/
Release Notes for Snare Central v7.4.3

Release Notes for Snare Central v7.4.3

Snare Central v7.4.3 was released on 14th February 2019.

Snare Central incorporates the Agent Management Console (AMC), the v2.2.1 Reflector, and the v1.0.3 Snare Agent Manager (SAM).

Change Log

New Features

  • Snare Server 7.4.3 is a patch release that includes bug fixes and operating system security updates. No significant new features have been added.

Enhancements

  • The 'mlocate' binary and datastore will be removed when this update is applied. Although the mlocate tool is occasionally useful in system administrative activities, the value does not justify the disk space required in the /var partition.

Bug Fixes

  • Reflecting data to TLS destinations from a Snare Server, can be disrupted if the remote server terminates the connection (for example, a reboot of the destination server). Until the source reflector service restarts, there is a risk that data will not transfer to the destination. The updated reflector binary will solve this issue.
  • Snare Server v7+ collects and stores Windows eventlog data with updated field names for USER, RETURN and SOURCETYPE. Objectives that use the old field names have been updated to use and display the new field contents.

Operating System Updates

PackagePrevious VersionUpdateDetails
apache22.4.7-1ubuntu4.202.4.7-1ubuntu4.21apache2 (2.4.7-1ubuntu4.21) trusty; urgency=medium

* d/p/AuthzProviderAlias-visibility.patch: Allow 'es
to be seen from auth stanzas under virtual hosts (LP: #1529355)
apt1.0.1ubuntu2.181.0.1ubuntu2.19
ca-certificates20170717~14.04.120170717~14.04.2
ghostscript9.26~dfsg+0-0ubuntu0.14.04.19.26~dfsg+0-0ubuntu0.14.04.4ghostscript (9.26~dfsg+0-0ubuntu0.14.04.4) trusty-security; urgency=medium

* SECURITY UPDATE: code execution vulnerability
- debian/patches/CVE-2019-6116.patch: address .force* operators exposure in Resource/Init/gs_diskn.ps, Resource/Init/gs_dps1.ps, Resource/Init/gs_fntem.ps, Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps, Resource/Init/gs_lev2.ps, Resource/Init/gs_pdfwr.ps, Resource/Init/gs_res.ps, Resource/Init/gs_setpd.ps, Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps, Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps, Resource/Init/pdf_ops.ps, psi/int.mak, psi/interp.c, psi/istack.c, psi/istack.h.
- CVE-2019-6116
hhvm3.29.1-1~trusty3.30.2-1~trustyhhvm (3.30.2-1~trusty) trusty; urgency=medium

krb5-locales

libgssapi-krb5-2

libk5crypto3

libkrb5-3

libkrb5support0

1.12+dfsg-2ubuntu5.31.12+dfsg-2ubuntu5.4krb5 (1.12+dfsg-2ubuntu5.4) trusty-security; urgency=medium

* SECURITY UPDATE: DoS (out-of-bounds read) via a crafted string
- debian/patches/CVE-2015-8629.patch: Verify decode kadmin C strings
- CVE-2015-8629
* SECURITY UPDATE: DoS (NULL pointer dereference) by specifying KADM5_POLICY with a NULL policy name
- debian/patches/CVE-2015-8630.patch: Check for null kadm5 policy name
- CVE-2015-8630
* SECURITY UPDATE: DoS (memory consumption) via a request specifying a NULL principal name
- debian/patches/CVE-2015-8631.patch: Fix leaks in kadmin server stubs
- CVE-2015-8631
* SECURITY UPDATE: DoS (NULL pointer dereference) via a crafted request to modify a principal
- debian/patches/CVE-2016-3119.patch: Fix LDAP null dereference on empty arg
- CVE-2016-3119
* SECURITY UPDATE: DoS (NULL pointer dereference) via an S4U2Self request
- debian/patches/CVE-2016-3120.patch: Fix S4U2Self KDC crash when anon is restricted
- CVE-2016-3120
* SECURITY UPDATE: KDC assertion failure
- debian/patches/CVE-2017-11368-1.patch: Prevent KDC unset status assertion failures
- debian/patches/CVE-2017-11368-2.patch: Simplify KDC status assignment
- CVE-2017-11368
* SECURITY UPDATE: Double free vulnerability
- debian/patches/CVE-2017-11462.patch: Preserve GSS context on init/accept failure
- CVE-2017-11462
* SECURITY UPDATE: Authenticated kadmin with permission to add principals to an LDAP Kerberos can DoS or bypass DN container check.
- debian/patches/CVE-2018-5729-CVE-2018-5730.patch: Fix flaws in LDAP DN checking
- CVE-2018-5729
- CVE-2018-5730
libarchive133.1.2-7ubuntu2.63.1.2-7ubuntu2.7libarchive (3.1.2-7ubuntu2.7) trusty-security; urgency=medium

