VARIoT IoT vulnerabilities database
| VAR-201006-0019 | CVE-2009-4915 |
Cisco ASA 5580 Service disruption in the series (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200904-0363 |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote attackers to cause a denial of service (device reload) via unknown network traffic, as demonstrated by a "connection stress test," aka Bug ID CSCsq68451. Cisco ASA 5580 series security appliances are prone to multiple security vulnerabilities. The vulnerabilities include multiple denial-of-service vulnerabilities, multiple buffer-overflow vulnerabilities, authentication-bypass vulnerabilities and a cross-site scripting vulnerability.
Exploiting these issues could allow an attacker to deny service to legitimate users, bypass security restrictions and gain unauthorized access, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible.
Cisco ASA 5580 series security appliances with software prior to 8.1(2) are vulnerable
| VAR-201006-0021 | CVE-2009-4917 |
Cisco ASA 5580 Denial of service in series (DoS) Vulnerability
Related entries in the VARIoT exploits database: VAR-E-200904-0363 |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote attackers to cause a denial of service (device reload) via a high volume of SIP traffic, aka Bug ID CSCsr65901. Cisco ASA 5580 series security appliances are prone to multiple security vulnerabilities. The vulnerabilities include multiple denial-of-service vulnerabilities, multiple buffer-overflow vulnerabilities, authentication-bypass vulnerabilities and a cross-site scripting vulnerability.
Exploiting these issues could allow an attacker to deny service to legitimate users, bypass security restrictions and gain unauthorized access, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible.
Cisco ASA 5580 series security appliances with software prior to 8.1(2) are vulnerable
| VAR-201006-0022 | CVE-2009-4918 |
Cisco ASA 5580 Service disruption in the series (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200904-0363 |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allow remote attackers to cause a denial of service (IKE process hang) via malformed NAT-T packets, aka Bug ID CSCsr74439. Cisco ASA 5580 series security appliances are prone to multiple security vulnerabilities. The vulnerabilities include multiple denial-of-service vulnerabilities, multiple buffer-overflow vulnerabilities, authentication-bypass vulnerabilities and a cross-site scripting vulnerability.
Exploiting these issues could allow an attacker to deny service to legitimate users, bypass security restrictions and gain unauthorized access, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible.
Cisco ASA 5580 series security appliances with software prior to 8.1(2) are vulnerable
| VAR-201006-0023 | CVE-2009-4919 |
Cisco ASA 5580 Series buffer overflow vulnerability
Related entries in the VARIoT exploits database: VAR-E-200904-0363 |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Buffer overflow on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote attackers to have an unspecified impact via long IKE attributes, aka Bug ID CSCsu43121. The vulnerabilities include multiple denial-of-service vulnerabilities, multiple buffer-overflow vulnerabilities, authentication-bypass vulnerabilities and a cross-site scripting vulnerability.
Exploiting these issues could allow an attacker to deny service to legitimate users, bypass security restrictions and gain unauthorized access, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible
| VAR-201006-0024 | CVE-2009-4920 |
Cisco ASA 5580 Series CTM Service disruption in (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200904-0363 |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in CTM on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software 8.1(2) allows remote attackers to cause a denial of service (watchdog traceback) via a large amount of small-packet data, aka Bug ID CSCsu11412. Cisco ASA 5580 series security appliances are prone to multiple security vulnerabilities. The vulnerabilities include multiple denial-of-service vulnerabilities, multiple buffer-overflow vulnerabilities, authentication-bypass vulnerabilities and a cross-site scripting vulnerability.
Exploiting these issues could allow an attacker to deny service to legitimate users, bypass security restrictions and gain unauthorized access, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible.
Cisco ASA 5580 series security appliances with software prior to 8.1(2) are vulnerable
| VAR-201006-0025 | CVE-2009-4921 |
Cisco ASA 5580 Service disruption in the series (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200904-0363 |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allow remote attackers to cause a denial of service (traceback) via malformed TCP packets, aka Bug ID CSCsm84110. Cisco ASA 5580 series security appliances are prone to multiple security vulnerabilities. The vulnerabilities include multiple denial-of-service vulnerabilities, multiple buffer-overflow vulnerabilities, authentication-bypass vulnerabilities and a cross-site scripting vulnerability.
Exploiting these issues could allow an attacker to deny service to legitimate users, bypass security restrictions and gain unauthorized access, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible.
Cisco ASA 5580 series security appliances with software prior to 8.1(2) are vulnerable
| VAR-201006-0026 | CVE-2009-4922 |
Cisco ASA 5580 Service disruption in the series (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200904-0363 |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote authenticated users to cause a denial of service (traceback) by establishing many IPsec L2L tunnels from remote peer IP addresses, aka Bug ID CSCso15583. Cisco ASA 5580 series security appliances are prone to multiple security vulnerabilities. The vulnerabilities include multiple denial-of-service vulnerabilities, multiple buffer-overflow vulnerabilities, authentication-bypass vulnerabilities and a cross-site scripting vulnerability.
