ID

VAR-200904-0200


CVE

CVE-2008-6701


TITLE

NetScout Visualizer Vulnerabilities that can obtain administrator privileges

Trust: 0.8

sources: JVNDB: JVNDB-2009-004266

DESCRIPTION

NetScout (formerly Network General) Visualizer V2100 and InfiniStream i1730 do not restrict access to ResourceManager/en_US/domains/add_domain.jsp, which allows remote attackers to gain administrator privileges via a direct request. Attackers can exploit this issue to perform unauthorized administrative functions. This can aid in further attacks. The NetScout Administrator device is vulnerable; other devices may also be affected. Reports indicated that this issue may exist in Network General Visualizer V2100 and Network General Infinistream i1730 Sniffer. This has not been confirmed. ---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: NetScout Visualizer / InfiniStream Security Bypass SECUNIA ADVISORY ID: SA30514 VERIFY ADVISORY: http://secunia.com/advisories/30514/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: NetScout Visualizer http://secunia.com/product/19033/ Network General InfiniStream i1730 http://secunia.com/product/19035/ DESCRIPTION: A vulnerability has been reported in NetScout Visualizer and InfiniStream, which can be exploited by malicious users to perform certain actions with escalated privileges. The vulnerability is caused due to improper access restrictions to certain administrative pages in the web interface. This can be exploited to access administrative functions by directly accessing the URL of such pages. SOLUTION: Grant only trusted users access to affected system. PROVIDED AND/OR DISCOVERED BY: jgrove_2000 ORIGINAL ADVISORY: http://archives.neohapsis.com/archives/bugtraq/2008-06/0068.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-6701 // JVNDB: JVNDB-2009-004266 // BID: 29590 // VULHUB: VHN-36826 // PACKETSTORM: 67204

AFFECTED PRODUCTS

vendor:netscoutmodel:ngenius infinistreamscope:eqversion:i1730

Trust: 2.4

vendor:netscoutmodel:visualizerscope:eqversion:v2100

Trust: 2.4

vendor:netscoutmodel:administratorscope:eqversion:0

Trust: 0.3

sources: BID: 29590 // JVNDB: JVNDB-2009-004266 // CNNVD: CNNVD-200904-234 // NVD: CVE-2008-6701

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-6701
value: HIGH

Trust: 1.0

NVD: CVE-2008-6701
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200904-234
value: HIGH

Trust: 0.6

VULHUB: VHN-36826
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-6701
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-36826
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-36826 // JVNDB: JVNDB-2009-004266 // CNNVD: CNNVD-200904-234 // NVD: CVE-2008-6701

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-36826 // JVNDB: JVNDB-2009-004266 // NVD: CVE-2008-6701

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200904-234

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200904-234

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-004266

PATCH

title:Top Pageurl:http://www.netscout.com/Pages/default.aspx

Trust: 0.8

sources: JVNDB: JVNDB-2009-004266

EXTERNAL IDS

db:NVDid:CVE-2008-6701

Trust: 2.8

db:SECUNIAid:30514

Trust: 1.8

db:OSVDBid:46195

Trust: 1.7

db:JVNDBid:JVNDB-2009-004266

Trust: 0.8

db:XFid:42938

Trust: 0.6

db:BUGTRAQid:20080606 VULNERABILITY IN NETWORK GENERAL/NET SCOUT PRODUCT

Trust: 0.6

db:CNNVDid:CNNVD-200904-234

Trust: 0.6

db:BIDid:29590

Trust: 0.4

db:VULHUBid:VHN-36826

Trust: 0.1

db:PACKETSTORMid:67204

Trust: 0.1

sources: VULHUB: VHN-36826 // BID: 29590 // JVNDB: JVNDB-2009-004266 // PACKETSTORM: 67204 // CNNVD: CNNVD-200904-234 // NVD: CVE-2008-6701

REFERENCES

url:http://osvdb.org/46195

Trust: 1.7

url:http://secunia.com/advisories/30514

Trust: 1.7

url:http://www.securityfocus.com/archive/1/493171/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/42938

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-6701

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-6701

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/42938

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/493171/100/0/threaded

Trust: 0.6

url:http://www.netscout.com/products/administrator.asp

Trust: 0.3

url:/archive/1/493171

Trust: 0.3

url:http://secunia.com/product/19035/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://archives.neohapsis.com/archives/bugtraq/2008-06/0068.html

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://secunia.com/product/19033/

Trust: 0.1

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://secunia.com/advisories/30514/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-36826 // BID: 29590 // JVNDB: JVNDB-2009-004266 // PACKETSTORM: 67204 // CNNVD: CNNVD-200904-234 // NVD: CVE-2008-6701

CREDITS

;

Trust: 0.6

sources: CNNVD: CNNVD-200904-234

SOURCES

db:VULHUBid:VHN-36826
db:BIDid:29590
db:JVNDBid:JVNDB-2009-004266
db:PACKETSTORMid:67204
db:CNNVDid:CNNVD-200904-234
db:NVDid:CVE-2008-6701

LAST UPDATE DATE

2025-04-10T23:21:33.110000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-36826date:2018-10-11T00:00:00
db:BIDid:29590date:2008-06-06T00:00:00
db:JVNDBid:JVNDB-2009-004266date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200904-234date:2009-04-13T00:00:00
db:NVDid:CVE-2008-6701date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-36826date:2009-04-10T00:00:00
db:BIDid:29590date:2008-06-06T00:00:00
db:JVNDBid:JVNDB-2009-004266date:2012-09-25T00:00:00
db:PACKETSTORMid:67204date:2008-06-11T22:00:21
db:CNNVDid:CNNVD-200904-234date:2009-04-10T00:00:00
db:NVDid:CVE-2008-6701date:2009-04-10T22:00:00.547