VARIoT IoT vulnerabilities database

VAR-200702-0467 | CVE-2007-1066 | CSSC Vulnerability that can be obtained authority in products such as |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client use an insecure default Discretionary Access Control Lists (DACL) for the connection client GUI, which allows local users to gain privileges by injecting "a thread under ConnectionClient.exe," aka CSCsg20558. Cisco CSSC and CTA products are prone to an information-disclosure issue and multiple privilege-escalation vulnerabilities because of design flaws in the software.
Exploiting these issues allows local attackers to access sensitive information and to elevate their privileges on affected computers. Cisco Secure Services Client is a tool for deploying a single 802.1X-based authentication framework across multiple Cisco devices. This vulnerability is documented as CiscoBug ID CSCsg20558.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
1) Various design errors can be exploited to gain escalated
privileges via e.g. the help functionality, when launching programs,
by injecting threads, and when parsing commands.
2) When using various authentication methods, the user's password is
stored in cleartext in the application log files.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
Cisco Systems:
http://www.cisco.com/warp/public/707/cisco-sa-20070221-supplicant.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200702-0468 | CVE-2007-1067 | CSSC Vulnerability that can be obtained authority in products such as |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client do not properly parse commands, which allows local users to gain privileges via unspecified vectors, aka CSCsh30624. Cisco CSSC and CTA products are prone to an information-disclosure issue and multiple privilege-escalation vulnerabilities because of design flaws in the software.
Exploiting these issues allows local attackers to access sensitive information and to elevate their privileges on affected computers. Cisco Secure Services Client is a tool for deploying a single 802.1X-based authentication framework across multiple Cisco devices. Privilege Escalation+-------------------- Due to the way it is used in parsing commands, it is possible for an unprivileged user logged on to a computer to start a process with the privileges of the local system user. This vulnerability is documented as Cisco Bug IDs CSCsh30297 and CSCsh30624.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
1) Various design errors can be exploited to gain escalated
privileges via e.g. the help functionality, when launching programs,
by injecting threads, and when parsing commands.
2) When using various authentication methods, the user's password is
stored in cleartext in the application log files.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
Cisco Systems:
http://www.cisco.com/warp/public/707/cisco-sa-20070221-supplicant.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200702-0469 | CVE-2007-1068 | CSSC Of products such as Vulnerability in the acquisition of important information in authentication methods |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The (1) TTLS CHAP, (2) TTLS MSCHAP, (3) TTLS MSCHAPv2, (4) TTLS PAP, (5) MD5, (6) GTC, (7) LEAP, (8) PEAP MSCHAPv2, (9) PEAP GTC, and (10) FAST authentication methods in Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client store transmitted authentication credentials in plaintext log files, which allows local users to obtain sensitive information by reading these files, aka CSCsg34423. (1) TTLS CHAP Authentication method (2) TTLS MSCHAP Authentication method (3) TTLS MSCHAPv2 Authentication method (4) TTLS PAP Authentication method (5) MD5 Authentication method (6) GTC Authentication method (7) LEAP Authentication method (8) PEAP MSCHAPv2 Authentication method (9) PEAP GTC Authentication method (10) FAST Authentication methodBy reading a plain text log file, a local user may obtain important information. Cisco CSSC and CTA products are prone to an information-disclosure issue and multiple privilege-escalation vulnerabilities because of design flaws in the software.
Exploiting these issues allows local attackers to access sensitive information and to elevate their privileges on affected computers. Cisco Secure Services Client is a tool for deploying a single 802.1X-based authentication framework across multiple Cisco devices.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
1) Various design errors can be exploited to gain escalated
privileges via e.g. the help functionality, when launching programs,
by injecting threads, and when parsing commands.
2) When using various authentication methods, the user's password is
stored in cleartext in the application log files.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
Cisco Systems:
http://www.cisco.com/warp/public/707/cisco-sa-20070221-supplicant.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200702-0515 | CVE-2007-1051 | Comodo Firewall Pro Vulnerabilities that prevent security protection |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
Comodo Firewall Pro (formerly Comodo Personal Firewall) 2.4.17.183 and earlier uses a weak cryptographic hashing function (CRC32) to identify trusted modules, which allows local users to bypass security protections by substituting modified modules that have the same CRC32 value. Comodo Firewall Pro is prone to a local security vulnerability
VAR-200702-0458 | CVE-2007-1057 | Nortel Application Switch Used in products such as Net Direct Vulnerability in arbitrary code execution by other users in the client |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
The Net Direct client for Linux before 6.0.5 in Nortel Application Switch 2424, VPN 3050 and 3070, and SSL VPN Module 1000 extracts and executes files with insecure permissions, which allows local users to exploit a race condition to replace a world-writable file in /tmp/NetClient and cause another user to execute arbitrary code when attempting to execute this client, as demonstrated by replacing /tmp/NetClient/client. Nortel SSL VPN Net Direct Client is prone to a local privilege-escalation vulnerability.
Successfully exploiting this issue allows local users to execute arbitrary code with superuser privileges, facilitating the complete compromise of affected computers.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
Nortel Net Direct Client for Linux Privilege Escalation
SECUNIA ADVISORY ID:
SA24231
VERIFY ADVISORY:
http://secunia.com/advisories/24231/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
Nortel Net Direct Client for Linux 6.x
http://secunia.com/product/13523/
DESCRIPTION:
Jon Hart has reported a vulnerability in Net Direct Client for Linux,
which can be exploited by malicious, local users to gain escalated
privileges.
The vulnerability is caused by a combination of insecure permissions
and a race condition when downloading and executed client binaries.
The vulnerability is reported in versions 6.0.1 through 6.0.3.
SOLUTION:
Update to version 6.0.5.
PROVIDED AND/OR DISCOVERED BY:
Jon Hart, spoofed.org.
ORIGINAL ADVISORY:
Nortel Networks:
http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=540071
Jon Hart:
http://spoofed.org/blog/archive/2007/02/nortel_vpn_unix_client_local_root_compromise.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200702-0462 | CVE-2007-1061 | Francisco Burzi PHP-Nuke of index.php In SQL Injection vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
SQL injection vulnerability in index.php in Francisco Burzi PHP-Nuke 8.0 Final and earlier, when the "HTTP Referers" block is enabled, allows remote attackers to execute arbitrary SQL commands via the HTTP Referer header (HTTP_REFERER variable). PHP-Nuke is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
PHP-Nuke 8.0 Final and prior versions are vulnerable. PHP-Nuke is a popular website creation and management tool, it can use many database software as backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
PHP-Nuke HTTP "referer" SQL Injection Vulnerability
SECUNIA ADVISORY ID:
SA24224
VERIFY ADVISORY:
http://secunia.com/advisories/24224/
CRITICAL:
Moderately critical
IMPACT:
Manipulation of data
WHERE:
>From remote
SOFTWARE:
PHP-Nuke 8.x
http://secunia.com/product/13524/
PHP-Nuke 7.x
http://secunia.com/product/2385/
PHP-Nuke 6.x
http://secunia.com/product/329/
PHP-Nuke 5.x
http://secunia.com/product/689/
DESCRIPTION:
Maciej "krasza" Kukla has discovered a vulnerability in PHP-Nuke,
which can be exploited by malicious people to conduct SQL injection
attacks. This can be
exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerability is confirmed in version 7.9 and reported in version
8.0. Other versions may also be affected.
SOLUTION:
Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY:
Maciej "krasza" Kukla
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200702-0378 | CVE-2006-5276 | Sourcefire Snort DCE/RPC preprocessor does not properly reassemble fragmented packets |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted SMB traffic. Snort IDS and Sourcefire Intrusion Sensor are prone to a stack-based buffer-overflow vulnerability because the network intrusion detection (NID) systems fail to handle specially crafted 'DCE' and 'RPC' network packets.
An attacker can exploit this issue to execute malicious code in the context of the user running the affected application. Failed attempts will likely cause these applications to crash. The software provides functions such as packet sniffing, packet analysis, and packet inspection.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA07-050A
Sourcefire Snort DCE/RPC Preprocessor Buffer Overflow
Original release date: February 19, 2007
Last revised: --
Source: US-CERT
Systems Affected
* Snort 2.6.1, 2.6.1.1, and 2.6.1.2
* Snort 2.7.0 beta 1
* Sourcefire Intrusion Sensors version 4.1.x, 4.5.x, and 4.6x with
SEUs prior to SEU 64
* Sourcefire Intrusion Sensors for Crossbeam version 4.1.x, 4.5.x,
and 4.6x with SEUs prior to SEU 64
Other products that use Snort or Snort components may be affected.
I. The DCE/RPC
preprocessor reassembles fragmented SMB and DCE/RPC traffic before
passing data to the Snort rules.
The vulnerable code does not properly reassemble certain types of
SMB and DCE/RPC packets. An attacker could exploit this
vulnerability by sending a specially crafted TCP packet to a host
or network monitored by Snort. The DCE/RPC preprocessor is enabled
by default, and it is not necessary for an attacker to complete a
TCP handshake.
US-CERT is tracking this vulnerability as VU#196240. This
vulnerability has been assigned CVE number CVE-2006-5276. Further
information is available in advisories from Sourcefire and ISS.
II.
III. Solution
Upgrade
Snort 2.6.1.3 is available from the Snort download site. Sourcefire
customers should visit the Sourcefire Support Login site.
Disable the DCE/RPC Preprocessor
To disable the DCE/RPC preprocessor, comment out the line that loads
the preprocessor in the Snort configuration file (typically
/etc/snort.conf on UNIX and Linux systems):
[/etc/snort.conf]
...
#preprocessor dcerpc...
Restart Snort for the change to take effect.
Disabling the preprocessor will prevent Snort from reassembling
fragmented SMB and DCE/RPC packets. This may allow attacks to evade
the IDS.
IV. References
* US-CERT Vulnerability Note VU#196240 -
<http://www.kb.cert.org/vuls/id/196240>
* Sourcefire Advisory 2007-02-19 -
<http://www.snort.org/docs/advisory-2007-02-19.html>
* Sourcefire Support Login - <https://support.sourcefire.com/>
* Sourcefire Snort Release Notes for 2.6.1.3 -
<http://www.snort.org/docs/release_notes/release_notes_2613.txt>
* Snort downloads - <http://www.snort.org/dl/>
* DCE/RPC Preprocessor -
<http://www.snort.org/docs/snort_htmanuals/htmanual_261/node104.html>
* IBM Internet Security Systems Protection Advisory -
<http://iss.net/threats/257.html>
* CVE-2006-5276 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5276>
____________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA07-050A.html>
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA07-050A Feedback VU#196240" in the
subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2007 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
____________________________________________________________________
Revision History
February 19, 2007: Initial Release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRdop4+xOF3G+ig+rAQKdtAgAhQY66LRfVlNkH30Q5RI0gIo5Vhu14yDP
qulLEyzjDhC7gDHWBGQYdE9eCy9Yf3P4BfKJS0766he/7CFn+BaDs7ohnXaynHQq
+kMYNBMBg2RbrGKfOGRLHc0P6X1tSP3w45IppjOv9Yo5SUVDCa7beZWURCIKZyp6
OuYXtnpiGNctHgeU56US0sfuKj8qP7KOd9pCDRDQRhJ3UUd9wDpXee66HBxchh+w
RSIQiMxisOX9mMYBW3z4DM/lb7PxXoa2Q7DwjM1NIOe/0tAObCOvF4uYhOLCVyNg
+EbcN9123V0PW95FITlHXvJU6K8srnnK+Fhpfyi4vg5bYeEF2WiUrg==
=T7v8
-----END PGP SIGNATURE-----
. February 19, 2007
Summary:
Sourcefire has learned of a remotely exploitable vulnerability in the
Snort DCE/RPC preprocessor. Sourcefire
has prepared updates for Snort open-source software to address this issue.
Mitigating Factors:
Users who have disabled the DCE/RPC preprocessor are not vulnerable.
Recommended Actions:
* Open-source Snort 2.6.1.x users are advised to upgrade to Snort
2.6.1.3 (or later) immediately.
* Open-source Snort 2.7 beta users are advised to mitigate this issue by
disabling the DCE/RPC preprocessor.
This issue will be resolved in Snort 2.7 beta 2.
Workarounds:
Snort users who cannot upgrade immediately are advised to disable the
DCE/RPC preprocessor by removing the DCE/RPC preprocessor directives
from snort.conf and restarting Snort. However, be advised that disabling
the DCE/RPC preprocessor reduces detection capabilities for attacks in
DCE/RPC traffic. After upgrading, customers should reenable the DCE/RPC
preprocessor.
