11.5 C
London
Saturday, October 21, 2017
Home Tags 2015

Tag: 2015

The following tables list the bulletins in order of major software category and severity.Use these tables to learn about the security updates that you may need to install. You should review each software program or component listed to see whether any security updates pertain to your installation.
If a software program or component is listed, then the severity rating of the software update is also listed.Note You may have to install several security updates for a single vulnerability. Review the whole column for each bulletin identifier that is listed to verify the updates that you have to install, based on the programs or components that you have installed on your system. Windows Vista Bulletin Identifier                                                  MS15-106 MS15-107 MS15-108 MS15-109 MS15-111 Aggregate Severity Rating Critical None Critical Critical Important Windows Vista Service Pack 2 Internet Explorer 7                               (3093983)(Critical)Internet Explorer 8(3093983)(Critical)Internet Explorer 9(3093983)(Critical) Not applicable                                           JScript 5.7 and VBScript 5.7(3094996)(Critical)                                                Windows Vista Service Pack 2(3080446)(Critical)Windows Vista Service Pack 2(3093513)(Critical) Windows Vista Service Pack 2(3088195)(Important) Windows Vista x64 Edition Service Pack 2 Internet Explorer 7(3093983)(Critical)Internet Explorer 8(3093983)(Critical)Internet Explorer 9(3093983)(Critical) Not applicable JScript 5.7 and VBScript 5.7(3094996)(Critical) Windows Vista x64 Edition Service Pack 2(3080446)(Critical)Windows Vista x64 Edition Service Pack 2(3093513)(Critical) Windows Vista x64 Edition Service Pack 2(3088195)(Important) Windows Server 2008 Bulletin Identifier MS15-106 MS15-107 MS15-108 MS15-109 MS15-111 Aggregate Severity Rating Moderate None Critical Critical Important Windows Server 2008 for 32-bit Systems Service Pack 2 Internet Explorer 7(3093983)(Moderate)Internet Explorer 8(3093983)(Moderate)Internet Explorer 9(3093983)(Moderate) Not applicable JScript 5.7 and VBScript 5.7(3094996)(Critical) Windows Server 2008 for 32-bit Systems Service Pack 2(3080446)(Critical) Windows Server 2008 for 32-bit Systems Service Pack 2(3088195)(Important) Windows Server 2008 for x64-based Systems Service Pack 2 Internet Explorer 7(3093983)(Moderate)Internet Explorer 8(3093983)(Moderate)Internet Explorer 9(3093983)(Moderate) Not applicable JScript 5.7 and VBScript 5.7(3094996)(Critical) Windows Server 2008 for x64-based Systems Service Pack 2(3080446)(Critical) Windows Server 2008 for x64-based Systems Service Pack 2(3088195)(Important) Windows Server 2008 for Itanium-based Systems Service Pack 2 Internet Explorer 7(3093983)(Moderate) Not applicable JScript 5.7 and VBScript 5.7(3094996)(Critical) Windows Server 2008 for Itanium-based Systems Service Pack 2(3080446)(Critical) Windows Server 2008 for Itanium-based Systems Service Pack 2(3088195)(Important) Windows 7 Bulletin Identifier MS15-106 MS15-107 MS15-108 MS15-109 MS15-111 Aggregate Severity Rating Critical None None Critical Important Windows 7 for 32-bit Systems Service Pack 1 Internet Explorer 8(3093983)(Critical)Internet Explorer 9(3093983)(Critical)Internet Explorer 10(3093983)(Critical)Internet Explorer 11(3093983)(Critical) Not applicable Not applicable Windows 7 for 32-bit Systems Service Pack 1(3080446)(Critical)Windows 7 for 32-bit Systems Service Pack 1(3093513)(Critical) Windows 7 for 32-bit Systems Service Pack 1(3088195)(Important) Windows 7 for x64-based Systems Service Pack 1 Internet Explorer 8(3093983)(Critical)Internet Explorer 9(3093983)(Critical)Internet Explorer 10(3093983)(Critical)Internet Explorer 11(3093983)(Critical) Not applicable Not applicable Windows 7 for x64-based Systems Service Pack 1(3080446)(Critical)Windows 7 for x64-based Systems Service Pack 1(3093513)(Critical) Windows 7 for x64-based Systems Service Pack 1(3088195)(Important) Windows Server 2008 R2 Bulletin Identifier MS15-106 MS15-107 MS15-108 MS15-109 MS15-111 Aggregate Severity Rating Moderate None None Critical Important Windows Server 2008 R2 for x64-based Systems Service Pack 1 Internet Explorer 8(3093983)(Moderate)Internet Explorer 9(3093983)(Moderate)Internet Explorer 10(3093983)(Moderate)Internet Explorer 11(3093983)(Moderate) Not applicable Not applicable Windows Server 2008 R2 for x64-based Systems Service Pack 1(3080446)(Critical) Windows Server 2008 R2 for x64-based Systems Service Pack 1(3088195)(Important) Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 Internet Explorer 8(3093983)(Moderate) Not applicable Not applicable Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(3080446)(Critical) Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(3088195)(Important) Windows 8 and Windows 8.1 Bulletin Identifier MS15-106 MS15-107 MS15-108 MS15-109 MS15-111 Aggregate Severity Rating Critical None None Critical Important Windows 8 for 32-bit Systems Internet Explorer 10(3093983)(Critical) Not applicable Not applicable Windows 8 for 32-bit Systems(3080446)(Critical) Windows 8 for 32-bit Systems(3088195)(Important) Windows 8 for x64-based Systems Internet Explorer 10(3093983)(Critical) Not applicable Not applicable Windows 8 for x64-based Systems(3080446)(Critical) Windows 8 for x64-based Systems(3088195)(Important) Windows 8.1 for 32-bit Systems Internet Explorer 11(3093983)(Critical) Not applicable Not applicable Windows 8.1 for 32-bit Systems(3080446)(Critical) Windows 8.1 for 32-bit Systems(3088195)(Important) Windows 8.1 for x64-based Systems Internet Explorer 11(3093983)(Critical) Not applicable Not applicable Windows 8.1 for x64-based Systems(3080446)(Critical) Windows 8.1 for x64-based Systems(3088195)(Important) Windows Server 2012 and Windows