* SECURITY UPDATE: Out-of-bounds read
- debian/patches/CVE-2017-14502.patch: fix in libarchive/archive_read_support_format_rar.c.
- CVE-2017-14502
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2018-1000877.patch: fix in libarchive/archive_read_support_format_rar.c.
- CVE-2018-1000877
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2018-1000878.patch: fix in libarchive/archive_read_support_format_rar.c.
- CVE-2018-1000878

libcups2

libcupsimage2

1.7.2-0ubuntu1.101.7.2-0ubuntu1.11cups (1.7.2-0ubuntu1.11) trusty-security; urgency=medium

* SECURITY UPDATE: predictable session cookies
- debian/patches/CVE-2018-4700.patch: use better seed in cgi-bin/var.c.
- CVE-2018-4700

libgudev-1.0-0

libpam-systemd

libsystemd-daemon0

libsystemd-login0

libudev1

systemd-services

udev

1:204-5ubuntu20.281:204-5ubuntu20.29systemd (204-5ubuntu20.29) trusty; urgency=medium

* d/p/0001-udev-build-by-path-identifiers-for-ATA-devices.patch
create /dev/disk/by-path/ symlinks for (s)ata disks
(LP: #1802525)

libnss3

libnss3-nssdb

2:3.28.4-0ubuntu0.14.04.32:3.28.4-0ubuntu0.14.04.4nss (2:3.28.4-0ubuntu0.14.04.4) trusty-security; urgency=medium

* SECURITY UPDATE: side-channel attack on ECDSA signatures
- debian/patches/CVE-2018-0495.patch: improve ecdsa and dsa in nss/lib/freebl/dsa.c, nss/lib/freebl/ec.c.
- CVE-2018-0495
* SECURITY UPDATE: ServerHello.random is all zero in v2 ClientHello
- debian/patches/CVE-2018-12384-1.patch: fix random logic in nss/lib/ssl/ssl3con.c.
- debian/patches/CVE-2018-12384-2.patch: add tests to nss/gtests/ssl_gtest/ssl_loopback_unittest.cc, nss/gtests/ssl_gtest/ssl_v2_client_hello_unittest.cc.
- CVE-2018-12384
* SECURITY UPDATE: cache side-channel variant of the Bleichenbacher attack
- debian/patches/CVE-2018-12404-1.patch: improve RSA key exchange handling in nss/lib/ssl/ssl3con.c.
- debian/patches/CVE-2018-12404-3.patch: add constant time mp_to_fixlen_octets in nss/gtests/freebl_gtest/mpi_unittest.cc, nss/lib/freebl/mpi/mpi.c, nss/lib/freebl/mpi/mpi.h.
- CVE-2018-12404
libpixman-1-00.30.2-2ubuntu1.10.30.2-2ubuntu1.2pixman (0.30.2-2ubuntu1.2) trusty-security; urgency=medium

* SECURITY UPDATE: general_composite_rect() integer overflow
- debian/patches/CVE-2015-5297-pre1.patch: ensure that iter buffers are aligned to 16 bytes in pixman/pixman-general.c, pixman/pixman-private.h, pixman/pixman-utils.c.
- debian/patches/CVE-2015-5297-pre2.patch: use floating point combiners for all operators that involve divisions in pixman/pixman-general.c.
- debian/patches/CVE-2015-5297-1.patch: fix stack related pointer arithmetic overflow in pixman/pixman-general.c.
- debian/patches/CVE-2015-5297-2.patch: tighten up calculation of temporary buffer sizes in pixman/pixman-general.c.
- debian/patches/disable_test.patch: disable blitters test as the correct CRC is unknown.
- CVE-2015-5297
policykit-10.105-4ubuntu3.14.04.20.105-4ubuntu3.14.04.5policykit-1 (0.105-4ubuntu3.14.04.5) trusty-security; urgency=medium

* SECURITY UPDATE: authorization bypass with large uid
- debian/patches/CVE-2018-19788-1.patch: allow negative uids/gids in PolkitUnixUser and Group objects in src/polkit/polkitunixgroup.c, src/polkit/polkitunixprocess.c, src/polkit/polkitunixuser.c.
- debian/patches/CVE-2018-19788-2.patch: add tests to test/data/etc/group, test/data/etc/passwd, test/data/etc/polkit-1/localauthority/10-test/com.example.pkla, test/polkitbackend/polkitbackendlocalauthoritytest.c.
- debian/patches/CVE-2018-19788-3.patch: allow uid of -1 for a PolkitUnixProcess in src/polkit/polkitunixprocess.c.
- CVE-2018-19788
openssl1.0.1f-1ubuntu2.261.0.1f-1ubuntu2.27openssl (1.0.1f-1ubuntu2.27) trusty-security; urgency=medium

