Ixia ATI Update 2019-16 (366336)

Defects Resolved

Ticket Info
DE10531 The TLS setting in "DASH Streaming over TLS" Super Flow min version changed to TLS v1.2 and cipher suite changed to ALL.

New Super Flows (1)

Name Category Info
Amazon Video DASH Voice/Video/Media This Super Flow simulates Amazon Prime Video streaming flow using Dynamic Adaptive Streaming over HTTP (ISO/IEC 23009-1_2014 MPEG-DASH) protocol. The audio and video streams are broken into 10 segments that are delivered separately through HTTP partial request/responses. The video stream consists of two video tracks representing the same content with different resolutions. Random segment selection performed during Super Flow initialization to simulate the link-adaptation mechanism in MPEG-DASH.

New Strikes (7)

CVSS ID References Category Info
9.3 E19-7o911 CVE-2019-11581
CVSS-9.3 (AV:N/AC:M/AU:N/C:C/I:C/A:C)
Exploits This strike exploits a remote code execution in the JIRA Template. The vulnerability is due to improper sanitization of user input which is passed to the application via the ContactAdministrators and SendBulkMail actions. A remote authorized attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation results in remote code execution on the target server.
9.0 E19-7qoz1 CVE-2019-15107
CVSS-9.0 (AV:N/AC:L/AU:N/C:P/I:P/A:C)
EXPLOITDB-47293
URL
Exploits An OS command injection vulnerability exists in Webmin 1.920 and prior versions. The flaw exists in the password change functionality and is reachable via the '/password_change.cgi' endopint. By exploiting this vulnerability, a remote unauthenticated attacker may execute arbitrary OS commands on the target system.
9.0 E19-7o912 CVE-2019-11941
CVSS-9.0 (AV:N/AC:L/AU:S/C:C/I:C/A:C)
Exploits This strike exploits a remote code execution in the HPE Intelligent Management. The vulnerability is due to improper sanitization of user input "beanName" which is passed to the application via the IccSelectDevTypeBean class. A remote authorized attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation results in remote code execution on the target server with SYSTEM privilege.
7.6 D19-0xek1 CVE-2019-8684
CVSS-7.6 (AV:N/AC:H/AU:N/C:C/I:C/A:C)
GOOGLE-1850
Denial This strike exploits a vulnerability in Apple Safari Webkit. It is possible for an attacker to construct Javascript in such a way that when the emitEqualityOpImpl method is called it will incorrectly replace the typeof instruction with the is_cell_with_type instruction. This can cause a denial of service condition in the browser or potentially allow for remote code execution to occur.
7.5 D19-7ohr1 CVE-2019-12255
CVSS-7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P)
EXPLOITDB-47233
URL
Denial An integer underflow vulnerability exists in VxWorks 6.8 TCP stack. This strike simulates a denial of service attack by setting the URGENT TCP pointer to 0 (zero) when communicating with any network service. By exploiting this flaw, a remote attacker can cause denial of service by crashing the target network stack.
5.0 E19-5k771 BID-108693
CVE-2018-13379
CVSS-5.0 (AV:N/AC:L/AU:N/C:P/I:N/A:N)
EXPLOITDB-47288
Exploits This strike replicates a directory traversal attack on Fortinet FortiOS. The vulnerability resides in the '/remote/fgt_lang' endpoint and affects product versions 5.6.3 to 5.6.7 and 6.0.0 to 6.0.4. By exploiting this flaw, a remote unauthenticated attacker may take over the device and perform attacks such as DNS hijacks.
4.0 D19-0xe83 CVE-2019-8672
CVSS-4.0 (AV:L/AC:M/AU:N/C:P/I:P/A:P)
GOOGLE-1825
Denial This strike exploits a vulnerability in Apple Safari Webkit. Specifically a JSValue ValueProfile pointing to a previously freed chunk of memory which will have its JSCell header overwritten. When this gets accessed out of bounds a crash will occur. An attacker can craft javascript in such a manner that will cause memory corruption to occur, causing a denial of service in the browser and potentially leading to remote code execution.