VARIoT IoT vulnerabilities database

VAR-200505-0290 | CVE-2005-1408 | Apple Keynote Local File Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Apple Keynote 2.0 and 2.0.1 allows remote attackers to read arbitrary files via the keynote: URI handler in a crafted Keynote presentation.
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Keynote Arbitrary File Retrieval Vulnerability
SECUNIA ADVISORY ID:
SA15508
VERIFY ADVISORY:
http://secunia.com/advisories/15508/
CRITICAL:
Less critical
IMPACT:
Exposure of system information, Exposure of sensitive information
WHERE:
>From remote
SOFTWARE:
Apple Keynote 2.x
http://secunia.com/product/5156/
DESCRIPTION:
David Remahl has reported a vulnerability in Keynote, which can be
exploited by malicious people to gain knowledge of sensitive
information.
SOLUTION:
Update to version 2.0.2.
http://www.apple.com/iwork/keynote/download/
PROVIDED AND/OR DISCOVERED BY:
David Remahl
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=301713
David Remahl:
http://remahl.se/david/vuln/016/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200505-1218 | CVE-2005-1254 | Ipswitch IMail IMAP SELECT Command denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument. Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code.
The vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues. Ipswitch IMail server is a Windows-based communication and collaboration solution. However, this vulnerability cannot be further exploited. Ipswitch IMail IMAP SELECT Command DoS Vulnerability
iDEFENSE Security Advisory 05.24.05
www.idefense.com/application/poi/display?id=241&type=vulnerabilities
May 24, 2005
I. BACKGROUND
Ipswitch IMail server is a Windows based messaging solution with a
customer base of over 53 million users. More information about the
application is available at:
http://www.ipswitch.com/products/IMail_Server/index.html.
II.
The problem specifically exists in the handling of long arguments to the
SELECT command. When a string approximately 260 bytes in size is
supplied a stack-based buffer overflow occurs that results in an
unhandled access violation forcing the daemon to exit. The issue is not
believed to be further exploitable.
III. ANALYSIS
Successful exploitation allows remote to crash vulnerable IMAP servers
and thereby prevent legitimate usage. The SELECT command is only
available post authentication and therefore valid credentials are
required to exploit this vulnerability
IV. DETECTION
iDEFENSE has confirmed the existence of this vulnerability in the latest
version of Ipswitch IMAIL, version 8.13. Version 8.12 is also confirmed
as vulnerable. It is suspected that earlier versions are vulnerable as
well.
V. WORKAROUND
As this vulnerability is exploited after authentication occurs, ensuring
that only trusted users have accounts can mitigate the risk somwhat. As
a more effective workaround, consider limiting access to the IMAP server
by filtering TCP port 143. If possible, consider disabling IMAP and
forcing users to use POP3.
VI. VENDOR RESPONSE
The vendor has released the following patch to fix this vulnerability:
ftp://ftp.ipswitch.com/Ipswitch/Product_Support/IMail/imail82hf2.exe
The associated vendor advisory can be found at:
http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf
2.html
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-1254 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.
VIII. DISCLOSURE TIMELINE
04/15/2005 Initial vendor notification
05/10/2005 Initial vendor response
05/24/2005 Coordinated public disclosure
IX. CREDIT
Sebastian Apelt is credited with this discovery.
Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp
Free tools, research and upcoming events
http://labs.idefense.com
X. LEGAL NOTICES
Copyright (c) 2005 iDEFENSE, Inc.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-200505-1216 | CVE-2005-1249 | Ipswitch IMail IMAP SELECT Command denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop. Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code.
The vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues. Attackers can use this vulnerability to cause the target service to crash. The cause of the vulnerability is the handling of extremely long parameters of the SELECT command. However, this vulnerability cannot be further exploited. Ipswitch IMail IMAP LSUB DoS Vulnerability
iDEFENSE Security Advisory 05.24.05
www.idefense.com/application/poi/display?id=245&type=vulnerabilities
May 24, 2005
I. BACKGROUND
Ipswitch Collaboration Suite (ICS) is a comprehensive communication and
collaboration solution for Microsoft Windows with a customer base of
over 53 million users. More information is available on the vendor's
website:
http://www.ipswitch.com/products/IMail_Server/index.html
II.
The problem specifically exists within IMAPD32.EXE upon parsing a
malformed LSUB command. An attacker can cause the daemon to produce
heavy load by transmitting a long string of NULL characters to the
'LSUB' IMAP directive. This, in turn, causes an infinite loop,
eventually exhausting all available system resources and causing a
denial of service.
III. ANALYSIS
Exploitation allows unauthenticated remote attackers to render the IMAP
server useless, thereby preventing legitimate users from retrieving e-
mail. This attack takes few resources to launch and can be repeated
to ensure that an unpatched system is unable to recover. Exploitation
requires a valid IMAP account, thus limiting the impact of this
vulnerability.
IV. DETECTION
iDEFENSE has confirmed the existence of this vulnerability in Ipswitch
IMail version 8.13. It is suspected that earlier versions are also
vulnerable.
V. WORKAROUND
As this vulnerability is exploited after authentication occurs, ensuring
that only trusted users have accounts can mitigate the risk somwhat. As
a more effective workaround, consider limiting access to the IMAP server
by filtering TCP port 143. If possible, consider disabling IMAP and
forcing users to use POP3.
VI. VENDOR RESPONSE
The vendor has released the following patch to fix this vulnerability:
ftp://ftp.ipswitch.com/Ipswitch/Product_Support/IMail/imail82hf2.exe
The associated vendor advisory can be found at:
http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf
2.html
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-1249 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.
VIII. DISCLOSURE TIMELINE
04/25/2005 Initial vendor notification
05/10/2005 Initial vendor response
05/24/2005 Public disclosure
IX. CREDIT
The discoverer of the first vulnerability wishes to remain anonymous.
Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp
Free tools, research and upcoming events
http://labs.idefense.com
X. LEGAL NOTICES
Copyright (c) 2005 iDEFENSE, Inc.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-200505-1217 | CVE-2005-1252 | Ipswitch IMail IMAP SELECT Command denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file. Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code.
The vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues. Ipswitch IMail server is a Windows-based communication and collaboration solution. There is a remote denial of service vulnerability in the Imail IMAP server of Ipswitch Inc. Attackers can use this vulnerability to cause the target service to crash. The cause of the vulnerability is the handling of extremely long parameters of the SELECT command. If the attacker can provide a string with a length of about 260 bytes, it may trigger a stack overflow and cause the daemon to exit. However, this vulnerability cannot be further exploited
VAR-200505-1219 | CVE-2005-1255 | Ipswitch IMail IMAP SELECT Command denial of service vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Multiple stack-based buffer overflows in the IMAP server in IMail 8.12 and 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allow remote attackers to execute arbitrary code via a LOGIN command with (1) a long username argument or (2) a long username argument that begins with a special character. Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code.
The vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues. Attackers can use this vulnerability to cause the target service to crash. However, this vulnerability cannot be further exploited. Ipswitch IMail IMAP LOGIN Remote Buffer Overflow Vulnerabilities
iDEFENSE Security Advisory 05.24.05
www.idefense.com/application/poi/display?id=243&type=vulnerabilities
May 24, 2005
I. BACKGROUND
Ipswitch Collaboration Suite (ICS) is a comprehensive communication and
collaboration solution for Microsoft Windows with a customer base of
over 53 million users. More information is available on the vendor's
website:
http://www.ipswitch.com/products/IMail_Server/index.html
II.
The first vulnerability specifically exists in the handling of a long
username to the LOGIN command. A long username argument of approximately
2,000 bytes will cause a stack based unicode string buffer overflow
providing the attacker with partial control over EIP. As this
vulnerability is in the LOGIN command itself, valid credentials are not
required.
The second vulnerability also exists in the handling of the LOGIN
command username argument, however it lends itself to easier
exploitation. If a large username starting with one of several special
characters is specified, a stack overflow occurs, allowing an attacker
to overwrite the saved instruction pointer and control execution flow.
Included in the list of special characters are the following: % : * @ &
Both of these vulnerabilities can lead to the execution of arbitrary
code.
III. Valid credentials are not required to for
exploitation, which heightens the impact of this vulnerability.
IV. DETECTION
iDEFENSE has confirmed the existence of this vulnerability in the latest
version of Ipswitch IMAIL, version 8.13. Version 8.12 is also confirmed
as vulnerable. It is suspected that earlier versions are also
vulnerable.
V. WORKAROUND
As this vulnerability is exploited before authentication occurs, the
only effective workaround is to limit access to the IMAP server by
filtering TCP port 143. If possible, consider disabling IMAP and forcing
users to use POP3.
VI. VENDOR RESPONSE
The vendor has released the following patch to fix this vulnerability:
ftp://ftp.ipswitch.com/Ipswitch/Product_Support/IMail/imail82hf2.exe
The associated vendor advisory can be found at:
http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf
2.html
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-1255 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.
VIII. DISCLOSURE TIMELINE
04/25/2005 Initial vendor notification
05/10/2005 Initial vendor response
05/24/2005 Public disclosure
IX. CREDIT
The discoverer of the first vulnerability wishes to remain anonymous.
iDEFENSE Labs is credited with the discovery of the second
vulnerability.
Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp
Free tools, research and upcoming events
http://labs.idefense.com
X. LEGAL NOTICES
Copyright (c) 2005 iDEFENSE, Inc.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-200505-1220 | CVE-2005-1256 | Ipswitch IMail IMAP SELECT Command denial of service vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name. Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code.
The vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues. Attackers can use this vulnerability to cause the target service to crash. However, this vulnerability cannot be further exploited. Ipswitch IMail IMAP STATUS Remote Buffer Overflow Vulnerability
iDEFENSE Security Advisory 05.24.05
www.idefense.com/application/poi/display?id=244&type=vulnerabilities
May 24, 2005
I. BACKGROUND
Ipswitch Collaboration Suite (ICS) is a comprehensive communication and
collaboration solution for Microsoft Windows with a customer base of
over 53 million users. More information is available on the vendor's
website:
http://www.ipswitch.com/products/IMail_Server/index.html
II.
The vulnerability specifically exists in the handling of a long mailbox
name to the STATUS command. A long mailbox name argument will cause a
stack based buffer overflow, providing the attacker with full control
over the saved return address on the stack. Once this has been achieved,
execution of arbitrary code becomes trivial. As this vulnerability is in
the STATUS command, which requires that a session is authenticated,
valid credentials are required.
III. Valid credentials are required for
exploitation, which lessens the impact of this vulnerability.
IV. DETECTION
iDEFENSE has confirmed the existence of this vulnerability in Ipswitch
IMail version 8.13. It is suspected that earlier versions are also
vulnerable.
V. WORKAROUND
As this vulnerability is exploited after authentication occurs, ensuring
that only trusted users have accounts can mitigate the risk somwhat. As
a more effective workaround, consider limiting access to the IMAP server
by filtering TCP port 143. If possible, consider disabling IMAP and
forcing users to use POP3.
VI. VENDOR RESPONSE
The vendor has released the following patch to fix this vulnerability:
ftp://ftp.ipswitch.com/Ipswitch/Product_Support/IMail/imail82hf2.exe
The associated vendor advisory can be found at:
http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf
2.html
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-1256 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.
VIII. DISCLOSURE TIMELINE
04/25/2005 Initial vendor notification
05/10/2005 Initial vendor response
05/24/2005 Public disclosure
IX. CREDIT
iDEFENSE Labs is credited with this discovery.
Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp
Free tools, research and upcoming events
http://labs.idefense.com
X. LEGAL NOTICES
Copyright (c) 2005 iDEFENSE, Inc.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-200505-0836 | CVE-2005-1711 | Gibraltar Firewall Antivirus Scan Avoidance Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Gibraltar Firewall 2.2 and earlier, when using the ClamAV update to 0.81 for Squid, uses a defunct ClamAV method to scan memory for viruses, which does not return an error code and prevents viruses from being detected. Gibraltar is susceptible to an antivirus scan evasion vulnerability. This issue presents itself because of an oversight in the design of the firewall product, due to a change of features of the ClamAV antivirus scanning engine.
This vulnerability allows malicious content to pass undetected by an affected firewall acting as an HTTP proxy, leading to a false sense of security
VAR-200506-0135 | CVE-2005-1474 | Apple Safari automatically installs Dashboard widgets |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Dashboard in Apple Mac OS X 10.4.1 allows remote attackers to install widgets via Safari without prompting the user, a different vulnerability than CVE-2005-1933. This issue is due to Safari improperly considering Dashboard widgets to be "safe" content.
It is demonstrated that an attacker can cause Safari to automatically download, and then install widgets into the users '~/Library/Widgets' directory. This happens without user intervention or notification.
Reportedly, once widgets have been automatically installed via Safari, the normal validation required for widgets to gain access to system resources is skipped, allowing complete system access to the malicious widgets, however, this has not been confirmed by Symantec. This will likely result in malicious script, or machine code being executed in the context of the targeted user.
Mac OS X version 10.4 is vulnerable to this issue
VAR-200506-0134 | CVE-2005-1473 | Apple Mac OS X Screen saver context menu access vulnerability |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
SecurityAgent in Apple Mac OS X 10.4.1 allows attackers with physical access to bypass the locked screensaver and launch background applications by opening a URL from a text input field. Apple Mac OS X is susceptible to a screen saver contextual menu access vulnerability.
This issue presents itself when a user locks their screen. When the screen saver prompts for the password when a user attempts to unlock the screen, contextual menus are available in the text-input fields.
Attackers may be able to partially bypass locked-screen restrictions. This may allow attackers to cause inappropriate, incriminating, or otherwise unwanted Web sites to be displayed on targeted computers. It may also allow them to exploit other latent vulnerabilities in applications used to handle URIs, by opening malicious Web sites or network resources. An attacker could exploit this vulnerability to partially bypass lock screen restrictions, display inappropriate sites and launch background applications on the target machine
VAR-200505-0693 | CVE-2005-1680 | D-Link DSL-502T , DSL-504T , DSL-562T with DSL-G604T Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote attackers to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be created and contain their IP address. DSL-562T is prone to a security bypass vulnerability
VAR-200505-0119 | CVE-2005-1827 | D-Link DSL router can bypass access authentication vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
D-Link DSL-504T allows remote attackers to bypass authentication and gain privileges, such as upgrade firmware, restart the router or restore a saved configuration, via a direct request to firmwarecfg. D-Link DSL routers are commonly used routers in homes and small offices.
D-Link DSL routers have problems with user authentication. Remote attackers could use this vulnerability to gain unauthorized access to devices.
When executing CGI / cgi-bin / firmwarecfg, the script checks if the fw_ip file exists in / var / tmp /. If this file exists, all IP addresses listed therein will be allowed to access the device directly without authentication. If this file does not exist, CGI will create a new file with the requested address written in it.
If the web configuration console can be accessed from the Internet and no one has called CGI before, any user can access the router, download the config.xml file containing the user account and password, and cause access to the private network, modify or change the router's firmware Wait. This issue is due to a failure of the devices to require authentication in certain circumstances.
Various D-Link devices with the following firmware revisions are affected by this issue:
- V1.00B01T16.EN.20040211
- V1.00B01T16.EU.20040217
- V0.00B01T04.UK.20040220
- V1.00B01T16.EN.20040226
- V1.00B02T02.EU.20040610
- V1.00B02T02.UK.20040618
- V1.00B02T02.EU.20040729
- V1.00B02T02.DE.20040813
- V1.00B02T02.RU.20041014
Due to the common practice of code reuse, other devices are also likely affected by this issue.
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
D-Link DSL Routers "firmwarecfg" Authentication Bypass
SECUNIA ADVISORY ID:
SA15422
VERIFY ADVISORY:
http://secunia.com/advisories/15422/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, System access
WHERE:
>From local network
OPERATING SYSTEM:
D-Link DSL-504T
http://secunia.com/product/5128/
D-Link DSL-G604T
http://secunia.com/product/5127/
DESCRIPTION:
A security issue has been reported in various D-Link DSL routers,
which can be exploited by malicious people to gain unauthorised
access to a vulnerable device.
The problem is caused due to an undocumented feature where the
"cgi-bin/firmwarecfg" script grants the first user, who requests the
script, access to the router. This can e.g. be exploited to modify
the firmware of the router.
PROVIDED AND/OR DISCOVERED BY:
Independently discovered by:
* Francesco Orro
* Luis Peralta
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200505-0225 | CVE-2005-1472 | Apple Mac OS X Local file name information disclosure vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Certain system calls in Apple Mac OS X 10.4.1 do not properly enforce the permissions of certain directories without the POSIX read bit set, but with the execute bits set for group or other, which allows local users to list files in otherwise restricted directories. Apple Mac OS X is susceptible to a local information disclosure vulnerability. This is due to a failure of the operating system to properly implement POSIX permissions checking in certain circumstances.
