  • Samba samba 4.0.17
  • Samba samba 4.2.12
  • Samba samba 4.4.8
  • Samba samba 3.6.16
  • Samba samba 4.3.5
  • Samba samba 4.5.6
  • Samba samba 4.3.3
  • Samba samba 3.6.13
  • Samba samba 4.3.1
  • Samba samba 4.4.11
  • Samba samba 4.0.19
  • Samba samba 3.6.11
  • Samba samba 4.1.4
  • Samba samba 4.4.13
  • Samba samba 3.5.6
  • Samba samba 3.5.16
  • Samba samba 3.6.17
  • Samba samba 4.1.6
  • Samba samba 3.5.14
  • Samba samba 3.6.15
  • Samba samba 4.1.0
  • Samba samba 3.5.12
  • Samba samba 4.1.17
  • Samba samba 3.6.14
  • Samba samba 4.3.9
  • Samba samba 3.5.7
  • Samba samba 3.5.10
  • Samba samba 4.1.15
  • Samba samba 4.5.1
  • Samba samba 4.1.13
  • Samba samba 4.5.3
  • Samba samba 3.6.1
  • Samba samba 4.2.3
  • Samba samba 4.1.11
  • Samba samba 4.1.8
  • Samba samba 4.5.5
  • Samba samba 3.6.3
  • Samba samba 4.1.2
  • Samba samba 4.2.1
  • Samba samba 4.4.2
  • Samba samba 4.5.7
  • Samba samba 3.6.5
  • Samba samba 4.0.18
  • Samba samba 3.5.18
  • Samba samba 4.2.7
  • Samba samba 3.6.23
  • Samba samba 4.5.9
  • Samba samba 3.6.7
  • Samba samba 4.2.10
  • Samba samba 4.0.0
  • Samba samba 4.2.5
  • Samba samba 4.6.2
  • Samba samba 3.6.21
  • Samba samba 3.5.4
  • Samba samba 3.6.9
Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out