VARIoT IoT vulnerabilities database
| VAR-200708-0087 | CVE-2007-4204 | Hitachi Groupmax Collaboration - Schedule Vulnerability in which important information is obtained |
CVSS V2: 3.5 CVSS V3: - Severity: LOW |
Hitachi Groupmax Collaboration - Schedule, as used in Groupmax Collaboration Portal 07-32 through 07-32-/B, uCosminexus Collaboration Portal 06-32 through 06-32-/B, and Groupmax Collaboration Web Client - Mail/Schedule 07-32 through 07-32-/A, can assign schedule data to the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information
| VAR-200708-0527 | No CVE | Ipswitch IMail Server SEARCH Command Remote Buffer Overflow Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Ipswitch IMail Server is a mail server bundled in the Ipswitch collaboration component. A buffer overflow vulnerability exists in the IMail server processing parameters of the SEARCH command request. A remote attacker could exploit this vulnerability to control the server. The IMail server has a stack buffer overflow problem when dealing with multiple options of the SEARCH command (BEFORE, ON, SINCE, SENTBEFORE, SENTON, SENTSINCE). The remote attacker can trigger an overflow by submitting a malformed SEARCH request, resulting in arbitrary instructions. Ipswitch IMail Server and Collaboration Suite (ICS) are prone to multiple buffer-overflow vulnerabilities because these applications fail to properly bounds-check user-supplied input before copying it into an insufficiently sized memory buffer.
Attackers may exploit these issues to execute arbitrary code in the context of the affected applications. Failed exploit attempts will likely result in denial-of-service conditions.
These versions are reported vulnerable to these issues:
Ipswitch Collaboration Suite (ICS) 2006
IMail Premium 2006.2 and 2006.21
Other versions may also be affected.
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors. This
can be exploited to cause stack-based buffer overflows via overly
long, quoted or unquoted arguments passed to the command.
Successful exploitation allows execution of arbitrary code. Other versions may also be affected.
SOLUTION:
Grant only trusted users access to the IMAP service.
PROVIDED AND/OR DISCOVERED BY:
Independently discovered by:
* Secunia Research
* ZhenHan Liu, Ph4nt0m Security Team.
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200708-0003 | CVE-2007-2927 | Atheros wireless network drivers may fail to properly handle malformed frames |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in Atheros 802.11 a/b/g wireless adapter drivers before 5.3.0.35, and 6.x before 6.0.3.67, on Windows allows remote attackers to cause a denial of service via a crafted 802.11 management frame. Atheros wireless drivers fail to properly handle malformed wireless frames. This vulnerability may allow a remote, unauthenticated attacker to create a denial-of-service condition. Atheros Provided by the company Microsoft Windows The wireless network driver for is vulnerable to the frame handling part. Crafted 802.11 Sending a management frame causes a buffer overflow, resulting in service disruption ( DoS ) You may be attacked. 802.11b, 802.11g, 802.11n Management frames in are not encrypted and do not require authentication to be sent. further, WEP And WPA It has been found that even if wireless communication encryption such as is affected by this vulnerability. Linux And UNIX Used in NDISWrapper And using vulnerable drivers with similar technologies may also be affected.
The driver did not adequately check for malformed management frames, and a remote attacker could trigger an overflow by sending a specially constructed 802.11 management frame that requires no authentication or encryption.
Atheros drivers are also used by OEM (Original Equipment Manufacturer) wireless adapters.
This issue is reported to affect drivers for the Windows operating system.
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.
SOLUTION:
The vendor has reportedly issued firmware updates (versions 5.3.0.35
and 6.0.3.67 and later) to OEMs.
PROVIDED AND/OR DISCOVERED BY:
Reported via US-CERT.
ORIGINAL ADVISORY:
US-CERT VU#730169:
http://www.kb.cert.org/vuls/id/730169
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200708-0147 | CVE-2007-4117 | platon of phpwebfilemanager Vulnerability in |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
PHP remote file inclusion vulnerability in index.php in phpWebFileManager 0.5 allows remote attackers to execute arbitrary PHP code via a URL in the PN_PathPrefix parameter. NOTE: this issue is disputed by a reliable third party, who demonstrates that PN_PathPrefix is defined before use. platon of phpwebfilemanager Exists in unspecified vulnerabilities.None
| VAR-200708-0154 | CVE-2007-4124 | Cosminexus Component Container Session Handling Vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
The session failover function in Cosminexus Component Container in Cosminexus 6, 6.7, and 7 before 20070731, as used in multiple Hitachi products, can use session data for the wrong user under unspecified conditions, which might allow remote authenticated users to obtain sensitive information, corrupt another user's session data, and possibly gain privileges. Hitachi uCosminexus is an application server system.
There is a vulnerability in Hitachi uCosminexus's session failover implementation. Remote attackers may use this vulnerability to obtain session-related sensitive data.
Details of the vulnerability are currently unknown.
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.
Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/
----------------------------------------------------------------------
TITLE:
Hitachi Products Cosminexus Component Container Improper Session Data
Handling
SECUNIA ADVISORY ID:
SA26250
VERIFY ADVISORY:
http://secunia.com/advisories/26250/
CRITICAL:
Less critical
IMPACT:
Security Bypass, Exposure of sensitive information
WHERE:
>From local network
SOFTWARE:
uCosminexus Application Server
http://secunia.com/product/13819/
uCosminexus Service Platform
http://secunia.com/product/13823/
uCosminexus Developer
http://secunia.com/product/13820/
uCosminexus Service Architect
http://secunia.com/product/13821/
Cosminexus 6.x
http://secunia.com/product/5795/
DESCRIPTION:
A security issue has been reported in Hitachi products, which
potentially can be exploited by malicious users to gain knowledge of
sensitive information or bypass certain security restrictions.
Please see the vendor's advisory for a list of affected products and
versions.
SOLUTION:
Please see the vendor's advisory for fix details.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.hitachi-support.com/security_e/vuls_e/HS07-024_e/index-e.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200708-0152 | CVE-2007-4122 | Hitachi JP1/Cm2/HV Service disruption in (DoS) Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in Hitachi JP1/Cm2/Hierarchical Viewer (HV) 06-00 through 06-71-/B allows remote attackers to cause a denial of service (application stop and web interface outage) via certain "unexpected data.". Hitachi JP1 / Cm2 / Hierarchical is a middleware platform software.
There is a vulnerability in the implementation of Hitachi JP1 / Cm2 / Hierarchical Viewer. A remote attacker may use this vulnerability to cause a denial of service.
HV generates an error when processing malformed data, which makes the HV web interface unavailable.
Attackers can exploit this issue to cause denial-of-service conditions.
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.
Please see the vendor's advisory for a list of affected versions.
SOLUTION:
Please see the vendor's advisory for fix information.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.hitachi-support.com/security_e/vuls_e/HS07-021_e/index-e.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200708-0466 | CVE-2007-2408 | Apple Safari of WebKit In Java Applet execution vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
WebKit in Apple Safari 3 Beta before Update 3.0.3 does not properly recognize an unchecked "Enable Java" setting, which allows remote attackers to execute Java applets via a crafted web page. Apple Safari is prone to a weakness that may result in the execution of potentially malicious Java applets. This issue results from a design error.
This weakness arises because the application fails to properly check a security setting.
Versions prior to Safari 3.0.3 Beta and Safari 3.0.3 Beta for Windows are vulnerable to this issue. Safari is the WEB browser bundled with the Apple family operating system by default. Safari provides an option to enable Java preferences
| VAR-200707-0675 | CVE-2008-1447 | Multiple DNS implementations vulnerable to cache poisoning |
CVSS V2: 5.0 CVSS V3: 6.8 Severity: MEDIUM |
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug.". ISC (Internet Systems Consortiuim) BIND generates cryptographically weak DNS query IDs which could allow a remote attacker to poison DNS caches. plural DNS There is a vulnerability in the implementation that makes cache poisoning attacks easier. Recent research has found a more efficient method of cash poisoning than previously known. DNS As a cache server, PC Please note that there is a possibility of attack. Cash poisoning attack forged response This is done by sending a packet. query The source port of the packet query By changing the value randomly every time, the probability of a successful cache poisoning attack can be reduced.By cash poisoning attack DNS Fake cache server DNS Information can be cached and DNS Nodes using the cache server may be directed to fake sites.
RESOLUTION
The resolution is to discontinue the use of BIND/iX and migrate DNS services to another platform. This could be used to misdirect users and services;
i.e.