Detecting Attacks Against This Vulnerability:
Sourcefire will be releasing a rule pack that provides detection for
attacks against this vulnerability.
Has Sourcefire received any reports that this vulnerability has been
exploited?
- No. Sourcefire has not received any reports that this vulnerability
has been exploited.
Acknowledgments:
Sourcefire would like to thank Neel Mehta from IBM X-Force for reporting
this issue and working with us to resolve it.
-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys-and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Snort-announce mailing list
Snort-announce@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/snort-announce
.
Resolution
==========
All Snort users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/snort-2.6.1.3"
References
==========
[ 1 ] CVE-2006-5276
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5276
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200703-01.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
VAR-200702-0435 | CVE-2007-1008 | Apple iTunes Service disruption in (DoS) Vulnerabilities |
CVSS V2: 2.6 CVSS V3: - Severity: LOW |
Apple iTunes 7.0.2 allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted XML list of radio stations, which results in memory corruption. NOTE: iTunes retrieves the XML document from a static URL, which requires an attacker to perform DNS spoofing or man-in-the-middle attacks for exploitation. Apple iTunes is prone to a remote denial-of-service vulnerability because the application fails to handle malformed XML playlist files.
An attacker can exploit this issue to crash the application, triggering a denial-of-service condition.
Apple iTunes version 7.0.2 for Intel and PowerPC are vulnerable to this issue; other versions may also be affected
VAR-200702-0507 | CVE-2007-1043 | Ezboo webstats Vulnerabilities that bypass authentication |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Ezboo webstats, possibly 3.0.3, allows remote attackers to bypass authentication and gain access via a direct request to (1) update.php and (2) config.php. Ezboo webstats is a statistical tool for website monitoring
VAR-200702-0343 | CVE-2007-0963 | Cisco Firewall Services Module vulnerable to DoS via inspection of malformed SIP messages |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in Cisco Firewall Services Module (FWSM) 3.x before 3.1(3.3), when set to log at the "debug" level, allows remote attackers to cause a denial of service (device reboot) by sending packets that are not of a particular protocol such as TCP or UDP, which triggers the reboot during generation of Syslog message 710006. Cisco Firewall Services Module fails to properly inspect SIP messages. This vulnerability may allow a remote attacker to cause a denial of service condition. Multiple Cisco products are prone to multiple denial-of-service vulnerabilities.
Attackers can exploit these issues to cause vulnerable devices to reload, potentially causing denial-of-service conditions. Multiple security vulnerabilities exist in Cisco PIX 500 Series Security Appliances and Cisco ASA 5500 Series Adaptive Security Appliances: Processing packets sent to FWSM could lead to reload +---------------- --------------------------------------- This vulnerability causes FWSM to generate 710006 syslog messages when attempting to overload occurs. The following two conditions must be met for this vulnerability to occur: * FWSM receives a message with a device IP address and the message is not the following protocol: TCP, UDP, ICMP, OSPF, Failover, PIM, IGMP, and ESP. Vulnerabilities are independent of the source of the packets. * Logging must be enabled at a high enough level to generate 710006 syslog messages, the default is debug level (level 7). Note that logging is disabled by default, and Cisco recommends logging at the debug level for debugging and error correction purposes only. This vulnerability is documented in Cisco Bug ID as CSCse85707.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
Cisco Firewall Services Module Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA24172
VERIFY ADVISORY:
http://secunia.com/advisories/24172/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, DoS
WHERE:
>From remote
SOFTWARE:
Cisco Firewall Services Module (FWSM) 3.x
http://secunia.com/product/8614/
DESCRIPTION:
Some vulnerabilities and a security issue have been reported in Cisco
Firewall Services, which can be exploited by malicious people to cause
a DoS or bypass certain security restrictions.
1) An unspecified error within the enhanced inspection of HTTP
traffic can be exploited to cause the device to reload via specially
crafted HTTP traffic.
Successful exploitation requires that enhanced inspection is
enabled.
2) An error within the inspection of SIP packets can be exploited to
cause the device to reload via specially crafted SIP packets.
Successful exploitation requires that SIP inspection is enabled.
3) An unspecified error when processing malformed HTTPS requests can
be exploited to cause the device to reload by sending specially
crafted HTTPS requests.
Successful exploitation requires that "authentication for network
access" (auth-proxy) is enabled.
4) An error when processing HTTP requests with a very long URL can be
exploited to cause the device to reload, but requires that
"authentication for network access" (auth-proxy) is enabled.
5) An unspecified error exists when processing HTTPS traffic that is
directed to the FWSM. This can be exploited to cause the device to
reload by sending specially crafted HTTPS requests, but requires that
the HTTPS server is enabled.
6) An unspecified error when processing malformed SNMP requests from
a trusted device can be exploited to cause the affected device to
reload.
Successful exploitation requires that the other, trusted device has
explicit SNMP poll access.
7) A security issue when manipulating ACLs (Access Control Lists)
that make use of object groups can corrupt ACLs, resulting in ACEs
(Access Control Entries) being skipped or not evaluated in order,
which can be exploited to bypass certain security restrictions.
Note: Only an administrative user can change ACLs. Additionally, this
does not affected devices which are reloaded after ACLs have been
manipulated.
A vulnerability that could cause the device to reload when
"debugging" is enabled has also been reported.
SOLUTION:
Apply updated software. Please see vendor advisory for a patch
matrix.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200702-0340 | CVE-2007-0960 | Cisco PIX/ASA User authentication in LOCAL Elevation of privilege vulnerability when using methods |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors. Cisco PIX 500 Series and Cisco ASA 5500 series The security appliance has user authentication. LOCAL A vulnerability exists that could allow elevation of privilege by remotely authenticated users when using the method. According to information from Cisco Systems, users who exploit this vulnerability are privileged. 0 Defined in the local database, only in this case the user is privileged 15 Has been reported to be able to be elevated to administrator privileges.On devices under certain conditions, it may be possible to gain administrative privileges from a remotely authenticated user.