Exploiting these issues could allow an attacker to deny service to legitimate users, bypass security restrictions and gain unauthorized access, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible.
Cisco ASA 5580 series security appliances with software prior to 8.1(2) are vulnerable
| VAR-201006-0027 | CVE-2009-4923 |
Cisco ASA 5580 Series DTLS Service disruption in implementation (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200904-0363 |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the DTLS implementation on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote attackers to cause a denial of service (traceback) via TLS fragments, aka Bug ID CSCso53162. Cisco ASA 5580 series security appliances are prone to multiple security vulnerabilities. The vulnerabilities include multiple denial-of-service vulnerabilities, multiple buffer-overflow vulnerabilities, authentication-bypass vulnerabilities and a cross-site scripting vulnerability.
Exploiting these issues could allow an attacker to deny service to legitimate users, bypass security restrictions and gain unauthorized access, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible.
Cisco ASA 5580 series security appliances with software prior to 8.1(2) are vulnerable
| VAR-201006-0014 | CVE-2009-4910 |
Cisco Adaptive Security Appliances On the device WebVPN Portal cross-site scripting vulnerability
Related entries in the VARIoT exploits database: VAR-E-200904-0363 |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the WebVPN portal on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCsq78418. The problem is Bug ID : CSCsq78418 It is a problem.By any third party Web Script or HTML May be inserted. The vulnerabilities include multiple denial-of-service vulnerabilities, multiple buffer-overflow vulnerabilities, authentication-bypass vulnerabilities and a cross-site scripting vulnerability.
Exploiting these issues could allow an attacker to deny service to legitimate users, bypass security restrictions and gain unauthorized access, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible
| VAR-201006-0020 | CVE-2009-4916 |
Cisco ASA 5580 Service disruption in the series (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200904-0363 |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5580 series devices with software before 8.1(2) allows remote authenticated users to cause a denial of service (console hang) via a login action during failover replication, aka Bug ID CSCsq80095. Cisco ASA 5580 series security appliances are prone to multiple security vulnerabilities. The vulnerabilities include multiple denial-of-service vulnerabilities, multiple buffer-overflow vulnerabilities, authentication-bypass vulnerabilities and a cross-site scripting vulnerability.
Exploiting these issues could allow an attacker to deny service to legitimate users, bypass security restrictions and gain unauthorized access, execute arbitrary script code, or steal cookie-based authentication credentials. Other attacks may also be possible.
Cisco ASA 5580 series security appliances with software prior to 8.1(2) are vulnerable
| VAR-200904-0019 | CVE-2008-6588 | Aztech ADSL2/2+ 4-port Vulnerability to obtain access rights in routers |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Aztech ADSL2/2+ 4-port router has a default "isp" account with a default "isp" password, which allows remote attackers to obtain access if this default is not changed
| VAR-200904-0471 | CVE-2009-1262 | Fortinet FortiClient VPN Connection Name Local Format String Vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Format string vulnerability in Fortinet FortiClient 3.0.614, and possibly earlier, allows local users to execute arbitrary code via format string specifiers in the VPN connection name. Fortinet FortiClient is prone to a local format-string vulnerability because it fails to adequately sanitize user-supplied input before passing it to a formatted-printing function.
Successfully exploiting this issue will allow local attackers to execute arbitrary code with SYSTEM-level privileges, completely compromising the computer. Failed exploit attempts will likely result in a denial of service.
FortiClient 3.0.614 is vulnerable; other versions may also be affected. Fortinet FortiClient is a set of Fortinet company's software solutions that provide security for terminals. It provides features such as IPsec and SSL encryption, WAN optimization, endpoint compliance, and two-factor authentication. ----------------------------------------------------------------------
Secunia is pleased to announce the release of the annual Secunia
report for 2008.
Highlights from the 2008 report:
* Vulnerability Research
* Software Inspection Results
* Secunia Research Highlights
* Secunia Advisory Statistics
Request the full 2008 Report here:
http://secunia.com/advisories/try_vi/request_2008_report/
Stay Secure,
Secunia
----------------------------------------------------------------------
TITLE:
Fortinet FortiClient VPN Connection Format String Vulnerability
SECUNIA ADVISORY ID:
SA34524
VERIFY ADVISORY:
http://secunia.com/advisories/34524/
DESCRIPTION:
A vulnerability has been reported in Fortinet FortiClient, which can
be exploited by malicious, local users to gain escalated privileges. This can be exploited to read and
write arbitrary memory with SYSTEM privileges via a specially crafted
VPN connection name.