Server 2012 R2 Bulletin Identifier MS15-106 MS15-107 MS15-108 MS15-109 MS15-111 Aggregate Severity Rating Moderate None None Critical Important Windows Server 2012 Internet Explorer 10(3093983)(Moderate) Not applicable Not applicable Windows Server 2012(3080446)(Critical) Windows Server 2012(3088195)(Important) Windows Server 2012 R2 Internet Explorer 11(3093983)(Moderate) Not applicable Not applicable Windows Server 2012 R2(3080446)(Critical) Windows Server 2012 R2(3088195)(Important) Windows RT and Windows RT 8.1 Bulletin Identifier MS15-106 MS15-107 MS15-108 MS15-109 MS15-111 Aggregate Severity Rating Critical None None Critical Important Windows RT Internet Explorer 10(3093983)(Critical) Not applicable Not applicable Windows RT(3080446)(Critical) Windows RT(3088195)(Important) Windows RT 8.1 Internet Explorer 11(3093983)(Critical) Not applicable Not applicable Windows RT 8.1(3080446)(Critical) Windows RT 8.1(3088195)(Important) Windows 10 Bulletin Identifier MS15-106 MS15-107 MS15-108 MS15-109 MS15-111 Aggregate Severity Rating Critical Important None Critical Important Windows 10 for 32-bit Systems Internet Explorer 11(3105210)(Critical) Microsoft Edge(3097617)(Important) Not applicable Windows 10 for 32-bit Systems(3097617)(Critical) Windows 10 for 32-bit Systems(3097617)(Important) Windows 10 for x64-based Systems Internet Explorer 11(3105210)(Critical) Microsoft Edge(3097617)(Important) Not applicable Windows 10 for x64-based Systems(3097617)(Critical) Windows 10 for x64-based Systems(3097617)(Important) Server Core installation option Bulletin Identifier MS15-106 MS15-107 MS15-108 MS15-109 MS15-111 Aggregate Severity Rating None None Critical Critical Important Windows Server 2008 for 32-bit Systems Service Pack 2(Server Core installation) Not applicable Not applicable JScript 5.7 and VBScript 5.7(3094996)(Critical) Windows Server 2008 for 32-bit Systems Service Pack 2(Server Core installation)(3080446)(Critical) Windows Server 2008 for 32-bit Systems Service Pack 2(Server Core installation)(3088195)(Important) Windows Server 2008 for x64-based Systems Service Pack 2(Server Core installation) Not applicable Not applicable JScript 5.7 and VBScript 5.7(3094996)(Critical) Windows Server 2008 for x64-based Systems Service Pack 2(Server Core installation)(3080446)(Critical) Windows Server 2008 for x64-based Systems Service Pack 2(Server Core installation)(3088195)(Important) Windows Server 2008 R2 for x64-based Systems Service Pack 1(Server Core installation) Not applicable Not applicable JScript 5.8 and VBScript 5.8(3094995)(Critical) Windows Server 2008 R2 for x64-based Systems Service Pack 1(Server Core installation)(3080446)(Critical) Windows Server 2008 R2 for x64-based Systems Service Pack 1(Server Core installation)(3088195)(Important) Windows Server 2012(Server Core installation) Not applicable Not applicable Not applicable Windows Server 2012(Server Core installation)(3080446)(Critical) Windows Server 2012(Server Core installation)(3088195)(Important) Windows Server 2012 R2(Server Core installation) Not applicable Not applicable Not applicable Windows Server 2012 R2(Server Core installation)(3080446)(Critical) Windows Server 2012 R2(Server Core installation)(3088195)(Important) Microsoft Office 2007 Bulletin Identifier                  MS15-110 Aggregate Severity Rating Important Microsoft Office 2007 Service Pack 3 Microsoft Excel 2007 Service Pack 3(3085615)(Important)Microsoft Visio 2007 Service Pack 3(3085542)(Important) Microsoft Office 2010 Bulletin Identifier MS15-110 Aggregate Severity Rating Important Microsoft Office 2010 Service Pack 2 (32-bit editions) Microsoft Excel 2010 Service Pack 2 (32-bit editions)(3085609)(Important)Microsoft Visio 2010 Service Pack 2 (32-bit editions)(3085514)(Important) Microsoft Office 2010 Service Pack 2 (64-bit editions) Microsoft Excel 2010 Service Pack 2 (64-bit editions)(3085609)(Important)Microsoft Visio 2010 Service Pack 2 (64-bit editions)(3085514)(Important) Microsoft Office 2013 Bulletin Identifier MS15-110 Aggregate Severity Rating Important Microsoft Office 2013 Service Pack 1 (32-bit editions) Microsoft Excel 2013 Service Pack 1 (32-bit editions)(3085583)(Important) Microsoft Office 2013 Service Pack 1 (64-bit editions) Microsoft Excel 2013 Service Pack 1 (64-bit editions)(3085583)(Important) Microsoft Office 2013 RT Bulletin Identifier MS15-110 Aggregate Severity Rating Important Microsoft Office 2013 RT Service Pack 1 Microsoft Excel 2013 RT Service Pack 1(3085583)(Important) Microsoft Office 2016 Bulletin Identifier MS15-110 Aggregate Severity Rating Important Microsoft Office 2016 (32-bit edition) Microsoft Excel 2016 (32-bit edition)(2920693)(Important) Microsoft Office 2016 (64-bit edition) Microsoft Excel 2016 (64-bit edition)(2920693)(Important) Microsoft Office for Mac Bulletin Identifier MS15-110 Aggregate Severity Rating Important Microsoft Office for Mac 2011 Microsoft Excel for Mac 2011(3097266)(Important) Microsoft Office 2016 for Mac Microsoft Excel 2016 for Mac(3097264)(Important) Other Office Software Bulletin Identifier MS15-110 Aggregate Severity Rating Important Microsoft Excel Viewer Microsoft Excel Viewer(3085619)(Important) Microsoft Office Compatibility Pack Service Pack 3 Microsoft Office Compatibility Pack Service Pack 3(3085618)(Important) This bulletin spans more than one software category.
See the other tables in this section for additional affected software. This bulletin spans more than one software category.
See the other tables in this section for additional affected software.This bulletin spans more than one software category.
See the other tables in this section for additional affected software.
Security Update for Microsoft Exchange Server (3160339)Published: June 14, 2016Version: 1.0This security update resolves vulnerabilites in Microsoft Exchange Server.

