VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-200708-0411 CVE-2007-4459 Cisco IP Phone 7940 Service disruption in (DoS) Vulnerabilities

Related entries in the VARIoT exploits database: VAR-E-200708-0245, VAR-E-200708-0246
CVSS V2: 7.1
CVSS V3: -
Severity: HIGH
Cisco IP Phone 7940 and 7960 with P0S3-08-6-00 firmware, and other SIP firmware before 8.7(0), allows remote attackers to cause a denial of service (device reboot) via (1) a certain sequence of 10 invalid SIP INVITE and OPTIONS messages; or (2) a certain invalid SIP INVITE message that contains a remote tag, followed by a certain set of two related SIP OPTIONS messages. Cisco IP Phone 7940 and 7960 There is a service disruption ( Reboot device ) There is a vulnerability that becomes a condition.Service disruption by a third party via: ( Reboot device ) There is a possibility of being put into a state. \"Cisco 7940型IP电话是一种多功能通讯设备,通过IP网络传递语音信号. Cisco 7940在处理特定的请求序列时存在漏洞,远程攻击者可能利用此漏洞导致设备不可用. 如果向Cisco 7940 IP电话发送了以下3个消息序列的话: X ------------------------- INVITE -----------------------> Cisco X <--- 481 transaction does not exists ----- Cisco X ------------------------- OPTIONS--------------------> Cisco X <--------------------------- OK ------------------------- Cisco X <--- 481 transaction does not exists ----- Cisco X ------------------------- OPTIONS--------------------> Cisco 或发送以下10个消息序列的话: X ------------------------- INVITE -----------------------> Cisco X <--------------- 400 Bad Request --------------- Cisco X <--------------- 400 Bad Request --------------- Cisco X <--------------- 400 Bad Request --------------- Cisco X <--------------- 400 Bad Request --------------- Cisco X <--------------- 400 Bad Request --------------- Cisco X ------------------------- OPTIONS--------------------> Cisco X <--------------------- 200 OK ------------------------- Cisco X ------------------------- OPTIONS--------------------> Cisco X <--------------------- 200 OK ------------------------- Cisco X <--------------- 400 Bad Request --------------- Cisco X ------------------------- INVITE -----------------------> Cisco X <--------------- 400 Bad Request --------------- Cisco X <--------------- 400 Bad Request --------------- Cisco X ------------------------- OPTIONS--------------------> Cisco X <--------------- 404 Not Found ------------------ Cisco X <--------------- 400 Bad Request --------------- Cisco X <--------------- 400 Bad Request --------------- Cisco X <--------------- 400 Bad Request --------------- Cisco X ------------------------- OPTIONS--------------------> Cisco X <--------------------- 200 OK ------------------------- Cisco X ------------------------- INVITE -----------------------> Cisco X <----------------100 Trying ------------------------- Cisco X <--------------- 404 Not Found ------------------ Cisco X <--------------- 404 Not Found ------------------ Cisco X <--------------- 404 Not Found ------------------ Cisco X ------------------------- OPTIONS--------------------> Cisco X <--------------------- 200 OK ------------------------- Cisco X <--------------- 404 Not Found ------------------ Cisco X ------------------------- OPTIONS--------------------> Cisco X <--------------------- 200 OK ------------------------- Cisco X <--------------- 404 Not Found ------------------ Cisco 就会导致设备重启. \". Cisco 7940/7960 phones are prone to multiple denial-of-service vulnerabilities. A successful attack can allow remote attackers to crash or reboot an affected device. Cisco 7940/7960 devices running firmware P0S3-08-6-00 and prior are reported vulnerable. "Cisco 7940 type IP A telephone is a multifunctional communication device that IP The network transmits voice signals. Cisco 7940 A vulnerability exists in the processing of a specific sequence of requests that could be exploited by a remote attacker to render the device unusable. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Cisco IP Phone 7940 SIP Message Sequence Denial of Service SECUNIA ADVISORY ID: SA26547 VERIFY ADVISORY: http://secunia.com/advisories/26547/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote SOFTWARE: Cisco IP Phone 7940 http://secunia.com/product/1113/ DESCRIPTION: The Madynes research team at INRIA Lorraine has reported some vulnerabilities in Cisco IP Phone 7940, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerabilities are caused due to errors within the handling of certain SIP message sequences. These can be exploited to reboot the device by sending a series of specially crafted SIP messages. The vulnerabilities are reported in firmware version POS3-08-6-00. SOLUTION: Use only in a trusted network environment. PROVIDED AND/OR DISCOVERED BY: Madynes research team at INRIA Lorraine ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065401.html http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065402.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-200708-0310 CVE-2007-4424 Apple Safari Vulnerable to arbitrary file download on the client system desktop CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Apple Safari for Windows 3.0.3 and earlier does not prompt the user before downloading a file, which allows remote attackers to download arbitrary files to the desktop of a client system via certain HTML, as demonstrated by a filename in the DATA attribute of an OBJECT element. NOTE: it could be argued that this is not a vulnerability because a dangerous file is not actually launched, but as of 2007, it is generally accepted that web browsers should prompt users before saving dangerous content. Safari For Windows is prone to a remote security vulnerability. arbitrary files