Exploiting this issue allows authenticated attackers to gain administrative privileges on affected computers. This may facilitate the complete compromise of the affected device. This issue is tracked by Cisco Bug ID: CSCsh33287. Both the Cisco PIX and the ASA are very popular firewall devices that provide firewall services capable of stateful packet filtering and deep packet inspection. Remote attackers may use this loophole to elevate their privileges on the device. Only users who meet these conditions can escalate their assigned privileges to level 15. Once an administrator, users can change every aspect of device configuration and operation. A device is affected by this vulnerability if the following line exists in the device configuration: pixfirewall(config)# aaa authentication enable console LOCAL pixfirewall(config)# username <user_name> password <secret_pwd> privilege 0 This vulnerability is documented in Cisco Bug ID as CSCsh33287.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
Cisco PIX and ASA Privilege Escalation and Denial of Service
SECUNIA ADVISORY ID:
SA24160
VERIFY ADVISORY:
http://secunia.com/advisories/24160/
CRITICAL:
Moderately critical
IMPACT:
Privilege escalation, DoS
WHERE:
>From remote
OPERATING SYSTEM:
Cisco PIX 7.x
http://secunia.com/product/6102/
Cisco Adaptive Security Appliance (ASA) 7.x
http://secunia.com/product/6115/
DESCRIPTION:
Some vulnerabilities have been reported in Cisco PIX and ASA, which
can be exploited by malicious users to gain escalated privileges and
by malicious people to cause a DoS (Denial of Service).
1) An unspecified error exists within the enhanced HTTP inspection
feature. This can be exploited to crash the device via malformed HTTP
requests, but requires that enhanced HTTP inspection is enabled.
2) An unspecified error exists within the SIP packet inspection. This
can be exploited to crash the device by sending specially crafted SIP
packets, but requires that "inspect" is enabled (it is disabled by
default).
3) An unspecified error exists within the TCP-based protocol
inspection. This can be exploited to crash the device via malformed
packets, but requires that inspection of TCP-based protocols (e.g.
FTP or HTTP) is enabled. Successful exploitation
allows gaining privilege level 15 and changing the complete
configuration of the device, but requires that the attacker can
authenticate to the device and that he is defined in the local
database with privilege level 0.
SOLUTION:
Apply updated versions. See the vendor advisory for a patch matrix.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
2) An unspecified vulnerability when manipulating ACLs (Access
Control Lists) that makes use of object groups can be exploited to
corrupt ACLs, resulting in ACE (Access Control Entries) being skipped
or not evaluated in order.
Successful exploitation requires that "SIP fixup" is enabled, which
is the default setting
VAR-200702-0347 | CVE-2007-0967 | Cisco Firewall Services Module vulnerable to DoS via inspection of malformed SIP messages |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco Firewall Services Module (FWSM) 3.x before 3.1(3.1) allows remote attackers to cause a denial of service (device reboot) via malformed SNMP requests. Cisco Firewall Services Module fails to properly inspect SIP messages. This vulnerability may allow a remote attacker to cause a denial of service condition. Multiple Cisco products are prone to multiple denial-of-service vulnerabilities.
Attackers can exploit these issues to cause vulnerable devices to reload, potentially causing denial-of-service conditions. This vulnerability is documented in Cisco Bug ID as CSCse52679.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
1) An unspecified error within the enhanced inspection of HTTP
traffic can be exploited to cause the device to reload via specially
crafted HTTP traffic.
Successful exploitation requires that enhanced inspection is
enabled.
2) An error within the inspection of SIP packets can be exploited to
cause the device to reload via specially crafted SIP packets.
Successful exploitation requires that SIP inspection is enabled.
3) An unspecified error when processing malformed HTTPS requests can
be exploited to cause the device to reload by sending specially
crafted HTTPS requests.
Successful exploitation requires that "authentication for network
access" (auth-proxy) is enabled.
4) An error when processing HTTP requests with a very long URL can be
exploited to cause the device to reload, but requires that
"authentication for network access" (auth-proxy) is enabled.
5) An unspecified error exists when processing HTTPS traffic that is
directed to the FWSM. This can be exploited to cause the device to
reload by sending specially crafted HTTPS requests, but requires that
the HTTPS server is enabled.
Successful exploitation requires that the other, trusted device has
explicit SNMP poll access.
7) A security issue when manipulating ACLs (Access Control Lists)
that make use of object groups can corrupt ACLs, resulting in ACEs
(Access Control Entries) being skipped or not evaluated in order,
which can be exploited to bypass certain security restrictions.
Note: Only an administrative user can change ACLs. Additionally, this
does not affected devices which are reloaded after ACLs have been
manipulated.
A vulnerability that could cause the device to reload when
"debugging" is enabled has also been reported.
SOLUTION:
Apply updated software. Please see vendor advisory for a patch
matrix.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200702-0348 | CVE-2007-0968 | Cisco Firewall Services Module vulnerable to DoS via inspection of malformed SIP messages |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in Cisco Firewall Services Module (FWSM) before 2.3(4.7) and 3.x before 3.1(3.1) causes the access control entries (ACE) in an ACL to be improperly evaluated, which allows remote authenticated users to bypass intended certain ACL protections. Cisco Firewall Services Module fails to properly inspect SIP messages. This vulnerability may allow a remote attacker to cause a denial of service condition. Multiple Cisco products are prone to multiple denial-of-service vulnerabilities.
Attackers can exploit these issues to cause vulnerable devices to reload, potentially causing denial-of-service conditions. Multiple security vulnerabilities exist in Cisco PIX 500 Series Security Appliances and Cisco ASA 5500 Series Adaptive Security Appliances: Enhanced Inspection Malformed HTTP Traffic +--------------------- -------------------------- Cisco PIX and ASA Security Appliances may crash when checking for malformed HTTP requests if Enhanced HTTP Inspection is enabled . If HTTP application inspection is enabled, the configuration will contain a line similar to inspect http, where the name of the specific HTTP mapping. Note that normal HTTP inspection (configured via inspect http, without HTTP mapping) is not affected by this vulnerability. This vulnerability is documented in Cisco Bug ID as CSCsd75794. To trigger this vulnerability, the SIP fixup (for 6.x software) or inspect (for 7.x software) function must be enabled. SIP fixup (in 6.x and earlier) and SIP check (in 7. x and earlier) is enabled by default. This vulnerability is documented in Cisco Bug IDs as CSCsd97077 and CSCse27708. Check malformed TCP packet flow+------------------------------------------- ------ Cisco PIX and ASA equipment may crash when processing malformed packet flow based on TCP protocol. Protocols must be handled through the inspect function. The message may be sent to the device, or it may only pass through the device. Cisco PIX and ASA appliances can inspect the following TCP-based protocols: * Computer Telephony Interface Quick Buffer Encoding (CITQBE) * Distributed Computing Environment/Remote Procedure Call (DCE/RPC) * Domain Name Service (DNS) * Extended Simple Mail Transfer Protocol (ESMTP) * File Transfer Protocol (FTP) * H.323 Protocol * Hypertext Transfer Protocol (HTTP) * Internet Location Server (ILS) * Instant Messaging (IM) * Point-to-Point Tunneling Protocol (PPTP) * Remote Shell (RSH ) * Real Time Streaming Protocol (RTSP) * Session Initiation Protocol (SIP) *...
