[[
日期上一篇] [
下一个日期] [
线程] [
线程接下来] [
日期索引] [
线程索引这是给予的
FWD:两个(?)旧的Ubiquiti漏洞VU#557129的CVE ID
- 到:”cve-editorial-board-list@mitre.org“ <cve-editorial-board-list@mitre.org>
- 主题:fwd:两个(?)较老的ubiquiti漏洞VU#557129的CVE ID
- 从:Art Manion <amanion@cert.org>
- 日期:THU,2018年8月23日17:34:09 -0400
- 身份验证重分:spf =中性(发件人IP是192.52.194.235)smtp.mailfrom = cert.org;imc.mitre.org;dkim =失败(签名未验证)header.d = cert.org; imc.mitre.org;dmarc =失败动作= none header.from = cert.org;
- 自动晶体:addr =amanion@cert.org;keydata= xsFNBFoV8GMBEACXd7zH23Gx/W77Gr3Hs+n+BTtEt7IP0jU26vM9i4ASGewrIFZaRIOgL964 xX7Qk1wvxLl8HvUomLNHsJIZYG4EKcNkEfREO7lTx/3nYhG3wjF0DcHYuLwUkwAS3N6p9PQ7 bvEsXZMbfG0L8ASgRy0h4dWg+XGV4xT64REsIlzSsclVaHKTvP7FAMCDG70L/2wc+w24RAzs TYhfxLp4w8TBaVj/pONm+EDGVtK5u4LPLpLS0xmlGxgKP9mYSYAF3j44msAsbsuFPfWTa8JU s9yASol4pMECH24Cp3snHlSNHMl1APfVz3Xsfw5x/mekgCAPcGCARhA9ltRHLYgVMr1JCYZW JdyUB0UEiY0xvlb5JYfCFJm4fL8E2xoW/ATmDIxkU0qguL55AD2VYEwbWEsiP725YMSKBDaC cGH9fa2iuSxnflui6wR4K+FOjXfB2nF561q+HjlRb6bahdkYzWccX4fx3dSlZ6w62qRFNKAE 5zUfe2ZHwis9Bx9iqIp7Ini/sZ3ESJgMr7qlSSkYl10Esdl5CyFyxQ5g/LgzOlywdHazju13 /ckVBPo5vz9ZPOmafiUDSz6R/kbC0+nCrJSjIBvDfBWG7Gl2gon4HqB4Ji6r3+gFEFFJl+O/ PwID6Wh0jAjTQWvD+5L/vFTZ3/875Q2OcoxL9Hh4ls5ptg+7uwARAQABzR1BcnQgTWFuaW9u IDxhbWFuaW9uQGNlcnQub3JnPsLBkQQTAQgAOwIbAwIeAQIXgAULCQgHAwUVCgkICwUWAgMB ABYhBBHNrv2hhwlGumhcAVNt4uTRu2rfBQJaFmXUAhkBAAoJEFNt4uTRu2rfY1IP/j8cjh38 B0mnEo0Lk27r/mYRQhj2Yk/ClsAuPWea56BGAswtW2Q6g6DswcinjvTxrycSqAfpj2ZQP9Rx Ib/FsfozF5bC7Ja5/W4amH1NcTr/cE+sgKX3XZcRlOIrw2d0jmS1SAtDWPWn4zTYKoR7cbDz BAAABLb8/xQn7YFgf8nKQ4ZM0yOTUOnF7wG42UU0Y0ww3b+x2/ZMys0ntpz4ZSOgVJlun2xP WgFzkHu/fEJkVTPkZQweRULIGeFJBzuJP46+FMy6PJFZ/ZudzLy/VBMVAxA/yOszLbRvsl6z 3prRMgI+fJF/11ohRVQ5DWzS4AmfnI9RP6aOlUgEi4MYMcbYKrYGwguhGOpdg5iaO6ir4mhd OMcKLeV0ZqSef0ZpXTLQiTzWuFg9ECof5OCK/Y2VQ2EXyWIi7q4OPTFFoZBl2keoF6j0k272 PCYfJZIzq/ER9mfoH1+7nmIxvZ+XXQ6EoCCPv6le8VKQyZOFVgjD5rPvCeGZgAs9CRbfqYNm bF3jqeMk4kZbJ/+GsKv66M4R0VI2DijOLNF1kGXeU6s45lUBZmcT0Fb2MQ78rNItpeUP+XYj fpB0g/woOIstbSoOqpVZf++HIjnmMHj9jJrbFcMVIPac89EDcjbab3zPTMb5LHdk6AxMsWRM QqxofqoqqzNI7RiKisaDQhINXRwAzsBNBFoV8roBCADZKC4LLl6XhVvHCZZIwa9t2e+swdln YRtxwG1TDRxM1PaV7VDzB9K1FMRDC9CQQmiwI+Vl2j0Kn3BUvkCp3zmP+S7CRgK2vfP1GBAs CURE6j6M7S47qOhQvAvJK0qlF14tCBSX16CceGFV0XzfOUnQGt6m8AnVTr7WODilYsJPWUrj xLe3cKQJs7zk3iMLH1lJ7jNXlAQUgrTurVD7sl6PbKgbmDw3tIgXwep7tMOUzpiN4vCPALA+ WYL+0VxE03TZj/FqNzNrjoKXw+X3za675QnLsXww2cgLBV0Zjg3HZVDT5/0LlQjYqPnaWh3s ZG8uRJ104Thx1JVFLN4+8aDrABEBAAHCwXwEGAEIACYWIQQRza79oYcJRrpoXAFTbeLk0btq 3wUCWhXyugIbDAUJBaOagAAKCRBTbeLk0btq3zHYD/4vvS0lul3UKWGeRsVb33Y3eJ1yv4O3 EpBtmkVgCyxdG3zj8YrI15DCzhn6LSN3FqjV+wovE3SsxIrRjn7eoBA6SH54KlFRrW7pAARc NQaHFU+nX6ST6X3pOoNYzhXPZjkxoUpxyC+ehNARx+3tlQ0LScEr0L5Ttvr8W7nopWaXeuCt VI+8tjDnsCtWLaI2bYi3TYWDJdgWzNFSGYioqIxvQHIpokFZAx6fTKtEYaAqqg2cefRDgNoU bMcHmNtVMAXThLdNAx23F/sv2gV9a612ktCwl6hjKu1vuK4KGnhQu1T/oRk5EUA8jy5yBB6/ S5jwYbZR01EriZXSTXwT/gJcThBIXH8i9/4lUwdhV8+iBP/Pomhs8D7dPU7q1fUYlvVxn8iN K7IFoWdptGv+bhdNsf/qWGxVxOHwTAipr73Fl3eC5RovVM2aAK2Bx6xQFXlh4uPcI/S0gIPG tytClYZxtbXKM3qVhUTZgg1Ge6MgtgJkKWttzRciW0N9t5pZ/IbH7ax0NUv2hjHovGBXhuQb cVAEgmx90iyx9iRizCpgr3JyDNtKX+bc26aGI+mFOdiawp2HihhSazqiEpuNrxlQVWgMgmXa RduAg8L9z2CshZ6Zkcmwea79r8yDsBbwfJEZ71T0WWyfm1UcRVflPFAYb9xE8Ulgh8BQzw// z7Y5Lw==
- 交货日期:星期五8月24日07:46:11 2018
- dkim-filter:opendkim滤镜v2.11.0 veto.sei.cmu.edu w7nlyaav045539
- DKIM签名:v = 1;A = RSA-SHA256;C =放松/放松;d = cert.org;S = YC2BMWVRJ62M;t = 1535060051;BH = 0JBX1DOWARD8VGNCKXGZPUDFTQ3YBJWTRKYPOBZ1/BS =;h =主题:参考:to:从:从:日期:in-reply-to:从;b=OIs9R9FcthkGEhywQ6T2Fog41lsis6IAU/ittGJOwsq8X13fUcLxYnsS/mCM7MhZc qSQYu+ji3XVlH5AxDpIynOUeP3v0/2bQGo9oFVcPp1JmUuNIcaEtmoFW00ai0YFtJn 5+E+MvYL/gMxHHVjqGe1qhvg9opFYFGDF6yRGga8=
- DKIM签名:v = 1;A = RSA-SHA256;C =放松/放松;d = mitre.org;h =主题:参考:to:from:message-id:date:date:mime-version:in-reply-to:content-type:content-transfer-insoding;s = selector1;BH = 0JBX1DOWARD8VGNCKXGZPUDFTQ3YBJWTRKYPOBZ1/BS =;b=rk6zybz5NyCXOYXNBVnov+Gujp+R7HyLtkbRrxLj66DyLtN/xV7CB2pG7CMs1UqXJzbDeUuejP5kC3gc/G77tQAPk9kC45y+YSNE4P62t23HAa3QKriavLNZUvjFSDL2EPeo6CV567O2EcDShOStZ/5gEBiNXEtiBBS04bknPhw=
- 陷入困境:
- OpenPGP:preferperion = signencrypt
- 参考:
- spamdiagnosticmetadata:NSPM
- spamdiagnosticOutput:1:99
- 用户代理:mozilla/5.0(Macintosh; Intel Mac OS X 10.13; RV:52.0)壁虎/20100101 Thunderbird/52.9.1
我已经使用了这些泛素漏洞,作为缺乏CVE ID的例子,导致缺乏对采取行动的意识的认识。这是我本周发出的泛质发送的消息,尚未得到他们的回应。作为有时最后的度假胜地的CNA,CERT/CC计划提交一个(或两个)CVE ID以涵盖这些漏洞。我认为第二个(CVE-2016-Yyyy)很清楚。在向前推进之前,请在董事会中使用任何输入,材料或程序。谢谢, - 艺术--------转发消息--------主题:两个(?)较大的ubiquiti脆弱性VU#557129日期:2018年8月20日星期一17:28:14-0400来自:Art Manion to:security-direct@ubnt.com cc:cert ,常见漏洞和暴露 matt@ubnt.com,我们正在追踪一个或两个较旧的泛素漏洞的CVE ID。我相信这些是独特的脆弱性,但不能真正说明,所以我想我会直接问。CVE-2015-XXXX修复了5.5.11.28002(2015-07-17)https://community.ubnt.com/t5/airmax-updates-blog/security-release-for-airmax-toughswitch-and-witch-and-airgateway-releast/ba-p/1300494CVE-2016-yyy固定在5.6.5.29033(2016-02-13)中https://hackerone.com/reports/73480(2016-04-15)https://www.exploit-db.com/exploits/39701/(2016-05-13)https://community.ubnt.com/t5/airmax-general-discussion/virus-attack-urgent-urgent-ubnt/td-p/1562940(2016-05-16)https://community.ubnt.com/t5/airmax-updates-blog/important-security-notice-notice-and-airos-5-6-5-Realease/ba-p/1565949(2016-05-17)https://www.rapid7.com/db/modules/exploit/linux/ssh/ubiquiti_airos_file_upload(2016-05-25)https://www.exploit-db.com/exploits/39853/这个分组看起来正确吗?或者,由于Hackerone报告是在2015-07-01提交的,是2015-07-17的第一篇ubiquiti博客文章谈论相同的漏洞吗?除了更新CVE目录外,我还有一个线程要在此处进行调查。研究人员使用了Bug Bounty(Good),供应商固定错误(好),但用户没有注意到/ACT(坏),这可能是由于缺乏CVE ID所致。问候 - 艺术