Ixia ATI Update 2019-15 (365231)

Defects Resolved

Ticket Info
DE10512
(BUG1512709)
Improved an UTF-8 evasion algorithm issue for which strikes D06-3a501 and D07-06d04 would hang when running with UTF_8 enabled in HTMLUnicodeEncoding evasion profile.

New Protocols & Applications (4)

Name Category Info
BBCP Data Transfer/File Sharing BBCP is a point-to-point network file copy application capable of transferring files at line speeds approaching in the WAN.
Commvault Jul19 Data Transfer/File Sharing Commvault is a publicly traded data protection and information management software company headquartered in Tinton Falls, New Jersey. It was formed in 1988 as a development group in Bell Labs, and later became a business unit of AT&T Network Systems. It was incorporated in 1996. Commvault software can be used for data backup and recovery, cloud and infrastructure management, and retention and compliance. This protocol uses dynamically created flows to simulate the various internal actions performed by a modern Web browser. Because these dynamic flows may be large in number and may contain a large amount of generated data, profile creation and test initialization may require a considerable amount of time. The "Max. Request/Response Pairs per Action" and "Max. Generated File Size" flow parameters can be used to control the number and size of the interactions performed by the actions. DNS resolution is always performed for each host. Delete the DNS host from the Super Flow to disable this feature.
DNS over HTTPS System/Network Admin DNS over HTTPS (DoH) is a protocol for performing remote Domain Name System (DNS) resolution via the HTTPS protocol, which could improve performance, and increase user privacy and security by preventing eavesdropping and manipulation of DNS data by man-in-the-middle attacks.
Dynamic Adaptive Streaming over HTTP Voice/Video/Media Dynamic Adaptive Streaming over HTTP (DASH), aka MPEG-DASH, is an adaptive bitrate streaming technique that enables high quality streaming of media content over the Internet delivered from conventional HTTP web servers. This flow is a 2-arm simulation of the protocol as implemented in popular OTT applications. It enables streaming arbitrary number of Video and Audio content (Representations) in two adaptation sets. All of the added contents are broken into the same number of byte-range segments. During the streaming, a pair of audio and video segments selected randomly based on the weight associated to the contents. This is to simulate the effect of sporadic advertisements and bitrate adaptation. The selected pair of segments are streamed HTTP partial request/response format.

New Super Flows (8)

Name Category Info
BBCP File Transfer Data Transfer/File Sharing The client sends a data file using bbcp protocol with the number of streams set to 4.
BBCP File Transfer 8 Streams Data Transfer/File Sharing The client sends a data file using bbcp protocol with the number of streams set to 8.
Commvault Jul19 Data Transfer/File Sharing Simulates the use of Commvault Web Console as of July 2019. The user signs in, accesses the drive, creates a folder, renames a folder, moves a file to another folder, navigates to a drive folder, uploads a file, downloads a file, creates a public link for a file, moves a file to the drive's Trash folder, views the Trash folder, restores a file from the Trash folder, empties the Trash folder, views the created public links, deletes a public link and logs out. This protocol uses dynamically created flows to simulate the various internal actions performed by a modern Web browser. Because these dynamic flows may be large in number and may contain a large amount of generated data, profile creation and test initialization may require a considerable amount of time. The "Max. Request/Response Pairs per Action" and "Max. Generated File Size" flow parameters can be used to control the number and size of the interactions performed by the actions. DNS resolution is always performed for each host. Delete the DNS host from the Super Flow to disable this feature.
Commvault Jul19 File Transfer Data Transfer/File Sharing Simulates the use of Commvault Web Console as of July 2019. The user signs in, goes to drive, uploads a file, downloads a file and logs out. This protocol uses dynamically created flows to simulate the various internal actions performed by a modern Web browser. Because these dynamic flows may be large in number and may contain a large amount of generated data, profile creation and test initialization may require a considerable amount of time. The "Max. Request/Response Pairs per Action" and "Max. Generated File Size" flow parameters can be used to control the number and size of the interactions performed by the actions. DNS resolution is always performed for each host. Delete the DNS host from the Super Flow to disable this feature.
Commvault Jul19 Share File Data Transfer/File Sharing Simulates the use of Commvault Web Console as of July 2019. The user signs in, goes to drive, generates a public link for a file, views the created public links and logs out. This protocol uses dynamically created flows to simulate the various internal actions performed by a modern Web browser. Because these dynamic flows may be large in number and may contain a large amount of generated data, profile creation and test initialization may require a considerable amount of time. The "Max. Request/Response Pairs per Action" and "Max. Generated File Size" flow parameters can be used to control the number and size of the interactions performed by the actions. DNS resolution is always performed for each host. Delete the DNS host from the Super Flow to disable this feature.
DASH Streaming over TLS Voice/Video/Media This Super Flow simulates Dynamic Adaptive Streaming over HTTPS (DASH) in popular OTT applications such as Amazon Prime Video. The implementation is in compliance with ISO/IEC 23009-1_2014 MPEG-DASH standard. It includes streaming 4 media tracks: main video 720p, main video 480p, ads video, and audio.
DNS over HTTP2 System/Network Admin The client sends a DNS query over HTTP2 to the server.The server replies with HTTP response which contains a DNS message with a single resolved IP address. The communication is over HTTP2 and TLS.
DNS over HTTPS System/Network Admin The client sends two DNS queries over HTTPS to the server.The server replies to each query with JSON response. The first reply has a single item in the 'Answer' block which means the URL has a single resolved IP address. The second reply contains multiple blocks. The communication is over HTTP 1.1 and TLS.

