ID

VAR-200506-0133


CVE

CVE-2005-0488


TITLE

Telnet Client Information Disclosure Vulnerability

Trust: 0.8

sources: CERT/CC: VU#800829

DESCRIPTION

Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command. Included with many products Telnet Clients NEW-ENVIRON By command Telnet There is a problem that the environment variable information is illegally taken because the restriction of the environment variable sent to the server is inappropriate.By a third party IFRAME Tag and "TELNET://" Formal URI Etc., Web Malicious via page or email Telnet By enticing a target user to connect to a server, they may be able to obtain important information about the target system, such as the user's name, search path for executables, and locations of important data. still, Microsoft Windows 2000 Is not affected by this issue, Microsoft Windows Services for UNIX If you are using, you may be affected by this issue. Also some Linux Included with the distribution Kerberos Has been reported to be affected by this issue. Telnet clients provided by multiple vendors are prone to a remote information-disclosure vulnerability. Attackers can retrieve any information stored in the environment of clients using the affected telnet application. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Microsoft Telnet Client Information Disclosure Weakness SECUNIA ADVISORY ID: SA15690 VERIFY ADVISORY: http://secunia.com/advisories/15690/ CRITICAL: Not critical IMPACT: Exposure of system information WHERE: >From remote OPERATING SYSTEM: Microsoft Windows XP Professional http://secunia.com/product/22/ Microsoft Windows XP Home Edition http://secunia.com/product/16/ Microsoft Windows Server 2003 Web Edition http://secunia.com/product/1176/ Microsoft Windows Server 2003 Datacenter Edition http://secunia.com/product/1175/ Microsoft Windows Server 2003 Standard Edition http://secunia.com/product/1173/ Microsoft Windows Server 2003 Enterprise Edition http://secunia.com/product/1174/ SOFTWARE: Microsoft Windows Services for UNIX 2.x http://secunia.com/product/5243/ Microsoft Windows Services for UNIX 3.x http://secunia.com/product/5244/ DESCRIPTION: Ga\xebl Delalleau has reported a weakness has been reported in Microsoft Windows, which can be exploited by malicious people to gain knowledge of various information. Successful exploitation requires that a user e.g. visits a malicious web site or is tricked into clicking a specially crafted link. SOLUTION: Apply patches. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2005-0488 // CERT/CC: VU#800829 // JVNDB: JVNDB-2005-000380 // BID: 13940 // PACKETSTORM: 37995

AFFECTED PRODUCTS

vendor:sunmodel:sunosscope:eqversion:5.9

Trust: 1.3

vendor:microsoftmodel:telnet clientscope:eqversion:5.1.2600.2180

Trust: 1.0

vendor:mitmodel:kerberos 5scope:eqversion:1.3.4

Trust: 1.0

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.3.9

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4.7

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.3.9

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.7

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.1

Trust: 0.8

vendor:sun microsystemsmodel:seamscope:eqversion:1.0 (for solaris 7)

Trust: 0.8

vendor:sun microsystemsmodel:seamscope:eqversion:1.0.1 (for solaris 8)

Trust: 0.8

vendor:sun microsystemsmodel:seamscope:eqversion:1.0.2 (for solaris 9)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:7.0 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:7.0 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:8 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:8 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (x86)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:3.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:linux advanced workstationscope:eqversion:2.1

Trust: 0.8

vendor:mitmodel:kerberosscope:eqversion:5-1.3.4

Trust: 0.6

vendor:sunmodel:solarisscope:eqversion:5.9

Trust: 0.6

vendor:s u s emodel:linux personalscope:eqversion:8.2

Trust: 0.3

vendor:microsoftmodel:windows xp home sp1scope: - version: -

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:8.0

Trust: 0.3

vendor:sunmodel:sunos x86scope:eqversion:5.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.8

Trust: 0.3

vendor:avayamodel:s8500 r2.0.0scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.1

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003x64

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.2

Trust: 0.3

vendor:avayamodel:s8700 r2.0.0scope: - version: -

Trust: 0.3

vendor:mandrakesoftmodel:multi network firewallscope:eqversion:2.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.4

Trust: 0.3

vendor:sunmodel:seamscope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:5.2

Trust: 0.3

vendor:microsoftmodel:windows xp professionalscope: - version: -

Trust: 0.3

vendor:susemodel:linux i386scope:eqversion:7.2

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:4.2

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp1 betascope:eqversion:20031

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:sunmodel:solaris 2.7 sparcscope: - version: -

