Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Update Details

Security Intelligence Center
Print

Update #3205 (09/05/2019)

6 new signatures:

MEDIUMHTTP:EYOU-CMS-FILE-ULHTTP: Eyou CMS File Upload
HIGHHTTP:MISC:UNITRENDS-UEB-RCEHTTP: Unitrends UEB Remote Code Execution
HIGHAPP:MISC:DISKSAVVY-BOFAPP: Disksavvy Enterprise Server Remote Code Execution
HIGHHTTP:CTS:CVE-2018-8736-PRI-ESCHTTP: Nagios XI 5.2.x through 5.4.x before 5.4.13 privilege escalation
MEDIUMHTTP:STC:ADOBE:CVE-2019-8004-IDHTTP: Adobe Acrobat Reader CVE-2019-8004 Information Disclosure
HIGHDOS:DIGIUM-PJSIP-DOSDOS: Digium Asterisk PJSIP In-Dialog MESSAGE Request Denial-of-Service

1 updated signature:

MEDIUMHTTP:STC:ADOBE:CVE-2019-8106-IDHTTP: Adobe Acrobat CVE-2019-8106 Out Of Bounds Read

4 renamed signatures:

HTTP2:CVE-2019-0199-DOS->HTTP2:APACHE-CVE-2019-0199-DOS
HTTP2:HTTP2-HAPROXY-BO->HTTP2:HAPROXY-BO
HTTP2:TOMCAT-HTTP2-DOS->HTTP2:APACHE-TOMCAT-DOS
HTTP2:MICOSOFT-HTTP2-DOS->HTTP2:MICROSOFT-DOS


Details of the signatures included within this bulletin:


HTTP:EYOU-CMS-FILE-UL - HTTP: Eyou CMS File Upload

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against eyou CMS. A successful attack can lead to Information Disclosure.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:MISC:UNITRENDS-UEB-RCE - HTTP: Unitrends UEB Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Unitrends UEB. A successful attack can lead to Remote Code Execution

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • url: https://support.unitrends.com/UnitrendsBackup/s/article/000006002
  • url: https://support.unitrends.com/UnitrendsBackup/s/article/000001150
  • cve: CVE-2018-6328
  • url: http://blog.redactedsec.net/exploits/2018/01/29/UEB9.html

APP:MISC:DISKSAVVY-BOF - APP: Disksavvy Enterprise Server Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Disksavvy Enterprise Server. A successful attack can lead to Remote Code Execution.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-6481

Affected Products:

  • Flexense disksavvy_enterprise 10.4.18

HTTP:CTS:CVE-2018-8736-PRI-ESC - HTTP: Nagios XI 5.2.x through 5.4.x before 5.4.13 privilege escalation

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Nagios XI. A successful attack can lead to arbitrary code execution.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-8736
  • url: http://blog.redactedsec.net/exploits/2018/04/26/nagios.html

Affected Products:

  • Nagios nagios_xi 5.2.2
  • Nagios nagios_xi 5.4.9
  • Nagios nagios_xi 5.3.0
  • Nagios nagios_xi 5.4.8
  • Nagios nagios_xi 5.3.1
  • Nagios nagios_xi 5.3.2
  • Nagios nagios_xi 5.3.3
  • Nagios nagios_xi 5.4.10
  • Nagios nagios_xi 5.3.4
  • Nagios nagios_xi 5.2.8
  • Nagios nagios_xi 5.4.3
  • Nagios nagios_xi 5.4.2
  • Nagios nagios_xi 5.4.1
  • Nagios nagios_xi 5.2.5
  • Nagios nagios_xi 5.4.0
  • Nagios nagios_xi 5.2.4
  • Nagios nagios_xi 5.4.7
  • Nagios nagios_xi 5.2.7
  • Nagios nagios_xi 5.4.6
  • Nagios nagios_xi 5.2.6
  • Nagios nagios_xi 5.4.5
  • Nagios nagios_xi 5.2.1
  • Nagios nagios_xi 5.2.9
  • Nagios nagios_xi 5.4.4
  • Nagios nagios_xi 5.2.0
  • Nagios nagios_xi 5.4.12
  • Nagios nagios_xi 5.4.11
  • Nagios nagios_xi 5.2.3

HTTP2:MICROSOFT-DOS - HTTP2: Microsoft HTTP/2 Denial Of Services

Severity: HIGH

Description:

A denial-of-service vulnerability exists in Microsoft Windows' HTTP 2.0 protocol stack. Successful exploitation of this vulnerability can cause the target system to become unresponsive, resulting in a denial-of-service condition.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, idp-4.2.110101203, idp-5.1.0, j-series-9.5, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-4.2.110100823, isg-3.5.141818, isg-3.5.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2016-0150

Affected Products:

  • Microsoft windows_10 -
  • Microsoft windows_10 1511

HTTP2:APACHE-TOMCAT-DOS - HTTP2: Apache Tomcat HTTP2 Connection Window Exhaustion Denial of Service

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against HTTP/2 module of Apache Tomcat. A successful attack can result in a denial-of-service condition.

Supported On:

srx-branch-19.2, vsrx3bsd-19.2, srx-17.3, vsrx-17.4, srx-branch-17.4, srx-17.4, vsrx-15.1, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2

References:

  • bugtraq: 108874
  • cve: CVE-2019-10072

Affected Products:

