VARIoT IoT vulnerabilities database

VAR-200605-0399 | CVE-2006-2630 | Symantec products vulnerable to buffer overflow |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Stack-based buffer overflow in Symantec Antivirus 10.1 and Client Security 3.1 allows remote attackers to execute arbitrary code via unknown attack vectors. Symantec products are vulnerable to a stack-based buffer overflow.
Symantec AntiVirus Corporate Edition 10.1 and Symantec Client Security 3.1 are currently known to be vulnerable to this issue. All supported platforms are affected including Microsoft Windows and Novell Netware. Symantec AntiVirus is a very popular antivirus solution. The remote management protocol used by the affected products for communication is a proprietary message-based protocol with two levels of encapsulation. The outer layer consists of message headers, which may be message type 10, which means requesting Rtvscan.exe, or type 20 or 30, which means forwarding SSL negotiation. If SSL is created for a TCP connection, subsequent communication is encrypted, although there is still plaintext in the private format. The data of the type 10 message contains its own header and message body, both of which are processed by Rtvscan.exe. There is a command field in this header, which specifies the operation to be performed and the format of the message body data. COM_FORWARD_LOG (0x24) The command handler does not use strncat correctly, allowing to overwrite the 0x180 byte stack buffer with arbitrary data. If the first string in the COM_FORWARD_LOG request contains a backslash, one of two strncat calls is performed: * If the string contains commas but no double quotes: strncat(dest, src, 0x17A - strlen(src )); * Otherwise: strncat(dest, src, 0x17C - strlen(src)); If the length of the source string exceeds 0x17A or 0x17C characters respectively, the arithmetic will underflow, resulting in a large memory copy size. This might allow appending this source string to the buffer, overwriting the stack with 64KB of data (null characters excluded). Rtvscan.exe is compiled with the Visual Studio /GS security option and includes stack canary checks. But an attacker can bypass this security measure by overriding and controlling the exception handler registration.
SOLUTION:
Apply patches (see patch matrix in vendor advisory).
PROVIDED AND/OR DISCOVERED BY:
eEye Digital Security
ORIGINAL ADVISORY:
Symantec:
http://securityresponse.symantec.com/avcenter/security/Content/2006.05.25.html
eEye Digital Security:
http://www.eeye.com/html/research/upcoming/20060524.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0267 | CVE-2006-2561 | Edimax BR-6104K Router UPnP Request Access Control Bypass Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Edimax BR-6104K router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter (possibly within NewInternalClient), which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic. For example, use AddPortMapping to forward arbitrary traffic. Br 6104K is prone to a security bypass vulnerability.
TITLE:
Edimax BR-6104K UPnP Shell Command Injection Vulnerability
SECUNIA ADVISORY ID:
SA20169
VERIFY ADVISORY:
http://secunia.com/advisories/20169/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From local network
OPERATING SYSTEM:
EDIMAX BR-6104K Broadband Router
http://secunia.com/product/10080/
DESCRIPTION:
Armijn Hemel has reported a vulnerability in Edimax BR-6104K, which
can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable device.
The vulnerability is caused due to missing authentication of UPnP
AddPortMapping requests and missing validation of the
NewInternalClient parameter of the request. This can be exploited by
hosts on the local network to execute shell commands e.g.
"/sbin/reboot" on the device via specially crafted UPnP
AddPortMapping requests containing shell commands in the
NewInternalClient parameter.
SOLUTION:
Disable the UPnP functionality if it is not required.
UPnP is reportedly disabled by default.
PROVIDED AND/OR DISCOVERED BY:
Armijn Hemel
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0265 | CVE-2006-2559 | Linksys WRT54G Wireless-G Broadband Router UPnP Request Access Control Bypass Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Linksys WRT54G Wireless-G Broadband Router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic. For example, use AddPortMapping to forward arbitrary traffic. WRT54G v4.0 is prone to a security bypass vulnerability.
TITLE:
Linksys WRT54G UPnP Port Mapping Vulnerability
SECUNIA ADVISORY ID:
SA20161
VERIFY ADVISORY:
http://secunia.com/advisories/20161/
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
>From local network
OPERATING SYSTEM:
Linksys WRT54G Wireless-G Broadband Router
http://secunia.com/product/3523/
DESCRIPTION:
Armijn Hemel has reported a vulnerability in Linksys WRT54G, which
can be exploited by malicious people to bypass certain security
restrictions.
The vulnerability is caused due to missing authentication of UPnP
AddPortMapping requests and missing validation of the InternalClient
parameter of the request. This can be exploited by hosts on the local
network to configure port forwarding settings on the device to forward
incoming traffic to arbitrary hosts without requiring authentication.