Trust: 0.3

vendor:scomodel:open serverscope:eqversion:5.0.6

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:10.1

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itaniumscope:eqversion:20030

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.2

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc edition sp1scope: - version: -

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.4

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:1.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake amd64scope:eqversion:10.0

Trust: 0.3

vendor:microsoftmodel:windows xp professional editionscope:eqversion:x64

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:10.2

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc editionscope: - version: -

Trust: 0.3

vendor:susemodel:linux ppcscope:eqversion:6.4

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:9.0

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp1scope:eqversion:2003

Trust: 0.3

vendor:cosmicperlmodel:directory proscope:eqversion:10.0.3

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:mitmodel:kerberosscope:eqversion:51.3.6

Trust: 0.3

vendor:susemodel:linux sparcscope:eqversion:7.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:mn100scope: - version: -

Trust: 0.3

vendor:susemodel:linux ppcscope:eqversion:7.3

Trust: 0.3

vendor:f5model:big-ipscope:neversion:4.5.13

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.1

Trust: 0.3

vendor:sunmodel:seamscope:eqversion:1.0.2

Trust: 0.3

vendor:scomodel:open serverscope:eqversion:5.0.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processorscope:eqversion:2.1

Trust: 0.3

vendor:microsoftmodel:windows xp 64-bit editionscope: - version: -

Trust: 0.3

vendor:avayamodel:s8500 r2.0.1scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:susemodel:linux i386scope:eqversion:7.0

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.03

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:6.0

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.12

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1

Trust: 0.3

vendor:sunmodel:seamscope:eqversion:1.0

Trust: 0.3

vendor:susemodel:linux ppcscope:eqversion:6.3

Trust: 0.3

vendor:redhatmodel:enterprise linux ws ia64scope:eqversion:2.1

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp1 betascope:eqversion:20031

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.2

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp1scope:eqversion:2003

Trust: 0.3

vendor:susemodel:linux i386scope:eqversion:8.0

Trust: 0.3

vendor:microsoftmodel:windows xp media center editionscope: - version: -

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.4

Trust: 0.3

vendor:susemodel:linux alphascope:eqversion:7.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.8

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp2scope: - version: -

Trust: 0.3

vendor:susemodel:linux ppcscope:eqversion:7.1

Trust: 0.3

vendor:avayamodel:s8710 r2.0.1scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.4

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:6.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.3

Trust: 0.3

vendor:f5model:3-dnsscope:neversion:4.5.13

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.1

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.2

Trust: 0.3

vendor:sunmodel:sunos x86scope:eqversion:5.9

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.3

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itaniumscope:eqversion:20030

Trust: 0.3

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:s u s emodel:linux imap serverscope:eqversion:1.0

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp1 betascope:eqversion:20031

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.3

Trust: 0.3

vendor:f5model:big-ipscope:neversion:4.7

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:6.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:sunmodel:sunosscope:eqversion:5.8

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:2.1

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:5.0

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.11

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:7.1

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6.2

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc edition sp2scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.3

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itanium sp1 betascope:eqversion:20031

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:8.1

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.3

vendor:susemodel:linux openexchange serverscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:7

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:7.1x86

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:4.4

Trust: 0.3

vendor:susemodel:linux alphascope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:intuity lxscope: - version: -

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.8

Trust: 0.3

vendor:s u s emodel:linux enterprise server for s/390scope:eqversion:9.0

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:2.8

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.5

Trust: 0.3

vendor:f5model:3-dnsscope:neversion:4.7

Trust: 0.3

vendor:susemodel:linux desktopscope:eqversion:1.0

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itanium sp1 betascope:eqversion:20031

Trust: 0.3

vendor:susemodel:linux alphascope:eqversion:7.0

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processor ia64scope:eqversion:2.1

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.1

Trust: 0.3

vendor:susemodel:linux ppcscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:solaris 8 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:2.7

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.2

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:7.2

Trust: 0.3

vendor:sunmodel:sunosscope:eqversion:5.7

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.3

Trust: 0.3

vendor:avayamodel:s8300 r2.0.0scope: - version: -

Trust: 0.3

vendor:susemodel:linux i386scope:eqversion:6.4

Trust: 0.3

vendor:sgimodel:propack sp5scope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:linux database serverscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:services for unixscope:eqversion:2.2

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp1scope: - version: -

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:7.3

Trust: 0.3

vendor:scomodel:unixwarescope:eqversion:7.1.4

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:services for unixscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.1.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:4.4.1

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003x64

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.6

Trust: 0.3

vendor:microsoftmodel:services for unixscope:eqversion:3.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.6

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.6

Trust: 0.3

vendor:redhatmodel:enterprise linux as ia64scope:eqversion:2.1

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.0

Trust: 0.3

vendor:avayamodel:s8300 r2.0.1scope: - version: -

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:10

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:10.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.7

Trust: 0.3

vendor:microsoftmodel:windows xp homescope: - version: -

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:10.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.3

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.1

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp1scope: - version: -

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:modular messagingscope:eqversion:2.0

Trust: 0.3

vendor:s u s emodel:linux office serverscope: - version: -

Trust: 0.3

vendor:avayamodel:s8710 r2.0.0scope: - version: -

Trust: 0.3

vendor:sgimodel:propack sp6scope:eqversion:3.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.5.11

Trust: 0.3

vendor:s u s emodel:suse linux school server for i386scope: - version: -

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.6

Trust: 0.3

vendor:f5model:3-dnsscope:eqversion:4.6.2

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:solaris 7.0 x86scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.7

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:sunmodel:solaris 9 x86 updatescope:eqversion:2

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.8

Trust: 0.3

vendor:susemodel:linux sparcscope:eqversion:7.3

Trust: 0.3

vendor:avayamodel:s8700 r2.0.1scope: - version: -

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.2

Trust: 0.3

vendor:microsoftmodel:services for unixscope:eqversion:3.5

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.3

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp home sp2scope: - version: -

Trust: 0.3

vendor:s u s emodel:suse email server iiiscope: - version: -

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:2.1

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.5

Trust: 0.3

vendor:susemodel:linux i386scope:eqversion:7.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.2.2

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.3

Trust: 0.3

vendor:microsoftmodel:services for unixscope:eqversion:2.0

Trust: 0.3

vendor:microsoftmodel:windows xp 64-bit edition sp1scope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.12

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:6.1

Trust: 0.3

vendor:microsoftmodel:windows xp 64-bit edition version sp1scope:eqversion:2003

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.4

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:susemodel:linux alphascope:eqversion:6.4

Trust: 0.3

vendor:sunmodel:sunos x86scope:eqversion:5.7

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.3

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.0

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp1scope:eqversion:2003

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.2.3

Trust: 0.3

vendor:s u s emodel:suse email serverscope:eqversion:3.1

Trust: 0.3

vendor:susemodel:linux sparcscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.1.5

Trust: 0.3

vendor:s u s emodel:linux enterprise server for s/390scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:avayamodel:converged communications serverscope:eqversion:2.0

Trust: 0.3

vendor:scomodel:unixwarescope:eqversion:7.1.3

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:avayamodel:modular messagingscope:eqversion:1.1

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:s u s emodel:linux connectivity serverscope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:redhatmodel:enterprise linux es ia64scope:eqversion:2.1

Trust: 0.3

vendor:microsoftmodel:windows xp 64-bit edition versionscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:10.0

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:2.1

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003x64

Trust: 0.3

vendor:susemodel:linux alphascope:eqversion:6.3

Trust: 0.3

vendor:susemodel:linuxscope:eqversion:5.3

Trust: 0.3

vendor:f5model:big-ipscope:eqversion:4.5.10

Trust: 0.3

sources: CERT/CC: VU#800829 // BID: 13940 // JVNDB: JVNDB-2005-000380 // CNNVD: CNNVD-200506-129 // NVD: CVE-2005-0488

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2005-0488
value: MEDIUM

Trust: 1.8

CARNEGIE MELLON: VU#800829
value: 0.17

Trust: 0.8

CNNVD: CNNVD-200506-129
value: MEDIUM

Trust: 0.6

NVD:
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2005-0488
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: CERT/CC: VU#800829 // JVNDB: JVNDB-2005-000380 // CNNVD: CNNVD-200506-129 // NVD: CVE-2005-0488

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-0488

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200506-129

TYPE

access verification error

Trust: 0.6

sources: CNNVD: CNNVD-200506-129

CONFIGURATIONS

sources: NVD: CVE-2005-0488

PATCH

title:Security Update 2006-004 Mac OS X 10.4.7 Client (PPC)url:http://www.apple.com/support/downloads/securityupdate2006004macosx1047clientppc.html

Trust: 0.8

title:Security Update 2006-004 (10.3.9 Client)url:http://www.apple.com/support/downloads/securityupdate20060041039client.html