* SECURITY UPDATE: PortSmash side channel attack
- debian/patches/CVE-2018-5407.patch: fix timing vulnerability in crypto/bn/bn_lib.c, crypto/ec/ec_mult.c.
- CVE-2018-5407
* SECURITY UPDATE: timing side channel attack in DSA
- debian/patches/CVE-2018-0734-pre1.patch: address a timing side channel in crypto/dsa/dsa_ossl.c.
- debian/patches/CVE-2018-0734-1.patch: fix timing vulnerability in crypto/dsa/dsa_ossl.c.
- debian/patches/CVE-2018-0734-2.patch: fix mod inverse in crypto/dsa/dsa_ossl.c.
- debian/patches/CVE-2018-0734-3.patch: add a constant time flag in crypto/dsa/dsa_ossl.c.
- CVE-2018-0734
libtiff54.0.3-7ubuntu0.94.0.3-7ubuntu0.10tiff (4.0.3-7ubuntu0.10) trusty-security; urgency=medium

* SECURITY UPDATE: NULL dereference in TIFFPrintDirectory
- debian/patches/CVE-2018-7456.patch: properly handle color channels in libtiff/tif_dirread.c, libtiff/tif_print.c.
- CVE-2018-7456
* SECURITY UPDATE: buffer overflow in LZWDecodeCompat
- debian/patches/CVE-2018-8905.patch: fix logic in libtiff/tif_lzw.c.
- CVE-2018-8905
* SECURITY UPDATE: DoS in TIFFWriteDirectorySec()
- debian/patches/CVE-2018-10963.patch: avoid assertion in libtiff/tif_dirwrite.c.
- CVE-2018-10963
* SECURITY UPDATE: multiple overflows
- debian/patches/CVE-2018-1710x.patch: Avoid overflows in tools/pal2rgb.c, tools/tiff2bw.c, tools/ppm2tiff.c.
- CVE-2018-17100
- CVE-2018-17101
* SECURITY UPDATE: JBIGDecode out-of-bounds write
- debian/patches/CVE-2018-18557.patch: fix issue in libtiff/tif_jbig.c, libtiff/tif_read.c.
- CVE-2018-18557
* SECURITY UPDATE: NULL pointer dereference in LZWDecode
- debian/patches/CVE-2018-18661.patch: add checks to tools/tiff2bw.c.
- CVE-2018-18661
linux-generic3.13.0.163.1733.13.0.164.174
linux-headers-3.13.0-143-generic3.13.0-143.192

linux-headers-3.13.0-1433.13.0-143.192

linux-headers-generic3.13.0.163.1733.13.0.164.174
linux-image-generic3.13.0.163.1733.13.0.164.174
linux-image-server3.13.0.163.1733.13.0.164.174
linux-image-virtual3.13.0.163.1733.13.0.164.174
mlocate0.26-1ubuntu1
NOTE: Although this package has been updated in this Snare Central release, it will be removed during the patch process to save space in the /var filesystem.
mountall2.532.53ubuntu1
python-lxml3.3.3-1ubuntu0.13.3.3-1ubuntu0.2lxml (3.3.3-1ubuntu0.2) trusty-security; urgency=medium

* SECURITY UPDATE: XSS attacks
- Make the cleaner remove javascript URLs that use espacing in in src/lxml/html/clean.py, src/lxml/html/tests/test_clean.txt.
- CVE-2018-19787
tzdata2018g-0ubuntu0.14.042018i-0ubuntu0.14.04tzdata (2018i-0ubuntu0.14.04) trusty; urgency=medium

* New upstream version, affecting past and future timestamps:
- São Tomé and Príncipe switches from +01 to +00 on 2019-01-01.
- Qyzylorda, Kazakhstan moved from +06 to +05 on 2018-12-21.
- A new zone Asia/Qostanay has been added, because Qostanay, Kazakhstan didn't move.
- Metlakatla, Alaska observes PST this winter only.




Related content

Release Notes for Snare Central v7.4.4
Release Notes for Snare Central v7.4.4
More like this
Release Notes for Snare Central v7.5.2
Release Notes for Snare Central v7.5.2
More like this
Release Notes for Snare Central v7.1.2
Release Notes for Snare Central v7.1.2
More like this
Release Notes for Snare Linux Agent v5.3.0
Release Notes for Snare Linux Agent v5.3.0
More like this
Release Notes for Snare Epilog Agent v5.0.2
Release Notes for Snare Epilog Agent v5.0.2
More like this
Release Notes for Snare Windows Agent v5.3.0
Release Notes for Snare Windows Agent v5.3.0
More like this