VARIoT IoT vulnerabilities database

VAR-200612-0248 | CVE-2006-6488 | ICONICS Dialog Wrapper Module ActiveX Control Remote Stack Overflow Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Stack-based buffer overflow in the DoModal function in the Dialog Wrapper Module ActiveX control (DlgWrapper.dll) before 8.4.166.0, as used by ICONICS OPC Enabled Gauge, Switch, and Vessel ActiveX, allows remote attackers to execute arbitrary code via a long (1) FileName or (2) Filter argument. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system. ICONICS is a professional company that provides OPC-based visualization software. Failed attempts can crash the host application.
Versions prior to DlgWrapper.dll 8.4.166.0 are affected.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor. visits a malicious website.
The vulnerability is confirmed in ICONICS Vessel ActiveX 8.02.140
including DlgWrapper.dll 8.0.138.0.
SOLUTION:
Update to DlgWrapper.dll 8.4.166.0 by applying the hotfix:
http://www.iconics.com/support/free_tools/FreeToolsActiveX_DlgWrapperHotFix.zip
PROVIDED AND/OR DISCOVERED BY:
Will Dormann
ORIGINAL ADVISORY:
US-CERT VU#251969:
http://www.kb.cert.org/vuls/id/251969
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200612-0251 | CVE-2006-4727 | Tumbleweed EMF Administration Module of emfadmin/statusView.do Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in emfadmin/statusView.do in Tumbleweed EMF Administration Module 6.2.2 Build 4123, and possibly other versions before 6.3.2, allows remote attackers to inject arbitrary web script or HTML via the (1) lineId and (2) sort parameters
VAR-200612-0485 | CVE-2006-4098 | Cisco Secure Access Control Server vulnerable to a stack-based buffer overflow via a specially crafted "HTTP GET" request |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Stack-based buffer overflow in the CSRadius service in Cisco Secure Access Control Server (ACS) for Windows before 4.1 and ACS Solution Engine before 4.1 allows remote attackers to execute arbitrary code via a crafted RADIUS Accounting-Request packet.
Versions prior to 4.1 are vulnerable to these issues.
Two of the vulnerabilities may permit arbitrary code execution after
exploitation of the specified vulnerability.
Affected Cisco Secure ACS services, and the impact of the vulnerabilities
are as follows:
* Specially Crafted HTTP GET Request Vulnerability:
Processing a specially crafted HTTP GET request may crash the CSAdmin
service. This vulnerability is also susceptible to a stack overflow
condition.
* Specially Crafted RADIUS Accounting-Request Vulnerability:
Processing a specially crafted RADIUS Accounting-Request packet may crash
the CSRadius service. This vulnerability is also susceptible to a stack
overflow condition.
* Specially Crafted RADIUS Access-Request Vulnerabilities:
Processing a specially crafted RADIUS Access-Request packet may crash the
CSRadius service.
Cisco has made free software available to address this issue for affected
customers.
We would like to thank CESG's Vulnerability Research Group and National
Infrastructure Security Co-ordination Centre (NISCC) for reporting
several of these vulnerabilities to Cisco Systems.
We greatly appreciate the opportunity to work with researchers on
security vulnerabilities, and welcome the opportunity to review and
assist in product reports.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070105-csacs.shtml. The following example would be seen when running
Cisco Secure ACS software version 4.0(1) Build 27:
CiscoSecure ACS
ACS software version 4.0(1) Build 27:
Copyright information is seen underneath this information.
Products Confirmed Not Vulnerable
+--------------------------------
* Cisco Secure ACS for Unix (CSU).
* Cisco CNS Access Registrar (CAR).
* Cisco Secure ACS server for Windows version 4.1(X) or later.
* Cisco Secure ACS server solution Engine version 4.1(X) or later.
CSAdmin is the service that provides the web server for the ACS web
administration interface.
CSRadius is the service that communicates between the CSAuth module (the
authentication and authorization service) and the access device that is
requesting authentication and authorization services.
Specially Crafted HTTP GET Request Vulnerability:
+------------------------------------------------
This vulnerability is exploited by processing a specially crafted HTTP
GET request. Upon successful exploitation, the CSAdmin service may
crash. This vulnerability is also susceptible to a stack based overflow
condition which may allow arbitrary code execution if successfully
exploited.
If this vulnerability is successfully exploited, the CSAdmin service
will require a manual restart of the service. Normal Authentication,
Authorization and Accounting (AAA) processing will continue. With Cisco Secure
ACS for Windows you can start or stop CSAdmin from the Windows Control
Panel. Upon successful exploitation, the CSRadius
service may crash and an exception trap error will be generated for
the CSRadius service within the Windows Event Viewer System log. This
vulnerability is also susceptible to a stack based overflow condition
which may allow arbitrary code execution if successfully exploited.
This vulnerability is documented in Cisco Bug ID:
* CSCse18278 -- Stack based overflow within CSRadius when processing
Accounting-Request. These vulnerabilities will not allow arbitrary
code execution after successful exploitation. An exception trap error
will be recorded within the CSRadius log file and an error will be seen
for the CSRadius service within the Windows Event Viewer System log
after successful exploitation.
These vulnerabilities are documented in Cisco Bug IDs:
* CSCse18250 -- CSRadius Service crashes when processing a specially
crafted Access-Request packet. (CVE-2006-4097)
* CSCeg04788 -- CSRadius Service crashes when processing a specially
crafted Access-Request packet.
* CSCeg04666 -- CSRadius Service crashes when processing a specially
crafted Access-Request packet.
Vulnerability Scoring Details
=============================
Cisco is providing scores for the vulnerabilities in this advisory based
Con the ommon Vulnerability Scoring System (CVSS).
Cisco will provide a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of the
vulnerability in individual networks.