  • Apache tomcat 9.0.4
  • Apache tomcat 8.5.33
  • Apache tomcat 8.5.25
  • Apache tomcat 9.0.13
  • Apache tomcat 9.0.5
  • Apache tomcat 8.5.30
  • Apache tomcat 8.5.24
  • Apache tomcat 8.5.6
  • Apache tomcat 9.0.2
  • Apache tomcat 8.5.31
  • Apache tomcat 8.5.13
  • Apache tomcat 8.5.7
  • Apache tomcat 8.5.36
  • Apache tomcat 8.5.15
  • Apache tomcat 9.0.3
  • Apache tomcat 8.5.10
  • Apache tomcat 8.5.40
  • Apache tomcat 8.5.4
  • Apache tomcat 9.0.0
  • Apache tomcat 8.5.37
  • Apache tomcat 8.5.21
  • Apache tomcat 8.5.5
  • Apache tomcat 8.5.9
  • Apache tomcat 9.0.1
  • Apache tomcat 8.5.34
  • Apache tomcat 8.5.20
  • Apache tomcat 8.5.2
  • Apache tomcat 8.5.35
  • Apache tomcat 8.5.23
  • Apache tomcat 9.0.19
  • Apache tomcat 8.5.22
  • Apache tomcat 8.5.0
  • Apache tomcat 8.5.16
  • Apache tomcat 8.5.1
  • Apache tomcat 8.5.11
  • Apache tomcat 8.5.27
  • Apache tomcat 8.5.3
  • Apache tomcat 8.5.38
  • Apache tomcat 9.0.14
  • Apache tomcat 9.0.8
  • Apache tomcat 8.5.29
  • Apache tomcat 8.5.39
  • Apache tomcat 8.5.26
  • Apache tomcat 9.0.15
  • Apache tomcat 9.0.9
  • Apache tomcat 8.5.28
  • Apache tomcat 8.5.18
  • Apache tomcat 9.0.16
  • Apache tomcat 8.5.19
  • Apache tomcat 8.5.12
  • Apache tomcat 9.0.17
  • Apache tomcat 8.5.17
  • Apache tomcat 8.5.32
  • Apache tomcat 9.0.10
  • Apache tomcat 9.0.6
  • Apache tomcat 9.0.11
  • Apache tomcat 9.0.12
  • Apache tomcat 9.0.7
  • Apache tomcat 8.5.14
  • Apache tomcat 8.5.8

HTTP2:HAPROXY-BO - HTTP2: HAProxy HTTP/2 Frame Size Heap Buffer Overflow

Severity: HIGH

Description:

A heap-based buffer overflow vulnerability exists in HAProxy. A remote, unauthenticated attacker could exploit this vulnerability by sending a malicious request to the target server. Successful exploitation may result in denial of service conditions.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, idp-4.2.110101203, idp-5.1.0, j-series-9.5, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-4.2.110100823, isg-3.5.141818, isg-3.5.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-10184

Affected Products:

