ID

VAR-200612-0415


CVE

CVE-2006-6717


TITLE

Allied Telesis AT-9000/24 Ethernet Vulnerability in an attack from an unexpected location on the switch

Trust: 0.8

sources: JVNDB: JVNDB-2006-001793

DESCRIPTION

The Allied Telesis AT-9000/24 Ethernet switch accepts management packets from arbitrary VLANs, contrary to the documentation, which allows remote attackers to conduct attacks against the switch from unexpected locations. Allied Telesis AT-9000/24 switches are prone to an unauthorized-management-VLAN-access vulnerability. Exploiting this issue allows attackers with access to any port on affected switches to access the management VLAN. This may aid them in further attacks. Allied Telesis AT-9000/24 ​​is a 24-port Gigabit switch made by Allied Telesis in the United States. Allied Telesis AT-9000/24 ​​has loopholes in the managed access control, and attackers may gain unauthorized access to the device. Under normal circumstances, the remote management (SNMP, TELNET, HTTP) of the switch should only be performed through the management VLAN. The only management VLAN option for the AT-9000/24 ​​is Default VLAN. However, if the switch is configured to contain multiple VLANs instead of just the Default VLAN, it can be managed from all of these VLANs. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Simple Web Content Management System "id" SQL Injection SECUNIA ADVISORY ID: SA23590 VERIFY ADVISORY: http://secunia.com/advisories/23590/ CRITICAL: Moderately critical IMPACT: Manipulation of data, Exposure of system information, Exposure of sensitive information WHERE: >From remote SOFTWARE: Simple Web Content Management System http://secunia.com/product/13142/ DESCRIPTION: DarkFig has discovered a vulnerability in Simple Web Content Management System, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the "id" parameter in page.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation allows retrieval of arbitrary files from the database server. SOLUTION: Edit the source code to ensure that input is properly sanitised. PROVIDED AND/OR DISCOVERED BY: DarkFig ORIGINAL ADVISORY: http://acid-root.new.fr/poc/18070102.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2006-6717 // JVNDB: JVNDB-2006-001793 // BID: 21628 // VULHUB: VHN-22825 // PACKETSTORM: 53423

AFFECTED PRODUCTS

vendor:alliedtelesynmodel:at-9000 24 ethernetswitchscope:eqversion:*

Trust: 1.0

vendor:allied telesismodel:at-9000 24 ethernetswitchscope: - version: -

Trust: 0.8

vendor:alliedtelesynmodel:at-9000 24 ethernetswitchscope: - version: -

Trust: 0.6

vendor:allied telesismodel:at-9000/24scope:eqversion:0

Trust: 0.3

sources: BID: 21628 // JVNDB: JVNDB-2006-001793 // CNNVD: CNNVD-200612-502 // NVD: CVE-2006-6717

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-6717
value: HIGH

Trust: 1.0

NVD: CVE-2006-6717
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200612-502
value: HIGH

Trust: 0.6

VULHUB: VHN-22825
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-6717
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-22825
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-22825 // JVNDB: JVNDB-2006-001793 // CNNVD: CNNVD-200612-502 // NVD: CVE-2006-6717

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-6717

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200612-502

TYPE

access verification error

Trust: 0.6

sources: CNNVD: CNNVD-200612-502

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-001793

PATCH

title:Top Pageurl:http://www.alliedtelesis.com/

Trust: 0.8

sources: JVNDB: JVNDB-2006-001793

EXTERNAL IDS

db:NVDid:CVE-2006-6717

Trust: 2.5

db:BIDid:21628

Trust: 2.0

db:SECUNIAid:23590

Trust: 1.8

db:SECUNIAid:23451

Trust: 1.7

db:JVNDBid:JVNDB-2006-001793

Trust: 0.8

db:CNNVDid:CNNVD-200612-502

Trust: 0.7

db:BUGTRAQid:20061216 ALLIED TELESIS AT-9000/24 ETHERNET SWITCH MANAGEMENT CAN BE ACCESSED FROM ALL VLANS.

Trust: 0.6

db:XFid:30924

Trust: 0.6

db:VULHUBid:VHN-22825

Trust: 0.1

db:PACKETSTORMid:53423

Trust: 0.1

sources: VULHUB: VHN-22825 // BID: 21628 // JVNDB: JVNDB-2006-001793 // PACKETSTORM: 53423 // CNNVD: CNNVD-200612-502 // NVD: CVE-2006-6717

REFERENCES

url:http://www.securityfocus.com/bid/21628

Trust: 1.7

url:http://secunia.com/advisories/23451

Trust: 1.7

url:http://secunia.com/advisories/23590

Trust: 1.7

url:http://www.securityfocus.com/archive/1/454630/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/30924

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-6717

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-6717

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/30924

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/454630/100/0/threaded

Trust: 0.6

url:http://www.alliedtelesyn.com/products/details.aspx?604

Trust: 0.3

url:/archive/1/454630

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://acid-root.new.fr/poc/18070102.txt

Trust: 0.1

url:http://secunia.com/advisories/23590/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/13142/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-22825 // BID: 21628 // JVNDB: JVNDB-2006-001793 // PACKETSTORM: 53423 // CNNVD: CNNVD-200612-502 // NVD: CVE-2006-6717

CREDITS

Pasi Sjöholm ptsjohol@cc.jyu.fi

Trust: 0.6

sources: CNNVD: CNNVD-200612-502

SOURCES

db:VULHUBid:VHN-22825
db:BIDid:21628
db:JVNDBid:JVNDB-2006-001793
db:PACKETSTORMid:53423
db:CNNVDid:CNNVD-200612-502
db:NVDid:CVE-2006-6717

LAST UPDATE DATE

2025-04-10T23:13:25.650000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-22825date:2018-10-17T00:00:00
db:BIDid:21628date:2006-12-18T17:33:00
db:JVNDBid:JVNDB-2006-001793date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200612-502date:2007-01-03T00:00:00
db:NVDid:CVE-2006-6717date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-22825date:2006-12-23T00:00:00
db:BIDid:21628date:2006-12-16T00:00:00
db:JVNDBid:JVNDB-2006-001793date:2012-06-26T00:00:00
db:PACKETSTORMid:53423date:2007-01-04T17:16:54
db:CNNVDid:CNNVD-200612-502date:2006-12-23T00:00:00
db:NVDid:CVE-2006-6717date:2006-12-23T11:28:00