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
1) An unspecified error within the enhanced inspection of HTTP
traffic can be exploited to cause the device to reload via specially
crafted HTTP traffic.
Successful exploitation requires that enhanced inspection is
enabled.
2) An error within the inspection of SIP packets can be exploited to
cause the device to reload via specially crafted SIP packets.
Successful exploitation requires that SIP inspection is enabled.
3) An unspecified error when processing malformed HTTPS requests can
be exploited to cause the device to reload by sending specially
crafted HTTPS requests.
Successful exploitation requires that "authentication for network
access" (auth-proxy) is enabled.
4) An error when processing HTTP requests with a very long URL can be
exploited to cause the device to reload, but requires that
"authentication for network access" (auth-proxy) is enabled.
5) An unspecified error exists when processing HTTPS traffic that is
directed to the FWSM. This can be exploited to cause the device to
reload by sending specially crafted HTTPS requests, but requires that
the HTTPS server is enabled.
6) An unspecified error when processing malformed SNMP requests from
a trusted device can be exploited to cause the affected device to
reload.
Successful exploitation requires that the other, trusted device has
explicit SNMP poll access.
Note: Only an administrative user can change ACLs. Additionally, this
does not affected devices which are reloaded after ACLs have been
manipulated.
A vulnerability that could cause the device to reload when
"debugging" is enabled has also been reported.
SOLUTION:
Apply updated software. Please see vendor advisory for a patch
matrix.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200702-0344 | CVE-2007-0964 | Cisco Firewall Services Module vulnerable to DoS via inspection of malformed SIP messages |
CVSS V2: 5.4 CVSS V3: - Severity: MEDIUM |
Cisco FWSM 3.x before 3.1(3.18), when authentication is configured to use "aaa authentication match" or "aaa authentication include", allows remote attackers to cause a denial of service (device reboot) via a malformed HTTPS request. Cisco Firewall Services Module fails to properly inspect SIP messages. This vulnerability may allow a remote attacker to cause a denial of service condition. Multiple Cisco products are prone to multiple denial-of-service vulnerabilities.
Attackers can exploit these issues to cause vulnerable devices to reload, potentially causing denial-of-service conditions. Multiple security vulnerabilities exist in Cisco PIX 500 Series Security Appliances and Cisco ASA 5500 Series Adaptive Security Appliances: Enhanced Inspection Malformed HTTP Traffic May Cause Overload+----------------- ----------------------------------------------- This vulnerability may Causes FWSM to overload when performing enhanced inspection of HTTP requests and inspecting malformed HTTP requests. This command is disabled by default. This vulnerability is documented in Cisco Bug ID as CSCsd75794.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
Cisco Firewall Services Module Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA24172
VERIFY ADVISORY:
http://secunia.com/advisories/24172/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, DoS
WHERE:
>From remote
SOFTWARE:
Cisco Firewall Services Module (FWSM) 3.x
http://secunia.com/product/8614/
DESCRIPTION:
Some vulnerabilities and a security issue have been reported in Cisco
Firewall Services, which can be exploited by malicious people to cause
a DoS or bypass certain security restrictions.
1) An unspecified error within the enhanced inspection of HTTP
traffic can be exploited to cause the device to reload via specially
crafted HTTP traffic.
Successful exploitation requires that enhanced inspection is
enabled.
2) An error within the inspection of SIP packets can be exploited to
cause the device to reload via specially crafted SIP packets.
Successful exploitation requires that SIP inspection is enabled.
3) An unspecified error when processing malformed HTTPS requests can
be exploited to cause the device to reload by sending specially
crafted HTTPS requests.
Successful exploitation requires that "authentication for network
access" (auth-proxy) is enabled.
4) An error when processing HTTP requests with a very long URL can be
exploited to cause the device to reload, but requires that
"authentication for network access" (auth-proxy) is enabled.
5) An unspecified error exists when processing HTTPS traffic that is
directed to the FWSM. This can be exploited to cause the device to
reload by sending specially crafted HTTPS requests, but requires that
the HTTPS server is enabled.
6) An unspecified error when processing malformed SNMP requests from
a trusted device can be exploited to cause the affected device to
reload.
Successful exploitation requires that the other, trusted device has
explicit SNMP poll access.
7) A security issue when manipulating ACLs (Access Control Lists)
that make use of object groups can corrupt ACLs, resulting in ACEs
(Access Control Entries) being skipped or not evaluated in order,
which can be exploited to bypass certain security restrictions.
Note: Only an administrative user can change ACLs. Additionally, this
does not affected devices which are reloaded after ACLs have been
manipulated.
A vulnerability that could cause the device to reload when
"debugging" is enabled has also been reported.
SOLUTION:
Apply updated software. Please see vendor advisory for a patch
matrix.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200702-0345 | CVE-2007-0965 | Cisco Firewall Services Module vulnerable to DoS via inspection of malformed SIP messages |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco FWSM 3.x before 3.1(3.2), when authentication is configured to use "aaa authentication match" or "aaa authentication include", allows remote attackers to cause a denial of service (device reboot) via a long HTTP request. Cisco Firewall Services Module fails to properly inspect SIP messages. This vulnerability may allow a remote attacker to cause a denial of service condition. Multiple Cisco products are prone to multiple denial-of-service vulnerabilities.