  • Haproxy haproxy 1.3.4
  • Haproxy haproxy -
  • Haproxy haproxy 1.1.0
  • Haproxy haproxy 1.2.18
  • Haproxy haproxy 1.7.1
  • Haproxy haproxy 1.6.9
  • Haproxy haproxy 1.3.18
  • Haproxy haproxy 1.5.4
  • Haproxy haproxy 1.6.14
  • Haproxy haproxy 1.1.2
  • Haproxy haproxy 1.5.6
  • Haproxy haproxy 1.1.4
  • Haproxy haproxy 1.3.12.3
  • Haproxy haproxy 1.5.0
  • Haproxy haproxy 1.6.10
  • Haproxy haproxy 1.1.6
  • Haproxy haproxy 1.7.0
  • Haproxy haproxy 1.6.3
  • Haproxy haproxy 1.5.2
  • Haproxy haproxy 1.6.12
  • Haproxy haproxy 1.3.13.1
  • Haproxy haproxy 1.1.10
  • Haproxy haproxy 1.2.10.1
  • Haproxy haproxy 1.3.11.2
  • Haproxy haproxy 1.6.1
  • Haproxy haproxy 1.3.15.3
  • Haproxy haproxy 1.1.12
  • Haproxy haproxy 1.3.8
  • Haproxy haproxy 1.2.6
  • Haproxy haproxy 1.6.7
  • Haproxy haproxy 1.3.15.1
  • Haproxy haproxy 1.1.14
  • Haproxy haproxy 1.2.4
  • Haproxy haproxy 1.3.15.11
  • Haproxy haproxy 1.6.5
  • Haproxy haproxy 1.5.8
  • Haproxy haproxy 1.5.9
  • Haproxy haproxy 1.1.16
  • Haproxy haproxy 1.2.2
  • Haproxy haproxy 1.5.14
  • Haproxy haproxy 1.2.11.1
  • Haproxy haproxy 1.3.15.5
  • Haproxy haproxy 1.1.18
  • Haproxy haproxy 1.2.0
  • Haproxy haproxy 1.5.16
  • Haproxy haproxy 1.8.5
  • Haproxy haproxy 1.3.6.1
  • Haproxy haproxy 1.3.10
  • Haproxy haproxy 1.3.14.7
  • Haproxy haproxy 1.5.10
  • Haproxy haproxy 1.8.7
  • Haproxy haproxy 1.3.23
  • Haproxy haproxy 1.3.15.7
  • Haproxy haproxy 1.3.16
  • Haproxy haproxy 1.6
  • Haproxy haproxy 1.3.14.5
  • Haproxy haproxy 1.3.12.1
  • Haproxy haproxy 1.5.12
  • Haproxy haproxy 1.8.1
  • Haproxy haproxy 1.0.0
  • Haproxy haproxy 1.3.21
  • Haproxy haproxy 1.3.14
  • Haproxy haproxy 1.3.14.3
  • Haproxy haproxy 1.3.9
  • Haproxy haproxy 1.1.25
  • Haproxy haproxy 1.3.14.13
  • Haproxy haproxy 1.8.3
  • Haproxy haproxy 1.0.2
  • Haproxy haproxy 1.3.10.2
  • Haproxy haproxy 1.3.14.1
  • Haproxy haproxy 1.1.27
  • Haproxy haproxy 1.3.14.11
  • Haproxy haproxy 1.4.27
  • Haproxy haproxy 1.2.5.1
  • Haproxy haproxy 1.2.10
  • Haproxy haproxy 1.5.18
  • Haproxy haproxy 1.5.7
  • Haproxy haproxy 1.1.9
  • Haproxy haproxy 1.4.25
  • Haproxy haproxy 1.2.12
  • Haproxy haproxy 1.3.3
  • Haproxy haproxy 1.1.23
  • Haproxy haproxy 1.1.21
  • Haproxy haproxy 1.3.8.2
  • Haproxy haproxy 1.2.14
  • Haproxy haproxy 1.3.1
  • Haproxy haproxy 1.3.13
  • Haproxy haproxy 1.7.8
  • Haproxy haproxy 1.7.11
  • Haproxy haproxy 1.3.7
  • Haproxy haproxy 1.3.15.9
  • Haproxy haproxy 1.3.5
  • Haproxy haproxy 1.1.1
  • Haproxy haproxy 1.3.8.1
  • Haproxy haproxy 1.6.8
  • Haproxy haproxy 1.3.14.9
  • Haproxy haproxy 1.5.5
  • Haproxy haproxy 1.3.12
  • Haproxy haproxy 1.1.3
  • Haproxy haproxy 1.7.7
  • Haproxy haproxy 1.3.15.8
  • Haproxy haproxy 1.1.5
  • Haproxy haproxy 1.5.1
  • Haproxy haproxy 1.1.7
  • Haproxy haproxy 1.6.2
  • Haproxy haproxy 1.5.3
  • Haproxy haproxy 1.6.11
  • Haproxy haproxy 1.1.11
  • Haproxy haproxy 1.7.6
  • Haproxy haproxy 1.6.0
  • Haproxy haproxy 1.2.7.1
  • Haproxy haproxy 1.6.13
  • Haproxy haproxy 1.3.13.2
  • Haproxy haproxy 1.3.19
  • Haproxy haproxy 1.2.9
  • Haproxy haproxy 1.3.11.3
  • Haproxy haproxy 1.6.6
  • Haproxy haproxy 1.1.15
  • Haproxy haproxy 1.2.7
  • Haproxy haproxy 1.3.15.10
  • Haproxy haproxy 1.3.11.1
  • Haproxy haproxy 1.6.4
  • Haproxy haproxy 1.3.15.6
  • Haproxy haproxy 1.1.17
  • Haproxy haproxy 1.7.5
  • Haproxy haproxy 1.2.5
  • Haproxy haproxy 1.5.15
  • Haproxy haproxy 1.3.15.4
  • Haproxy haproxy 1.1.19
  • Haproxy haproxy 1.2.3
  • Haproxy haproxy 1.5.17
  • Haproxy haproxy 1.8.4
  • Haproxy haproxy 1.3.11
  • Haproxy haproxy 1.2.1
  • Haproxy haproxy 1.5.11
  • Haproxy haproxy 1.8.6
  • Haproxy haproxy 1.3.22
  • Haproxy haproxy 1.3.17
  • Haproxy haproxy 1.7.4
  • Haproxy haproxy 1.3.14.6
  • Haproxy haproxy 1.7.10
  • Haproxy haproxy 1.5.13
  • Haproxy haproxy 1.2.16
  • Haproxy haproxy 1.7.3
  • Haproxy haproxy 1.3.20
  • Haproxy haproxy 1.3.15
  • Haproxy haproxy 1.3.14.4
  • Haproxy haproxy 1.1.24
  • Haproxy haproxy 1.3.14.8
  • Haproxy haproxy 1.8.2
  • Haproxy haproxy 1.0.1
  • Haproxy haproxy 1.3.11.4
  • Haproxy haproxy 1.3.14.2
  • Haproxy haproxy 1.3.12.2
  • Haproxy haproxy 1.1.26
  • Haproxy haproxy 1.3.14.12
  • Haproxy haproxy 1.3.10.1
  • Haproxy haproxy 1.2.5.2
  • Haproxy haproxy 1.8.0
  • Haproxy haproxy 1.3.12.4
  • Haproxy haproxy 1.1.20
  • Haproxy haproxy 1.3.14.10
  • Haproxy haproxy 1.3.15.2
  • Haproxy haproxy 1.4.26
  • Haproxy haproxy 1.2.11
  • Haproxy haproxy 1.1.22
  • Haproxy haproxy 1.2.8
  • Haproxy haproxy 1.1.8
  • Haproxy haproxy 1.2.13
  • Haproxy haproxy 1.3.2
  • Haproxy haproxy 1.3.14.14
  • Haproxy haproxy 1.7.9
  • Haproxy haproxy 1.7.2
  • Haproxy haproxy 1.2.15
  • Haproxy haproxy 1.1.13
  • Haproxy haproxy 1.3.0
  • Haproxy haproxy 1.2.13.1
  • Haproxy haproxy 1.2.17
  • Haproxy haproxy 1.3.6
  • Haproxy haproxy 1.4.7
  • Haproxy haproxy 1.4.6
  • Haproxy haproxy 1.4.15
  • Haproxy haproxy 1.4.5
  • Haproxy haproxy 1.4.14
  • Haproxy haproxy 1.4.4
  • Haproxy haproxy 1.4.17
  • Haproxy haproxy 1.4.3
  • Haproxy haproxy 1.4.16
  • Haproxy haproxy 1.4.24
  • Haproxy haproxy 1.4.2
  • Haproxy haproxy 1.4.11
  • Haproxy haproxy 1.4.1
  • Haproxy haproxy 1.4.10
  • Haproxy haproxy 1.4.0
  • Haproxy haproxy 1.4.13
  • Redhat enterprise_linux 7.5
  • Haproxy haproxy 1.4.12
  • Haproxy haproxy 1.4.20
  • Redhat enterprise_linux 7.4
  • Haproxy haproxy 1.4.21
  • Haproxy haproxy 1.4.22
  • Haproxy haproxy 1.4.23
  • Haproxy haproxy 1.4.9
  • Redhat enterprise_linux 7.0
  • Redhat enterprise_linux 7.3
  • Haproxy haproxy 1.4.8
  • Haproxy haproxy 1.5
  • Haproxy haproxy 1.4.19
  • Haproxy haproxy 1.4
  • Haproxy haproxy 1.4.18

HTTP:STC:ADOBE:CVE-2019-8004-ID - HTTP: Adobe Acrobat Reader CVE-2019-8004 Information Disclosure

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to Information Disclosure.

Supported On:

idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, vsrx3bsd-19.2, vsrx-12.1, srx-branch-12.1, srx-branch-19.1, vsrx-15.1, srx-12.1

References:

  • url: https://helpx.adobe.com/security/products/acrobat/apsb19-41.html
  • cve: CVE-2019-8004

Affected Products:

  • Adobe acrobat_reader_dc 17.011.30059
  • Adobe acrobat_dc 15.006.30198
  • Adobe acrobat_dc 15.006.30498
  • Adobe acrobat_dc 19.008.20074
  • Adobe acrobat_reader_dc 17.011.30106
  • Adobe acrobat_dc 17.011.30110
  • Adobe acrobat_dc 17.011.30102
  • Adobe acrobat_reader_dc 18.011.20038
  • Adobe acrobat_dc 19.008.20081
  • Adobe acrobat_dc 15.006.30417
  • Adobe acrobat_reader_dc 15.010.20059
  • Adobe acrobat_dc 18.011.20058
  • Adobe acrobat_reader_dc 15.006.30094
  • Adobe acrobat_reader_dc 18.009.20050
  • Adobe acrobat_dc 15.017.20050
  • Adobe acrobat_dc 17.009.20058
  • Adobe acrobat_reader_dc 15.006.30198
  • Adobe acrobat_dc 15.006.30464
  • Adobe acrobat_reader_dc 15.006.30475
  • Adobe acrobat_dc 17.011.30059
  • Adobe acrobat_reader_dc 15.009.20069
  • Adobe acrobat_reader_dc 15.010.20060
  • Adobe acrobat_dc 15.006.30280
  • Adobe acrobat_dc 19.010.20099
  • Adobe acrobat_reader_dc 15.006.30498
  • Adobe acrobat_dc 18.011.20038
  • Adobe acrobat_dc 15.006.30243
  • Adobe acrobat_dc 17.011.30140
  • Adobe acrobat_dc 19.010.20100
  • Adobe acrobat_reader_dc 17.011.30066
  • Adobe acrobat_reader_dc 15.006.30280
  • Adobe acrobat_dc 18.009.20050
  • Adobe acrobat_reader_dc 15.006.30464
  • Adobe acrobat_reader_dc 15.006.30243
  • Adobe acrobat_dc 15.016.20039
  • Adobe acrobat_reader_dc 17.009.20058
  • Adobe acrobat_reader_dc 19.010.20099
  • Adobe acrobat_reader_dc 19.010.20100
  • Adobe acrobat_reader_dc 19.012.20034
  • Adobe acrobat_dc 15.006.30121
  • Adobe acrobat_reader_dc 15.020.20042
  • Adobe acrobat_reader_dc 17.011.30142
  • Adobe acrobat_dc 19.012.20034
  • Adobe acrobat_reader_dc 17.012.20098
  • Adobe acrobat_reader_dc 17.011.30080
  • Adobe acrobat_reader_dc 15.023.20056
  • Adobe acrobat_dc 19.010.20091
  • Adobe acrobat_reader_dc 17.011.30140
  • Adobe acrobat_dc 15.023.20056
  • Adobe acrobat_dc 15.006.30097
  • Adobe acrobat_reader_dc 17.011.30127
  • Adobe acrobat_reader_dc 15.016.20039
  • Adobe acrobat_dc 17.011.30080
  • Adobe acrobat_reader_dc 15.006.30097
  • Adobe acrobat_reader_dc 15.006.30121
  • Adobe acrobat_reader_dc 18.011.20040
  • Adobe acrobat_dc 17.011.30127
  • Adobe acrobat_dc 17.011.30142
  • Adobe acrobat_dc 17.011.30068
  • Adobe acrobat_dc 15.008.20082
  • Adobe acrobat_reader_dc 19.010.20091
  • Adobe acrobat_reader_dc 17.011.30068
  • Adobe acrobat_dc 15.006.30482
  • Adobe acrobat_reader_dc 15.006.30355
  • Adobe acrobat_dc 15.006.30173
  • Adobe acrobat_reader_dc 15.008.20082
  • Adobe acrobat_dc 17.012.20095
  • Adobe acrobat_reader_dc 17.011.30110
  • Adobe acrobat_dc 17.011.30099
  • Adobe acrobat_reader_dc 17.009.20044
  • Adobe acrobat_reader_dc 17.011.30099
  • Adobe acrobat_reader_dc 15.006.30482
  • Adobe acrobat_dc 17.011.30079
  • Adobe acrobat_dc 19.008.20071
  • Adobe acrobat_dc 15.006.30355
  • Adobe acrobat_dc 15.006.30457
  • Adobe acrobat_dc 15.010.20060
  • Adobe acrobat_reader_dc 15.006.30457
  • Adobe acrobat_reader_dc 19.008.20080
  • Adobe acrobat_reader_dc 15.006.30497
  • Adobe acrobat_dc 19.008.20080
  • Adobe acrobat_reader_dc 18.011.20063
  • Adobe acrobat_dc 15.006.30418
  • Adobe acrobat_dc 15.006.30448
  • Adobe acrobat_dc 17.011.30066
  • Adobe acrobat_reader_dc 19.010.20069
  • Adobe acrobat_reader_dc 15.006.30495
  • Adobe acrobat_dc 15.017.20053
  • Adobe acrobat_dc 17.009.20044
  • Adobe acrobat_reader_dc 17.011.30079
  • Adobe acrobat_dc 19.010.20069
  • Adobe acrobat_dc 15.006.30493
  • Adobe acrobat_dc 15.006.30279
  • Adobe acrobat_dc 17.012.20096
  • Adobe acrobat_reader_dc 15.006.30493
  • Adobe acrobat_reader_dc 15.023.20070
