CVE-2018-6480

CVE: CVE-2018-6480
Published: 2018-01-31T20:29Z
Vendor: ccn-lite
Products: ccn-lite
Versions: 2.0.0,
Description Language: en
Description: A type confusion issue was discovered in CCN-lite 2, leading to a memory access violation and a failure of the nonce feature (which, for example, helped with loop prevention). ccnl_fwd_handleInterest assumes that the union member s is of type ccnl_pktdetail_ndntlv_s. However, if the type is in fact struct ccnl_pktdetail_ccntlv_s or struct ccnl_pktdetail_iottlv_s, the memory at that point is either uninitialised or points to data that is not a nonce, which renders the code using the local variable nonce pointless. A later nonce check is insufficient.
References:
https://github.com/cn-uofbasel/ccn-lite/issues/159

CVE-2018-6479

CVE: CVE-2018-6479
Published: 2018-01-31T20:29Z
Vendor: netwavesystems
Products: ip_camera_firmware
Versions: -,
Description Language: en
Description: An issue was discovered on Netwave IP Camera devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to the / URI.
References:
https://github.com/dreadlocked/netwave-dosvulnerability

CVE-2018-6476

CVE: CVE-2018-6476
Published: 2018-01-31T19:29Z
Vendor: superantispyware
Products: superantispyware
Versions: 6.0.1254,
Description Language: en
Description: In SUPERAntiSpyware Professional Trial 6.0.1254, the SASKUTIL.SYS driver allows privilege escalation to NT AUTHORITY\SYSTEM because of not validating input values from IOCtl 0x9C402114 or 0x9C402124 or 0x9C40207c.
References:
https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/0x9C402114_9C402124_9C40207c

CVE-2018-6475

CVE: CVE-2018-6475
Published: 2018-01-31T19:29Z
Vendor: superantispyware
Products: superantispyware
Versions: 6.0.1254,
Description Language: en
Description: In SUPERAntiSpyware Professional Trial 6.0.1254, SUPERAntiSpyware.exe allows DLL hijacking, leading to Escalation of Privileges.
References:
https://github.com/ZhiyuanWang-Chengdu-Qihoo360/SUPERAntiSpyware_POC/tree/master/getshell