Attackers can exploit these issues to cause vulnerable devices to reload, potentially causing denial-of-service conditions. Multiple security vulnerabilities exist in Cisco PIX 500 Series Security Appliances and Cisco ASA 5500 Series Adaptive Security Appliances: Enhanced Inspection Malformed HTTP Traffic +--------------------- -------------------------- Cisco PIX and ASA Security Appliances may crash when checking for malformed HTTP requests if Enhanced HTTP Inspection is enabled . If HTTP application inspection is enabled, the configuration will contain a line similar to inspect http, where the name of the specific HTTP mapping. Note that normal HTTP inspection (configured via inspect http, without HTTP mapping) is not affected by this vulnerability. This vulnerability is documented in Cisco Bug ID as CSCsd75794. To trigger this vulnerability, the SIP fixup (for 6.x software) or inspect (for 7.x software) function must be enabled. SIP fixup (in 6.x and earlier) and SIP check (in 7. x and earlier) is enabled by default. This vulnerability is documented in Cisco Bug IDs as CSCsd97077 and CSCse27708. Check malformed TCP packet flow+------------------------------------------- ------ Cisco PIX and ASA equipment may crash when processing malformed packet flow based on TCP protocol. Protocols must be handled through the inspect function. The message may be sent to the device, or it may only pass through the device. Cisco PIX and ASA appliances can inspect the following TCP-based protocols: * Computer Telephony Interface Quick Buffer Encoding (CITQBE) * Distributed Computing Environment/Remote Procedure Call (DCE/RPC) * Domain Name Service (DNS) * Extended Simple Mail Transfer Protocol (ESMTP) * File Transfer Protocol (FTP) * H.323 Protocol * Hypertext Transfer Protocol (HTTP) * Internet Location Server (ILS) * Instant Messaging (IM) * Point-to-Point Tunneling Protocol (PPTP) * Remote Shell (RSH ) * Real Time Streaming Protocol (RTSP) * Session Initiation Protocol (SIP) *...
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
Cisco Firewall Services Module Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA24172
VERIFY ADVISORY:
http://secunia.com/advisories/24172/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, DoS
WHERE:
>From remote
SOFTWARE:
Cisco Firewall Services Module (FWSM) 3.x
http://secunia.com/product/8614/
DESCRIPTION:
Some vulnerabilities and a security issue have been reported in Cisco
Firewall Services, which can be exploited by malicious people to cause
a DoS or bypass certain security restrictions.
1) An unspecified error within the enhanced inspection of HTTP
traffic can be exploited to cause the device to reload via specially
crafted HTTP traffic.
Successful exploitation requires that enhanced inspection is
enabled.
2) An error within the inspection of SIP packets can be exploited to
cause the device to reload via specially crafted SIP packets.
Successful exploitation requires that SIP inspection is enabled.
3) An unspecified error when processing malformed HTTPS requests can
be exploited to cause the device to reload by sending specially
crafted HTTPS requests.
Successful exploitation requires that "authentication for network
access" (auth-proxy) is enabled.
4) An error when processing HTTP requests with a very long URL can be
exploited to cause the device to reload, but requires that
"authentication for network access" (auth-proxy) is enabled.
5) An unspecified error exists when processing HTTPS traffic that is
directed to the FWSM. This can be exploited to cause the device to
reload by sending specially crafted HTTPS requests, but requires that
the HTTPS server is enabled.
6) An unspecified error when processing malformed SNMP requests from
a trusted device can be exploited to cause the affected device to
reload.
Successful exploitation requires that the other, trusted device has
explicit SNMP poll access.
7) A security issue when manipulating ACLs (Access Control Lists)
that make use of object groups can corrupt ACLs, resulting in ACEs
(Access Control Entries) being skipped or not evaluated in order,
which can be exploited to bypass certain security restrictions.
Note: Only an administrative user can change ACLs. Additionally, this
does not affected devices which are reloaded after ACLs have been
manipulated.
A vulnerability that could cause the device to reload when
"debugging" is enabled has also been reported.
SOLUTION:
Apply updated software. Please see vendor advisory for a patch
matrix.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200702-0346 | CVE-2007-0966 | Cisco Firewall Services Module vulnerable to DoS via inspection of malformed SIP messages |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco Firewall Services Module (FWSM) 3.x before 3.1(3.11), when the HTTPS server is enabled, allows remote attackers to cause a denial of service (device reboot) via certain HTTPS traffic. Cisco Firewall Services Module fails to properly inspect SIP messages. This vulnerability may allow a remote attacker to cause a denial of service condition. Multiple Cisco products are prone to multiple denial-of-service vulnerabilities.
Attackers can exploit these issues to cause vulnerable devices to reload, potentially causing denial-of-service conditions. Multiple security vulnerabilities exist in Cisco PIX 500 Series Security Appliances and Cisco ASA 5500 Series Adaptive Security Appliances: Enhanced Inspection Malformed HTTP Traffic +--------------------- -------------------------- Cisco PIX and ASA Security Appliances may crash when checking for malformed HTTP requests if Enhanced HTTP Inspection is enabled . If HTTP application inspection is enabled, the configuration will contain a line similar to inspect http, where the name of the specific HTTP mapping. Note that normal HTTP inspection (configured via inspect http, without HTTP mapping) is not affected by this vulnerability. This vulnerability is documented in Cisco Bug ID as CSCsd75794. To trigger this vulnerability, the SIP fixup (for 6.x software) or inspect (for 7.x software) function must be enabled. SIP fixup (in 6.x and earlier) and SIP check (in 7. x and earlier) is enabled by default. This vulnerability is documented in Cisco Bug IDs as CSCsd97077 and CSCse27708. Check malformed TCP packet flow+------------------------------------------- ------ Cisco PIX and ASA equipment may crash when processing malformed packet flow based on TCP protocol. Protocols must be handled through the inspect function. The message may be sent to the device, or it may only pass through the device. Cisco PIX and ASA appliances can inspect the following TCP-based protocols: * Computer Telephony Interface Quick Buffer Encoding (CITQBE) * Distributed Computing Environment/Remote Procedure Call (DCE/RPC) * Domain Name Service (DNS) * Extended Simple Mail Transfer Protocol (ESMTP) * File Transfer Protocol (FTP) * H.323 Protocol * Hypertext Transfer Protocol (HTTP) * Internet Location Server (ILS) * Instant Messaging (IM) * Point-to-Point Tunneling Protocol (PPTP) * Remote Shell (RSH ) * Real Time Streaming Protocol (RTSP) * Session Initiation Protocol (SIP) *...
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
1) An unspecified error within the enhanced inspection of HTTP
traffic can be exploited to cause the device to reload via specially
crafted HTTP traffic.
Successful exploitation requires that enhanced inspection is
enabled.
2) An error within the inspection of SIP packets can be exploited to
cause the device to reload via specially crafted SIP packets.
Successful exploitation requires that SIP inspection is enabled.
3) An unspecified error when processing malformed HTTPS requests can
be exploited to cause the device to reload by sending specially
crafted HTTPS requests.