Successful exploitation may allow the device to be configured to
forward traffic that is received on specific ports on the external
interface to another host on the Internet.
SOLUTION:
Update to firmware version 1.00.9.
http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109974&packedargs=sku%3D1127782957298&pagename=Linksys%2FCommon%2FVisitorWrapper
PROVIDED AND/OR DISCOVERED BY:
Armijn Hemel
ORIGINAL ADVISORY:
http://www.securityview.org/how-does-the-upnp-flaw-works.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0266 | CVE-2006-2560 | Sitecom WL-153 Router Firmware UPnP Request Access Control Bypass Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Sitecom WL-153 router firmware before 1.38 allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic. For example, use AddPortMapping to forward arbitrary traffic. Wl-153 is prone to a security bypass vulnerability.
TITLE:
Sitecom WL-153 UPnP Shell Command Injection Vulnerability
SECUNIA ADVISORY ID:
SA20183
VERIFY ADVISORY:
http://secunia.com/advisories/20183/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From local network
OPERATING SYSTEM:
Sitecom WL-153 MIMO XR Wireless Network Broadband Router
http://secunia.com/product/10081/
DESCRIPTION:
Armijn Hemel has reported a vulnerability in Sitecom WL-153, which
can be exploited by malicious people to cause a DoS (Denial of
Service) and potentially compromise a vulnerable device.
The vulnerability is related to:
SA20169
The vulnerability has been reported in firmware versions prior to
1.38.
SOLUTION:
Disable the UPnP functionality if it is not required.
The vendor reportedly will release an updated firmware soon.
PROVIDED AND/OR DISCOVERED BY:
Armijn Hemel
OTHER REFERENCES:
SA20169:
http://secunia.com/advisories/20169/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0268 | CVE-2006-2562 | ZyXEL P-335WT Router UPnP Request Access Control Bypass Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
ZyXEL P-335WT router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter, which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic. For example, use AddPortMapping to forward arbitrary traffic. P-335Wt Router is prone to a security bypass vulnerability.
TITLE:
ZyXEL P-335WT UPnP Port Mapping Vulnerability
SECUNIA ADVISORY ID:
SA20184
VERIFY ADVISORY:
http://secunia.com/advisories/20184/
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
>From local network
OPERATING SYSTEM:
ZyXEL P-335WT
http://secunia.com/product/10055/
DESCRIPTION:
Armijn Hemel has reported a vulnerability in ZyXEL P-335WT, which can
be exploited by malicious people to bypass certain security
restrictions.
The vulnerability is related to:
SA20161
SOLUTION:
Disable the UPnP functionality if it is not required.
UPnP is reportedly disabled by default.
PROVIDED AND/OR DISCOVERED BY:
Armijn Hemel
OTHER REFERENCES:
SA20161:
http://secunia.com/advisories/20161/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0197 | CVE-2006-1466 | Apple Xcode Tools WebObjects Permissions and Access Control Vulnerability |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
Xcode Tools before 2.3 for Mac OS X 10.4, when running the WebObjects plugin, allows remote attackers to access or modify WebObjects projects through a network service. Xcode Tools is prone to an unauthorized remote access vulnerability through the WebObjects plug-in.
A remote attacker can exploit this issue to manipulate projects through the network service.
This issue affects only those systems with the Xcode Tools WebObjects plug-in installed.
TITLE:
Apple Xcode WebObjects Plugin Access Control Vulnerability
SECUNIA ADVISORY ID:
SA20267
VERIFY ADVISORY:
http://secunia.com/advisories/20267/
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
>From local network
SOFTWARE:
Apple Xcode 2.x
http://secunia.com/product/10144/
DESCRIPTION:
A vulnerability has been reported in Apple Xcode, which can be
exploited by malicious people to bypass certain security
restrictions.
The vulnerability has been reported in versions prior to 2.3.
SOLUTION:
Update to version 2.3.
http://developer.apple.com/tools/download/
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Mike Schrag of mDimension Technology.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=303794
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0368 | CVE-2006-2531 | Ipswitch WhatsUp Professional Authentication bypass vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Ipswitch WhatsUp Professional 2006 only verifies the user's identity via HTTP headers, which allows remote attackers to spoof being a trusted console and bypass authentication by setting HTTP User-Agent header to "Ipswitch/1.0" and the User-Application header to "NmConsole". Ipswitch WhatsUp Professional 2006 is susceptible to a remote authentication-bypass vulnerability.
This issue allows remote attackers to gain administrative access to the web-based administrative interface of the application. This will aid them in further network attacks. Whatsup Professional software is a tool developed by Ipswitch to monitor the network status of TCP/IP, NetBEUI and IPX. What\'\'s Up Professional 2006 has an authentication bypass vulnerability, an attacker can bypass the authentication mechanism and log in without credentials. An attacker can trick the application into believing that the request is coming from the console, which is trusted, by sending HTTP requests with specially crafted headers
VAR-200605-0287 | CVE-2006-2490 | Mobotix IP Camera Multiple Cross-Site Scripting Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in Mobotix IP Network Cameras M1 1.9.4.7 and M10 2.0.5.2, and other versions before 2.2.3.18 for M10/D10 and 3.0.3.31 for M22, allow remote attackers to inject arbitrary web script or HTML via URL-encoded values in (1) the query string to help/help, (2) the get_image_info_abspath parameter to control/eventplayer, and (3) the source_ip parameter to events.tar. The Mobotix IP camera is prone to multiple cross-site scripting vulnerabilities. These issues are due to a failure in the device to properly sanitize user-supplied input.
An attacker may leverage these issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. A remote attacker can inject arbitrary web scripts or HTML.
Some input isn't properly sanitised before being returned to the
user.
Examples:
http://[host]/help/help?%3CBODY%20ONLOAD=[code]%3E
http://[host]/control/events.tar?source_ip=%3CBODY%20ONLOAD=[code]%3E&download=egal
http://[host]/control/eventplayer?get_image_info_abspath=%3CBODY%20ONLOAD=[code]%3E
The vulnerabilities have been reported in version 2.0.5.2 for the M10
series and in version 1.9.4.7 for the M1 series. Other versions may
also be affected.
SOLUTION:
Filter malicious characters and character sequences in a proxy server
or firewall with URL filtering capabilities.
PROVIDED AND/OR DISCOVERED BY:
Jaime Blasco
ORIGINAL ADVISORY:
http://www.eazel.es/media/advisory001.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0309 | CVE-2006-2512 | ILF Hitachi EUR Unknown SQL Injection Vulnerability |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
SQL injection vulnerability in Hitachi EUR Professional Edition, EUR Viewer, EUR Print Service, and EUR Print Service for ILF allows remote authenticated users to execute arbitrary SQL commands via unknown attack vectors. Hitachi EUR is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.
A successful attack could allow an attacker to compromise the application, access or modify data, gain administrative access to the application, or exploit vulnerabilities in the underlying database implementation. This can be exploited to manipulate
SQL queries by injecting arbitrary SQL code.
The vulnerability has been reported in the following products:
* EUR Professional Edition version 05-00 through 05-06 (Windows).
* EUR Viewer version 05-00 through 05-06 (Windows). (Windows).
(Linux/AIX/HP-UX/Solaris).
Contact the vendor to obtain the fixed versions.
PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.
ORIGINAL ADVISORY:
http://www.hitachi-support.com/security_e/vuls_e/HS06-010_e/index-e.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0054 | CVE-2006-2352 | IPswitch WhatsUp Professional Multiple cross-site scripting attacks (XSS) Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in IPswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allow remote attackers to inject arbitrary web script or HTML via unknown vectors in (1) NmConsole/Tools.asp and (2) NmConsole/DeviceSelection.asp. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
1) Input passed to NmConsole/Navigation.asp and to the "sHostname"
parameter in NmConsole/ToolResults.asp is not properly sanitised
before being returned to users. This can be exploited to execute
arbitrary HTML and script code in a logged in user's browser session
in context of a vulnerable site.
Example:
http://[host]:8022/NmConsole/Navigation.asp?">[code]
2) Input passed to NmConsole/Tools.asp and
NmConsole/DeviceSelection.asp is also not properly sanitised before
being returned to users. This can be exploited to execute arbitrary
HTML and script code in a logged in user's browser session in context
of a vulnerable site.
3) It's possible to disclose monitored devices without being logged
in by passing arbitrary values to the "nDeviceGroupID" parameter in
"NmConsole/utility/RenderMap.asp".
Example:
http://[host]:8022/NmConsole/utility/RenderMap.asp?nDeviceGroupID=2
4) Input passed to the "sRedirectUrl" and "sCancelURL" in
NmConsole/DeviceSelection.asp is not properly verified, which makes
it possible to redirect a user to an arbitrary web site.
It is also possible to disclose the source code of the ASP pages by
appending a period to the end of the file extension.
5) Different error messages are returned during login to
"NmConsole/Login.asp" depending on whether the supplied username or
password is incorrect.
6) It is possible to disclose path information in 404 error messages
returned by the service.
Example:
http://[host]:8022/NmConsole
The vulnerabilities and weaknesses have been confirmed in WhatsUp
Professional 2006.