This vulnerability allows local attackers to retrieve normally forbidden names contained in directories. This scenario is commonly used to obscure access to public directories (such as '~/Public/Drop Box') for security reasons, as users are required to have knowledge about already existing files contained in these directories to be able to access them
VAR-200505-0878 | CVE-2005-1543 |
Novell ZENworks Multiple remote overflow vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200505-0074, VAR-E-200505-0073 |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests. Novell ZENworks is prone to multiple remote pre-authentication buffer overflow vulnerabilities.
The issues exist in the 'zenrem32.exe' executable and may be exploited by a remote attacker to execute arbitrary code in the context of the affected service.
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Novell ZENworks Remote Management Buffer Overflows
SECUNIA ADVISORY ID:
SA15433
VERIFY ADVISORY:
http://secunia.com/advisories/15433/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From local network
SOFTWARE:
Novell ZENworks Desktop Management 6.x
http://secunia.com/product/4134/
Novell ZENworks for Desktops 4.x
http://secunia.com/product/1246/
Novell ZENworks for Servers 3
http://secunia.com/product/1247/
Novell ZENworks Server Management 6.x
http://secunia.com/product/5120/
DESCRIPTION:
Alex Wheeler has reported some vulnerabilities in ZENworks products,
which can be exploited by malicious people to compromise a vulnerable
system. These can be exploited to cause heap-based
and stack-based buffer overflows by sending some specially crafted
traffic.
Successful exploitation allows execution of arbitrary code.
PROVIDED AND/OR DISCOVERED BY:
Alex Wheeler
ORIGINAL ADVISORY:
Alex Wheeler:
http://www.rem0te.com/public/images/zen.pdf
Novell:
http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097644.htm
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200505-1328 | CAN-2005-0356 | TCP does not adequately validate segments before updating timestamp value |
CVSS V2: - CVSS V3: - Severity: 4.73 |
Certain TCP implementations may allow a remote attacker to arbitrarily modify host timestamp values, leading to a denial-of-service condition. A denial-of-service vulnerability exists for the TCP RFC 1323. The issue resides in the Protection Against Wrapped Sequence Numbers (PAWS) technique that was included to increase overall TCP performance.
When TCP 'timestamps' are enabled, both hosts at the endpoints of a TCP connection employ internal clocks to mark TCP headers with a 'timestamp' value.
The issue manifests if an attacker transmits a sufficient TCP PAWS packet to a vulnerable computer. The attacker sets a large value as the packet timestamp. When the target computer processes this packet, the internal timer is updated to the large value that the attacker supplied. This causes all other valid packets that are received subsequent to an attack to be dropped, because they are deemed to be too old or invalid. This type of attack will effectively deny service for a target connection. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-05:15.tcp Security Advisory
The FreeBSD Project
Topic: TCP connection stall denial of service
Category: core
Module: inet
Announced: 2005-06-29
Credits: Noritoshi Demizu
Affects: All FreeBSD releases.
Corrected: 2005-06-29 21:38:48 UTC (RELENG_5, 5.4-STABLE)
2005-06-29 21:41:03 UTC (RELENG_5_4, 5.4-RELEASE-p3)
2005-06-29 21:42:33 UTC (RELENG_5_3, 5.3-RELEASE-p17)
2005-06-29 21:43:42 UTC (RELENG_4, 4.11-STABLE)
2005-06-29 21:45:14 UTC (RELENG_4_11, 4.11-RELEASE-p11)
2005-06-29 21:46:15 UTC (RELENG_4_10, 4.10-RELEASE-p16)
CVE Name: CAN-2005-0356, CAN-2005-2068
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit
<URL:http://www.freebsd.org/security/>.
I. Background
The Transmission Control Protocol (TCP) of the TCP/IP protocol suite
provides a connection-oriented, reliable, sequence-preserving data
stream service. TCP
packets with the SYN flag set are used during setup of new TCP
connections.
II. Problem Description
Two problems have been discovered in the FreeBSD TCP stack.
First, when a TCP packets containing a timestamp is received, inadequate
checking of sequence numbers is performed, allowing an attacker to
artificially increase the internal "recent" timestamp for a connection.
Second, a TCP packet with the SYN flag set is accepted for established
connections, allowing an attacker to overwrite certain TCP options.
III. Impact
Using either of the two problems an attacker with knowledge of the
local and remote IP and port numbers associated with a connection
can cause a denial of service situation by stalling the TCP connection.
The stalled TCP connection my be closed after some time by the other
host.
IV. Workaround
In some cases it may be possible to defend against these attacks by
blocking the attack packets using a firewall. Packets used to effect
either of these attacks would have spoofed source IP addresses.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to 4-STABLE or 5-STABLE, or to the
RELENG_5_4, RELENG_5_3, RELENG_4_11, or RELENG_4_10 security branch
dated after the correction date.
2) To patch your present system:
The following patches have been verified to apply to FreeBSD 4.10,
4.11, 5.3, and 5.4 systems.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
[FreeBSD 4.x]
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp4.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp4.patch.asc
[FreeBSD 5.x]
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp.patch.asc
b) Apply the patch.
# cd /usr/src
# patch < /path/to/patch
c) Recompile your kernel as described in
<URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the
system.
VI. Correction details
The following list contains the revision numbers of each file that was
corrected in FreeBSD.
Branch Revision
Path
- -------------------------------------------------------------------------
RELENG_4
src/sys/netinet/tcp_input.c 1.107.2.44
RELENG_4_11
src/UPDATING 1.73.2.91.2.12
src/sys/conf/newvers.sh 1.44.2.39.2.15
src/sys/netinet/tcp_input.c 1.107.2.41.4.3
RELENG_4_10
src/UPDATING 1.73.2.90.2.17
src/sys/conf/newvers.sh 1.44.2.34.2.18
src/sys/netinet/tcp_input.c 1.107.2.41.2.1
RELENG_5
src/sys/netinet/tcp_input.c 1.252.2.16
RELENG_5_4
src/UPDATING 1.342.2.24.2.12
src/sys/conf/newvers.sh 1.62.2.18.2.8
src/sys/netinet/tcp_input.c 1.252.2.14.2.1
RELENG_5_3
src/UPDATING 1.342.2.13.2.20
src/sys/conf/newvers.sh 1.62.2.15.2.22
src/sys/netinet/tcp_input.c 1.252.4.1
- -------------------------------------------------------------------------
VII. References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0356
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2068
http://www.kb.cert.org/vuls/id/637934
The latest revision of this advisory is available at
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (FreeBSD)
iD8DBQFCwxe7FdaIBMps37IRAi39AJ9ss6PVEwloS4SlKEWi5S1hpHnzmACeJF7H
rKmK2NtleJ98dTLWW4QLMn4=
=6fBH
-----END PGP SIGNATURE-----
.
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Cisco Various Products TCP Timestamp Denial of Service
SECUNIA ADVISORY ID:
SA15393
VERIFY ADVISORY:
http://secunia.com/advisories/15393/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From remote
OPERATING SYSTEM:
Cisco SN5400 Series Storage Routers
http://secunia.com/product/2188/
Cisco MGX 8900 Series Multiservice Switches
http://secunia.com/product/5117/
Cisco MGX 8800 Series Multiservice Switches
http://secunia.com/product/5116/
Cisco MGX 8200 Series Edge Concentrators
http://secunia.com/product/5115/
Cisco Content Services Switch 11000 Series (WebNS)
http://secunia.com/product/1507/
Cisco Aironet 350 Series Access Point
http://secunia.com/product/5114/
Cisco Aironet 1200 Series Access Point
http://secunia.com/product/1929/
DESCRIPTION:
A vulnerability has been reported in some Cisco products, which can
be exploited by malicious people to cause a DoS (Denial of Service)
on active TCP sessions.
The vulnerability is caused due to an error in the implementation of
the TCP Timestamp option and can be exploited via specially crafted
packets to cause a targeted TCP session to stall until it's reset.
Successful exploitation requires knowledge of IP address information
of the source and destination of the TCP network connection.
The vulnerability affects the following products:
* SN5400 series storage routers
* CSS11000 series content services switches
* AP350 and AP1200 series Access Points running VxWorks
* MGX8200, MGX8800, and MGX8900 series WAN switches (only management
interfaces)
SOLUTION:
SN5400 series storage routers:
The vulnerability has been addressed by CSCin85370.
CSS11000 series content services switches:
The vulnerability has been addressed by CSCeh40395.
AP350 and AP1200 series Access Points:
The vendor recommends upgrading APs running VxWorks to Cisco IOS.
MGX series WAN switches:
The vulnerability has been documented by CSCeh85125 and CSCeh85130.
PROVIDED AND/OR DISCOVERED BY:
US-CERT credits Noritoshi Demizu.
ORIGINAL ADVISORY:
Cisco:
http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml
OTHER REFERENCES:
US-CERT VU#637934:
http://www.kb.cert.org/vuls/id/637934
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
For more information:
SA14904
SOLUTION:
Apply updated packages.
For more information:
SA15393
The vulnerability affects all versions of CacheOS and SGOS.
SOLUTION:
The vendor recommends disabling RFC1323 support until a patch is
available
VAR-200505-0862 | CVE-2005-1566 | Acrowave AAP-3100AR Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Acrowave AAP-3100AR wireless router allows remote attackers to bypass authentication by pressing CTRL-C at the username or password prompt in a telnet session, which causes the shell to crash and restart, then leave the user in the new shell. Wlan Ap + Adsl Router is prone to a denial-of-service vulnerability.
----------------------------------------------------------------------
Want a new IT Security job?
Vacant positions at Secunia:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Acrowave AAP-3100AR Router Authentication Bypass
SECUNIA ADVISORY ID:
SA15343
VERIFY ADVISORY:
http://secunia.com/advisories/15343/
CRITICAL:
Less critical
IMPACT:
Security Bypass
WHERE:
>From local network
OPERATING SYSTEM:
Acrowave AAP-3100AR Router
http://secunia.com/product/5094/
DESCRIPTION:
Martin Tornwall has reported a vulnerability in Acrowave AAP-3100AR
Router, which can be exploited by malicious people to bypass certain
security restrictions.
The vulnerability is caused due to an error in the authentication
process. This can be exploited to login without supplying a username
and password by pressing CTRL-C.
SOLUTION:
Filter access to the telnet interface.
PROVIDED AND/OR DISCOVERED BY:
Martin Tornwall
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200505-0875 | CVE-2005-1579 | Apple QuickTime Quartz Composer File information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Apple QuickTime Player 7.0 on Mac OS X 10.4 allows remote attackers to obtain sensitive information via a .mov file with a Quartz Composer composition (.qtz) file that uses certain patches to read local information, then other patches to send the information to the attacker.
----------------------------------------------------------------------
Want a new IT Security job?
Vacant positions at Secunia:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Apple QuickTime Quartz Composer Disclosure of System Information
SECUNIA ADVISORY ID:
SA15307
VERIFY ADVISORY:
http://secunia.com/advisories/15307/
CRITICAL:
Not critical
IMPACT:
Exposure of system information
WHERE:
>From remote
OPERATING SYSTEM:
Apple Macintosh OS X
http://secunia.com/product/96/
SOFTWARE:
Apple QuickTime 7.x
http://secunia.com/product/5090/
DESCRIPTION:
David Remahl has reported a weakness in Apple QuickTime, which can be
exploited by malicious people to disclose some system information.
The problem is that Quartz Composer compositions embedded in ".mov"
files can access certain system information, which can be disclosed
to web sites via JavaScript. This can e.g. be exploited to disclose
the local username and directory information by tricking a user into
visiting a malicious web site.
SOLUTION:
Disable the QuickTime browser plugin and do not open ".mov" and
Quartz Composer files from untrusted sources.
PROVIDED AND/OR DISCOVERED BY:
David Remahl
ORIGINAL ADVISORY:
http://remahl.se/david/vuln/018/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200505-0802 | CVE-2005-1517 | Cisco Firewall Services Module Unknown vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Unknown vulnerability in Cisco Firewall Services Module (FWSM) 2.3.1 and earlier, when using URL, FTP, or HTTPS filtering exceptions, allows certain TCP packets to bypass access control lists (ACLs). FWSM for Cisco Catalyst 6500/7600 Series is prone to a remote security vulnerability
VAR-200505-0790 | CVE-2005-1505 | Mac OS Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The new account wizard in Mail.app 2.0 in Mac OS 10.4, when configuring an IMAP mail account and checking the credentials, does not prompt the user to use SSL until after the password has already been sent, which causes the password to be sent in plaintext
VAR-200505-1436 | CVE-2005-0758 | gzip of zgrep Vulnerable to arbitrary command execution |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
zgrep in gzip before 1.3.5 does not properly sanitize arguments, which allows local users to execute arbitrary commands via filenames that are injected into a sed script. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ GNU zip (gzip) Is a utility that compresses and decompresses files. grep Run zgrep Or unzip the compressed file gunzip Each tool is packaged. Gzip 1.2.4 Previously, there were several security issues: 1) gzip 1.2.4 Included before zgrep There is a problem that does not properly sanitize arguments. (CAN-2005-0758) Details are currently unknown, but local attackers who exploit this issue zgrep An arbitrary command may be executed by passing an intentional file name to. 2) gzip 1.2.4 Previously, when decompressing a compressed file, there was a problem that caused a race condition between writing the decompressed file and changing permissions. (CAN-2005-0988) A local attacker who exploits this issue could alter the permissions of an arbitrary file by replacing the decompressed file with a hard link to the arbitrary file at a specific time. 3) gzip 1.2.4 Included before gunzip Is -N When decompressing a compressed file with a flag, there is a problem that the validity of the file name is not properly checked. (CAN-2005-1228) A remote attacker who exploits this issue ".." Send a compressed file that is a compressed file containing an intentional character string to the target user gzip Inducing a directory traversal attack by inducing unpacking with.Please refer to the “Overview” for the impact of this vulnerability. The 'zgrep' utility is reportedly affected by an arbitrary command-execution vulnerability.
An attacker may execute arbitrary commands through zgrep command arguments to potentially gain unauthorized access to the affected computer. Note that this issue poses a security threat only if the arguments originate from a malicious source.
This issue affects zgrep 1.2.4; other versions may be affected as well.
----------------------------------------------------------------------
Want a new IT Security job?
Vacant positions at Secunia:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
gzip Directory Traversal Vulnerability
SECUNIA ADVISORY ID:
SA15047
VERIFY ADVISORY:
http://secunia.com/advisories/15047/
CRITICAL:
Less critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
gzip 1.x
http://secunia.com/product/4220/
DESCRIPTION:
Ulf H\xe4rnhammar has reported a vulnerability in gzip, which
potentially can be exploited by malicious people to compromise a
user's system. This makes it
possible to have a file extracted to an arbitrary location outside
the current directory via directory traversal attacks.
The vulnerability has been reported in version 1.2.4, 1.2.4a, 1.3.3,
1.3.4 and 1.3.5.
SOLUTION:
Do not extract untrusted ".gz" files with the "-N" flag.
PROVIDED AND/OR DISCOVERED BY:
Ulf H\xe4rnhammar
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200505-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: gzip: Multiple vulnerabilities
Date: May 09, 2005
Bugs: #89946, #90626
ID: 200505-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
gzip contains multiple vulnerabilities potentially allowing an attacker
to execute arbitrary commands. The zgrep utility improperly
sanitizes arguments, which may come from an untrusted source
(CAN-2005-0758).
Impact
======
These vulnerabilities could allow arbitrary command execution, changing
the permissions of arbitrary files, and installation of files to an
aribitrary location in the filesystem.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All gzip users should upgrade to the latest stable version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/gzip-1.3.5-r6"
References
==========
[ 1 ] CAN-2005-0758
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0758
[ 2 ] CAN-2005-0988
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0988
[ 3 ] CAN-2005-1228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1228
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200505-05.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.0
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
____________________________________________________________________________
Publisher Name: OpenPKG GmbH
Publisher Home: http://openpkg.com/
Advisory Id (public): OpenPKG-SA-2007.002
Advisory Type: OpenPKG Security Advisory (SA)
Advisory Directory: http://openpkg.com/go/OpenPKG-SA
Advisory Document: http://openpkg.com/go/OpenPKG-SA-2007.002
Advisory Published: 2007-01-05 21:58 UTC
Issue Id (internal): OpenPKG-SI-20070105.01
Issue First Created: 2007-01-05
Issue Last Modified: 2007-01-05
Issue Revision: 04
____________________________________________________________________________
Subject Name: bzip2
Subject Summary: Compression Tool
Subject Home: http://www.bzip.org/
Subject Versions: * <= 1.0.3
Vulnerability Id: CVE-2005-0953, CVE-2005-0758
Vulnerability Scope: global (not OpenPKG specific)
Attack Feasibility: run-time
Attack Vector: local system
Attack Impact: manipulation of data, arbitrary code execution
Description:
Together with two portability and stability issues, two older
security issues were fixed in the compression tool BZip2 [0], versions
up to and including 1.0.3.
References:
[0] http://www.bzip.org/
____________________________________________________________________________
Primary Package Name: bzip2
Primary Package Home: http://openpkg.org/go/package/bzip2
Corrected Distribution: Corrected Branch: Corrected Package:
OpenPKG Enterprise E1.0-SOLID bzip2-1.0.3-E1.0.1
OpenPKG Enterprise E1.0-SOLID openpkg-E1.0.2-E1.0.2
OpenPKG Community 2-STABLE-20061018 bzip2-1.0.4-2.20070105
OpenPKG Community 2-STABLE-20061018 openpkg-2.20070105-2.20070105
OpenPKG Community 2-STABLE bzip2-1.0.4-2.20070105
OpenPKG Community 2-STABLE openpkg-2.20070105-2.20070105
OpenPKG Community CURRENT bzip2-1.0.4-20070105
OpenPKG Community CURRENT openpkg-20070105-20070105
____________________________________________________________________________
For security reasons, this document was digitally signed with the
OpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34)
which you can download from http://openpkg.com/openpkg.com.pgp
or retrieve from the OpenPGP keyserver at hkp://pgp.openpkg.org/.
Follow the instructions at http://openpkg.com/security/signatures/
for more details on how to verify the integrity of this document.
____________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG GmbH <http://openpkg.com/>
iD8DBQFFnrwRZwQuyWG3rjQRAgkdAJ9YBx7auj7ursOTj5M/78Kq3SlGlACfc0aV
2IRFnTk4CCJwa9FPgv1z7c0=
=Iq2w
-----END PGP SIGNATURE-----
VAR-200505-0908 | CVE-2005-0039 | IPsec configurations may be vulnerable to information disclosure |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Certain configurations of IPsec, when using Encapsulating Security Payload (ESP) in tunnel mode, integrity protection at a higher layer, or Authentication Header (AH), allow remote attackers to decrypt IPSec communications by modifying the outer packet in ways that cause plaintext data from the inner packet to be returned in ICMP messages, as demonstrated using bit-flipping attacks and (1) Destination Address Rewriting, (2) a modified header length that causes portions of the packet to be interpreted as IP Options, or (3) a modified protocol field and source address. IPSec Confidentiality when communicating (Confidentiality) Protection only, integrity (Integrity) A vulnerability has been discovered that occurs when protection is not set. ESP Keys used (AES , DES , Triple-DES) Occurs regardless of the version or key size. The vulnerability was encrypted IPSec For communication bit-flipping By using the technique IP header ( Source address, header length, protocol field ) It is abused by tampering with the data inside. After data has been tampered with, it is sent to the sender ICMP There is a possibility that the communication contents will be acquired by receiving the error message.IPSec As a result, it is possible that important information is acquired. A vulnerability affects certain configurations of IPSec.
Reports indicate that these attacks may also potentially be possible against IPSec when AH is in use, but only under certain unspecified configurations.
The reported attacks take advantage of the fact that no ESP packet payload integrity checks exist when ESP is configured in the vulnerable aforementioned manner.
This issue may be leveraged by an attacker to reveal plaintext IP datagrams and potentially sensitive information. Information harvested in this manner may be used to aid in further attacks.
This BID will be updated as further information is made available.
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
HP Tru64 UNIX IPsec Tunnel ESP Mode Encrypted Data Disclosure
SECUNIA ADVISORY ID:
SA16401
VERIFY ADVISORY:
http://secunia.com/advisories/16401/
CRITICAL:
Less critical
IMPACT:
Exposure of sensitive information
WHERE:
>From remote
OPERATING SYSTEM:
HP Tru64 UNIX 5.x
http://secunia.com/product/2/
DESCRIPTION:
HP has acknowledged a vulnerability in HP Tru64 UNIX, which can be
exploited by malicious people to disclose certain sensitive
information.
The vulnerability affects the following supported versions:
* HP Tru64 UNIX 5.1B-3
* HP Tru64 UNIX 5.1B-2/PK4
SOLUTION:
Apply ERP kits.
PROVIDED AND/OR DISCOVERED BY:
NISCC
ORIGINAL ADVISORY:
HP SSRT5957:
http://itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01217
NISCC:
http://www.niscc.gov.uk/niscc/docs/al-20050509-00386.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. Some configurations using AH to provide integrity protection are also vulnerable. Some configurations using AH to provide integrity protection are also vulnerable.
Impact
- - ------
If exploited, it is possible for an active attacker to obtain the plaintext version of the IPsec-
protected communications using only moderate effort.
Severity
- - --------
This is rated as high.
Summary
- - -------
IP Security (IPsec) is a set of protocols developed by the Internet Engineering Task Force (IETF)
to support secure exchange of packets at the IP layer; IPsec has been deployed widely to implement
Virtual Private Networks (VPNs). Some configurations using
AH to provide integrity protection are also vulnerable. In these configurations, an attacker can
modify sections of the IPsec packet, causing either the cleartext inner packet to be redirected or
a network host to generate an error message. In the latter case, these errors are relayed via the
Internet Control Message Protocol (ICMP); because of the design of ICMP, these messages directly
reveal segments of the header and payload of the inner datagram in cleartext. An attacker who can
intercept the ICMP messages can then retrieve plaintext data. The attacks have been implemented and
demonstrated to work under realistic conditions.
[Please note that revisions to this advisory will not be notified by email. All
subscribers are advised to regularly check the UNIRAS website for updates to this notice.]
Details
- - -------
CVE number: CAN-2005-0039
IPsec consists of several separate protocols; these include:
* Authentication Header (AH): provides authenticity guarantees for packets, by attaching strong
cryptographic checksum to packets.
* Encapsulating Security Payload (ESP): provides confidentiality guarantees for packets, by
encrypting packets with encryption algorithms. ESP also provides optional authentication
services
for packets.
* Internet Key Exchange (IKE): provide ways to securely negotiate shared keys.