Successful exploitation requires that "authentication for network
access" (auth-proxy) is enabled.
4) An error when processing HTTP requests with a very long URL can be
exploited to cause the device to reload, but requires that
"authentication for network access" (auth-proxy) is enabled.
5) An unspecified error exists when processing HTTPS traffic that is
directed to the FWSM.
6) An unspecified error when processing malformed SNMP requests from
a trusted device can be exploited to cause the affected device to
reload.
Successful exploitation requires that the other, trusted device has
explicit SNMP poll access.
7) A security issue when manipulating ACLs (Access Control Lists)
that make use of object groups can corrupt ACLs, resulting in ACEs
(Access Control Entries) being skipped or not evaluated in order,
which can be exploited to bypass certain security restrictions.
Note: Only an administrative user can change ACLs. Additionally, this
does not affected devices which are reloaded after ACLs have been
manipulated.
A vulnerability that could cause the device to reload when
"debugging" is enabled has also been reported.
SOLUTION:
Apply updated software. Please see vendor advisory for a patch
matrix.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200702-0339 | CVE-2007-0959 | Cisco Firewall Services Module vulnerable to DoS via inspection of malformed SIP messages |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets. Cisco Firewall Services Module fails to properly inspect SIP messages. This vulnerability may allow a remote attacker to cause a denial of service condition. According to Cisco Systems information TCP base The protocol inspection feature is enabled by default.Crafted by a third party TCP Device processing disruption by processing packets (DoS) It may be in a state. Cisco PIX and ASA are prone to a privilege-escalation vulnerability.
Exploiting this issue allows authenticated attackers to gain administrative privileges on affected computers. This may facilitate the complete compromise of the affected device. This issue is tracked by Cisco Bug ID: CSCsh33287. Multiple Cisco products are prone to multiple denial-of-service vulnerabilities.
Attackers can exploit these issues to cause vulnerable devices to reload, potentially causing denial-of-service conditions. Protocols must be handled through the inspect function. The message may be sent to the device, or it may only pass through the device. Cisco PIX and ASA appliances can inspect the following TCP-based protocols: * Computer Telephony Interface Quick Buffer Encoding (CITQBE) * Distributed Computing Environment/Remote Procedure Call (DCE/RPC) * Domain Name Service (DNS) * Extended Simple Mail Transfer Protocol (ESMTP) * File Transfer Protocol (FTP) * H.323 Protocol * Hypertext Transfer Protocol (HTTP) * Internet Location Server (ILS) * Instant Messaging (IM) * Point-to-Point Tunneling Protocol (PPTP) * Remote Shell (RSH ) * Real Time Streaming Protocol (RTSP) * Session Initiation Protocol (SIP) * Small (or Simple) Client Control Protocol (SCCP) * Simple Mail Transfer Protocol (SMTP) * Oracle SQL*Net * Sun RPC.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
Cisco PIX and ASA Privilege Escalation and Denial of Service
SECUNIA ADVISORY ID:
SA24160
VERIFY ADVISORY:
http://secunia.com/advisories/24160/
CRITICAL:
Moderately critical
IMPACT:
Privilege escalation, DoS
WHERE:
>From remote
OPERATING SYSTEM:
Cisco PIX 7.x
http://secunia.com/product/6102/
Cisco Adaptive Security Appliance (ASA) 7.x
http://secunia.com/product/6115/
DESCRIPTION:
Some vulnerabilities have been reported in Cisco PIX and ASA, which
can be exploited by malicious users to gain escalated privileges and
by malicious people to cause a DoS (Denial of Service).
1) An unspecified error exists within the enhanced HTTP inspection
feature. This can be exploited to crash the device via malformed HTTP
requests, but requires that enhanced HTTP inspection is enabled.
2) An unspecified error exists within the SIP packet inspection. This
can be exploited to crash the device by sending specially crafted SIP
packets, but requires that "inspect" is enabled (it is disabled by
default).
3) An unspecified error exists within the TCP-based protocol
inspection. This can be exploited to crash the device via malformed
packets, but requires that inspection of TCP-based protocols (e.g.
FTP or HTTP) is enabled.
4) An unspecified error within the "LOCAL" authentication method can
be exploited to gain escalated privileges. Successful exploitation
allows gaining privilege level 15 and changing the complete
configuration of the device, but requires that the attacker can
authenticate to the device and that he is defined in the local
database with privilege level 0.
SOLUTION:
Apply updated versions. See the vendor advisory for a patch matrix.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200702-0342 | CVE-2007-0962 | Cisco PIX/ASA and FWSM Rogue HTTP Service disruption due to traffic (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when "inspect http" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic. According to Cisco Systems information, advanced HTTP The inspection function is disabled by default and is "inspect http" (HTTP Inspection ) Has been reported to be unaffected.Crafted by a third party HTTP Processing the request causes the device to interfere with service operation (DoS) It may be in a state. Cisco PIX and ASA are prone to a privilege-escalation vulnerability.
Exploiting this issue allows authenticated attackers to gain administrative privileges on affected computers. This may facilitate the complete compromise of the affected device. This issue is tracked by Cisco Bug ID: CSCsh33287. The Cisco PIX/ASA and Firewall Services Module (FWSM) provide firewall services with stateful packet filtering and deep packet inspection. Note that normal HTTP inspection (configured via inspect http, without HTTP mapping) is not affected by this vulnerability.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
Cisco PIX and ASA Privilege Escalation and Denial of Service
SECUNIA ADVISORY ID:
SA24160
VERIFY ADVISORY:
http://secunia.com/advisories/24160/
CRITICAL:
Moderately critical
IMPACT:
Privilege escalation, DoS
WHERE:
>From remote
OPERATING SYSTEM:
Cisco PIX 7.x
http://secunia.com/product/6102/
Cisco Adaptive Security Appliance (ASA) 7.x
http://secunia.com/product/6115/
DESCRIPTION:
Some vulnerabilities have been reported in Cisco PIX and ASA, which
can be exploited by malicious users to gain escalated privileges and
by malicious people to cause a DoS (Denial of Service).
1) An unspecified error exists within the enhanced HTTP inspection
feature. This can be exploited to crash the device via malformed HTTP
requests, but requires that enhanced HTTP inspection is enabled.
2) An unspecified error exists within the SIP packet inspection. This
can be exploited to crash the device by sending specially crafted SIP
packets, but requires that "inspect" is enabled (it is disabled by
default).