SOLUTION:
Restrict access to port 8022/tcp and don't visit other web sites
while logged in.
PROVIDED AND/OR DISCOVERED BY:
1, 3, 4) David Maciejak
2, 5, 6) Reported by an anonymous person.
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0055 | CVE-2006-2353 | Ipswitch WhatsUp Professional DeviceSelection.asp URL Redirecting vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
NmConsole/DeviceSelection.asp in Ipswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allows remote attackers to redirect users to other websites via the (1) sCancelURL and possibly (2) sRedirectUrl parameters.
TITLE:
WhatsUp Professional Cross-Site Scripting and Information Disclosure
SECUNIA ADVISORY ID:
SA20075
VERIFY ADVISORY:
http://secunia.com/advisories/20075/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
SOFTWARE:
Ipswitch WhatsUp Professional 2006
http://secunia.com/product/9917/
Ipswitch WhatsUp Professional 2006 Premium
http://secunia.com/product/9918/
DESCRIPTION:
Some vulnerabilities and weaknesses have been discovered in WhatsUp
Professional, which can be exploited by malicious people to gain
knowledge of certain information or conduct cross-site scripting
attacks.
1) Input passed to NmConsole/Navigation.asp and to the "sHostname"
parameter in NmConsole/ToolResults.asp is not properly sanitised
before being returned to users. This can be exploited to execute
arbitrary HTML and script code in a logged in user's browser session
in context of a vulnerable site.
Example:
http://[host]:8022/NmConsole/Navigation.asp?">[code]
2) Input passed to NmConsole/Tools.asp and
NmConsole/DeviceSelection.asp is also not properly sanitised before
being returned to users. This can be exploited to execute arbitrary
HTML and script code in a logged in user's browser session in context
of a vulnerable site.
3) It's possible to disclose monitored devices without being logged
in by passing arbitrary values to the "nDeviceGroupID" parameter in
"NmConsole/utility/RenderMap.asp".
Example:
http://[host]:8022/NmConsole/utility/RenderMap.asp?nDeviceGroupID=2
4) Input passed to the "sRedirectUrl" and "sCancelURL" in
NmConsole/DeviceSelection.asp is not properly verified, which makes
it possible to redirect a user to an arbitrary web site.
It is also possible to disclose the source code of the ASP pages by
appending a period to the end of the file extension.
5) Different error messages are returned during login to
"NmConsole/Login.asp" depending on whether the supplied username or
password is incorrect.
6) It is possible to disclose path information in 404 error messages
returned by the service.
SOLUTION:
Restrict access to port 8022/tcp and don't visit other web sites
while logged in.
PROVIDED AND/OR DISCOVERED BY:
1, 3, 4) David Maciejak
2, 5, 6) Reported by an anonymous person.
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0056 | CVE-2006-2354 | Ipswitch WhatsUp ProfessionalLogin.asp Information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
NmConsole/Login.asp in Ipswitch WhatsUp Professional 2006 and Ipswitch WhatsUp Professional 2006 Premium generates different error messages in a way that allows remote attackers to enumerate valid usernames. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. WhatsUp Professional 2005 is prone to a remote security vulnerability.
TITLE:
WhatsUp Professional Cross-Site Scripting and Information Disclosure
SECUNIA ADVISORY ID:
SA20075
VERIFY ADVISORY:
http://secunia.com/advisories/20075/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
SOFTWARE:
Ipswitch WhatsUp Professional 2006
http://secunia.com/product/9917/
Ipswitch WhatsUp Professional 2006 Premium
http://secunia.com/product/9918/
DESCRIPTION:
Some vulnerabilities and weaknesses have been discovered in WhatsUp
Professional, which can be exploited by malicious people to gain
knowledge of certain information or conduct cross-site scripting
attacks.
1) Input passed to NmConsole/Navigation.asp and to the "sHostname"
parameter in NmConsole/ToolResults.asp is not properly sanitised
before being returned to users. This can be exploited to execute
arbitrary HTML and script code in a logged in user's browser session
in context of a vulnerable site.
Example:
http://[host]:8022/NmConsole/Navigation.asp?">[code]
2) Input passed to NmConsole/Tools.asp and
NmConsole/DeviceSelection.asp is also not properly sanitised before
being returned to users. This can be exploited to execute arbitrary
HTML and script code in a logged in user's browser session in context
of a vulnerable site.
3) It's possible to disclose monitored devices without being logged
in by passing arbitrary values to the "nDeviceGroupID" parameter in
"NmConsole/utility/RenderMap.asp".
