Latest Starwindsoftware Vulnerabilities

StarWind SAN and NAS v0.2 build 1914 allow remote code execution. A flaw was found in REST API in StarWind Stack. REST command, which allows changing the hostname, doesn’t check a new hostname paramet...
Starwindsoftware Starwind San \& Nas=0.2-build_1914
A flaw was found in the REST API in StarWind Stack. REST command, which manipulates a virtual disk, doesn’t check input parameters. Some of them go directly to bash as part of a script. An attacker wi...
Starwindsoftware Nas<0.2
Starwindsoftware San<0.2
A flaw was found in StarWind Stack. The endpoint for setting a new password doesn’t check the current username and old password. An attacker could reset any local user password (including system/admin...
Starwindsoftware Nas<0.2
Starwindsoftware San<0.2
A flaw was found in StarWind iSCSI target. StarWind service does not limit client connections and allocates memory on each connection attempt. An attacker could create a denial of service state by try...
Starwindsoftware Iscsi San<6.0
A flaw was found in StarWind iSCSI target. An attacker could script standard iSCSI Initiator operation(s) to exhaust the StarWind service socket, which could lead to denial of service. This affects iS...
Starwindsoftware Iscsi San<3.5
Starwindsoftware Command Center=2-build_6003
Red Hat Polkit Out-of-Bounds Read and Write Vulnerability
redhat/polkit<0:0.96-11.el6_10.2
redhat/polkit<0:0.112-26.el7_9.1
redhat/polkit<0:0.112-12.el7_3.1
redhat/polkit<0:0.112-12.el7_4.2
redhat/polkit<0:0.112-18.el7_6.3
redhat/polkit<0:0.112-22.el7_7.2
and 62 more
A flaw was found in the way NSS verifies certificates. That will happen both when client reads the Certificate message from the server or when server is configured to ask for client certificates and t...
redhat/nss<0:3.44.0-12.el6_10
redhat/nss<0:3.67.0-4.el7_9
redhat/nss<0:3.28.4-2.el7_3
redhat/nss<0:3.28.4-18.el7_4
redhat/nss<0:3.36.0-10.2.el7_6
redhat/nss<0:3.44.0-8.el7_7
and 22 more
** DISPUTED ** An issue was discovered in the Bidirectional Algorithm in the Unicode Specification through 14.0. It permits the visual reordering of characters via control sequences, which can be used...
Unicode Unicode<14.0.0
Fedoraproject Fedora=33
Fedoraproject Fedora=34
Fedoraproject Fedora=35
Starwindsoftware Starwind Virtual San=v8r13-14398
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs f...
debian/openssh<=1:7.9p1-10+deb10u2<=1:7.9p1-10<=1:8.4p1-5<=1:8.4p1-6
ubuntu/openssh<1:8.2
ubuntu/openssh<8.8
ubuntu/openssh<1:7.2
Openbsd Openssh>=6.2<8.8
Fedoraproject Fedora=33
and 21 more
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field...
MIT Kerberos 5<1.18.5
MIT Kerberos 5>=1.19.0<1.19.3
Fedoraproject Fedora=33
Debian Debian Linux=9.0
Starwindsoftware Starwind Virtual San=v8r13-14338
Oracle Communications Cloud Native Core Network Slice Selection Function=22.1.0
An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_c...
redhat/kernel<0:2.6.32-754.43.1.el6
redhat/kernel-rt<0:3.10.0-1160.49.1.rt56.1189.el7
redhat/kernel<0:3.10.0-1160.49.1.el7
redhat/kernel<0:3.10.0-327.102.1.el7
redhat/kernel<0:3.10.0-514.95.1.el7
redhat/kernel<0:3.10.0-693.95.1.el7
and 150 more
A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the sy...
Linux Linux kernel<=5.14.13
Fedoraproject Fedora=33
Fedoraproject Fedora=34
Fedoraproject Fedora=35
Debian Debian Linux=9.0
Mozilla NSS=v8r12
and 131 more
RPM could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the signature check function. By persuading a victim to open a specially-crafted package file, an attacke...
IBM Cloud Pak for Security (CP4S)<=1.7.2.0
IBM Cloud Pak for Security (CP4S)<=1.7.1.0
IBM Cloud Pak for Security (CP4S)<=1.7.0.0
Rpm Rpm>=4.15.0<4.15.1.3
Rpm Rpm>=4.16.0<4.16.1.3
Rpm Rpm=4.15.0-alpha
and 11 more
SDL (Simple DirectMedia Layer) through 2.0.12 has an Integer Overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP file.