Trust: 0.8

title:Security Update 2006-004 (10.3.9 Server)url:http://www.apple.com/support/downloads/securityupdate20060041039server.html

Trust: 0.8

title:Security Update 2006-004 Mac OS X 10.4.7 Client (Intel)url:http://www.apple.com/support/downloads/securityupdate2006004macosx1047clientintel.html

Trust: 0.8

title:Security Update 2006-004url:http://docs.info.apple.com/jarticle.html?artnum=304063-en

Trust: 0.8

title:Security Update 2006-004url:http://docs.info.apple.com/jarticle.html?artnum=304063

Trust: 0.8

title:krb5 (V2.x)url:http://www.miraclelinux.com/update/linux/list.php?errata_id=168

Trust: 0.8

title:telnet (V2.x)url:http://www.miraclelinux.com/support/update/list.php?errata_id=1087

Trust: 0.8

title:RHSA-2005:504url:https://rhn.redhat.com/errata/rhsa-2005-504.html

Trust: 0.8

title:RHSA-2005:562url:https://rhn.redhat.com/errata/rhsa-2005-562.html

Trust: 0.8

title:101665url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1

Trust: 0.8

title:101671url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1

Trust: 0.8

title:101665url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-3

Trust: 0.8

title:101671url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-3

Trust: 0.8

title:Security Update 2006-004 (10.3.9 Client)url:http://www.apple.com/jp/ftp-info/reference/securityupdate20060041039client.html

Trust: 0.8

title:Security Update 2006-004 (10.3.9 Server)url:http://www.apple.com/jp/ftp-info/reference/securityupdate20060041039server.html

Trust: 0.8

title:Security Update 2006-004 Mac OS X 10.4.7 Client (Intel)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2006004macosx1047clientintel.html

Trust: 0.8

title:Security Update 2006-004 Mac OS X 10.4.7 Client (PPC)url:http://www.apple.com/jp/ftp-info/reference/securityupdate2006004macosx1047clientppc.html

Trust: 0.8

title:RHSA-2005:562url:http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-562j.html

Trust: 0.8

title:RHSA-2005:504url:http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-504j.html

Trust: 0.8

sources: JVNDB: JVNDB-2005-000380

EXTERNAL IDS

db:NVDid:CVE-2005-0488

Trust: 3.5

db:CERT/CCid:VU#800829

Trust: 3.2

db:BIDid:13940

Trust: 2.7

db:USCERTid:TA06-214A

Trust: 2.4

db:SECTRACKid:1014203

Trust: 1.6

db:SECUNIAid:17135

Trust: 1.6

db:SECUNIAid:21253

Trust: 1.6

db:VUPENid:ADV-2006-3101

Trust: 1.6

db:BIDid:19289

Trust: 1.6

db:SECUNIAid:15690

Trust: 0.9

db:USCERTid:SA06-214A

Trust: 0.8

db:JVNDBid:JVNDB-2005-000380

Trust: 0.8

db:CERT/CCid:TA06-214A

Trust: 0.6

db:SUNALERTid:101665

Trust: 0.6

db:SUNALERTid:57761

Trust: 0.6

db:SUNALERTid:101671

Trust: 0.6

db:SUNALERTid:57755

Trust: 0.6

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:1139

Trust: 0.6

db:REDHATid:RHSA-2005:504

Trust: 0.6

db:REDHATid:RHSA-2005:562

Trust: 0.6

db:APPLEid:APPLE-SA-2006-08-01

Trust: 0.6

db:SUSEid:SUSE-SR:2005:016

Trust: 0.6

db:IDEFENSEid:20050614 MULTIPLE VENDOR TELNET CLIENT INFORMATION DISCLOSURE VULNERABILITY

Trust: 0.6

db:CNNVDid:CNNVD-200506-129

Trust: 0.6

db:PACKETSTORMid:37995

Trust: 0.1

sources: CERT/CC: VU#800829 // BID: 13940 // JVNDB: JVNDB-2005-000380 // PACKETSTORM: 37995 // CNNVD: CNNVD-200506-129 // NVD: CVE-2005-0488