Cisco PSIRT will set the bias in all cases to normal. Customers
are encouraged to apply the bias parameter when determining the
environmental impact of a particular vulnerability.
CVSS is a standards based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided an FAQ to answer additional questions regarding CVSS at
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html.
Cisco has also provided a CVSS calculator to help compute
the environmental impact for individual networks at
http://intellishield.cisco.com/security/alertmanager/cvss.
Cisco Bug IDs:
CSCsd96293 - Stack based overflow within
CSAdmin when processing HTTP GET request
+---------------------------------------
CVSS Base Score - 10
Access Vector: Remote
Access Complexity: Low
Authentication: Not Required
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete
Impact Bias: Normal
CVSS Temporal Score - 8.3
Exploitability: Functional
Remediation Level: Official Fix
Report Confidence: Confirmed
CSCse18278 - Stack based overflow within
CSRadius when processing Accounting-Request
+------------------------------------------
CVSS Base Score - 6.0
Access Vector: Remote
Access Complexity: Low
Authentication: Required
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete
Impact Bias: Normal
CVSS Temporal Score - 5.0
Exploitability: Functional
Remediation Level: Official Fix
Report Confidence: Confirmed
CSCse18250 - CSRadius Service crashes when processing
a specially crafted Access-Request packet.
+----------------------------------------------------
CVSS Base Score - 3.3
Access Vector: Remote
Access Complexity: Low
Authentication: Not Required
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Complete
Impact Bias: Normal
CVSS Temporal Score - 2.7
Exploitability: Functional
Remediation Level: Official Fix
Report Confidence: Confirmed
CSCeg04788 - CSRadius Service crashes when processing
a specially crafted Access-Request packet.
+----------------------------------------------------
CVSS Base Score - 3.3
Access Vector: Remote
Access Complexity: Low
Authentication: Not Required
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Complete
Impact Bias: Normal
CVSS Temporal Score - 2.7
Exploitability: Functional
Remediation Level: Official Fix
Report Confidence: Confirmed
CSCeg04666 - CSRadius Service crashes when processing
a specially crafted Access-Request packet.
+----------------------------------------------------
CVSS Base Score - 3.3
Access Vector: Remote
Access Complexity: Low
Authentication: Not Required
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Complete
Impact Bias: Normal
CVSS Temporal Score - 2.7
Exploitability: Functional
Remediation Level: Official Fix
Report Confidence: Confirmed
Impact
======
Specially Crafted HTTP GET Request Vulnerability:
+------------------------------------------------
Successful exploitation may result in the web administrative interface
being unavailable until the CSAdmin Service is restarted from windows
control panel. Normal Authentication, Authorization and Accounting (AAA)
processing will continue. This vulnerability may allow arbitrary code
execution if successfully exploited.
Specially Crafted RADIUS Accounting-Request Vulnerability:
+---------------------------------------------------------
Successful exploitation may result in RADIUS Authentication,
Authorization and Accounting processing to not be performed until the
CSRadius service is restarted. TACACS+ Authentication, Authorization and
Accounting (AAA) processing will continue. Repeated exploitation could
result in a sustained Denial-of-Service (DoS) condition of the RADIUS
AAA services. This vulnerability may allow arbitrary code execution if
successfully exploited.
Specially Crafted RADIUS Access-Request Vulnerabilities:
+-------------------------------------------------------
Successful exploitation may result in RADIUS Authentication,
Authorization and Accounting processing to not be performed as the
CSRadius service restarts. TACACS+ Authentication, Authorization and
Accounting (AAA) processing will continue. Repeated exploitation could
result in a sustained Denial-of-Service (DoS) condition of the RADIUS
AAA services.
Software Version and Fixes
==========================
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to determine
exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center ("TAC") or your contracted
maintenance provider for assistance.
Each row of the software table (below) describes one of the
vulnerabilities described in this document. For each vulnerability
the earliest possible Release that contains the fix is listed in the
"Availability of First Fixed Release" column. A device running a release
that is earlier than the release in a specific column (less than the
First Fixed Release) is known to be vulnerable. The release should be
upgraded at least to the indicated release or a later version (greater
than or equal to the First Fixed Release label) or the appropriate patch
applied.
+-----------------------------------------------------------------------------+
| Vulnerability | Major Software | Availability of First Fixed |
| | Release | Releases * |
|--------------------------+------------------+-------------------------------|
| | 3.1(X) | Vulnerable; Contact TAC |
| |------------------+-------------------------------|
| | 3.2(X) | Vulnerable; Contact TAC |
| |------------------+-------------------------------|
| HTTP Vulnerability | 3.3(X) | 3.3(4) Build 12. |
| |------------------+-------------------------------|
| | 4.0(X) | Apply patch **. |
| |------------------+-------------------------------|
| | 4.1(X) | Are not vulnerable |
|--------------------------+------------------+-------------------------------|
| | 3.1(X) | Vulnerable; Contact TAC |
| |------------------+-------------------------------|
| | 3.2(X) | Vulnerable; Contact TAC |
| Accounting-Request |------------------+-------------------------------|
| Vulnerability | 3.3(X) | 3.3(4) Build 12. |
| |------------------+-------------------------------|
| | 4.0(X) | 4.0(1) Build 27. |
| |------------------+-------------------------------|
| | 4.1(X) | Are not vulnerable |
|--------------------------+------------------+-------------------------------|
| | 3.1(X) | Vulnerable; Contact TAC |
| |------------------+-------------------------------|
| | 3.2(X) | Vulnerable; Contact TAC |
| Access-Request |------------------+-------------------------------|
| Vulnerabilities | 3.3(X) | 3.3(3) Build 11. |
| |------------------+-------------------------------|
| | 4.0(X) | 4.0(1) Build 27. |
| |------------------+-------------------------------|
| | 4.1(X) | Are not vulnerable |
|-----------------------------------------------------------------------------|
| Notes: |
| |
| * 3.3(4) Build 12 is available by contacting Cisco TAC.