AH and ESP has two modes of use: transport mode and tunnel mode. However, without some form of integrity protection, CBC-mode encrypted
data is vulnerable to modification by an active attacker.
By making careful modifications to selected portions of the payload of the outer packet, an
attacker can effect controlled changes to the header of the inner (encrypted) packet. The modified
inner packet is subsequently processed by the IP software on the receiving security gateway or the
endpoint host; the inner packet, in cleartext form, may be redirected or certain error messages
may be produced and communicated by ICMP. Because of the design of ICMP, these messages directly
reveal cleartext segments of the header and payload of the inner packet. If these messages can be
intercepted by an attacker, then plaintext data is revealed.
Attacks exploiting these vulnerabilities rely on the following:
* Exploitation of the well-known bit flipping weakness of CBC mode encryption.
* Lack of integrity protection for inner packets.
* Interaction between IPsec processing and IP processing on security gateways and end hosts.
These attacks can be fully automated so as to recover the entire contents of multiple
IPsec-protected inner packets. Destination Address Rewriting
* An attacker modifies the destination IP address of the encrypted (inner) packet by bit-
flipping in the payload of the outer packet.
* The security gateway decrypts the outer payload to recover the (modified) inner packet.
* The gateway then routes the inner packet according to its (modified) destination IP address.
* If successful, the "plaintext" inner datagram arrives at a host of the attacker's choice.
2. IP Options
* An attacker modifies the header length of the encrypted (inner) packet by bit-flipping in the
payload of the outer packet.
* The security gateway decrypts the outer payload to recover the (modified) inner packet.
* The gateway then performs IP options processing on the inner packet because of the modified
header length, with the first part of the inner payload being interpreted as options bytes.
* With some probability, options processing will result in the generation of an ICMP "parameter
problem" message.
* The ICMP message is routed to the now modified source address of the inner packet.
* An attacker intercepts the ICMP message and retrieves the "plaintext" payload of the inner
packet.
3. Protocol Field
* An attacker modifies the protocol field and source address field of the encrypted (inner)
packet by bit-flipping in the payload of the outer packet.
* The security gateway decrypts the outer payload to recover the (modified) inner packet.
* The gateway forwards the inner packet to the intended recipient.
* The intended recipient inspects the protocol field of the inner packet and generates an ICMP
"protocol unreachable" message.
* The ICMP message is routed to the now modified source address of the inner packet.
* An attacker intercepts the ICMP message and retrieves the "plaintext" payload of the inner
packet.
The attacks are probabilistic in nature and may need to be iterated many times in a first phase in
order to be successful. Once this first phase is complete, the results can be reused to efficiently
recover the contents of further inner packets.
Naturally, the attacker must be able to intercept traffic passing between the security gateways in
order to mount the attacks. For the second and third attacks to be successful, the attacker must be
able intercept the relevant ICMP messages. Variants of these attacks in which the destination of
the ICMP messages can be controlled by the attacker are also possible.
Solution
- - --------
Any of the following methods can be used to rectify this issue:
1. This is the recommended
solution.
2. Use the AH protocol alongside ESP to provide integrity protection. However, this must be done
carefully: for example, the configuration where AH in transport mode is applied end-to-end and
tunnelled inside ESP is still vulnerable.
3. Remove the error reporting by restricting the generation of ICMP messages or by filtering
these messages at a firewall or security gateway.
Vendor Information
- - ------------------
A list of vendors affected by this vulnerability is not currently available. Please visit the web
site in order to check for updates.
Credits
- - -------
The NISCC Vulnerability Team would like to thank all vendors for their co-operation with
the handling of this vulnerability.
Contact Information
- - -------------------
The NISCC Vulnerability Management Team can be contacted as follows:
Email vulteam@niscc.gov.uk
Please quote the advisory reference in the subject line
Telephone +44 (0)870 487 0748 Ext 4511
Monday - Friday 08:30 - 17:00
Fax +44 (0)870 487 0749
Post Vulnerability Management Team
NISCC
PO Box 832
London
SW1P 1BG
We encourage those who wish to communicate via email to make use of our PGP key. This is
available from http://www.niscc.gov.uk/niscc/publicKey2-en.pop.
Please note that UK government protectively marked material should not be sent to the email
address above.
If you wish to be added to our email distribution list please email your request to
uniras@niscc.gov.uk.
What is NISCC?
- - --------------
For further information regarding the UK National Infrastructure Security Co-ordination Centre,
please visit http://www.niscc.gov.uk/.
Reference to any specific commercial product, process, or service by trade name, trademark
manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or
favouring by NISCC. The views and opinions of authors expressed within this notice shall not
be used for advertising or product endorsement purposes.
Neither shall NISCC accept responsibility for any errors or omissions contained within this
advisory. In particular, they shall not be liable for any loss or damage whatsoever,
arising from or in connection with the usage of information contained within this notice.
C 2005 Crown Copyright
<End of NISCC Vulnerability Advisory>
Acknowledgements
UNIRAS wishes to acknowledge the contributions of NISCC Vulnerability Team for the information contained in this Briefing.
Updates
This advisory contains the information released by the original author. If the vulnerability affects you, it may be prudent to retrieve the advisory from the canonical site to ensure that you receive the most current information concerning that problem.
Legal Disclaimer
Reference to any specific commercial product, process, or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by UNIRAS or NISCC. The views and opinions of authors expressed within this notice shall not be used for advertising or product endorsement purposes.
Neither UNIRAS or NISCC shall also accept responsibility for any errors or omissions contained within this briefing notice. In particular, they shall not be liable for any loss or damage whatsoever, arising from or in connection with the usage of information contained within this notice.
FIRST
UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) and has contacts with other international Incident Response Teams (IRTs) in order to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing amongst its members and the community at large.
SOLUTION:
The vendor recommends configuring ESP to use both encryption and
authentication (see vendor's advisory for more information)