Ixia ATI Update 2018-04 (325023)

Defects Resolved

Ticket Info
DE9058 (1466259) Evergreen Facebook Jan 14, Evergreen Yahoogroups Jan 14,  Evergreen Aolmail Jan 14,   Evergreen Aolmail Jan 14 Send Message , Evergreen Aolmail Jan 14 Send Message Attachment, Evergreen Aolmail Jan14  View Message, Evergreen Aolmail Jan 14 View Message with attachment,  Evergreen Aolchat Jan14, Evergreen Aolchat Jan14 Send Message and Evergreen Aolchat Jan14 Receive Message have been modified to expose the DNS actions for all the hosts.  
DE9247 Fixed a bug in strike referred by CVE-2018-1162 by adding variable timestamp for malicious payload.

Enhancements

Ticket Info
US80578 Updated superflow 'Bing Search'. Added TLS actions to this superflow.
US80579 Updated superflow 'HTTP Live Streamingh'. Add TLS actions to this superflow.
US80593 Updated superflow 'Gopher'. Added TLS actions to this superflow.
US82580 Deprecated Application Protocol 'Ebay Jan 15'.
US82582 Deprecated Application Protocol 'Google Earth'.

New Protocols & Applications (2)

Name Category Info
eBay Feb18 Financial eBay is an online auction and shopping website in which people and businesses buy and sell a wide variety of goods and services worldwide.
GoogleEarthPro Feb18 Social Networking/Search Google Earth is a computer program that renders a 3D representation of Earth based on satellite imagery. The program maps the Earth by superimposing satellite images, aerial photography, and GIS data onto a 3D globe, allowing users to see cities and landscapes from various angles.

New Super Flows (5)

Name Category Info
eBay Browse and Buy Items Feb 18 Financial Simulates a user that uses the website to search and shops for items.
eBay Manage Personal Account Feb 18 Financial Simulates a user that views account status and history.
GoogleEarthPro Access Google Account Feb 18 Social Networking/Search Access a Google account through Google Earth Pro application.
GoogleEarthPro Navigate the Globe Bandwidth Feb 18 Social Networking/Search Use the 3D representation of the Earth to observe the geography of various places, pictures are enabled.
GoogleEarthPro Navigate the Globe Feb 18 Social Networking/Search Use the 3D representation of the Earth to observe the geography of various places, pictures are disabled.

New Strikes (13)

