VARIoT IoT vulnerabilities database

VAR-201106-0319 | No CVE | NetGear WNDAP350 Wireless Access Point Information Disclosure Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
The NetGear WNDAP350 is a wireless access device. The NetGear WNDAP350 wireless access point lacks the correct restrictions on access. An attacker can exploit the vulnerability to obtain sensitive information, including plain text management passwords or WPA ciphertext, through the download.php or BackupConfig.php script.
WNDAP350 with firmware 2.0.1 and 2.0.9 are vulnerable; other firmware versions may also be affected
VAR-201106-0112 | CVE-2011-2040 |
Cisco AnyConnect SSL VPN arbitrary code execution
Related entries in the VARIoT exploits database: VAR-E-201106-0065 |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
The helper application in Cisco AnyConnect Secure Mobility Client (formerly AnyConnect VPN Client) before 2.5.3041, and 3.0.x before 3.0.629, on Linux and Mac OS X downloads a client executable file (vpndownloader.exe) without verifying its authenticity, which allows remote attackers to execute arbitrary code via the url property to a Java applet, aka Bug ID CSCsy05934. The Cisco AnyConnect SSL VPN ActiveX and Java clients contain a vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Cisco AnyConnect Secure Mobility Client is a remote access solution from Cisco that is Cisco's next-generation VPN client. WEB pages that use social engineering spoofing or other vulnerabilities to entice users to access, allowing an attacker to provide arbitrary executable programs for the helper application to download and execute.
This issue is tracked by Cisco Bug IDs CSCsy00904 and CSCsy05934. There are no workarounds for the vulnerabilities
described in this advisory.
This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20110601-ac.shtml
Affected Products
=================
Vulnerable Products
+------------------
The vulnerabilities described in this document apply to the Cisco
AnyConnect Secure Mobility Client. The affected versions are included
in the following table:
+------------------------------------------------------------+
| Vulnerability | Platform | Affected Versions |
|-------------------+-----------+----------------------------|
| | Microsoft | All versions prior to |
| | Windows | 2.3.185 |
| |-----------+----------------------------|
| Arbitrary Program | | * All versions in major |
| Execution | | releases other than |
| Vulnerability | Linux, | 2.5.x and 3.0.x. |
| | Apple | * 2.5.x releases prior |
| | MacOS X | to 2.5.3041 |
| | | * 3.0.x releases prior |
| | | to 3.0.629 |
|-------------------+-----------+----------------------------|
| | Microsoft | All versions prior to |
| Local Privilege | Windows | 2.3.254 |
|Escalation |-----------+----------------------------|
| Vulnerability | Linux, | |
| | Apple | Not affected |
| | MacOS X | |
+------------------------------------------------------------+
Note: Microsoft Windows Mobile versions are affected by the Arbitrary
Program Execution Vulnerability.
No other Cisco products are currently known to be affected by these
vulnerabilities. After the user logs in, the browser displays a portal
window and when the user clicks the "Start AnyConnect" link, the
process of downloading the Cisco AnyConnect Secure Mobility Client
begins. The helper application is a Java
applet on the Linux and MacOS X platforms, and either a Java applet
on the Windows platform or an ActiveX control if the browser is
capable of utilizing ActiveX controls. The downloaded helper
application is executed in the context of the originating site in the
user's web browser. This
arbitrary executable would be executed with the same operating system
privileges under which the web browser was run. Common
Vulnerabilities and Exposures (CVE) IDs CVE-2011-2039 (for
CSCsy00904) and CVE-2011-2040 (for CSCsy05934) have been assigned for
these vulnerabilities. An attacker may
engineer a web page to supply an affected version of the ActiveX
control or Java applet and still accomplish arbitrary program
execution because of the lack of authenticity validation. When this occurs, an
old version of the ActiveX control will not be instantiated if
one is presented for download. This
action accomplishes the same result as the previous
recommendation -- it deploys new, fixed versions of the ActiveX
control so that old, vulnerable versions of the control are not
instantiated if one is presented for download. This action prevents the
ActiveX control from being instantiated under any scenario.
Instructions for setting the kill bit are beyond the scope of
this document; refer to the Microsoft Support article "How to
stop an ActiveX control from running in Internet Explorer" at
http://support.microsoft.com/kb/240797 and the Microsoft Security
Vulnerability Research & Defense's "Kill-Bit FAQ" blog posts
referenced in the Microsoft Support article for more information. Note that this CLSID
did not change with new versions of the ActiveX control that
implement code signing validation.
Mitigating the risk of old versions of the Java applet can be
accomplished by blacklisting old, vulnerable versions using the Jar
blacklist feature introduced with Java SE 6 Update 14. For
information on the Jar blacklist feature refer to the Java SE 6
Update 14 release notes, available at:
http://www.oracle.com/technetwork/java/javase/6u14-137039.html
The jar files to be blacklisted are identified by the following SHA-1
message digests:
# 2.3.0254, 2.3.1003, 2.3.2016, 2.4.0202, 2.4.1012,
# 2.5.0217, 2.5.1025, 2.5.2001, 2.5.2006, 2.5.2010,
# 2.5.2011, 2.5.2014, 2.5.2017, 2.5.2018, 2.5.2019
SHA1-Digest-Manifest : xmarT5s8kwnKRLxnCOoLUnxnveE=
# 2.2.0133, 2.2.0136, 2.2.0140
SHA1-Digest-Manifest : 2wXAWNws4uNdCioU1eoCOS4+J3o=
# 2.0.0343, 2.1.0148
SHA1-Digest-Manifest : OlNnvozFCxbJZbRfGiLckOE8uFQ=
Local Privilege Escalation Vulnerability
+---------------------------------------
Unprivileged users can elevate their privileges to those of the
LocalSystem account by enabling the Start Before Logon (SBL) feature
and interacting with the Cisco AnyConnect Secure Mobility Client
graphical user interface in the Windows logon screen.
To prevent this issue, fixed versions of the Cisco AnyConnect Secure
Mobility Client limit the amount of interaction that is possible in
the client's graphical user interface when it is displayed on the
Windows logon screen.
Vulnerability Scoring Details
+----------------------------
Cisco has provided scores for the vulnerabilities in this advisory
based on the Common Vulnerability Scoring System (CVSS). The CVSS
scoring in this Security Advisory is done in accordance with CVSS
version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of
the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding
CVSS at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss
* CSCsy00904 & CSCsy05934 - Arbitrary Program Execution Vulnerability
CVSS Base Score - 7.6
Access Vector - Network
Access Complexity - High
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 6.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
* CSCta40556 -- AnyConnect: Security issue with SBL on versions
prior to 2.3
CVSS Base Score - 7.2
Access Vector - Local
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 6.0
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Impact
======
Arbitrary Program Execution Vulnerability
+----------------------------------------
Exploitation of this vulnerability may allow an attacker to execute
arbitrary programs on the computer of a Cisco AnyConnect Secure
Mobility Client user with the privileges of the user who is
establishing the VPN connection.
Software Versions and Fixes
===========================
When considering software upgrades, also consult:
http://www.cisco.com/go/psirt
and any subsequent advisories to determine exposure and a complete
upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.
+------------------------------------------------------------+
| Vulnerability | Platform | First Fixed |
| | | Release |
|----------------------------+---------------+---------------|
| | Microsoft | 2.3.185 |
| Arbitrary Program | Windows | |
|Execution Vulnerability |---------------+---------------|
| | Linux, Apple | 2.5.3041 and |
| | Mac OS X | 3.0.629 |
|----------------------------+---------------+---------------|
| | Microsoft | 2.3.254 |
| Local Privilege Escalation | Windows | |
|Vulnerability |---------------+---------------|
| | Linux, Apple | Not affected |
| | Mac OS X | |
+------------------------------------------------------------+
Recommended Releases
The following table lists all recommended releases. These recommended
releases contain the fixes for all vulnerabilities in this advisory.
Cisco recommends upgrading to a release that is equal to or later
than these recommended releases.
Workarounds
===========
There are no workarounds for the vulnerabilities that are described
in this advisory.
Obtaining Fixed Software
========================
Cisco has released free software updates that address these
vulnerabilities. Prior to deploying software, customers should
consult their maintenance provider or check the software for feature
set compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature sets
they have purchased. By installing, downloading, accessing or
otherwise using such software upgrades, customers agree to be bound
by the terms of Cisco's software license terms found at:
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
or as otherwise set forth at Cisco.com Downloads at:
http://www.cisco.com/public/sw-center/sw-usingswc.shtml
Do not contact psirt@cisco.com or security-alert@cisco.com for
software upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through
their regular update channels. For most customers, this means that
upgrades should be obtained through the Software Center on Cisco's
worldwide website at http://www.cisco.com.
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through
prior or existing agreements with third-party support organizations,
such as Cisco Partners, authorized resellers, or service providers
should contact that support organization for guidance and assistance
with the appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations, such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or
fix is the most appropriate for use in the intended network before it
is deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco
service contract, and customers who purchase through third-party
vendors but are unsuccessful in obtaining fixed software through
their point of sale should acquire upgrades by contacting the Cisco
Technical Assistance Center (TAC). TAC contacts are as follows.
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Customers should have their product serial number available and be
prepared to give the URL of this notice as evidence of entitlement to
a free upgrade. Free upgrades for non-contract customers must be
requested through the TAC.
Refer to:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
for additional TAC contact information, including localized telephone
numbers, and instructions and e-mail addresses for use in various
languages.
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerability described in this advisory. Cisco would like to
thank iDefense for reporting this vulnerability and for working with
us towards a coordinated disclosure of the vulnerability.
The Local Privilege Escalation Vulnerability was reported to Cisco by
a customer.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that
omits the distribution URL in the following section is an
uncontrolled copy, and may lack important information or contain
factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20110601-ac.shtml
In addition to worldwide web posting, a text version of this notice
is clear-signed with the Cisco PSIRT PGP key and is posted to the
following e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-bulletins@lists.first.org
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.grok.org.uk
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on
mailing lists or newsgroups. Users concerned about this problem are
encouraged to check the above URL for any updates.
Revision History
================
+---------------------------------------+
| Revision | | Initial |
| 1.0 | 2011-June-01 | public |
| | | release. |
+---------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco security notices.
All Cisco security advisories are available at:
http://www.cisco.com/go/psirt
+--------------------------------------------------------------------
Copyright 2010-2011 Cisco Systems, Inc. All rights reserved.
+--------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)
iF4EAREIAAYFAk3mbJUACgkQQXnnBKKRMNBBxAD+Oh7XQCOtCDOFCY8K1hWFAV/K
iwgK2hG+GNV39PPndfQA/0Sked3glEypuwev05ULO4ukTAPoDI5CJLnb4W4TKjL8
=pAlh
-----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
Cisco AnyConnect VPN Client Two Vulnerabilities
SECUNIA ADVISORY ID:
SA44812
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44812/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44812
RELEASE DATE:
2011-06-03
DISCUSS ADVISORY:
http://secunia.com/advisories/44812/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44812/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44812
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Two vulnerabilities have been reported in Cisco AnyConnect VPN
Client, which can be exploited by malicious people with physical
access to bypass certain security restrictions and by malicious
people to compromise a user's system.
Successful exploitation of this vulnerability requires the Start
Before Logon (SBL) feature to be enabled.
2) An error in the helper application used for remote deployment of
the client (e.g.
SOLUTION:
Update to a fixed version (please see the vendor's advisory for
details).
PROVIDED AND/OR DISCOVERED BY:
1) Reported to the vendor by a customer.
2) The vendor credits Elazar Broad via iDefense.
ORIGINAL ADVISORY:
Cisco (cisco-sa-20110601-ac):
http://www.cisco.com/warp/public/707/cisco-sa-20110601-ac.shtml
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-201106-0025 | CVE-2011-1602 | Cisco Unified IP Phone 7900 of su Vulnerability gained by utility |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426. The problem is Bug ID CSCtf07426 It is a problem.Authority may be obtained by local users. The Cisco Unified IP Phone is Cisco's unified IP telephony solution. These three
vulnerabilities are classified as two privilege escalation
vulnerabilities and one signature bypass vulnerability.
Cisco has released free software updates that address these
vulnerabilities. There are no workarounds available to mitigate these
vulnerabilities.
This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20110601-phone.shtml. The following sections provide the details of each
vulnerability addressed in this security advisory.
These vulnerabilities are documented in Cisco bug IDs CSCtf07426
and CSCtn65815 and have been assigned Common Vulnerabilities and
Exposures (CVE) identifiers CVE-2011-1602 and CVE-2011-1603
respectively.
Vulnerability Scoring Details
+----------------------------
Cisco has provided scores for the vulnerabilities in this advisory
based on the Common Vulnerability Scoring System (CVSS). The CVSS
scoring in this Security Advisory is done in accordance with CVSS
version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of
the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding
CVSS at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss
* CSCtf07426 - Privilege Escalation with "su" utility
CVSS Base Score - 6.6
Access Vector - Local
Access Complexity - Medium
Authentication - Single
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 5.5
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
* CSCtn65815 - Privilege Escalation in IP Phones
CVSS Base Score - 6.6
Access Vector - Local
Access Complexity - Medium
Authentication - Single
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 5.5
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
* CSCtn65962 - Phones Permits the Installation of Unsigned Code
CVSS Base Score - 1.5
Access Vector - Local
Access Complexity - Medium
Authentication - Single
Confidentiality Impact - Partial
Integrity Impact - None
Availability Impact - None
CVSS Temporal Score - 1.2
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Impact
======
Successful exploitation of the two privilege escalation
vulnerabilities could allow an authenticated attacker to change phone
configuration and obtain system information.
Successful exploitation of the signature verification bypass
vulnerability that could allow an authenticated attacker to load and
execute a software image without verification of its signature.
Software Versions and Fixes
===========================
When considering software upgrades, also consult:
http://www.cisco.com/go/psirt and any subsequent advisories to
determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.
+---------------------------------------+
| | First |
| Vulnerability | Fixed |
| | Release |
|----------------------------+----------|
| CSCtf07426 - Privilege | |
| Escalation with "su" | 9.0.3 |
| utility | |
|----------------------------+----------|
| CSCtn65815 - Privilege | 9.2.1 |
| Escalation in IP Phones | |
|----------------------------+----------|
| CSCtn65962 - Phones | |
| Permits the Installation | 9.2.1 |
| of Unsigned Code | |
+---------------------------------------+
Workarounds
===========
There are no workarounds available to mitigate any of these
vulnerabilities. Note: All of these vulnerabilities require the
attacker to be authenticated.
Obtaining Fixed Software
========================
Cisco has released free software updates that address these
vulnerabilities. Prior to deploying software, customers should
consult their maintenance provider or check the software for feature
set compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature sets
they have purchased. By installing, downloading, accessing or
otherwise using such software upgrades, customers agree to be bound
by the terms of Cisco's software license terms found at:
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
or as otherwise set forth at Cisco.com Downloads at:
http://www.cisco.com/public/sw-center/sw-usingswc.shtml
Do not contact psirt@cisco.com or security-alert@cisco.com for
software upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through
their regular update channels. For most customers, this means that
upgrades should be obtained through the Software Center on Cisco's
worldwide website at http://www.cisco.com
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through
prior or existing agreements with third-party support organizations,
such as Cisco Partners, authorized resellers, or service providers
should contact that support organization for guidance and assistance
with the appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations, such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or
fix is the most appropriate for use in the intended network before it
is deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco
service contract, and customers who purchase through third-party
vendors but are unsuccessful in obtaining fixed software through
their point of sale should acquire upgrades by contacting the Cisco
Technical Assistance Center (TAC). TAC contacts are as follows.
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Customers should have their product serial number available and be
prepared to give the URL of this notice as evidence of entitlement to
a free upgrade. Free upgrades for non-contract customers must be
requested through the TAC.
Refer to:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
for additional TAC contact information, including localized telephone
numbers, and instructions and e-mail addresses for use in various languages.
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerability described in this advisory.
These vulnerabilities were discovered and reported to Cisco by Matt
Duggan of Qualcomm.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that
omits the distribution URL in the following section is an
uncontrolled copy, and may lack important information or contain
factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20110601-phone.shtml
In addition to worldwide web posting, a text version of this notice
is clear-signed with the Cisco PSIRT PGP key and is posted to the
following e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-bulletins@lists.first.org
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.grok.org.uk
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on
mailing lists or newsgroups. Users concerned about this problem are
encouraged to check the above URL for any updates.
Revision History
================
+---------------------------------------+
| Revision | | Initial |
| 1.0 | 2011-June-01 | public |
| | | release. |
+---------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco security notices.
All Cisco security advisories are available at:
http://www.cisco.com/go/psirt
+--------------------------------------------------------------------
Copyright 2010-2011 Cisco Systems, Inc. All rights reserved.
+--------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
iFcDBQFN5k0FQXnnBKKRMNARCCF9AP0ar3AfiP9uA0nW3t6SFYx6XIdGytUG2S/K
1SMd+3y7wgEAhzzCUzc85QKeV/jicP5lXboEspr5eU7MftNMqM1oUNw=
=ZBzs
-----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
Cisco Unified IP Phone Privilege Escalation and Security Bypass
SECUNIA ADVISORY ID:
SA44814
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44814/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44814
RELEASE DATE:
2011-06-03
DISCUSS ADVISORY:
http://secunia.com/advisories/44814/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44814/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44814
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Some security issues have been reported in Cisco Unified IP Phone
models, which can be exploited by malicious, local users to bypass
certain security restrictions and perform certain actions with
escalated privileges.
3) An error in the device does not properly verify the signature of
the software image before loading the image and can be exploited to
upload an arbitrary software image.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20110601-phone.shtml
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-201106-0021 | CVE-2011-1637 | Cisco Unified IP Phones 7900 Vulnerabilities that can gain privileges on devices |
CVSS V2: 1.5 CVSS V3: - Severity: LOW |
Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.2.1 do not properly verify signatures for software images, which allows local users to gain privileges via a crafted image, aka Bug ID CSCtn65962. The Cisco Unified IP Phone is Cisco's unified IP telephony solution.
An attacker can exploit this issue to bypass the signature-verification mechanism.
This issue is tracked by Cisco Bug ID CSCtn65962. These three
vulnerabilities are classified as two privilege escalation
vulnerabilities and one signature bypass vulnerability.
Cisco has released free software updates that address these
vulnerabilities. There are no workarounds available to mitigate these
vulnerabilities.
This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20110601-phone.shtml. The following sections provide the details of each
vulnerability addressed in this security advisory.
These vulnerabilities are documented in Cisco bug IDs CSCtf07426
and CSCtn65815 and have been assigned Common Vulnerabilities and
Exposures (CVE) identifiers CVE-2011-1602 and CVE-2011-1603
respectively.
Vulnerability Scoring Details
+----------------------------
Cisco has provided scores for the vulnerabilities in this advisory
based on the Common Vulnerability Scoring System (CVSS). The CVSS
scoring in this Security Advisory is done in accordance with CVSS
version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of
the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding
CVSS at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss
* CSCtf07426 - Privilege Escalation with "su" utility
CVSS Base Score - 6.6
Access Vector - Local
Access Complexity - Medium
Authentication - Single
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 5.5
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
* CSCtn65815 - Privilege Escalation in IP Phones
CVSS Base Score - 6.6
Access Vector - Local
Access Complexity - Medium
Authentication - Single
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 5.5
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
* CSCtn65962 - Phones Permits the Installation of Unsigned Code
CVSS Base Score - 1.5
Access Vector - Local
Access Complexity - Medium
Authentication - Single
Confidentiality Impact - Partial
Integrity Impact - None
Availability Impact - None
CVSS Temporal Score - 1.2
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Impact
======
Successful exploitation of the two privilege escalation
vulnerabilities could allow an authenticated attacker to change phone
configuration and obtain system information.
Software Versions and Fixes
===========================
When considering software upgrades, also consult:
http://www.cisco.com/go/psirt and any subsequent advisories to
determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.
+---------------------------------------+
| | First |
| Vulnerability | Fixed |
| | Release |
|----------------------------+----------|
| CSCtf07426 - Privilege | |
| Escalation with "su" | 9.0.3 |
| utility | |
|----------------------------+----------|
| CSCtn65815 - Privilege | 9.2.1 |
| Escalation in IP Phones | |
|----------------------------+----------|
| CSCtn65962 - Phones | |
| Permits the Installation | 9.2.1 |
| of Unsigned Code | |
+---------------------------------------+
Workarounds
===========
There are no workarounds available to mitigate any of these
vulnerabilities. Note: All of these vulnerabilities require the
attacker to be authenticated.
Obtaining Fixed Software
========================
Cisco has released free software updates that address these
vulnerabilities. Prior to deploying software, customers should
consult their maintenance provider or check the software for feature
set compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature sets
they have purchased. By installing, downloading, accessing or
otherwise using such software upgrades, customers agree to be bound
by the terms of Cisco's software license terms found at:
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
or as otherwise set forth at Cisco.com Downloads at:
http://www.cisco.com/public/sw-center/sw-usingswc.shtml
Do not contact psirt@cisco.com or security-alert@cisco.com for
software upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through
their regular update channels. For most customers, this means that
upgrades should be obtained through the Software Center on Cisco's
worldwide website at http://www.cisco.com
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through
prior or existing agreements with third-party support organizations,
such as Cisco Partners, authorized resellers, or service providers
should contact that support organization for guidance and assistance
with the appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations, such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or
fix is the most appropriate for use in the intended network before it
is deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco
service contract, and customers who purchase through third-party
vendors but are unsuccessful in obtaining fixed software through
their point of sale should acquire upgrades by contacting the Cisco
Technical Assistance Center (TAC). TAC contacts are as follows.
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Customers should have their product serial number available and be
prepared to give the URL of this notice as evidence of entitlement to
a free upgrade. Free upgrades for non-contract customers must be
requested through the TAC.
Refer to:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
for additional TAC contact information, including localized telephone
numbers, and instructions and e-mail addresses for use in various languages.
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerability described in this advisory.
These vulnerabilities were discovered and reported to Cisco by Matt
Duggan of Qualcomm.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that
omits the distribution URL in the following section is an
uncontrolled copy, and may lack important information or contain
factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20110601-phone.shtml
In addition to worldwide web posting, a text version of this notice
is clear-signed with the Cisco PSIRT PGP key and is posted to the
following e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-bulletins@lists.first.org
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.grok.org.uk
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on
mailing lists or newsgroups. Users concerned about this problem are
encouraged to check the above URL for any updates.
Revision History
================
+---------------------------------------+
| Revision | | Initial |
| 1.0 | 2011-June-01 | public |
| | | release. |
+---------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco security notices.
All Cisco security advisories are available at:
http://www.cisco.com/go/psirt
+--------------------------------------------------------------------
Copyright 2010-2011 Cisco Systems, Inc. All rights reserved.
+--------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
iFcDBQFN5k0FQXnnBKKRMNARCCF9AP0ar3AfiP9uA0nW3t6SFYx6XIdGytUG2S/K
1SMd+3y7wgEAhzzCUzc85QKeV/jicP5lXboEspr5eU7MftNMqM1oUNw=
=ZBzs
-----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
Cisco Unified IP Phone Privilege Escalation and Security Bypass
SECUNIA ADVISORY ID:
SA44814
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44814/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44814
RELEASE DATE:
2011-06-03
DISCUSS ADVISORY:
http://secunia.com/advisories/44814/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44814/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44814
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Some security issues have been reported in Cisco Unified IP Phone
models, which can be exploited by malicious, local users to bypass
certain security restrictions and perform certain actions with
escalated privileges.
1) An error within the "su" utility can be exploited to change the
phone configuration or gain potentially sensitive information.
2) An unspecified error can be exploited to change the phone
configuration or gain potentially sensitive information.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20110601-phone.shtml
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-201106-0110 | CVE-2011-2024 | Cisco Network Registrar Vulnerabilities to gain access to |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Cisco Network Registrar before 7.2 has a default administrative password, which makes it easier for remote attackers to obtain access via a TCP session, aka Bug ID CSCsm50627. The problem is Bug ID CSCsm50627 Problem.By a third party, TCP You may gain access through a session. Cisco CNS Network Registrar provides highly scalable and reliable DNS, DHCP and TFTP services.
An attacker can exploit this issue to gain unauthorized administrative access to the affected device. Successful exploits will result in the complete compromise of the affected device.
This issue is being tracked by Cisco bug ID CSCsm50627. During the initial
installation, users are not forced to change this password, allowing
it to persist after the installation.
The upgrade to Software Release 7.2 is not free; however, a
workaround is provided in this document that will prevent
exploitation of the vulnerability.
When performing an upgrade to Software Release 7.2, you must use the
workaround to change the password of the administrative account.
The workaround for this vulnerability is to change the password
associated with the administrative account using the method described
in the "Workarounds" section.
This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20110601-cnr.shtml
Affected Products
=================
Vulnerable Products
+------------------
This vulnerability affects all releases of Cisco Network Registrar
prior to Software Release 7.2. The vulnerability is present in the
affected releases on all platforms. Alternatively, if using the
command-line interface, execute the following command:
nrcmd> session get version
Products Confirmed Not Vulnerable
+--------------------------------
No other Cisco products are currently known to be affected by this
vulnerability. This vulnerability is
documented in Cisco bug ID CSCsm50627 ( registered customers only)
and has been assigned the Common Vulnerabilities and Exposures (CVE)
identifier CVE-2011-2024.
Additionally, it is a good practice to change passwords periodically.
The interval should comply with an organization's security policy
but, as a guideline, passwords should be changed two to three times a
year. This practice applies equally to all products regardless of
when they are installed and to all users, administrators and
non-administrators.
Vulnerability Scoring Details
+----------------------------
Cisco has provided scores for the vulnerability in this advisory
based on the Common Vulnerability Scoring System (CVSS). The CVSS
scoring in this Security Advisory is done in accordance with CVSS
version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of
the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding
CVSS at the following link:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss
* CSCsm50627 - Initially supplied admin password not changed during the installation
CVSS Base Score - 10
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Impact
======
Successful exploitation of the vulnerability may allow an attacker to
make arbitrary changes to the configuration of Cisco Network
Registrar.
Software Versions and Fixes
===========================
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to
determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.
This vulnerability is fixed in Software Release 7.2.
Workarounds
===========
The provided workaround changes the password that is associated with
the administrator's account. To change the password using the web
interface, select Advanced -> Administrators -> Admin from the menu.
Execute the following command to change the administrator's password
using the command-line interface:
admin <admin-name> enterPassword
Additionally, access to Cisco Network Registrar (TCP ports 8080,
8090, 8443, and 8453) and the host on which it is running should be
limited to legitimate IP addresses. Consult the documentation of the
host operating system for further details how to accomplish this
task.
The use of IP addresses as a form of authentication is a
well-established network security practice. For more guidance on the
use of access control lists (ACLs) or the explicit identification of
network management stations in devices and applications, reference
the white paper A Security-Oriented Approach to IP Addressing at the
following link:
http://www.cisco.com/web/about/security/intelligence/security-for-ip-addr.html
Obtaining Fixed Software
========================
Cisco will not make free upgrade software available for affected
customers to address this vulnerability. The workaround provided in
this document describes how to change the passwords in current
releases of the software.
Customers may only install and expect support for the feature sets
they have purchased. By installing, downloading, accessing or
otherwise using such software upgrades, customers agree to be bound
by the terms of Cisco's software license terms found at:
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
or as otherwise set forth at Cisco.com Downloads at:
http://www.cisco.com/public/sw-center/sw-usingswc.shtml
Do not contact psirt@cisco.com or security-alert@cisco.com for
software upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through
their regular update channels. For most customers, this means that
upgrades should be obtained through the Software Center on Cisco's
worldwide website at http://www.cisco.com.