  • Adobe acrobat_reader_dc 15.006.30172
  • Adobe acrobat_dc 17.011.30105
  • Adobe acrobat_reader_dc 19.008.20071
  • Adobe acrobat_dc 15.006.30495
  • Adobe acrobat_dc 15.023.20070
  • Adobe acrobat_dc 15.006.30174
  • Adobe acrobat_dc 17.012.20098
  • Adobe acrobat_dc 18.011.20063
  • Adobe acrobat_reader_dc 15.006.30174
  • Adobe acrobat_dc 15.006.30475
  • Adobe acrobat_reader_dc 19.008.20074
  • Adobe acrobat_dc 15.006.30497
  • Adobe acrobat_dc 15.006.30172
  • Adobe acrobat_reader_dc 15.006.30279
  • Adobe acrobat_reader_dc 15.017.20053
  • Adobe acrobat_dc 15.006.30416
  • Adobe acrobat_reader_dc 17.011.30105
  • Adobe acrobat_reader_dc 17.011.30113
  • Adobe acrobat_dc 18.011.20040
  • Adobe acrobat_reader_dc 15.010.20056
  • Adobe acrobat_dc 19.010.20098
  • Adobe acrobat_reader_dc 15.006.30461
  • Adobe acrobat_reader_dc 15.006.30244
  • Adobe acrobat_dc 18.011.20055
  • Adobe acrobat_reader_dc 15.006.30201
  • Adobe acrobat_reader_dc 17.011.30065
  • Adobe acrobat_reader_dc 15.006.30417
  • Adobe acrobat_dc 17.000.0000
  • Adobe acrobat_dc 17.011.30113
  • Adobe acrobat_dc 15.010.20056
  • Adobe acrobat_dc 15.006.30244
  • Adobe acrobat_dc 17.011.30143
  • Adobe acrobat_dc 15.009.20079
  • Adobe acrobat_reader_dc 19.008.20081
  • Adobe acrobat_dc 15.023.20053
  • Adobe acrobat_dc 18.009.20044
  • Adobe acrobat_reader_dc 19.010.20098
  • Adobe acrobat_reader_dc 18.011.20055
  • Adobe acrobat_dc 15.006.30094
  • Adobe acrobat_dc 17.011.30065
  • Adobe acrobat_dc 15.009.20069
  • Adobe acrobat_dc 15.006.30096
  • Adobe acrobat_dc 15.006.30201
  • Adobe acrobat_reader_dc 17.011.30096
  • Adobe acrobat_dc 17.011.30120
  • Adobe acrobat_reader_dc 15.009.20079
  • Adobe acrobat_reader_dc 17.012.20093
  • Adobe acrobat_reader_dc 15.016.20041
  • Adobe acrobat_reader_dc 15.006.30434
  • Adobe acrobat_dc 15.016.20041
  • Adobe acrobat_reader_dc 15.006.30416
  • Adobe acrobat_reader_dc 17.000.0000
  • Adobe acrobat_reader_dc 17.011.30078
  • Adobe acrobat_reader_dc 17.011.30102
  • Adobe acrobat_reader_dc 15.006.30173
  • Adobe acrobat_dc 17.011.30106
  • Adobe acrobat_dc 15.010.20059
  • Adobe acrobat_reader_dc 15.016.20045
  • Adobe acrobat_reader_dc 15.017.20050
  • Adobe acrobat_dc 15.006.30413
  • Adobe acrobat_reader_dc 15.006.30418
  • Adobe acrobat_dc 17.011.30096
  • Adobe acrobat_dc 15.020.20039
  • Adobe acrobat_dc 15.006.30060
  • Adobe acrobat_dc 17.011.30070
  • Adobe acrobat_reader_dc 15.023.20053
  • Adobe acrobat_reader_dc 15.006.30096
  • Adobe acrobat_reader_dc 15.009.20077
  • Adobe acrobat_reader_dc 17.011.30120
  • Adobe acrobat_reader_dc 17.012.20095
  • Adobe acrobat_dc 15.009.20071
  • Adobe acrobat_reader_dc 18.009.20044
  • Adobe acrobat_reader_dc 15.020.20039
  • Adobe acrobat_dc 19.010.20064
  • Adobe acrobat_reader_dc 15.006.30354
  • Adobe acrobat_dc 15.006.30352
  • Adobe acrobat_reader_dc 15.006.30060
  • Adobe acrobat_dc 15.006.30119
  • Adobe acrobat_dc 15.006.30306
  • Adobe acrobat_reader_dc 17.011.30070
  • Adobe acrobat_reader_dc 15.009.20071
  • Adobe acrobat_reader_dc 15.006.30392
  • Adobe acrobat_reader_dc 15.006.30452
  • Adobe acrobat_dc 17.011.30078
  • Adobe acrobat_dc 15.009.20077
  • Adobe acrobat_reader_dc 19.010.20064
  • Adobe acrobat_dc 15.006.30394
  • Adobe acrobat_dc 15.006.30456
  • Adobe acrobat_reader_dc 15.006.30352
  • Adobe acrobat_reader_dc 15.006.30306
  • Adobe acrobat_reader_dc 15.006.30394
  • Adobe acrobat_reader_dc 17.011.30138
  • Adobe acrobat_dc 15.016.20045
  • Adobe acrobat_dc 15.006.30354
  • Adobe acrobat_dc 15.006.30392
  • Adobe acrobat_dc 15.006.30434
  • Adobe acrobat_reader_dc 15.006.30448
  • Adobe acrobat_reader_dc 15.006.30456
  • Adobe acrobat_dc 17.012.20093
  • Adobe acrobat_dc 15.020.20042
  • Adobe acrobat_reader_dc 15.006.30119
  • Adobe acrobat_dc 15.006.30452
  • Adobe acrobat_dc 17.011.30138