3) An unspecified error exists within the TCP-based protocol
inspection. This can be exploited to crash the device via malformed
packets, but requires that inspection of TCP-based protocols (e.g.
FTP or HTTP) is enabled.
4) An unspecified error within the "LOCAL" authentication method can
be exploited to gain escalated privileges. Successful exploitation
allows gaining privilege level 15 and changing the complete
configuration of the device, but requires that the attacker can
authenticate to the device and that he is defined in the local
database with privilege level 0.
SOLUTION:
Apply updated versions. See the vendor advisory for a patch matrix.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
Successful exploitation requires that "SIP fixup" is enabled, which
is the default setting.
2) A security issue when manipulating ACLs (Access Control Lists)
that make use of object groups can corrupt ACLs, resulting in ACEs
(Access Control Entries) being skipped or not evaluated in order,
which can be exploited to bypass certain security restrictions.
Note: Only an administrative user can change ACLs. Additionally, this
does not affected devices which are reloaded after ACLs have been
manipulated
VAR-200702-0341 | CVE-2007-0961 | Cisco Firewall Services Module vulnerable to DoS via inspection of malformed SIP messages |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the "inspect sip" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets. Cisco Firewall Services Module fails to properly inspect SIP messages. This vulnerability may allow a remote attacker to cause a denial of service condition. According to information from Cisco Systems, SIP The inspection function is activated by default.Crafted by a third party SIP Device processing disruption by processing packets (DoS) It may be in a state. Cisco PIX and ASA are prone to a privilege-escalation vulnerability.
Exploiting this issue allows authenticated attackers to gain administrative privileges on affected computers. This may facilitate the complete compromise of the affected device. This issue is tracked by Cisco Bug ID: CSCsh33287. Note that normal HTTP inspection (configured via inspect http, without HTTP mapping) is not affected by this vulnerability. To trigger this vulnerability, the SIP fixup (for 6.x software) or inspect (for 7.x software) function must be enabled. SIP fixup (in 6.x and earlier) and SIP check (in 7. x and earlier) is enabled by default. Check malformed TCP packet flow+------------------------------------------- ------ Cisco PIX and ASA equipment may crash when processing malformed packet flow based on TCP protocol. Protocols must be handled through the inspect function. The message may be sent to the device, or it may only pass through the device. Cisco PIX and ASA appliances can inspect the following TCP-based protocols: * Computer Telephony Interface Quick Buffer Encoding (CITQBE) * Distributed Computing Environment/Remote Procedure Call (DCE/RPC) * Domain Name Service (DNS) * Extended Simple Mail Transfer Protocol (ESMTP) * File Transfer Protocol (FTP) * H.323 Protocol * Hypertext Transfer Protocol (HTTP) * Internet Location Server (ILS) * Instant Messaging (IM) * Point-to-Point Tunneling Protocol (PPTP) * Remote Shell (RSH ) * Real Time Streaming Protocol (RTSP) * Session Initiation Protocol (SIP) *...
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
Try it out online:
http://secunia.com/software_inspector/
----------------------------------------------------------------------
TITLE:
Cisco PIX and ASA Privilege Escalation and Denial of Service
SECUNIA ADVISORY ID:
SA24160
VERIFY ADVISORY:
http://secunia.com/advisories/24160/
CRITICAL:
Moderately critical
IMPACT:
Privilege escalation, DoS
WHERE:
>From remote
OPERATING SYSTEM:
Cisco PIX 7.x
http://secunia.com/product/6102/
Cisco Adaptive Security Appliance (ASA) 7.x
http://secunia.com/product/6115/
DESCRIPTION:
Some vulnerabilities have been reported in Cisco PIX and ASA, which
can be exploited by malicious users to gain escalated privileges and
by malicious people to cause a DoS (Denial of Service).
1) An unspecified error exists within the enhanced HTTP inspection
feature. This can be exploited to crash the device via malformed HTTP
requests, but requires that enhanced HTTP inspection is enabled.
2) An unspecified error exists within the SIP packet inspection. This
can be exploited to crash the device by sending specially crafted SIP
packets, but requires that "inspect" is enabled (it is disabled by
default).
3) An unspecified error exists within the TCP-based protocol
inspection. This can be exploited to crash the device via malformed
packets, but requires that inspection of TCP-based protocols (e.g.
FTP or HTTP) is enabled.
4) An unspecified error within the "LOCAL" authentication method can
be exploited to gain escalated privileges. Successful exploitation
allows gaining privilege level 15 and changing the complete
configuration of the device, but requires that the attacker can
authenticate to the device and that he is defined in the local
database with privilege level 0.
SOLUTION:
Apply updated versions. See the vendor advisory for a patch matrix.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
Successful exploitation requires that "SIP fixup" is enabled, which
is the default setting.
2) A security issue when manipulating ACLs (Access Control Lists)
that make use of object groups can corrupt ACLs, resulting in ACEs
(Access Control Entries) being skipped or not evaluated in order,
which can be exploited to bypass certain security restrictions.
Note: Only an administrative user can change ACLs. Additionally, this
does not affected devices which are reloaded after ACLs have been
manipulated
VAR-200702-0267 | CVE-2007-0931 | Aruba Mobility Controller vulnerable to privilege escalation |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in the management interfaces in (1) Aruba Mobility Controllers 200, 800, 2400, and 6000 and (2) Alcatel-Lucent OmniAccess Wireless 43xx and 6000 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via long credential strings. The Aruba Mobility Controller Management Interface contains a buffer overflow. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system. Aruba Mobility Controller is prone to multiple vulnerabilities that may lead to authentication bypass, remote code execution, denial-of-service conditions.
----------------------------------------------------------------------
Secunia is proud to announce the availability of the Secunia Software
Inspector.
The Secunia Software Inspector is a free service that detects insecure
versions of software that you may have installed in your system. When
insecure versions are detected, the Secunia Software Inspector also
provides thorough guidelines for updating the software to the latest
secure version from the vendor.
2) An error in the guest account authentication process within the
Captive Portal can be exploited to e.g. gain access to administrative
sections without specifying a password.
SOLUTION:
Update to the latest patched firmware version.
https://support.arubanetworks.com
PROVIDED AND/OR DISCOVERED BY:
John Munther and Maxim Salomon, n.runs AG
ORIGINAL ADVISORY:
http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052382.html
http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052380.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------