The most severe of the vulnerabilities could allow information disclosure if an attacker sends a specially crafted image URL in an Outlook Web Access (OWA) message that is loaded, without warning or filtering, from the attacker-controlled URL.This security update is rated Important for all supported editions of Microsoft Exchange Server 2007, Microsoft Exchange Server 2010, Microsoft Exchange Server 2013, and Microsoft Exchange Server 2016.

For more information, see the Affected Software and Vulnerability Severity Ratings section.The security update addresses the vulnerabilities by correcting the way that Microsoft Exchange parses HTML messages.

For more information about the vulnerabilities, see the Vulnerability Information section.For more information about this update, see Microsoft Knowledge Base Article 3160339.The following software versions or editions are affected.
Versions or editions that are not listed are either past their support life cycle or are not affected.

To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.The severity ratings indicated for each affected software assume the potential maximum impact of the vulnerability.

For information regarding the likelihood, within 30 days of this security bulletin’s release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the June bulletin summary.*The Updates Replaced column shows only the latest update in any chain of superseded updates.

For a comprehensive list of updates replaced, go to the Microsoft Update Catalog, search for the update KB number, and then view update details (updates replaced information is provided on the Package Details tab).Why is Microsoft issuing a security update for vulnerabilities that are in third-party code, Oracle Outside In libraries? Microsoft licenses a custom implementation of the Oracle Outside In libraries, specific to the product in which the third-party code is used. Microsoft is issuing this security update to help ensure that all customers using this third-party code in Microsoft Exchange are protected from these vulnerabilities.

For more information about these vulnerabilities, see Oracle Critical Patch Update Advisory - January 2016.Do these updates contain any additional security-related changes to functionality? The updates listed in the Affected Software and Vulnerability Severity Ratings table include defense-in-depth updates to help improve security-related features, in addition to the changes that are listed for the vulnerability described in this bulletin.Microsoft Exchange Information Disclosure Vulnerability - CVE-2016-0028An email filter bypass exists in the way that Microsoft Exchange parses HTML messages that could allow information disclosure.

An attacker who successfully exploited the vulnerability could identify, fingerprint, and track a user online if the user views email messages using Outlook Web Access (OWA).

An attacker could also combine this vulnerability with another one, such as a Cross-Site Request Forgery (CSRF), to amplify the attack.To exploit the vulnerability, an attacker could include specially crafted image URLs in OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL.

This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.

The update corrects the way that Exchange parses HTML messages.The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list: Vulnerability title CVE number Publicly disclosed Exploited Microsoft Exchange Information Disclosure Vulnerability CVE-2016-0028 No No Mitigating FactorsMicrosoft has not identified any mitigating factors for this vulnerability.WorkaroundsMicrosoft has not identified any workarounds for this vulnerability.Oracle Outside In Libraries Elevation of Privilege VulnerabilitiesThis security update addresses the following vulnerabilities, which are described in Oracle Critical Patch Update Advisory - January 2016:CVE-2015-6013: Oracle Outside In 8.5.2 WK4 stack buffer overflow CVE-2015-6014: Oracle Outside In 8.5.2 DOC stack buffer overflow CVE-2015-6015: Oracle OIT 8.5.2 Paradox DB stack buffer overflow For Security Update Deployment information, see the Microsoft Knowledge Base article referenced here in the Executive Summary.Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure.
See Acknowledgments for more information.The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose.
In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages.
Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.V1.0 (June 14, 2016): Bulletin published. Page generated 2016-06-08 10:44-07:00.
'Pisloader' hides instructions in plain sight Palo Alto Networks researchers say the Webky group is using DNS (domain name system) requests as their command and control channel. The reason that's important is that DNS is one of those ports that's less heavily policed than (for example) Port 80. The Palo Alto post (by Josh Grunzweig, Mike Scott and Bryan Lee) says the activity was spotted during an attack on an unnamed US organisation. The attack was based on the HTTPBrowser malware family, which was seen in attacks such as this from 2015 in China. The researchers dubbed this attack 'pisloader'.
It pointed victims at http://globalprint-us[.]com/proxy_plugin.exe to download malware, which loads the well-known Poison Ivy RAT. The other domains used in the attack, all newly-registered, were logitech-us[.]com (not the real Logitech), and intranetwebcam[.]com. It's mostly the DNS CC that makes this different, Palo Alto Networks writes. Here's an example of the request: Like FrameworkPOS, putting CC instructions in the protocol is designed to skip past security products. Hence a response from the CC will be in the form of a DNS response, with instructions to the malware in the text of the response: sifo – collect victim system information; drive – List drives on victim machine; list – List file information for provided directory; upload – Upload a file to the victim machine; and open – Spawn a command shell. As the post notes, the code to generate the commands is at GitHub. ® Sponsored: Rise of the machines
Cisco has confirmed that Cisco IOS XR Software, Cisco IOS Software, Cisco IOS XE Software, Cisco NX-OS Software, Cisco ASA Software, and Cisco StarOS Software are affected by the vulnerability described in this advisory.Note: Affected devices that are configured with a global IPv6 address on at least one interface and are processing traffic can be exploited by a remote attacker.

Affected devices that are configured with only a link-local address on interfaces and are processing IPv6 traffic can be exploited with crafted packets only by a Layer 2 adjacent attacker.For information about which software releases are affected, see the "Fixed Software" section of this advisory.Cisco IOS XR SoftwareThe following Cisco products are affected by this vulnerability if they are running an affected release of Cisco IOS XR Software and IPv6 is enabled on one or more interfaces:Cisco 12000 Series Routers Cisco ASR 9000 Series Aggregation Services Routers Cisco Carrier Routing System Cisco Network Convergence System 4000 Series Cisco Network Convergence System 6000 Series Routers All types of line cards on those platforms are affected by this vulnerability.If a device is running an affected release of Cisco IOS XR Software and IPv6 is enabled, administrators can identify interfaces that have assigned IPv6 addresses by using the show ipv6 interface brief command in the command-line interface (CLI).

The following example shows the output of the command on a device that is running Cisco IOS XR Software with IPv6 enabled: RP/0/RP0/CPU0:router# show ipv6 interface brief<!output omitted> GigabitEthernet0/2/0/0 [Up/Up]fe80::212:daff:fe62:c150 202::1 In addition, if IPv6 is enabled, the ipv6 enable interface configuration command is present in the configuration.