HTTP:STC:ADOBE:CVE-2019-8106-ID - HTTP: Adobe Acrobat CVE-2019-8106 Out Of Bounds Read

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat. A successful attack can lead to information disclosure.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • url: https://helpx.adobe.com/security/products/acrobat/apsb19-41.html
  • cve: CVE-2019-8106

Affected Products:

  • Adobe acrobat_reader_dc 17.012.20093
  • Adobe acrobat_reader_dc 15.016.20041
  • Adobe acrobat_reader_dc 15.006.30434
  • Adobe acrobat_dc 15.016.20041
  • Adobe acrobat_reader_dc 15.006.30416
  • Adobe acrobat_reader_dc 17.000.0000
  • Adobe acrobat_reader_dc 17.011.30078
  • Adobe acrobat_reader_dc 17.011.30102
  • Adobe acrobat_reader_dc 15.006.30173
  • Adobe acrobat_dc 17.011.30106
  • Adobe acrobat_dc 15.010.20059
  • Adobe acrobat_reader_dc 15.016.20045
  • Adobe acrobat_reader_dc 15.017.20050
  • Adobe acrobat_dc 15.006.30413
  • Adobe acrobat_reader_dc 15.006.30418
  • Adobe acrobat_reader_dc 17.011.30059
  • Adobe acrobat_dc 15.006.30198
  • Adobe acrobat_dc 15.006.30498
  • Adobe acrobat_dc 19.008.20074
  • Adobe acrobat_reader_dc 17.011.30106
  • Adobe acrobat_dc 17.011.30110
  • Adobe acrobat_dc 17.011.30102
  • Adobe acrobat_reader_dc 18.011.20038
  • Adobe acrobat_dc 19.008.20081
  • Adobe acrobat_dc 15.006.30417
  • Adobe acrobat_reader_dc 15.010.20059
  • Adobe acrobat_dc 18.011.20058
  • Adobe acrobat_reader_dc 15.006.30094
  • Adobe acrobat_reader_dc 18.009.20050
  • Adobe acrobat_dc 15.017.20050
  • Adobe acrobat_dc 17.009.20058
  • Adobe acrobat_reader_dc 15.006.30198
  • Adobe acrobat_dc 15.006.30464
  • Adobe acrobat_reader_dc 15.006.30475
  • Adobe acrobat_dc 17.011.30059
  • Adobe acrobat_reader_dc 15.009.20069
  • Adobe acrobat_reader_dc 15.010.20060
  • Adobe acrobat_dc 15.006.30280
  • Adobe acrobat_dc 19.010.20099
  • Adobe acrobat_reader_dc 15.006.30498
  • Adobe acrobat_dc 18.011.20038
  • Adobe acrobat_dc 15.006.30243
  • Adobe acrobat_dc 17.011.30140
  • Adobe acrobat_dc 19.010.20100
  • Adobe acrobat_reader_dc 17.011.30066
  • Adobe acrobat_reader_dc 15.006.30280
  • Adobe acrobat_dc 18.009.20050
  • Adobe acrobat_reader_dc 15.006.30464
  • Adobe acrobat_reader_dc 15.006.30243
  • Adobe acrobat_dc 15.016.20039
  • Adobe acrobat_reader_dc 17.009.20058
  • Adobe acrobat_reader_dc 19.010.20099
  • Adobe acrobat_reader_dc 19.010.20100
  • Adobe acrobat_reader_dc 19.012.20034
  • Adobe acrobat_dc 15.006.30121
  • Adobe acrobat_reader_dc 15.020.20042
  • Adobe acrobat_reader_dc 17.011.30142
  • Adobe acrobat_dc 19.012.20034
  • Adobe acrobat_reader_dc 17.012.20098
  • Adobe acrobat_reader_dc 17.011.30080
  • Adobe acrobat_reader_dc 15.023.20056
  • Adobe acrobat_dc 19.010.20091
  • Adobe acrobat_reader_dc 17.011.30140
  • Adobe acrobat_dc 15.023.20056
  • Adobe acrobat_dc 15.006.30097
  • Adobe acrobat_reader_dc 17.011.30127
  • Adobe acrobat_reader_dc 15.016.20039
  • Adobe acrobat_dc 17.011.30080
  • Adobe acrobat_reader_dc 15.006.30097
  • Adobe acrobat_reader_dc 15.006.30121
  • Adobe acrobat_reader_dc 18.011.20040
  • Adobe acrobat_dc 17.011.30127
  • Adobe acrobat_dc 17.011.30142
  • Adobe acrobat_dc 17.011.30068
  • Adobe acrobat_dc 15.008.20082
  • Adobe acrobat_reader_dc 19.010.20091
  • Adobe acrobat_reader_dc 17.011.30068
  • Adobe acrobat_dc 15.006.30482
  • Adobe acrobat_reader_dc 15.006.30355
  • Adobe acrobat_dc 15.006.30173
  • Adobe acrobat_reader_dc 15.008.20082
  • Adobe acrobat_dc 17.012.20095
  • Adobe acrobat_reader_dc 17.011.30110
  • Adobe acrobat_dc 17.011.30099
  • Adobe acrobat_reader_dc 17.009.20044
  • Adobe acrobat_reader_dc 17.011.30099
  • Adobe acrobat_reader_dc 15.006.30482
  • Adobe acrobat_dc 17.011.30079
  • Adobe acrobat_dc 19.008.20071
  • Adobe acrobat_dc 15.006.30355
  • Adobe acrobat_dc 15.006.30457
  • Adobe acrobat_dc 15.010.20060
  • Adobe acrobat_reader_dc 15.006.30457
  • Adobe acrobat_reader_dc 19.008.20080