VAR-200708-0345 CVE-2007-4387 2wire 1701HG and 2071 Gateway of /xslt Vulnerable to cross-site request forgery CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site request forgery (CSRF) vulnerability in /xslt in 2wire 1701HG and 2071 Gateway routers, with 3.17.5 and 5.29.51 software, allows remote attackers to perform certain configuration changes as administrators. A remote attacker performs some setting changes like an administrator. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. This can be exploited to perform certain actions on the device when a logged in administrator is tricked into visiting a malicious web page. The vulnerability is reported in 1701HG version 3.17.5 and 2071 Gateway version 5.29.51. Other versions may also be affected. SOLUTION: Do not browse untrusted web sites while being logged in to the administrative section of the device. PROVIDED AND/OR DISCOVERED BY: hkm ORIGINAL ADVISORY: http://archives.neohapsis.com/archives/bugtraq/2007-08/0226.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-200708-0346 CVE-2007-4388 2wire of 1701HG and 2071 Gateway Empty password vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
2wire 1701HG and 2071 Gateway routers, with 5.29.51 and possibly 3.17.5 software, have a blank password by default. 2wire of 1701HG and 2071 Gateway Contains an empty password vulnerability by default.Details of the impact of this vulnerability are unknown. 1701Hg Router is prone to a remote security vulnerability
VAR-200708-0316 CVE-2007-4430 Cisco IOS of show ip bgp regexp Service disruption in commands (DoS) Vulnerabilities

Related entries in the VARIoT exploits database: VAR-E-200708-0427
CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows context-dependent attackers to cause a denial of service (device restart and BGP routing table rebuild) via certain regular expressions in a "show ip bgp regexp" command. NOTE: unauthenticated remote attacks are possible in environments with anonymous telnet and Looking Glass access. (DoS) There is a vulnerability that becomes a condition.To a third party Cisco IOS Will be restarted BGP The routing table may be rebuilt. Cisco IOS is prone to a remote denial-of-service vulnerability because the software fails to properly handle certain CLI commands. To issue commands that trigger this vulnerability, attackers must be able to successfully authenticate to vulnerable devices. This may be achieved through remote anonymous means or by sending specially crafted input to web interfaces such as 'Looking Glass' web applications. Successfully exploiting this issue allows attackers to trigger device reboots, denying service to legitimate users. This issue is documented as Cisco bug ID CSCsb08386. Cisco IOS releases in the 12.0, 12.1, 12.2, 12.3, and 12.4 ranges are vulnerable to this issue. "Cisco IOS is the operating system used in Cisco network devices. If this happens several times in a row, it may cause The operator's network is unavailable. <* Links: http://www.heise-security.co.uk/news/print/94526 http://www.cisco.com/warp/public/707/cisco-sr- 20070912-regexp.shtml http://secunia.com/advisories/26798/ https://puck.nether.net/pipermail/cisco-nsp/2007-August/043010.html http://forum.cisco.com/ eforum/servlet/NetProf?page=netprof&forum=Network%20Infrastructure&topic=WAN% *>". ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Cisco IOS Regular Expressions Denial of Service SECUNIA ADVISORY ID: SA26798 VERIFY ADVISORY: http://secunia.com/advisories/26798/ CRITICAL: Not critical IMPACT: DoS WHERE: Local system OPERATING SYSTEM: Cisco IOS 12.x http://secunia.com/product/182/ Cisco IOS R12.x http://secunia.com/product/50/ DESCRIPTION: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an error when handling regular expressions containing repetition operators and pattern recalls. This can be exploited to cause a stack overflow by sending a command with specially crafted regular expressions to the command line interface. Successful exploitation causes the device to crash and requires a reboot, but requires valid user credentials. The vulnerability is reported in versions 12.0, 12.1, 12.2, 12.3, and 12.4. SOLUTION: Restrict access to trusted people only. PROVIDED AND/OR DISCOVERED BY: Sebastian Wiesinger ORIGINAL ADVISORY: http://www.cisco.com/en/US/products/products_security_response09186a00808bb91c.html OTHER REFERENCES: https://puck.nether.net/pipermail/cisco-nsp/2007-August/043002.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-200708-0317 CVE-2007-4431 Apple Safari Vulnerabilities in which the same origin policy involving access to the external domain from the local zone is bypassed CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Cross-domain vulnerability in Apple Safari for Windows 3.0.3 and earlier allows remote attackers to bypass the Same Origin Policy, with access from local zones to external domains, via a certain body.innerHTML property value, aka "classic JavaScript frame hijacking.". Apple Safari is susceptible to a vulnerability that allows attacker to violate the same-origin policy. This issue occurs because the application fails to properly enforce the same-origin policy for JavaScript remote data access. An attacker may create a malicious webpage that can access the properties of another domain. This may lead allow the attacker to obtain sensitive information or launch other attacks against a user of the browser. Safari 3 beta is vulnerable to this issue. This vulnerability is also known as "classic JavaScript structure hijacking"
VAR-200708-0308 CVE-2007-4422 Symanatec Enterprise Firewall User name is guessed CVSS V2: 9.3
CVSS V3: -
Severity: HIGH
The login interface in Symantec Enterprise Firewall 6.x, when a VPN with pre-shared key (PSK) authentication is enabled, generates different responses depending on whether or not a username is valid, which allows remote attackers to enumerate valid usernames. Symantec Enterprise Firewall is prone to a username-enumeration weakness. An attacker can exploit this issue to enumerate valid user names. This may aid in further attacks. There is a loophole in the processing of certain authentication requests in SEP, and a remote attacker may use this loophole to brute-force guess a valid user name. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Symantec Enterprise Firewall User Enumeration Weakness SECUNIA ADVISORY ID: SA26511 VERIFY ADVISORY: http://secunia.com/advisories/26511/ CRITICAL: Not critical IMPACT: Exposure of sensitive information WHERE: >From remote SOFTWARE: Symantec Enterprise Firewall 6.x http://secunia.com/product/15339/ DESCRIPTION: A weakness has been reported in Symantec Enterprise Firewall, which can be exploited by malicious people to determine valid usernames. The problem is that a different response is sent when using a valid or invalid username and can be exploited to determine valid usernames. Successful exploitation requires that the application is configured for remote access (client-to-gateway) VPN using pre-shared key (PSK) authentication. The weakness is reported in version 6.x. SOLUTION: The vendor recommends adding the "default-ikeuser" username. Please see the vendor's advisory for details. PROVIDED AND/OR DISCOVERED BY: The vendor credits Roy Hill, NTA Monitor Ltd. ORIGINAL ADVISORY: http://securityresponse.symantec.com/avcenter/security/Content/2007.08.16.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-200708-0372 CVE-2007-4414 Windows upper Cisco VPN Client Vulnerability gained in CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Cisco VPN Client on Windows before 4.8.02.0010 allows local users to gain privileges by enabling the "Start Before Logon" (SBL) and Microsoft Dial-Up Networking options, and then interacting with the dial-up networking dialog box. Cisco VPN Client for Windows is prone to multiple local privilege-escalation vulnerabilities. Successfully exploiting these issues allows attackers with local, interactive access to affected computers to gain SYSTEM-level privileges. This facilitates the complete compromise of affected computers. Versions prior to 4.8.02.0010 and 5.0.01.0600 of Cisco VPN Client for the Microsoft Windows platform are vulnerable to these issues. These issues are tracked as Cisco Bug IDs CSCse89550 and CSCsj00785. "The Cisco VPN Client allows users to create IPSec VPN tunnels to Cisco VPN enabled devices. 1. Note that configuring these two settings does not require the user to have administrative privileges. 2. Unprivileged users can obtain privilege escalation through the use of any executable program Replacing the Cisco VPN Service executable causes arbitrary programs to run with the privileges of the LocalSystem account. The cause of this vulnerability is that the default file permissions assigned to cvpnd.exe (the Cisco VPN Service executable) during installation allow unprivileged interactive users Replace cvpnd.exe with any file.Since the Cisco VPN Service is a Windows service that runs with LocalSystem privileges, unprivileged users can easily elevate privileges