The following example shows the output of a vulnerable configuration: RP/0/RP0/CPU0:router(config)# interface GigabitEthernet0/2/0/0 RP/0/RP0/CPU0:router(config-if)# ipv6 enable If IPv6 is not supported by the Cisco IOS XR Software release that is running on a device, use of the show ipv6 interface brief command produces an error message.
If IPv6 is not enabled on the device, use of the show ipv6 interface brief command does not show any interfaces with IPv6 addresses.
In either scenario, the device is not affected by this vulnerability.Cisco IOS Software Cisco products are affected by this vulnerability if they are running an affected release of Cisco IOS Software and IPv6 is enabled on one or more interfaces. By default, IPv6 is not enabled.To determine whether IPv6 is enabled on one or more interfaces, administrators can use the show running-config | include ipv6.(enable|address) privileged EXEC command in the CLI.
If IPv6 is enabled, ipv6 enable and ipv6 address appear in the output of the command.The following example shows the output of the show running-config | include ipv6.(enable|address) command on a device that is running Cisco IOS XE Software with IPv6 configured: Router# show running-config | include ipv6.(enable|address) ipv6 enable ipv6 address dhcp rapid-commitipv6 address autoconfig ipv6 address MANAGEMENT ::1FFF:0:0:0:3560/128ipv6 address 2001:DB8::1/64 Cisco IOS XE SoftwareThe following Cisco products are affected by this vulnerability if they are running an affected release of Cisco IOS XE Software and IPv6 is enabled on one or more interfaces that process traffic:Cisco 4300 Series Integrated Services Routers Cisco 4400 Series Integrated Services Routers Cisco ASR 900 Series Aggregation Services Routers Cisco ASR 1000 Series Aggregation Services Routers Cisco Cloud Services Router 1000V Series Switches running Cisco IOS XE Software By default, IPv6 is not enabled.This vulnerability does not depend on any specific combination of Embedded Services Processor (ESP) and Route Processor (RP) installations on the chassis.

Any combination of ESP and RP chassis installations is affected by this vulnerability.To determine whether IPv6 is enabled on one or more interfaces, administrators can use the show running-config | include ipv6.(enable|address) privileged EXEC command in the CLI.
If IPv6 is enabled, ipv6 enable or ipv6 address appear in the output of the command.The following example shows the output of the show running-config | include ipv6.(enable|address) command on a device that is running Cisco IOS XE Software with IPv6 configured: Router# show running-config | include ipv6.(enable|address) ipv6 enable ipv6 address dhcp rapid-commitipv6 address autoconfig ipv6 address MANAGEMENT ::1FFF:0:0:0:3560/128ipv6 address 2001:DB8::1/64 Cisco NX-OS SoftwareAll Cisco products running Cisco NX-OS Software are affected by this vulnerability if IPv6 is enabled on one or more interfaces that process traffic.

By default, IPv6 is not enabled.To determine whether IPv6 is enabled on one or more interfaces, administrators can use the show running-config | include ipv6.address privileged EXEC command in the CLI.
If IPv6 is enabled, ipv6 address appears in the output of the command.The following example shows the output of the show running-config | include ipv6.address command on a device that is running Cisco NX-OS Software with IPv6 enabled: Router# show running-config | include ipv6.address ipv6 address 2001:DB8::1/64 Cisco ASA SoftwareIPv6 is not enabled by default.

To enable IPv6 on a Cisco ASA or Cisco ASASM, at a minimum a link-local address needs to be configured for IPv6 to operate correctly.
If a global address is configured, a link-local address is automatically configured on each interface. To verify that the Cisco ASA or Cisco ASASM has IPv6 enabled, administrators can use the show ipv6 interface command in the CLI and confirm that the command returns output.

The following example shows a Cisco ASA that has two interfaces (inside and outside) configured and IPv6 enabled: ciscoasa# show ipv6 interface outside is up, line protocol is up IPv6 is enabled, link-local address is fe80::219:2fff:fe83:4f42 No global unicast address is configured Joined group address(es): ff02::1 ff02::1:ff83:4f42 ICMP error messages limited to one every 100 milliseconds ICMP redirects are enabled ND DAD is enabled, number of DAD attempts: 1 ND reachable time is 30000 milliseconds ND advertised retransmit interval is 1000 milliseconds Hosts use stateless autoconfig for addresses. inside is up, line protocol is up IPv6 is enabled, link-local address is fe80::219:2fff:fe83:4f43 No global unicast address is configured Joined group address(es): ff02::1 ff02::1:ff83:4f43 ICMP error messages limited to one every 100 milliseconds ICMP redirects are enabled ND DAD is enabled, number of DAD attempts: 1 ND reachable time is 30000 milliseconds ND advertised retransmit interval is 1000 milliseconds Hosts use stateless autoconfig for addresses. Cisco StarOS SoftwareCisco ASR 5000 Series devices running Cisco StarOS Software are affected by this vulnerability if IPv6 is enabled on one or more interfaces that process traffic.

By default, IPv6 is not enabled.To determine whether IPv6 is enabled on one or more interfaces, administrators can use the show ipv6 interface summary privileged EXEC command in the CLI.
If IPv6 is enabled, an IPv6 address appears in the output of the command.The following example shows the output of the show ipv6 interface summary command on a device that is running Cisco StarOS Software with IPv6 enabled: [local]router# show ipv6 interface summary Friday February 21 09:00:07 UTC 2014Interface Name Address/Mask Port Status============================== =================== ================== ======int1_test_v6 2001:db8::1/64 20/1 vlan 122 UPint2_test_v6 2001:db8::2/64 21/1 vlan 122 UPint3_test_v6 2001:db8::3/64 22/1 vlan 122 UPint4_test_v6 2001:db8::4/64 23/1 vlan 130 UP Determining the Cisco IOS XR Software ReleaseTo determine which Cisco IOS XR Software release is running on a device and the name of the device on which it is running, administrators can log in to the device and use the show version command in the CLI.
If the device is running Cisco IOS XR Software, Cisco IOS XR Software or similar text appears in the system banner.

The location and name of the system image file that is currently running on the device appears next to the System image file is text.