This update provides the latest stable BIND releases for all platforms
except Corporate Server/Desktop 3.0 and MNF2, which have been patched
to correct the issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.1:
73cc24fc9586b7ab290d755012c16a79 2007.1/i586/bind-9.4.2-0.1mdv2007.1.i586.rpm
70867c50cfd64b4406aa002d627d740b 2007.1/i586/bind-devel-9.4.2-0.1mdv2007.1.i586.rpm
3603e9d9115466753397a1f472011703 2007.1/i586/bind-utils-9.4.2-0.1mdv2007.1.i586.rpm
cf5e4100ecb21a4eb603831e5a6ec23d 2007.1/SRPMS/bind-9.4.2-0.1mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
4eb7ce0984d3ce3befff667392e3bf3e 2007.1/x86_64/bind-9.4.2-0.1mdv2007.1.x86_64.rpm
d7b9a9e7d4c52a5b0c54f59ca20bf2d5 2007.1/x86_64/bind-devel-9.4.2-0.1mdv2007.1.x86_64.rpm
c5c66c9609615029d2f07f7b09a63118 2007.1/x86_64/bind-utils-9.4.2-0.1mdv2007.1.x86_64.rpm
cf5e4100ecb21a4eb603831e5a6ec23d 2007.1/SRPMS/bind-9.4.2-0.1mdv2007.1.src.rpm
Mandriva Linux 2008.0:
52dfe3970fcd9495b2bb9379a9312b25 2008.0/i586/bind-9.4.2-1mdv2008.0.i586.rpm
97d20d35b6814aa2f9fab549ca6237c0 2008.0/i586/bind-devel-9.4.2-1mdv2008.0.i586.rpm
87a7bb3dd25abd8cd882a8f2fdc2398e 2008.0/i586/bind-utils-9.4.2-1mdv2008.0.i586.rpm
da4444a8074e6ede39dfa557fb258db7 2008.0/SRPMS/bind-9.4.2-1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
b9d0337363bc1e2b14505f25d4ee5f99 2008.0/x86_64/bind-9.4.2-1mdv2008.0.x86_64.rpm
9b75e2a96784c00c2912bc3bf333d089 2008.0/x86_64/bind-devel-9.4.2-1mdv2008.0.x86_64.rpm
0a593b090d9e6bda3666e234056e19ba 2008.0/x86_64/bind-utils-9.4.2-1mdv2008.0.x86_64.rpm
da4444a8074e6ede39dfa557fb258db7 2008.0/SRPMS/bind-9.4.2-1mdv2008.0.src.rpm
Mandriva Linux 2008.1:
2534ef007262d4ea2d219bab0190466c 2008.1/i586/bind-9.5.0-3mdv2008.1.i586.rpm
c3feee5d05aa3aee14cd70a2d295d0b1 2008.1/i586/bind-devel-9.5.0-3mdv2008.1.i586.rpm
f306c06665b723a2530258e6d1dbdae2 2008.1/i586/bind-doc-9.5.0-3mdv2008.1.i586.rpm
967ef80628f92160930bc3a3827a216e 2008.1/i586/bind-utils-9.5.0-3mdv2008.1.i586.rpm
70fc7a7964944a2926979710c5148ed1 2008.1/SRPMS/bind-9.5.0-3mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64:
3f4d96d7a7f913c141e1f63cdc7e7336 2008.1/x86_64/bind-9.5.0-3mdv2008.1.x86_64.rpm
420db658366763686198f41394aa72b3 2008.1/x86_64/bind-devel-9.5.0-3mdv2008.1.x86_64.rpm
6f3674f68311494c5a9ff0dbce831e82 2008.1/x86_64/bind-doc-9.5.0-3mdv2008.1.x86_64.rpm
4294b3a086b89bf53c5c967c17962447 2008.1/x86_64/bind-utils-9.5.0-3mdv2008.1.x86_64.rpm
70fc7a7964944a2926979710c5148ed1 2008.1/SRPMS/bind-9.5.0-3mdv2008.1.src.rpm
Corporate 3.0:
de2a4372d1c25d73f343c9fcb044c9dd corporate/3.0/i586/bind-9.2.3-6.5.C30mdk.i586.rpm
1f24f6dbdb6c02e21cbbef99555049cb corporate/3.0/i586/bind-devel-9.2.3-6.5.C30mdk.i586.rpm
00405b98290d5a41f226081baa57e18d corporate/3.0/i586/bind-utils-9.2.3-6.5.C30mdk.i586.rpm
6a237dc290f4f7c463b1996e6a4a4515 corporate/3.0/SRPMS/bind-9.2.3-6.5.C30mdk.src.rpm
Corporate 3.0/X86_64:
628162f3d6a414828d2231fefc46842b corporate/3.0/x86_64/bind-9.2.3-6.5.C30mdk.x86_64.rpm
dd29ff31a9cffcc1b20fd045869d7013 corporate/3.0/x86_64/bind-devel-9.2.3-6.5.C30mdk.x86_64.rpm
c475c1a4d048e04da1fc27dcbb17c3f3 corporate/3.0/x86_64/bind-utils-9.2.3-6.5.C30mdk.x86_64.rpm
6a237dc290f4f7c463b1996e6a4a4515 corporate/3.0/SRPMS/bind-9.2.3-6.5.C30mdk.src.rpm
Corporate 4.0:
271ead204904be302d197cd542f5ae23 corporate/4.0/i586/bind-9.3.5-0.4.20060mlcs4.i586.rpm
42413dcc1cf053e735216f767eff4e5d corporate/4.0/i586/bind-devel-9.3.5-0.4.20060mlcs4.i586.rpm
0201afe493a41e1deedc9bf7e9725f4a corporate/4.0/i586/bind-utils-9.3.5-0.4.20060mlcs4.i586.rpm
86bc0cdc9ed1b959b6f56e0660268f2e corporate/4.0/SRPMS/bind-9.3.5-0.4.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
b1a18a7d0578dab7bd825eda6c682b3d corporate/4.0/x86_64/bind-9.3.5-0.4.20060mlcs4.x86_64.rpm
6a2ebd550feb9147058de05b1a1ef04d corporate/4.0/x86_64/bind-devel-9.3.5-0.4.20060mlcs4.x86_64.rpm
670a1b934ce4974b8505018ab69ade0b corporate/4.0/x86_64/bind-utils-9.3.5-0.4.20060mlcs4.x86_64.rpm
86bc0cdc9ed1b959b6f56e0660268f2e corporate/4.0/SRPMS/bind-9.3.5-0.4.20060mlcs4.src.rpm
Multi Network Firewall 2.0:
5b694c24cc2092e38f531dbfdd5c9d41 mnf/2.0/i586/bind-9.2.3-6.5.C30mdk.i586.rpm
c08bc805027059c47bed32215f17eacb mnf/2.0/i586/bind-utils-9.2.3-6.5.C30mdk.i586.rpm
39225289516498e1b071c5059306f2b9 mnf/2.0/SRPMS/bind-9.2.3-6.5.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200901-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: pdnsd: Denial of Service and cache poisoning
Date: January 11, 2009
Bugs: #231285
ID: 200901-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Two errors in pdnsd allow for Denial of Service and cache poisoning.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/pdnsd < 1.2.7 >= 1.2.7
Description
===========
Two issues have been reported in pdnsd:
* The p_exec_query() function in src/dns_query.c does not properly
handle many entries in the answer section of a DNS reply, related to
a "dangling pointer bug" (CVE-2008-4194). The first issue
can be exploited by enticing pdnsd to send a query to a malicious DNS
server, or using the port randomization weakness, and might lead to a
Denial of Service.
Workaround
==========
Port randomization can be enabled by setting the "query_port_start"
option to 1024 which would resolve the CVE-2008-1447 issue.
Resolution
==========
All pdnsd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/pdnsd-1.2.7"
References
==========
[ 1 ] CVE-2008-1447
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
[ 2 ] CVE-2008-4194
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4194
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200901-03.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2009 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
The updates are available for download from:
URL: ftp://ss080058:ss080058@hprc.external.hp.com
Note: When software updates are available for other versions of HP-UX BIND, this Security Bulletin will be revised.
HP-UX Release - B.11.11
BIND Depot name - DNSUPGRADE_C.9.3.2.3.0_HP-UX_B.11.11_32_64.depot
MD5 Sum - 6de060effed02aad7f42576b2af8f73a
HP-UX Release - B.11.23
BIND Depot name - DNSUPGRADE_C.9.3.2.3.0_HP-UX_B.11.23_IA_PA.depot
MD5 Sum - 437ebfc3e0fbe171a3de19c99c58ce19
HP-UX Release - B.11.31
BIND Depot name - HPUX-NameServer_C.9.3.2.3.0_HP-UX_B.11.31_IA_PA.depot
MD5 Sum - a0406bdb2d62b1b6257fc83c664be87c
MANUAL ACTIONS: Yes - Update
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all HP-issued Security Bulletins and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco Security Advisory: Multiple Cisco Products Vulnerable to DNS Cache
Poisoning Attacks
Advisory ID: cisco-sa-20080708-dns
http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml
Revision 1.0
For Public Release 2008 July 08 1800 UTC (GMT)
Summary
=======
Multiple Cisco products are vulnerable to DNS cache poisoning attacks
due to their use of insufficiently randomized DNS transaction IDs and
UDP source ports in the DNS queries that they produce, which may allow
an attacker to more easily forge DNS answers that can poison DNS caches.
To exploit this vulnerability an attacker must be able to cause a
vulnerable DNS server to perform recursive DNS queries. Therefore, DNS
servers that are only authoritative, or servers where recursion is not
allowed, are not affected.
Cisco has released free software updates that address this vulnerability.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml.
This security advisory is being published simultaneously with
announcements from other affected organizations.
Products that process DNS messages with the RD flag set will attempt to
answer the question asked on behalf of the client. A product is only
affected if using a vulnerable implementation of the DNS protocol, the
DNS server functionality for the product is enabled, and the DNS feature
for the product is configured to process recursive DNS query messages.
Vulnerable Products
+------------------
The following Cisco products are capable of acting as DNS servers and
have been found to have the DNS implementation weakness that makes some
types of DNS cache poisoning attacks more likely to succeed:
* Cisco IOS Software
A device that is running Cisco IOS Software will be affected if it
is running a vulnerable version and if it is acting as a DNS server.
All Cisco IOS Software releases that support the DNS server
functionality and that have not had their DNS implementation
improved are affected. For information about specific fixed
versions, please refer to the Software Versions and Fixes section.
A device that is running Cisco IOS Software is configured to act
as a DNS server if the command "ip dns server" is present in the
configuration. This command is not enabled by default.
* Cisco Network Registrar
All Cisco Network Registrar versions are affected, and DNS services
are enabled by default.
The DNS server on CNR is enabled via the command-line interface
(CLI) commands "server dns enable start-on-reboot" or "dns enable
start-on-reboot" or via the web management interface in the Servers
page by selecting the appropriate "Start," "Stop," or "Reload"
button.
* Cisco Application and Content Networking System
All Cisco Application and Content Networking System (ACNS) versions
are affected; DNS services are disabled by default.
ACNS is configured to act as a DNS server if the command
"dns enable" is present in the configuration.
* Cisco Global Site Selector Used in Combination with Cisco Network
Registrar
The Cisco Global Site Selector (GSS) is affected when it is used in
combination with Cisco Network Registrar software to provide a more
complete DNS solution. Fixed software would come in the form of an
update of the Cisco Network Registrar software rather than an update
of the GSS software.
Products Confirmed Not Vulnerable
+--------------------------------
Products that do not offer DNS server capabilities are not affected by
this vulnerability.
The Cisco GSS by itself is not affected by this vulnerability. However,
it is affected when it is used with Cisco Network Registrar software.
No other Cisco products are currently known to be affected by these
vulnerabilities.
Details
=======
The Domain Name System is an integral part of networks that are based
on TCP/IP such as the Internet. Simply stated, the Domain Name System
is a hierarchical database that contains mappings of hostnames and IP
addresses. When handling
a query from a DNS client, a DNS server can look into its portion of the
global DNS database (if the query is for a portion of the DNS database
for which the DNS server is authoritative), or it can relay the query
to other DNS servers (if it is configured to do so and if the query
is for a portion of the DNS database for which the DNS server is not
authoritative.)
Because of the processing time and bandwidth that is associated with
handling a DNS query, most DNS servers locally store responses that
are received from other DNS servers. If this happens, a user who
is trying to visit www.example.com may end up contacting the wrong web
server. The fundamental implementation
weakness is that the DNS transaction ID and source port number used to
validate DNS responses are not sufficiently randomized and can easily
be predicted, which allows an attacker to create forged responses to
DNS queries that will match the expected values. The DNS server will
consider such responses to be valid.
The following Cisco products that offer DNS server functionality have
been found to be susceptible to DNS cache poisoning attacks:
* Cisco IOS Software: The vulnerability documented in Cisco bug ID
CSCso81854.
* Cisco Network Registrar: The vulnerability documented in Cisco
bug ID CSCsq01298.
* Cisco Application and Content Networking System (ACNS): The
vulnerability documented in Cisco bug ID CSCsq21930.
This vulnerability has been assigned Common Vulnerabilities and
Exposures (CVE) ID CVE-2008-1447.
Vulnerability Scoring Details
+----------------------------
Cisco has provided scores for the vulnerabilities in this advisory based
on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in
this Security Advisory is done in accordance with CVSS version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of the
vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding CVSS
at
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at
http://intellishield.cisco.com/security/alertmanager/cvss
Cisco Bugs:
* DNS cache prone to poisoning/forged answers attacks (CSCsq21930)
* DNS susceptible to forged query response attacks (CSCsq01298)
* Need to make DNS implementation more resilient against forged answers
(CSCso81854)
CVSS Base Score - 6.4
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - Partial
Availability Impact - Partial
CVSS Temporal Score - 5.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
(same score for the three Cisco bugs listed above.)
Impact
======
Successful exploitation of the vulnerability described in this document
may result in invalid hostname-to-IP address mappings in the cache of an
affected DNS server. This may lead users of this DNS server to contact
the wrong provider of network services. The ultimate impact varies
greatly, ranging from a simple denial of service (for example, making
www.example.com resolve to 127.0.0.1) to phishing and financial fraud.
Software Versions and Fixes
===========================
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to determine
exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.
Cisco IOS Software
+-----------------
Each row of the Cisco IOS Software table (below) names a Cisco IOS
Software release train. If a given release train is vulnerable, then
the earliest possible releases that contain the fix (along with the
anticipated date of availability for each, if applicable) are listed in
the "First Fixed Release" column of the table. The "Recommended Release"
column indicates the releases which have fixes for all the published
vulnerabilities at the time of this Advisory. A device running a release
in the given train that is earlier than the release in a specific column
(less than the First Fixed Release) is known to be vulnerable. Cisco
recommends upgrading to a release equal to or later than the release in
the "Recommended Releases" column of the table.
+----------------------------------------+
| Major | Availability of |
| Release | Repaired Releases |
|------------+---------------------------|
| Affected | First Fixed | Recommended |
| 12.0-Based | Release | Release |
| Releases | | |
|------------+-------------+-------------|
| 12.0 | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0DA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Releases | |
| | prior to | |
| | 12.0(7)DB | |
| | are | |
| | vulnerable, | 12.4(19a) |
| 12.0DB | release | |
| | 12.0(7)DB | 12.4(19b) |
| | and later | |
| | are not | |
| | vulnerable; | |
| | first fixed | |
| | in 12.4 | |
|------------+-------------+-------------|
| | Releases | |
| | prior to | |
| | 12.0(7)DC | |
| | are | |
| | vulnerable, | 12.4(19a) |
| 12.0DC | release | |
| | 12.0(7)DC | 12.4(19b) |
| | and later | |
| | are not | |
| | vulnerable; | |
| | first fixed | |
| | in 12.4 | |
|------------+-------------+-------------|
| 12.0S | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0SC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0SL | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0SP | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0ST | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0SX | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0SY | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0SZ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.0T | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.0W | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0WC | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| 12.0WT | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XD | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Note: | |
| | Releases | |
| | prior to | |
| | 12.0(7)XE1 | |
| | are | |
| 12.0XE | vulnerable, | |
| | release | |
| | 12.0(7)XE1 | |
| | and later | |
| | are not | |
| | vulnerable; | |
|------------+-------------+-------------|
| 12.0XF | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XG | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XH | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XI | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XJ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Releases | |
| | prior to | |
| | 12.0(7)XK2 | |
| | are | |
| | vulnerable, | 12.4(19a) |
| 12.0XK | release | |
| | 12.0(7)XK2 | 12.4(19b) |
| | and later | |
| | are not | |
| | vulnerable; | |
| | first fixed | |
| | in 12.4 | |
|------------+-------------+-------------|
| 12.0XL | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XM | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XN | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XQ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Releases | |
| | prior to | |
| | 12.0(7)XR1 | |
| | are | |
| | vulnerable, | 12.4(19a) |
| 12.0XR | release | |
| | 12.0(7)XR1 | 12.4(19b) |
| | and later | |
| | are not | |
| | vulnerable; | |
| | first fixed | |
| | in 12.4 | |
|------------+-------------+-------------|
| 12.0XS | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XV | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.0XW | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| Affected | First Fixed | Recommended |
| 12.1-Based | Release | Release |
| Releases | | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.1 | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.1AA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1AX | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Releases | |
| | prior to | |
| | 12.1(22)AY1 | |
| | are | |
| 12.1AY | vulnerable, | 12.1(22) |
| | release | EA11 |
| | 12.1(22)AY1 | |
| | and later | |
| | are not | |
| | vulnerable; | |
|------------+-------------+-------------|
| 12.1AZ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1CX | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1DA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Releases | |
| | prior to | |
| | 12.1(4)DB1 | |
| | are | |
| | vulnerable, | 12.4(19a) |
| 12.1DB | release | |
| | 12.1(4)DB1 | 12.4(19b) |
| | and later | |
| | are not | |
| | vulnerable; | |
| | first fixed | |
| | in 12.4 | |
|------------+-------------+-------------|
| | Releases | |
| | prior to | |
| | 12.1(4)DC2 | |
| | are | |
| | vulnerable, | 12.4(19a) |
| 12.1DC | release | |
| | 12.1(4)DC2 | 12.4(19b) |
| | and later | |
| | are not | |
| | vulnerable; | |
| | first fixed | |
| | in 12.4 | |
|------------+-------------+-------------|
| 12.1E | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Releases | |
| | prior to | |
| | 12.1(11)EA1 | |
| | are | |
| 12.1EA | vulnerable, | 12.1(22) |
| | release | EA11 |
| | 12.1(11)EA1 | |
| | and later | |
| | are not | |
| | vulnerable; | |
|------------+-------------+-------------|
| 12.1EB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1EC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1EO | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1EU | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1EV | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1EW | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Note: | |
| | Releases | |
| | prior to | |
| | 12.1(8a)EX | |
| | are | |
| 12.1EX | vulnerable, | |
| | release | |
| | 12.1(8a)EX | |
| | and later | |
| | are not | |
| | vulnerable; | |
|------------+-------------+-------------|
| 12.1EY | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1EZ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1GA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1GB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.1T | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.1XA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Releases | |
| | prior to | |
| | 12.1(1)XC1 | |
| | are | |
| | vulnerable, | 12.4(19a) |
| 12.1XC | release | |
| | 12.1(1)XC1 | 12.4(19b) |
| | and later | |
| | are not | |
| | vulnerable; | |
| | first fixed | |
| | in 12.4 | |
|------------+-------------+-------------|
| 12.1XD | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XE | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XF | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XG | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XH | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XI | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XJ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XK | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XL | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XM | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XN | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XO | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XP | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XQ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XR | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XS | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XT | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XU | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XV | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XW | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XX | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XY | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1XZ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1YA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1YB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1YC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1YD | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Note: | |
| | Releases | |
| | prior to | |
| | 12.1(5)YE1 | |
| | are | 12.4(19a) |
| 12.1YE | vulnerable, | |
| | release | 12.4(19b) |
| | 12.1(5)YE1 | |
| | and later | |
| | are not | |
| | vulnerable; | |
|------------+-------------+-------------|
| 12.1YF | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1YG | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1YH | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1YI | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.1YJ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| Affected | First Fixed | Recommended |
| 12.2-Based | Release | Release |
| Releases | | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2 | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2B | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.2BC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2BW | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Releases | |
| | prior to | |
| | 12.2(8)BY | |
| | are | |
| | vulnerable, | 12.4(19a) |
| 12.2BY | release | |
| | 12.2(8)BY | 12.4(19b) |
| | and later | |
| | are not | |
| | vulnerable; | |
| | first fixed | |
| | in 12.4 | |
|------------+-------------+-------------|
| 12.2BZ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2CX | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2CY | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2CZ | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| 12.2DA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2DD | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2DX | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2EU | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2EW | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2EWA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2EX | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2EY | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2EZ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2FX | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2FY | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2FZ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2IXA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2IXB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2IXC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2IXD | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2IXE | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2IXF | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2JA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2JK | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2MB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2MC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2S | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SBC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SCA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SE | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SEA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SEB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SEC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SED | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SEE | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SEF | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SEG | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SG | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SGA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SL | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SM | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SO | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SRA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SRB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SRC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SU | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SV | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SVA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SVC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SVD | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SW | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SX | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SXA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SXB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SXD | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SXE | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SXF | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SXH | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SXI | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SY | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2SZ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2T | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Releases | |
| | prior to | |
| | 12.2(8) | |
| | TPC10d are | |
| | vulnerable, | |
| 12.2TPC | release | |
| | 12.2(8) | |
| | TPC10d and | |
| | later are | |
| | not | |
| | vulnerable; | |
|------------+-------------+-------------|
| 12.2UZ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2XA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2XB | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2XC | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.2XD | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2XE | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2XF | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2XG | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.2XH | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2XI | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2XJ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2XK | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2XL | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.2XM | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2XN | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2XNA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2XO | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2XQ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2XR | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2XS | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2XT | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2XU | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.2XV | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2XW | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YD | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YE | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YF | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YG | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YH | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2YJ | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.2YK | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2YL | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2YM | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2YN | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Vulnerable; | 12.2(18) |
| | migrate to | SXF15; |
| 12.2YO | any release | Available |
| | in 12.2SY | on |
| | | 08-AUG-08 |
|------------+-------------+-------------|
| 12.2YP | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YQ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YR | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YS | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2YT | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2YU | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2YV | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.2YW | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YX | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YY | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2YZ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2ZA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2ZB | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.2ZC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2ZD | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2ZE | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2ZF | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | | 12.4(19a) |
| | | |
| | Vulnerable; | 12.4(19b) |
| 12.2ZG | first fixed | |
| | in 12.4T | 12.4(20)T; |
| | | Available |
| | | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | | 12.4(19a) |
| | | |
| | Vulnerable; | 12.4(19b) |
| 12.2ZH | first fixed | |
| | in 12.4 | 12.4(20)T; |
| | | Available |
| | | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.2ZJ | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | | 12.4(19a) |
| | | |
| | Vulnerable; | 12.4(19b) |
| 12.2ZL | first fixed | |
| | in 12.4 | 12.4(20)T; |
| | | Available |
| | | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| 12.2ZP | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2ZU | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2ZY | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.2ZYA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| Affected | First Fixed | Recommended |
| 12.3-Based | Release | Release |
| Releases | | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.3 | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.3B | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.3BC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.3BW | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.3EU | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.3JA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.3JEA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.3JEB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.3JEC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.3JK | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.3JL | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.3JX | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.3T | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.3TPC | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| 12.3VA | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| | | 12.4(19a) |
| | | |
| | Vulnerable; | 12.4(19b) |
| 12.3XA | first fixed | |
| | in 12.4 | 12.4(20)T; |
| | | Available |
| | | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.3XB | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | | 12.4(19a) |
| | | |
| | Vulnerable; | 12.4(19b) |
| 12.3XC | first fixed | |
| | in 12.4 | 12.4(20)T; |
| | | Available |
| | | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.3XD | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | | 12.4(19a) |
| | | |
| | Vulnerable; | 12.4(19b) |
| 12.3XE | first fixed | |
| | in 12.4 | 12.4(20)T; |
| | | Available |
| | | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.3XF | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | | 12.4(19a) |
| | | |
| | Vulnerable; | 12.4(19b) |
| 12.3XG | first fixed | |
| | in 12.4T | 12.4(20)T; |
| | | Available |
| | | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.3XH | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.3XI | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| | | 12.3(14) |
| | | YX12 |
| | Vulnerable; | |
| 12.3XJ | first fixed | 12.4(20)T; |
| | in 12.3YX | Available |
| | | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.3XK | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.3XQ | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| | | 12.4(19a) |
| | | |
| | Vulnerable; | 12.4(19b) |
| 12.3XR | first fixed | |
| | in 12.4 | 12.4(20)T; |
| | | Available |
| | | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(19a) |
| 12.3XS | first fixed | |
| | in 12.4 | 12.4(19b) |
|------------+-------------+-------------|
| 12.3XU | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | | 12.3(14) |
| | | YX12 |
| | Vulnerable; | |
| 12.3XW | first fixed | 12.4(20)T; |
| | in 12.3YX | Available |
| | | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| 12.3XY | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | | 12.4(19a) |
| | | |
| | Vulnerable; | 12.4(19b) |
| 12.3YA | first fixed | |
| | in 12.4 | 12.4(20)T; |
| | | Available |
| | | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(20)T; |
| 12.3YD | first fixed | Available |
| | in 12.4T | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | | 12.3(14) |
| | | YX12 |
| | Vulnerable; | |
| 12.3YF | first fixed | 12.4(20)T; |
| | in 12.3YX | Available |
| | | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(20)T; |
| 12.3YG | first fixed | Available |
| | in 12.4T | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(20)T; |
| 12.3YH | first fixed | Available |
| | in 12.4T | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(20)T; |
| 12.3YI | first fixed | Available |
| | in 12.4T | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| 12.3YJ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(20)T; |
| 12.3YK | first fixed | Available |
| | in 12.4T | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Releases | |
| | prior to | |
| | 12.3(14) | |
| | YM12 are | |
| | vulnerable, | 12.3(14) |
| 12.3YM | release | YM12 |
| | 12.3(14) | |
| | YM12 and | |
| | later are | |
| | not | |
| | vulnerable; | |
|------------+-------------+-------------|
| 12.3YQ | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(20)T; |
| 12.3YS | first fixed | Available |
| | in 12.4T | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(20)T; |
| 12.3YT | first fixed | Available |
| | in 12.4T | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| | Vulnerable; | |
| 12.3YU | first fixed | |
| | in 12.4XB | |
|------------+-------------+-------------|
| 12.3YX | 12.3(14) | 12.3(14) |
| | YX12 | YX12 |
|------------+-------------+-------------|
| 12.3YZ | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| Affected | First Fixed | Recommended |
| 12.4-Based | Release | Release |
| Releases | | |
|------------+-------------+-------------|
| | 12.4(18b) | |
| | | |
| | 12.4(19a) | 12.4(19a) |
| 12.4 | | |
| | 12.4(19b) | 12.4(19b) |
| | | |
| | 12.4(21) | |
|------------+-------------+-------------|
| 12.4JA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.4JK | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.4JMA | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.4JMB | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.4JMC | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.4JX | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.4MD | 12.4(15)MD | 12.4(15)MD |
|------------+-------------+-------------|
| 12.4MR | 12.4(19)MR | 12.4(19)MR |
|------------+-------------+-------------|
| 12.4SW | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| | 12.4(15)T6 | |
| | | 12.4(20)T; |
| 12.4T | 12.4(20)T; | Available |
| | Available | on |
| | on | 11-JUL-08 |
| | 11-JUL-08 | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(20)T; |
| 12.4XA | first fixed | Available |
| | in 12.4T | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| 12.4XB | 12.4(2)XB10 | |
|------------+-------------+-------------|
| 12.4XC | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| | 12.4(4) | 12.4(20)T; |
| | XD11; | Available |
| 12.4XD | Available | on |
| | on | 11-JUL-08 |
| | 31-JUL-08 | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(20)T; |
| 12.4XE | first fixed | Available |
| | in 12.4T | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| 12.4XF | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.4XG | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(20)T; |
| 12.4XJ | first fixed | Available |
| | in 12.4T | on |
| | | 11-JUL-08 |
|------------+-------------+-------------|
| 12.4XK | Not | |
| | Vulnerable | |
|------------+-------------+-------------|
| 12.4XL | 12.4(15)XL2 | 12.4(15)XL2 |
|------------+-------------+-------------|
| 12.4XM | 12.4(15)XM1 | 12.4(15)XM1 |
|------------+-------------+-------------|
| 12.4XN | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| 12.4XQ | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| 12.4XT | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| 12.4XV | Vulnerable; | |
| | contact TAC | |
|------------+-------------+-------------|
| 12.4XW | 12.4(11)XW8 | 12.4(11)XW6 |
|------------+-------------+-------------|
| 12.4XY | 12.4(15)XY3 | |
|------------+-------------+-------------|
| | Vulnerable; | 12.4(20)T; |
| 12.4XZ | first fixed | Available |
| | in 12.4T | on |
| | | 11-JUL-08 |
+----------------------------------------+
Cisco Network Registrar
+----------------------
+---------------------------------------+
| Affected | |
| Release | First Fixed Release |
| Train | |
|--------------+------------------------|
| 6.1.x | Contact TAC |
|--------------+------------------------|
| | 6.3.1.1 patch; |
| 6.3.x | available mid-July |
| | 2008 |
|--------------+------------------------|
| 7.0.x | 7.0.1; available in |
| | mid-July 2008 |
+---------------------------------------+
Cisco Network Registrar software is available for download at:
http://www.cisco.com/pcgi-bin/Software/Tablebuild/tablebuild.pl/nr-eval
Cisco Application and Content Networking System
+----------------------------------------------
This issue is fixed in version 5.5.11 of Cisco ACNS software. This
release will be available for download from www.cisco.com in late July
2008.
Cisco ACNS 5.5 software is available for download at:
http://www.cisco.com/pcgi-bin/tablebuild.pl/acns55
Workarounds
===========
There are no workarounds.
Additional information about identification and mitigation of attacks
against DNS is in the Cisco Applied Intelligence white paper "DNS Best
Practices, Network Protections, and Attack Identification," available at
http://www.cisco.com/web/about/security/intelligence/dns-bcp.html.
Obtaining Fixed Software
========================
Cisco has released free software updates that address these
vulnerabilities. Prior to deploying software, customers should consult
their maintenance provider or check the software for feature set
compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature sets
they have purchased. By installing, downloading, accessing or
otherwise using such software upgrades, customers agree to be bound
by the terms of Cisco's software license terms found at
http://www.cisco.com/en/US/products/prod_warranties_item09186a008088e31f.html,
or as otherwise set forth at Cisco.com Downloads at
http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Do not contact psirt@cisco.com or security-alert@cisco.com for software
upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through their
regular update channels. For most customers, this means that upgrades
should be obtained through the Software Center on Cisco's worldwide
website at http://www.cisco.com.
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through prior
or existing agreements with third-party support organizations, such
as Cisco Partners, authorized resellers, or service providers should
contact that support organization for guidance and assistance with the
appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations, such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or fix
is the most appropriate for use in the intended network before it is
deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco service
contract, and customers who purchase through third-party vendors but are
unsuccessful in obtaining fixed software through their point of sale
should acquire upgrades by contacting the Cisco Technical Assistance
Center (TAC). TAC contacts are as follows.
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Customers should have their product serial number available and be
prepared to give the URL of this notice as evidence of entitlement to a
free upgrade. Free upgrades for non-contract customers must be requested
through the TAC.
Refer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
for additional TAC contact information, including localized telephone
numbers, and instructions and e-mail addresses for use in various
languages.
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerability described in this advisory. Cisco would like to
thank Dan Kaminsky for notifying vendors about his findings.
Note that vulnerability information for Cisco IOS Software is being
provided in this advisory outside of the announced publication schedule
for Cisco IOS Software described at http://www.cisco.com/go/psirt due to
industry-wide disclosure of the vulnerability.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY
ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that omits
the distribution URL in the following section is an uncontrolled copy,
and may lack important information or contain factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at
http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml
In addition to worldwide web posting, a text version of this notice is
clear-signed with the Cisco PSIRT PGP key and is posted to the following
e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-teams@first.org
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.grok.org.uk
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on mailing
lists or newsgroups. Users concerned about this problem are encouraged
to check the above URL for any updates.
Revision History
================
+-----------------------------------------------------------+
| Revision 1.0 | 2008-July-08 | Initial public release |
+-----------------------------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in
Cisco products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.
This includes instructions for press inquiries regarding Cisco security
notices. All Cisco security advisories are available at
http://www.cisco.com/go/psirt.
+--------------------------------------------------------------------
Copyright 2007-2008 Cisco Systems, Inc. All rights reserved.
+--------------------------------------------------------------------
Updated: Jul 08, 2008 Document ID: 107064
+--------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkhztUIACgkQ86n/Gc8U/uCAgACfVRRoJO4w4defnpwbNlfgBm4t
2SMAnjKCKECHtsjN9umqqPrPd2DW4IcC
=XGZw
-----END PGP SIGNATURE-----
. The fix,
while correct, was incompatible with the version of SELinux Reference
Policy shipped with Debian Etch, which did not permit a process
running in the named_t domain to bind sockets to UDP ports other than
the standard 'domain' port (53). The incompatibility affects both
the 'targeted' and 'strict' policy packages supplied by this version
of refpolicy.
This update to the refpolicy packages grants the ability to bind to
arbitrary UDP ports to named_t processes. When installed, the
updated packages will attempt to update the bind policy module on
systems where it had been previously loaded and where the previous
version of refpolicy was 0.0.20061018-5 or below.
Because the Debian refpolicy packages are not yet designed with
policy module upgradeability in mind, and because SELinux-enabled
Debian systems often have some degree of site-specific policy
customization, it is difficult to assure that the new bind policy can
be successfully upgraded. To this end, the package upgrade will not
abort if the bind policy update fails. The new policy module can be
found at /usr/share/selinux/refpolicy-targeted/bind.pp after
installation. Administrators wishing to use the bind service policy
can reconcile any policy incompatibilities and install the upgrade
manually thereafter. A more detailed discussion of the corrective
procedure may be found here:
http://wiki.debian.org/SELinux/Issues/BindPortRandomization
For the stable distribution (etch), this problem has been fixed in
version 0.0.20061018-5.1+etch1. The unstable distribution (sid) is
not affected, as subsequent refpolicy releases have incorporated an
analogous change.
We recommend that you upgrade your refpolicy packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
- -------------------------------
Debian (stable)
- ---------------
Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/r/refpolicy/refpolicy_0.0.20061018.orig.tar.gz
Size/MD5 checksum: 571487 1bb326ee1b8aea1fa93c3bd86a3007ee
http://security.debian.org/pool/updates/main/r/refpolicy/refpolicy_0.0.20061018-5.1+etch1.diff.gz
Size/MD5 checksum: 53515 bd171f0cfa9adc59d451d176fb32c913
http://security.debian.org/pool/updates/main/r/refpolicy/refpolicy_0.0.20061018-5.1+etch1.dsc
Size/MD5 checksum: 859 52bc8ea0cab864e990e9dacc4db3b678
Architecture independent packages:
http://security.debian.org/pool/updates/main/r/refpolicy/selinux-policy-refpolicy-strict_0.0.20061018-5.1+etch1_all.deb
Size/MD5 checksum: 1541610 626c93fc13beaa01ff151d9103a7860b
http://security.debian.org/pool/updates/main/r/refpolicy/selinux-policy-refpolicy-doc_0.0.20061018-5.1+etch1_all.deb
Size/MD5 checksum: 289230 b082a861eda93f9bc06dd2e2f03ba89d
http://security.debian.org/pool/updates/main/r/refpolicy/selinux-policy-refpolicy-targeted_0.0.20061018-5.1+etch1_all.deb
Size/MD5 checksum: 1288314 c00ed4f0ea4ddbb8dd945c24c710c788
http://security.debian.org/pool/updates/main/r/refpolicy/selinux-policy-refpolicy-src_0.0.20061018-5.1+etch1_all.deb
Size/MD5 checksum: 595490 841f616c8f08b22ed7077c21c1065026
http://security.debian.org/pool/updates/main/r/refpolicy/selinux-policy-refpolicy-dev_0.0.20061018-5.1+etch1_all.deb
Size/MD5 checksum: 418666 bee3f41fe8771b7b88693937814494a3
These files will probably be moved into the stable distribution on
its next update. ===========================================================
Ubuntu Security Notice USN-622-1 July 08, 2008
bind9 vulnerability
CVE-2008-1447
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 7.04
Ubuntu 7.10
Ubuntu 8.04 LTS
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
libdns21 1:9.3.2-2ubuntu1.5
Ubuntu 7.04:
libdns22 1:9.3.4-2ubuntu2.3
Ubuntu 7.10:
libdns32 1:9.4.1-P1-3ubuntu2
Ubuntu 8.04 LTS:
libdns35 1:9.4.2-10ubuntu0.1
In general, a standard system upgrade is sufficient to effect the
necessary changes.
Details follow:
Dan Kaminsky discovered weaknesses in the DNS protocol as implemented
by Bind. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01503743
Version: 1
HPSBST02350 SSRT080102 rev.1 - Storage Management Appliance (SMA), Microsoft Patch Applicability MS08-037 to MS08-040
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2008-07-14
Last Updated: 2008-07-14
Potential Security Impact: Please check the table below
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Various potential security vulnerabilities have been identified in Microsoft software that is running on the Storage Management Appliance (SMA). Some of these vulnerabilities may be pertinent to the SMA, please check the table in the Resolution section of this Security Bulletin.
References: MS08-037 (CVE-2008-1447, CVE-2008-1454), MS08-038 (CVE-2008-1435), MS08-039 (CVE-2008-2247, CVE-2008-2248), MS08-040 (CVE-2008-0085, CVE-2008-0086, CVE-2008-0106, CVE-2008-0107).
Storage Management Appliance v2.1 Software running on:
Storage Management Appliance I
Storage Management Appliance II
Storage Management Appliance III
BACKGROUND
CVSS 2.0 Base Metrics
===============================================
Reference Base Vector Base Score
-- Not Applicable --
===============================================
Information on CVSS is documented in HP Customer Notice: HPSN-2008-002.
Patches released by Microsoft after MS06-051 are covered by monthly Security Bulletins.
For the full archived list of Microsoft security updates applicable for Storage Management Appliance software v2.1, please refer to the following Security Bulletins available on the IT Resource Center (ITRC) Web site: http://www.itrc.hp.com/service/cki/secBullArchive.do
For patches released by Microsoft in 2003, MS03-001 to MS03-051 refer to Security Bulletin HPSBST02146
For patches released by Microsoft in 2004, MS04-001 to MS04-045 refer to Security Bulletin HPSBST02147
For patches released by Microsoft in 2005, MS05-001 to MS05-055 refer to Security Bulletin HPSBST02148
For patches released by Microsoft in 2006, MS06-001 to MS06-051 refer to Security Bulletin HPSBST02140
The Microsoft patch index archive and further details about all Microsoft patches can be found on the following Web site: http://www.microsoft.com/technet/security/bulletin/summary.mspx
NOTE: The SMA must have all pertinent SMA Service Packs applied
Windows 2000 Update Rollup 1
Customers are advised to download and install the Windows 2000 Update Rollup 1 for Service Pack 4 on SMA v2.1. For more information please refer to the Windows 2000 Update Rollup 1 for Service Pack 4 and Storage Management Appliance v2.1 advisory at the following website: http://h20000.www2.hp.com/bizsupport/TechSupport/DocumentIndex.jsp?contentType=SupportManual&lang=en&cc=us&docIndexId=179111&taskId=101&prodTypeId=12169&prodSeriesId=315667
Windows 2000 Update Rollup 1 for SP4 does not include security updates released after April 30, 2005 starting from MS05-026. It also does not include patches MS04-003 and MS04-028. Please install these patches in addition to Windows 2000 Update Rollup 1 for SP4, if they have not been installed already
RESOLUTION
HP strongly recommends the immediate installation of all security patches that apply to third party software which is integrated with SMA software products supplied by HP, and that patches are applied in accordance with an appropriate patch management policy.
NOTE: Patch installation instructions are shown at the end of this table.
-------------------------------------------------
MS Patch - MS08-037 Vulnerabilities in DNS Could Allow Spoofing (953230)
Analysis - Patch will run successfully.
Action - For SMA v2.1, customers should download patch from Microsoft and install.
-------------------------------------------------
MS Patch - MS08-038 Vulnerability in Windows Explorer Could Allow Remote Code Execution (950582)
Analysis - SMA does not have this component.
Action - Patch will not run successfully. Customers should not be concerned with this issue
-------------------------------------------------
MS Patch - MS08-039 Vulnerabilities in Outlook Web Access for Exchange Server Could Allow Elevation of Privilege (953747)
Analysis - SMA does not have this component.
Action - Patch will not run successfully. Customers should not be concerned with this issue
-------------------------------------------------
MS Patch - MS08-040 Vulnerabilities in Microsoft SQL Server Could Allow Elevation of Privilege (941203)
Analysis - SMA does not have this component.
Action - Patch will not run successfully. Customers should not be concerned with this issue
-------------------------------------------------
Installation Instructions: (if applicable)
Download patches to a system other than the SMA
Copy the patch to a floppy diskette or to a CD
Execute the patch by using Terminal Services to the SMA or by attaching a keyboard, monitor and mouse to the SMA.
Note: The Microsoft Windows Installer 3.1 is supported on SMA v2.1.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows:
To: security-alert@hp.com
Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
- check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
- verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
* The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
At this time, it is not possible to implement the recommended
countermeasures in the GNU libc stub resolver. Install a local BIND 9 resoler on the host, possibly in
forward-only mode. (Other caching resolvers can
be used instead.)
2. Rely on IP address spoofing protection if available. Successful
attacks must spoof the address of one of the resolvers, which may not
be possible if the network is guarded properly against IP spoofing
attacks (both from internal and external sources).
This DSA will be updated when patches for hardening the stub resolver
are available. Scott
Kitterman noted that python-dns is vulnerable to this predictability,
as it randomizes neither its transaction ID nor its source port.
Taken together, this lack of entropy leaves applications using
python-dns to perform DNS queries highly susceptible to response
forgery.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.
----------------------------------------------------------------------
TITLE:
Red Hat update for bind
SECUNIA ADVISORY ID:
SA26195
VERIFY ADVISORY:
http://secunia.com/advisories/26195/
CRITICAL:
Moderately critical
IMPACT:
Spoofing
WHERE:
>From remote
OPERATING SYSTEM:
Red Hat Enterprise Linux (v. 5 server)
http://secunia.com/product/13652/
Red Hat Enterprise Linux Desktop (v. 5 client)
http://secunia.com/product/13653/
Red Hat Enterprise Linux Desktop Workstation (v. 5 client)
http://secunia.com/product/13651/
RedHat Enterprise Linux AS 2.1
http://secunia.com/product/48/
RedHat Enterprise Linux AS 3
http://secunia.com/product/2534/
RedHat Enterprise Linux AS 4
http://secunia.com/product/4669/
RedHat Enterprise Linux ES 2.1
http://secunia.com/product/1306/
RedHat Enterprise Linux ES 3
http://secunia.com/product/2535/
RedHat Enterprise Linux ES 4
http://secunia.com/product/4668/
RedHat Enterprise Linux WS 3
http://secunia.com/product/2536/
RedHat Enterprise Linux WS 2.1
http://secunia.com/product/1044/
RedHat Enterprise Linux WS 4
http://secunia.com/product/4670/
RedHat Linux Advanced Workstation 2.1 for Itanium
http://secunia.com/product/1326/
DESCRIPTION:
Red Hat has issued an update for bind.
For more information:
SA26152
SOLUTION:
Updated packages are available from Red Hat Network.
http://rhn.redhat.com
ORIGINAL ADVISORY:
http://rhn.redhat.com/errata/RHSA-2007-0740.html
OTHER REFERENCES:
SA26152:
http://secunia.com/advisories/26152/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor. In IP NAT filtering in Sun Solaris 10 and OpenSolaris series products, when a DNS server runs NAT, it incorrectly changes the original address of the data packet. When the destination address is a DNS port, it will allow remote attackers to bypass CVE-2008 -1447 security protection. Among other things,
successful attacks can lead to misdirected web traffic and email
rerouting. This
change increases the size of the space from which an attacker has to
guess values in a backwards-compatible fashion and makes successful
attacks significantly more difficult.
This update also switches the random number generator to Dan
Bernstein's SURF. Packages for alpha will be provided later
| VAR-200707-0198 | CVE-2007-4023 | Aruba Mobility Controller Series cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the login CGI program in Aruba Mobility Controller 2.5.4.18 and earlier, and 2.4.8.6-FIPS and earlier FIPS versions, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Aruba Mobility Controller series, switch products from Aruba Networks, contain a cross-site scripting vulnerability.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
This issue affects versions prior to Aruba Mobility Controller 2.5.4.18 and FIPS prior to 2.4.8.6-FIPS.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.
Certain input passed to the login pages is not properly sanitised
before being returned to the user.
SOLUTION:
Update to the latest patched firmware version.
http://www.arubanetworks.com/support
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Adair Collins and Steve Palmer of HostsPlus, and
Nobuhiro Tsuji of NTT DATA SECURITY.
ORIGINAL ADVISORY:
http://www.arubanetworks.com/support/alerts/aid-070907b.asc
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200707-0544 | CVE-2007-0060 | plural CA Used in products Message Queuing Server Vulnerable to stack-based buffer overflow |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Stack-based buffer overflow in the Message Queuing Server (Cam.exe) in CA (formerly Computer Associates) Message Queuing (CAM / CAFT) software before 1.11 Build 54_4 on Windows and NetWare, as used in CA Advantage Data Transport, eTrust Admin, certain BrightStor products, certain CleverPath products, and certain Unicenter products, allows remote attackers to execute arbitrary code via a crafted message to TCP port 3104. Multiple Computer Associates products are prone to a remote stack-based buffer-overflow vulnerability. This issue affects the Message Queuing (CAM/CAFT) component. The application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized buffer.
A successful exploit will allow an attacker to execute arbitrary code with SYSTEM-level privileges. There is a buffer overflow vulnerability in the CAM service when processing malformed user requests. Remote attackers may use this vulnerability to control the server.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications. Please see
the vendor's advisory for more details.
CAM (Windows):
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO89945
CAM(Netware):
http://supportconnect.ca.com/sc/redir.jsp?reqPage=search&searchID=QO89943
PROVIDED AND/OR DISCOVERED BY:
IBM ISS X-Force
ORIGINAL ADVISORY:
CA:
http://supportconnectw.ca.com/public/dto_transportit/infodocs/camsgquevul-secnot.asp
IBM ISS X-Force:
http://www.iss.net/threats/272.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
Mitigating Factors: None
Severity: CA has given this vulnerability a High risk rating.
i.e. CAM versions 1.04, 1.05, 1.06, 1.07, 1.10 (prior to Build
54_4) and 1.11 (prior to Build 54_4).
Affected Products:
Advantage Data Transport 3.0
BrightStor SAN Manager 11.1, 11.5
BrightStor Portal 11.1
CleverPath OLAP 5.1
CleverPath ECM 3.5
CleverPath Predictive Analysis Server 2.0, 3.0
CleverPath Aion 10.0
eTrust Admin 2.01, 2.04, 2.07, 2.09, 8.0, 8.1
Unicenter Application Performance Monitor 3.0, 3.5
Unicenter Asset Management 3.1, 3.2, 3.2 SP1, 3.2 SP2, 4.0,
4.0 SP1
Unicenter Data Transport Option 2.0
Unicenter Enterprise Job Manager 1.0 SP1, 1.0 SP2
Unicenter Jasmine 3.0
Unicenter Management for WebSphere MQ 3.5
Unicenter Management for Microsoft Exchange 4.0, 4.1
Unicenter Management for Lotus Notes/Domino 4.0
Unicenter Management for Web Servers 5, 5.0.1
Unicenter NSM 3.0, 3.1
Unicenter NSM Wireless Network Management Option 3.0
Unicenter Remote Control 6.0, 6.0 SP1
Unicenter Service Level Management 3.0, 3.0.1, 3.0.2, 3.5
Unicenter Software Delivery 3.0, 3.1, 3.1 SP1, 3.1 SP2, 4.0,
4.0 SP1
Unicenter TNG 2.1, 2.2, 2.4, 2.4.2
Unicenter TNG JPN 2.2
Affected Platforms:
Windows and NetWare
Platforms NOT affected:
AIX, AS/400, DG Intel, DG Motorola, DYNIX, HP-UX, IRIX,
Linux Intel, Linux s/390, MVS, Open VMS, OS/2, OSF1,
Solaris Intel, Solaris Sparc and UnixWare.
Status and Recommendation:
CA has made patches available for all affected products. These
patches are independent of the CA Software that installed CAM.
Simply select the patch appropriate to the platform, and the
installed version of CAM, and follow the patch application
instructions. You should also review the product home pages on
SupportConnect for any additional product specific instructions.
Solutions for CAM:
Platform Solution
Windows QO89945
NetWare QO89943
How to determine if you are affected:
Determining CAM versions:
Simply running camstat will return the version information in the
top line of the output on any platform. The camstat command is
located in the bin subfolder of the installation directory.
The example below indicates that CAM version 1.11 build 27
increment 2 is running.
E:\>camstat
CAM – machine.ca.com Version 1.11 (Build 27_2) up 0 days 1:16
Determining the CAM install directory:
Windows: The install location is specified by the %CAI_MSQ%
environment variable.
Unix/Linux/Mac: The /etc/catngcampath text file holds the CAM
install location.
Workaround:
The affected listening port can be disabled by creating or
updating CAM's configuration file, CAM.CFG, with the following
entry under the "*CONFIG" section:
*CONFIG
cas_port=0
The CA Messaging Server must be recycled in order for this to take
effect. We advise that products dependent upon CAM should be
shutdown prior to recycling CAM. Once dependent products have
been shutdown, CAM can be recycled with the following commands:
On Windows:
camclose
cam start
On NetWare:
load camclose
load cam start
Once CAM has been restarted, any CAM dependent products that were
shutdown can be restarted.
For technical questions or comments related to this advisory,
please send email to vuln AT ca DOT com.
If you discover a vulnerability in CA products, please report your
findings to vuln AT ca DOT com, or utilize our "Submit a
Vulnerability" form.
URL: http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx
Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research
CA, 1 CA Plaza, Islandia, NY 11749
Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2007 CA. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.5.3 (Build 5003)
wj8DBQFGpqCHeSWR3+KUGYURAt6DAJ0YpnaiwrNfhhQlvdvL28LYxBYbZgCfRpKQ
pNdOPBvd1/BVRF6Lo65uo2o=
=7w0f
-----END PGP SIGNATURE-----
| VAR-200707-0263 | CVE-2007-3875 | CA Anti-Virus Such as arclib.dll Service disruption in (DoS) Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
arclib.dll before 7.3.0.9 in CA Anti-Virus (formerly eTrust Antivirus) 8 and certain other CA products allows remote attackers to cause a denial of service (infinite loop and loss of antivirus functionality) via an invalid "previous listing chunk number" field in a CHM file. Multiple Computer Associates products are prone to a denial-of-service vulnerability because the applications fail to handle malformed CHM files.
Successfully exploiting this issue will cause the affected applications to stop responding, denying service to legitimate users.
This issue affects applications that use the 'arclib.dll' library versions prior to 7.3.0.9. The Arclib.DLL library in eTrust products has a security vulnerability. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Title: [CAID 35525, 35526]: CA Products Arclib Library Denial of
Service Vulnerabilities
CA Vuln ID (CAID): 35525, 35526
CA Advisory Date: 2007-07-24
Reported By:
CVE-2006-5645 - Titon of BastardLabs and Damian Put
<pucik at overflow dot pl> working with the iDefense VCP.
CVE-2007-3875 - An anonymous researcher working with the iDefense
VCP.
Sergio Alvarez of n.runs AG also reported these issues.
Impact: A remote attacker can cause a denial of service.
Summary: CA products that utilize the Arclib library contain two
denial of service vulnerabilities. The second vulnerability,
CVE-2006-5645, is due to an application hang when processing a
specially malformed RAR file.
Mitigating Factors: None
Severity: CA has given these vulnerabilities a Medium risk rating.
Affected Products:
CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.0,
7.1, r8, r8.1
CA Anti-Virus 2007 (v8)
eTrust EZ Antivirus r7, r6.1
CA Internet Security Suite 2007 (v3)
eTrust Internet Security Suite r1, r2
eTrust EZ Armor r1, r2, r3.x
CA Threat Manager for the Enterprise (formerly eTrust Integrated
Threat Management) r8
CA Anti-Virus Gateway (formerly eTrust Antivirus eTrust Antivirus
Gateway) 7.1
CA Protection Suites r2, r3
CA Secure Content Manager (formerly eTrust Secure Content Manager)
1.1, 8.0
CA Anti-Spyware for the Enterprise (Formerly eTrust PestPatrol)
r8, 8.1
CA Anti-Spyware 2007
Unicenter Network and Systems Management (NSM) r3.0, r3.1, r11,
r11.1
BrightStor ARCserve Backup v9.01, r11 for Windows, r11.1, r11.5
BrightStor Enterprise Backup r10.5
BrightStor ARCserve Client agent for Windows
eTrust Intrusion Detection 2.0 SP1, 3.0, 3.0 SP1
CA Common Services (CCS) r11, r11.1
CA Anti-Virus SDK (formerly eTrust Anti-Virus SDK)
Status and Recommendation:
CA has provided an update to address the vulnerabilities. The
updated Arclib library is provided in automatic content updates
with most products. Ensure that the latest content update is
installed. In the case where automatic updates are not available,
use the following product specific instructions.
CA Secure Content Manager 1.1:
Apply QO89469.
CA Secure Content Manager 8.0:
Apply QO87114.
Unicenter Network and Systems Management (NSM) r3.0:
Apply QO89141.
Unicenter Network and Systems Management (NSM) r3.1:
Apply QO89139.
Unicenter Network and Systems Management (NSM) r11:
Apply QO89140.
Unicenter Network and Systems Management (NSM) r11.1:
Apply QO89138.
CA Common Services (CCS) r11:
Apply QO89140.
CA Common Services (CCS) r11.1:
Apply QO89138.
CA Anti-Virus Gateway 7.1:
Apply QO89381.
eTrust Intrusion Detection 2.0 SP1:
Apply QO89474.
eTrust Intrusion Detection 3.0:
Apply QO86925.
eTrust Intrusion Detection 3.0 SP1:
Apply QO86923.
CA Protection Suites r2:
Apply updates for CA Anti-Virus 7.1.
BrightStor ARCserve Backup and BrightStor ARCserve Client agent
for Windows:
Manually replace the arclib.dll file with the one provided in the
CA Anti-Virus 7.1 fix set.
1. Locate and rename the existing arclib.dll file.
2. Download the CA Anti-Virus 7.1 patch that matches the host
operating system.
3. Unpack the patch and place the arclib.dll file in directory
where the existing arclib.dll file was found in step 1.
4. Reboot the host.
CA Anti-Virus 7.1 (non Windows):
T229327 – Solaris – QO86831
T229328 – Netware – QO86832
T229329 – MacPPC – QO86833
T229330 – MacIntel – QO86834
T229331 – Linux390 – QO86835
T229332 – Linux – QO86836
T229333 – HP-UX – QO86837
CA Anti-Virus 7.1 (Windows):
T229337 – NT (32 bit) – QO86843
T229338 – NT (AMD64) – QO86846
CA Threat Manager for the Enterprise r8.1 (non Windows):
T229334 – Linux – QO86839
T229335 – Mac – QO86828
T229336 – Solaris – QO86829
How to determine if you are affected:
For products on Windows:
1. Using Windows Explorer, locate the file “arclib.dll”. By
default, the file is located in the
“C:\Program Files\CA\SharedComponents\ScanEngine” directory(*).
2. Right click on the file and select Properties.
3. Select the Version tab.
4. If the file version is earlier than indicated in the table
below, the installation is vulnerable.
File Name File Version
arclib.dll 7.3.0.9
*For eTrust Intrusion Detection 2.0 the file is located in
“Program Files\eTrust\Intrusion Detection\Common”, and for eTrust
Intrusion Detection 3.0 and 3.0 sp1, the file is located in
“Program Files\CA\Intrusion Detection\Common”.
For CA Anti-Virus r8.1 on non-Windows:
Use the compver utility provided on the CD to determine the
version of arclib.dll. The same version information above applies.
Workaround: None
References (URLs may wrap):
CA SupportConnect:
http://supportconnect.ca.com/
Security Notice for CA Products Containing Arclib
http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot
.asp
Solution Document Reference APARs:
QO89469, QO87114, QO89141, QO89139, QO89140, QO89138, QO89140,
QO89138, QO89381, QO89474, QO86925, QO86923, QO86831, QO86832,
QO86833, QO86834, QO86835, QO86836, QO86837, QO86843, QO86846,
QO86839, QO86828, QO86829
CA Security Advisor posting:
CA Products Arclib Library Denial of Service Vulnerabilities
http://www.ca.com/us/securityadvisor/newsinfo/collateral.aspx?cid=149847
CA Vuln ID (CAID): 35525, 35526
http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35525
http://www.ca.com/us/securityadvisor/vulninfo/vuln.aspx?id=35526
Reported By:
CVE-2006-5645 - Titon of BastardLabs and Damian Put
<pucik at overflow dot pl> working with the iDefense VCP.
CVE-2007-3875 - An anonymous researcher working with the iDefense
VCP.
Sergio Alvarez of n.runs AG also reported these issues.
iDefense advisories:
Computer Associates AntiVirus CHM File Handling DoS Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567
Multiple Vendor Antivirus RAR File Denial of Service Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=439
CVE References:
CVE-2006-5645, CVE-2007-3875
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5645
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3875
OSVDB References: Pending
http://osvdb.org/
Changelog for this advisory:
v1.0 - Initial Release
Customers who require additional information should contact CA
Technical Support at http://supportconnect.ca.com.
For technical questions or comments related to this advisory,
please send email to vuln AT ca DOT com.
If you discover a vulnerability in CA products, please report your
findings to vuln AT ca DOT com, or utilize our "Submit a
Vulnerability" form.
URL: http://www.ca.com/us/securityadvisor/vulninfo/submit.aspx
Regards,
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research
CA, 1 CA Plaza, Islandia, NY 11749
Contact http://www.ca.com/us/contact/
Legal Notice http://www.ca.com/us/legal/
Privacy Policy http://www.ca.com/us/privacy/
Copyright (c) 2007 CA. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.5.3 (Build 5003)
wj8DBQFGpp9beSWR3+KUGYURAplHAJ4paEd/cX+2AxdBWfnw2zhfjAGQwACfW+mo
tCqbonQi4DvtQ9a45c65y70=
=o8Ac
-----END PGP SIGNATURE-----
. BACKGROUND
eTrust is an antivirus application developed by Computer Associates.
More information can be found on the vendor's website at the following
URL.
http://www3.ca.com/solutions/product.aspx?ID=156
II. DESCRIPTION
Remote exploitation of a denial of Service (DoS) vulnerability in
Computer Associates Inc.'s eTrust Antivirus products could allow
attackers to create a DoS condition on the affected computer.
III. ANALYSIS
This denial of service attack will prevent the scanner from scanning
other files on disk while it is stuck on the exploit file. The hung
process can be quit by the user and does not consume all system
resources.
IV. DETECTION
iDefense has confirmed this vulnerability in eTrust AntiVirus version
r8. Previous versions of eTrust Antivirus are suspected vulnerable.
Other Computer Associates products, as well as derived products, may
also be vulnerable.
V. WORKAROUND
iDefense is not aware of any workarounds for this issue.
VI. VENDOR RESPONSE
Computer Associates has addressed this vulnerability by releasing
updates. More information is available within Computer Associates
advisory at the following URL.
http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2007-3875 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.
VIII. DISCLOSURE TIMELINE
01/16/2007 Initial vendor notification
01/17/2007 Initial vendor response
07/24/2007 Coordinated public disclosure
IX. CREDIT
The discoverer of this vulnerability wishes to remain anonymous.
Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php
Free tools, research and upcoming events
http://labs.idefense.com/
X. LEGAL NOTICES
Copyright \xa9 2007 iDefense, Inc.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically,
please e-mail customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications. scanning a specially
crafted RAR archive. Please see the vendor's advisory for
details.
2) The vendor credits Titon of BastardLabs and Damian Put, reported
via iDefense Labs.
ORIGINAL ADVISORY:
CA:
http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp
iDefense Labs:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=567
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200707-0187 | CVE-2007-4011 |
Cisco 4100 Service disruption in (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200707-0623 |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software before 3.2 20070727, 4.0 before 20070727, and 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (traffic amplification or ARP storm) via a crafted unicast ARP request that (1) has a destination MAC address unknown to the Layer-2 infrastructure, aka CSCsj69233; or (2) occurs during Layer-3 roaming across IP subnets, aka CSCsj70841. Cisco Wireless LAN Controller (WLC) is prone to multiple denial-of-service vulnerabilities.
An attacker can exploit these issues to crash the device, denying service to legitimate users.
These issues affect Cisco Wireless LAN Control 3.2, 4.0, and 4.1; other versions may also be affected. Cisco Wireless LAN Controllers (WLCs) provide real-time communication between lightweight access points and other wireless-providing LAN controllers to perform centralized system-wide WLAN configuration and management functions. Vulnerable WLCs may mishandle unicast ARP requests from wireless clients, causing ARP storms. Both WLCs attached to the same set of Layer 2 VLANs must have wireless client contexts for this vulnerability to be exposed. This happens after using layer 3 (inter-subnet) roaming or when using guest WLAN (auto-anchor). This allows a second WLC to reprocess the ARP request and incorrectly re-forward the inclusion back to the network. This vulnerability is documented as CSCsj69233. In the case of Layer 3 (L3) roaming, wireless clients move from one controller to another, and the wireless LAN interfaces configured on different controllers are in different IP subnets. In this case, the unicast ARP may not be tunneled back to the anchor controller, but sent by the external controller to its native VLAN. This vulnerability is documented as CSCsj70841
| VAR-200707-0188 | CVE-2007-4012 |
Cisco 4100 Service disruption in (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200707-0623 |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (ARP storm) via a broadcast ARP packet that "targets the IP address of a known client context", aka CSCsj50374. Cisco Wireless LAN Controller (WLC) is prone to multiple denial-of-service vulnerabilities.
An attacker can exploit these issues to crash the device, denying service to legitimate users.
These issues affect Cisco Wireless LAN Control 3.2, 4.0, and 4.1; other versions may also be affected. Cisco Wireless LAN Controllers (WLCs) provide real-time communication between lightweight access points and other wireless-providing LAN controllers to perform centralized system-wide WLAN configuration and management functions. There is a vulnerability in the WLC's handling of unicast ARP traffic, and the LAN link between the wireless LAN controllers in the mobility group may be flooded with unicast ARP requests. Vulnerable WLCs may mishandle unicast ARP requests from wireless clients, causing ARP storms. Both WLCs attached to the same set of Layer 2 VLANs must have wireless client contexts for this vulnerability to be exposed. This happens after using layer 3 (inter-subnet) roaming or when using guest WLAN (auto-anchor). If multiple WLCs are installed on the corresponding VLAN, it will cause an ARP storm. This vulnerability is documented as CSCsj50374
| VAR-200707-0144 | CVE-2007-3959 | ICS of Ipswitch Instant Messaging of IM Server Service disruption in (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The IM Server (aka IMserve or IMserver) 2.0.5.30 and probably earlier in Ipswitch Instant Messaging before 2.07 in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (daemon crash) via certain data to TCP port 5179 that overwrites a destructor, as reachable by the (1) DoAttachVideoSender, (2) DoAttachVideoReceiver, (3) DoAttachAudioSender, and (4) DoAttachAudioReceiver functions. (1) DoAttachVideoSender function (2) DoAttachVideoReceiver function (3) DoAttachAudioSender function (4) DoAttachAudioReceiver function. Ipswitch Instant Messaging Server is prone to a remote denial-of-service vulnerability because the application fails to properly handle unexpected network data.
Successfully exploiting this issue allows remote attackers to crash the IM service, denying further instant messages for legitimate users.
Ipswitch IM Server 2.0.5.30 is vulnerable; other versions may also be affected. Ipswitch Instant Messaging is the instant messaging software bundled in the Ipswitch collaboration component. The vulnerable code can be reached through the following functions: DoAttachVideoSender DoAttachVideoReceiver DoAttachAudioSender DoAttachAudioReceiver.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.
The vulnerability is reported in version 2.0.5.30.
SOLUTION:
Update to version 2.0.7.
http://www.ipswitch.com/support/instant_messaging/patch-upgrades.asp
PROVIDED AND/OR DISCOVERED BY:
Discovered by an anonymous researcher and reported via iDefense.
ORIGINAL ADVISORY:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=566
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200707-0111 | CVE-2007-3926 | Ipswitch IMail Server 2006 Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Ipswitch IMail Server 2006 before 2006.21 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors involving an "overwritten destructor.". Ipswitch IMail Server 2006 There is a service disruption ( Daemon crash ) There is a vulnerability that becomes a condition.Service disruption by a third party ( Daemon crash ) There is a possibility of being put into a state. Imail Server is prone to a denial-of-service vulnerability.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.
----------------------------------------------------------------------
TITLE:
Ipswitch IMail Server/Collaboration Suite Multiple Buffer Overflows
SECUNIA ADVISORY ID:
SA26123
VERIFY ADVISORY:
http://secunia.com/advisories/26123/
CRITICAL:
Highly critical
IMPACT:
System access
WHERE:
>From remote
SOFTWARE:
IMail Server 2006
http://secunia.com/product/8653/
Ipswitch Collaboration Suite 2006
http://secunia.com/product/8652/
DESCRIPTION:
Some vulnerabilities have been reported in Ipswitch IMail Server and
Collaboration Suite, which can be exploited by malicious users and
malicious people to compromise a vulnerable system.
1) A boundary error in the processing of the IMAP "SEARCH" command
can be exploited to cause a stack-based buffer overflow.
Successful exploitation allows execution of arbitrary code, but
requires a valid user account.
2) A boundary error in the processing of the IMAP "SEARCH CHARSET"
command can be exploited to cause a heap-based buffer overflow.
Successful exploitation allows execution of arbitrary code, but
requires a valid user account.
Vulnerabilities #1 and #2 are reported in version 6.8.8.1 of
imapd32.exe. Prior versions may also be affected.
3) A boundary error in Imailsec can be exploited to cause a
heap-based buffer overflow and allows execution of arbitrary code.
4) A boundary error in "subscribe" can be exploited to cause a buffer
overflow. No further information is currently available.
Vulnerabilities #3 and #4 are reported in Ipswitch IMail Server and
Collaboration Suite prior to version 2006.21.
SOLUTION:
Update to IMail Server version 2006.21.
http://www.ipswitch.com/support/imail/releases/im200621.asp
Update to Ipswitch Collaboration Suite 2006.21.
http://www.ipswitch.com/support/ics/updates/ics200621.asp
PROVIDED AND/OR DISCOVERED BY:
1) Manuel Santamarina Suarez, reported via iDefense Labs.
2) An anonymous person, reported via iDefense Labs.
3, 4) The vendor credits TippingPoint and the Zero Day Initiative.
ORIGINAL ADVISORY:
IPSwitch:
http://www.ipswitch.com/support/imail/releases/im200621.asp
http://www.ipswitch.com/support/ics/updates/ics200621.asp
iDefense:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=563
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200711-0295 | CVE-2007-0011 | Citrix Access Gateway of Web Session hijack vulnerability in portal interface |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The web portal interface in Citrix Access Gateway (aka Citrix Advanced Access Control) before Advanced Edition 4.5 HF1 places a session ID in the URL, which allows context-dependent attackers to hijack sessions by reading "residual information", including the a referer log, browser history, or browser cache. " Residual information " Can be hijacked in the session. Citrix Access Gateway Standard and Advanced Edition are prone to multiple remote vulnerabilities. Exploiting these issues could allow an attacker to:
- Obtain sensitive information
- Execute code remotely
- Hijack sessions
- Redirect users to arbitrary sites
- Make unauthorized configuration changes
Citrix has released patches for these vulnerabilities.
Note: This is a belated release to the mailing lists (though most of the
tracking services picked this up via the Citrix advisory)...
-- History --
Discovered: 05.09.06 (Martin O'Neal)
Vendor notified: 19.10.06
Document released: 20.07.07
-- Overview --
Citrix Access Gateways are described [1] as "universal SSL VPN
appliances providing a secure, always-on, single point-of-access to an
organization's applications and data".
Amongst other features, the product provides a web portal to corporate
applications and resources.
-- Analysis --
The web portal interface incorporates a collection of .NET scripts,
which utilise a session ID contained within cookies. During the
authentication sequence the user session is redirected via a HTTP meta
refresh header in an HTML response. The browser subsequently uses this
within the next GET request (and the referer header field of the next
HTTP request), placing the session ID in history files, and both client
and server logs. The use of the session ID within the HTML content is
made worse by the application not setting the HTTP cache control headers
appropriately, which can lead to the HTML content being stored within
the local browser cache.
Where this is a particularly problem, is where the web portal is
accessed from a shared or public access terminal, such as an Internet
Caf,; the very environment that this type of solution is intended for.
Strong authentication technology, such as SecurID 2FA, does not protect
against this style of attack, as the session ID is generated after the
strong authentication process is completed.
-- Recommendations --
Review the recommendations in the Citrix alert [2].
Until the product is upgraded, consider reviewing you remote access
policy to restrict the use of the product in shared-access environments.
-- CVE --
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2007-0011 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardises names for
security problems.
-- References --
[1] http://www.citrix.com/English/ps2/products/product.asp?contentID
=15005
[2] http://support.citrix.com/article/CTX113814
-- Revision --
a. Initial release.
b. Released.
-- Distribution --
The information contained within this advisory is supplied "as-is" with
no warranties or guarantees of fitness of use or otherwise. Corsaire
accepts no responsibility for any damage caused by the use or misuse of
this information.
-- Disclaimer --
The information contained within this advisory is supplied "as-is" with
no warranties or guarantees of fitness of use or otherwise. Corsaire
accepts no responsibility for any damage caused by the use or misuse of
this information.
-- About Corsaire --
Corsaire are a leading information security consultancy, founded in 1997
in Guildford, Surrey, UK. Corsaire bring innovation, integrity and
analytical rigour to every job, which means fast and dramatic security
performance improvements. Our services centre on the delivery of
information security planning, assessment, implementation, management
and vulnerability research.
A free guide to selecting a security assessment supplier is available at
http://www.penetration-testing.com
Copyright 2006-2007 Corsaire Limited. All rights reserved.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.
1) A security issue due to residual information left on the client
device can be exploited to gain unauthorized access to a user\x92s
active session.
2) Multiple unspecified errors in client components (Net6Helper.DLL
and npCtxCAO.dll as ActiveX control and Firefox plugin) of Access
Gateway Standard and Advanced Editions can be exploited to execute
arbitrary code in context of the logged-in user.
3) The web-based administration console of an Access Gateway
appliance allows administrator to perform certain actions via HTTP
requests without performing any validity checks to verify the
request. This can be exploited to e.g. change certain configuration
settings, by enticing a logged-in administrator to visit a malicious
web site.
A redirection issue that may facilitate phishing attacks has also
been reported.
SOLUTION:
Apply hotfix and update firmware to version 4.5.5.
Access Gateway Standard Edition 4.5:
http://support.citrix.com/article/CTX114028
Access Gateway Advanced Edition 4.5:
http://support.citrix.com/article/CTX112803
The vendor also recommends to remove the following components from
client devices:
VPN ActiveX components:
* Net6Helper.DLL (Friendly name: Net6Launcher Class, version number
up to and including 4.5.2)
EPA Components (ActiveX):
* npCtxCAO.dll (Friendly name: CCAOControl Object, version number up
to 4,5,0,0)
EPA Components (Firefox plugin):
* npCtxCAO.dll (Friendly name: Citrix Endpoint Analysis Client,
present in two locations)
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Martin O\x92Neal, Corsaire.
2) The vendor credits Michael White, Symantec.
3) The vendor credits Paul Johnston.
ORIGINAL ADVISORY:
http://support.citrix.com/article/CTX113814
http://support.citrix.com/article/CTX113815
http://support.citrix.com/article/CTX113816
http://support.citrix.com/article/CTX113817
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200707-0189 | CVE-2007-4013 | Firefox In the plugin directory Net6Helper.DLL Vulnerabilities in unknown details |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Multiple unspecified vulnerabilities in (1) Net6Helper.DLL (aka Net6Launcher Class) 4.5.2 and earlier, (2) npCtxCAO.dll (aka Citrix Endpoint Analysis Client) in a Firefox plugin directory, and (3) a second npCtxCAO.dll (aka CCAOControl Object) before 4.5.0.0 in Citrix Access Gateway Standard Edition before 4.5.5 and Advanced Edition before 4.5 HF1 have unknown impact and attack vectors, possibly related to buffer overflows. NOTE: vector 3 might overlap CVE-2007-3679. This vulnerability CVE-2007-3679 And may overlap.Details of the impact of this vulnerability are unknown. Exploiting these issues could allow an attacker to:
- Obtain sensitive information
- Execute code remotely
- Hijack sessions
- Redirect users to arbitrary sites
- Make unauthorized configuration changes
Citrix has released patches for these vulnerabilities. Citrix Access Gateway, a general-purpose SSL VPN device, provides secure and always-on single-point access support for information resources.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.
1) A security issue due to residual information left on the client
device can be exploited to gain unauthorized access to a user\x92s
active session.
3) The web-based administration console of an Access Gateway
appliance allows administrator to perform certain actions via HTTP
requests without performing any validity checks to verify the
request. This can be exploited to e.g. change certain configuration
settings, by enticing a logged-in administrator to visit a malicious
web site.
This vulnerability is reported in Access Gateway model 2000
appliances with firmware version 4.5.2 and prior.
A redirection issue that may facilitate phishing attacks has also
been reported.
SOLUTION:
Apply hotfix and update firmware to version 4.5.5.
2) The vendor credits Michael White, Symantec.
3) The vendor credits Paul Johnston.
ORIGINAL ADVISORY:
http://support.citrix.com/article/CTX113814
http://support.citrix.com/article/CTX113815
http://support.citrix.com/article/CTX113816
http://support.citrix.com/article/CTX113817
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200707-0192 | CVE-2007-4016 | Citrix Access Gateway Standard Edition and Advanced Edition Arbitrary client component vulnerable to arbitrary code execution |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in the client components in Citrix Access Gateway Standard Edition before 4.5.5 and Advanced Edition before 4.5 HF1 allows attackers to execute arbitrary code via unspecified vectors. Exploiting these issues could allow an attacker to:
- Obtain sensitive information
- Execute code remotely
- Hijack sessions
- Redirect users to arbitrary sites
- Make unauthorized configuration changes
Citrix has released patches for these vulnerabilities. Citrix Access Gateway, a general-purpose SSL VPN device, provides secure and always-on single-point access support for information resources.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.
1) A security issue due to residual information left on the client
device can be exploited to gain unauthorized access to a user\x92s
active session.
3) The web-based administration console of an Access Gateway
appliance allows administrator to perform certain actions via HTTP
requests without performing any validity checks to verify the
request. This can be exploited to e.g. change certain configuration
settings, by enticing a logged-in administrator to visit a malicious
web site.
This vulnerability is reported in Access Gateway model 2000
appliances with firmware version 4.5.2 and prior.
A redirection issue that may facilitate phishing attacks has also
been reported.
SOLUTION:
Apply hotfix and update firmware to version 4.5.5.
Access Gateway Standard Edition 4.5:
http://support.citrix.com/article/CTX114028
Access Gateway Advanced Edition 4.5:
http://support.citrix.com/article/CTX112803
The vendor also recommends to remove the following components from
client devices:
VPN ActiveX components:
* Net6Helper.DLL (Friendly name: Net6Launcher Class, version number
up to and including 4.5.2)
EPA Components (ActiveX):
* npCtxCAO.dll (Friendly name: CCAOControl Object, version number up
to 4,5,0,0)
EPA Components (Firefox plugin):
* npCtxCAO.dll (Friendly name: Citrix Endpoint Analysis Client,
present in two locations)
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Martin O\x92Neal, Corsaire.
2) The vendor credits Michael White, Symantec.
3) The vendor credits Paul Johnston.
ORIGINAL ADVISORY:
http://support.citrix.com/article/CTX113814
http://support.citrix.com/article/CTX113815
http://support.citrix.com/article/CTX113816
http://support.citrix.com/article/CTX113817
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200707-0193 | CVE-2007-4017 | Citrix Access Gateway of Web -Based management console cross-site request forgery vulnerability |
CVSS V2: 7.6 CVSS V3: - Severity: HIGH |
Cross-site request forgery (CSRF) vulnerability in the web-based administration console in Citrix Access Gateway before firmware 4.5.5 allows remote attackers to perform certain configuration changes as administrators. Citrix Access Gateway Standard and Advanced Edition are prone to multiple remote vulnerabilities. Exploiting these issues could allow an attacker to:
- Obtain sensitive information
- Execute code remotely
- Hijack sessions
- Redirect users to arbitrary sites
- Make unauthorized configuration changes
Citrix has released patches for these vulnerabilities. Citrix Access Gateway, a general-purpose SSL VPN device, provides secure and always-on single-point access support for information resources.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.
1) A security issue due to residual information left on the client
device can be exploited to gain unauthorized access to a user\x92s
active session.
2) Multiple unspecified errors in client components (Net6Helper.DLL
and npCtxCAO.dll as ActiveX control and Firefox plugin) of Access
Gateway Standard and Advanced Editions can be exploited to execute
arbitrary code in context of the logged-in user. This can be exploited to e.g.
This vulnerability is reported in Access Gateway model 2000
appliances with firmware version 4.5.2 and prior.
A redirection issue that may facilitate phishing attacks has also
been reported.
SOLUTION:
Apply hotfix and update firmware to version 4.5.5.
Access Gateway Standard Edition 4.5:
http://support.citrix.com/article/CTX114028
Access Gateway Advanced Edition 4.5:
http://support.citrix.com/article/CTX112803
The vendor also recommends to remove the following components from
client devices:
VPN ActiveX components:
* Net6Helper.DLL (Friendly name: Net6Launcher Class, version number
up to and including 4.5.2)
EPA Components (ActiveX):
* npCtxCAO.dll (Friendly name: CCAOControl Object, version number up
to 4,5,0,0)
EPA Components (Firefox plugin):
* npCtxCAO.dll (Friendly name: Citrix Endpoint Analysis Client,
present in two locations)
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Martin O\x92Neal, Corsaire.
2) The vendor credits Michael White, Symantec.
3) The vendor credits Paul Johnston.
ORIGINAL ADVISORY:
http://support.citrix.com/article/CTX113814
http://support.citrix.com/article/CTX113815
http://support.citrix.com/article/CTX113816
http://support.citrix.com/article/CTX113817
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200707-0194 | CVE-2007-4018 | Citrix Access Gateway Advanced Edition Vulnerable to phishing attacks |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Citrix Access Gateway Advanced Edition before firmware 4.5.5 allows attackers to redirect users to arbitrary web sites and conduct phishing attacks via unknown vectors. Citrix Access Gateway Standard and Advanced Edition are prone to multiple remote vulnerabilities. Exploiting these issues could allow an attacker to:
- Obtain sensitive information
- Execute code remotely
- Hijack sessions
- Redirect users to arbitrary sites
- Make unauthorized configuration changes
Citrix has released patches for these vulnerabilities. Citrix Access Gateway, a general-purpose SSL VPN device, provides secure and always-on single-point access support for information resources.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now
available:
http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,000 different Windows applications.
1) A security issue due to residual information left on the client
device can be exploited to gain unauthorized access to a user\x92s
active session.
2) Multiple unspecified errors in client components (Net6Helper.DLL
and npCtxCAO.dll as ActiveX control and Firefox plugin) of Access
Gateway Standard and Advanced Editions can be exploited to execute
arbitrary code in context of the logged-in user.
3) The web-based administration console of an Access Gateway
appliance allows administrator to perform certain actions via HTTP
requests without performing any validity checks to verify the
request. This can be exploited to e.g. change certain configuration
settings, by enticing a logged-in administrator to visit a malicious
web site.
This vulnerability is reported in Access Gateway model 2000
appliances with firmware version 4.5.2 and prior.
A redirection issue that may facilitate phishing attacks has also
been reported.
SOLUTION:
Apply hotfix and update firmware to version 4.5.5.
Access Gateway Standard Edition 4.5:
http://support.citrix.com/article/CTX114028
Access Gateway Advanced Edition 4.5:
http://support.citrix.com/article/CTX112803
The vendor also recommends to remove the following components from
client devices:
VPN ActiveX components:
* Net6Helper.DLL (Friendly name: Net6Launcher Class, version number
up to and including 4.5.2)
EPA Components (ActiveX):
* npCtxCAO.dll (Friendly name: CCAOControl Object, version number up
to 4,5,0,0)
EPA Components (Firefox plugin):
* npCtxCAO.dll (Friendly name: Citrix Endpoint Analysis Client,
present in two locations)
PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Martin O\x92Neal, Corsaire.
2) The vendor credits Michael White, Symantec.
3) The vendor credits Paul Johnston.
ORIGINAL ADVISORY:
http://support.citrix.com/article/CTX113814
http://support.citrix.com/article/CTX113815
http://support.citrix.com/article/CTX113816
http://support.citrix.com/article/CTX113817
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------