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through
prior or existing agreements with third-party support organizations,
such as Cisco Partners, authorized resellers, or service providers
should contact that support organization for guidance and assistance
with the appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations, such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or
fix is the most appropriate for use in the intended network before it
is deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco
service contract, and customers who purchase through third-party
vendors but are unsuccessful in obtaining fixed software through
their point of sale should acquire upgrades by contacting the Cisco
Technical Assistance Center (TAC). TAC contacts are as follows.
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Customers should have their product serial number available and be
prepared to give the URL of this notice.
Refer to:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html for
additional TAC contact information, including localized telephone numbers,
and instructions and e-mail addresses for use in various languages.
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerability described in this advisory.
This vulnerability was discovered during an internal review.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that
omits the distribution URL in the following section is an
uncontrolled copy, and may lack important information or contain
factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at :
http://www.cisco.com/warp/public/707/cisco-sa-20110601-cnr.shtml
In addition to worldwide web posting, a text version of this notice
is clear-signed with the Cisco PSIRT PGP key and is posted to the
following e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-bulletins@lists.first.org
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.grok.org.uk
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on
mailing lists or newsgroups. Users concerned about this problem are
encouraged to check the above URL for any updates.
Revision History
================
+---------------------------------------+
| Revision | | Initial |
| 1.0 | 2001-06-01 | public |
| | | release |
+---------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco security notices.
All Cisco security advisories are available at:
http://www.cisco.com/go/psirt
+--------------------------------------------------------------------
Copyright 2010-2011 Cisco Systems, Inc. All rights reserved.
+--------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
iFcDBQFN5XmlQXnnBKKRMNARCJ/mAP0VFqUaxecmVxktLg4c8opYzEEj3VL8+PMl
KcRmg+hRDwD/bQYE8gud6mml4vjqdXuSPfS+p36+PLcQv159dlPxUv8=
=wSxT
-----END PGP SIGNATURE-----
VAR-201106-0113 | CVE-2011-2041 | Cisco AnyConnect Secure Mobility Client Vulnerability gained in |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The Start Before Logon (SBL) functionality in Cisco AnyConnect Secure Mobility Client (formerly AnyConnect VPN Client) before 2.3.254 on Windows, and on Windows Mobile, allows local users to gain privileges via unspecified user-interface interaction, aka Bug ID CSCta40556. The problem is Bug ID CSCta40556 It is a problem.Authority may be obtained by local users. Cisco AnyConnect Secure Mobility Client is a remote access solution from Cisco that is Cisco's next-generation VPN client. A local elevation of privilege vulnerability exists in the Cisco AnyConnect Secure Mobility Vulnerability. This vulnerability only affects the Windows platform because SBL does not support Linux and MacOS X clients.
Local attackers can exploit this issue to gain elevated privileges. Successful exploits will result in the complete compromise of affected computers.
Versions prior to AnyConnect Secure Mobility Client 2.3.254 are vulnerable. There are no workarounds for the vulnerabilities
described in this advisory. The affected versions are included
in the following table:
+------------------------------------------------------------+
| Vulnerability | Platform | Affected Versions |
|-------------------+-----------+----------------------------|
| | Microsoft | All versions prior to |
| | Windows | 2.3.185 |
| |-----------+----------------------------|
| Arbitrary Program | | * All versions in major |
| Execution | | releases other than |
| Vulnerability | Linux, | 2.5.x and 3.0.x. |
| | Apple | * 2.5.x releases prior |
| | MacOS X | to 2.5.3041 |
| | | * 3.0.x releases prior |
| | | to 3.0.629 |
|-------------------+-----------+----------------------------|
| | Microsoft | All versions prior to |
| Local Privilege | Windows | 2.3.254 |
|Escalation |-----------+----------------------------|
| Vulnerability | Linux, | |
| | Apple | Not affected |
| | MacOS X | |
+------------------------------------------------------------+
Note: Microsoft Windows Mobile versions are affected by the Arbitrary
Program Execution Vulnerability.
No other Cisco products are currently known to be affected by these
vulnerabilities. This action causes the browser to first download a "helper"
application that aids in downloading and executing the actual Cisco
AnyConnect Secure Mobility Client. The helper application is a Java
applet on the Linux and MacOS X platforms, and either a Java applet
on the Windows platform or an ActiveX control if the browser is
capable of utilizing ActiveX controls. The downloaded helper
application is executed in the context of the originating site in the
user's web browser. An attacker could
create a malicious web page that looks like the normal VPN web login
page and entice a user, through social engineering or exploitation of
other vulnerabilities, to visit it. This would allow the attacker to
supply an arbitrary executable that the helper application would
download and execute on the machine of the affected user. This
arbitrary executable would be executed with the same operating system
privileges under which the web browser was run. Common
Vulnerabilities and Exposures (CVE) IDs CVE-2011-2039 (for
CSCsy00904) and CVE-2011-2040 (for CSCsy05934) have been assigned for
these vulnerabilities.
Additional Considerations for the Arbitrary Program Execution
Vulnerability
+------------------------------------------------------------
Note that while new versions of the ActiveX control and Java applet
that are shipped with the Cisco AnyConnect Secure Mobility Client
make use of code signing to validate the authenticity of components
downloaded from the VPN headend, there is still the issue of old
versions that do not validate downloaded components. An attacker may
engineer a web page to supply an affected version of the ActiveX
control or Java applet and still accomplish arbitrary program
execution because of the lack of authenticity validation.
Mitigating the risk of old versions of the ActiveX control can be
accomplished in the following ways:
* Load fixed Cisco AnyConnect Secure Mobility Client versions on
the VPN headend and establish a VPN connection (via web browser
or standalone client). This action will cause the new version of
the Cisco AnyConnect Secure Mobility Client, including a new
version of the ActiveX control to install. When this occurs, an
old version of the ActiveX control will not be instantiated if
one is presented for download. This
action accomplishes the same result as the previous
recommendation -- it deploys new, fixed versions of the ActiveX
control so that old, vulnerable versions of the control are not
instantiated if one is presented for download. This action prevents the
ActiveX control from being instantiated under any scenario.
Instructions for setting the kill bit are beyond the scope of
this document; refer to the Microsoft Support article "How to
stop an ActiveX control from running in Internet Explorer" at
http://support.microsoft.com/kb/240797 and the Microsoft Security
Vulnerability Research & Defense's "Kill-Bit FAQ" blog posts
referenced in the Microsoft Support article for more information. Note that this CLSID
did not change with new versions of the ActiveX control that
implement code signing validation.
Mitigating the risk of old versions of the Java applet can be
accomplished by blacklisting old, vulnerable versions using the Jar
blacklist feature introduced with Java SE 6 Update 14.
Vulnerability Scoring Details
+----------------------------
Cisco has provided scores for the vulnerabilities in this advisory
based on the Common Vulnerability Scoring System (CVSS). The CVSS
scoring in this Security Advisory is done in accordance with CVSS
version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of
the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding
CVSS at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss
* CSCsy00904 & CSCsy05934 - Arbitrary Program Execution Vulnerability
CVSS Base Score - 7.6
Access Vector - Network
Access Complexity - High
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 6.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
* CSCta40556 -- AnyConnect: Security issue with SBL on versions
prior to 2.3
CVSS Base Score - 7.2
Access Vector - Local
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 6.0
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Impact
======
Arbitrary Program Execution Vulnerability
+----------------------------------------
Exploitation of this vulnerability may allow an attacker to execute
arbitrary programs on the computer of a Cisco AnyConnect Secure
Mobility Client user with the privileges of the user who is
establishing the VPN connection.
Software Versions and Fixes
===========================
When considering software upgrades, also consult:
http://www.cisco.com/go/psirt
and any subsequent advisories to determine exposure and a complete
upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.
+------------------------------------------------------------+
| Vulnerability | Platform | First Fixed |
| | | Release |
|----------------------------+---------------+---------------|
| | Microsoft | 2.3.185 |
| Arbitrary Program | Windows | |
|Execution Vulnerability |---------------+---------------|
| | Linux, Apple | 2.5.3041 and |
| | Mac OS X | 3.0.629 |
|----------------------------+---------------+---------------|
| | Microsoft | 2.3.254 |
| Local Privilege Escalation | Windows | |
|Vulnerability |---------------+---------------|
| | Linux, Apple | Not affected |
| | Mac OS X | |
+------------------------------------------------------------+
Recommended Releases
The following table lists all recommended releases. These recommended
releases contain the fixes for all vulnerabilities in this advisory.
Cisco recommends upgrading to a release that is equal to or later
than these recommended releases.
Workarounds
===========
There are no workarounds for the vulnerabilities that are described
in this advisory.
Obtaining Fixed Software
========================
Cisco has released free software updates that address these
vulnerabilities. Prior to deploying software, customers should
consult their maintenance provider or check the software for feature
set compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature sets
they have purchased. By installing, downloading, accessing or
otherwise using such software upgrades, customers agree to be bound
by the terms of Cisco's software license terms found at:
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
or as otherwise set forth at Cisco.com Downloads at:
http://www.cisco.com/public/sw-center/sw-usingswc.shtml
Do not contact psirt@cisco.com or security-alert@cisco.com for
software upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through
their regular update channels. For most customers, this means that
upgrades should be obtained through the Software Center on Cisco's
worldwide website at http://www.cisco.com.
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through
prior or existing agreements with third-party support organizations,
such as Cisco Partners, authorized resellers, or service providers
should contact that support organization for guidance and assistance
with the appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations, such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or
fix is the most appropriate for use in the intended network before it
is deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco
service contract, and customers who purchase through third-party
vendors but are unsuccessful in obtaining fixed software through
their point of sale should acquire upgrades by contacting the Cisco
Technical Assistance Center (TAC). TAC contacts are as follows.
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Customers should have their product serial number available and be
prepared to give the URL of this notice as evidence of entitlement to
a free upgrade. Free upgrades for non-contract customers must be
requested through the TAC.
Refer to:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
for additional TAC contact information, including localized telephone
numbers, and instructions and e-mail addresses for use in various
languages.
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerability described in this advisory.
The Arbitrary Program Execution Vulnerability was discovered by
Elazar Broad and reported to Cisco by iDefense.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that
omits the distribution URL in the following section is an
uncontrolled copy, and may lack important information or contain
factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20110601-ac.shtml
In addition to worldwide web posting, a text version of this notice
is clear-signed with the Cisco PSIRT PGP key and is posted to the
following e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-bulletins@lists.first.org
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.grok.org.uk
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on
mailing lists or newsgroups. Users concerned about this problem are
encouraged to check the above URL for any updates.
Revision History
================
+---------------------------------------+
| Revision | | Initial |
| 1.0 | 2011-June-01 | public |
| | | release. |
+---------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco security notices.
All Cisco security advisories are available at:
http://www.cisco.com/go/psirt
+--------------------------------------------------------------------
Copyright 2010-2011 Cisco Systems, Inc. All rights reserved.
+--------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)
iF4EAREIAAYFAk3mbJUACgkQQXnnBKKRMNBBxAD+Oh7XQCOtCDOFCY8K1hWFAV/K
iwgK2hG+GNV39PPndfQA/0Sked3glEypuwev05ULO4ukTAPoDI5CJLnb4W4TKjL8
=pAlh
-----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
Cisco AnyConnect VPN Client Two Vulnerabilities
SECUNIA ADVISORY ID:
SA44812
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44812/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44812
RELEASE DATE:
2011-06-03
DISCUSS ADVISORY:
http://secunia.com/advisories/44812/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44812/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44812
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Two vulnerabilities have been reported in Cisco AnyConnect VPN
Client, which can be exploited by malicious people with physical
access to bypass certain security restrictions and by malicious
people to compromise a user's system.
Successful exploitation of this vulnerability requires the Start
Before Logon (SBL) feature to be enabled.
2) An error in the helper application used for remote deployment of
the client (e.g.
SOLUTION:
Update to a fixed version (please see the vendor's advisory for
details).
PROVIDED AND/OR DISCOVERED BY:
1) Reported to the vendor by a customer.
2) The vendor credits Elazar Broad via iDefense.
ORIGINAL ADVISORY:
Cisco (cisco-sa-20110601-ac):
http://www.cisco.com/warp/public/707/cisco-sa-20110601-ac.shtml
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-201106-0111 | CVE-2011-2039 |
Cisco AnyConnect SSL VPN arbitrary code execution
Related entries in the VARIoT exploits database: VAR-E-201106-0065 |
CVSS V2: 7.6 CVSS V3: - Severity: HIGH |
The helper application in Cisco AnyConnect Secure Mobility Client (formerly AnyConnect VPN Client) before 2.3.185 on Windows, and on Windows Mobile, downloads a client executable file (vpndownloader.exe) without verifying its authenticity, which allows remote attackers to execute arbitrary code via the url property to a certain ActiveX control in vpnweb.ocx, aka Bug ID CSCsy00904. The Cisco AnyConnect SSL VPN ActiveX and Java clients contain a vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Cisco AnyConnect Secure Mobility Client is a remote access solution from Cisco that is Cisco's next-generation VPN client. When the Cisco AnyConnect Secure Mobility Client is deployed from the VPN front end, a WEB browser is used to initialize an SSL connection to the VPN front end. After the user logs in, the browser displays the portal window. When the user clicks \"Start AnyConnect\", the process will start downloading the Cisco AnyConnect Secure Mobility Client. The helper application is a Java Applet on Linux and MacOS X platforms or a Java Applet on a Windows platform or an ActiveX plugin on a browser. The downloaded Helper program is in a web browser. The initial site context is executed. The helper program then downloads the program from the VPN front end and executes it.
An attacker can exploit this issue by using social engineering techniques to coerce unsuspecting users to download and execute arbitrary applications.
This issue is tracked by Cisco Bug IDs CSCsy00904 and CSCsy05934. The control itself is provided by the server upon connecting. For more information, visit the following URL.
http://www.cisco.com/en/US/docs/security/vpn_client/anyconnect/anyconnect23/release/notes/anyconnect23rn.html
II.