The vulnerability is reported in version 3.0.614.
SOLUTION:
Update to version 3.0 MR7 Patch Release 6.
PROVIDED AND/OR DISCOVERED BY:
Deral Heiland, Layered Defense
ORIGINAL ADVISORY:
http://lists.grok.org.uk/pipermail/full-disclosure/2009-April/068583.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200904-0568 | CVE-2007-4475 |
SAP AG SAPgui EAI WebViewer3D ActiveX control stack buffer overflow
Related entries in the VARIoT exploits database: VAR-E-200903-0140, VAR-E-200903-0139 |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method. The Siemens Unigraphics Solutions Teamcenter Visualization EAI WebViewer3D ActiveX control, which comes with SAPgui, contains a stack buffer overflow. This may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. SAP AG SAPgui is prone to a remote stack-based buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition.
Versions prior to SAPgui 7.10 Patch Level 9 are vulnerable. ----------------------------------------------------------------------
Secunia is pleased to announce the release of the annual Secunia
report for 2008.
Highlights from the 2008 report:
* Vulnerability Research
* Software Inspection Results
* Secunia Research Highlights
* Secunia Advisory Statistics
Request the full 2008 Report here:
http://secunia.com/advisories/try_vi/request_2008_report/
Stay Secure,
Secunia
----------------------------------------------------------------------
TITLE:
SAP GUI EAI WebViewer3D ActiveX Control Buffer Overflow
SECUNIA ADVISORY ID:
SA34559
VERIFY ADVISORY:
http://secunia.com/advisories/34559/
DESCRIPTION:
Will Dormann has discovered a vulnerability in SAP GUI, which can be
exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error in the bundled
EAI WebViewer3D ActiveX control (webviewer3d.dll) when processing
arguments passed to the "SaveViewToSessionFile()" method. This can be
exploited to cause a stack-based buffer overflow via an overly long
argument.
The vulnerability is confirmed in versions 6.40 LP29 and 7.10 PL5.
Other versions may also be affected.
SOLUTION:
Update to version 7.10 PL9 or later.
PROVIDED AND/OR DISCOVERED BY:
Will Dormann, CERT/CC.
ORIGINAL ADVISORY:
US-CERT VU#985449:
http://www.kb.cert.org/vuls/id/985449
SAP Note 1153794:
https://service.sap.com/sap/support/notes/1153794
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200904-0299 | CVE-2009-1220 |
Cisco Adaptive Security Appliances (ASA) Run on WebVPN of +webvpn+/index.html Vulnerable to cross-site scripting
Related entries in the VARIoT exploits database: VAR-E-200903-0213 |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in +webvpn+/index.html in WebVPN on the Cisco Adaptive Security Appliances (ASA) 5520 with software 7.2(4)30 and earlier 7.2 versions including 7.2(2)22, and 8.0(4)28 and earlier 8.0 versions, when clientless mode is enabled, allows remote attackers to inject arbitrary web script or HTML via the Host HTTP header. Cisco ASA is prone to a cross-site scripting vulnerability.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site and to steal cookie-based authentication credentials.
Cisco ASA software versions 8.0.4(2B) and prior running on ASA 5500 Series Adaptive Security Appliances are vulnerable
| VAR-200903-0652 | No CVE | Hitachi uCosminexus Portal Framework Multiple Vulnerabilities |
CVSS V2: - CVSS V3: - Severity: - |
Hitachi uCosminexus Portal Framework is prone to an information-disclosure vulnerability, an impersonation vulnerability, and a data-integrity vulnerability.
Attackers may exploit these vulnerabilities to obtain sensitive information or to modify application data. Other attacks are also possible.
All the following are vulnerable:
uCosminexus Portal Framework
uCosminexus Portal Framework - Light
uCosminexus Portal Framework Entry Set
Groupmax Collaboration Portal
Groupmax Collaboration Web Client - Forum/File Sharing
Groupmax Collaboration Web Client - Mail/Schedule
Cosminexus Collaboration Portal
uCosminexus Collaboration Portal
Cosminexus Collaboration Portal - Forum/File Sharing
uCosminexus Collaboration Portal - Forum/File Sharing
uCosminexus Content Manager
JP1/Integrated Management - Service Support
Electronic Form Workflow Set
Electronic Form Workflow Developer Set
| VAR-200903-0641 | No CVE | Hitachi JP1/Cm2/Network Node Manager Shared Trace Service Denial Of Service Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
Hitachi JP1/Cm2/Network Node Manager are prone to a denial-of-service vulnerability affecting Shared Trace Service.
Attackers can exploit this issue to disrupt services, denying service to legitimate users.
