CVE-2019-18178
https://notcve.org/view.php?id=CVE-2019-18178
Real Time Engineers FreeRTOS+FAT 160919a has a use after free. The function FF_Close() is defined in ff_file.c. The file handler pxFile is freed by ffconfigFREE, which (by default) is a macro definition of vPortFree(), but it is reused to flush modified file content from the cache to disk by the function FF_FlushCache(). Real Time Engineers FreeRTOS+FAT versión 160919a, presenta un uso de la memoria previamente liberada. La función FF_Close() es definida en el archivo ff_file.c. • https://sourceforge.net/p/freertos/bugs/199 • CWE-416: Use After Free •
CVE-2019-13120
https://notcve.org/view.php?id=CVE-2019-13120
Amazon FreeRTOS up to and including v1.4.8 lacks length checking in prvProcessReceivedPublish, resulting in untargetable leakage of arbitrary memory contents on a device to an attacker. If an attacker has the authorization to send a malformed MQTT publish packet to an Amazon IoT Thing, which interacts with an associated vulnerable MQTT message in the application, specific circumstances could trigger this vulnerability. Amazon FreeRTOS hasta la versión v1.4.8, incluido, carece de verificación de longitud en prvProcessReceivedPublish, dando como resultado una fuga no direccionable de contenido de memoria arbitraria en un dispositivo a un atacante. Si un atacante tiene la autorización para enviar un paquete de publicación MQTT con formato incorrecto a una cosa de Amazon IoT, que interactúa con un mensaje MQTT vulnerable asociado en la aplicación, circunstancias específicas podrían desencadenar esta vulnerabilidad. • https://aws.amazon.com/cn/freertos/security-updates • CWE-125: Out-of-bounds Read •
CVE-2018-19981
https://notcve.org/view.php?id=CVE-2018-19981
Amazon AWS SDK <=2.8.5 for Android uses Android SharedPreferences to store plain text AWS STS Temporary Credentials retrieved by AWS Cognito Identity Service. An attacker can use these credentials to create authenticated and/or authorized requests. Note that the attacker must have "root" privilege access to the Android filesystem in order to exploit this vulnerability (i.e. the device has been compromised, such as disabling or bypassing Android's fundamental security mechanisms). Amazon AWS SDK, en versiones 2.8.5 y anteriores, utiliza la clase "Android SharedPreferences" para almacenar las credenciales temporales de AWS STS recuperadas por AWS Cognito Identity Service. Un atacante puede utilizar estas credenciales para crear peticiones autenticadas y/o autorizadas. • https://aws-amplify.github.io/aws-sdk-android/docs/reference/com/amazonaws/auth/CognitoCachingCredentialsProvider.html https://raw.githubusercontent.com/lorenzodifuccia/cloudflare/master/Images/vulns/aws/aws_sdk_sp_01.png https://raw.githubusercontent.com/lorenzodifuccia/cloudflare/master/Images/vulns/aws/aws_sdk_sp_02.png https://raw.githubusercontent.com/lorenzodifuccia/cloudflare/master/Images/vulns/aws/aws_sdk_sp_03.png • CWE-312: Cleartext Storage of Sensitive Information •
CVE-2019-9864
https://notcve.org/view.php?id=CVE-2019-9864
PHP Scripts Mall Amazon Affiliate Store 2.1.6 allows Parameter Tampering of the payment amount. PHP Scripts Mall Amazon Affiliate Store 2.1.6 permite la falsificación de los parámetros de la cifra de pago. • https://hackingvila.wordpress.com/2019/03/19/php-scripts-mall-amazon-affiliate-store-2-1-6-allows-parameter-tampering-of-the-payment-amountcve-2019-9864 •
CVE-2019-9483
https://notcve.org/view.php?id=CVE-2019-9483
Amazon Ring Doorbell before 3.4.7 mishandles encryption, which allows attackers to obtain audio and video data, or insert spoofed video that does not correspond to the actual person at the door. Ring Doorbell de Amazon, en versiones anteriores a la 3.4.7, gestiona el cifrado de manera incorrecta, lo que permite a los atacantes obtener los datos de audio y vídeo o insertar un vídeo suplantado que no corresponde a la persona real que se encuentra en la puerta. • https://dojo.bullguard.com/dojo-by-bullguard/blog/ring https://www.theverge.com/2019/2/27/18243296/ring-doorbell-hacked-fake-images-security-experts • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •