ID

VAR-200708-0253


CVE

CVE-2007-4360


TITLE

DRAC4 Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-002508

DESCRIPTION

Unspecified vulnerability in Dell Remote Access Card 4 (DRAC4) with firmware 1.50 Build 02.16 allows remote attackers to cause a denial of service (SSH daemon crash) via certain network traffic, as demonstrated by an "nmap -O" scan with nmap 4.03, possibly related to a Mocana (Mocanada) SSH vulnerability. Attackers can exploit this issue to deny legitimate access to port 22 on affected computers. Dell Remote Access Card 4/P running firmware 1.50 (Build 02.16) is vulnerable; other versions may also be affected. There is a vulnerability in the SSH service of DRAC when processing malformed data connections. If you use the nmap-4.03-3 port scanning tool bundled with Debian unstable or Ubuntu Depper to perform port scanning on the SSH service of the Dell remote access card, the SSH port may become unavailable, and you must use the racadm tool to hard restart the entire system to recover. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. The vulnerability is caused due to an unspecified error and can be exploited to make the SSH service unresponsive e.g. via a port scan using nmap 4.03 with OS detection enabled. Other versions may also be affected. SOLUTION: Restrict network access to the device. PROVIDED AND/OR DISCOVERED BY: ETES GmbH ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065239.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-4360 // JVNDB: JVNDB-2007-002508 // BID: 25291 // VULHUB: VHN-27722 // PACKETSTORM: 58642

AFFECTED PRODUCTS

vendor:dellmodel:remote access cardscope:eqversion:4

Trust: 1.6

vendor:dellmodel:remote access cardscope:eqversion:firmware 1.50 build 02.16

Trust: 0.8

vendor:dellmodel:remote access card 4/p (buildscope:eqversion:1.5002.16)

Trust: 0.3

vendor:dellmodel:remote access card 4/p (buildscope:neversion:1.6010.04)

Trust: 0.3

sources: BID: 25291 // JVNDB: JVNDB-2007-002508 // CNNVD: CNNVD-200708-242 // NVD: CVE-2007-4360

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4360
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-4360
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200708-242
value: MEDIUM

Trust: 0.6

VULHUB: VHN-27722
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-4360
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27722
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27722 // JVNDB: JVNDB-2007-002508 // CNNVD: CNNVD-200708-242 // NVD: CVE-2007-4360

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-4360

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 58642 // CNNVD: CNNVD-200708-242

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200708-242

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002508

PATCH

title:DELL(TM) REMOTE ACCESS CONTROLLER (DRAC) 4url:ftp://ftp.us.dell.com/sysman/readme_160_A00.txt

Trust: 0.8

sources: JVNDB: JVNDB-2007-002508

EXTERNAL IDS

db:NVDid:CVE-2007-4360

Trust: 2.8

db:BIDid:25291

Trust: 2.0

db:SECUNIAid:26428

Trust: 1.8

db:VUPENid:ADV-2007-2908

Trust: 1.7

db:JVNDBid:JVNDB-2007-002508

Trust: 0.8

db:XFid:35998

Trust: 0.6

db:BUGTRAQid:20070813 RE: REMOTE DENIAL OF SERVICE FOR SSH SERVICE AT DELL DRAC4 (MAYBEMOCANA SSH)

Trust: 0.6

db:BUGTRAQid:20080118 [FIXED] REMOTE DENIAL OF SERVICE FOR SSH SERVICE AT DELL DRAC4(MAYBE MOCANA SSH)

Trust: 0.6

db:BUGTRAQid:20070813 REMOTE DENIAL OF SERVICE FOR SSH SERVICE AT DELL DRAC4 (MAYBEMOCANA SSH)

Trust: 0.6

db:CNNVDid:CNNVD-200708-242

Trust: 0.6

db:VULHUBid:VHN-27722

Trust: 0.1

db:PACKETSTORMid:58642

Trust: 0.1

sources: VULHUB: VHN-27722 // BID: 25291 // JVNDB: JVNDB-2007-002508 // PACKETSTORM: 58642 // CNNVD: CNNVD-200708-242 // NVD: CVE-2007-4360

REFERENCES

url:ftp://ftp.us.dell.com/sysman/readme_160_a00.txt

Trust: 2.0

url:http://www.securityfocus.com/bid/25291

Trust: 1.7

url:http://secunia.com/advisories/26428

Trust: 1.7

url:http://www.securityfocus.com/archive/1/476311/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/476301/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/486589/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/2908

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35998

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4360

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4360

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/476311/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/476301/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/35998

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/486589/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2908

Trust: 0.6

url:http://www.dell.com/

Trust: 0.3

url:/archive/1/486589

Trust: 0.3

url:/archive/1/476301

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/15338/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/advisories/26428/

Trust: 0.1

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-august/065239.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-27722 // BID: 25291 // JVNDB: JVNDB-2007-002508 // PACKETSTORM: 58642 // CNNVD: CNNVD-200708-242 // NVD: CVE-2007-4360

CREDITS

Robert Scheck scheck@etes.de

Trust: 0.6

sources: CNNVD: CNNVD-200708-242

SOURCES

db:VULHUBid:VHN-27722
db:BIDid:25291
db:JVNDBid:JVNDB-2007-002508
db:PACKETSTORMid:58642
db:CNNVDid:CNNVD-200708-242
db:NVDid:CVE-2007-4360

LAST UPDATE DATE

2025-04-10T23:25:44.448000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27722date:2018-10-15T00:00:00
db:BIDid:25291date:2008-01-18T15:18:00
db:JVNDBid:JVNDB-2007-002508date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200708-242date:2007-08-16T00:00:00
db:NVDid:CVE-2007-4360date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-27722date:2007-08-15T00:00:00
db:BIDid:25291date:2007-08-13T00:00:00
db:JVNDBid:JVNDB-2007-002508date:2012-06-26T00:00:00
db:PACKETSTORMid:58642date:2007-08-17T01:17:23
db:CNNVDid:CNNVD-200708-242date:2007-08-15T00:00:00
db:NVDid:CVE-2007-4360date:2007-08-15T19:17:00