The name of the hardware product appears on the line after the name of the system image file.The following example shows the output of the show version command on a device that is running Cisco IOS XR Software Release 4.1.0 with an installed image name of mbihfr-rp.vm: RP/0/RP0/CPU0:router# show version Mon May 31 02:14:12.722 DSTCisco IOS XR Software, Version 4.1.0Copyright (c) 2010 by Cisco Systems, Inc.ROM: System Bootstrap, Version 2.100(20100129:213223) [CRS-1 ROMMON], router uptime is 1 week, 6 days, 4 hours, 22 minutesSystem image file is "bootflash:disk0/hfr-os-mbi-4.1.0/mbihfr-rp.vm"cisco CRS-8/S (7457) processor with 4194304K bytes of memory.7457 processor at 1197Mhz, Revision 1.2 Determining the Cisco IOS Software ReleaseTo determine which Cisco IOS Software release is running on a Cisco product, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears.
If the device is running Cisco IOS Software, the system banner displays text similar to Cisco Internetwork Operating System Software or Cisco IOS Software.

The image name appears in parentheses followed by the Cisco IOS Software release number and release name.
Some Cisco devices do not support the show version command or may provide different output.The following example identifies a Cisco product that is running Cisco IOS Software Release 15.5(2)T1 with an installed image name of C2951-UNIVERSALK9-M: Router> show version Cisco IOS Software, C2951 Software (C2951-UNIVERSALK9-M), Version 15.5(2)T1, RELEASE SOFTWARE (fc1)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2015 by Cisco Systems, Inc.Compiled Mon 22-Jun-15 09:32 by prod_rel_team... Determining the Cisco IOS XE Software ReleaseTo determine which Cisco IOS XE Software release is running on a device, administrators can log in to the device and use the show version command in the CLI.
If the device is running Cisco IOS XE Software, Cisco IOS XE Software or similar text appears in the system banner. The following example shows the output of the show version command on a device that is running Cisco IOS XE Software Release 3.6.2S, which maps to Cisco IOS Software Release 15.2(2)S2:  Router# show version Cisco IOS Software, IOS-XE Software (PPC_LINUX_IOSD-ADVENTERPRISEK9-M), Version 15.2(2)S2, RELEASE SOFTWARE (fc1)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2012 by Cisco Systems, Inc.Compiled Tue 07-Aug-12 13:40 by mcpre Determining the Cisco NX-OS Software ReleaseTo determine which Cisco NX-OS Software release is running on a device, administrators can log in to the device and use the show version command in the CLI.
If the device is running Cisco NX-OS Software, Cisco Nexus Operating System (NX-OS) Software or similar text appears in the system banner.The following example shows the output of the show version command for a Cisco Nexus 5000 Series Switch running Cisco NX-OS Software Release 7.1(1)N1(1):  # show versionCisco Nexus Operating System (NX-OS) SoftwareTAC support: http://www.cisco.com/tacDocuments: http://www.cisco.com/en/US/products/ps9372/tsd_products_support_series_home.htmlCopyright (c) 2002-2012, Cisco Systems, Inc.

All rights reserved.The copyrights to certain works contained herein are owned byother third parties and are used and distributed under license.Some parts of this software are covered under the GNU PublicLicense.

A copy of the license is available athttp://www.gnu.org/licenses/gpl.html.SoftwareBIOS: version 3.6.0loader: version N/Akickstart: version 7.1(1)N1(1)system: version 7.1(1)N1(1) Determining the Cisco ASA Software ReleaseTo determine whether a vulnerable version of Cisco ASA Software is running on an appliance, administrators can issue the show version command.

The following example shows a device running Cisco ASA Software Release 8.4(1): ciscoasa#show version | include VersionCisco Adaptive Security Appliance Software Version 8.4(1) Device Manager Version 6.4(1) Customers who use Cisco ASDM to manage devices can locate the software release in the table that appears in the login window or the upper-left corner of the Cisco ASDM window.Determining the Cisco StarOS Software ReleaseTo determine which Cisco StarOS Software release is running on a Cisco product, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. Each software image can be identified by its release version and its corresponding build number. The following example identifies a Cisco product that is running Cisco StarOS Software Release 15.0 (49328): [local<host_name># show versionActive Software:Image Version: 15.0 (49328)Image Branch Version: 015.000(001)Image Description: Production_BuildImage Date: Tue Apr 23 00:45:12 EDT 2013Boot Image: Unknown
Secure Cloudlink eliminates the need for passwords safeguarding organisations from cyber attack, security breaches, support costs and software license abuseA new, patented cloud services brokerage (CSB) solution providing secure identity management and cloud services distribution has been launched designed specifically to eliminate the need for passwords. The solution from British cloud security software company Secure Cloudlink Ltd – Secure Cloudlink – supports three factor, SSO (single sign on) and biometric user authentication but unlike other solutions in the market, does not store, send or replicate any user credentials outside of an organisations’ directory service. Secure Cloudlink acts as a secure, centralised user authentication and application to manage all users access rights to all authorised applications without the need to create and manage internal domains. Brian Keats, CEO, Secure Cloudlink Ltd, stated: “Passwords are quickly evolving into an untenable means of authentication because of their fundamental security vulnerabilities.

That evolution is being accelerated by the dramatic shift to mobile computing and the ever-rising tide of data breaches. We identified the need for a fundamentally new way of anonymous authentication bypassing the vulnerabilities that exist because of the inherent properties of passwords being human-accessible shared secrets.” “It’s impossible to use the same password everywhere because different sites insist on different password formats.

Even if it were possible, it wouldn’t be sensible.
So we tend to use many different passwords and then forget which password to use for what, so resort to using similar passwords and never changing them, or to writing them down.

Either way, security is compromised.” According to Gartner in its report ‘Design IT Self Service for the Business Consumer’ “password resets account for as much as 40 per cent of IT service desk contact value.”[1] Designed from the ground up with security in mind Secure Cloudlink’s Cloud Services Brokerage platform overcomes identity security issues associated with passwords by the inclusion of a unique and patented token passing technology.

This advanced authentication method requires no user credentials to be stored separately or outside of the directory service dramatically reducing the risk of a cyber breach and costs associated with password reminders. “This usability problem has got worse in recent years through the ubiquity of smaller keyboards such as those on mobile devices, more complex requirements for “password strength” at many sites, and the introduction of one-time-passcodes as a second factor “secret” that forces the users to type not one, but two passcodes every time they authenticate,” continued Brian. “Although some organisations are investing in technology to automate password resets to reduce the number of calls user credentials still persist exposing the organisation to the threat of cyber attack.