Example:
http://[host]:8022/NmConsole/utility/RenderMap.asp?nDeviceGroupID=2
4) Input passed to the "sRedirectUrl" and "sCancelURL" in
NmConsole/DeviceSelection.asp is not properly verified, which makes
it possible to redirect a user to an arbitrary web site.
It is also possible to disclose the source code of the ASP pages by
appending a period to the end of the file extension.
5) Different error messages are returned during login to
"NmConsole/Login.asp" depending on whether the supplied username or
password is incorrect.
6) It is possible to disclose path information in 404 error messages
returned by the service.
SOLUTION:
Restrict access to port 8022/tcp and don't visit other web sites
while logged in.
PROVIDED AND/OR DISCOVERED BY:
1, 3, 4) David Maciejak
2, 5, 6) Reported by an anonymous person.
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0057 | CVE-2006-2355 | Ipswitch WhatsUp Professional 404 Error message Information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Ipswitch WhatsUp Professional 2006 and Ipswitch WhatsUp Professional 2006 Premium allows remote attackers to obtain full path information via 404 error messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
1) Input passed to NmConsole/Navigation.asp and to the "sHostname"
parameter in NmConsole/ToolResults.asp is not properly sanitised
before being returned to users. This can be exploited to execute
arbitrary HTML and script code in a logged in user's browser session
in context of a vulnerable site.
Example:
http://[host]:8022/NmConsole/Navigation.asp?">[code]
2) Input passed to NmConsole/Tools.asp and
NmConsole/DeviceSelection.asp is also not properly sanitised before
being returned to users. This can be exploited to execute arbitrary
HTML and script code in a logged in user's browser session in context
of a vulnerable site.
3) It's possible to disclose monitored devices without being logged
in by passing arbitrary values to the "nDeviceGroupID" parameter in
"NmConsole/utility/RenderMap.asp".
Example:
http://[host]:8022/NmConsole/utility/RenderMap.asp?nDeviceGroupID=2
4) Input passed to the "sRedirectUrl" and "sCancelURL" in
NmConsole/DeviceSelection.asp is not properly verified, which makes
it possible to redirect a user to an arbitrary web site.
It is also possible to disclose the source code of the ASP pages by
appending a period to the end of the file extension.
5) Different error messages are returned during login to
"NmConsole/Login.asp" depending on whether the supplied username or
password is incorrect.
SOLUTION:
Restrict access to port 8022/tcp and don't visit other web sites
while logged in.
PROVIDED AND/OR DISCOVERED BY:
1, 3, 4) David Maciejak
2, 5, 6) Reported by an anonymous person.
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0058 | CVE-2006-2356 | Ipswitch WhatsUp Professional RenderMap.asp Information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
NmConsole/utility/RenderMap.asp in Ipswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allows remote attackers to obtain sensitive information about network nodes via a modified nDeviceGroupID parameter. WhatsUp is prone to a information disclosure vulnerability.
1) Input passed to NmConsole/Navigation.asp and to the "sHostname"
parameter in NmConsole/ToolResults.asp is not properly sanitised
before being returned to users. This can be exploited to execute
arbitrary HTML and script code in a logged in user's browser session
in context of a vulnerable site.
Example:
http://[host]:8022/NmConsole/Navigation.asp?">[code]
2) Input passed to NmConsole/Tools.asp and
NmConsole/DeviceSelection.asp is also not properly sanitised before
being returned to users. This can be exploited to execute arbitrary
HTML and script code in a logged in user's browser session in context
of a vulnerable site.
3) It's possible to disclose monitored devices without being logged
in by passing arbitrary values to the "nDeviceGroupID" parameter in
"NmConsole/utility/RenderMap.asp".
Example:
http://[host]:8022/NmConsole/utility/RenderMap.asp?nDeviceGroupID=2
4) Input passed to the "sRedirectUrl" and "sCancelURL" in
NmConsole/DeviceSelection.asp is not properly verified, which makes
it possible to redirect a user to an arbitrary web site.
It is also possible to disclose the source code of the ASP pages by
appending a period to the end of the file extension.
5) Different error messages are returned during login to
"NmConsole/Login.asp" depending on whether the supplied username or
password is incorrect.
6) It is possible to disclose path information in 404 error messages
returned by the service.
Example:
http://[host]:8022/NmConsole
The vulnerabilities and weaknesses have been confirmed in WhatsUp
Professional 2006.
SOLUTION:
Restrict access to port 8022/tcp and don't visit other web sites
while logged in.
PROVIDED AND/OR DISCOVERED BY:
1, 3, 4) David Maciejak
2, 5, 6) Reported by an anonymous person.