  • Adobe acrobat_reader_dc 15.006.30497
  • Adobe acrobat_dc 19.008.20080
  • Adobe acrobat_reader_dc 18.011.20063
  • Adobe acrobat_dc 15.006.30418
  • Adobe acrobat_dc 15.006.30448
  • Adobe acrobat_dc 17.011.30066
  • Adobe acrobat_reader_dc 19.010.20069
  • Adobe acrobat_reader_dc 15.006.30495
  • Adobe acrobat_dc 15.017.20053
  • Adobe acrobat_dc 17.009.20044
  • Adobe acrobat_reader_dc 17.011.30079
  • Adobe acrobat_dc 19.010.20069
  • Adobe acrobat_dc 15.006.30493
  • Adobe acrobat_dc 15.006.30279
  • Adobe acrobat_dc 17.012.20096
  • Adobe acrobat_reader_dc 15.006.30493
  • Adobe acrobat_reader_dc 15.023.20070
  • Adobe acrobat_reader_dc 15.006.30172
  • Adobe acrobat_dc 17.011.30105
  • Adobe acrobat_reader_dc 19.008.20071
  • Adobe acrobat_dc 15.006.30495
  • Adobe acrobat_dc 15.023.20070
  • Adobe acrobat_dc 15.006.30174
  • Adobe acrobat_dc 17.012.20098
  • Adobe acrobat_dc 18.011.20063
  • Adobe acrobat_reader_dc 15.006.30174
  • Adobe acrobat_dc 15.006.30475
  • Adobe acrobat_reader_dc 19.008.20074
  • Adobe acrobat_dc 15.006.30497
  • Adobe acrobat_dc 15.006.30172
  • Adobe acrobat_reader_dc 15.006.30279
  • Adobe acrobat_reader_dc 15.017.20053
  • Adobe acrobat_dc 15.006.30416
  • Adobe acrobat_reader_dc 17.011.30105
  • Adobe acrobat_reader_dc 17.011.30113
  • Adobe acrobat_dc 18.011.20040
  • Adobe acrobat_reader_dc 15.010.20056
  • Adobe acrobat_dc 19.010.20098
  • Adobe acrobat_reader_dc 15.006.30461
  • Adobe acrobat_reader_dc 15.006.30244
  • Adobe acrobat_dc 18.011.20055
  • Adobe acrobat_reader_dc 15.006.30201
  • Adobe acrobat_reader_dc 17.011.30065
  • Adobe acrobat_reader_dc 15.006.30417
  • Adobe acrobat_dc 17.000.0000
  • Adobe acrobat_dc 17.011.30113
  • Adobe acrobat_dc 15.010.20056
  • Adobe acrobat_dc 15.006.30244
  • Adobe acrobat_dc 17.011.30143
  • Adobe acrobat_dc 15.009.20079
  • Adobe acrobat_reader_dc 19.008.20081
  • Adobe acrobat_dc 15.023.20053
  • Adobe acrobat_dc 18.009.20044
  • Adobe acrobat_reader_dc 19.010.20098
  • Adobe acrobat_reader_dc 18.011.20055
  • Adobe acrobat_dc 15.006.30094
  • Adobe acrobat_dc 17.011.30065
  • Adobe acrobat_dc 15.009.20069
  • Adobe acrobat_dc 15.006.30096
  • Adobe acrobat_dc 15.006.30201
  • Adobe acrobat_reader_dc 17.011.30096
  • Adobe acrobat_dc 17.011.30120
  • Adobe acrobat_reader_dc 15.009.20079
  • Adobe acrobat_dc 17.011.30096
  • Adobe acrobat_dc 15.020.20039
  • Adobe acrobat_dc 15.006.30060
  • Adobe acrobat_dc 17.011.30070
  • Adobe acrobat_reader_dc 15.023.20053
  • Adobe acrobat_reader_dc 15.006.30096
  • Adobe acrobat_reader_dc 15.009.20077
  • Adobe acrobat_reader_dc 17.011.30120
  • Adobe acrobat_reader_dc 17.012.20095
  • Adobe acrobat_dc 15.009.20071
  • Adobe acrobat_reader_dc 18.009.20044
  • Adobe acrobat_reader_dc 15.020.20039
  • Adobe acrobat_dc 19.010.20064
  • Adobe acrobat_reader_dc 15.006.30354
  • Adobe acrobat_dc 15.006.30352
  • Adobe acrobat_reader_dc 15.006.30060
  • Adobe acrobat_dc 15.006.30119
  • Adobe acrobat_dc 15.006.30306
  • Adobe acrobat_reader_dc 17.011.30070
  • Adobe acrobat_reader_dc 15.009.20071
  • Adobe acrobat_reader_dc 15.006.30392
  • Adobe acrobat_reader_dc 15.006.30452
  • Adobe acrobat_dc 17.011.30078
  • Adobe acrobat_dc 15.009.20077
  • Adobe acrobat_reader_dc 19.010.20064
  • Adobe acrobat_dc 15.006.30394
  • Adobe acrobat_dc 15.006.30456
  • Adobe acrobat_reader_dc 15.006.30352
  • Adobe acrobat_reader_dc 15.006.30306
  • Adobe acrobat_reader_dc 15.006.30394
  • Adobe acrobat_reader_dc 17.011.30138
  • Adobe acrobat_dc 15.016.20045
  • Adobe acrobat_dc 15.006.30354
  • Adobe acrobat_dc 15.006.30392
  • Adobe acrobat_dc 15.006.30434
  • Adobe acrobat_reader_dc 15.006.30448
  • Adobe acrobat_reader_dc 15.006.30456
  • Adobe acrobat_dc 17.012.20093
  • Adobe acrobat_dc 15.020.20042
  • Adobe acrobat_reader_dc 15.006.30119
  • Adobe acrobat_dc 15.006.30452
  • Adobe acrobat_dc 17.011.30138

