ID

VAR-200509-0051


CVE

CVE-2005-2984


TITLE

Avocent CCM Port Access Restriction Bypass Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200509-159

DESCRIPTION

Avocent CCM console server running firmware 2.1 CCM4850 allows remote authenticated attackers to bypass port restrictions by connecting to the server via SSH and using the connect command to access the serial port. Avocent CCM is prone to a vulnerability that permits the bypass of access control to privileged ports. This issue is due to a failure in the application to perform proper authorization before granting access to internal functions. An attacker can exploit this vulnerability to bypass access control and gain privileged access to ports and devices connected to the vulnerable appliance. Avocent CCM is a multi-computer controller. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Avocent CCM Port Access Control Bypass Vulnerability SECUNIA ADVISORY ID: SA16836 VERIFY ADVISORY: http://secunia.com/advisories/16836/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Avocent CCM XX50 http://secunia.com/product/5714/ DESCRIPTION: Dirk Wetter has reported a vulnerability in Avocent CCM, which can be exploited by malicious users to bypass certain security restrictions. The vulnerability has been reported in CCM4850 with firmware 2.1. SOLUTION: Update to firmware version 2.3. ftp://ftp.avocent.com/public/product-upgrades/$ds1800/CCMx50%20Series/CCMx50%27s_AV_2.3/ PROVIDED AND/OR DISCOVERED BY: Dirk Wetter ORIGINAL ADVISORY: http://drwetter.org/cs-probs/avocent-sshbug.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-2984 // BID: 14853 // VULHUB: VHN-14193 // PACKETSTORM: 40070

AFFECTED PRODUCTS

vendor:data center resourcesmodel:avocentscope:eqversion:ccm4850_2.1_firmware

Trust: 1.6

vendor:datamodel:center resources avocent ccm4850scope:eqversion:2.1

Trust: 0.3

vendor:datamodel:center resources avocent ccm4850scope:neversion:2.3

Trust: 0.3

sources: BID: 14853 // NVD: CVE-2005-2984 // CNNVD: CNNVD-200509-159

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2005-2984
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200509-159
value: MEDIUM

Trust: 0.6

VULHUB: VHN-14193
value: MEDIUM

Trust: 0.1

NVD:
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: TRUE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

VULHUB: VHN-14193
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-14193 // NVD: CVE-2005-2984 // CNNVD: CNNVD-200509-159

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-2984

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-200509-159

TYPE

access verification error

Trust: 0.6

sources: CNNVD: CNNVD-200509-159

CONFIGURATIONS

sources: NVD: CVE-2005-2984

EXTERNAL IDS

db:BIDid:14853

Trust: 2.0

db:SECUNIAid:16836

Trust: 1.8

db:NVDid:CVE-2005-2984

Trust: 1.7

db:CNNVDid:CNNVD-200509-159

Trust: 0.7

db:XFid:22302

Trust: 0.6

db:BUGTRAQid:20050915 AVOCENT CCM: PORT ACCESS CONTROL BYPASS VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-14193

Trust: 0.1

db:PACKETSTORMid:40070

Trust: 0.1

sources: VULHUB: VHN-14193 // BID: 14853 // PACKETSTORM: 40070 // NVD: CVE-2005-2984 // CNNVD: CNNVD-200509-159

REFERENCES

url:http://drwetter.org/cs-probs/avocent-sshbug.txt

Trust: 1.8

url:http://secunia.com/advisories/16836/

Trust: 1.8

url:http://www.securityfocus.com/bid/14853

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/22302

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=112680615103315&w=2

Trust: 1.0

url:http://xforce.iss.net/xforce/xfdb/22302

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=112680615103315&w=2

Trust: 0.6

url:http://www.datacenterresources.com/remote/avocent_ccm.asp

Trust: 0.3

url:/archive/1/410726

Trust: 0.3

url:http://marc.info/?l=bugtraq&m=112680615103315&w=2

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/5714/

Trust: 0.1

sources: VULHUB: VHN-14193 // BID: 14853 // PACKETSTORM: 40070 // NVD: CVE-2005-2984 // CNNVD: CNNVD-200509-159

CREDITS

Dirk Wetter is credited with the discovery of this vulnerability.

Trust: 0.9

sources: BID: 14853 // CNNVD: CNNVD-200509-159

SOURCES

db:VULHUBid:VHN-14193
db:BIDid:14853
db:PACKETSTORMid:40070
db:NVDid:CVE-2005-2984
db:CNNVDid:CNNVD-200509-159

LAST UPDATE DATE

2023-12-18T12:24:17.908000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-14193date:2017-07-11T00:00:00
db:BIDid:14853date:2005-09-15T00:00:00
db:NVDid:CVE-2005-2984date:2017-07-11T01:33:04.267
db:CNNVDid:CNNVD-200509-159date:2005-10-20T00:00:00

SOURCES RELEASE DATE

db:VULHUBid:VHN-14193date:2005-09-20T00:00:00
db:BIDid:14853date:2005-09-15T00:00:00
db:PACKETSTORMid:40070date:2005-09-16T19:27:29
db:NVDid:CVE-2005-2984date:2005-09-20T00:03:00
db:CNNVDid:CNNVD-200509-159date:2005-09-19T00:00:00