The effectiveness of any mitigation or fix is dependent on specific
customer situations such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied mitigation or fix
is the most appropriate for use in the intended network before it is
deployed.
Additional mitigations that can be deployed on Cisco
devices within the network are available in the Cisco
Applied Intelligence companion document for this advisory:
http://www.cisco.com/warp/public/707/cisco-air-20070105-csacs.shtml
* Infrastructure ACLs (iACL)
Apply access control lists (ACLs) on routers, switches and firewalls that
filter traffic to the ACS so that traffic is only allowed from stations
that need to remotely administer the box, or be authenticated, authorized,
or provide accounting data against/to the ACS server. Refer to
http://www.cisco.com/warp/public/707/iacl.html for examples on
infrastructure ACLs.
* Anti-Spoofing
To prevent spoofed IP packets with the source IP address set to that
of the Cisco Secure ACS administrative management station from reaching
the Cisco Secure ACS server, utilize anti-spoofing techniques. For more
information on utilizing ACLs for anti-spoofing, refer to
http://www.cisco.com/warp/public/707/21.pdf and
http://www.ietf.org/rfc/rfc2827.txt.
The Unicast Reverse Path Forwarding (Unicast RPF) feature helps to
mitigate problems that are caused by forged IP source addresses that
are passing through a router. Refer to
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_c/fothersf/scfrpf.htm
for more information.
Obtaining Fixed Software
========================
Cisco will make free software available to address this vulnerability
for affected customers. This advisory will be updated as fixed software
becomes available. Prior to deploying software, customers should consult
their maintenance provider or check the software for feature set
compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature
sets they have purchased. By installing, downloading, accessing
or otherwise using such software upgrades, customers agree to be
bound by the terms of Cisco's software license terms found at
http://www.cisco.com/public/sw-license-agreement.html , or as otherwise
set forth at Cisco.com Downloads at
http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Do not contact either "psirt@cisco.com" or "security-alert@cisco.com" for
software upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through their
regular update channels. For most customers, this means that upgrades
should be obtained through the Software Center on Cisco's worldwide
website at http://www.cisco.com.
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through prior
or existing agreement with third-party support organizations such as
Cisco Partners, authorized resellers, or service providers should
contact that support organization for guidance and assistance with the
appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or fix
is the most appropriate for use in the intended network before it is
deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but who do not hold a Cisco
service contract and customers who purchase through third-party vendors
but are unsuccessful at obtaining fixed software through their point
of sale should get their upgrades by contacting the Cisco Technical
Assistance Center (TAC). TAC contacts are as follows.
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Have your product serial number available and give the URL of this
notice as evidence of your entitlement to a free upgrade. Free upgrades
for non-contract customers must be requested through the TAC.
Refer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
for additional TAC contact information, including special localized
telephone numbers and instructions and e-mail addresses for use in
various languages.
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerability described in this advisory.
Several of these vulnerabilities were reported to Cisco by CESG's
Vulnerability Research Group and National Infrastructure Security
Co-ordination Centre (NISCC).
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY
ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that omits
the distribution URL in the following section is an uncontrolled copy,
and may lack important information or contain factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20070105-csacs.shtml
In addition to worldwide web posting, a text version of this notice is
clear-signed with the Cisco PSIRT PGP key and is posted to the following
e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-teams@first.org
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.grok.org.uk
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on mailing
lists or newsgroups. Users concerned about this problem are encouraged
to check the above URL for any updates.
Revision History
================
+---------------------------------------------------------+
| Revision 1.0 | 2007-January-05 | Initial public release |
+---------------------------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities
in Cisco products, obtaining assistance with security
incidents, and registering to receive security information
from Cisco, is available on Cisco's worldwide website at
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.
This includes instructions for press inquiries regarding Cisco security
notices. All Cisco security advisories are available at
http://www.cisco.com/go/psirt.
- -------------------------------------------------------------------------------
All contents are Copyright 1992-2007 Cisco Systems, Inc. All rights reserved.
- -------------------------------------------------------------------------------
Updated: Jan 05, 2007 Document ID: 77820
- -------------------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFFnttc8NUAbBmDaxQRAu2sAKCLWvE0/RoF2Oxk1pC6LCaiUFuzOwCfQJVj
Q2yeDW5/B49hRvkfrxDEKnY=
=A5Tw
-----END PGP SIGNATURE-----
.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070105-csacs.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor
VAR-200612-0484 | CVE-2006-4097 | Cisco Secure Access Control Server vulnerable to a stack-based buffer overflow via a specially crafted "HTTP GET" request |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Multiple unspecified vulnerabilities in the CSRadius service in Cisco Secure Access Control Server (ACS) for Windows before 4.1 and ACS Solution Engine before 4.1 allow remote attackers to cause a denial of service (crash) via a crafted RADIUS Access-Request packet. NOTE: it has been reported that at least one issue is a heap-based buffer overflow involving the Tunnel-Password attribute.
Versions prior to 4.1 are vulnerable to these issues.
Two of the vulnerabilities may permit arbitrary code execution after
exploitation of the specified vulnerability. This vulnerability is also susceptible to a stack overflow
condition. This vulnerability is also susceptible to a stack
overflow condition.
Cisco has made free software available to address this issue for affected
customers.
We would like to thank CESG's Vulnerability Research Group and National
Infrastructure Security Co-ordination Centre (NISCC) for reporting
several of these vulnerabilities to Cisco Systems.
We greatly appreciate the opportunity to work with researchers on
security vulnerabilities, and welcome the opportunity to review and
assist in product reports.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070105-csacs.shtml. The following example would be seen when running
Cisco Secure ACS software version 4.0(1) Build 27:
CiscoSecure ACS
ACS software version 4.0(1) Build 27:
Copyright information is seen underneath this information.