The vulnerability exists within the ActiveX control with the following
identifiers:
CLSID: 55963676-2F5E-4BAF-AC28-CF26AA587566
ProgId: Cisco.AnyConnect.VPNWeb.1
File: %WINDIR%\system32\vpnweb.ocx
This ActiveX control is not marked as safe for initialization or
scripting within the registry, but it does implement IObjectSafety. When
queried, this control's IObjectSafety interface reports that it is safe
for both scripting and initialization. Once it is
instantiated, it will attempt to download two files from the site
supported in the "url" property. As such, an attacker can craft a page
such that the control will download an executable of their choosing.
One of the files will be executed upon the successful completion of the
download.
III. An
attacker typically accomplishes this via social engineering or injecting
content into compromised, trusted sites.
Additionally, in a default configuration, a targeted user must have this
control already installed or must accept several warning prompts at the
time that the attack is taking place. This control is not on the white
list included with Internet Explorer 7.0. More information can be found
at the following URL.
http://msdn.microsoft.com/en-us/library/bb250471.aspx
IV.
V. WORKAROUND
Setting the kill-bit for this control will prevent it from being loaded
within Internet Explorer. However, doing so will prevent legitimate use
of the control.
VI. For more information, consult their
advisory at the following URL.
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b80123.shtml
VII. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.
VIII. DISCLOSURE TIMELINE
02/24/2009 Initial Vendor Notification
02/25/2009 Initial Vendor Reply
06/01/2011 Coordinated Public Disclosure
IX.
Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php
Free tools, research and upcoming events
http://labs.idefense.com/
X. LEGAL NOTICES
Copyright © 2011 Verisign
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
e-mail customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information. There are no workarounds for the vulnerabilities
described in this advisory.
This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20110601-ac.shtml
Affected Products
=================
Vulnerable Products
+------------------
The vulnerabilities described in this document apply to the Cisco
AnyConnect Secure Mobility Client. The affected versions are included
in the following table:
+------------------------------------------------------------+
| Vulnerability | Platform | Affected Versions |
|-------------------+-----------+----------------------------|
| | Microsoft | All versions prior to |
| | Windows | 2.3.185 |
| |-----------+----------------------------|
| Arbitrary Program | | * All versions in major |
| Execution | | releases other than |
| Vulnerability | Linux, | 2.5.x and 3.0.x. |
| | Apple | * 2.5.x releases prior |
| | MacOS X | to 2.5.3041 |
| | | * 3.0.x releases prior |
| | | to 3.0.629 |
|-------------------+-----------+----------------------------|
| | Microsoft | All versions prior to |
| Local Privilege | Windows | 2.3.254 |
|Escalation |-----------+----------------------------|
| Vulnerability | Linux, | |
| | Apple | Not affected |
| | MacOS X | |
+------------------------------------------------------------+
Note: Microsoft Windows Mobile versions are affected by the Arbitrary
Program Execution Vulnerability.
No other Cisco products are currently known to be affected by these
vulnerabilities. An attacker could
create a malicious web page that looks like the normal VPN web login
page and entice a user, through social engineering or exploitation of
other vulnerabilities, to visit it. This
arbitrary executable would be executed with the same operating system
privileges under which the web browser was run. Common
Vulnerabilities and Exposures (CVE) IDs CVE-2011-2039 (for
CSCsy00904) and CVE-2011-2040 (for CSCsy05934) have been assigned for
these vulnerabilities. An attacker may
engineer a web page to supply an affected version of the ActiveX
control or Java applet and still accomplish arbitrary program
execution because of the lack of authenticity validation. When this occurs, an
old version of the ActiveX control will not be instantiated if
one is presented for download. This
action accomplishes the same result as the previous
recommendation -- it deploys new, fixed versions of the ActiveX
control so that old, vulnerable versions of the control are not
instantiated if one is presented for download. This action prevents the
ActiveX control from being instantiated under any scenario.
Instructions for setting the kill bit are beyond the scope of
this document; refer to the Microsoft Support article "How to
stop an ActiveX control from running in Internet Explorer" at
http://support.microsoft.com/kb/240797 and the Microsoft Security
Vulnerability Research & Defense's "Kill-Bit FAQ" blog posts
referenced in the Microsoft Support article for more information. Note that this CLSID
did not change with new versions of the ActiveX control that
implement code signing validation.
Mitigating the risk of old versions of the Java applet can be
accomplished by blacklisting old, vulnerable versions using the Jar
blacklist feature introduced with Java SE 6 Update 14. For
information on the Jar blacklist feature refer to the Java SE 6
Update 14 release notes, available at:
http://www.oracle.com/technetwork/java/javase/6u14-137039.html
The jar files to be blacklisted are identified by the following SHA-1
message digests:
# 2.3.0254, 2.3.1003, 2.3.2016, 2.4.0202, 2.4.1012,
# 2.5.0217, 2.5.1025, 2.5.2001, 2.5.2006, 2.5.2010,
# 2.5.2011, 2.5.2014, 2.5.2017, 2.5.2018, 2.5.2019
SHA1-Digest-Manifest : xmarT5s8kwnKRLxnCOoLUnxnveE=
# 2.2.0133, 2.2.0136, 2.2.0140
SHA1-Digest-Manifest : 2wXAWNws4uNdCioU1eoCOS4+J3o=
# 2.0.0343, 2.1.0148
SHA1-Digest-Manifest : OlNnvozFCxbJZbRfGiLckOE8uFQ=
Local Privilege Escalation Vulnerability
+---------------------------------------
Unprivileged users can elevate their privileges to those of the
LocalSystem account by enabling the Start Before Logon (SBL) feature
and interacting with the Cisco AnyConnect Secure Mobility Client
graphical user interface in the Windows logon screen.
To prevent this issue, fixed versions of the Cisco AnyConnect Secure
Mobility Client limit the amount of interaction that is possible in
the client's graphical user interface when it is displayed on the
Windows logon screen.
Vulnerability Scoring Details
+----------------------------
Cisco has provided scores for the vulnerabilities in this advisory
based on the Common Vulnerability Scoring System (CVSS). The CVSS
scoring in this Security Advisory is done in accordance with CVSS
version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of
the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding
CVSS at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss
* CSCsy00904 & CSCsy05934 - Arbitrary Program Execution Vulnerability
CVSS Base Score - 7.6
Access Vector - Network
Access Complexity - High
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 6.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
* CSCta40556 -- AnyConnect: Security issue with SBL on versions
prior to 2.3
CVSS Base Score - 7.2
Access Vector - Local
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 6.0
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Impact
======
Arbitrary Program Execution Vulnerability
+----------------------------------------
Exploitation of this vulnerability may allow an attacker to execute
arbitrary programs on the computer of a Cisco AnyConnect Secure
Mobility Client user with the privileges of the user who is
establishing the VPN connection.
Software Versions and Fixes
===========================
When considering software upgrades, also consult:
http://www.cisco.com/go/psirt
and any subsequent advisories to determine exposure and a complete
upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.
+------------------------------------------------------------+
| Vulnerability | Platform | First Fixed |
| | | Release |
|----------------------------+---------------+---------------|
| | Microsoft | 2.3.185 |
| Arbitrary Program | Windows | |
|Execution Vulnerability |---------------+---------------|
| | Linux, Apple | 2.5.3041 and |
| | Mac OS X | 3.0.629 |
|----------------------------+---------------+---------------|
| | Microsoft | 2.3.254 |
| Local Privilege Escalation | Windows | |
|Vulnerability |---------------+---------------|
| | Linux, Apple | Not affected |
| | Mac OS X | |
+------------------------------------------------------------+
Recommended Releases
The following table lists all recommended releases. These recommended
releases contain the fixes for all vulnerabilities in this advisory.
Cisco recommends upgrading to a release that is equal to or later
than these recommended releases.
Workarounds
===========
There are no workarounds for the vulnerabilities that are described
in this advisory.
Obtaining Fixed Software
========================
Cisco has released free software updates that address these
vulnerabilities. Prior to deploying software, customers should
consult their maintenance provider or check the software for feature
set compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature sets
they have purchased. By installing, downloading, accessing or
otherwise using such software upgrades, customers agree to be bound
by the terms of Cisco's software license terms found at:
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
or as otherwise set forth at Cisco.com Downloads at:
http://www.cisco.com/public/sw-center/sw-usingswc.shtml
Do not contact psirt@cisco.com or security-alert@cisco.com for
software upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through
their regular update channels. For most customers, this means that
upgrades should be obtained through the Software Center on Cisco's
worldwide website at http://www.cisco.com.
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through
prior or existing agreements with third-party support organizations,
such as Cisco Partners, authorized resellers, or service providers
should contact that support organization for guidance and assistance
with the appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations, such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or
fix is the most appropriate for use in the intended network before it
is deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco
service contract, and customers who purchase through third-party
vendors but are unsuccessful in obtaining fixed software through
their point of sale should acquire upgrades by contacting the Cisco
Technical Assistance Center (TAC). TAC contacts are as follows.
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Customers should have their product serial number available and be
prepared to give the URL of this notice as evidence of entitlement to
a free upgrade. Free upgrades for non-contract customers must be
requested through the TAC.
Refer to:
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
for additional TAC contact information, including localized telephone
numbers, and instructions and e-mail addresses for use in various
languages.
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerability described in this advisory. Cisco would like to
thank iDefense for reporting this vulnerability and for working with
us towards a coordinated disclosure of the vulnerability.
The Local Privilege Escalation Vulnerability was reported to Cisco by
a customer.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that
omits the distribution URL in the following section is an
uncontrolled copy, and may lack important information or contain
factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20110601-ac.shtml
In addition to worldwide web posting, a text version of this notice
is clear-signed with the Cisco PSIRT PGP key and is posted to the
following e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-bulletins@lists.first.org
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.grok.org.uk
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on
mailing lists or newsgroups. Users concerned about this problem are
encouraged to check the above URL for any updates.
Revision History
================
+---------------------------------------+
| Revision | | Initial |
| 1.0 | 2011-June-01 | public |
| | | release. |
+---------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco security notices.
All Cisco security advisories are available at:
http://www.cisco.com/go/psirt
+--------------------------------------------------------------------
Copyright 2010-2011 Cisco Systems, Inc. All rights reserved.
+--------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)
iF4EAREIAAYFAk3mbJUACgkQQXnnBKKRMNBBxAD+Oh7XQCOtCDOFCY8K1hWFAV/K
iwgK2hG+GNV39PPndfQA/0Sked3glEypuwev05ULO4ukTAPoDI5CJLnb4W4TKjL8
=pAlh
-----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
Cisco AnyConnect VPN Client Two Vulnerabilities
SECUNIA ADVISORY ID:
SA44812
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44812/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44812
RELEASE DATE:
2011-06-03
DISCUSS ADVISORY:
http://secunia.com/advisories/44812/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44812/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44812
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Two vulnerabilities have been reported in Cisco AnyConnect VPN
Client, which can be exploited by malicious people with physical
access to bypass certain security restrictions and by malicious
people to compromise a user's system.
Successful exploitation of this vulnerability requires the Start
Before Logon (SBL) feature to be enabled.
2) An error in the helper application used for remote deployment of
the client (e.g.
SOLUTION:
Update to a fixed version (please see the vendor's advisory for
details).
PROVIDED AND/OR DISCOVERED BY:
1) Reported to the vendor by a customer.
2) The vendor credits Elazar Broad via iDefense.
ORIGINAL ADVISORY:
Cisco (cisco-sa-20110601-ac):
http://www.cisco.com/warp/public/707/cisco-sa-20110601-ac.shtml
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor
VAR-201106-0316 | No CVE | Belkin F5D7234-4V5 Wireless G Router 'login.stm'Manage Password Disclosure Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
The Belkin F5D7234-4V5 Wireless G Router is a wireless router device. There is a design error in the Belkin F5D7234-4V5 Wireless G Router. The attacker submits a specially crafted request for administrator password information.
Attackers can exploit this issue to gain access to the administrator's password. Successfully exploiting this issue may lead to other attacks
VAR-201107-0109 | CVE-2011-1797 | Apple Safari Used in WebKit Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1. WebKit is prone to a remote code-execution vulnerability due to memory-corruption.
Attackers can exploit this issue by enticing an unsuspecting user into visiting a malicious webpage. Successful attacks will result in arbitrary code execution; failed attacks may cause denial-of-service conditions.
NOTE: This issue was previously discussed in BID 48808 (Apple Safari Prior to 5.1 and 5.0.6 Multiple Security Vulnerabilities) but has been given its own record to better document it. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2245-1 security@debian.org
http://www.debian.org/security/ Giuseppe Iuculano
May 29, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : chromium-browser
Vulnerability : several vulnerabilities
Problem type : remote
Debian-specific: no
CVE ID : CVE-2011-1292 CVE-2011-1293 CVE-2011-1440 CVE-2011-1444
CVE-2011-1797 CVE-2011-1799
Several vulnerabilities were discovered in the Chromium browser.
CVE-2011-1444
Race condition in the sandbox launcher implementation in Google Chrome on
Linux allows remote attackers to cause a denial of service or possibly have
unspecified other impact via unknown vectors.
For the stable distribution (squeeze), these problems have been fixed in
version 6.0.472.63~r59945-5+squeeze5.
For the testing distribution (wheezy), these problems will be fixed soon.
For the unstable distribution (sid), these problems have been fixed in
version 11.0.696.68~r84545-1.
We recommend that you upgrade your chromium-browser packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAk3iJO4ACgkQNxpp46476apuDACfQjllLVOT84OjL86pa8+JhD5j
GWgAmwc7Ei0TYhYaWQZbDmzalYq81pn4
=0RTf
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
. ----------------------------------------------------------------------
The Secunia Vulnerability Intelligence Manager (VIM) enables you to handle vulnerability threats in a simple, cost effective way.