Libsdl Simple Directmedia Layer<=2.0.12
Fedoraproject Fedora=33
Debian Debian Linux=9.0
Starwindsoftware Starwind Virtual San Vsphere=v8-build12533
Starwindsoftware Starwind Virtual San Vsphere=v8-build12658
Starwindsoftware Starwind Virtual San Vsphere=v8-build12859
and 3 more
An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a s...
redhat/kernel-rt<0:3.10.0-1160.53.1.rt56.1193.el7
redhat/kernel<0:3.10.0-1160.53.1.el7
redhat/kernel<0:4.18.0-305.el8
redhat/kernel-rt<0:4.18.0-193.71.1.rt13.121.el8_2
redhat/kernel<0:4.18.0-193.71.1.el8_2
redhat/Linux kernel<5.11
and 120 more
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial...
redhat/kernel-rt<0:3.10.0-1160.53.1.rt56.1193.el7
redhat/kernel<0:3.10.0-1160.53.1.el7
redhat/kernel-rt<0:4.18.0-305.rt7.72.el8
redhat/kernel<0:4.18.0-305.el8
redhat/kernel-rt<0:4.18.0-193.60.2.rt13.112.el8_2
redhat/kernel<0:4.18.0-193.60.2.el8_2
and 121 more
A flaw was found in Linux Kernel, where a race in KDGKBSENT and KDSKBSENT leads to use-after-free read in vt_do_kdgkb_ioctl References: <a href="https://groups.google.com/g/syzkaller-bugs/c/kZsmxk...
redhat/kernel-rt<0:3.10.0-1160.21.1.rt56.1158.el7
redhat/kernel<0:3.10.0-1160.21.1.el7
redhat/kernel<5.10
ubuntu/linux-aws-5.8<5.10~
ubuntu/linux-azure-5.8<5.10~
ubuntu/linux-gcp-5.8<5.10~
and 127 more
A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function whi...
redhat/kernel-rt<0:3.10.0-1160.11.1.rt56.1145.el7
redhat/kernel<0:3.10.0-1160.11.1.el7
redhat/kernel-rt<0:4.18.0-305.rt7.72.el8
redhat/kernel<0:4.18.0-305.el8
redhat/Linux kernel<5.9
ubuntu/linux<4.15.0-126.129
and 136 more
In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User intera...
redhat/kernel-rt<0:3.10.0-1160.21.1.rt56.1158.el7
redhat/kernel<0:3.10.0-1160.21.1.el7
redhat/kernel-rt<0:4.18.0-348.rt7.130.el8
redhat/kernel<0:4.18.0-348.el8
ubuntu/linux<4.15.0-88.88
ubuntu/linux<5.5~
and 70 more
A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to ...
redhat/kernel-rt<0:3.10.0-1160.11.1.rt56.1145.el7
redhat/kernel<0:3.10.0-1160.11.1.el7
redhat/kernel-rt<0:4.18.0-305.rt7.72.el8
redhat/kernel<0:4.18.0-305.el8
redhat/Linux kernel version<5.9
ubuntu/linux-aws-5.8<5.9~
and 120 more
In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs bec...
redhat/kernel-rt<0:3.10.0-1160.11.1.rt56.1145.el7
redhat/kernel<0:3.10.0-1160.11.1.el7
redhat/kernel<0:3.10.0-693.82.1.el7
redhat/kernel<0:3.10.0-957.70.1.el7
redhat/kernel<0:3.10.0-1062.45.1.el7
redhat/kernel-rt<0:4.18.0-305.rt7.72.el8
and 93 more
In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
Apple macOS Catalina<10.15.6
Apple Mojave
Apple High Sierra
ubuntu/vim<2:8.0.1453-1ubuntu1.4
ubuntu/vim<2:7.4.052-1ubuntu3.1+
ubuntu/vim<2:8.1.2136-1
and 11 more
chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts a filename that has '\0' as its first or second character (such as the "/\0" name).
debian/libmspack
redhat/libmspack<0.8
redhat/cabextract<1.8
ubuntu/clamav<0.100.2+dfsg-1ubuntu0.14.04.2
ubuntu/libmspack<0.6-3ubuntu0.2
ubuntu/libmspack<0.7-1ubuntu0.1
and 20 more
In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write.
debian/cabextract
debian/libmspack
redhat/libmspack<0.8
redhat/cabextract<1.8
ubuntu/cabextract<1.4-5
ubuntu/cabextract<1.4-4ubuntu0.1~
and 24 more
Missing message authentication in the meta-protocol in Tinc VPN version 1.0.34 and earlier allows a man-in-the-middle attack to disable the encryption of VPN packets.
debian/tinc
Tinc-vpn Tinc<=1.0.34
Debian Debian Linux=9.0
Starwindsoftware Starwind Virtual San Vsphere=v8-build12533
Starwindsoftware Starwind Virtual San Vsphere=v8-build12658
tinc before 1.0.30 has a broken authentication protocol, without even a partial mitigation.
Tinc-vpn Tinc<1.0.30
Starwindsoftware Starwind Virtual San Vsphere=v8-build12533
Starwindsoftware Starwind Virtual San Vsphere=v8-build12658
tinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1.
debian/tinc
Tinc-vpn Tinc>=1.0.30<=1.0.34
Debian Debian Linux=9.0
Starwindsoftware Starwind Virtual San Vsphere=v8-build12533
Starwindsoftware Starwind Virtual San Vsphere=v8-build12658

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203