Products Confirmed Not Vulnerable
+--------------------------------
* Cisco Secure ACS for Unix (CSU).
* Cisco CNS Access Registrar (CAR).
* Cisco Secure ACS server for Windows version 4.1(X) or later.
* Cisco Secure ACS server solution Engine version 4.1(X) or later.
CSAdmin is the service that provides the web server for the ACS web
administration interface.
CSRadius is the service that communicates between the CSAuth module (the
authentication and authorization service) and the access device that is
requesting authentication and authorization services.
Specially Crafted HTTP GET Request Vulnerability:
+------------------------------------------------
This vulnerability is exploited by processing a specially crafted HTTP
GET request. Upon successful exploitation, the CSAdmin service may
crash. This vulnerability is also susceptible to a stack based overflow
condition which may allow arbitrary code execution if successfully
exploited.
If this vulnerability is successfully exploited, the CSAdmin service
will require a manual restart of the service. Normal Authentication,
Authorization and Accounting (AAA) processing will continue. With Cisco Secure
ACS for Windows you can start or stop CSAdmin from the Windows Control
Panel. Upon successful exploitation, the CSRadius
service may crash and an exception trap error will be generated for
the CSRadius service within the Windows Event Viewer System log. This
vulnerability is also susceptible to a stack based overflow condition
which may allow arbitrary code execution if successfully exploited.
This vulnerability is documented in Cisco Bug ID:
* CSCse18278 -- Stack based overflow within CSRadius when processing
Accounting-Request. These vulnerabilities will not allow arbitrary
code execution after successful exploitation. An exception trap error
will be recorded within the CSRadius log file and an error will be seen
for the CSRadius service within the Windows Event Viewer System log
after successful exploitation.
These vulnerabilities are documented in Cisco Bug IDs:
* CSCse18250 -- CSRadius Service crashes when processing a specially
crafted Access-Request packet. (CVE-2006-4097)
* CSCeg04788 -- CSRadius Service crashes when processing a specially
crafted Access-Request packet.
* CSCeg04666 -- CSRadius Service crashes when processing a specially
crafted Access-Request packet.
Vulnerability Scoring Details
=============================
Cisco is providing scores for the vulnerabilities in this advisory based
Con the ommon Vulnerability Scoring System (CVSS).
Cisco will provide a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of the
vulnerability in individual networks.
Cisco PSIRT will set the bias in all cases to normal. Customers
are encouraged to apply the bias parameter when determining the
environmental impact of a particular vulnerability.
CVSS is a standards based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided an FAQ to answer additional questions regarding CVSS at
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html.
Cisco has also provided a CVSS calculator to help compute
the environmental impact for individual networks at
http://intellishield.cisco.com/security/alertmanager/cvss.
Cisco Bug IDs:
CSCsd96293 - Stack based overflow within
CSAdmin when processing HTTP GET request
+---------------------------------------
CVSS Base Score - 10
Access Vector: Remote
Access Complexity: Low
Authentication: Not Required
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete
Impact Bias: Normal
CVSS Temporal Score - 8.3
Exploitability: Functional
Remediation Level: Official Fix
Report Confidence: Confirmed
CSCse18278 - Stack based overflow within
CSRadius when processing Accounting-Request
+------------------------------------------
CVSS Base Score - 6.0
Access Vector: Remote
Access Complexity: Low
Authentication: Required
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete
Impact Bias: Normal
CVSS Temporal Score - 5.0
Exploitability: Functional
Remediation Level: Official Fix
Report Confidence: Confirmed
CSCse18250 - CSRadius Service crashes when processing
a specially crafted Access-Request packet.
+----------------------------------------------------
CVSS Base Score - 3.3
Access Vector: Remote
Access Complexity: Low
Authentication: Not Required
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Complete
Impact Bias: Normal
CVSS Temporal Score - 2.7
Exploitability: Functional
Remediation Level: Official Fix
Report Confidence: Confirmed
CSCeg04788 - CSRadius Service crashes when processing
a specially crafted Access-Request packet.
+----------------------------------------------------
CVSS Base Score - 3.3
Access Vector: Remote
Access Complexity: Low
Authentication: Not Required
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Complete
Impact Bias: Normal
CVSS Temporal Score - 2.7
Exploitability: Functional
Remediation Level: Official Fix
Report Confidence: Confirmed
CSCeg04666 - CSRadius Service crashes when processing
a specially crafted Access-Request packet.
+----------------------------------------------------
CVSS Base Score - 3.3
Access Vector: Remote
Access Complexity: Low
Authentication: Not Required
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Complete
Impact Bias: Normal
CVSS Temporal Score - 2.7
Exploitability: Functional
Remediation Level: Official Fix
Report Confidence: Confirmed
Impact
======
Specially Crafted HTTP GET Request Vulnerability:
+------------------------------------------------
Successful exploitation may result in the web administrative interface
being unavailable until the CSAdmin Service is restarted from windows
control panel. Normal Authentication, Authorization and Accounting (AAA)
processing will continue. This vulnerability may allow arbitrary code
execution if successfully exploited. TACACS+ Authentication, Authorization and
Accounting (AAA) processing will continue. Repeated exploitation could
result in a sustained Denial-of-Service (DoS) condition of the RADIUS
AAA services. This vulnerability may allow arbitrary code execution if
successfully exploited.
Specially Crafted RADIUS Access-Request Vulnerabilities:
+-------------------------------------------------------
Successful exploitation may result in RADIUS Authentication,
Authorization and Accounting processing to not be performed as the
CSRadius service restarts. TACACS+ Authentication, Authorization and
Accounting (AAA) processing will continue. Repeated exploitation could
result in a sustained Denial-of-Service (DoS) condition of the RADIUS
AAA services.