Read more and request a free trial:
http://secunia.com/products/corporate/vim/
----------------------------------------------------------------------
TITLE:
Apple Safari Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA45325
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/45325/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=45325
RELEASE DATE:
2011-07-22
DISCUSS ADVISORY:
http://secunia.com/advisories/45325/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/45325/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=45325
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A weakness and multiple vulnerabilities have been reported in Apple
Safari, which can be exploited by malicious people to disclose
sensitive information, manipulate certain data, conduct cross-site
scripting and spoofing attacks, bypass certain security restrictions,
and compromise a user's system.
1) An error within CFNetwork when handling the "text/plain" content
type can be exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.
2) An error within CFNetwork when using the NTLM authentication
protocol can be exploited to execute arbitrary code by tricking a
user into visiting a specially crafted web page.
3) An error exists within CFNetwork when handling SSL certificates,
which does not properly verify disabled root certificates. This can
lead to certificates signed by the disabled root certificates being
validated.
4) An integer overflow error exists within the ColorSync component.
For more information see vulnerability #5 in:
SA45054
5) An off-by-one error exists within the CoreFoundation framework.
For more information see vulnerability #6 in:
SA45054
6) An integer overflow error exists in CoreGraphics.
For more information see vulnerability #7 in:
SA45054
7) An error exists within ICU (International Components for
Unicode).
For more information see vulnerability #11 in:
SA45054
8) An error exists in ImageIO within the handling of TIFF files when
handling certain uppercase strings.
For more information see vulnerability #9 in:
SA45054
9) An error in ImageIO within the handling of CCITT Group 4 encoded
TIFF image files can be exploited to cause a heap-based buffer
overflow.
10) A use-after-free error within WebKit when handling TIFF images
can result in an invalid pointer being dereferenced when a user views
a specially crafted web page.
11) An error within libxslt can be exploited to disclose certain
addresses from the heap.
For more information see vulnerability #2 in:
SA43832
12) An off-by-one error within libxml when handling certain XML data
can be exploited to cause a heap-based buffer overflow.
13) An error in the "AutoFill web forms" feature can be exploited to
disclose certain information from the user's Address Book by tricking
a user into visiting a specially crafted web page.
14) A cross-origin error when handling certain fonts in Java Applets
can lead to certain text being displayed on other sites.
15) Multiple unspecified errors in the WebKit component can be
exploited to corrupt memory.
16) An error within WebKit when handling libxslt configurations can
be exploited to create arbitrary files.
17) A cross-origin error when handling Web Workers can lead to
certain information being disclosed.
18) A cross-origin error when handling certain URLs containing a
username can be exploited to execute arbitrary HTML and script code
in a user's browser session in the context of an affected site.
19) A cross-origin error when handling DOM nodes can be exploited to
execute arbitrary HTML and script code in a user's browser session in
the context of an affected site.
20) An error within the handling of DOM history objects can be
exploited to display arbitrary content while showing the URL of a
trusted web site in the address bar.
21) An error within the handling of RSS feeds may lead to arbitrary
files from a user's system being sent to a remote server.
22) A weakness in WebKit can lead to remote DNS prefetching
For more information see vulnerability #6 in:
SA42312
23) A use-after-free error within WebKit when processing MathML
markup tags can result in an invalid pointer being dereferenced when
a user views a specially crafted web page.
24) An error within WebKit when parsing a frameset element can be
exploited to cause a heap-based buffer overflow.
25) A use-after-free error within WebKit when handling XHTML tags can
result in an invalid tag pointer being dereferenced when a user views
a specially crafted web page.
26) A use-after-free error within WebKit when handling SVG tags can
result in an invalid pointer being dereferenced when a user views a
specially crafted web page.
The weakness and the vulnerabilities are reported in versions prior
to 5.1 and 5.0.6.
SOLUTION:
Update to version 5.1 or 5.0.6.
PROVIDED AND/OR DISCOVERED BY:
10) Juan Pablo Lopez Yacubian via iDefense
4) binaryproof via ZDI
8) Dominic Chell, NGS Secure
23, 25, 26) wushi, team509 via iDefense
24) Jose A. Vazquez via iDefense
The vendor credits:
1) Hidetake Jo via Microsoft Vulnerability Research (MSVR) and Neal
Poole, Matasano Security
2) Takehiro Takahashi, IBM X-Force Research
3) An anonymous reporter
5) Harry Sintonen
6) Cristian Draghici, Modulo Consulting and Felix Grobert, Google
Security Team
7) David Bienvenu, Mozilla
9) Cyril CATTIAUX, Tessi Technologies
11) Chris Evans, Google Chrome Security Team
12) Billy Rios, Google Security Team
13) Florian Rienhardt of BSI, Alex Lambert, and Jeremiah Grossman
14) Joshua Smith, Kaon Interactive
16) Nicolas Gregoire, Agarri
17) Daniel Divricean, divricean.ro
18) Jobert Abma, Online24
19) Sergey Glazunov
20) Jordi Chancel
21) Jason Hullinger
22) Mike Cardwell, Cardwell IT
The vendor provides a bundled list of credits for vulnerabilities in
#15:
* David Weston, Microsoft and Microsoft Vulnerability Research
(MSVR)
* Yong Li, Research In Motion
* SkyLined, Google Chrome Security Team
* Abhishek Arya (Inferno), Google Chrome Security Team
* Nikita Tarakanov and Alex Bazhanyuk, CISS Research Team
* J23 via ZDI
* Rob King via ZDI
* wushi, team509 via ZDI
* wushi of team509
* Adam Barth, Google Chrome Security Team
* Richard Keen
* An anonymous researcher via ZDI
* Rik Cabanier, Adobe Systems
* Martin Barbella
* Sergey Glazunov
* miaubiz
* Andreas Kling, Nokia
* Marek Majkowski via iDefense
* John Knottenbelt, Google
ORIGINAL ADVISORY:
Apple:
http://support.apple.com/kb/HT4808
iDefense:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=930
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=931
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=932
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=933
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=934
ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-11-228/
NGS Secure:
http://archives.neohapsis.com/archives/bugtraq/2011-07/0034.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. Using your asset list preferences, customised notifications are issued as soon as a new vulnerability is discovered - a valuable tool for documenting mitigation strategies. This fixes some
vulnerabilities, which can be exploited by malicious people to
compromise a user's system.
For more information:
SA43859
SA44375
SA44591
SOLUTION:
Apply updated packages via the apt-get package manager.
ORIGINAL ADVISORY:
DSA-2245-1:
http://lists.debian.org/debian-security-announce/2011/msg00115.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities
VAR-201105-0313 | No CVE | Vordel Gateway Directory Traversal Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
The Vordel XML gateway is an XML gateway device. There is a problem with the Vordel XML gateway management interface. A remote attacker can send a URL request for a directory traversal sequence to port 8090, bypassing the WEB ROOT limit, and gain access to passwords and configuration files. Vordel Gateway is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
A remote attacker could exploit this vulnerability using directory-traversal strings (such as '../') to gain access to arbitrary files on the targeted system. This may result in the disclosure of sensitive information or lead to a complete compromise of the affected computer.
Vordel Gateway 6.0.3 is vulnerable; other versions may also be affected
VAR-201105-0192 | CVE-2011-1647 | Cisco RVS4000 Gigabit Security Router Software and WRVS4400N Gigabit Security Router Software vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The web management interface on the Cisco RVS4000 Gigabit Security Router with software 1.x before 1.3.3.4 and 2.x before 2.0.2.7, and the WRVS4400N Gigabit Security Router with software before 2.0.2.1, allows remote attackers to read the private key for the admin SSL certificate via unspecified vectors, aka Bug ID CSCtn23871. The problem is Bug ID CSCtn23871 It is a problem.By a third party admin SSL The private key of the certificate may be read. The Cisco RVS4000/WRVS4400N is a Gigabit Cisco router. There is an information leakage problem in the Cisco RVS4000/WRVS4400N. Remote unauthenticated users can exploit the vulnerability to obtain the SSL certificate private/shared key of the Quick VPN. Cisco RVS4000 and WRVS4400N are prone to an information-disclosure vulnerability that affects the web-management interface. Cisco RVS4000\WRVS4400N gigabit security routers can provide network access and switching functions at broadband speeds, thereby helping employees of small and medium-sized enterprises access the work resources they need safely. ----------------------------------------------------------------------
Alerts when vulnerabilities pose a threat to your infrastructure
The enhanced reporting module of the Secunia Vulnerability Intelligence Manager (VIM) enables you to combine advisory and ticket information, and generate policy compliance statistics. Using your asset list preferences, customised notifications are issued as soon as a new vulnerability is discovered - a valuable tool for documenting mitigation strategies.
Watch our quick solution overview:
http://www.youtube.com/user/Secunia#p/a/u/0/M1Y9sJqR2SY
----------------------------------------------------------------------
TITLE:
Cisco RVS4000 / WRVS4400N Gigabit Security Routers Multiple
Vulnerabilities
SECUNIA ADVISORY ID:
SA44724
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44724/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44724
RELEASE DATE:
2011-05-26
DISCUSS ADVISORY:
http://secunia.com/advisories/44724/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44724/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44724
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Some vulnerabilities have been reported in Cisco RVS4000 and
WRVS4400N Gigabit Security Routers, which can be exploited by
malicious users to compromise a vulnerable system and by malicious
people to disclose sensitive information.
1) The web management interface does not properly restrict access to
the backup configuration file, which can be exploited to download the
file and disclose sensitive information.
2) Input passed via the "ping" or "traceroute" parameters to the web
management interface is not properly sanitised before being used.
This can be exploited to inject and execute arbitrary shell
commands.
Please see the vendor's advisory for the list of affected products.
SOLUTION:
Apply updates when available (Scheduled for June 19, 2011).
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Michal Sajdak, Securitum.
ORIGINAL ADVISORY:
Cisco:
http://www.cisco.com/warp/public/707/cisco-sa-20110525-rvs4000.shtml
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-201105-0290 | CVE-2011-2167 | Dovecot of script-login Vulnerable to performing a direct traversal attack |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script. Dovecot is an open source IMAP and POP3 server for Linux/UNIX-like systems. The script-login in version 2.0.x prior to Dovecot 2.0.13 did not follow the chroot configuration. Dovecot is prone to multiple security-bypass vulnerabilities because it fails to properly implement certain configuration settings.
Authenticated attackers can exploit these issues to bypass certain security restrictions and perform unauthorized actions. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Low: dovecot security and bug fix update
Advisory ID: RHSA-2013:0520-02
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0520.html
Issue date: 2013-02-21
CVE Names: CVE-2011-2166 CVE-2011-2167 CVE-2011-4318
=====================================================================
1. Summary:
Updated dovecot packages that fix three security issues and one bug are now
available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. It
supports mail in either of maildir or mbox formats. The SQL drivers and
authentication plug-ins are provided as sub-packages.
Two flaws were found in the way some settings were enforced by the
script-login functionality of Dovecot. (CVE-2011-2166,
CVE-2011-2167)
A flaw was found in the way Dovecot performed remote server identity
verification, when it was configured to proxy IMAP and POP3 connections to
remote hosts using TLS/SSL protocols. A remote attacker could use this flaw
to conduct man-in-the-middle attacks using an X.509 certificate issued by
a trusted Certificate Authority (for a different name). (CVE-2011-4318)
This update also fixes the following bug:
* When a new user first accessed their IMAP inbox, Dovecot was, under some
circumstances, unable to change the group ownership of the inbox directory
in the user's Maildir location to match that of the user's mail spool
(/var/mail/$USER). This correctly generated an "Internal error occurred"
message. However, with a subsequent attempt to access the inbox, Dovecot
saw that the directory already existed and proceeded with its operation,
leaving the directory with incorrectly set permissions. This update
corrects the underlying permissions setting error. When a new user now
accesses their inbox for the first time, and it is not possible to set
group ownership, Dovecot removes the created directory and generates an
error message instead of keeping the directory with incorrect group
ownership. (BZ#697620)
Users of dovecot are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing the
updated packages, the dovecot service will be restarted automatically.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
5. Bugs fixed (http://bugzilla.redhat.com/):
709095 - CVE-2011-2166 dovecot: authenticated remote bypass of intended access restrictions
709097 - CVE-2011-2167 dovecot: directory traversal due to not obeying chroot directive
754980 - CVE-2011-4318 dovecot: proxy destination host name not checked against SSL certificate name
6. Package List:
Red Hat Enterprise Linux Server (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dovecot-2.0.9-5.el6.src.rpm
i386:
dovecot-2.0.9-5.el6.i686.rpm
dovecot-debuginfo-2.0.9-5.el6.i686.rpm
dovecot-mysql-2.0.9-5.el6.i686.rpm
dovecot-pgsql-2.0.9-5.el6.i686.rpm
dovecot-pigeonhole-2.0.9-5.el6.i686.rpm
ppc64:
dovecot-2.0.9-5.el6.ppc.rpm
dovecot-2.0.9-5.el6.ppc64.rpm
dovecot-debuginfo-2.0.9-5.el6.ppc.rpm
dovecot-debuginfo-2.0.9-5.el6.ppc64.rpm
dovecot-mysql-2.0.9-5.el6.ppc64.rpm
dovecot-pgsql-2.0.9-5.el6.ppc64.rpm
dovecot-pigeonhole-2.0.9-5.el6.ppc64.rpm
s390x:
dovecot-2.0.9-5.el6.s390.rpm
dovecot-2.0.9-5.el6.s390x.rpm
dovecot-debuginfo-2.0.9-5.el6.s390.rpm
dovecot-debuginfo-2.0.9-5.el6.s390x.rpm
dovecot-mysql-2.0.9-5.el6.s390x.rpm
dovecot-pgsql-2.0.9-5.el6.s390x.rpm
dovecot-pigeonhole-2.0.9-5.el6.s390x.rpm
x86_64:
dovecot-2.0.9-5.el6.i686.rpm
dovecot-2.0.9-5.el6.x86_64.rpm
dovecot-debuginfo-2.0.9-5.el6.i686.rpm
dovecot-debuginfo-2.0.9-5.el6.x86_64.rpm
dovecot-mysql-2.0.9-5.el6.x86_64.rpm
dovecot-pgsql-2.0.9-5.el6.x86_64.rpm
dovecot-pigeonhole-2.0.9-5.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dovecot-2.0.9-5.el6.src.rpm
i386:
dovecot-debuginfo-2.0.9-5.el6.i686.rpm
dovecot-devel-2.0.9-5.el6.i686.rpm
ppc64:
dovecot-debuginfo-2.0.9-5.el6.ppc64.rpm
dovecot-devel-2.0.9-5.el6.ppc64.rpm
s390x:
dovecot-debuginfo-2.0.9-5.el6.s390x.rpm
dovecot-devel-2.0.9-5.el6.s390x.rpm
x86_64:
dovecot-debuginfo-2.0.9-5.el6.x86_64.rpm
dovecot-devel-2.0.9-5.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dovecot-2.0.9-5.el6.src.rpm
i386:
dovecot-2.0.9-5.el6.i686.rpm
dovecot-debuginfo-2.0.9-5.el6.i686.rpm
dovecot-mysql-2.0.9-5.el6.i686.rpm
dovecot-pgsql-2.0.9-5.el6.i686.rpm
dovecot-pigeonhole-2.0.9-5.el6.i686.rpm
x86_64:
dovecot-2.0.9-5.el6.i686.rpm
dovecot-2.0.9-5.el6.x86_64.rpm
dovecot-debuginfo-2.0.9-5.el6.i686.rpm
dovecot-debuginfo-2.0.9-5.el6.x86_64.rpm
dovecot-mysql-2.0.9-5.el6.x86_64.rpm
dovecot-pgsql-2.0.9-5.el6.x86_64.rpm
dovecot-pigeonhole-2.0.9-5.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dovecot-2.0.9-5.el6.src.rpm
i386:
dovecot-debuginfo-2.0.9-5.el6.i686.rpm
dovecot-devel-2.0.9-5.el6.i686.rpm
x86_64:
dovecot-debuginfo-2.0.9-5.el6.x86_64.rpm
dovecot-devel-2.0.9-5.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-2166.html
https://www.redhat.com/security/data/cve/CVE-2011-2167.html
https://www.redhat.com/security/data/cve/CVE-2011-4318.html
https://access.redhat.com/security/updates/classification/#low
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2013 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFRJcMBXlSAg2UNWIIRAsLkAKCVzudrg6y2jNbVu8TARQH65FPliACgpPzA
3cvEfHEUoK/fdUBZNDEuZqU=
=9rAE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201110-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Dovecot: Multiple vulnerabilities
Date: October 10, 2011
Bugs: #286844, #293954, #314533, #368653
ID: 201110-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities were found in Dovecot, the worst of which
allowing for remote execution of arbitrary code. Please review
the CVE identifiers referenced below for details.
