Ixia ATI Update 2017-21 (318516)

Defects Resolved

Ticket Info
DE8690 (1457461) Updated /strikes/exploits/evasions/http_get_from_url_list.xml to read URLs from /resources/custom_url_list.txt, if present. Otherwise the strike will read from default /resources/url_list.txtCustom_url_list.txt is a file that will be uploaded by customer, as needed and url_list.txt is canned, and will be overwritten with each strikepack installation.

Enhancements

Ticket Info
US75886 Diameter Generic Command action was added on the server side. The 'Send From' parameter was removed as the actions already have a source.
US75889 New parameter "Use Max Supported Version" for TLS Accept and Start actions. When set to true, the TLS version to be used will be the latest version available for the machine. When disabled, the Min Version and Max Version parameters will be taken into account.
US73073 Added new strike list "Random Strikes 20" which will send 20 randomly chosen strikes.

New Protocols & Applications (1)

Name Category Info
GoogleSlides Sept 17 Data Transfer/File Sharing Google Slides is a web application that allows user to create, edit, or share presentations with others using web browser only. This protocol uses dynamically created flows to simulate the various internal actions performed by a modern Web browser. Because these dynamic flows may be large in number and may contain a large amount of generated data, profile creation and test initialization may require a considerable amount of time. The "Max. Request/Response Pairs per Action" and "Max. Generated File Size" flow parameters can be used to control the number and size of the interactions performed by the actions. DNS resolution is always performed for each host. Delete the DNS host from the Super Flow to disable this feature.

New Super Flows (1)

Name Category Info
Google Slides Sept 17 Data Transfer/File Sharing The user performs the following actions - navigate to Google Slides site, signs in using his email address, starts a new presentation by choosing a template. The user works on the slides by typing in some text then replace the default image with an uploaded one. After naming the presentation and sharing the slide with another user, the user signs out of the application. This protocol uses dynamically created flows to simulate the various internal actions performed by a modern Web browser. Because these dynamic flows may be large in number and may contain a large amount of generated data, profile creation and test initialization may require a considerable amount of time. The "Max. Request/Response Pairs per Action" and "Max. Generated File Size" flow parameters can be used to control the number and size of the interactions performed by the actions. DNS resolution is always performed for each host. Delete the DNS host from the Super Flow to disable this feature.

New Strikes (12)