Software Version and Fixes
==========================
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to determine
exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center ("TAC") or your contracted
maintenance provider for assistance.
Each row of the software table (below) describes one of the
vulnerabilities described in this document. For each vulnerability
the earliest possible Release that contains the fix is listed in the
"Availability of First Fixed Release" column. A device running a release
that is earlier than the release in a specific column (less than the
First Fixed Release) is known to be vulnerable. The release should be
upgraded at least to the indicated release or a later version (greater
than or equal to the First Fixed Release label) or the appropriate patch
applied.
+-----------------------------------------------------------------------------+
| Vulnerability | Major Software | Availability of First Fixed |
| | Release | Releases * |
|--------------------------+------------------+-------------------------------|
| | 3.1(X) | Vulnerable; Contact TAC |
| |------------------+-------------------------------|
| | 3.2(X) | Vulnerable; Contact TAC |
| |------------------+-------------------------------|
| HTTP Vulnerability | 3.3(X) | 3.3(4) Build 12. |
| |------------------+-------------------------------|
| | 4.0(X) | Apply patch **. |
| |------------------+-------------------------------|
| | 4.1(X) | Are not vulnerable |
|--------------------------+------------------+-------------------------------|
| | 3.1(X) | Vulnerable; Contact TAC |
| |------------------+-------------------------------|
| | 3.2(X) | Vulnerable; Contact TAC |
| Accounting-Request |------------------+-------------------------------|
| Vulnerability | 3.3(X) | 3.3(4) Build 12. |
| |------------------+-------------------------------|
| | 4.0(X) | 4.0(1) Build 27. |
| |------------------+-------------------------------|
| | 4.1(X) | Are not vulnerable |
|--------------------------+------------------+-------------------------------|
| | 3.1(X) | Vulnerable; Contact TAC |
| |------------------+-------------------------------|
| | 3.2(X) | Vulnerable; Contact TAC |
| Access-Request |------------------+-------------------------------|
| Vulnerabilities | 3.3(X) | 3.3(3) Build 11. |
| |------------------+-------------------------------|
| | 4.0(X) | 4.0(1) Build 27. |
| |------------------+-------------------------------|
| | 4.1(X) | Are not vulnerable |
|-----------------------------------------------------------------------------|
| Notes: |
| |
| * 3.3(4) Build 12 is available by contacting Cisco TAC.
The effectiveness of any mitigation or fix is dependent on specific
customer situations such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied mitigation or fix
is the most appropriate for use in the intended network before it is
deployed.
Additional mitigations that can be deployed on Cisco
devices within the network are available in the Cisco
Applied Intelligence companion document for this advisory:
http://www.cisco.com/warp/public/707/cisco-air-20070105-csacs.shtml
* Infrastructure ACLs (iACL)
Apply access control lists (ACLs) on routers, switches and firewalls that
filter traffic to the ACS so that traffic is only allowed from stations
that need to remotely administer the box, or be authenticated, authorized,
or provide accounting data against/to the ACS server. Refer to
http://www.cisco.com/warp/public/707/iacl.html for examples on
infrastructure ACLs.
* Anti-Spoofing
To prevent spoofed IP packets with the source IP address set to that
of the Cisco Secure ACS administrative management station from reaching
the Cisco Secure ACS server, utilize anti-spoofing techniques. For more
information on utilizing ACLs for anti-spoofing, refer to
http://www.cisco.com/warp/public/707/21.pdf and
http://www.ietf.org/rfc/rfc2827.txt.
The Unicast Reverse Path Forwarding (Unicast RPF) feature helps to
mitigate problems that are caused by forged IP source addresses that
are passing through a router. Refer to
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_c/fothersf/scfrpf.htm
for more information.
Obtaining Fixed Software
========================
Cisco will make free software available to address this vulnerability
for affected customers. This advisory will be updated as fixed software
becomes available. Prior to deploying software, customers should consult
their maintenance provider or check the software for feature set
compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature
sets they have purchased. By installing, downloading, accessing
or otherwise using such software upgrades, customers agree to be
bound by the terms of Cisco's software license terms found at
http://www.cisco.com/public/sw-license-agreement.html , or as otherwise
set forth at Cisco.com Downloads at
http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Do not contact either "psirt@cisco.com" or "security-alert@cisco.com" for
software upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through their
regular update channels. For most customers, this means that upgrades
should be obtained through the Software Center on Cisco's worldwide
website at http://www.cisco.com.
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through prior
or existing agreement with third-party support organizations such as
Cisco Partners, authorized resellers, or service providers should
contact that support organization for guidance and assistance with the
appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or fix
is the most appropriate for use in the intended network before it is
deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but who do not hold a Cisco
service contract and customers who purchase through third-party vendors
but are unsuccessful at obtaining fixed software through their point
of sale should get their upgrades by contacting the Cisco Technical
Assistance Center (TAC). TAC contacts are as follows.
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Have your product serial number available and give the URL of this
notice as evidence of your entitlement to a free upgrade. Free upgrades
for non-contract customers must be requested through the TAC.
Refer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
for additional TAC contact information, including special localized
telephone numbers and instructions and e-mail addresses for use in
various languages.
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerability described in this advisory.
Several of these vulnerabilities were reported to Cisco by CESG's
Vulnerability Research Group and National Infrastructure Security
Co-ordination Centre (NISCC).
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY
ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that omits
the distribution URL in the following section is an uncontrolled copy,
and may lack important information or contain factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20070105-csacs.shtml
In addition to worldwide web posting, a text version of this notice is
clear-signed with the Cisco PSIRT PGP key and is posted to the following
e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-teams@first.org
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.grok.org.uk
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on mailing
lists or newsgroups. Users concerned about this problem are encouraged
to check the above URL for any updates.
Revision History
================
+---------------------------------------------------------+
| Revision 1.0 | 2007-January-05 | Initial public release |
+---------------------------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities
in Cisco products, obtaining assistance with security
incidents, and registering to receive security information
from Cisco, is available on Cisco's worldwide website at
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.
This includes instructions for press inquiries regarding Cisco security
notices. All Cisco security advisories are available at
http://www.cisco.com/go/psirt.
- -------------------------------------------------------------------------------
All contents are Copyright 1992-2007 Cisco Systems, Inc. All rights reserved.
- -------------------------------------------------------------------------------
Updated: Jan 05, 2007 Document ID: 77820
- -------------------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFFnttc8NUAbBmDaxQRAu2sAKCLWvE0/RoF2Oxk1pC6LCaiUFuzOwCfQJVj
Q2yeDW5/B49hRvkfrxDEKnY=
=A5Tw
-----END PGP SIGNATURE-----
.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070105-csacs.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor
VAR-200612-0320 | CVE-2006-6906 | Apple Mac OS Run on Bluetooth Unspecified vulnerability in stack |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the Bluetooth stack on Mac OS 10.4.7 and earlier has unknown impact and local attack vectors, related to "Mach Exception Handling", a different issue than CVE-2006-6900. The problem is CVE-2006-6900 It is a different problem.Details of the impact of this vulnerability are unknown. Mac OS X is prone to a local security vulnerability
VAR-200612-0314 | CVE-2006-6900 | Apple Mac OS of Bluetooth Unspecified vulnerability in stack |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the Bluetooth stack in Apple Mac OS 10.4 has unknown impact and attack vectors, related to an "implementation bug.". Mac OS X is prone to a remote security vulnerability
VAR-200612-0416 | CVE-2006-6718 | Allied Telesis AT-9000/24 Ethernet Vulnerability to execute unauthorized actions on the switch |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The Allied Telesis AT-9000/24 Ethernet switch has a default password for its admin account, "manager," which allows remote attackers to perform unauthorized actions. AT-9000/24 is prone to a cross-site request forgery vulnerability
VAR-200612-0411 | CVE-2006-6713 | Hitachi Directory Server LDAP Request Multiple Security Vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Buffer overflow in Hitachi Directory Server 2 P-2444-A124 before 02-11-/K on Windows, and P-1B44-A121 before 02-10-/V on HP-UX, allows remote attackers to execute arbitrary code via crafted LDAP requests. Hitachi Directory Server is a directory server launched by Hitachi.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
Hitachi Directory Server LDAP Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA23421
VERIFY ADVISORY:
http://secunia.com/advisories/23421/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From local network
SOFTWARE:
Hitachi Directory Server 2.x
http://secunia.com/product/4505/
DESCRIPTION:
Some vulnerabilities have been reported in Hitachi Directory Server,
which can be exploited by malicious people to cause a DoS (Denial of
Service) or compromise a vulnerable system.
The vulnerabilities are reported in version 2. Prior versions may
also be affected.
SOLUTION:
Update to version 02-11-/K (Windows) or 02-10-/V (HP-UX).
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.hitachi-support.com/security_e/vuls_e/HS06-018_e/index-e.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200612-0786 | No CVE | Dream FTP Server PORT Command Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Dream FTP Server is a multi-threaded ftp server. Dream FTP Server has a vulnerability in handling user requests, and a remote attacker could exploit this vulnerability to perform a denial of service attack on the server. A remote attacker can cause a denial of service by sending a PORT command with an invalid parameter to the Dream FTP Server.
Exploiting this issue allows remote attackers to crash the application, denying further service to legitimate users. It is not known at this time if this issue can be exploited to execute arbitrary code; this BID will be updated as further information becomes available.
This issue affects version 1.0.2; other versions may also be vulnerable
VAR-200612-0030 | CVE-2006-6674 | Ozeki HTTP-SMS Gateway Password Information Disclosure Vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Ozeki HTTP-SMS Gateway 1.0, and possibly earlier, stores usernames and passwords in plaintext in the HKLM\Software\Ozeki\SMSServer\CurrentVersion\Plugins\httpsmsgate registry key, which allows local users to obtain sensitive information.
A local attacker can exploit this issue to access sensitive information. This may lead to other attacks.
This issue affects version 1.0; other versions may also be affected.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
The problem is that usernames and passwords are stored in cleartext
in the registry under
"HKEY_LOCAL_MACHINE\Software\Ozeki\SMSServer\CurrentVersion\Plugins\httpsmsgate",
which is readable by all user accounts on the system.
SOLUTION:
Set the proper permissions on the "Ozeki" registry key.
PROVIDED AND/OR DISCOVERED BY:
basher13
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200612-0799 | No CVE | HP Printer FTP Print Server List Command Buffer Overflow Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
-HP Printers running FTP Print Server are prone to a buffer-overflow vulnerability. This issue occurs because the application fails to boundscheck user-supplied data before copying it into an insufficiently sized buffer.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial of service.
VAR-200612-0014 | CVE-2006-5681 | Apple Mac OS X Quicktime For Java Information Disclosure Vulnerability |
CVSS V2: 2.6 CVSS V3: - Severity: LOW |
QuickTime for Java on Mac OS X 10.4 through 10.4.8, when used with Quartz Composer, allows remote attackers to obtain sensitive information (screen images) via a Java applet that accesses images that are being rendered by other embedded QuickTime objects. Apple Mac OS X is prone to an information-disclosure vulnerability.
Attackers may exploit this issue by convincing victims into visiting a malicious website. If this tool is used in conjunction with Quartz Composer, it is possible to capture graphics containing local information.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
Apple Mac OS X Quicktime/Quartz Composer Information Disclosure
SECUNIA ADVISORY ID:
SA23438
VERIFY ADVISORY:
http://secunia.com/advisories/23438/
CRITICAL:
Less critical
IMPACT:
Exposure of sensitive information
WHERE:
>From remote
OPERATING SYSTEM:
Apple Macintosh OS X
http://secunia.com/product/96/
DESCRIPTION:
A vulnerability has been reported in Mac OS X, which can be exploited
by malicious people to gain knowledge of sensitive information.
SOLUTION:
Apply Security Update 2006-008.
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Geoff Beier.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=304916
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200612-0135 | CVE-2006-6651 | Intel 2200BG Wireless driver W29N51.SYS Vulnerable to arbitrary code execution |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Race condition in W29N51.SYS in the Intel 2200BG wireless driver 9.0.3.9 allows remote attackers to cause memory corruption and execute arbitrary code via a series of crafted beacon frames. NOTE: some details are obtained solely from third party information. Intel 2200BG driver is prone to a remote code-execution vulnerability due to a race condition. Failed exploit attempts will likely cause denial-of-service conditions. Intel 2200BG is a mini PCI wireless network card used in notebooks. code.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
Intel 2200BG W29N51.SYS Driver Beacon Frame Race Condition
SECUNIA ADVISORY ID:
SA23338
VERIFY ADVISORY:
http://secunia.com/advisories/23338/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
Intel Wireless LAN Driver 9.x
http://secunia.com/product/12914/
DESCRIPTION:
Berno Silva has reported a vulnerability in Intel 2200BG drivers,
which potentially can be exploited by malicious people to compromise
a vulnerable system. This can be exploited to overwrite
certain kernel memory structures via sending multiple specially
crafted beacon frames to the wireless card.
The vulnerability is reported in version 9.0.3.9. Other versions may
also be affected.
SOLUTION:
Turn off the wireless card when not in use.
PROVIDED AND/OR DISCOVERED BY:
Berno Silva, Open Communications Security
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200612-0415 | CVE-2006-6717 | Allied Telesis AT-9000/24 Ethernet Vulnerability in an attack from an unexpected location on the switch |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The Allied Telesis AT-9000/24 Ethernet switch accepts management packets from arbitrary VLANs, contrary to the documentation, which allows remote attackers to conduct attacks against the switch from unexpected locations. Allied Telesis AT-9000/24 switches are prone to an unauthorized-management-VLAN-access vulnerability.
Exploiting this issue allows attackers with access to any port on affected switches to access the management VLAN. This may aid them in further attacks. Allied Telesis AT-9000/24 is a 24-port Gigabit switch made by Allied Telesis in the United States. Allied Telesis AT-9000/24 has loopholes in the managed access control, and attackers may gain unauthorized access to the device. Under normal circumstances, the remote management (SNMP, TELNET, HTTP) of the switch should only be performed through the management VLAN. The only management VLAN option for the AT-9000/24 is Default VLAN. However, if the switch is configured to contain multiple VLANs instead of just the Default VLAN, it can be managed from all of these VLANs.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
Simple Web Content Management System "id" SQL Injection
SECUNIA ADVISORY ID:
SA23590
VERIFY ADVISORY:
http://secunia.com/advisories/23590/
CRITICAL:
Moderately critical
IMPACT:
Manipulation of data, Exposure of system information, Exposure of
sensitive information
WHERE:
>From remote
SOFTWARE:
Simple Web Content Management System
http://secunia.com/product/13142/
DESCRIPTION:
DarkFig has discovered a vulnerability in Simple Web Content
Management System, which can be exploited by malicious people to
conduct SQL injection attacks.
Input passed to the "id" parameter in page.php is not properly
sanitised before being used in SQL queries. This can be exploited to
manipulate SQL queries by injecting arbitrary SQL code.
Successful exploitation allows retrieval of arbitrary files from the
database server.
SOLUTION:
Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY:
DarkFig
ORIGINAL ADVISORY:
http://acid-root.new.fr/poc/18070102.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200612-0204 | CVE-2006-6618 | AntiHook - Desktop Vulnerabilities that prevent process product control on process |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. (1) PEB Inside ImagePathName (2) PEB Inside CommandLine (3) PEB Inside WindowTitle field. Multiple vendor firewalls and HIPS (host-based intrusion prevention systems) are prone to a process-spoofing vulnerability.
An attacker can exploit this issue to have an arbitrary malicious program appear to run as a trusted process and function undetected on an affected victim's computer.
The following software is vulnerable; other versions may also be affected:
InfoProcess AntiHook version 3.0.0.23
AVG Anti-Virus plus Firewall version 7.5.431
Comodo Personal Firewall version 2.3.6.81
Filseclab Personal Firewall version 3.0.0.8686
Look 'n' Stop Personal Firewall version 2.05p2
Symantec Sygate Personal Firewall version 5.6.2808. are all very popular firewalls. There are loopholes in the processing of user-mode process information in multiple host security software, and attackers may use this loophole to bypass security restrictions. Personal firewalls, HIPS, and similar security software that enforce security on a per-process basis must be able to identify processes attempting to perform privileged operations. A remote attacker can use the spoofed process to bypass the control of the security check. Including (1) the image directory name, (2) the command line, and (3) the WINDOWS header text in the PEB
VAR-200612-0208 | CVE-2006-6622 | Soft4Ever LnS Vulnerability that bypasses ongoing product control |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Soft4Ever Look 'n' Stop (LnS) 2.05p2 before 20061215 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. Multiple vendor firewalls and HIPS (host-based intrusion prevention systems) are prone to a process-spoofing vulnerability.
An attacker can exploit this issue to have an arbitrary malicious program appear to run as a trusted process and function undetected on an affected victim's computer.