Impact
======
A remote attacker could exploit these vulnerabilities to cause the
remote execution of arbitrary code, or a Denial of Service condition,
to conduct directory traversal attacks, corrupt data, or disclose
information.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Dovecot 1 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/dovecot-1.2.17"
All Dovecot 2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/dovecot-2.0.13"
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since May 28, 2011. It is likely that your system is already
no longer affected by this issue.
References
==========
[ 1 ] CVE-2009-3235
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3235
[ 2 ] CVE-2009-3897
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3897
[ 3 ] CVE-2010-0745
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0745
[ 4 ] CVE-2010-3304
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3304
[ 5 ] CVE-2010-3706
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3706
[ 6 ] CVE-2010-3707
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3707
[ 7 ] CVE-2010-3779
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3779
[ 8 ] CVE-2010-3780
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3780
[ 9 ] CVE-2011-1929
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1929
[ 10 ] CVE-2011-2166
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2166
[ 11 ] CVE-2011-2167
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2167
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201110-04.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2011 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
VAR-201105-0289 | CVE-2011-2166 | Dovecot of script-login Vulnerable to access restrictions |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script. Dovecot is an open source IMAP and POP3 server for Linux/UNIX-like systems. Dovecot is prone to multiple security-bypass vulnerabilities because it fails to properly implement certain configuration settings.
Authenticated attackers can exploit these issues to bypass certain security restrictions and perform unauthorized actions. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Low: dovecot security and bug fix update
Advisory ID: RHSA-2013:0520-02
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0520.html
Issue date: 2013-02-21
CVE Names: CVE-2011-2166 CVE-2011-2167 CVE-2011-4318
=====================================================================
1. Summary:
Updated dovecot packages that fix three security issues and one bug are now
available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
3. It
supports mail in either of maildir or mbox formats. The SQL drivers and
authentication plug-ins are provided as sub-packages.
Two flaws were found in the way some settings were enforced by the
script-login functionality of Dovecot. (CVE-2011-2166,
CVE-2011-2167)
A flaw was found in the way Dovecot performed remote server identity
verification, when it was configured to proxy IMAP and POP3 connections to
remote hosts using TLS/SSL protocols. A remote attacker could use this flaw
to conduct man-in-the-middle attacks using an X.509 certificate issued by
a trusted Certificate Authority (for a different name). (CVE-2011-4318)
This update also fixes the following bug:
* When a new user first accessed their IMAP inbox, Dovecot was, under some
circumstances, unable to change the group ownership of the inbox directory
in the user's Maildir location to match that of the user's mail spool
(/var/mail/$USER). This correctly generated an "Internal error occurred"
message. However, with a subsequent attempt to access the inbox, Dovecot
saw that the directory already existed and proceeded with its operation,
leaving the directory with incorrectly set permissions. This update
corrects the underlying permissions setting error. When a new user now
accesses their inbox for the first time, and it is not possible to set
group ownership, Dovecot removes the created directory and generates an
error message instead of keeping the directory with incorrect group
ownership. (BZ#697620)
Users of dovecot are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing the
updated packages, the dovecot service will be restarted automatically.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
5. Package List:
Red Hat Enterprise Linux Server (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dovecot-2.0.9-5.el6.src.rpm
i386:
dovecot-2.0.9-5.el6.i686.rpm
dovecot-debuginfo-2.0.9-5.el6.i686.rpm
dovecot-mysql-2.0.9-5.el6.i686.rpm
dovecot-pgsql-2.0.9-5.el6.i686.rpm
dovecot-pigeonhole-2.0.9-5.el6.i686.rpm
ppc64:
dovecot-2.0.9-5.el6.ppc.rpm
dovecot-2.0.9-5.el6.ppc64.rpm
dovecot-debuginfo-2.0.9-5.el6.ppc.rpm
dovecot-debuginfo-2.0.9-5.el6.ppc64.rpm
dovecot-mysql-2.0.9-5.el6.ppc64.rpm
dovecot-pgsql-2.0.9-5.el6.ppc64.rpm
dovecot-pigeonhole-2.0.9-5.el6.ppc64.rpm
s390x:
dovecot-2.0.9-5.el6.s390.rpm
dovecot-2.0.9-5.el6.s390x.rpm
dovecot-debuginfo-2.0.9-5.el6.s390.rpm
dovecot-debuginfo-2.0.9-5.el6.s390x.rpm
dovecot-mysql-2.0.9-5.el6.s390x.rpm
dovecot-pgsql-2.0.9-5.el6.s390x.rpm
dovecot-pigeonhole-2.0.9-5.el6.s390x.rpm
x86_64:
dovecot-2.0.9-5.el6.i686.rpm
dovecot-2.0.9-5.el6.x86_64.rpm
dovecot-debuginfo-2.0.9-5.el6.i686.rpm
dovecot-debuginfo-2.0.9-5.el6.x86_64.rpm
dovecot-mysql-2.0.9-5.el6.x86_64.rpm
dovecot-pgsql-2.0.9-5.el6.x86_64.rpm
dovecot-pigeonhole-2.0.9-5.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/dovecot-2.0.9-5.el6.src.rpm
i386:
dovecot-debuginfo-2.0.9-5.el6.i686.rpm
dovecot-devel-2.0.9-5.el6.i686.rpm
ppc64:
dovecot-debuginfo-2.0.9-5.el6.ppc64.rpm
dovecot-devel-2.0.9-5.el6.ppc64.rpm
s390x:
dovecot-debuginfo-2.0.9-5.el6.s390x.rpm
dovecot-devel-2.0.9-5.el6.s390x.rpm
x86_64:
dovecot-debuginfo-2.0.9-5.el6.x86_64.rpm
dovecot-devel-2.0.9-5.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dovecot-2.0.9-5.el6.src.rpm
i386:
dovecot-2.0.9-5.el6.i686.rpm
dovecot-debuginfo-2.0.9-5.el6.i686.rpm
dovecot-mysql-2.0.9-5.el6.i686.rpm
dovecot-pgsql-2.0.9-5.el6.i686.rpm
dovecot-pigeonhole-2.0.9-5.el6.i686.rpm
x86_64:
dovecot-2.0.9-5.el6.i686.rpm
dovecot-2.0.9-5.el6.x86_64.rpm
dovecot-debuginfo-2.0.9-5.el6.i686.rpm
dovecot-debuginfo-2.0.9-5.el6.x86_64.rpm
dovecot-mysql-2.0.9-5.el6.x86_64.rpm
dovecot-pgsql-2.0.9-5.el6.x86_64.rpm
dovecot-pigeonhole-2.0.9-5.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/dovecot-2.0.9-5.el6.src.rpm
i386:
dovecot-debuginfo-2.0.9-5.el6.i686.rpm
dovecot-devel-2.0.9-5.el6.i686.rpm
x86_64:
dovecot-debuginfo-2.0.9-5.el6.x86_64.rpm
dovecot-devel-2.0.9-5.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-2166.html
https://www.redhat.com/security/data/cve/CVE-2011-2167.html
https://www.redhat.com/security/data/cve/CVE-2011-4318.html
https://access.redhat.com/security/updates/classification/#low
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2013 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFRJcMBXlSAg2UNWIIRAsLkAKCVzudrg6y2jNbVu8TARQH65FPliACgpPzA
3cvEfHEUoK/fdUBZNDEuZqU=
=9rAE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201110-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Dovecot: Multiple vulnerabilities
Date: October 10, 2011
Bugs: #286844, #293954, #314533, #368653
ID: 201110-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities were found in Dovecot, the worst of which
allowing for remote execution of arbitrary code. Please review
the CVE identifiers referenced below for details.
Impact
======
A remote attacker could exploit these vulnerabilities to cause the
remote execution of arbitrary code, or a Denial of Service condition,
to conduct directory traversal attacks, corrupt data, or disclose
information.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Dovecot 1 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/dovecot-1.2.17"
All Dovecot 2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/dovecot-2.0.13"
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since May 28, 2011. It is likely that your system is already
no longer affected by this issue.
References
==========
[ 1 ] CVE-2009-3235
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3235
[ 2 ] CVE-2009-3897
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3897
[ 3 ] CVE-2010-0745
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0745
[ 4 ] CVE-2010-3304
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3304
[ 5 ] CVE-2010-3706
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3706
[ 6 ] CVE-2010-3707
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3707
[ 7 ] CVE-2010-3779
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3779
[ 8 ] CVE-2010-3780
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3780
[ 9 ] CVE-2011-1929
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1929
[ 10 ] CVE-2011-2166
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2166
[ 11 ] CVE-2011-2167
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2167
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201110-04.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2011 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
VAR-201105-0286 | CVE-2011-2214 |
7T Interactive Graphical SCADA System system ODBC Message Remote Memory Corruption Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201105-0737 |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the Open Database Connectivity (ODBC) component in 7T Interactive Graphical SCADA System (IGSS) before 9.0.0.11143 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 20222, which triggers memory corruption related to an "invalid structure being used.". The 7T Interactive Graphical SCADA System is an automated monitoring and control system. Using an illegal structure can result in an exploitable condition that can successfully execute arbitrary code in the application context. Successfully exploiting this issue will completely compromise an affected computer. Failed exploit attempts will result in a denial-of-service condition.
Versions prior to Interactive Graphical SCADA System 9.0.0.11143 are vulnerable
VAR-201107-0115 | CVE-2011-0548 | Autonomy Keyview IDOL contains multiple vulnerabilities in file parsers |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Buffer overflow in the Lotus Freelance Graphics PRZ file viewer in Autonomy KeyView, as used in Symantec Mail Security (SMS) 6.x through 8.x, Symantec Brightmail and Messaging Gateway before 9.5.1, and Symantec Data Loss Prevention (DLP) before 10.5.3 and 11.x before 11.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted .prz file. NOTE: this may overlap CVE-2011-1217. Autonomy KeyView IDOL Contains multiple vulnerabilities in file decoding. Autonomy Provided by Autonomy KeyView IDOL Is 1000 A library that decodes the above file formats. IBM Lotus Notes , Lotus Domino , Symantec Mail Security , Hyland OnBase Used in such applications. Autonomy KeyView IDOL Contains multiple vulnerabilities in file decoding.Although the impact will vary depending on the application, service operation may be interrupted by opening a specially crafted file. (DoS) An attacker may be attacked or execute arbitrary code with user privileges. Autonomy KeyView Filter is prone to a buffer-overflow vulnerability because of a failure to properly bounds check user-supplied input.
An attacker can exploit this issue by enticing an unsuspecting victim to open a malicious file or email attachment. Failed exploit attempts will result in a denial-of-service condition.
NOTE: This issue was previously discussed in BID 47962 (IBM Lotus Notes Attachment Handling Multiple Buffer Overflow Vulnerabilities) but has been given its own record to better document it. KeyView is a software package for exporting, converting and viewing files in various formats.
For more information:
SA44820
SOLUTION:
Do not open documents from untrusted sources.
For more information:
SA44820
Successful exploitation requires the attachment content scanning
option to be enabled.
SOLUTION:
Disable the attachment content scanning option. ----------------------------------------------------------------------
Alerts when vulnerabilities pose a threat to your infrastructure
The enhanced reporting module of the Secunia Vulnerability Intelligence Manager (VIM) enables you to combine advisory and ticket information, and generate policy compliance statistics. Using your asset list preferences, customised notifications are issued as soon as a new vulnerability is discovered - a valuable tool for documenting mitigation strategies.