CVSS ID References Category Info
10.0 E17-3g4z1 BID-100901
CVE-2017-14803
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
SCIP-112249
ZDI-18-131
Exploits The vulnerability allows attackers read access to arbitrary file contents accessible in the Micro Focus NetIQ Access Manager server by insufficient validation of user input on requests sent to the OspUIBasicSSODownload servlet.
10.0 E17-0i6q1 CVE-2017-8962
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
URL
ZDI-17-855
Exploits This strike exploits an insecure java deserialization in Hewlett Packard Enterprise (HPE) Intelligent Management Center (IMC). This vulnerability is due to improper validation of Java serialized objects before deserialization . An attacker could send a specially crafted HTTP POST request to achieve arbitrary command execution with either SYSTEM or root privileges.
10.0 E17-0jtw1 CVE-2017-1092
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
URL
Exploits An input validation vulnerability has been found in IBM Informix Open Admin Tool. The vulnerability is due to improper parsing of user-supplied input to the SOAP interface. Successful exploitation can result in arbitrary code execution in the security context of the SYSTEM user.
10.0 E17-0doa1 BID-101837
CVE-2017-3114
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
ZDI-17-997
Exploits This strike exploits a out-of-bound access vulnerability in Adobe Flash Player. This vulnerability is due to improper bounds checking in LocaleID's determinePreferredLocales method. An attacker can exploit this vulnerability by entice a user to open a crafted SWF file or link. Successful exploitation may result in arbitrary code execution.
9.3 E17-3dtw1 BID-101139
CVE-2017-11812
CVSS-9.3 (AV:N/AC:M/AU:N/C:C/I:C/A:C)
URL
Exploits This strike exploits a vulnerability in the Microsoft Edge browser. Specifically, the vulnerability exists in the javascript Chakra engine. Javascript can be crafted in such a way that allows for a Use-After-Free condition to occur when processing an ArrayBuffer that has previously been freed. This may cause a denial of service condition in the browser, or potentially lead to remote code execution.
7.6 E17-0hym1 BID-100070
CVE-2017-8670
CVSS-7.6 (AV:N/AC:H/AU:N/C:C/I:C/A:C)
EXPLOITDB-42477
GOOGLE-1298
Exploits This strike exploits a vulnerability in the Microsoft Edge browser. Specifically, the vulnerability exists in the javascript Chakra engine. Javascript can be crafted in such a way that allows for the function argument object to be uninitialized. This may lead to a denial of service condition in the browser, or potentially remote code execution.
7.6 E17-3dtm2 BID-101130
CVE-2017-11802
CVSS-7.6 (AV:N/AC:H/AU:N/C:C/I:C/A:C)
EXPLOITDB-43000
GOOGLE-1334
Exploits This strike exploits a vulnerability in the Microsoft Edge browser. Specifically, the vulnerability exists in the javascript Chakra engine. Javascript can be crafted in such a way that allows for the StringReplace function to be used inline with the JIT process. When the replace function is called it fails to check if a user function is called and type confusion can occur. This may cause a denial of service condition in the browser, or potentially lead to remote code execution.
7.5 E18-mapo2 BID-102916
CVE-2018-6376
CVSS-7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P)
SECURITYTRACKER-1040316
URL
Exploits This strike exploits an SQL injection vulnerability in Joomla! CMS. The vulnerability is due to the improper sanitization of requests sent to the application. An attacker could exploit this by sending specifically crafted packets, potentially resulting in the execution of SQL commands which may lead to information disclosure, database corruption, denial of service and others.
7.2 E17-3hwr1 CVE-2017-17099
CVSS-7.2 (AV:L/AC:L/AU:N/C:C/I:C/A:C)
EXPLOITDB-42984
URL
Exploits A stack buffer overflow has been identified in Flexsense SyncBreeze Enterprise appliance. The vulnerability is caused by the lack of proper bound checking of the URI within HTTP requests processing. The vulnerability can be exploited by sending a specially-crafted HTTP request, allowing the attacker arbitrary code execution with SYSTEM privileges.
5.0 E18-0oaf1 CVE-2018-6871
CVSS-5.0 (AV:N/AC:L/AU:N/C:P/I:N/A:N)
URL
Exploits This strike exploits a file disclosure vulnerability in LibreOffice up to 6.0.1. The vulnerability is due to unrestricted use of WEBSERVICE function in LibreOffice Calc files. An attacker could obtain the content of any local file by enticing a user to open a maliciously crafted document. Note: This strike is sending over the network a file which if run on a vulnerable target would dump contents of /etc/passwd file to a host 172.16.2.202 on port 8000!
5.0 D17-3i671 CVE-2017-17439
CVSS-5.0 (AV:N/AC:L/AU:N/C:N/I:N/A:P)
Denial This strike exploits a null pointer dereference vulnerability in MIT Heimdal KDC. A specially crafted AS-REQ message where the sname or cname field does not exist will trigger a null pointer dereference. This will cause the KDC service to terminate abnormally, leading to a denial of service condition. Note: Server is required to have EXAMPLE.COM as a valid realm, otherwise the nosploit may be detected as an exploit.
4.3 E18-mapo1 BID-102917
CVE-2018-6377
CVSS-4.3 (AV:N/AC:M/AU:N/C:N/I:P/A:N)
SCIP-112658
SECURITYTRACKER-1040316
URL
Exploits This strike exploits a cross-site scripting vulnerability in Joomla! CMS. This vulnerability is due to inadequate input filtering in com_fields. By exploiting this vulnerability an attacker could execute arbitrary scripts on the target machine.
4.3 D17-mama1 BID-102726
CVE-2017-3144
CVSS-4.3 (AV:N/AC:M/AU:N/C:N/I:N/A:P)
SCIP-112265
SECURITYTRACKER-1040194
URL
Denial This strike exploits a denial of service vulnerability in ISC BIND. RRSIG answer records contain a Type Covered field. There should be an additional answer record of the type listed in the Type Covered field. If the corresponding record does not exist, and assertion failure occurs, resulting in abnormal program termination. Note: It takes 200 malicious messages to complete this attack. For testing time consideration, this strike sends 20.