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0059 | CVE-2006-2357 | Ipswitch WhatsUp Professional Login.asp Information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Ipswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allows remote attackers to obtain source code for scripts via a trailing dot in a request to NmConsole/Login.asp.
TITLE:
WhatsUp Professional Cross-Site Scripting and Information Disclosure
SECUNIA ADVISORY ID:
SA20075
VERIFY ADVISORY:
http://secunia.com/advisories/20075/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
SOFTWARE:
Ipswitch WhatsUp Professional 2006
http://secunia.com/product/9917/
Ipswitch WhatsUp Professional 2006 Premium
http://secunia.com/product/9918/
DESCRIPTION:
Some vulnerabilities and weaknesses have been discovered in WhatsUp
Professional, which can be exploited by malicious people to gain
knowledge of certain information or conduct cross-site scripting
attacks.
1) Input passed to NmConsole/Navigation.asp and to the "sHostname"
parameter in NmConsole/ToolResults.asp is not properly sanitised
before being returned to users. This can be exploited to execute
arbitrary HTML and script code in a logged in user's browser session
in context of a vulnerable site.
Example:
http://[host]:8022/NmConsole/Navigation.asp?">[code]
2) Input passed to NmConsole/Tools.asp and
NmConsole/DeviceSelection.asp is also not properly sanitised before
being returned to users. This can be exploited to execute arbitrary
HTML and script code in a logged in user's browser session in context
of a vulnerable site.
3) It's possible to disclose monitored devices without being logged
in by passing arbitrary values to the "nDeviceGroupID" parameter in
"NmConsole/utility/RenderMap.asp".
Example:
http://[host]:8022/NmConsole/utility/RenderMap.asp?nDeviceGroupID=2
4) Input passed to the "sRedirectUrl" and "sCancelURL" in
NmConsole/DeviceSelection.asp is not properly verified, which makes
it possible to redirect a user to an arbitrary web site.
It is also possible to disclose the source code of the ASP pages by
appending a period to the end of the file extension.
5) Different error messages are returned during login to
"NmConsole/Login.asp" depending on whether the supplied username or
password is incorrect.
6) It is possible to disclose path information in 404 error messages
returned by the service.
SOLUTION:
Restrict access to port 8022/tcp and don't visit other web sites
while logged in.
PROVIDED AND/OR DISCOVERED BY:
1, 3, 4) David Maciejak
2, 5, 6) Reported by an anonymous person.
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0053 | CVE-2006-2351 | Ipswitch WhatsUp Professional Multiple cross-site scripting attacks (XSS) Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in IPswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allow remote attackers to inject arbitrary web script or HTML via the (1) sDeviceView or (2) nDeviceID parameter to (a) NmConsole/Navigation.asp or (3) sHostname parameter to (b) NmConsole/ToolResults.asp. WhatsUp Professional is prone to multiple input-validation vulnerabilities. The issues include remote file-include, information-disclosure, source-code disclosure, cross-site scripting, and input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
Successful exploits of these vulnerabilities could allow an attacker to access or modify data, steal cookie-based authentication credentials, perform username-enumeration, access sensitive information, and gain unauthorized access to script source code. Other attacks are also possible. This can be exploited to execute
arbitrary HTML and script code in a logged in user's browser session
in context of a vulnerable site.
Example:
http://[host]:8022/NmConsole/Navigation.asp?">[code]
2) Input passed to NmConsole/Tools.asp and
NmConsole/DeviceSelection.asp is also not properly sanitised before
being returned to users. This can be exploited to execute arbitrary
HTML and script code in a logged in user's browser session in context
of a vulnerable site.
3) It's possible to disclose monitored devices without being logged
in by passing arbitrary values to the "nDeviceGroupID" parameter in
"NmConsole/utility/RenderMap.asp".
Example:
http://[host]:8022/NmConsole/utility/RenderMap.asp?nDeviceGroupID=2
4) Input passed to the "sRedirectUrl" and "sCancelURL" in
NmConsole/DeviceSelection.asp is not properly verified, which makes
it possible to redirect a user to an arbitrary web site.
It is also possible to disclose the source code of the ASP pages by
appending a period to the end of the file extension.
5) Different error messages are returned during login to
"NmConsole/Login.asp" depending on whether the supplied username or
password is incorrect.
6) It is possible to disclose path information in 404 error messages
returned by the service.
SOLUTION:
Restrict access to port 8022/tcp and don't visit other web sites
while logged in.
PROVIDED AND/OR DISCOVERED BY:
1, 3, 4) David Maciejak
2, 5, 6) Reported by an anonymous person.
