Category Archives: Advisories

[SYSS-2024-040] DiCal-RED – Improper Authentication

Read Time:17 Second

Posted by Sebastian Hamann via Fulldisclosure on Aug 22

Advisory ID: SYSS-2024-040
Product: DiCal-RED
Manufacturer: Swissphone Wireless AG
Affected Version(s): Unknown
Tested Version(s): 4009
Vulnerability Type: Improper Authentication (CWE-287)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2024-04-16
Solution Date: None
Public Disclosure: 2024-08-20
CVE Reference:…

Read More

[SYSS-2024-039] DiCal-RED – Path Traversal

Read Time:17 Second

Posted by Sebastian Hamann via Fulldisclosure on Aug 22

Advisory ID: SYSS-2024-039
Product: DiCal-RED
Manufacturer: Swissphone Wireless AG
Affected Version(s): Unknown
Tested Version(s): 4009
Vulnerability Type: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) (CWE-22)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2024-04-16
Solution Date:…

Read More

[SYSS-2024-038] DiCal-RED – Use of Password Hash Instead of Password for Authentication

Read Time:18 Second

Posted by Sebastian Hamann via Fulldisclosure on Aug 22

Advisory ID: SYSS-2024-038
Product: DiCal-RED
Manufacturer: Swissphone Wireless AG
Affected Version(s): Unknown
Tested Version(s): 4009
Vulnerability Type: Use of Password Hash Instead of Password for Authentication (CWE-836)
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2024-04-16
Solution Date: None
Public Disclosure:…

Read More

[SYSS-2024-037] DiCal-RED – Use of Password Hash With Insufficient Computational Effort

Read Time:17 Second

Posted by Sebastian Hamann via Fulldisclosure on Aug 22

Advisory ID: SYSS-2024-037
Product: DiCal-RED
Manufacturer: Swissphone Wireless AG
Affected Version(s): Unknown
Tested Version(s): 4009
Vulnerability Type: Use of Password Hash With Insufficient Computational Effort (CWE-916)
Risk Level: Medium
Solution Status: Open
Manufacturer Notification: 2024-04-16
Solution Date: None
Public Disclosure:…

Read More

[SYSS-2024-035] DiCal-RED – Missing Authentication for Critical Function

Read Time:17 Second

Posted by Sebastian Hamann via Fulldisclosure on Aug 22

Advisory ID: SYSS-2024-035
Product: DiCal-RED
Manufacturer: Swissphone Wireless AG
Affected Version(s): Unknown
Tested Version(s): 4009
Vulnerability Type: Missing Authentication for Critical Function (CWE-306)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2024-04-16
Solution Date: None
Public Disclosure: 2024-08-20…

Read More

[SYSS-2024-036] DiCal-RED – Missing Authentication for Critical Function

Read Time:17 Second

Posted by Sebastian Hamann via Fulldisclosure on Aug 22

Advisory ID: SYSS-2024-036
Product: DiCal-RED
Manufacturer: Swissphone Wireless AG
Affected Version(s): Unknown
Tested Version(s): 4009
Vulnerability Type: Missing Authentication for Critical Function (CWE-306)
Risk Level: High
Solution Status: Open
Manufacturer Notification: 2024-04-16
Solution Date: None
Public Disclosure: 2024-08-20…

Read More

Re: Improper Authentication (CWE-287) CVE-2024-33897

Read Time:20 Second

Posted by Jeffrey Walton on Aug 22

I believe the problem lies elsewhere. The root cause is an
architectural or design problem.

Ewon Cosy+ should probably be using a protocol like Simple Certificate
Enrollment Protocol (SCEP) or Enrollment over Secure Transport (EST),
and not rolling their own scheme. Also see discussions like
<https://mailarchive.ietf.org/arch/msg/pkix/X94XpFJA5sKKkLTVkOYXL_dv8t4/>
and <>.

Jeff

Read More

` Piano `

Read Time:13 Second

Posted by Teri Olson on Aug 22

Hello,

I’m giving out my late husband’s Yamaha Baby Grand Piano for free to any passionate instrument lover. kindly let me
know if you want it or have someone else who wants it.

Thanks,
Teri

Read More

USN-6980-1: ImageMagick vulnerabilities

Read Time:15 Second

It was discovered that ImageMagick incorrectly handled certain malformed
image files. If a user or automated system using ImageMagick were tricked
into opening a specially crafted image, an attacker could exploit this to
cause a denial of service or possibly execute code with the privileges of
the user invoking the program.

Read More

USN-6978-1: XStream vulnerabilities

Read Time:1 Minute, 4 Second

It was discovered that XStream incorrectly handled parsing of certain
crafted XML documents. A remote attacker could possibly use this issue to
read arbitrary files. (CVE-2016-3674)

Zhihong Tian and Hui Lu found that XStream was vulnerable to remote code
execution. A remote attacker could run arbitrary shell commands by
manipulating the processed input stream. (CVE-2020-26217)

It was discovered that XStream was vulnerable to server-side forgery
attacks. A remote attacker could request data from internal resources
that are not publicly available only by manipulating the processed input
stream. (CVE-2020-26258)

It was discovered that XStream was vulnerable to arbitrary file deletion
on the local host. A remote attacker could use this to delete arbitrary
known files on the host as long as the executing process had sufficient
rights only by manipulating the processed input stream. (CVE-2020-26259)

It was discovered that XStream was vulnerable to denial of service,
arbitrary code execution, arbitrary file deletion and server-side forgery
attacks. A remote attacker could cause any of those issues by
manipulating the processed input stream. (CVE-2021-21341, CVE-2021-21342,
CVE-2021-21343, CVE-2021-21344, CVE-2021-21345, CVE-2021-21346,
CVE-2021-21347, CVE-2021-21348, CVE-2021-21349, CVE-2021-21350,
CVE-2021-21351)

Read More