For more information see vulnerability #6 in:
SA44624
Please see the vendor's advisory for the list for affected products. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria
See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei.
Read more:
http://conference.first.org/
----------------------------------------------------------------------
TITLE:
Autonomy KeyView File Processing Vulnerabilities
SECUNIA ADVISORY ID:
SA44820
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44820/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44820
RELEASE DATE:
2011-06-08
DISCUSS ADVISORY:
http://secunia.com/advisories/44820/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44820/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44820
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Autonomy KeyView,
which can be exploited by malicious people to compromise a vulnerable
system.
1) An error when processing Windows Write (WRI) files can be
exploited to cause a stack-based buffer overflow.
2) Some errors when processing unspecified file formats can be
exploited to corrupt memory. No further information is currently
available.
The vulnerabilities are reported in versions prior to 10.13.1.
SOLUTION:
Update to version 10.13.1.
PROVIDED AND/OR DISCOVERED BY:
Will Dormann and Jared Allar, CERT/CC.
ORIGINAL ADVISORY:
US-CERT (VU#126159):
http://www.kb.cert.org/vuls/id/126159
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-201106-0090 | CVE-2011-0767 | Imperva SecureSphere management GUI contains an XSS vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the management GUI in the MX Management Server in Imperva SecureSphere Web Application Firewall 6.2, 7.x, and 8.x allows remote attackers to inject arbitrary web script or HTML via an HTTP request to a firewalled server, aka Bug ID 31759. An XSS vulnerability exists in the Imperva SecureSphere management GUI. Imperva Made SecureSphere Contains a cross-site scripting vulnerability. Imperva Provided by the company SecureSphere Contains a cross-site scripting vulnerability that results from the process of validating input on the management screen. For details, check the information provided by the developer.An arbitrary script may be executed on the user's web browser.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials, control how the site is rendered to the user, or launch other attacks. ----------------------------------------------------------------------
Alerts when vulnerabilities pose a threat to your infrastructure
The enhanced reporting module of the Secunia Vulnerability Intelligence Manager (VIM) enables you to combine advisory and ticket information, and generate policy compliance statistics. Using your asset list preferences, customised notifications are issued as soon as a new vulnerability is discovered - a valuable tool for documenting mitigation strategies.
Watch our quick solution overview:
http://www.youtube.com/user/Secunia#p/a/u/0/M1Y9sJqR2SY
----------------------------------------------------------------------
TITLE:
SecureSphere Web Application Firewall Database Events Script
Insertion Vulnerability
SECUNIA ADVISORY ID:
SA44772
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44772/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44772
RELEASE DATE:
2011-06-01
DISCUSS ADVISORY:
http://secunia.com/advisories/44772/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44772/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44772
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in SecureSphere Web Application
Firewall, which can be exploited by malicious people to conduct
script insertion attacks.
Certain input passed to a web server protected by SecureSphere is not
properly sanitised before being displayed to the user.
The vulnerability is reported in version 6.2, 7.x, and 8.x.
SOLUTION:
Apply patches.
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY:
Sean Talbot, Dell SecureWorks
ORIGINAL ADVISORY:
Imperva:
http://www.imperva.com/resources/adc/adc_advisories_response_secureworks.html
SecureWorks:
http://www.secureworks.com/research/advisories/SWRX-2011-001/
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-201105-0300 | No CVE | ForceControl 6.1WebServer URI Request Heap Buffer Overflow Vulnerability |
CVSS V2: 7.0 CVSS V3: - Severity: HIGH |
ForceControl is an industrial monitoring configuration software produced by Beijing 3D Force Control Technology Co., Ltd. A heap buffer overflow vulnerability exists in SP3, SP2, and SP1 in ForceControl 6.1. Because the httpsvr.exe server process fails to adequately perform boundary checks on very long Request-URI HTTP requests, an attacker can exploit the vulnerability for a denial of service attack or remote execution of arbitrary code
VAR-201105-0301 | No CVE | pNetPower 6.1 AngelServer UDP Packet Heap Buffer Overflow Vulnerability |
CVSS V2: 7.0 CVSS V3: - Severity: HIGH |
pNetPower is an electric version monitoring configuration software launched by Beijing 3D Power Control Technology Co., Ltd. There is a heap buffer overflow vulnerability in PNETPower 6. In the AngelServer.exe process, the UDP packet handling listener failed to adequately check the boundaries. An attacker could exploit a vulnerability for a denial of service attack or remote execution of arbitrary code
VAR-201105-0094 | CVE-2011-1928 | APR Library and Apache HTTP Server of fnmatch Service disruption in implementation ( infinite loop ) Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used. NOTE: this issue exists because of an incorrect fix for CVE-2011-0419. This vulnerability CVE-2011-0419 Vulnerability due to incomplete fix.Does not match wildcard pattern type by a third party URI Through service disruption ( infinite loop ) There is a possibility of being put into a state. Apache APR is prone to a denial-of-service vulnerability.
Successful exploits may allow the attacker to cause excessive CPU usage, resulting in denial-of-service conditions.
Apache APR 1.4.4 is affected. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Low: apr security update
Advisory ID: RHSA-2011:0844-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0844.html
Issue date: 2011-05-31
CVE Names: CVE-2011-1928
=====================================================================
1. Summary:
Updated apr packages that fix one security issue are now available for
Red Hat Enterprise Linux 4, 5, and 6.
The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
2. Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
3. It provides a free library of C data
structures and routines.
The fix for CVE-2011-0419 (released via RHSA-2011:0507) introduced an
infinite loop flaw in the apr_fnmatch() function when the APR_FNM_PATHNAME
matching flag was used. A remote attacker could possibly use this flaw to
cause a denial of service on an application using the apr_fnmatch()
function. (CVE-2011-1928)
Note: This problem affected httpd configurations using the "Location"
directive with wildcard URLs. The denial of service could have been
triggered during normal operation; it did not specifically require a
malicious HTTP request.
This update also addresses additional problems introduced by the rewrite of
the apr_fnmatch() function, which was necessary to address the
CVE-2011-0419 flaw.
All apr users should upgrade to these updated packages, which contain a
backported patch to correct this issue. Applications using the apr library,
such as httpd, must be restarted for this update to take effect.
4. Solution:
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
706203 - CVE-2011-1928 apr: DoS flaw in apr_fnmatch() due to fix for CVE-2011-0419
6. Package List:
Red Hat Enterprise Linux AS version 4:
Source:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/apr-0.9.4-26.el4.src.rpm
i386:
apr-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
apr-devel-0.9.4-26.el4.i386.rpm
ia64:
apr-0.9.4-26.el4.i386.rpm
apr-0.9.4-26.el4.ia64.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.ia64.rpm
apr-devel-0.9.4-26.el4.ia64.rpm
ppc:
apr-0.9.4-26.el4.ppc.rpm
apr-0.9.4-26.el4.ppc64.rpm
apr-debuginfo-0.9.4-26.el4.ppc.rpm
apr-debuginfo-0.9.4-26.el4.ppc64.rpm
apr-devel-0.9.4-26.el4.ppc.rpm
s390:
apr-0.9.4-26.el4.s390.rpm
apr-debuginfo-0.9.4-26.el4.s390.rpm
apr-devel-0.9.4-26.el4.s390.rpm
s390x:
apr-0.9.4-26.el4.s390.rpm
apr-0.9.4-26.el4.s390x.rpm
apr-debuginfo-0.9.4-26.el4.s390.rpm
apr-debuginfo-0.9.4-26.el4.s390x.rpm
apr-devel-0.9.4-26.el4.s390x.rpm
x86_64:
apr-0.9.4-26.el4.i386.rpm
apr-0.9.4-26.el4.x86_64.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.x86_64.rpm
apr-devel-0.9.4-26.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
Source:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/apr-0.9.4-26.el4.src.rpm
i386:
apr-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
apr-devel-0.9.4-26.el4.i386.rpm
x86_64:
apr-0.9.4-26.el4.i386.rpm
apr-0.9.4-26.el4.x86_64.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.x86_64.rpm
apr-devel-0.9.4-26.el4.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
Source:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/apr-0.9.4-26.el4.src.rpm
i386:
apr-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
apr-devel-0.9.4-26.el4.i386.rpm
ia64:
apr-0.9.4-26.el4.i386.rpm
apr-0.9.4-26.el4.ia64.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.ia64.rpm
apr-devel-0.9.4-26.el4.ia64.rpm
x86_64:
apr-0.9.4-26.el4.i386.rpm
apr-0.9.4-26.el4.x86_64.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.x86_64.rpm
apr-devel-0.9.4-26.el4.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
Source:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/apr-0.9.4-26.el4.src.rpm
i386:
apr-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
apr-devel-0.9.4-26.el4.i386.rpm
ia64:
apr-0.9.4-26.el4.i386.rpm
apr-0.9.4-26.el4.ia64.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.ia64.rpm
apr-devel-0.9.4-26.el4.ia64.rpm
x86_64:
apr-0.9.4-26.el4.i386.rpm
apr-0.9.4-26.el4.x86_64.rpm
apr-debuginfo-0.9.4-26.el4.i386.rpm
apr-debuginfo-0.9.4-26.el4.x86_64.rpm
apr-devel-0.9.4-26.el4.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/apr-1.2.7-11.el5_6.5.src.rpm
i386:
apr-1.2.7-11.el5_6.5.i386.rpm
apr-debuginfo-1.2.7-11.el5_6.5.i386.rpm
apr-docs-1.2.7-11.el5_6.5.i386.rpm
x86_64:
apr-1.2.7-11.el5_6.5.i386.rpm
apr-1.2.7-11.el5_6.5.x86_64.rpm
apr-debuginfo-1.2.7-11.el5_6.5.i386.rpm
apr-debuginfo-1.2.7-11.el5_6.5.x86_64.rpm
apr-docs-1.2.7-11.el5_6.5.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/apr-1.2.7-11.el5_6.5.src.rpm
i386:
apr-debuginfo-1.2.7-11.el5_6.5.i386.rpm
apr-devel-1.2.7-11.el5_6.5.i386.rpm
x86_64:
apr-debuginfo-1.2.7-11.el5_6.5.i386.rpm
apr-debuginfo-1.2.7-11.el5_6.5.x86_64.rpm
apr-devel-1.2.7-11.el5_6.5.i386.rpm
apr-devel-1.2.7-11.el5_6.5.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/apr-1.2.7-11.el5_6.5.src.rpm
i386:
apr-1.2.7-11.el5_6.5.i386.rpm
apr-debuginfo-1.2.7-11.el5_6.5.i386.rpm
apr-devel-1.2.7-11.el5_6.5.i386.rpm
apr-docs-1.2.7-11.el5_6.5.i386.rpm
ia64:
apr-1.2.7-11.el5_6.5.ia64.rpm
apr-debuginfo-1.2.7-11.el5_6.5.ia64.rpm
apr-devel-1.2.7-11.el5_6.5.ia64.rpm
apr-docs-1.2.7-11.el5_6.5.ia64.rpm
ppc:
apr-1.2.7-11.el5_6.5.ppc.rpm
apr-1.2.7-11.el5_6.5.ppc64.rpm
apr-debuginfo-1.2.7-11.el5_6.5.ppc.rpm
apr-debuginfo-1.2.7-11.el5_6.5.ppc64.rpm
apr-devel-1.2.7-11.el5_6.5.ppc.rpm
apr-devel-1.2.7-11.el5_6.5.ppc64.rpm
apr-docs-1.2.7-11.el5_6.5.ppc.rpm
s390x:
apr-1.2.7-11.el5_6.5.s390.rpm
apr-1.2.7-11.el5_6.5.s390x.rpm
apr-debuginfo-1.2.7-11.el5_6.5.s390.rpm
apr-debuginfo-1.2.7-11.el5_6.5.s390x.rpm
apr-devel-1.2.7-11.el5_6.5.s390.rpm
apr-devel-1.2.7-11.el5_6.5.s390x.rpm
apr-docs-1.2.7-11.el5_6.5.s390x.rpm
x86_64:
apr-1.2.7-11.el5_6.5.i386.rpm
apr-1.2.7-11.el5_6.5.x86_64.rpm
apr-debuginfo-1.2.7-11.el5_6.5.i386.rpm
apr-debuginfo-1.2.7-11.el5_6.5.x86_64.rpm
apr-devel-1.2.7-11.el5_6.5.i386.rpm
apr-devel-1.2.7-11.el5_6.5.x86_64.rpm
apr-docs-1.2.7-11.el5_6.5.x86_64.rpm
Red Hat Enterprise Linux Desktop (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/apr-1.3.9-3.el6_1.2.src.rpm
i386:
apr-1.3.9-3.el6_1.2.i686.rpm
apr-debuginfo-1.3.9-3.el6_1.2.i686.rpm
x86_64:
apr-1.3.9-3.el6_1.2.i686.rpm
apr-1.3.9-3.el6_1.2.x86_64.rpm
apr-debuginfo-1.3.9-3.el6_1.2.i686.rpm
apr-debuginfo-1.3.9-3.el6_1.2.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/apr-1.3.9-3.el6_1.2.src.rpm
i386:
apr-debuginfo-1.3.9-3.el6_1.2.i686.rpm
apr-devel-1.3.9-3.el6_1.2.i686.rpm
x86_64:
apr-debuginfo-1.3.9-3.el6_1.2.i686.rpm
apr-debuginfo-1.3.9-3.el6_1.2.x86_64.rpm
apr-devel-1.3.9-3.el6_1.2.i686.rpm
apr-devel-1.3.9-3.el6_1.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/apr-1.3.9-3.el6_1.2.src.rpm
x86_64:
apr-1.3.9-3.el6_1.2.i686.rpm
apr-1.3.9-3.el6_1.2.x86_64.rpm
apr-debuginfo-1.3.9-3.el6_1.2.i686.rpm
apr-debuginfo-1.3.9-3.el6_1.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/apr-1.3.9-3.el6_1.2.src.rpm
x86_64:
apr-debuginfo-1.3.9-3.el6_1.2.i686.rpm
apr-debuginfo-1.3.9-3.el6_1.2.x86_64.rpm
apr-devel-1.3.9-3.el6_1.2.i686.rpm
apr-devel-1.3.9-3.el6_1.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/apr-1.3.9-3.el6_1.2.src.rpm
i386:
apr-1.3.9-3.el6_1.2.i686.rpm
apr-debuginfo-1.3.9-3.el6_1.2.i686.rpm
apr-devel-1.3.9-3.el6_1.2.i686.rpm
ppc64:
apr-1.3.9-3.el6_1.2.ppc.rpm
apr-1.3.9-3.el6_1.2.ppc64.rpm
apr-debuginfo-1.3.9-3.el6_1.2.ppc.rpm
apr-debuginfo-1.3.9-3.el6_1.2.ppc64.rpm
apr-devel-1.3.9-3.el6_1.2.ppc.rpm
apr-devel-1.3.9-3.el6_1.2.ppc64.rpm
s390x:
apr-1.3.9-3.el6_1.2.s390.rpm
apr-1.3.9-3.el6_1.2.s390x.rpm
apr-debuginfo-1.3.9-3.el6_1.2.s390.rpm
apr-debuginfo-1.3.9-3.el6_1.2.s390x.rpm
apr-devel-1.3.9-3.el6_1.2.s390.rpm
apr-devel-1.3.9-3.el6_1.2.s390x.rpm
x86_64:
apr-1.3.9-3.el6_1.2.i686.rpm
apr-1.3.9-3.el6_1.2.x86_64.rpm
apr-debuginfo-1.3.9-3.el6_1.2.i686.rpm
apr-debuginfo-1.3.9-3.el6_1.2.x86_64.rpm
apr-devel-1.3.9-3.el6_1.2.i686.rpm
apr-devel-1.3.9-3.el6_1.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/apr-1.3.9-3.el6_1.2.src.rpm
i386:
apr-1.3.9-3.el6_1.2.i686.rpm
apr-debuginfo-1.3.9-3.el6_1.2.i686.rpm
apr-devel-1.3.9-3.el6_1.2.i686.rpm
x86_64:
apr-1.3.9-3.el6_1.2.i686.rpm
apr-1.3.9-3.el6_1.2.x86_64.rpm
apr-debuginfo-1.3.9-3.el6_1.2.i686.rpm
apr-debuginfo-1.3.9-3.el6_1.2.x86_64.rpm
apr-devel-1.3.9-3.el6_1.2.i686.rpm
apr-devel-1.3.9-3.el6_1.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2011-1928.html
https://access.redhat.com/security/updates/classification/#low
https://rhn.redhat.com/errata/RHSA-2011-0507.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFN5RAiXlSAg2UNWIIRAuwdAJ9vddMlxPWoOqzsNz37JmvVmqSKfgCfchI5
R4u+hsr+KDZ1nnC2K8wCJ9c=
=e0/T
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03280632
Version: 1
HPSBMU02764 SSRT100827 rev.1 - HP System Management Homepage (SMH) Running on Linux and Windows, Remote Cross Site Request Forgery (CSRF), Denial of Service (DoS), Execution of Arbitrary Code, Other Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2012-04-16
Last Updated: 2012-04-16
Potential Security Impact: Remote cross site request forgery (CSRF), Denial of Service (DoS), execution of arbitrary code, other vulnerabilities
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP System Management Homepage (SMH) running on Linux and Windows. The vulnerabilities could be exploited remotely and locally resulting in cross site request forgery (CSRF), Denial of Service (DoS), execution of arbitrary code, and other vulnerabilities.
