ID

VAR-200907-0122


CVE

CVE-2009-2300


TITLE

phion airlock WAF Service disruption in the management interface (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2009-004787

DESCRIPTION

The management interface in the phion airlock Web Application Firewall (WAF) 4.1-10.41 does not properly handle CGI requests that specify large width and height parameters for an image, which allows remote attackers to execute arbitrary commands or cause a denial of service (resource consumption) via a crafted request. Airlock Web Application Firewall is prone to a denial-of-service vulnerability. CGI requests specify large width and height parameters for images. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: phion airlock Web Application Firewall Command Injection Vulnerability SECUNIA ADVISORY ID: SA35641 VERIFY ADVISORY: http://secunia.com/advisories/35641/ DESCRIPTION: A vulnerability has been reported in phion airlock Web Application Firewall, which can be exploited by malicious people to compromise a vulnerable system. Input passed via certain unspecified parameters is not properly sanitised before being used. This can be exploited to inject and execute arbitrary commands by sending specially crafted requests to the management interface. The vulnerability is reported in version 4.1-10.41. Other versions may also be affected. SOLUTION: Apply the hotfix: https://techzone.phion.com/hotfix_HF4112 PROVIDED AND/OR DISCOVERED BY: Michael Kirchner, Wolfgang Neudorfer, and Lukas Nothdurfter. ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2009-July/069470.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2009-2300 // JVNDB: JVNDB-2009-004787 // BID: 79448 // VULHUB: VHN-39746 // PACKETSTORM: 78904

AFFECTED PRODUCTS

vendor:phionmodel:airlock web application firewallscope:eqversion:4.1-10.41

Trust: 2.7

sources: BID: 79448 // JVNDB: JVNDB-2009-004787 // CNNVD: CNNVD-200907-038 // NVD: CVE-2009-2300

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2300
value: HIGH

Trust: 1.0

NVD: CVE-2009-2300
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200907-038
value: CRITICAL

Trust: 0.6

VULHUB: VHN-39746
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-2300
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-39746
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-39746 // JVNDB: JVNDB-2009-004787 // CNNVD: CNNVD-200907-038 // NVD: CVE-2009-2300

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-39746 // JVNDB: JVNDB-2009-004787 // NVD: CVE-2009-2300

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200907-038

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200907-038

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-004787

PATCH

title:Top Pageurl:http://www.barracudanetworksag.com/

Trust: 0.8

sources: JVNDB: JVNDB-2009-004787

EXTERNAL IDS

db:NVDid:CVE-2009-2300

Trust: 2.8

db:SECUNIAid:35641

Trust: 1.8

db:JVNDBid:JVNDB-2009-004787

Trust: 0.8

db:BUGTRAQid:20090701 PHION AIRLOCK WEB APPLICATION FIREWALL: REMOTE DENIAL OF SERVICE VIA MANAGEMENT INTERFACE (UNAUTHENTICATED) AND COMMAND EXECUTION

Trust: 0.6

db:CNNVDid:CNNVD-200907-038

Trust: 0.6

db:BIDid:79448

Trust: 0.4

db:VULHUBid:VHN-39746

Trust: 0.1

db:PACKETSTORMid:78904

Trust: 0.1

sources: VULHUB: VHN-39746 // BID: 79448 // JVNDB: JVNDB-2009-004787 // PACKETSTORM: 78904 // CNNVD: CNNVD-200907-038 // NVD: CVE-2009-2300

REFERENCES

url:https://techzone.phion.com/hotfix_hf4112

Trust: 2.1

url:http://secunia.com/advisories/35641

Trust: 1.7

url:http://www.securityfocus.com/archive/1/504681/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/archive/1/504681/100/0/threaded

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2300

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2300

Trust: 0.8

url:http://lists.grok.org.uk/pipermail/full-disclosure/2009-july/069470.html

Trust: 0.1

url:http://secunia.com/advisories/35641/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

sources: VULHUB: VHN-39746 // BID: 79448 // JVNDB: JVNDB-2009-004787 // PACKETSTORM: 78904 // CNNVD: CNNVD-200907-038 // NVD: CVE-2009-2300

CREDITS

Unknown

Trust: 0.3

sources: BID: 79448

SOURCES

db:VULHUBid:VHN-39746
db:BIDid:79448
db:JVNDBid:JVNDB-2009-004787
db:PACKETSTORMid:78904
db:CNNVDid:CNNVD-200907-038
db:NVDid:CVE-2009-2300

LAST UPDATE DATE

2025-04-10T23:12:53.669000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-39746date:2018-10-10T00:00:00
db:BIDid:79448date:2009-07-02T00:00:00
db:JVNDBid:JVNDB-2009-004787date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200907-038date:2009-07-15T00:00:00
db:NVDid:CVE-2009-2300date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-39746date:2009-07-02T00:00:00
db:BIDid:79448date:2009-07-02T00:00:00
db:JVNDBid:JVNDB-2009-004787date:2012-09-25T00:00:00
db:PACKETSTORMid:78904date:2009-07-06T09:26:46
db:CNNVDid:CNNVD-200907-038date:2009-07-02T00:00:00
db:NVDid:CVE-2009-2300date:2009-07-02T10:30:00.420