lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CFA87BAA1D334F4685E682AB868C534430052C36@ARBAS1422.atrame.deloitte.com>
Date: Tue, 15 Jan 2013 20:39:21 +0000
From: "Rustein, Fara Denise \(LATCO - Buenos Aires\)" <frustein@...OITTE.com>
To: "'full-disclosure-bounces@...ts.grok.org.uk'" <'full-disclosure-bounces@...ts.grok.org.uk'>,
  "'bugtraq@...urityfocus.com'" <'bugtraq@...urityfocus.com'>,
  "'vulns@...unia.com'" <'vulns@...unia.com'>
Subject: Trimble® Infrastructure GNSS Series Receivers Cross Site Scripting (XSS) vulnerability

Trimble® Infrastructure GNSS Series Receivers Cross Site Scripting (XSS) vulnerability:

- CVE: CVE-2012-5053
- Deloitte Argentina Advisory Code: DTTAR-20130001

- Vendor Status: CONFIRMED
- Public Disclosure Date: January, 15th, 2013.
- Vendors Affected: Trimble - http://www.trimble.com/
- Systems Affected: Trimble® Infrastructure GNSS Series Receivers
   This information applies to the following Trimble® Infrastructure GNSS Series Receivers:
	 - NetR3
	 - NetR5
	 - NetR8
	 - NetR9
	 - NetRS
- Description: The Receiver Web User Interface on the affected Trimble® Infrastructure GNSS Series Receivers is vulnerable to cross-site scripting. This vulnerability could be exploited allowing malicious scripts to be inserted and executed on the Trimble® Infrastructure GNSS Series Receivers Web User Interface introducing security risks to users of the system.

- Vulnerability Status: FIXED
- Patch Available: Yes
- Fix: The firmware release v4.70 is available for the NetR3, NetR5, NetR8 and NetR9 Trimble® Infrastructure GNSS Series Receivers. There is a release for the NetRS v1.3-2 available as well.
- For reference:
	- http://trl.trimble.com/docushare/dsweb/Get/Document-644791/Infrastructure_GNSS-SeriesReceivers_4.70_RelNotes.pdf
	- http://trl.trimble.com/docushare/dsweb/Get/Document-636664/NetRS_1%203-2_RelNotes.pdf

- Related Links: Deloitte Argentina - www.deloitte.com/ar
- Credits: This vulnerability was found by Fara Rustein (Twitter: @fararustein) from Deloitte Argentina.
- Feedback: If you have any questions, comments, concerns, updates or suggestions please feel free to send them to: frustein@...oitte.com

Fara Rustein
Senior Consultant, Cyber Security - ERS
Deloitte & Co. S.A.
Tte. Gral.J.D.Perón 646 - C1038AAN Buenos Aires Argentina
Main: +54 11 4320 2700 ext. 8350  | Cel: + 54 9 11 3681 7622 | Fax: +54 11 4320 4071
frustein@...oitte.com | www.deloitte.com
Please consider the environment before printing.

 
Deloitte se refiere a una o más de las firmas miembros de Deloitte Touche Tohmatsu Limited, una compañía privada del Reino Unido limitada por garantía, y su red de firmas miembros, cada una como una entidad única e independiente y legalmente separada. Una descripción detallada de la estructura legal de Deloitte Touche Tohmatsu Limited y sus firmas miembros puede verse en el sitio web http://www.deloitte.com/about.                           La información de este mail es confidencial y concierne únicamente a la persona a quien está dirigida. Si este mensaje no está dirigido a usted, por favor tenga presente que no tiene autorización para leer el resto de este e-mail, copiarlo o derivarlo a cualquier otra persona que no sea aquella a quien está dirigido. Si recibe este mail por error, por favor, avise al remitente, luego de lo cual rogamos a usted destruya el mensaje original. No se puede responsabilizar de ningún modo a Deloitte & Co. S.A. ni a sus subsidiarias por cualquier consecuencia o daño que pueda resultar del apropiado y completo envío y recepción del contenido de este e-mail.
 
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see http://www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. 
The information in this e-mail is confidential and intended solely for the person to whom it is addressed. If this message is not addressed to you, please be aware that you have no authorization to read the rest of this e-mail, to copy it or to furnish it to any person other than the addressee. Should you have received this e-mail by mistake, please bring this to the attention of the sender, after which you are kindly requested to destroy the original message. Deloitte & Co. S.A. and subsidiaries cannot be held responsible or liable in any way whatsoever for and/or in connection with any consequences and/or damage resulting from the proper and complete dispatch and receipt of the content of this e-mail.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