VAR-200708-0373 CVE-2007-4415 Cisco VPN Client Vulnerability gained in CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Cisco VPN Client on Windows before 5.0.01.0600, and the 5.0.01.0600 InstallShield (IS) release, uses weak permissions for cvpnd.exe (Modify granted to Interactive Users), which allows local users to gain privileges via a modified cvpnd.exe. Cisco VPN Client for Windows is prone to multiple local privilege-escalation vulnerabilities. Successfully exploiting these issues allows attackers with local, interactive access to affected computers to gain SYSTEM-level privileges. This facilitates the complete compromise of affected computers. Versions prior to 4.8.02.0010 and 5.0.01.0600 of Cisco VPN Client for the Microsoft Windows platform are vulnerable to these issues. These issues are tracked as Cisco Bug IDs CSCse89550 and CSCsj00785. 1. Local privileges over Microsoft Windows Dial-Up Networking interfaces Elevating a non-privileged user can be done by enabling the Start Before Logon (SBL) feature and configuring the VPN configuration to use the Microsoft Dial-Up Networking interface to elevate privileges to that of a LocalSystem account user. Note that configuring these two settings does not require the user to have administrative privileges. 2. Unprivileged users can obtain privilege escalation through the use of any executable program Replacing the Cisco VPN Service executable causes arbitrary programs to run with the privileges of the LocalSystem account
VAR-200708-0347 CVE-2007-4389 2Wire Routers Cross-Site Request Forgery Vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Cross-site request forgery (CSRF) vulnerability in /xslt in 2wire 1701HG, 1800HW, and 2071 Gateway routers, with 3.17.5, 3.7.1, and 5.29.51 software, allows remote attackers to create DNS mappings as administrators, and conduct DNS poisoning attacks, via the NAME and ADDR parameters. Multiple 2Wire routers are prone to a cross-site request-forgery vulnerability. Exploiting this issue may allow a remote attacker to execute arbitrary actions on an affected device
VAR-200708-0222 CVE-2007-2240 IBM and Lenovo Access Support acpRunner ActiveX control fails to restrict access to methods CVSS V2: 5.8
CVSS V3: -
Severity: MEDIUM
The IBM Lenovo Access Support acpRunner ActiveX control, as distributed in acpcontroller.dll before 1.2.8.0 and possibly acpir.dll before 1.0.0.9 (Automated Solutions 1.0 before fix pack 1), does not properly validate digital signatures of downloaded software, which makes it easier for remote attackers to spoof a download. Lenovo Inline Automated Solutions ActiveX controls are prone to multiple vulnerabilities. An attacker may exploit these issues by enticing victims into opening a maliciously crafted HTML document. Failed exploit attempts may result in denial-of-service conditions. These issues affects versions prior to 'acpcontroller.dll' ActiveX control 1.2.8.0 and 'acpir.dll' ActiveX control 1.0.0.9. Automated Solutions is a software package of ActiveX tools installed on Lenovo and IBM computers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-226A Microsoft Updates for Multiple Vulnerabilities Original release date: August 14, 2007 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft Windows Media Player * Microsoft Office * Microsoft Office for Mac * Microsoft XML Core Services * Microsoft Visual Basic * Microsoft Virtual PC * Microsoft Virtual Server Overview Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, Visual Basic, Virtual PC, and Virtual Server. I. Description Microsoft has released updates to address vulnerabilities that affect Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, Visual Basic,Virtual PC, and Virtual Server as part of the Microsoft Security Bulletin Summary for August 2007. Further information about the vulnerabilities addressed by these updates is available in the Vulnerability Notes Database II. An attacker may also be able to cause a denial of service. III. Solution Apply updates from Microsoft Microsoft has provided updates for these vulnerabilities in the August 2007 Security Bulletins. The Security Bulletins describe any known issues related to the updates. Administrators are encouraged to note any known issues that are described in the Bulletins and test for any potentially adverse effects. Updates for Microsoft Windows and Microsoft Office XP and later are available on the Microsoft Update site. Microsoft Office 2000 updates are available on the Microsoft Office Update site. Apple Mac OS X users should obtain updates from the Mactopia web site. System administrators may wish to consider using an automated patch distribution system such as Windows Server Update Services (WSUS). IV. References * US-CERT Vulnerability Notes for Microsoft August 2007 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms07-aug> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> * Microsoft Security Bulletin Summary for August 2007 - <http://www.microsoft.com/technet/security/bulletin/ms07-aug.mspx> * Microsoft Update - <https://update.microsoft.com/microsoftupdate/> * Microsoft Office Update - <http://officeupdate.microsoft.com/> * Windows Server Update Services - <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx> * Mactopia - <http://www.microsoft.com/mac/> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/alerts/TA07-226A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA07-226A Feedback VU#361968" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History August 14, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRsIPdvRFkHkM87XOAQI0pAgAqwe7XJni4X4VcqfNQIZU1XiXDE04/3W+ Tl4jOtH9nxmwmQtUSMrTjrmtxB97DbA9sd6F5kYwwHB3MnPEY4lVe/zifmjQRH1o lvMYH/Zd6KnGU3FFX/w4gZ1x1A/QTpIvXLXTKdFd/vyQxTHqEvZxttpH7BHpt92O MQem58NVIKLxpZ2a1KAh2kdkDRT8sP8vO8G6gKyY1PVHwHSJJW9JKeVzxzGV9kuL +wCZOGGcq6DWxUt71XDK8MEvVoMpwwwxIHazG33a2ybepC3Bg4heILEj6urUaF2N wlkFIzGGfzwVTzDi88VP9ZXHcffJfMOLUA5jeh84rAElYciQIysGvg== =glfP -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. 