Note that Shared Trace Service is not enabled by default.
| VAR-200903-0567 | No CVE | SAP MaxDB webdbm Cross-Site Scripting Vulnerability |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
MaxDB is a database management system widely used in SAP applications. The webdbm script used by MaxDB does not properly validate the parameters passed to the Server, Database, and User parameters. A remote attacker can perform a cross-site scripting attack by executing parameters, resulting in theft of an administrator cookie or a fake login page when the user attempts to log in. Send the password to the attacker. SAP MaxDB is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks
| VAR-200904-0311 | CVE-2009-1233 | Windows Run on Apple Safari Service disruption in (DoS) Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Apple Safari 3.2.2 and 4 Beta on Windows allows remote attackers to cause a denial of service (application crash) via an XML document containing many nested A elements. Apple Safari is prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to crash the affected application, denying service to legitimate users. Given the nature of this issue, attackers may also be able to run arbitrary code, but this has not been confirmed.
Apple Safari 3.2.2 and 4 Beta are vulnerable; other versions may also be affected
| VAR-200904-0305 | CVE-2009-1227 | of Check Point Software Technologies firewall-1 pki web service Buffer error vulnerability in |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
NOTE: this issue has been disputed by the vendor. Buffer overflow in the PKI Web Service in Check Point Firewall-1 PKI Web Service allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) Authorization or (2) Referer HTTP header to TCP port 18624. NOTE: the vendor has disputed this issue, stating "Check Point Security Alert Team has analyzed this report. We've tried to reproduce the attack on all VPN-1 versions from NG FP2 and above with and without HFAs. The issue was not reproduced. We have conducted a thorough analysis of the relevant code and verified that we are secure against this attack. We consider this attack to pose no risk to Check Point customers." In addition, the original researcher, whose reliability is unknown as of 20090407, also states that the issue "was discovered during a pen-test where the client would not allow further analysis. Check Point FireWall-1 PKI web service is prone to multiple remote buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied data.
An attacker can exploit these issues to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will result in a denial-of-service condition.
NOTE: This BID is being retired because the application is not vulnerable as described. Check Point Firewall-1 is a high-performance firewall
| VAR-200904-0402 | CVE-2009-0686 | Trend Micro Internet Pro and Security Pro of TrendMicro Activity Monitor Module Vulnerability gained in |
CVSS V2: 7.2 CVSS V3: - Severity: High |
The TrendMicro Activity Monitor Module (tmactmon.sys) 2.52.0.1002 in Trend Micro Internet Pro 2008 and 2009, and Security Pro 2008 and 2009, allows local users to gain privileges via a crafted IRP in a METHOD_NEITHER IOCTL request to \Device\tmactmon that overwrites memory. Trend Micro Internet Security 2008 and 2009 are prone to a local privilege-escalation vulnerability.
An attacker can exploit this issue to execute arbitrary code with elevated privileges, which may allow a complete compromise of the affected computer.
This issue affects Internet Security and Internet Security Pro 2008 and 2009. It also blocks spyware, hackers, phishing
fraud attempts, and unwanted Web sites. It can filter your email messages
for spam as well.
---[ Vulnerability Description ]
Positive Technologies Research Team has discovered multiple priviliege
escalation vulnerabilities in Trend Micro products.
---[ Solution ]
Not available.
---[ Disclosure Timeline ]
02.04.2009 - Vendor notified
no response
02.12.2009 - Second notification
no response
03.31.2009 - Vulnerability details disclosed by third party
03.31.2009 - Public disclosure
---[ Credits ]
This vulnerability was discovered by Nikita Tarakanov, Positive Technologies
Research Team.
---[ References ]
http://en.securitylab.ru/lab/PT-2009-09
http://www.ptsecurity.ru/advisory.asp
Complete list of vulnerability reports published by Positive Technologies
Research Team:
http://en.securitylab.ru/lab/
http://www.ptsecurity.ru/advisory.asp
---[ About Positive Technologies ]
Positive Technologies www.ptsecurity.com is among the key players in the IT
security market in Russia.
The principal activities of the company include the development of
integrated tools for information security monitoring (MaxPatrol); providing
IT security consulting services and technical support; the development of
the Securitylab en.securitylab.ru leading Russian information security
portal.
Among the clients of Positive Technologies there are more than 40 state
enterprises, more than 50 banks and financial organizations, 20
telecommunication companies, more than 40 plant facilities, as well as IT,
service and retail companies from Russia, CIS countries, Baltic States,
China, Ecuador, Germany, Great Britain, Holland, Iran, Israel, Japan,
Mexico, South African Republic, Thailand, Turkey and USA.
Positive Technologies is a team of highly skilled developers, advisers and
experts with years of vast hands-on experience. The company specialists
possess professional titles and certificates; they are the members of
various international societies and are actively involved in the IT security
field development