VARIoT IoT vulnerabilities database

VAR-200412-0169 | CVE-2004-1472 | Symantec Firewall/VPN appliance vulnerable to DoS via UDP port scan |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 allow remote attackers to cause a denial of service (device freeze) via a fast UDP port scan on the WAN interface. These issues are due to a failure of the application to handle exceptional conditions, a default configuration issue exists as well.
An attacker can leverage a denial of service issue to cause the affected appliance to stop responding, requiring a power off to bring the device back to functionality. A filter bypass issue allows an attacker to bypass the filters on the 'tftpd', 'snmpd', and 'isakmp' services. An attacker can also read and write the community string of the affected device by default, facilitating disclosure and altering of the device's settings.
Symantec Nexland legacy firewall appliances are also affected by these issues. Symantec Enterprise Firewall/VPN is an enterprise-level firewall/VPN system. Symantec Enterprise Firewall/VPN has a default public string, and remote attackers can use this value to obtain sensitive information or perform some configuration operations. Firewalls have default read/write public strings that allow attackers to collect and change firewall configurations. By combining other vulnerabilities, an attacker can send SNMP GET/SET requests to the WAN interface
VAR-200412-0170 | CVE-2004-1473 | Symantec Firewall/VPN appliance vulnerable to DoS via UDP port scan |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 allow remote attackers to bypass filtering and determine whether the device is running services such as tftpd, snmpd, or isakmp via a UDP port scan with a source port of UDP 53. These issues are due to a failure of the application to handle exceptional conditions, a default configuration issue exists as well.
An attacker can leverage a denial of service issue to cause the affected appliance to stop responding, requiring a power off to bring the device back to functionality. A filter bypass issue allows an attacker to bypass the filters on the 'tftpd', 'snmpd', and 'isakmp' services. An attacker can also read and write the community string of the affected device by default, facilitating disclosure and altering of the device's settings.
Symantec Nexland legacy firewall appliances are also affected by these issues. Symantec Enterprise Firewall/VPN is an enterprise-level firewall/VPN system. Symantec Enterprise Firewall/VPN has a default public string, and remote attackers can use this value to obtain sensitive information or perform some configuration operations. Firewalls have default read/write public strings that allow attackers to collect and change firewall configurations. By combining other vulnerabilities, an attacker can send SNMP GET/SET requests to the WAN interface
VAR-200412-0171 | CVE-2004-1474 | Symantec Firewall/VPN appliance vulnerable to DoS via UDP port scan |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Symantec Enterprise Firewall/VPN Appliances 100, 200, and 200R running firmware before 1.63 and Gateway Security 320, 360, and 360R running firmware before 622 uses a default read/write SNMP community string, which allows remote attackers to alter the firewall's configuration file. These issues are due to a failure of the application to handle exceptional conditions, a default configuration issue exists as well.
An attacker can leverage a denial of service issue to cause the affected appliance to stop responding, requiring a power off to bring the device back to functionality. A filter bypass issue allows an attacker to bypass the filters on the 'tftpd', 'snmpd', and 'isakmp' services. An attacker can also read and write the community string of the affected device by default, facilitating disclosure and altering of the device's settings.
Symantec Nexland legacy firewall appliances are also affected by these issues. Symantec Enterprise Firewall/VPN is an enterprise-level firewall/VPN system. Firewalls have default read/write public strings that allow attackers to collect and change firewall configurations. By combining other vulnerabilities, an attacker can send SNMP GET/SET requests to the WAN interface
VAR-200412-0422 | CVE-2004-2163 | OpenBSD Radius Authentication Bypass Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
login_radius on OpenBSD 3.2, 3.5, and possibly other versions does not verify the shared secret in a response packet from a RADIUS server, which allows remote attackers to bypass authentication by spoofing server replies. OpenBSD is reported prone to an authentication bypass vulnerability when using Radius authentication. This issue can be leveraged by spoofing traffic on a vulnerable network and carrying out a man-in-the-middle attack to gain unauthorized access to an OpenBSD computer.
This vulnerability arises if an OpenBSD computer is configured to use Radius authentication and may allow an attacker to gain unauthorized access to the OpenBSD computer.
The vulnerability is confirmed in OpenBSD 3.2 and OpenBSD 3.5. Other versions may be vulnerable as well
VAR-200412-0022 | CVE-2004-0873 | Apple iChat Remote Connection Application Execution Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Apple iChat AV 2.1, AV 2.0, and 1.0.1 allows remote attackers to execute arbitrary programs via a "link" that references the program. This issue is due to a design error that allows attacker to execute arbitrary commands through a vulnerable application.
An attacker can leverage this issue to execute arbitrary application on an unsuspecting user's computer. The impact of this issue may be increased when an attacker entices a victim to first download an application or has another means of placing an application on the victim's computer, and then exploits this issue to execute it. Apple iChat is a video chat program
VAR-200409-0091 | No CVE | Pingtel Xpressa Remote Denial of Service Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The Pingtel series are SIP products, one of which is the Xpressa SIP desktop phone.
There is a problem with the HTTP management interface of the Pingtel Xpressa phone. A remote attacker could use this vulnerability to conduct a denial-of-service attack on the device and crash the VxWorks operating system.
Pingtel Xpressa phones can be managed through various interfaces (console, Telnet, and HTTP). The embedded HTTP service does not properly handle submission requests, and submits long requests similar to the following:
GET /<buffer>/cgi/application.cgi HTTP / 1.0
Authorization: Basic [base64authstring]
The buffer here exceeds 260 characters, which can cause the VxWorks system to crash. VxWorks The operating system crashed
VAR-200409-0066 | CVE-2004-1675 | SolarWinds Serv-U File Server Input validation error vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Serv-U FTP server 4.x and 5.x allows remote attackers to cause a denial of service (application crash) via a STORE UNIQUE (STOU) command with an MS-DOS device name argument such as (1) COM1, (2) LPT1, (3) PRN, or (4) AUX. Serv-U FTP Server is reported prone to a denial of service vulnerability. This issue presents itself because the application fails to handle exceptional conditions.
The vulnerability is a result of Serv-U FTP Server processing certain 'STOU' commands.
All versions of Serv-U prior to 5.2.0.1 are reportedly affected by this vulnerability
VAR-200409-0006 | CVE-2004-0830 | F-Secure Internet Gatekeeper Content Scan Server Remote Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Content Scanner Server in F-Secure Anti-Virus for Microsoft Exchange 6.21 and earlier, F-Secure Anti-Virus for Microsoft Exchange 6.01 and earlier, and F-Secure Internet Gatekeeper 6.32 and earlier allow remote attackers to cause a denial of service (service crash due to unhandled exception) via a certain malformed packet. F-Secure Content Scanner Server is reported prone to a remote denial of service vulnerability. This issue presents itself when the application handles certain malformed packets. This vulnerability causes an unhandled exception in the process leading to a crash in the process. F-Secure Internet Gatekeeper can perform automatic virus and content filtering on EMAIL and WEB communications. According to the configuration options, a dialog box will be prompted on the desktop stating that the FSAVSD.EXE process has crashed
VAR-200412-0025 | CVE-2004-0824 | Apple PPPDialer Unsafe log file creation symbolic link vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
PPPDialer for Mac OS X 10.2.8 through 10.3.5 allows local users to overwrite system files via a symlink attack on PPPDialer log files. The Apple PPPDialer utility is reported to contain an insecure log file creation vulnerability. The result of this is that log files created by the application are created in a world writeable location.
A local attacker may possibly exploit this vulnerability to execute symbolic link file overwrite attacks.
Privilege escalation may be possible using this method of attack, if the attacker can control the data that is being written to the target file. The PPPDialer for Mac OS X versions 10.2.8 through 10.3.5 is vulnerable
VAR-200412-0026 | CVE-2004-0825 | Apple QuickTime Streaming Server vulnerable to DoS |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
QuickTime Streaming Server in Mac OS X Server 10.2.8, 10.3.4, and 10.3.5 allows remote attackers to cause a denial of service (application deadlock) via a certain sequence of operations. There is a vulnerability in the Mac OS X CoreFoundation framework that could allow a local attacker to execute arbitrary code. According to the report, remote clients can cause the process to deadlock by issuing a specific sequence of operations. This can render the service inoperable, resulting in a denial of service, until the server is restarted. Mac OS X is an operating system used on Mac machines, based on the BSD system. A reboot is required for normal operation
VAR-200412-0024 | CVE-2004-0821 | Apple QuickTime Streaming Server vulnerable to DoS |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The CFPlugIn in Core Foundation framework in Mac OS X allows user supplied libraries to be loaded, which could allow local users to gain privileges. There is a vulnerability in the Apple QuickTime Streaming Server that could allow a remote attacker to cause a denial-of-service condition. It is reported that bundles using CoreFoundation can be made to automatically load plug-in executables using the CFPlugIn feature. This is a security vulnerability allowing for local privilege escalation as malicious executable plug-ins can be loaded by a privileged application. At this time, it is not clear whether the application targeted must be in the form of a bundle or if the attacker can perform the attack against any privileged application with a custom bundle.
Users are advised to apply the patch provided by Apple, which changes the feature to prevent loading of plug-ins automatically if an executable is already loaded. Mac OS X is an operating system used on Mac machines, based on the BSD system. Apple Mac OS X CoreFoundation has library loading processing issues and buffer overflows. Local attackers can exploit this vulnerability to obtain ROOT privileges. Apple reports that local users can use the CoreFoundation CFPlugIn application to load any user-provided library to obtain ROOT privileges [CVE: CAN -2004-0821]. In addition, local users can modify some environment variables to trigger buffer overflow in CoreFoundation, and can execute arbitrary commands with ROOT process privileges [CVE: CAN-2004-0822]
VAR-200409-0014 | CVE-2004-0822 | Apple QuickTime Streaming Server vulnerable to DoS |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Buffer overflow in The Core Foundation framework (CoreFoundation.framework) in Mac OS X 10.2.8, 10.3.4, and 10.3.5 allows local users to execute arbitrary code via a certain environment variable. There is a vulnerability in the Apple QuickTime Streaming Server that could allow a remote attacker to cause a denial-of-service condition. It is reported that a buffer overflow vulnerability is present in CoreFoundation related to its handling of an unspecified environment variable. Consequently, privileged applications using CoreFoundation may be exploited by local users to elevate their access level to that of the application. It is not known if all applications using CoreFoundation are vulnerable. Mac OS X is an operating system used on Mac machines, based on the BSD system. Apple Mac OS X CoreFoundation has library loading processing issues and buffer overflows. Local attackers can exploit this vulnerability to obtain ROOT privileges. Apple reports that local users can use the CoreFoundation CFPlugIn application to load any user-provided library to obtain ROOT privileges [CVE: CAN -2004-0821]
VAR-200409-0015 | CVE-2004-0823 | Apple QuickTime Streaming Server vulnerable to DoS |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
OpenLDAP 1.0 through 2.1.19, as used in Apple Mac OS 10.3.4 and 10.3.5 and possibly other operating systems, may allow certain authentication schemes to use hashed (crypt) passwords in the userPassword attribute as if they were plaintext passwords, which allows remote attackers to re-use hashed passwords without decrypting them. There is a vulnerability in the Apple QuickTime Streaming Server that could allow a remote attacker to cause a denial-of-service condition. There is a vulnerability in the Mac OS X CoreFoundation framework that could allow a local attacker to execute arbitrary code. OpenLDAP In using a specific authentication scheme userPassword There is a flaw that prevents password authentication if the password value is obtained because the value stored in is not processed as plain text.Password authentication may be avoided. In certain undisclosed cases, OpenLDAP is reported prone to an ambiguous-password-attribute weakness.
If an attacker can retrieve a password hash as contained in the OpenLDAP database, they may then be able to directly authenticate to the LDAP database. The attacker may gain unauthorized access if they can sniff password hashes from the network or if they can retrieve the contents of the 'userPassword' attribute from a database backup or through weak permissions on the database.
The OpenLDAP that is included with Apple Mac OS X, versions 10.3.4 and 10.3.5, is reported affected. Versions of OpenLDAP included in other operating systems may also be affected. There is a problem in OpenLDAP's verification of CRYPT passwords. Remote attackers can use this vulnerability to log in using other users' CRYPT values as passwords. An attacker can log in with the target user's authority by using the CRYPT value of the target user's password. Apple reports that CRYPT passwords can be specified as a clear text password as userPassword. According to reports, some authentication mechanisms can use CRYPT values as plaintext passwords.
TITLE:
Red Hat update for openldap / nss_ldap
SECUNIA ADVISORY ID:
SA17233
VERIFY ADVISORY:
http://secunia.com/advisories/17233/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Exposure of sensitive information
WHERE:
>From remote
OPERATING SYSTEM:
RedHat Linux Advanced Workstation 2.1 for Itanium
http://secunia.com/product/1326/
RedHat Enterprise Linux WS 4
http://secunia.com/product/4670/
RedHat Enterprise Linux WS 3
http://secunia.com/product/2536/
RedHat Enterprise Linux WS 2.1
http://secunia.com/product/1044/
RedHat Enterprise Linux ES 4
http://secunia.com/product/4668/
RedHat Enterprise Linux ES 3
http://secunia.com/product/2535/
RedHat Enterprise Linux ES 2.1
http://secunia.com/product/1306/
RedHat Enterprise Linux AS 4
http://secunia.com/product/4669/
RedHat Enterprise Linux AS 3
http://secunia.com/product/2534/
RedHat Enterprise Linux AS 2.1
http://secunia.com/product/48/
DESCRIPTION:
Red Hat has issued updates for openldap / nss_ldap. This fixes two
security issues and a vulnerability, which can be exploit by
malicious people to gain knowledge of sensitive information or bypass
certain security restrictions.
For more information:
SA15906
SA16518
SA12491
SOLUTION:
Updated packages are available from Red Hat Network.
http://rhn.redhat.com/
ORIGINAL ADVISORY:
http://rhn.redhat.com/errata/RHSA-2005-767.html
http://rhn.redhat.com/errata/RHSA-2005-751.html
OTHER REFERENCES:
SA15906:
http://secunia.com/advisories/15906/
SA16518:
http://secunia.com/advisories/16518/
SA12491:
http://secunia.com/advisories/12491/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200410-0023 | CVE-2004-0799 | Ipswitch WhatsUp Gold Remote denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The HTTP daemon in Ipswitch WhatsUp Gold 8.03 and 8.03 Hotfix 1 allows remote attackers to cause a denial of service (server crash) via a GET request containing an MS-DOS device name, as demonstrated using "prn.htm". The software supports the performance management of networks, servers, virtual environments and applications. BACKGROUND
Ipswitch WhatsUp Gold is a Microsoft Windows based network monitoring
application. More information is available at
http://www.Ipswitch.com/products/whatsup/index.html
II.
The problem specifically exists in the handling of reserved DOS device
names. By generating a GET request for 'prn.htm' to the HTTP daemon
installed by WhatsUp Gold, the application crashes and the following
Runtime Library error is displayed:
Runtime Error!
Program: C:\Program Files\WhatsUp\whatsupg.exe
abnormal program termination
III. The
WhatsUp Gold web server is not enabled by default.
IV. DETECTION
iDEFENSE has confirmed the existence of this vulnerability against
WhatsUp Gold versions 8.03 and the latest version 8.03 Hotfix 1. It is
suspected that earlier versions are also vulnerable.
V. WORKAROUNDS
Disable the WhatsUp Gold web server if it is not required.
VI. VENDOR RESPONSE
A patch to address this issue is available at:
http://www.ipswitch.com/Support/WhatsUp/patch-upgrades.html
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2004-0799 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.
VIII. DISCLOSURE TIMELINE
08/12/2004 Initial vendor notification
08/12/2004 iDEFENSE clients notified
08/12/2004 Initial vendor response
09/16/2004 Coordinated public disclosure
IX. CREDIT
The discoverer wishes to remain anonymous.
Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp
X. LEGAL NOTICES
Copyright (c) 2004 iDEFENSE, Inc.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information
VAR-200409-0059 | CVE-2004-1663 | LSI Logic storage controllers Security hole |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Engenio/LSI Logic storage controllers, as used in products such as Storagetek D280, and IBM DS4100 (formerly FastT 100) and Brocade SilkWorm Switches, allow remote attackers to cause a denial of service (freeze and possible data corruption) via crafted TCP packets. It is reported that hardware based on Engenio Storage Controllers are prone to a remote denial of service vulnerability. This could also result reportedly result in unrecoverable corruption of data.
Affected hardware includes Storagetek D280, and IBM DS4100 (formerly FastT 100) and Brocade SilkWorm Switches. Other devices may be affected such as other Storagetek and IBM FastT storage controllers, SGI, and Teradata storage controllers though this has not confirmed. The problem may exist in the underlying vxWorks operating system though this has also not been confirmed
VAR-200409-0092 | No CVE | Dynalink RTA 230 ADSL Router Default Backdoor Account Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Dynalink RTA 230 is a Linux-based ADSL router. The Dynalink RTA 230 has a default backdoor account that an attacker can use to control the entire ADSL device. According to the check /etc/passwd, you can find two default accounts: # cat /etc/passwd admin:xxxxx(obscured)xxxxx:0:0:Administrator:/:/bin/sh userNotUsed:YNf8oSCwK/0/Y:0: 0: Technical Support: /:/bin/sh These accounts cannot be modified and visible in the web configuration application. However, the WEB configuration application and the telnet service do not listen on the WAN interface by default. An attacker with access to the internal interface can fully control the ADSL device. Other devices that use similar firmware may also have this problem. Devices that may be affected by this vulnerability are: - US Robotics 9105 and 9106 - Siemens SE515 - Buffalo WMR-G54.
It is reported that the firmware contains a backdoor account. This account is not visible or modifiable from the web administration interface
VAR-200412-0343 | CVE-2004-2422 | Ipswitch IMail Server Multiple Buffer Overflow Denial Of Service Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Multiple features in Ipswitch IMail Server before 8.13 allow remote attackers to cause a denial of service (crash) via (1) a long sender field to the Queue Manager or (2) a long To field to the Web Messaging component. It is reported that IMail is susceptible to multiple buffer overflow denial of service vulnerabilities.
These vulnerabilities allow a remote attacker to crash the affected application, denying service to legitimate users. It is conjectured that it may be possible for an attacker to execute arbitrary code in the context of the affected server application.
Versions of the application prior to 8.13 are reported affected by these vulnerabilities.
TITLE:
IMail Multiple Denial of Service Vulnerabilities
SECUNIA ADVISORY ID:
SA12453
VERIFY ADVISORY:
http://secunia.com/advisories/12453/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
IMail Server 8.x
http://secunia.com/product/3048/
DESCRIPTION:
Various vulnerabilities have been reported in IMail, which
potentially can be exploited by malicious people to cause a DoS
(Denial of Service).
2) An unspecified error within the Web Calendaring can potentially be
exploited to cause a crash when a calender entry containing certain
content is viewed.
SOLUTION:
Apply IMail Server 8.13 patch.
http://www.ipswitch.com/support/imail/releases/imail_professional/im813.html
PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.
ORIGINAL ADVISORY:
http://support.ipswitch.com/kb/IM-20040902-DM01.htm
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet@packetstormsecurity.org
----------------------------------------------------------------------
VAR-200412-0389 | CVE-2004-2423 | Ipswitch IMail Server Multiple Buffer Overflow Service Rejection Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Unknown vulnerability in the Web calendaring component of Ipswitch IMail Server before 8.13 allows remote attackers to cause a denial of service (crash) via "specific content.". It is reported that IMail is susceptible to multiple buffer overflow denial of service vulnerabilities. It is conjectured that it may be possible for an attacker to execute arbitrary code in the context of the affected server application.
Versions of the application prior to 8.13 are reported affected by these vulnerabilities.
TITLE:
IMail Multiple Denial of Service Vulnerabilities
SECUNIA ADVISORY ID:
SA12453
VERIFY ADVISORY:
http://secunia.com/advisories/12453/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
IMail Server 8.x
http://secunia.com/product/3048/
DESCRIPTION:
Various vulnerabilities have been reported in IMail, which
potentially can be exploited by malicious people to cause a DoS
(Denial of Service).
1) An unspecified error within the Queue Manager can be exploited to
cause a crash via an overly long sender field.
3) An unspecified error within the Web Messaging can potentially be
exploited to cause a crash via an overly long "To:" line.
SOLUTION:
Apply IMail Server 8.13 patch.
http://www.ipswitch.com/support/imail/releases/imail_professional/im813.html
PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.
ORIGINAL ADVISORY:
http://support.ipswitch.com/kb/IM-20040902-DM01.htm
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet@packetstormsecurity.org
----------------------------------------------------------------------
VAR-200409-0056 | CVE-2004-1658 | Kerio Personal Firewall Application Security Bypass Vulnerability |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
Kerio Personal Firewall 4.0 (KPF4) allows local users with administrative privileges to bypass the Application Security feature and execute arbitrary processes by directly writing to \device\physicalmemory to restore the running kernel's SDT ServiceTable. A vulnerability is reported to affect Kerio Personal Firewall (KPF) 'Application Security' functionality that could permit an executable that is run by an administrator to disable KPF 'Application Security' functionality.
It is reported that (KPF) 'Application Security' functionality employs a modified Service Description Table in order to function. It is possible to restore the Service Description Table to its original state. A malicious application that is run by an administrator can read an intact SDT table from kernel memory and restore the SDT table in the running kernel by writing to kernel memory space. This will disable Kerio Personal Firewall (KPF) 'Application Security' functionality
VAR-200408-0226 | CVE-2004-1650 | D-Link Securicam Network DCS-900 Internet Camera Remote Configuration Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
D-Link DCS-900 Internet Camera listens on UDP port 62976 for an IP address, which allows remote attackers to change the IP address of the camera via a UDP broadcast packet. D-Link Securicam Network DCS-900 Internet Camera is reportedly affected by a remote configuration vulnerability.
An attacker may leverage this issue to hijack the vulnerable camera, ultimately triggering a denial of service condition, as the unsuspecting user will be unable to connect to the device without having its IP address