This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.
Category Archives: Advisories
ZDI-24-565: Luxion KeyShot Viewer KSP File Parsing Use-After-Free Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8.
ZDI-24-564: Fuji Electric Monitouch V-SFT V9 File Parsing Type Confusion Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-5597.
ZDI-24-567: GStreamer AV1 Video Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-0444.
DSA-5705-1 tinyproxy – security update
A use-after-free was discovered in tinyproxy, a lightweight, non-caching,
optionally anonymizing HTTP proxy, which could result in denial of
service.
DSA-5704-1 pillow – security update
Multiple security issues were discovered in Pillow, a Python imaging
library, which could result in denial of service or the execution of
arbitrary code if malformed images are processed.
DSA-5706-1 libarchive – security update
An integer overflow vulnerability in the rar e8 filter was discovered in
libarchive, a multi-format archive and compression library, which may
result in the execution of arbitrary code if a specially crafted RAR
archive is processed.
Multiple Vulnerabilities in Progress Telerik Report Server Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Progress Telerik Report Server, which could allow for remote code execution. Telerik Report Server provides centralized management for Progress’ business intelligence reporting suite through a web application. Successful chain exploitation of these vulnerabilities could allow for remote code execution in the context of the affected service account. Depending on the privileges associated with the service account, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Services whose accounts are configured to have fewer rights on the system could be less impacted than those who operate with administrative rights.
php-8.3.8-1.fc40
FEDORA-2024-49aba7b305
Packages in this update:
php-8.3.8-1.fc40
Update description:
PHP version 8.3.8 (06 Jun 2024)
CGI:
Fixed buffer limit on Windows, replacing read call usage by _read. (David Carlier)
Fixed bug GHSA-3qgc-jrrr-25jv (Bypass of CVE-2012-1823, Argument Injection in PHP-CGI). (CVE-2024-4577) (nielsdos)
CLI:
Fixed bug GH-14189 (PHP Interactive shell input state incorrectly handles quoted heredoc literals.). (nielsdos)
Core:
Fixed bug GH-13970 (Incorrect validation of #[Attribute] flags type for non-compile-time expressions). (ilutov)
DOM:
Fix crashes when entity declaration is removed while still having entity references. (nielsdos)
Fix references not handled correctly in C14N. (nielsdos)
Fix crash when calling childNodes next() when iterator is exhausted. (nielsdos)
Fix crash in ParentNode::append() when dealing with a fragment containing text nodes. (nielsdos)
Filter:
Fixed bug GHSA-w8qr-v226-r27w (Filter bypass in filter_var FILTER_VALIDATE_URL). (CVE-2024-5458) (nielsdos)
FPM:
Fix bug GH-14175 (Show decimal number instead of scientific notation in systemd status). (Benjamin Cremer)
Hash:
ext/hash: Swap the checking order of __has_builtin and __GNUC__ (Saki Takamachi)
Intl:
Fixed build regression on systems without C++17 compilers. (Calvin Buckley, Peter Kokot)
MySQLnd:
Fix bug GH-14255 (mysqli_fetch_assoc reports error from nested query). (Kamil Tekiela)
Opcache:
Fixed bug GH-14109 (Fix accidental persisting of internal class constant in shm). (ilutov)
OpenSSL:
The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable. (CVE-2024-2408)
Standard:
Fixed bug GHSA-9fcc-425m-g385 (Bypass of CVE-2024-1874). (CVE-2024-5585) (nielsdos)
XML:
Fixed bug GH-14124 (Segmentation fault with XML extension under certain memory limit). (nielsdos)
XMLReader:
Fixed bug GH-14183 (XMLReader::open() can’t be overridden). (nielsdos)
php-8.2.20-1.fc39
FEDORA-2024-52c23ef1ec
Packages in this update:
php-8.2.20-1.fc39
Update description:
PHP version 8.2.20 (06 Jun 2024)
CGI:
Fixed buffer limit on Windows, replacing read call usage by _read. (David Carlier)
Fixed bug GHSA-3qgc-jrrr-25jv (Bypass of CVE-2012-1823, Argument Injection in PHP-CGI). (CVE-2024-4577) (nielsdos)
CLI:
Fixed bug GH-14189 (PHP Interactive shell input state incorrectly handles quoted heredoc literals.). (nielsdos)
Core:
Fixed bug GH-13970 (Incorrect validation of #[Attribute] flags type for non-compile-time expressions). (ilutov)
Fixed bug GH-14140 (Floating point bug in range operation on Apple Silicon hardware). (Derick, Saki)
DOM:
Fix crashes when entity declaration is removed while still having entity references. (nielsdos)
Fix references not handled correctly in C14N. (nielsdos)
Fix crash when calling childNodes next() when iterator is exhausted. (nielsdos)
Fix crash in ParentNode::append() when dealing with a fragment containing text nodes. (nielsdos)
FFI:
Fixed bug GH-14215 (Cannot use FFI::load on CRLF header file with apache2handler). (nielsdos)
Filter:
Fixed bug GHSA-w8qr-v226-r27w (Filter bypass in filter_var FILTER_VALIDATE_URL). (CVE-2024-5458) (nielsdos)
FPM:
Fix bug GH-14175 (Show decimal number instead of scientific notation in systemd status). (Benjamin Cremer)
Hash:
ext/hash: Swap the checking order of __has_builtin and __GNUC__ (Saki Takamachi)
Intl:
Fixed build regression on systems without C++17 compilers. (Calvin Buckley, Peter Kokot)
Ini:
Fixed bug GH-14100 (Corrected spelling mistake in php.ini files). (Marcus Xavier)
MySQLnd:
Fix bug GH-14255 (mysqli_fetch_assoc reports error from nested query). (Kamil Tekiela)
Opcache:
Fixed bug GH-14109 (Fix accidental persisting of internal class constant in shm). (ilutov)
OpenSSL:
The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable. (CVE-2024-2408)
Standard:
Fixed bug GHSA-9fcc-425m-g385 (Bypass of CVE-2024-1874). (CVE-2024-5585) (nielsdos)
XML:
Fixed bug GH-14124 (Segmentation fault with XML extension under certain memory limit). (nielsdos)
XMLReader:
Fixed bug GH-14183 (XMLReader::open() can’t be overridden). (nielsdos)