At SCL our approach is to eliminate the passwords and streamline the granting of access to applications, IT resources and on-line services.” Secure Cloudlink is the only platform that anonymises user identities over the web for secure access to cloud services.
Its unique technology never requires access or stores user security credentials when connecting internal users, customers and suppliers to web-based applications. The use of Federated Security authentication, also means that network users can enjoy seamless and secure access to multiple cloud services without even appearing to have left the corporate network. With a secure single-sign-on Secure Cloudlink reduces IT service desk time managing multiple passwords by deploying users with a single, secure access point for access to their applications via their desktop, tablet or mobile. Users can be provisioned access both at single and group level, and with a bulk upload facility.

Furthermore, Secure Cloudlink provides an environment that allows centralised management access to employees, contractors, suppliers and customers without creating new domains and user accounts in an existing directory. The company has already sold the Secure Cloudlink solution to a number of customers across a diverse range of markets including government, SaaS providers, and financial institutions.
It is a highly applicable solution for any organisation looking to provide a simple, secure yet password free user access to cloud and on-premise applications and services. [1] Gartner, Design IT Self Service for the Business Consumer, February 19, 2014, Gartner Foundational July 6, 2015 -ENDS- NOTES TO EDITORSAbout Secure CloudlinkSecure Cloudlink – no passwords Secure Cloudlink is a patented cloud services brokerage (CSB) solution providing both secure identity management and cloud services distribution which uniquely eliminates the use of passwords. Unlike other user authentication solutions Secure Cloudlink does not store transmit or replicate user credentials ‘behind the scenes’ removing the security risks, frustrations, system and cost overheads associated with issuing and maintaining passwords. Including biometric user interfaces, multi-factor authentication and single sign on (SSO) capabilities , Secure Cloudlink is a highly cost competitive, secure, and centrally managed access solution to on-premise and SaaS applications including, financial services, Microsoft Office 365 and Mimecast. For further information please go to http://www.securecloudlink.com/ ContactsRob GaskinSecure Cloudlink LtdT: +44 (0)1372 888 660E: rob.gaskin@securecloudlink.com Beau Bass/Nick Bird (media enquires)SpreckleyTel: 0044 (0)207 388 9988Email: securecloudlink@spreckley.co.uk
On February 16, 2016, an industry-wide, critical vulnerability in the GNU C library (glibc) was publicly disclosed. Multiple Cisco products incorporate a version of glibc that may be affected by the vulnerability.

The vulnera...
BBI’s SEM Scanner Cited as a “Revolutionary Game Changer”LOS ANGELES, U.S.A and MANCHESTER, U.K., January 14, 2016 - BBI, LLC, a developer of innovative sensor-based diagnostic products, today announced that it has won the Frost & Sullivan European New Product Innovation Award for Pressure Ulcer Diagnostics for 2015 for the SEM Scanner, BBI’s “revolutionary” hand-held device for detecting early pressure ulcers. Bruin Biometrics CEO Martin Burns receiving the New Product Innovation award BBI was independently evaluated by Frost & Sullivan's global team of analysts and consultants using their 360-Degree research methodology. “The SEM Scanner was selected for the Award for providing a unique solution to a large and urgent unmet need.

The product received high scores for reliability, quality, design, customer experience, and value.” Sowmya Rajagopalan, research manager, transformational health: advanced medical technologies, Frost & Sullivan. [Link to full report] “The SEM Scanner is the first practical device to reveal pressure-induced tissue damage happening beneath the skin’s surface before visual signs of damage or skin ulceration occur.
It does this by using advanced biometric sensors that measure sub-epidermal moisture.

The technology has the potential to change the way we prevent skin damage by detecting damage so much earlier than existing practices.

And nurses at the bedside can use it with accuracy.

These characteristics make the SEM Scanner a powerful and realistic tool for prevention of pressure ulcers,” said Dr.

Barbara Bates-Jensen, a professor of nursing and medicine at the UCLA School of Nursing and David Geffen School of Medicine who was involved in the SEM Scanner’s initial design. In announcing the Award, Frost & Sullivan noted that “this revolutionary device has been found to accurately identify local tissue edema related to inflammatory changes that occur up to 10 days before damage is visible on the skin’s surface.” By detecting pressure ulcers early, clinicians can take preventive action before skin ulceration. Frost & Sullivan examined the SEM Scanner’s performance in the United Kingdom, where BBI launched the device in 2014 upon earning CE Mark approval. “Tremendous support for the adoption of the SEM Scanner has arisen, particularly from nurses and tissue viability nurses who see this scanner as a ‘game changer’ in the diagnosis of pressure ulcers,” said Rajagopalan. In the UK, NHS acute care hospital wards utilizing the SEM Scanner reduced pressure ulcer occurrence to zero and recorded a savings of £50,000 per month as part of BBI’s Pressure Ulcer Reduction Program, according to findings reported in Nursing Times. “Innovation is [BBI’s] key to success and the company consistently ensures maximum return on investment to its customers by improving workflows and enhancing the quality of care for patients,” concluded Rajagopalan. “We're honored to receive this prestigious Award from Frost & Sullivan.

BBI is driven by innovation and motivated by the impact we are having on patients. We have been able to shorten the innovation timeline and incorporate nurse and patient needs early in the development cycle by leveraging an interdisciplinary approach and partnership with UCLA and the Wireless Health Institute,” said BBI CEO Martin Burns. “The SEM Scanner was developed by synthesizing advanced engineering principles with the practical needs of nurses,” said Dr. William Kaiser, a professor of electrical engineering at UCLA and co-director of the UCLA Wireless Health Institute. “The device actually traces its roots to the NASA space program,” adds Dr. Kaiser, who formerly worked as an engineer at NASA’s Jet Propulsion Laboratory. “The concept of sensors that make the invisible visible began with the development of seismometers for the Mars Exploration Rover landing craft that can help scientists envision the planet’ interior structure by detecting seismic waves generated by deep earthquakes.

The Wireless Health Institute adapted that concept and worked with Dr.

Barbara Bates-Jensen to apply it to the needs of nurses, so that they can visualize unseen inflammation and treat it early to prevent pressure ulcers from developing.” BBI is working with the FDA to make the SEM Scanner available in the US market in 2016. About Pressure UlcersPressure ulcers are a common medical problem that can lead to pain, disfigurement, infection and death.