REFERENCES

url:http://www.securityfocus.com/bid/13940

Trust: 2.4

url:http://www.us-cert.gov/cas/techalerts/ta06-214a.html

Trust: 2.4

url:http://www.kb.cert.org/vuls/id/800829

Trust: 2.4

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1

Trust: 1.9

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1

Trust: 1.9

url:http://idefense.com/application/poi/display?id=260&type=vulnerabilities

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2005-504.html

Trust: 1.6

url:http://www.novell.com/linux/security/advisories/2005_16_sr.html

Trust: 1.6

url:http://www.securityfocus.com/bid/19289

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2005-562.html

Trust: 1.6

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1

Trust: 1.6

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1

Trust: 1.6

url:http://securitytracker.com/id?1014203

Trust: 1.6

url:http://secunia.com/advisories/21253

Trust: 1.6

url:http://secunia.com/advisories/17135

Trust: 1.6

url:http://lists.apple.com/archives/security-announce/2006//aug/msg00000.html

Trust: 1.6

url:http://www.vupen.com/english/advisories/2006/3101

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11373

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1139

Trust: 1.0

url:http://secunia.com/advisories/15690/

Trust: 0.9

url:http://www.idefense.com/application/poi/display?id=260

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0488

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-1205

Trust: 0.8

url:http://www.apps.ietf.org/rfc/rfc1572.html

Trust: 0.8

url:http://www.securityfocus.com/archive/1/402230

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-0488

Trust: 0.8

url:http://jvn.jp/cert/jvnta06-214a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta06-214a/

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0488

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa06-214a.html

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/3101

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:1139

Trust: 0.6

url:http://www.microsoft.com/technet/security/bulletin/ms05-033.mspx

Trust: 0.4

url:http://support.avaya.com/elmodocs2/security/asa-2005-145_rhsa-2005-504.pdf

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2005-562.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2005-567.html

Trust: 0.3

url:http://www.microsoft.com/windowsserversystem/sfu/

Trust: 0.3

url:http://tech.f5.com/home/bigip/solutions/advisories/sol4616.html

Trust: 0.3

url:/archive/1/402230

Trust: 0.3

url:http://www.microsoft.com/downloads/details.aspx?familyid=32c4e286-2c4d-491a-9e05-4ca0b055d5dc

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/1176/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/22/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=c6161d9e-1672-479e-8baf-754a64dfab47

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=7c3dd615-b82d-4520-9c3a-376283b01d5b

Trust: 0.1

url:http://secunia.com/product/1175/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/product/16/

Trust: 0.1

url:http://secunia.com/product/5243/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=22095e78-a559-40ea-8b65-9c727f4e752f

Trust: 0.1

url:http://secunia.com/product/5244/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=b8ba775e-e9a7-47e9-81a9-a68a71b9faac

Trust: 0.1

url:http://secunia.com/product/1173/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=dcc6840f-e626-4266-a63a-cddec0ec44d6

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=b281550b-8fae-4ff3-9bb7-e4ba325779b9

Trust: 0.1

url:http://secunia.com/product/1174/

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=8eaad650-54db-44bc-ac9b-fc8a50f5a3b5

Trust: 0.1

url:http://www.microsoft.com/downloads/details.aspx?familyid=c23a4e16-e228-4a80-a4cb-9dcef462b97a

Trust: 0.1

sources: CERT/CC: VU#800829 // BID: 13940 // JVNDB: JVNDB-2005-000380 // PACKETSTORM: 37995 // CNNVD: CNNVD-200506-129 // NVD: CVE-2005-0488

CREDITS

Gaël Delalleau gael.delalleau+ moz@m4x.org

Trust: 0.6

sources: CNNVD: CNNVD-200506-129

SOURCES

db:CERT/CCid:VU#800829
db:BIDid:13940
db:JVNDBid:JVNDB-2005-000380
db:PACKETSTORMid:37995
db:CNNVDid:CNNVD-200506-129
db:NVDid:CVE-2005-0488

LAST UPDATE DATE

2024-05-04T21:21:44.320000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#800829date:2005-07-28T00:00:00
db:BIDid:13940date:2006-08-02T20:16:00
db:JVNDBid:JVNDB-2005-000380date:2007-07-24T00:00:00
db:CNNVDid:CNNVD-200506-129date:2012-12-26T00:00:00
db:NVDid:CVE-2005-0488date:2020-01-21T15:45:16.083

SOURCES RELEASE DATE

db:CERT/CCid:VU#800829date:2005-06-14T00:00:00
db:BIDid:13940date:2005-06-14T00:00:00
db:JVNDBid:JVNDB-2005-000380date:2007-04-01T00:00:00
db:PACKETSTORMid:37995date:2005-06-16T05:01:37
db:CNNVDid:CNNVD-200506-129date:2005-04-21T00:00:00
db:NVDid:CVE-2005-0488date:2005-06-14T04:00:00