References: CVE-2009-0037, CVE-2010-0734, CVE-2010-1452, CVE-2010-1623, CVE-2010-2068, CVE-2010-2791, CVE-2010-3436, CVE-2010-4409, CVE-2010-4645, CVE-2011-0014, CVE-2011-0195, CVE-2011-0419, CVE-2011-1148, CVE-2011-1153, CVE-2011-1464, CVE-2011-1467, CVE-2011-1468, CVE-2011-1470, CVE-2011-1471, CVE-2011-1928, CVE-2011-1938, CVE-2011-1945, CVE-2011-2192, CVE-2011-2202, CVE-2011-2483, CVE-2011-3182, CVE-2011-3189, CVE-2011-3192, CVE-2011-3267, CVE-2011-3268, CVE-2011-3207, CVE-2011-3210, CVE-2011-3348, CVE-2011-3368, CVE-2011-3639, CVE-2011-3846, SSRT100376, CVE-2011-4317, CVE-2012-0135, SSRT100609, CVE-2012-1993, SSRT10043
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP System Management Homepage (SMH) before v7.0 running on Linux and Windows.
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2009-0037 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8
CVE-2010-0734 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8
CVE-2010-1452 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2010-1623 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2010-2068 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0
CVE-2010-2791 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0
CVE-2010-3436 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0
CVE-2010-4409 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2010-4645 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2011-0014 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2011-0195 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3
CVE-2011-0419 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
CVE-2011-1148 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5
CVE-2011-1153 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5
CVE-2011-1464 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
CVE-2011-1467 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2011-1468 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
CVE-2011-1470 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
CVE-2011-1471 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
CVE-2011-1928 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
CVE-2011-1938 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5
CVE-2011-1945 (AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.6
CVE-2011-2192 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3
CVE-2011-2202 (AV:N/AC:L/Au:N/C:N/I:P/A:P) 6.4
CVE-2011-2483 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0
CVE-2011-3182 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2011-3189 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3
CVE-2011-3192 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8
CVE-2011-3267 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2011-3268 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0
CVE-2011-3207 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0
CVE-2011-3210 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0
CVE-2011-3348 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3
CVE-2011-3368 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0
CVE-2011-3639 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
CVE-2011-3846 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8
CVE-2011-4317 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3
CVE-2012-0135 (AV:N/AC:M/Au:S/C:N/I:N/A:P) 3.5
CVE-2012-1993 (AV:L/AC:L/Au:S/C:P/I:P/A:N) 3.2
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks Sow Ching Shiong coordinating with Secunia for reporting CVE-2011-3846 to security-alert@hp.com.
RESOLUTION
HP has provided HP System Management Homepage v7.0 or subsequent to resolve the vulnerabilities.
SMH v7.0 is available here: http://h18000.www1.hp.com/products/servers/management/agents/index.html
HISTORY
Version:1 (rev.1) 16 April 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. The Apache Portable Runtime
Utility Library (aka APR-Util) provides an interface to functionality
such as XML parsing, string matching and database connections. Please review the CVE identifiers
referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Apache Portable Runtime users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/apr-1.4.8-r1"
All users of the APR Utility Library should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/apr-util-1.3.10"
Packages which depend on these libraries may need to be recompiled.
Tools such as revdep-rebuild may assist in identifying some of these
packages.
References
==========
[ 1 ] CVE-2010-1623
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1623
[ 2 ] CVE-2011-0419
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0419
[ 3 ] CVE-2011-1928
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1928
[ 4 ] CVE-2012-0840
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0840
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201405-24.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
Packages for 2009.0 are provided as of the Extended Maintenance
Program. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFN1j7zmqjQ0CJFipgRArP5AKC39KmLQc0Jb5TOOuu8NpBfmxHPrwCgy5Rj
AWGRfBe7vZXB3JYQt89xN+I=
=mc/L
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
.
HP Secure Web Server (SWS) for OpenVMS V2.2 and earlier. ==========================================================================
Ubuntu Security Notice USN-1134-1
May 24, 2011
apache2, apr vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
- Ubuntu 6.06 LTS
Summary:
A denial of service issue exists that affects the Apache web server. (CVE-2011-1928)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 11.04:
libapr1 1.4.2-7ubuntu2.1
Ubuntu 10.10:
libapr1 1.4.2-3ubuntu1.1
Ubuntu 10.04 LTS:
libapr1 1.3.8-1ubuntu0.3
Ubuntu 8.04 LTS:
libapr1 1.2.11-1ubuntu0.2
Ubuntu 6.06 LTS:
libapr0 2.0.55-4ubuntu2.13
After a standard system update you need to restart the Apache web
server or any other service that depends on the APR library to make
all the necessary changes
VAR-201105-0048 | CVE-2011-0961 |
Cisco CiscoWorks Common Services Vulnerable to cross-site scripting
Related entries in the VARIoT exploits database: VAR-E-201105-0013, VAR-E-201105-0012, VAR-E-201105-0019, VAR-E-201105-0014, VAR-E-201105-0015, VAR-E-201105-0017 |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in cwhp/device.center.do in the Help servlet in Cisco CiscoWorks Common Services 3.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the device parameter, aka Bug ID CSCto12704. The problem is Bug ID CSCto12704 It is a problem.Any third party, through the device parameters, Web script And HTML May be inserted.
Exploiting this vulnerability could allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected website. As a result, the attacker may be able to steal cookie-based authentication credentials and launch other attacks.
This issue is being monitored by Cisco Bug ID CSCto12704.
CiscoWorks Common Services 3.3 and prior are vulnerable. ----------------------------------------------------------------------
http://twitter.com/secunia
http://www.facebook.com/Secunia
----------------------------------------------------------------------
TITLE:
CiscoWorks Common Services "device" Cross-Site Scripting
Vulnerability
SECUNIA ADVISORY ID:
SA44645
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44645/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44645
RELEASE DATE:
2011-05-20
DISCUSS ADVISORY:
http://secunia.com/advisories/44645/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44645/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44645
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in CiscoWorks Common Services,
which can be exploited by malicious people to conduct cross-site
scripting attacks.
Input passed via the "device" parameter to cwhp/device.center.do in
the Framework Help servlet is not properly sanitised before being
returned to the user. This can be exploited to execute arbitrary HTML
and script code in a user's browser session in the context of an
affected site.
SOLUTION:
Update to a fixed version.
PROVIDED AND/OR DISCOVERED BY:
Sense of Security Labs
ORIGINAL ADVISORY:
Cisco:
http://tools.cisco.com/security/center/viewAlert.x?alertId=23088
Sense of Security Labs:
http://www.senseofsecurity.com.au/advisories/SOS-11-006
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. Sense of Security - Security Advisory - SOS-11-006
Release Date. 18-May-2011
Last Update. -
Vendor Notification Date. 28-Feb-2011
Product.
Platform. Microsoft Windows
Affected versions. CuOM 8.0 and 8.5 (verified),
possibly others.
Severity Rating. Medium - Low
Impact. Database access, cookie and credential
theft, impersonation, loss of
confidentiality, local file disclosure,
information disclosure.
Attack Vector. Remote with authentication
Solution Status. Vendor patch (upgrade to CuOM 8.6 as
advised by Cisco)
CVE reference. CVE-2011-0959 (CSCtn61716)
CVE-2011-0960 (CSCtn61716)
CVE-2011-0961 (CSCto12704)
CVE-2011-0962 (CSCto12712)
CVE-2011-0966 (CSCto35577)
Details.
Cisco Unified Operations Manager (CuOM) is a NMS for voice developed by
Cisco Systems. Operations Manager monitors and evaluates the current
status of both the IP communications infrastructure and the underlying
transport infrastructure in your network.
Multiple vulnerabilities have been identified in Cisco Unified
Operations Manager and associated products. These vulnerabilities
include multiple blind SQL injections, multiple XSS. and a directory
traversal vulnerability.
1. Blind SQL injection vulnerabilities that affect CuOM
CVE-2011-0960 (CSCtn61716):
The Variable CCMs of PRTestCreation can trigger a blind SQL injection
vulnerability by supplying a single quote, followed by a time delay
call:
/iptm/PRTestCreation.do?RequestSource=dashboard&MACs=&CCMs='waitfor%20
delay'0:0:20'--&Extns=&IPs=
Additionally, variable ccm of TelePresenceReportAction can trigger a
blind SQL injection vulnerability by supplying a single quote:
/iptm/TelePresenceReportAction.do?ccm='waitfor%20delay'0:0:20'--
2. Directory traversal vulnerability that affects CiscoWorks Homepage
CVE-2011-0966 (CSCto35577):
http://target:1741/cwhp/auditLog.do?file=..\..\..\..\..\..\..\boot.ini
cmfDBA user database info:
http://target:1741/cwhp/auditLog.do?file=..\..\..\..\..\..\..\Program
Files\CSCOpx\MDC\Tomcat\webapps\triveni\WEB-INF\classes\schedule.prope
rties
DB connection info for all databases:
http://target:1741/cwhp/auditLog.do?file=..\..\..\..\..\..\..\Program
Files\CSCOpx\lib\classpath\com\cisco\nm\cmf\dbservice2\DBServer.proper
ties
Note: When reading large files such as this file, ensure the row
limit is adjusted to 500 for example.
DB password change log:
http://target:1741/cwhp/auditLog.do?file=..\..\..\..\..\..\..\Program
Files\CSCOpx\log\dbpwdChange.log
Solution.
Upgrade to CuOM 8.6.
Refer to Cisco Bug IDs: CSCtn61716, CSCto12704, CSCto12712 and
CSCto35577 for information on patches and availability of fixes.
Discovered by.
Sense of Security Labs.
About us.
Sense of Security is a leading provider of information
security and risk management solutions. Our team has expert
skills in assessment and assurance, strategy and architecture,
and deployment through to ongoing management. We are
Australia's premier application penetration testing firm and
trusted IT security advisor to many of the countries largest
organisations.
Sense of Security Pty Ltd
Level 8, 66 King St
Sydney NSW 2000
AUSTRALIA
T: +61 (0)2 9290 4444
F: +61 (0)2 9290 4455
W: http://www.senseofsecurity.com.au
E: info@senseofsecurity.com.au
Twitter: @ITsecurityAU
The latest version of this advisory can be found at:
http://www.senseofsecurity.com.au/advisories/SOS-11-006.pdf
Other Sense of Security advisories can be found at:
http://www.senseofsecurity.com.au/research/it-security-advisories.php