Also known as bedsores, pressure sores or decubitis ulcers, pressure ulcers are an area of localized damage to the skin and underlying tissue – usually around an area of bony prominence, such as the sacrum, coccyx, heels, and hips – that results from pressure involving shear and/or friction.

Across Europe and the United States, it is estimated that 18%-25% of patients in both acute care and long-term care settings suffer from pressure ulcers, disproportionately impacting the elderly and patients with limited mobility.

There are some 2.5 million pressure ulcer cases annually in the European Union, with nearly 500,000 of those cases in the United Kingdom: a 2.1bn problem to the NHS.
In the U.S., some 2.5 million Americans develop pressure ulcers annually in acute care facilities, and 60,000 Americans die annually from pressure ulcer complications such as cancer, sepsis, cellulitis, and MRSA. About BBIBBI, LLC, focuses on developing solutions for wound care, orthopedic care and real-time data capture, analytics and reporting. Leveraging BBI's passive sensor technology, the company’s portable devices produce actionable data for evidence-based assessments.
Innovation at BBI is realized through collaboration between the company’s research and development and clinical teams, where every team member is an expert in his or her respective field.

BBI applies rigorous scientific, technical and clinical standards to drive product development and address unmet and urgent clinical needs.

BBI is based in Los Angeles and maintains a European office in Manchester, UK. For additional information, visit www.bruinbiometrics.com.

Follow BBI on Twitter at https://twitter.com/bruinbiometrics. About Frost & SullivanFrost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth and achieve best-in-class positions in growth, innovation and leadership.

The company's Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined research and best-practice models to drive the generation, evaluation and implementation of powerful growth strategies.

Frost & Sullivan leverages 50 years of experience in partnering with Global 1000 companies, emerging businesses and the investment community from more than 40 offices on six continents.

To join our Growth Partnership, please visit http://www.frost.com. # # # BBI Company Contact:Martin BurnsChief Executive Officer(310) 268-9494mburns@bruinbiometrics.com Media Contacts:Tony FaccendaBite07496919599tony.faccenda@bitecommunications.com
A vulnerability in Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to make the IMC IP interface inaccessible. The vulnerability is due to incomplete sanitization of input for certain para...
Product Defect Fixed releases availability Cisco SocialMiner CSCux41444 Cisco WebEx Meetings Server versions 1.x CSCux41312 2.5MR6 (Available)2.6MR1 (28-Jan-2016) Cisco WebEx Meetings Server versions 2.x CSCux41312 2.5MR6 (Available)2.6MR1 (28-Jan-20...
Cambridge UK, 26 October 2015 – A team from Redgate Software, the Cambridge UK based company behind the world’s leading SQL Server and .NET development tools, is devoting a week to work on the code for an open source biometric fingerprint system that will improve the lives of the poor in the developing world.The system is used by SimPrints, a non profit tech company working with the Gates Foundation and charities like Médecins Sans Frontières to design a low cost biometric scanner that can be deployed in the field. With the scanner, a health worker can swipe a patient’s fingerprint to find and view the correct health records on a mobile device, either online or offline. The benefits in developing countries, where the lack of official identity documents like birth certificates or social security numbers can restrict access to healthcare, are obvious.

The SimPrints scanner works with most of the mobile tools used by health workers around the world and has the potential to dramatically improve vaccination coverage, TB monitoring, and maternal healthcare. The idea to help SimPrints is part of Down Tools Week, Redgate’s regular hackweek, where software developers, testers, UX designers, and project managers literally down tools to spend five days working on inspirational projects. The proposal was suggested to Redgate by Tristram Norman, the CTO of SimPrints, who saw an opportunity for the technology to take a big leap forward. “Our scanner uses SourceAFIS, the best open source automatic fingerprint identification system available,” he explains. “The codebase behind it is written in C#, but we want to rewrite it in C so that it works better with native Android which runs most of the mobile tools used by health workers around the world.” Tristram Norman calculated that it would take a single developer around 55 days to rewrite the source code – but that it might be possible for a team of Redgate developers to complete the task during Down Tools Week. The idea was suggested internally at Redgate and a dozen developers and testers signed up to work on it.

The aim is rewrite the code in just five days in the first week of November and have a version working on the SimPrints Scanner so that it can be tested in the field. “We’re really excited about this,” says Jeff Foster, Head of Product Engineering at Redgate. “Down Tools Week is all about giving people the opportunity to expand their skills in new areas.

The team working on the SimPrints project have a big task ahead of them, but there are lots of reasons to succeed and we’ll be providing all the help we can.” “The potential is enormous,” adds Tristram Norman. “To have such a big team from Redgate focused solely on SimPrints for a week will mean we can shorten our development schedule and get our technology in use sooner in places like Bangladesh and Zambia where it’s desperately needed.” Even if all the porting work isn’t completed within the hackweek at Redgate, the leap forward provided by a sustained week of effort from a large team of developers brings the challenge from difficult to possible in a short space of time. Professor Alain Labrique, Director of Johns Hopkins University Global mHealth Initiative, has already called SimPrints ‘a real game-changer for the foot soldiers of global health’.

The new initiative between Redgate and SimPrints means the vision of health workers being able to identify patients quickly and accurately in order to provide the right care is now a lot closer to reality. – ENDS – For further information, please contact:Jeff Foster, Head of Product Engineering, Redgate Softwarejeff.foster@red-gate.com+44 (0)1223 438841 Tristram Norman, CTO, SimPrintstristram@simprints.com Redgate Software makes ingeniously simple software used by 650,000 IT professionals who work with SQL Server, .NET, and Oracle. More than 100,000 companies use Redgate products, including 91% of the Fortune 100. Redgate’s philosophy is to design highly usable, reliable tools which elegantly solve the problems that developers and DBAs face every day. SimPrints is a non-profit tech company committed to improving the lives of the poor.