3) The acpRunner (AcpController.dll) ActiveX control does not restrict potentially dangerous operations to certain domains. tricking a user into visiting a malicious website. SOLUTION: Apply Automated Solutions Fix Pack 1: http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649 PROVIDED AND/OR DISCOVERED BY: Will Dormann, CERT/CC. ORIGINAL ADVISORY: IBM / Lenovo: http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649 US-CERT VU#426737: http://www.kb.cert.org/vuls/id/426737 US-CERT VU#599657: http://www.kb.cert.org/vuls/id/599657 US-CERT VU#570705: http://www.kb.cert.org/vuls/id/570705 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-200708-0005 CVE-2007-2929 IBM and Lenovo Access Support acpRunner ActiveX control fails to restrict access to methods CVSS V2: 5.8
CVSS V3: -
Severity: MEDIUM
The IBM Lenovo Access Support acpRunner ActiveX control, as distributed in acpcontroller.dll before 1.2.8.0 and possibly acpir.dll before 1.0.0.9 (Automated Solutions 1.0 before fix pack 1), exposes unsafe methods to arbitrary web domains, which allows remote attackers to download arbitrary code onto a client system and execute this code. Lenovo Inline Automated Solutions ActiveX controls are prone to multiple vulnerabilities. An attacker may exploit these issues by enticing victims into opening a maliciously crafted HTML document. Failed exploit attempts may result in denial-of-service conditions. These issues affects versions prior to 'acpcontroller.dll' ActiveX control 1.2.8.0 and 'acpir.dll' ActiveX control 1.0.0.9. Automated Solutions is a software package of ActiveX tools installed on Lenovo and IBM computers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-226A Microsoft Updates for Multiple Vulnerabilities Original release date: August 14, 2007 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft Windows Media Player * Microsoft Office * Microsoft Office for Mac * Microsoft XML Core Services * Microsoft Visual Basic * Microsoft Virtual PC * Microsoft Virtual Server Overview Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, Visual Basic, Virtual PC, and Virtual Server. I. Description Microsoft has released updates to address vulnerabilities that affect Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, Visual Basic,Virtual PC, and Virtual Server as part of the Microsoft Security Bulletin Summary for August 2007. Further information about the vulnerabilities addressed by these updates is available in the Vulnerability Notes Database II. An attacker may also be able to cause a denial of service. III. Solution Apply updates from Microsoft Microsoft has provided updates for these vulnerabilities in the August 2007 Security Bulletins. The Security Bulletins describe any known issues related to the updates. Administrators are encouraged to note any known issues that are described in the Bulletins and test for any potentially adverse effects. Updates for Microsoft Windows and Microsoft Office XP and later are available on the Microsoft Update site. Microsoft Office 2000 updates are available on the Microsoft Office Update site. Apple Mac OS X users should obtain updates from the Mactopia web site. System administrators may wish to consider using an automated patch distribution system such as Windows Server Update Services (WSUS). IV. References * US-CERT Vulnerability Notes for Microsoft August 2007 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms07-aug> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> * Microsoft Security Bulletin Summary for August 2007 - <http://www.microsoft.com/technet/security/bulletin/ms07-aug.mspx> * Microsoft Update - <https://update.microsoft.com/microsoftupdate/> * Microsoft Office Update - <http://officeupdate.microsoft.com/> * Windows Server Update Services - <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx> * Mactopia - <http://www.microsoft.com/mac/> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/alerts/TA07-226A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA07-226A Feedback VU#361968" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History August 14, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRsIPdvRFkHkM87XOAQI0pAgAqwe7XJni4X4VcqfNQIZU1XiXDE04/3W+ Tl4jOtH9nxmwmQtUSMrTjrmtxB97DbA9sd6F5kYwwHB3MnPEY4lVe/zifmjQRH1o lvMYH/Zd6KnGU3FFX/w4gZ1x1A/QTpIvXLXTKdFd/vyQxTHqEvZxttpH7BHpt92O MQem58NVIKLxpZ2a1KAh2kdkDRT8sP8vO8G6gKyY1PVHwHSJJW9JKeVzxzGV9kuL +wCZOGGcq6DWxUt71XDK8MEvVoMpwwwxIHazG33a2ybepC3Bg4heILEj6urUaF2N wlkFIzGGfzwVTzDi88VP9ZXHcffJfMOLUA5jeh84rAElYciQIysGvg== =glfP -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. 