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0112 | CVE-2006-2341 | Symantec Enterprise Firewall Inside IP Address disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The HTTP proxy in Symantec Gateway Security 5000 Series 2.0.1 and 3.0, and Enterprise Firewall 8.0, when NAT is being used, allows remote attackers to determine internal IP addresses by using malformed HTTP requests, as demonstrated using a get request without a space separating the URI. Symantec Enterprise Firewall and Gateway Security products are prone to an information-disclosure weakness.
The vendor has reported that the NAT/HTTP proxy component of the products may reveal the internal IP addresses of protected computers.
An attacker may use this information to carry out targeted attacks against a potentially vulnerable host.
The weakness is caused due to an error when generating responses to
certain HTTP requests.
SOLUTION:
Apply product updates.
http://www.symantec.com/techsupp/enterprise/select_product_updates.html
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Bernhard Mueller.
ORIGINAL ADVISORY:
Symantec:
http://securityresponse.symantec.com/avcenter/security/Content/2006.05.10.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0093 | CVE-2006-2322 | Cisco Application Velocity System Open TCP Proxy server function default allocation Input validation vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
The transparent proxy feature of the Cisco Application Velocity System (AVS) 3110 5.0 and 4.0 and earlier, and 3120 5.0.0 and earlier, has a default configuration that allows remote attackers to proxy arbitrary TCP connections, aka Bug ID CSCsd32143. This software fails to allow only valid TCP ports to be used by remote users.
Remote attackers may use the affected software as an open TCP proxy. Attackers have exploited this to send unsolicited commercial email (UCE).
Versions of AVS prior to 5.0.1 are vulnerable to this issue.
The problem is caused due to insecure default settings allowing
anyone to use the device as an open relay to any TCP service able to
process data embedded in HTTP POST requests.
The security issue affects the following products:
* AVS 3110 versions 4.0 and 5.0 (and prior)
* AVS 3120 version 5.0.0 (and prior)
NOTE: According to Cisco PSIRT, the security issue is actively
exploited to send unsolicited commercial e-mails and obscure the true
originator.
SOLUTION:
Update to version 5.0.1.
Software for AVS 3110:
http://www.cisco.com/pcgi-bin/tablebuild.pl/AVS3110-5.0.1
Software for AVS 3120:
http://www.cisco.com/pcgi-bin/tablebuild.pl/AVS3120-5.0.1
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20060510-avs.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0169 | CVE-2006-2316 | Intel PROset/Wireless S24EvMon.exe Local information disclosure vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
S24EvMon.exe in the Intel PROset/Wireless software, possibly 10.1.0.33, uses a S24EventManagerSharedMemory shared memory section with weak permissions, which allows local users to read or modify passwords or other data, or cause a denial of service. Intel PROset/Wireless software is susceptible to a local information-disclosure vulnerability. This issue is due to insecure permissions being applied to shared-memory segments.
This issue allows local, unprivileged attackers to gain access to potentially sensitive network configuration and authentication information. Information gathered by exploiting this issue will aid them in further attacks.
Version 10.1.0.33 of the Intel PROset/Wireless software is vulnerable to this issue; other versions may also be affected.
The vulnerability is caused due to insecure default permissions on
the "\BaseNamedObjects\S24EventManagerSharedMemory" shared section
used by the Wireless Management Service (S24EvMon.exe). This makes it
possible for an unprivileged user to obtain information of the
wireless configuration e.g. WEP keys.
The vulnerability has been confirmed in version 10.1.0.33.
SOLUTION:
Restrict access to affected systems.
PROVIDED AND/OR DISCOVERED BY:
Rub\xe9n Santamarta
ORIGINAL ADVISORY:
http://www.reversemode.com/index.php?option=com_content&task=view&id=10&Itemid=1
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0018 | CVE-2006-2276 | Quagga BGPD Local Denial Of Service Vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a certain sh ip bgp command entered in the telnet interface. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Quagga , GNU Zebra Is TCP/IP A collection of daemons that support base routing related protocols. Out of them RIP , BGP As a daemon that handles the protocol RIPd , bgpd Is included. Quagga , GNU Zebra Has several security issues: 1) RIPd The daemon RIPv2 Even if the setting is valid only, regardless of the presence or absence of authentication RIPv1 There is a problem that responds to the request. (CVE-2006-2223) If exploited by a remote attacker, SEND UPDATE Such as REQUEST Routing information may be obtained illegally by using packets. 2) RIPd The daemon RIPv2 Despite being enabled for authentication, RIPv1 There is a problem of accepting packets without authentication. (CVE-2006-2224) If exploited by a remote attacker, RIPv1 of RESPONSE By using packet RIP The routing table may be modified incorrectly. (CVE-2006-2276) If exploited by a local attacker, the target system can eventually become unserviceable.Please refer to the “Overview” for the impact of this vulnerability. Quagga is prone to a local denial-of-service vulnerability.