Backed by the Gates Foundation and UKaid, SimPrints has developed a mobile biometric scanner using open source software to empower the mobile tools used by NGOs and governments around the world, and improve vaccination coverage, TB monitoring, and maternal healthcare projects.
The ​OpenSSL project has published a set of security advisories for vulnerabilities resolved in the OpenSSL library in June and July 2015: CVE CVSS v2* base score Summary CVE-2015-1791 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier. CVE-2015-1793 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)​ An error in the implementation of the alternative certificate chain logic could allow an attacker to cause certain checks on untrusted certificates to be bypassed, such as the CA flag, enabling them to use a valid leaf certificate to act as a CA and "issue" an invalid certificate.​ CVE-2015-1790 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data. CVE-2015-1792 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function. CVE-2015-1788 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P) The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication. CVE-2015-1789 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P) The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback. *CVSS v2 scores provided for backward compatibility with NVD.Junos OS is affected by one or more of these vulnerabilities.  Note that CVE-2014-8176 was also included in an OpenSSL advisory, but no Juniper products use DTLS for communication. ​The following software releases have been​ updated to resolve this specific issue: Junos OS 12.1X44-D55, 12.1X46-D40, 12.1X47-D25​, 12.3R11, 12.3X48-D20, 13.2X51-D40, 13.3R7, 14.1R6, 14.2R4, 15.1R2, 15.1X49-D20​, and all subsequent releases.OpenSSL library has been upgraded to 0.9.8zg in Junos OS 12.1X44-D55, 12.1X46-D40, 12.1X47-D25​, 12.3R11, 12.3X48-D20, 13.2X51-D40 and subsequent releases.OpenSSL library has been upgraded to 1.0.1p in Junos OS 12.1X46-D55, 12.1X47-D45, 12.3X48-D30, 13.3R7, 14.1R6, 14.2R4, 15.1R2, 15.1X49-D20​, and all subsequent releases to resolve all vulnerabilities listed above. Juniper SIRT is not aware of any malicious exploitation of this vulnerability.This issue is being tracked for Junos OS as PRs 1095598, ​1095604​, 1103020 and 1153463 which are visible on the Customer Support website.KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies.​​​Since SSL is used for remote network configuration and management applications such as J-Web and SSL Service for JUNOScript (XNM-SSL), viable workarounds for this issue in Junos may include:Disabling J-Web Disable SSL service for JUNOScript and only use Netconf, which makes use of SSH, to make configuration changes Limit access to J-Web and XNM-SSL from only trusted networks How to obtain fixed software:Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version.
In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame.

For these cases, Service Releases are made available in order to be more timely.
Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release.

Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request.Modification History: 2015-10-14: Initial publication2016-10-05: Update the list of Junos releases which have OpenSSL 1.0.1p or later (i.e added 12.1X46-D55, 12.1X47-D45, 12.3X48-D30). Information for how Juniper Networks uses CVSS can be found at KB16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories"
​Multiple vulnerabilities have been addressed in Junos Space 15.1R1 release.These include cross site scripting (XSS), SQL injection and command injection vulnerabilities.

These vulnerabilities may potentially allow a remote unauthenticated network based attacker with access to Junos Space to execute arbitrary code on Junos Space.

These vulnerabilities were found during internal product testing. These issues have been assigned CVE-2015-7753. OpenJDK runtime was upgraded to 1.7.0 update_79 which resolves: CVE CVSS v2 base score Summary CVE-2014-0429 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) Vulnerability in Java 2D. CVE-2014-0456 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) Vulnerability in Java Hotspot. CVE-2014-0460 5.8 (AV:N/AC:M/Au:N/C:P/I:P/A:N) Vulnerability in JNDI. CVE-2014-0453 4.0 (AV:N/AC:H/Au:N/C:P/I:P/A:N) Vulnerability in Java Security. Following vulnerability was resolved in OpenNMS software included with Junos Space: CVE CVSS v2 base score Summary CVE-2015-0975​ 6.5 ​(CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) OpenNMS Authenticated XXE ​​​KVM Package​ was upgraded to kvm-83-273.el5.centos.x86_64.rpm which resolves the following vulnerability: CVE CVSS v2 base score Summary CVE-2015-3209 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) Heap-based buffer overflow vulnerability in the PCNET controller in QEMU. Mozilla NSS Package​ was upgraded to nss-3.18.0-6.el5_11 which resolves the following vulnerability: CVE CVSS v2 base score Summary CVE-2014-1568 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) NSS does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures. Apache HTTP Server was upgraded to 2.2.31 resolving the following issues: CVE CVSS v2 base score Summary CVE-2013-2249 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) Vulnerability in Apache mod_session_dbd module. CVE-2013-6438 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) Denial of service in Apache mod_dav module. CVE-2014-0098 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) Denial of service in Apache mod_log_config module. MySQL was upgraded to 5.6.23 which resolves the following vulnerabilities that may pose a risk to MySQL as used in Junos Space:​ CVE CVSS v2 base score Summary CVE-2014-6491 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) Vulnerability in MySQL Server related to SERVER:SSL:yaSSL. CVE-2014-6500 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) Vulnerability in MySQL Server related to SERVER:SSL:yaSSL. CVE-2015-0501 5.7 (AV:N/AC:M/Au:M/C:N/I:N/A:C) Vulnerability in MySQL Server related to Server : Compiling. CVE-2014-6478 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N) Vulnerability in MySQL Server related to SERVER:SSL:yaSSL. CVE-2014-6494 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P) Vulnerability in MySQL Server related to CLIENT:SSL:yaSSL. CVE-2014-6495 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P) Vulnerability in MySQL Server related to SERVER:SSL:yaSSL. CVE-2014-6496 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P) Vulnerability in MySQL Server related to CLIENT:SSL:yaSSL. CVE-2014-6559 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N) Vulnerability in MySQL Server related to C API SSL CERTIFICATE HANDLING. CVE-2015-2620 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N) Vulnerability in MySQL Server related to Server : Security : Privileges. CVE-2013-5908 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P) Vulnerability in MySQL Server related to Error Handling. The following software releases have been updated to resolve these issues: Junos Space 15.1R1, and all subsequent releases.​CVE-2015-0975​ is being tracked as PR 1060097.CVE-2015-3209​ is being tracked as PR ​1067419.​​OpenJDK JRE upgrade is being tracked as PR 987​851.Apache upgrade is being tracked as PR 987853.MySQL upgrade is being tracked as PR 987852.These PRs are visible on the Customer Support website.​KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies.​​As a workaround, use access lists or firewall filters to limit access to the device, so that it can only be accessed from trusted hosts which are restricted from accessing potentially hazardous sites and services. Restrict access to only highly trusted administrators.To mitigate XSS vulnerabilities with Junos Space use a dedicated client and dedicated web browser that is not used to access other sites.Information for how Juniper Networks uses CVSS can be found at KB16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories"