Risk | High |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2023-32205 CVE-2023-32206 CVE-2023-32207 CVE-2023-32211 CVE-2023-32212 CVE-2023-32213 CVE-2023-32215 |
CWE-ID | CWE-451 CWE-125 CWE-254 CWE-843 CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions Operating systems & Components / Operating system package or component thunderbird (Red Hat package) Operating systems & Components / Operating system package or component Red Hat Enterprise Linux Server - TUS Operating systems & Components / Operating system Red Hat Enterprise Linux for Power, little endian - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux for IBM z Systems - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux Server - AUS Operating systems & Components / Operating system Red Hat Enterprise Linux for x86_64 - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux for ARM 64 - Extended Update Support Operating systems & Components / Operating system |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU75874
Risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-32205
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data. A remote attacker can obscure browser prompts and perform spoofing attack.
Install updates from vendor's website.
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 8.4
Red Hat Enterprise Linux Server - TUS: 8.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 8.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 8.4
Red Hat Enterprise Linux Server - AUS: 8.4
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 8.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 8.4
thunderbird (Red Hat package): before 102.11.0-1.el8_4
CPE2.3http://access.redhat.com/errata/RHSA-2023:3154
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75875
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-32206
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in the RLBox Expat driver. A remote attacker can trick the victim to open a specially crafted website, trigger an out-of-bounds read error and crash the browser.
Install updates from vendor's website.
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 8.4
Red Hat Enterprise Linux Server - TUS: 8.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 8.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 8.4
Red Hat Enterprise Linux Server - AUS: 8.4
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 8.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 8.4
thunderbird (Red Hat package): before 102.11.0-1.el8_4
CPE2.3http://access.redhat.com/errata/RHSA-2023:3154
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75876
Risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-32207
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform clickjacking attack.
The vulnerability exists due to a missing delay in popup notifications. A remote attacker can trick a victim into granting permissions.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 8.4
Red Hat Enterprise Linux Server - TUS: 8.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 8.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 8.4
Red Hat Enterprise Linux Server - AUS: 8.4
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 8.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 8.4
thunderbird (Red Hat package): before 102.11.0-1.el8_4
CPE2.3http://access.redhat.com/errata/RHSA-2023:3154
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75880
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-32211
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a type confusion error when processing HTML content. A remote attacker can trick the victim to open a specially crafted website, trigger a type confusion error and crash the browser.
Install updates from vendor's website.
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 8.4
Red Hat Enterprise Linux Server - TUS: 8.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 8.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 8.4
Red Hat Enterprise Linux Server - AUS: 8.4
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 8.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 8.4
thunderbird (Red Hat package): before 102.11.0-1.el8_4
CPE2.3http://access.redhat.com/errata/RHSA-2023:3154
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75881
Risk: Medium
CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-32212
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data. A remote attacker can spoof the address bar using the datalist element.
Install updates from vendor's website.
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 8.4
Red Hat Enterprise Linux Server - TUS: 8.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 8.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 8.4
Red Hat Enterprise Linux Server - AUS: 8.4
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 8.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 8.4
thunderbird (Red Hat package): before 102.11.0-1.el8_4
CPE2.3http://access.redhat.com/errata/RHSA-2023:3154
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75882
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-32213
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within FileReader::DoReadData() when reading a file. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 8.4
Red Hat Enterprise Linux Server - TUS: 8.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 8.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 8.4
Red Hat Enterprise Linux Server - AUS: 8.4
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 8.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 8.4
thunderbird (Red Hat package): before 102.11.0-1.el8_4
CPE2.3http://access.redhat.com/errata/RHSA-2023:3154
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75884
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-32215
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can trick the victim to open a specially crafted website, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions: 8.4
Red Hat Enterprise Linux Server - TUS: 8.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 8.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 8.4
Red Hat Enterprise Linux Server - AUS: 8.4
Red Hat Enterprise Linux for x86_64 - Extended Update Support: 8.4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support: 8.4
thunderbird (Red Hat package): before 102.11.0-1.el8_4
CPE2.3http://access.redhat.com/errata/RHSA-2023:3154
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.