An attacker can exploit this issue by using commands that cause the consumption of a large amount of CPU resources.
An attacker may cause the application to crash, thus denying service to legitimate users.
Version 0.98.3 is vulnerable; other versions may also be affected. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1059-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
May 19th, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : quagga
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2006-2223 CVE-2006-2224 CVE-2006-2276
BugTraq ID : 17808
Debian Bugs : 365940 366980
Konstantin Gavrilenko discovered several vulnerabilities in quagga,
the BGP/OSPF/RIP routing daemon. The Common Vulnerabilities and
Exposures project identifies the following problems:
CVE-2006-2223
Remote attackers may obtain sensitive information via RIPv1
REQUEST packets even if the quagga has been configured to use MD5
authentication.
CVE-2006-2224
Remote attackers could inject arbitrary routes using the RIPv1
RESPONSE packet even if the quagga has been configured to use MD5
authentication.
The old stable distribution (woody) does not contain quagga packages.
For the stable distribution (sarge) these problems have been fixed in
version 0.98.3-7.2.
For the unstable distribution (sid) these problems have been fixed in
version 0.99.4-1.
We recommend that you upgrade your quagga package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2.dsc
Size/MD5 checksum: 725 e985734e8ee31a87ff96f9c9b7291fa5
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2.diff.gz
Size/MD5 checksum: 43801 fe5b28230c268fe7ab141453a82c473c
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3.orig.tar.gz
Size/MD5 checksum: 2118348 68be5e911e4d604c0f5959338263356e
Architecture independent components:
http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.98.3-7.2_all.deb
Size/MD5 checksum: 488700 c79865480dfe140b106d39111b5379ba
Alpha architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_alpha.deb
Size/MD5 checksum: 1611704 c44bc78a27990ca9d77fe4529c04e42a
AMD64 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_amd64.deb
Size/MD5 checksum: 1412990 7ab17ec568d3f0e2122677e81db5a2e2
ARM architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_arm.deb
Size/MD5 checksum: 1290442 9a5d285ffe43d8b05c470147c48357d5
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_i386.deb
Size/MD5 checksum: 1191426 a0438042e1935582b66a44f17e62b40b
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_ia64.deb
Size/MD5 checksum: 1829114 9e6e40afc51734c572de0f4e6e2d6519
HP Precision architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_hppa.deb
Size/MD5 checksum: 1447726 4f6d058646cd78f86994eee61359df22
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_m68k.deb
Size/MD5 checksum: 1159670 1438a6da0f5c0672075438df92e82695
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_mips.deb
Size/MD5 checksum: 1352522 567e463657f21ec64870c1a243012b49
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_mipsel.deb
Size/MD5 checksum: 1355460 3dec77ae54b897882091bb5501b349c7
PowerPC architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_powerpc.deb
Size/MD5 checksum: 1316776 adaa0828d830d7145236ee2f216fe46d
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_s390.deb
Size/MD5 checksum: 1401616 41b91f2eb90d26b1482696681552d9cb
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.2_sparc.deb
Size/MD5 checksum: 1287378 3b1624ec028e9f7944edd3fc396b0778
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFEbehrW5ql+IAeqTIRAu1bAJ0YQwvwCvugopyXVBCit2SwrYl+SACdF09d
ELcxVZUFQP8s43SsJQ3mlqo=
=Niwk
-----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200605-15
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Quagga Routing Suite: Multiple vulnerabilities
Date: May 21, 2006
Bugs: #132353
ID: 200605-15
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Quagga's RIP daemon allows the injection of routes and the disclosure
of routing information. The BGP daemon is vulnerable to a Denial of
Service.
Background
==========
The Quagga Routing Suite implements three major routing protocols: RIP
(v1/v2/v3), OSPF (v2/v3) and BGP4. Gavrilenko discovered two flaws in the Routing
Information Protocol (RIP) daemon that allow the processing of RIP v1
packets (carrying no authentication) even when the daemon is configured
to use MD5 authentication or, in another case, even if RIP v1 is
completely disabled.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Quagga users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/quagga-0.98.6-r1"
References
==========
[ 1 ] CVE-2006-2223
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2223
[ 2 ] CVE-2006-2224
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2224
[ 3 ] CVE-2006-2276
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2276
[ 4 ] Official release information
http://www.quagga.net/news2.php?y=2006&m=5&d=8#id1147115280
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200605-15.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2006 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5