2) The acpRunner (AcpController.dll) ActiveX control does not properly verify the signature of downloaded packages. 3) The acpRunner (AcpController.dll) ActiveX control does not restrict potentially dangerous operations to certain domains. tricking a user into visiting a malicious website. SOLUTION: Apply Automated Solutions Fix Pack 1: http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649 PROVIDED AND/OR DISCOVERED BY: Will Dormann, CERT/CC. ORIGINAL ADVISORY: IBM / Lenovo: http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649 US-CERT VU#426737: http://www.kb.cert.org/vuls/id/426737 US-CERT VU#599657: http://www.kb.cert.org/vuls/id/599657 US-CERT VU#570705: http://www.kb.cert.org/vuls/id/570705 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-200708-0004 CVE-2007-2928 IBM and Lenovo Access Support acpRunner ActiveX control fails to restrict access to methods CVSS V2: 5.8
CVSS V3: -
Severity: MEDIUM
Format string vulnerability in the IBM Lenovo Access Support acpRunner ActiveX control, as distributed in acpcontroller.dll before 1.2.8.0 and possibly acpir.dll before 1.0.0.9 (Automated Solutions 1.0 before fix pack 1), allows remote attackers to execute arbitrary code via format string specifiers in unknown data. Lenovo Inline Automated Solutions ActiveX controls are prone to multiple vulnerabilities. An attacker may exploit these issues by enticing victims into opening a maliciously crafted HTML document. Failed exploit attempts may result in denial-of-service conditions. These issues affects versions prior to 'acpcontroller.dll' ActiveX control 1.2.8.0 and 'acpir.dll' ActiveX control 1.0.0.9. Automated Solutions is a software package of ActiveX tools installed on Lenovo and IBM computers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA07-226A Microsoft Updates for Multiple Vulnerabilities Original release date: August 14, 2007 Last revised: -- Source: US-CERT Systems Affected * Microsoft Windows * Microsoft Internet Explorer * Microsoft Windows Media Player * Microsoft Office * Microsoft Office for Mac * Microsoft XML Core Services * Microsoft Visual Basic * Microsoft Virtual PC * Microsoft Virtual Server Overview Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, Visual Basic, Virtual PC, and Virtual Server. I. Description Microsoft has released updates to address vulnerabilities that affect Microsoft Windows, Internet Explorer, Windows Media Player, Office, Office for Mac, XML Core Services, Visual Basic,Virtual PC, and Virtual Server as part of the Microsoft Security Bulletin Summary for August 2007. Further information about the vulnerabilities addressed by these updates is available in the Vulnerability Notes Database II. An attacker may also be able to cause a denial of service. III. Solution Apply updates from Microsoft Microsoft has provided updates for these vulnerabilities in the August 2007 Security Bulletins. The Security Bulletins describe any known issues related to the updates. Administrators are encouraged to note any known issues that are described in the Bulletins and test for any potentially adverse effects. Updates for Microsoft Windows and Microsoft Office XP and later are available on the Microsoft Update site. Microsoft Office 2000 updates are available on the Microsoft Office Update site. Apple Mac OS X users should obtain updates from the Mactopia web site. System administrators may wish to consider using an automated patch distribution system such as Windows Server Update Services (WSUS). IV. References * US-CERT Vulnerability Notes for Microsoft August 2007 updates - <http://www.kb.cert.org/vuls/byid?searchview&query=ms07-aug> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/> * Microsoft Security Bulletin Summary for August 2007 - <http://www.microsoft.com/technet/security/bulletin/ms07-aug.mspx> * Microsoft Update - <https://update.microsoft.com/microsoftupdate/> * Microsoft Office Update - <http://officeupdate.microsoft.com/> * Windows Server Update Services - <http://www.microsoft.com/windowsserversystem/updateservices/default.mspx> * Mactopia - <http://www.microsoft.com/mac/> ____________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/alerts/TA07-226A.html> ____________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA07-226A Feedback VU#361968" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History August 14, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRsIPdvRFkHkM87XOAQI0pAgAqwe7XJni4X4VcqfNQIZU1XiXDE04/3W+ Tl4jOtH9nxmwmQtUSMrTjrmtxB97DbA9sd6F5kYwwHB3MnPEY4lVe/zifmjQRH1o lvMYH/Zd6KnGU3FFX/w4gZ1x1A/QTpIvXLXTKdFd/vyQxTHqEvZxttpH7BHpt92O MQem58NVIKLxpZ2a1KAh2kdkDRT8sP8vO8G6gKyY1PVHwHSJJW9JKeVzxzGV9kuL +wCZOGGcq6DWxUt71XDK8MEvVoMpwwwxIHazG33a2ybepC3Bg4heILEj6urUaF2N wlkFIzGGfzwVTzDi88VP9ZXHcffJfMOLUA5jeh84rAElYciQIysGvg== =glfP -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. 