New Strikes (8)

CVSS ID References Category Info
10.0 E19-zpwx1 CVE-2014-2321
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
URL
Exploits This strike exploits a command execution vulnerability in ZTE F460/F660 cable modem Web Interface. The vulnerability is due to improper access checks of the web platform resources. Successful exploitation can result in arbitrary commands on the target system.
9.3 E19-08ed1 BID-94819
CVE-2016-6277
CVSS-9.3 (AV:N/AC:M/AU:N/C:C/I:C/A:C)
EXPLOITDB-40889
Exploits This strike exploits a command execution vulnerability in Netgear R7000 Router Web Interface. The vulnerability is due to improper access checks of the web platform resources. Successful exploitation can result in arbitrary commands via shell metacharacters in the path info to 'cgi-bin'.
7.8 E19-0ohf1 CVE-2018-7123
CVSS-7.8 (AV:N/AC:L/AU:N/C:N/I:N/A:C)
Exploits This strike emulates a DOS attack on HPE Intelligent Management Center. The vulnerability is due to no authentication being performed when the opcode '10014/kill' is being processed. A remote unauthenticated attacker may create denial-of-service conditions by crashing the target server.
7.5 E19-0yaw1 BID-109374
CVE-2019-9848
CVSS-7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P)
Exploits This strike exploits a code execution vulnerability in LibreOffice. The vulnerability is due to unrestricted use of document event function to trigger LibreLogo to execute python contained within a document. An attacker could entice the victim to open the crafted odt file. Successful exploitation could lead to code execution on the victim's machine.
7.5 E19-7oxb1 BID-109339
CVE-2019-12815
CVSS-7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P)
URL
Exploits This strike exploits an arbitrary file copy vulnerability in the ProFTPd. The vulnerability is due to a design flaw within the 'mod_copy' module. Successful exploitation can lead to remote code execution and information disclosure without authentication. NOTE: This issue is related to CVE-2015-3306.
6.8 E19-0rx71 CVE-2019-1579
CVSS-6.8 (AV:N/AC:M/AU:N/C:P/I:P/A:P)
URL
Exploits This strike exploits a format string vulnerability on Palo Alto GlobalProtect server. The flaw resides in the 'sslmgr' endpoint due to lack of user input validation. A remote unauthenticated attacker may thus crash a vulnerable instance or even execute arbitrary code.
6.8 E19-0mbn1 CVE-2018-4323
CVSS-6.8 (AV:N/AC:M/AU:N/C:P/I:P/A:P)
GOOGLE-1609
Exploits This strike exploits a vulnerability in Apple Safari Webkit. Specifically the vulnerability exists in the WebCore::RenderMultiColumnSet::updateMinimumColumnHeight method. It is possible to craft Javascript in such a way that allows for a use-after-free condition to occur when invoking the updateMinimumColumnHeight method. This can lead to a denial of service in the browser application or potentially allow for remote code execution to occur.
5.0 D19-7q0x1 BID-109352
CVE-2019-14241
CVSS-5.0 (AV:N/AC:L/AU:N/C:N/I:N/A:P)
Denial This strike exploits a denial of service vulnerability in HAProxy server. The vulnerability is due to incorrect handling of the cookie header under HTTP traffic. A remote unauthenticated attacker can exploit this vulnerability by sending a crafted HTTP request to the target server. Successful exploitation results in denial-of-service on the target server.