VARIoT IoT vulnerabilities database

VAR-200506-0251 | No CVE | Cisco Voice VLAN 802.1x Authentication Bypass Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
IEEE 802.1X is a standard for authenticating network clients (or ports) based on user IDs or devices. An authentication bypass vulnerability exists in Cisco switches that allows an attacker to anonymously access a voice VLAN. An attacker can spoof CDP packets, play Cisco IP phones, and join voice VLANs anonymously. This may allow an attacker to access network resources without the expected 802.1x authentication. Because network administrators may think that switch port access is limited to authenticated users, it can lead to erroneous security awareness. Once an attacker gains access to a voice VLAN, they can launch further attacks on the server or host, or eavesdrop on VOIP sessions. Further network attacks are also possible at this point
VAR-200512-0648 | CVE-2005-2194 | Apple Mac OSX executes arbitrary widget with same "bundle identifier" as system widget |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in the Apple Mac OS X kernel before 10.4.2 allows remote attackers to cause a denial of service (kernel panic) via a crafted TCP packet, possibly related to source routing or loose source routing. Apple Mac OS X Tiger Dashboard executes arbitrary widgets with the same "bundle identifier" as a system widget. This can allow a user-installed widget to override a system-installed one. Apple Mac OS X is prone to a remote denial of service vulnerability. The issue exists due to a NULL pointer dereference that manifests in the kernel when specially crafted TCP/IP packets of an unspecified type are processed.
A remote attacker may exploit this condition to trigger a kernel panic on a target computer, effectively denying service for legitimate users.
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Apple Mac OS X Two Vulnerabilities
SECUNIA ADVISORY ID:
SA16047
VERIFY ADVISORY:
http://secunia.com/advisories/16047/
CRITICAL:
Moderately critical
IMPACT:
Manipulation of data, DoS
WHERE:
>From remote
OPERATING SYSTEM:
Apple Macintosh OS X
http://secunia.com/product/96/
DESCRIPTION:
Two vulnerabilities have been reported in Mac OS X, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
replace system widgets on a user's system.
2) An error in the Dashboard can be exploited to install widgets with
the same internal identifier (CFBundleIdentifier) as an Apple-supplied
widgets thereby replacing it.
SOLUTION:
Apply patches.
Mac OS X Server 10.4.2 Combo:
http://www.apple.com/support/downloads/macosxserver1042combo.html
Mac OS X Update 10.4.2:
http://www.apple.com/support/downloads/macosxupdate1042.html
Mac OS X Update 10.4.2 Combo:
http://www.apple.com/support/downloads/macosxupdate1042combo.html
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Julian Y. Koh.
2) mithras.the.prophet
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=301948
mithras.the.prophet:
http://www1.cs.columbia.edu/~aaron/files/widgets/
OTHER REFERENCES:
US-CERT VU#983429:
http://www.kb.cert.org/vuls/id/983429
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200512-0623 | CVE-2005-1726 | Apple Mac OS X Illegal access vulnerability |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
The CoreGraphics Window Server in Mac OS X 10.4.1 allows local users with console access to gain privileges by "launching commands into root sessions.". Apple has released Security Update 2005-006 to address multiple local and remote Mac OS X vulnerabilities.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability (CAN-2005-1728) in the MCX Client that may allow local attackers to gain access to Portable Home Directory credentials.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues.
Successful exploitation allows execution of arbitrary code.
2) A bug in AFP Server when using an ACL-enabled storage volume may
in certain situations result in an ACL remaining attached when a file
with POSIX-only permissions is copied.
3) An input validation error can be exploited to access arbitrary
files on a Bluetooth-enabled system using directory traversal attacks
via the Bluetooth file and object exchange services.
4) A weakness in CoreGraphics can be exploited via a specially
crafted PDF document to crash an application using either PDFKit or
CoreGraphics to rendor PDF documents.
7) A race condition in the temporary file creation of launchd can be
exploited by malicious, local users to take ownership of arbitrary
files on the system.
8) An error in LaunchServices can result in file extensions and MIME
types marked as unsafe to bypass download safety checks if they're
not mapped to an Apple UTI (Uniform Type Identifier).
10) A security issue in NFS causes a NFS export restricted using
"-network" and "-mask" to be exported to "everyone".
11) Multiple vulnerabilities in PHP can be exploited by malicious
people to cause a DoS (Denial of Service) and potentially compromise
a vulnerable system.
For more information:
SA14792
12) A boundary error in vpnd can be exploited by malicious, local
users to cause a buffer overflow via an overly long Server_id
parameter and execute arbitrary code with escalated privileges on
systems configured as a VPN server.
SOLUTION:
Apply Security Update 2005-006.
Mac OS X 10.3.9:
http://www.apple.com/support/downloads/securityupdate2005006macosx1039.html
Mac OS X 10.4.1:
http://www.apple.com/support/downloads/securityupdate2005006macosx1041.html
PROVIDED AND/OR DISCOVERED BY:
3) Kevin Finisterre, digitalmunition.com.
4) Chris Evans
6) Michael Haller
7) Neil Archibald
12) Pieter de Boer
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=301742
OTHER REFERENCES:
SA14792:
http://secunia.com/advisories/14792/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200506-0229 | CVE-2005-1728 | Apple Mac OS X MCX Client security vulnerability |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
MCX Client for Apple Mac OS X 10.4.x up to 10.4.1 insecurely logs Portable Home Directory credentials, which allows local users to obtain the credentials.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues
VAR-200506-0228 | CVE-2005-1727 | Apple Mac OS X Privilege escalation vulnerability |
CVSS V2: 3.7 CVSS V3: - Severity: LOW |
Apple Mac OS X 10.4.x up to 10.4.1 sets insecure world- and group-writable permissions for the (1) system cache folder and (2) Dashboard system widgets, which allows local users to conduct unauthorized file operations via "file race conditions.". Apple has released Security Update 2005-006 to address multiple local and remote Mac OS X vulnerabilities.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability (CAN-2005-1728) in the MCX Client that may allow local attackers to gain access to Portable Home Directory credentials.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues
VAR-200506-0227 | CVE-2005-1725 | Apple Mac OS X 'launchd 106' Security hole |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
launchd 106 in Apple Mac OS X 10.4.x up to 10.4.1 allows local users to overwrite arbitrary files via a symlink attack on the socket file in an insecure temporary directory. Apple has released Security Update 2005-006 to address multiple local and remote Mac OS X vulnerabilities.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability (CAN-2005-1728) in the MCX Client that may allow local attackers to gain access to Portable Home Directory credentials.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues
VAR-200506-0226 | CVE-2005-1724 | Apple Mac OS X Access restriction bypass vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
NFS on Apple Mac OS X 10.4.x up to 10.4.1 does not properly obey the -network or -mask flags for a filesystem and exports it to everyone, which allows remote attackers to bypass intended access restrictions. Apple has released Security Update 2005-006 to address multiple local and remote Mac OS X vulnerabilities.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability (CAN-2005-1728) in the MCX Client that may allow local attackers to gain access to Portable Home Directory credentials.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues
VAR-200506-0225 | CVE-2005-1723 | Apple Mac OS X Operating system Security Update 2005-006 Multiple vulnerabilities in |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
LaunchServices in Apple Mac OS X 10.4.x up to 10.4.1 does not properly mark file extensions and MIME types as unsafe if an Apple Uniform Type Identifier (UTI) is not created when the type is added to the database of unsafe types, which could allow attackers to bypass intended restrictions. Apple has released Security Update 2005-006 to address multiple local and remote Mac OS X vulnerabilities.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability (CAN-2005-1728) in the MCX Client that may allow local attackers to gain access to Portable Home Directory credentials.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues. If the ? The MIME type is marked as unsafe
VAR-200506-0224 | CVE-2005-1722 | Apple Mac OS X Arbitrary command injection vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Unknown vulnerability in the CoreGraphics Window Server for Mac OS X 10.4.x up to 10.4.1 allows local users to inject arbitrary commands into root sessions. Apple has released Security Update 2005-006 to address multiple local and remote Mac OS X vulnerabilities.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability (CAN-2005-1728) in the MCX Client that may allow local attackers to gain access to Portable Home Directory credentials.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues
VAR-200506-0223 | CVE-2005-1721 | Apple Mac OS X Buffer overflow vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Buffer overflow in the legacy client support for AFP Server for Mac OS X 10.4.1 allows attackers to execute arbitrary code. Apple has released Security Update 2005-006 to address multiple local and remote Mac OS X vulnerabilities.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability (CAN-2005-1728) in the MCX Client that may allow local attackers to gain access to Portable Home Directory credentials.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues
VAR-200506-0222 | CVE-2005-1720 | Apple Mac OS X Operating system Security Update 2005-006 Multiple vulnerabilities |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
AFP Server for Mac OS X 10.4.1, when using an ACL enabled volume, does not properly remove an ACL when a file is copied to a directory that does not use ACLs, which will override the POSIX file permissions for that ACL. Apple has released Security Update 2005-006 to address multiple local and remote Mac OS X vulnerabilities.
The following new vulnerabilities were addressed by the security update:
- A buffer overflow (CAN-2005-1721) in the AFP (Apple File Protocol) Server.
- A vulnerability (CAN-2005-1720) in AFP Server related to temporary ACLs.
- A denial of service vulnerability (CAN-2005-1722) in the CoreGraphics component.
- A local privilege escalation (CAN-2005-1726) in the CoreGraphics component.
- A local race condition vulnerability (CAN-2005-1727) related to permissions on the system cache and Dashboard folders.
- A local privilege escalation vulnerability (CAN-2005-1725) in the launch daemon (launchd).
- A vulnerability in Launch Services (CAN-2005-1723) could allow files to bypass "safe download" checks.
- A vulnerability (CAN-2005-1728) in the MCX Client that may allow local attackers to gain access to Portable Home Directory credentials.
- A vulnerability in NFS (CAN-2005-1724) could allow unauthorized access to exported filesystems.
These vulnerabilities will be separated into individual BIDs upon further analysis of the issues
VAR-200506-0052 | CVE-2005-1933 | Apple Mac OSX executes arbitrary widget with same "bundle identifier" as system widget |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Dashboard in Apple Mac OS X Tiger 10.4 allows attackers to execute arbitrary commands by overriding the behavior of system widgets via a user widget with the same bundle identifier (CFBundleIdentifier), a different vulnerability than CVE-2005-1474. This can allow a user-installed widget to override a system-installed one. Mac OS X is prone to a remote security vulnerability.
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Apple Mac OS X Two Vulnerabilities
SECUNIA ADVISORY ID:
SA16047
VERIFY ADVISORY:
http://secunia.com/advisories/16047/
CRITICAL:
Moderately critical
IMPACT:
Manipulation of data, DoS
WHERE:
>From remote
OPERATING SYSTEM:
Apple Macintosh OS X
http://secunia.com/product/96/
DESCRIPTION:
Two vulnerabilities have been reported in Mac OS X, which can be
exploited by malicious people to cause a DoS (Denial of Service) or
replace system widgets on a user's system.
1) A NULL pointer dereference error in the TCP/IP implementation can
be exploited to crash the kernel via a specially crafted TCP/IP
packet.
2) An error in the Dashboard can be exploited to install widgets with
the same internal identifier (CFBundleIdentifier) as an Apple-supplied
widgets thereby replacing it.
SOLUTION:
Apply patches. Koh.
2) mithras.the.prophet
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=301948
mithras.the.prophet:
http://www1.cs.columbia.edu/~aaron/files/widgets/
OTHER REFERENCES:
US-CERT VU#983429:
http://www.kb.cert.org/vuls/id/983429
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200507-0034 | CVE-2005-2090 | Multiple PHP XML-RPC implementations vulnerable to code injection |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling.". A vulnerability in a common PHP extension module could allow a remote attacker to execute code on a vulnerable system. Multiple vendors' products are prone to HTTP-request-smuggling issues. Attackers can piggyback an HTTP request inside of another HTTP request. By leveraging failures to implement the HTTP/1.1 RFC properly, attackers can launch cache-poisoning, cross-site scripting, session-hijacking, and other attacks. Title: CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities
CA Advisory Reference: CA20090123-01
CA Advisory Date: 2009-01-23
Reported By: n/a
Impact: Refer to the CVE identifiers for details.
Summary: Multiple security risks exist in Apache Tomcat as
included with CA Cohesion Application Configuration Manager. CA
has issued an update to address the vulnerabilities. Refer to the
References section for the full list of resolved issues by CVE
identifier.
Mitigating Factors: None
Severity: CA has given these vulnerabilities a Medium risk rating.
Affected Products:
CA Cohesion Application Configuration Manager 4.5
Non-Affected Products
CA Cohesion Application Configuration Manager 4.5 SP1
Affected Platforms:
Windows
Status and Recommendation:
CA has issued the following update to address the vulnerabilities.
CA Cohesion Application Configuration Manager 4.5:
RO04648
https://support.ca.com/irj/portal/anonymous/redirArticles?reqPage=search
&searchID=RO04648
How to determine if you are affected:
1. Using Windows Explorer, locate the file "RELEASE-NOTES".
2. By default, the file is located in the
"C:\Program Files\CA\Cohesion\Server\server\" directory.
3. Open the file with a text editor.
4. If the version is less than 5.5.25, the installation is
vulnerable.
Workaround: None
References (URLs may wrap):
CA Support:
http://support.ca.com/
CA20090123-01: Security Notice for Cohesion Tomcat
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=1975
40
Solution Document Reference APARs:
RO04648
CA Security Response Blog posting:
CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities
community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
Reported By:
n/a
CVE References:
CVE-2005-2090
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090
CVE-2005-3510
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3510
CVE-2006-3835
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3835
CVE-2006-7195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7195
CVE-2006-7196
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7196
CVE-2007-0450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450
CVE-2007-1355
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1355
CVE-2007-1358
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1358
CVE-2007-1858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1858
CVE-2007-2449
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449
CVE-2007-2450
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450
CVE-2007-3382
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382
CVE-2007-3385 *
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385
CVE-2007-3386
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3386
CVE-2008-0128
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0128
*Note: the issue was not completely fixed by Tomcat maintainers.
OSVDB References: Pending
http://osvdb.org/
Changelog for this advisory:
v1.0 - Initial Release
v1.1 - Updated Impact, Summary, Affected Products
Customers who require additional information should contact CA
Technical Support at http://support.ca.com.
For technical questions or comments related to this advisory,
please send email to vuln AT ca DOT com.
If you discover a vulnerability in CA products, please report your
findings to the CA Product Vulnerability Response Team.
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=1777
82
Regards,
Ken Williams, Director ; 0xE2941985
CA Product Vulnerability Response Team
CA, 1 CA Plaza, Islandia, NY 11749
Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2009 CA. All rights reserved. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01178795
Version: 1
HPSBUX02262 SSRT071447 rev. 1 - HP-UX running Apache, Remote Arbitrary Code Execution, Cross Site Scripting (XSS)
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2007-10-02
Last Updated: 2007-10-02
Potential Security Impact: Remote arbitrary code execution, cross site scripting (XSS)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with Apache running on HP-UX. The vulnerabilities could be exploited remotely via Cross Site Scripting (XSS) to execute arbitrary code.
References: CVE-2005-2090, CVE-2006-5752, CVE-2007-0450, CVE-2007-0774, CVE-2007-1355, CVE-2007-1358, CVE-2007-1860, CVE-2007-1863, CVE-2007-1887, CVE-2007-1900, CVE-2007-2449, CVE-2007-2450, CVE-2007-2756, CVE-2007-2872, CVE-2007-3382, CVE-2007-3385, CVE-2007-3386.