CVSS ID References Category Info
9.3 E17-0hx82 BID-100034
CVE-2017-8620
CVSS-9.3 (AV:N/AC:M/AU:N/C:C/I:C/A:C)
SECURITY_TRACKER-1039091
URL
Exploits This strike exploits a Remote Code Execution vulnerability in Windows Search service of Microsoft Windows. The vulnerability can be triggered by sending a crafted request to the target system. By exploiting this vulnerability, an attacker could run arbitrary code under on the target system. NOTE: When run in OneArm mode, the strike requires /Users to be shared and Anonymous access enabled
7.6 E17-m9y61 BID-100738
CVE-2017-8734
CVSS-7.6 (AV:N/AC:H/AU:N/C:C/I:C/A:C)
EXPLOITDB-42759
SECURITYTRACKER-1039326
Exploits This strike exploits a vulnerability in Microsoft Edge. Specifically, the vulnerability exists within edgehtml's COptionsCollectionCacheItem::GetAt function. When parsing html textarea, select, and optgroup elements, it is possible to create an out of bounds read condition that allows for the reading of heap buffer memory. This can cause a denial of service or potentially lead to remote code execution.
7.5 E17-3dbj2 CVE-2017-11151
CVSS-7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P)
EXPLOITDB-42434
URL
Exploits This strike exploits an Arbitrary File Upload vulnerability in Synology Photo Station. The vulnerability is due to improper input validation of user controlled input. A remote, unauthenticated attacker can upload arbitrary files to the target server.
7.5 E17-m9w41 BID-100582
CVE-2017-14100
CVSS-7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P)
SCIP-106090
SECURITYTRACKER-1039252
URL
Exploits This strike exploits a command execution vulnerability in Digium Asterisk. Userinfo portions of certain SIP parameters are passed as arguments without validation. An authenticated attacker could send specially crafted SIP messages to attain arbitrary command execution with privileges of the Asterisk service
6.8 E17-0f6m3 BID-98861
CVE-2017-5070
CVSS-6.8 (AV:N/AC:M/AU:N/C:P/I:P/A:P)
Exploits This strike exploits a vulnerability in Google Chrome. Specifically, the vulnerability exists within Chrome's javascript engine V8. When javascript is encountered, the V8 engine sends the code to Crankshaft to be optimized. It is here where the vulnerability is found when validating two pointers. One pointer may point to a constant, and the other may point to a different unexpected object type. Further processing of this code can lead to type confusion. This will cause a denial of service in the browser, and can potentially lead to remote code execution.
5.0 E17-3dbk1 CVE-2017-11152
CVSS-5.0 (AV:N/AC:L/AU:N/C:N/I:P/A:N)
EXPLOITDB-42434
URL
Exploits This strike exploits a Directory Traversal vulnerability in Synology Photo Station. The vulnerability is due to improper input validation of the path parameter and incorrect session management. A remote, unauthenticated attacker can write arbitrary files to the target server and log in using a fake authentication mechanism.
5.0 E17-3dbn1 CVE-2017-11155
CVSS-5.0 (AV:N/AC:L/AU:N/C:P/I:N/A:N)
EXPLOITDB-42434
URL
Exploits This strike exploits an Information Exposure vulnerability in Synology Photo Station. A remote, unauthenticated attacker can obtain sensitive system information.
5.0 E15-003v1 BID-75935
CVE-2015-5531
CVSS-5.0 (AV:N/AC:L/AU:N/C:P/I:N/A:N)
EXPLOITDB-38383
SCIP-77264
URL
Exploits This strike exploits a directory traversal vulnerability in Elasticsearch before 1.6.1. The vulnerability allows attackers to read arbitrary files with JVM process privileges, through the Snapshot API.
5.0 D17-3fag1 BID-101085
CVE-2017-13704
CVSS-5.0 (AV:N/AC:L/AU:N/C:N/I:N/A:P)
URL
Denial This strike exploits a denial of service vulnerability in DNSMasq. When processing a DNS message containing an OTP-RR where the actual length of the packet is greater than the length provided by the OPT-RR or an arbitrary message larger than the DNSmasq configured maximum size (default 512 bytes), a segmentation fault will occur, resulting in abnormal termination of the dnsmasq daemon. Successful exploitation results in a denial of service condition.
4.3 E15-zyex1 BID-74353
CVE-2015-3337
CVSS-4.3 (AV:N/AC:M/AU:N/C:P/I:N/A:N)
EXPLOITDB-37054
SCIP-75175
URL
Exploits This strike exploits a directory traversal vulnerability in Elasticsearch before 1.4.5 and 1.5.x before 1.5.2. The vulnerability allows attackers to read arbitrary files when the site plugin is enabled.
4.3 E17-0huz1 BID-98704
CVE-2017-8539
CVSS-4.3 (AV:N/AC:M/AU:N/C:N/I:N/A:P)
GOOGLE-1260
URL
Exploits This strike exploits a vulnerability in Microsoft MpEngine. The vulnerability is due to failure to validate user controlled input while scanning files. An attacker could crash the Microsoft MpEngine process on a target system by sending a malicious file via email or enticing a user to view the file in a web browser.
N/A E17-8l0r1 URL
Exploits This strike sends a crafted Microsoft Word document file (.doc) containing an embedded Dynamic Data Exchange (DDE) command. By enticing a user to open a crafted file and confirm that external data can be accessed, an attacker can cause arbitrary code to be executed on the victim's system. * NOTE: Files using these DDE commands were seen in the wild during October 2017.

Modified Strikes (1)

CVSS ID References Category Info
N/A E12-p8k01 URL
Exploits Updated /strikes/exploits/evasions/http_get_from_url_list.txt to read URLs from /resources/custom_url_list.txt, if present. Otherwise the strike will read from default /resources/url_list.txtCustom_url_list.txt is a file that will be uploaded by customer, as needed and url_list.txt is canned, and will be overwritten with each strikepack installation.