HTTP2:APACHE-CVE-2019-0199-DOS - HTTP2: Apache Tomcat HTTP2 Denial of Service

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Apache Tomcat. A successful attack can result in a denial-of-service condition.

Supported On:

srx-branch-19.2, vsrx3bsd-19.2, srx-17.3, vsrx-17.4, srx-branch-17.4, srx-17.4, vsrx-15.1, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2

References:

  • url: https://tomcat.apache.org/security-8.html#fixed_in_apache_tomcat_8.5.38
  • cve: CVE-2019-0199

Affected Products:

  • Apache tomcat 9.0.4
  • Apache tomcat 8.5.33
  • Apache tomcat 8.5.25
  • Apache tomcat 9.0.13
  • Apache tomcat 9.0.5
  • Apache tomcat 8.5.30
  • Apache tomcat 8.5.24
  • Apache tomcat 8.5.6
  • Apache tomcat 9.0.2
  • Apache tomcat 8.5.31
  • Apache tomcat 8.5.13
  • Apache tomcat 8.5.7
  • Apache tomcat 8.5.36
  • Apache tomcat 8.5.15
  • Apache tomcat 9.0.3
  • Apache tomcat 8.5.10
  • Apache tomcat 8.5.26
  • Apache tomcat 8.5.4
  • Apache tomcat 9.0.0
  • Apache tomcat 8.5.37
  • Apache tomcat 8.5.21
  • Apache tomcat 8.5.5
  • Apache tomcat 8.5.9
  • Apache tomcat 9.0.1
  • Apache tomcat 8.5.34
  • Apache tomcat 8.5.20
  • Apache tomcat 8.5.2
  • Apache tomcat 8.5.35
  • Apache tomcat 8.5.23
  • Apache tomcat 8.5.3
  • Apache tomcat 8.5.22
  • Apache tomcat 8.5.0
  • Apache tomcat 8.5.16
  • Apache tomcat 8.5.1
  • Apache tomcat 8.5.11
  • Apache tomcat 8.5.27
  • Apache tomcat 9.0.14
  • Apache tomcat 9.0.8
  • Apache tomcat 8.5.29
  • Apache tomcat 9.0.9
  • Apache tomcat 8.5.28
  • Apache tomcat 8.5.18
  • Apache tomcat 8.5.19
  • Apache tomcat 8.5.12
  • Apache tomcat 8.5.17
  • Apache tomcat 8.5.32
  • Apache tomcat 9.0.10
  • Apache tomcat 9.0.6
  • Apache tomcat 9.0.11
  • Apache tomcat 9.0.12
  • Apache tomcat 9.0.7
  • Apache tomcat 8.5.14
  • Apache tomcat 8.5.8

DOS:DIGIUM-PJSIP-DOS - DOS: Digium Asterisk PJSIP In-Dialog MESSAGE Request Denial-of-Service

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Digium Asterisk. A successful attack can lead to Denial of Service condition.

Supported On:

idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • url: http://downloads.digium.com/pub/security/AST-2019-002.html
  • url: https://issues.asterisk.org/jira/browse/ASTERISK-28447
  • cve: CVE-2019-12827

Affected Products:

  • Digium asterisk 13.4.0
  • Digium asterisk 15.7.0
  • Digium asterisk 13.21.0
  • Digium asterisk 15.1.4
  • Digium asterisk 13.11.2
  • Digium asterisk 13.0.2
  • Digium asterisk 13.13.0
  • Digium asterisk 15.7.1
  • Digium asterisk 15.1.5
  • Digium asterisk 13.0.1
  • Digium asterisk 15.2.1
  • Digium asterisk 13.17.1
  • Digium asterisk 13.18.3
  • Digium asterisk 13.0.0
  • Digium asterisk 13.5.0
  • Digium asterisk 13.19.2
  • Digium asterisk 13.3.0
  • Digium asterisk 13.13.1
  • Digium asterisk 13.13
  • Digium asterisk 13.8.2
  • Digium asterisk 15.1.0
  • Digium asterisk 13.19.1
  • Digium asterisk 13.16.0
  • Digium asterisk 13.8.1
  • Digium asterisk 15.1.1
  • Digium asterisk 13.7.2
  • Digium asterisk 13.3.2
  • Digium asterisk 13.10.0
  • Digium asterisk 13.8.0
  • Digium asterisk 15.1.2
  • Digium asterisk 15.1.3
  • Digium certified_asterisk 13.21
  • Digium asterisk 15.4.1
  • Digium asterisk 15.2.0
  • Digium asterisk 15.2.2
  • Digium asterisk 15.4.0
  • Digium asterisk 13.23.0
  • Digium asterisk 13.12.1
  • Digium asterisk 13.11.0
  • Digium asterisk 13.15.0
  • Digium asterisk 15.0.0
  • Digium asterisk 13.17.0
  • Digium asterisk 13.12.0
  • Digium asterisk 13.18.2
  • Digium asterisk 13.15.1
  • Digium asterisk 13.18.1
  • Digium asterisk 16.1.0
  • Digium asterisk 15.6.2
  • Digium asterisk 13.20.0
  • Digium asterisk 13.9.0
  • Digium asterisk 13.18.0
  • Digium asterisk 16.2.0
  • Digium asterisk 13.3.1
  • Digium asterisk 13.9.1
  • Digium asterisk 13.1.0
  • Digium asterisk 16.2.1
  • Digium asterisk 15.6.0
  • Digium asterisk 15.3.0
  • Digium asterisk 13.19.0
  • Digium asterisk 13.14.1
  • Digium asterisk 13.1.1
  • Digium asterisk 13.12
  • Digium asterisk 13.6.0
  • Digium asterisk 15.5.0
  • Digium asterisk 13.12.2
  • Digium asterisk 13.14.0
  • Digium asterisk 13.18.5
  • Digium asterisk 13.22.0
  • Digium asterisk 13.18.4
  • Digium asterisk 13.2.1
  • Digium asterisk 16.0.0
  • Digium asterisk 13.17.2
  • Digium asterisk 13.2.0
  • Digium asterisk 13.7.0
  • Digium asterisk 16.0.1
  • Digium asterisk 13.21.1
  • Digium asterisk 13.11.1
  • Digium asterisk 13.7.1
Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out