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.11, B.11.23, B.11.31 running Apache
BACKGROUND
To determine if a system has an affected version, search the output of "swlist -a revision -l fileset" for an affected fileset. Then determine if the recommended patch or update is installed.
AFFECTED VERSIONS
For IPv4:
HP-UX B.11.11
=============
hpuxwsAPACHE
action: install revision A.2.0.59.00 or subsequent
restart Apache
URL: https://www.hp.com/go/softwaredepot/
For IPv6:
HP-UX B.11.11
HP-UX B.11.23
HP-UX B.11.31
=============
hpuxwsAPACHE,revision=B.1.0.00.01
hpuxwsAPACHE,revision=B.1.0.07.01
hpuxwsAPACHE,revision=B.1.0.08.01
hpuxwsAPACHE,revision=B.1.0.09.01
hpuxwsAPACHE,revision=B.1.0.10.01
hpuxwsAPACHE,revision=B.2.0.48.00
hpuxwsAPACHE,revision=B.2.0.49.00
hpuxwsAPACHE,revision=B.2.0.50.00
hpuxwsAPACHE,revision=B.2.0.51.00
hpuxwsAPACHE,revision=B.2.0.52.00
hpuxwsAPACHE,revision=B.2.0.53.00
hpuxwsAPACHE,revision=B.2.0.54.00
hpuxwsAPACHE,revision=B.2.0.55.00
hpuxwsAPACHE,revision=B.2.0.56.00
hpuxwsAPACHE,revision=B.2.0.58.00
hpuxwsAPACHE,revision=B.2.0.58.01
action: install revision B.2.0.59.00 or subsequent
restart Apache
URL: https://www.hp.com/go/softwaredepot/
END AFFECTED VERSIONS
RESOLUTION
HP has made the following available to resolve the vulnerability.
HP-UX Apache-based Web Server v.2.18 powered by Apache Tomcat Webmin or subsequent.
The update is available on https://www.hp.com/go/softwaredepot/
Note: HP-UX Apache-based Web Server v.2.18 powered by Apache Tomcat Webmin contains HP-UX Apache-based Web Server v.2.0.59.00.
MANUAL ACTIONS: Yes - Update
Install HP-UX Apache-based Web Server v.2.18 powered by Apache Tomcat Webmin or subsequent.
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant:
HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all HP-issued Security Bulletins and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically.
For more information see: https://www.hp.com/go/swa
HISTORY
Revision: 1 (rev.1) - 02 October 2007 Initial release
Third Party Security Patches:
Third party security patches which are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows:
To: security-alert@hp.com
Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
- check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
- verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
* The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
\xa9Copyright 2007 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1
iQA/AwUBRwVCruAfOvwtKn1ZEQK1YgCfavU7x1Hs59uLdP26lpZFwMxKofIAn3gJ
HHoe3AY1sc6hrW3Xk+B1hcbr
=+E1W
-----END PGP SIGNATURE-----
.
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
phpPgAds XML-RPC PHP Code Execution Vulnerability
SECUNIA ADVISORY ID:
SA15884
VERIFY ADVISORY:
http://secunia.com/advisories/15884/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
phpPgAds 2.x
http://secunia.com/product/4577/
DESCRIPTION:
A vulnerability has been reported in phpPgAds, which can be exploited
by malicious people to compromise a vulnerable system.
For more information:
SA15852
SOLUTION:
Update to version 2.0.5.
http://sourceforge.net/project/showfiles.php?group_id=36679
OTHER REFERENCES:
SA15852:
http://secunia.com/advisories/15852/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. Summary:
Updated Tomcat and Java JRE packages for VirtualCenter 2.0.2, ESX
Server 3.0.2, and ESX 3.0.1. Relevant releases:
VirtualCenter Management Server 2
ESX Server 3.0.2 without patch ESX-1002434
ESX Server 3.0.1 without patch ESX-1003176
3.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2005-2090, CVE-2006-7195, and CVE-2007-0450 to
these issues.
JRE Security Update
This release of VirtualCenter Server updates the JRE package from
1.5.0_7 to 1.5.0_12, which addresses a security issue that existed in
the earlier release of JRE.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2007-3004 to this issue.
Security best practices provided by VMware recommend that the
service console be isolated from the VM network. Please see
http://www.vmware.com/resources/techresources/726 for more
information on VMware security best practices. Solution:
Please review the Patch notes for your product and version and verify
the md5sum of your downloaded file.
VMware VirtualCenter 2.0.2 Update 2 Release Notes
http://www.vmware.com/support/vi3/doc/releasenotes_vc202u2.html
VirtualCenter CD image
md5sum d7d98a5d7f8afff32cee848f860d3ba7
VirtualCenter as Zip
md5sum 3b42ec350121659e10352ca2d76e212b
ESX Server 3.0.2
http://kb.vmware.com/kb/1002434
md5sum: 2f52251f6ace3d50934344ef313539d5
ESX Server 3.0.1
http://kb.vmware.com/kb/1003176
md5sum: 5674ca0dcfac90726014cc316444996e
5. Contact:
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
* security-announce@lists.vmware.com
* bugtraq@securityfocus.com
* full-disclosure@lists.grok.org.uk
E-mail: security@vmware.com
Security web site
http://www.vmware.com/security
VMware security response policy
http://www.vmware.com/support/policies/security_response.html
General support life cycle policy
http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy
http://www.vmware.com/support/policies/eos_vi.html
Copyright 2008 VMware Inc. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
CVE-2013-4286 Incomplete fix for CVE-2005-2090 (Information disclosure)
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected:
- - Apache Tomcat 8.0.0-RC1
- - Apache Tomcat 7.0.0 to 7.0.42
- - Apache Tomcat 6.0.0 to 6.0.37
Description:
The fix for CVE-2005-2090 was not complete. It did not cover the
following cases:
- - content-length header with chunked encoding over any HTTP connector
- - multiple content-length headers over any AJP connector
Requests with multiple content-length headers or with a content-length
header when chunked encoding is being used should be rejected as
invalid. When multiple components (firewalls, caches, proxies and
Tomcat) process a sequence of requests where one or more requests
contain either multiple content-length headers or a content-length
header when chunked encoding is being used and several components do not
reject the request and make different decisions as to which
content-length header to use an attacker can poison a web-cache, perform
an XSS attack and obtain sensitive information from requests other then
their own. Tomcat now rejects requests with multiple content-length
headers or with a content-length header when chunked encoding is being
used.
Mitigation:
Users of affected versions should apply one of the following mitigations
- - Upgrade to Apache Tomcat 8.0.0-RC3 or later
(8.0.0-RC2 contains the fix but was not released)
- - Upgrade to Apache Tomcat 7.0.47 or later
(7.0.43 to 7.0.46 contain the fix but were not released)
- - Upgrade to Apache Tomcat 6.0.39 or later
(6.0.38 contains the fix but was not released)
Credit:
This issue was identified by the Apache Tomcat security team while
investigating an invalid report related to CVE-2005-2090
VAR-200506-0065 | CVE-2005-1837 | FortiOS Firewall privilege escalation vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Fortinet firewall running FortiOS 2.x contains a hardcoded username with the password set to the serial number, which allows local users with console access to gain privileges. Fortinet Firewall is prone to a remote security vulnerability. A local user with console access could exploit this vulnerability to gain privileges
VAR-200505-0128 | CVE-2005-1802 | Nortel VPN Router malformed packet denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Nortel VPN Router (aka Contivity) allows remote attackers to cause a denial of service (crash) via an IPsec IKE packet with a malformed ISAKMP header. Multiple Nortel Networks products are prone to a remote denial of service vulnerability.
The issue manifests when the affected appliance processes an IKE main packet (ISAKMP) header of a certain type.
When the packet is processed, the vulnerability is triggered and the device crashes, effectively denying service for legitimate users. Nortel VPN routers provide routing, VPN, firewall, bandwidth management, encryption, authentication, and data integrity functions for secure connections over IP networks and the Internet. A denial of service vulnerability exists in the Nortel VPN router product (formerly known as Nortel Contivity) when performing VPN security tests on users
VAR-200505-0120 | CVE-2005-1828 | D-Link DSL-504T Vulnerability |
CVSS V2: 7.5 CVSS V3: 7.5 Severity: HIGH |
D-Link DSL-504T stores usernames and passwords in cleartext in the router configuration file, which allows remote attackers to obtain sensitive information. DSL-504T is prone to a information disclosure vulnerability
VAR-200505-0290 | CVE-2005-1408 | Apple Keynote Local File Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Apple Keynote 2.0 and 2.0.1 allows remote attackers to read arbitrary files via the keynote: URI handler in a crafted Keynote presentation.
----------------------------------------------------------------------
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-
Sicherheit:
http://secunia.com/secunia_vacancies/
----------------------------------------------------------------------
TITLE:
Keynote Arbitrary File Retrieval Vulnerability
SECUNIA ADVISORY ID:
SA15508
VERIFY ADVISORY:
http://secunia.com/advisories/15508/
CRITICAL:
Less critical
IMPACT:
Exposure of system information, Exposure of sensitive information
WHERE:
>From remote
SOFTWARE:
Apple Keynote 2.x
http://secunia.com/product/5156/
DESCRIPTION:
David Remahl has reported a vulnerability in Keynote, which can be
exploited by malicious people to gain knowledge of sensitive
information.
SOLUTION:
Update to version 2.0.2.
http://www.apple.com/iwork/keynote/download/
PROVIDED AND/OR DISCOVERED BY:
David Remahl
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=301713
David Remahl:
http://remahl.se/david/vuln/016/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200505-1218 | CVE-2005-1254 | Ipswitch IMail IMAP SELECT Command denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Stack-based buffer overflow in the IMAP server for Ipswitch IMail 8.12 and 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to cause a denial of service (crash) via a SELECT command with a large argument. Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code.
The vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues. Ipswitch IMail server is a Windows-based communication and collaboration solution. However, this vulnerability cannot be further exploited. Ipswitch IMail IMAP SELECT Command DoS Vulnerability
iDEFENSE Security Advisory 05.24.05
www.idefense.com/application/poi/display?id=241&type=vulnerabilities
May 24, 2005
I. BACKGROUND
Ipswitch IMail server is a Windows based messaging solution with a
customer base of over 53 million users. More information about the
application is available at:
http://www.ipswitch.com/products/IMail_Server/index.html.
II.
The problem specifically exists in the handling of long arguments to the
SELECT command. When a string approximately 260 bytes in size is
supplied a stack-based buffer overflow occurs that results in an
unhandled access violation forcing the daemon to exit. The issue is not
believed to be further exploitable.
III. ANALYSIS
Successful exploitation allows remote to crash vulnerable IMAP servers
and thereby prevent legitimate usage. The SELECT command is only
available post authentication and therefore valid credentials are
required to exploit this vulnerability
IV. DETECTION
iDEFENSE has confirmed the existence of this vulnerability in the latest
version of Ipswitch IMAIL, version 8.13. Version 8.12 is also confirmed
as vulnerable. It is suspected that earlier versions are vulnerable as
well.
V. WORKAROUND
As this vulnerability is exploited after authentication occurs, ensuring
that only trusted users have accounts can mitigate the risk somwhat. As
a more effective workaround, consider limiting access to the IMAP server
by filtering TCP port 143. If possible, consider disabling IMAP and
forcing users to use POP3.
VI. VENDOR RESPONSE
The vendor has released the following patch to fix this vulnerability:
ftp://ftp.ipswitch.com/Ipswitch/Product_Support/IMail/imail82hf2.exe
The associated vendor advisory can be found at:
http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf
2.html
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-1254 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.
VIII. DISCLOSURE TIMELINE
04/15/2005 Initial vendor notification
05/10/2005 Initial vendor response
05/24/2005 Coordinated public disclosure
IX. CREDIT
Sebastian Apelt is credited with this discovery.
Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp
Free tools, research and upcoming events
http://labs.idefense.com
X. LEGAL NOTICES
Copyright (c) 2005 iDEFENSE, Inc.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-200505-1216 | CVE-2005-1249 | Ipswitch IMail IMAP SELECT Command denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop. Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code.
The vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues. Attackers can use this vulnerability to cause the target service to crash. The cause of the vulnerability is the handling of extremely long parameters of the SELECT command. However, this vulnerability cannot be further exploited. Ipswitch IMail IMAP LSUB DoS Vulnerability
iDEFENSE Security Advisory 05.24.05
www.idefense.com/application/poi/display?id=245&type=vulnerabilities
May 24, 2005
I. BACKGROUND
Ipswitch Collaboration Suite (ICS) is a comprehensive communication and
collaboration solution for Microsoft Windows with a customer base of
over 53 million users. More information is available on the vendor's
website:
http://www.ipswitch.com/products/IMail_Server/index.html
II.
The problem specifically exists within IMAPD32.EXE upon parsing a
malformed LSUB command. An attacker can cause the daemon to produce
heavy load by transmitting a long string of NULL characters to the
'LSUB' IMAP directive. This, in turn, causes an infinite loop,
eventually exhausting all available system resources and causing a
denial of service.
III. ANALYSIS
Exploitation allows unauthenticated remote attackers to render the IMAP
server useless, thereby preventing legitimate users from retrieving e-
mail. This attack takes few resources to launch and can be repeated
to ensure that an unpatched system is unable to recover. Exploitation
requires a valid IMAP account, thus limiting the impact of this
vulnerability.
IV. DETECTION
iDEFENSE has confirmed the existence of this vulnerability in Ipswitch
IMail version 8.13. It is suspected that earlier versions are also
vulnerable.
V. WORKAROUND
As this vulnerability is exploited after authentication occurs, ensuring
that only trusted users have accounts can mitigate the risk somwhat. As
a more effective workaround, consider limiting access to the IMAP server
by filtering TCP port 143. If possible, consider disabling IMAP and
forcing users to use POP3.
VI. VENDOR RESPONSE
The vendor has released the following patch to fix this vulnerability:
ftp://ftp.ipswitch.com/Ipswitch/Product_Support/IMail/imail82hf2.exe
The associated vendor advisory can be found at:
http://www.ipswitch.com/support/imail/releases/imail_professional/im82hf
2.html
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CAN-2005-1249 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security problems.
VIII. DISCLOSURE TIMELINE
04/25/2005 Initial vendor notification
05/10/2005 Initial vendor response
05/24/2005 Public disclosure
IX. CREDIT
The discoverer of the first vulnerability wishes to remain anonymous.
Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp
Free tools, research and upcoming events
http://labs.idefense.com
X. LEGAL NOTICES
Copyright (c) 2005 iDEFENSE, Inc.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-200505-1217 | CVE-2005-1252 | Ipswitch IMail IMAP SELECT Command denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Directory traversal vulnerability in the Web Calendaring server in Ipswitch Imail 8.13, and other versions before IMail Server 8.2 Hotfix 2, allows remote attackers to read arbitrary files via "..\" (dot dot backslash) sequences in the query string argument in a GET request to a non-existent .jsp file. Ipswitch IMail is prone to multiple remote vulnerabilities. Attackers may exploit these issues to deny service for legitimate users, obtaoin potentially sensitive information, and execute arbitrary code.
The vulnerabilities include a directory-traversal issue, two remote denial-of-service issues, and multiple buffer-overflow issues. Ipswitch IMail server is a Windows-based communication and collaboration solution. There is a remote denial of service vulnerability in the Imail IMAP server of Ipswitch Inc. Attackers can use this vulnerability to cause the target service to crash. The cause of the vulnerability is the handling of extremely long parameters of the SELECT command. If the attacker can provide a string with a length of about 260 bytes, it may trigger a stack overflow and cause the daemon to exit. However, this vulnerability cannot be further exploited