The following software is vulnerable; other versions may also be affected:
InfoProcess AntiHook version 3.0.0.23
AVG Anti-Virus plus Firewall version 7.5.431
Comodo Personal Firewall version 2.3.6.81
Filseclab Personal Firewall version 3.0.0.8686
Look 'n' Stop Personal Firewall version 2.05p2
Symantec Sygate Personal Firewall version 5.6.2808. are all very popular firewalls. There are loopholes in the processing of user-mode process information in multiple host security software, and attackers may use this loophole to bypass security restrictions. Personal firewalls, HIPS, and similar security software that enforce security on a per-process basis must be able to identify processes attempting to perform privileged operations. Controls that allow remote attackers to bypass security checks by spoofing the process. Including (1) the image directory name, (2) the command line, and (3) the WINDOWS header text in the PEB
VAR-200612-0209 | CVE-2006-6623 | Sygate Personal Firewall Vulnerability that bypasses ongoing product control |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Sygate Personal Firewall 5.6.2808 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. Multiple vendor firewalls and HIPS (host-based intrusion prevention systems) are prone to a process-spoofing vulnerability.
An attacker can exploit this issue to have an arbitrary malicious program appear to run as a trusted process and function undetected on an affected victim's computer.
The following software is vulnerable; other versions may also be affected:
InfoProcess AntiHook version 3.0.0.23
AVG Anti-Virus plus Firewall version 7.5.431
Comodo Personal Firewall version 2.3.6.81
Filseclab Personal Firewall version 3.0.0.8686
Look 'n' Stop Personal Firewall version 2.05p2
Symantec Sygate Personal Firewall version 5.6.2808. are all very popular firewalls. There are loopholes in the processing of user-mode process information in multiple host security software, and attackers may use this loophole to bypass security restrictions. Personal firewalls, HIPS, and similar security software that enforce security on a per-process basis must be able to identify processes attempting to perform privileged operations. Remote attackers can use spoofed processes to bypass the control of security checks. Including (1) image directory name, (2) command line, and (3) WINDOWS header text in PEB
VAR-200612-0207 | CVE-2006-6621 | Filseclab Personal Firewall Vulnerability that bypasses ongoing product control |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Filseclab Personal Firewall 3.0.0.8686 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. Multiple vendor firewalls and HIPS (host-based intrusion prevention systems) are prone to a process-spoofing vulnerability.
An attacker can exploit this issue to have an arbitrary malicious program appear to run as a trusted process and function undetected on an affected victim's computer.
The following software is vulnerable; other versions may also be affected:
InfoProcess AntiHook version 3.0.0.23
AVG Anti-Virus plus Firewall version 7.5.431
Comodo Personal Firewall version 2.3.6.81
Filseclab Personal Firewall version 3.0.0.8686
Look 'n' Stop Personal Firewall version 2.05p2
Symantec Sygate Personal Firewall version 5.6.2808. are all very popular firewalls. There are loopholes in the processing of user-mode process information in multiple host security software, and attackers may use this loophole to bypass security restrictions. Personal firewalls, HIPS, and similar security software that enforce security on a per-process basis must be able to identify processes attempting to perform privileged operations. Remote attackers can use spoofed processes to bypass the control of security checks. Including (1) image directory name, (2) command line, and (3) WINDOWS header text in PEB
VAR-200612-0206 | CVE-2006-6620 | Comodo Personal Firewall Vulnerabilities that prevent process product control on process |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Comodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. (1) PEB Inside ImagePathName (2) PEB Inside CommandLine (3) PEB Inside WindowTitle field. Multiple vendor firewalls and HIPS (host-based intrusion prevention systems) are prone to a process-spoofing vulnerability.
An attacker can exploit this issue to have an arbitrary malicious program appear to run as a trusted process and function undetected on an affected victim's computer.
The following software is vulnerable; other versions may also be affected:
InfoProcess AntiHook version 3.0.0.23
AVG Anti-Virus plus Firewall version 7.5.431
Comodo Personal Firewall version 2.3.6.81
Filseclab Personal Firewall version 3.0.0.8686
Look 'n' Stop Personal Firewall version 2.05p2
Symantec Sygate Personal Firewall version 5.6.2808. are all very popular firewalls. There are loopholes in the processing of user-mode process information in multiple host security software, and attackers may use this loophole to bypass security restrictions. Personal firewalls, HIPS, and similar security software that enforce security on a per-process basis must be able to identify processes attempting to perform privileged operations. Remote attackers can use spoofed processes to bypass the control of security checks. Including (1) image directory name, (2) command line, and (3) WINDOWS header text in PEB
VAR-200612-0205 | CVE-2006-6619 | AVG Anti-Virus plus Firewall Vulnerabilities that prevent process product control on process |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. (1) PEB Inside ImagePathName (2) PEB Inside CommandLine (3) PEB Inside WindowTitle field. Multiple vendor firewalls and HIPS (host-based intrusion prevention systems) are prone to a process-spoofing vulnerability.
An attacker can exploit this issue to have an arbitrary malicious program appear to run as a trusted process and function undetected on an affected victim's computer.
The following software is vulnerable; other versions may also be affected:
InfoProcess AntiHook version 3.0.0.23
AVG Anti-Virus plus Firewall version 7.5.431
Comodo Personal Firewall version 2.3.6.81
Filseclab Personal Firewall version 3.0.0.8686
Look 'n' Stop Personal Firewall version 2.05p2
Symantec Sygate Personal Firewall version 5.6.2808. are all very popular firewalls. There are loopholes in the processing of user-mode process information in multiple host security software, and attackers may use this loophole to bypass security restrictions. Personal firewalls, HIPS, and similar security software that enforce security on a per-process basis must be able to identify processes attempting to perform privileged operations. A remote attacker can use the spoofed process to bypass the control of the security check. Including (1) the image directory name, (2) the command line, and (3) the WINDOWS header text in the PEB