2) The acpRunner (AcpController.dll) ActiveX control does not properly verify the signature of downloaded packages. 3) The acpRunner (AcpController.dll) ActiveX control does not restrict potentially dangerous operations to certain domains. tricking a user into visiting a malicious website. SOLUTION: Apply Automated Solutions Fix Pack 1: http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649 PROVIDED AND/OR DISCOVERED BY: Will Dormann, CERT/CC. ORIGINAL ADVISORY: IBM / Lenovo: http://www-307.ibm.com/pc/support/site.wss/document.do?sitestyle=lenovo&lndocid=MIGR-67649 US-CERT VU#426737: http://www.kb.cert.org/vuls/id/426737 US-CERT VU#599657: http://www.kb.cert.org/vuls/id/599657 US-CERT VU#570705: http://www.kb.cert.org/vuls/id/570705 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-200708-0253 CVE-2007-4360 DRAC4 Service disruption in (DoS) Vulnerabilities CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Unspecified vulnerability in Dell Remote Access Card 4 (DRAC4) with firmware 1.50 Build 02.16 allows remote attackers to cause a denial of service (SSH daemon crash) via certain network traffic, as demonstrated by an "nmap -O" scan with nmap 4.03, possibly related to a Mocana (Mocanada) SSH vulnerability. Attackers can exploit this issue to deny legitimate access to port 22 on affected computers. Dell Remote Access Card 4/P running firmware 1.50 (Build 02.16) is vulnerable; other versions may also be affected. There is a vulnerability in the SSH service of DRAC when processing malformed data connections. If you use the nmap-4.03-3 port scanning tool bundled with Debian unstable or Ubuntu Depper to perform port scanning on the SSH service of the Dell remote access card, the SSH port may become unavailable, and you must use the racadm tool to hard restart the entire system to recover. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. The vulnerability is caused due to an unspecified error and can be exploited to make the SSH service unresponsive e.g. via a port scan using nmap 4.03 with OS detection enabled. Other versions may also be affected. SOLUTION: Restrict network access to the device. PROVIDED AND/OR DISCOVERED BY: ETES GmbH ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065239.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-200708-0018 CVE-2007-4316 Zyxel Zywall 2 Run on ZyNOS Vulnerability to execute management actions in the management interface CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
The management interface in ZyNOS firmware 3.62(WK.6) on the Zyxel Zywall 2 device has a certain default password, which allows remote attackers to perform administrative actions. Zywall 2 is prone to a remote security vulnerability. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: ZyXEL ZyWALL / ZyNOS Cross-Site Request Forgery SECUNIA ADVISORY ID: SA26381 VERIFY ADVISORY: http://secunia.com/advisories/26381/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: ZyXEL ZyWALL Series http://secunia.com/product/147/ ZyXEL ZyNOS 3.x http://secunia.com/product/149/ DESCRIPTION: Henri Lindberg has reported a vulnerability in ZyXEL ZyWALL / ZyNOS, which can be exploited by malicious people to conduct cross-site request forgery attacks. This can be exploited to perform certain actions when a logged in administrator is tricked into visiting a malicious website. NOTE: Reportedly, this can further be exploited to conduct script insertion attacks. The vulnerabilities are reported in Zyxell ZyWALL 2 and in ZyNOS firmware version V3.62(WK.6). Other versions may also be affected. SOLUTION: Do not browser untrusted sites while being logged in to the administrative section of the device. PROVIDED AND/OR DISCOVERED BY: Henri Lindberg of Louhi Networks. ORIGINAL ADVISORY: http://www.louhi.fi/advisory/zyxel_070810.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-200708-0020 CVE-2007-4318 Zyxel Zywall 2 Run on device ZyNOS Management interface cross-site scripting vulnerability

Related entries in the VARIoT exploits database: VAR-E-200708-0103
CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in Forms/General_1 in the management interface in ZyNOS firmware 3.62(WK.6) on the Zyxel Zywall 2 device allows remote authenticated administrators to inject arbitrary web script or HTML via the sysSystemName parameter. Zywall 2 is prone to a cross-site scripting vulnerability. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: ZyXEL ZyWALL / ZyNOS Cross-Site Request Forgery SECUNIA ADVISORY ID: SA26381 VERIFY ADVISORY: http://secunia.com/advisories/26381/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: ZyXEL ZyWALL Series http://secunia.com/product/147/ ZyXEL ZyNOS 3.x http://secunia.com/product/149/ DESCRIPTION: Henri Lindberg has reported a vulnerability in ZyXEL ZyWALL / ZyNOS, which can be exploited by malicious people to conduct cross-site request forgery attacks. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the request. This can be exploited to perform certain actions when a logged in administrator is tricked into visiting a malicious website. NOTE: Reportedly, this can further be exploited to conduct script insertion attacks. The vulnerabilities are reported in Zyxell ZyWALL 2 and in ZyNOS firmware version V3.62(WK.6). Other versions may also be affected. SOLUTION: Do not browser untrusted sites while being logged in to the administrative section of the device. PROVIDED AND/OR DISCOVERED BY: Henri Lindberg of Louhi Networks. ORIGINAL ADVISORY: http://www.louhi.fi/advisory/zyxel_070810.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-200708-0254 CVE-2007-4361 NETGEAR ReadyNAS RAIDiator default root user password vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
NETGEAR (formerly Infrant) ReadyNAS RAIDiator before 4.00b2-p2-T1 beta creates a default SSH root password derived from the hardware serial number, which makes it easier for remote attackers to guess the password and obtain login access. ReadyNAS is a direct-attached storage device based on Linux and debian-sparc platforms.  ReadyNAS has two users enabled by default, one is admin (the default password is infrant1) and the other is root. Each time it starts, it uses a hard-coded algorithm to generate the root password, which uses the Ethernet MAC address and software version number. And a hash of the shared secret. The root password cannot be changed permanently, so it is reset every time it is started.  The ReadyNAS device boots from the built-in flash memory, and the Linux kernel and the initrd image are in this flash memory. At startup, the initrd image will look for the installed hard disk and initialize it. If an uninitialized hard disk is found, it will be added to the RAID array. A part of the hard disk will be used as the root file system. A tarball stored in the flash will initialize it.  After loading the rootfs, some consistency checks are performed, and some important configuration files are encrypted and backed up. These files cannot be changed without decryption.  At startup, the / linuxrc file in the initrd image is first executed as follows:  --------------  SEED1 = `/ sysroot / sbin / ifconfig eth0 | grep HWaddr | sed -e 's /.* HWaddr //'  --e 's / // g'`  SEED2 = `cut -f2 -d = / sysroot / etc / raidiator_version | cut -f1 -d,`  [* EDIT *: removed SEED3 as friendly requested by vendor]  echo "root:` echo \ "$ SEED1 $ SEED2 $ SEED3 \" | md5sum | cut -f1 -d '' `" |  chpasswd  # TAKE ME OUT !!  [-s /sysroot/.os_passwd] && echo "root:` / sysroot / usr / bin / head -1  / sysroot / .os_passwd` "| chpasswd  #################  / sysroot / bin / mv / etc / passwd / sysroot / etc / passwd 2> $ ERR  rm -rf / sysroot / etc / hosts_equiv /sysroot/root/.rhosts  /sysroot/root/.ssh/* 2> $ ERR  --------------  The password is initialized by md5 and the following components:  a.) MAC address obtained from ifconfig  b.) Software version number read from / etc / raidiator_version  c.) Shared keychain in SEED3  Even though the root password varies from device to device (the MAC address is also part of the hash), it is still not secret. First, if the NAS device is in the local LAN, you can query the MAC address through ARP request. Second, the default host name is nas-xx-yy-zz (which can be displayed on the https-based interface), and xx, yy, zz It is the last 3 octal digits of the MAC address; finally, the version of the software can be determined by brute force guessing. Successfully exploiting this issue allows remote attackers to gain superuser-level access to affected devices. This issue affects devices with firmware versions 3.01c1-p1 and 3.01c1-p6 installed; other versions may also be affected. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Infrant ReadyNAS Devices SSH Default Root Password Weakness SECUNIA ADVISORY ID: SA26442 VERIFY ADVISORY: http://secunia.com/advisories/26442/ CRITICAL: Not critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Infrant ReadyNAS Devices 3.x http://secunia.com/product/15287/ DESCRIPTION: Brian Chapados and Felix Domke have reported a weakness in Infrant ReadyNAS devices, which can be exploited by malicious people to bypass certain security restrictions. The problem is that the device includes an SSH daemon that cannot be disabled and that the password for the SSH root account on the device is generated using certain device-specific values (e.g. MAC address, serial number, version number) and cannot be changed permanently. The weakness is reported in ReadyNAS devices with RAIDiator 3.01c1-p1, 3.01c1-p6. SOLUTION: The vendor has provided the ToggleSSH add-on to disable/enable SSH on the device and has released RAIDiator 4.00b2-p2-T1 beta version, which has SSH disabled by default. http://www.infrant.com/download/addons/ToggleSSH_1.0.bin http://www.infrant.com/beta/raidiator/4.0/RAIDiator-4.00b2-p2-T1 PROVIDED AND/OR DISCOVERED BY: Brian Chapados and Felix Domke ORIGINAL ADVISORY: Infrant Technologies: http://www.infrant.com/forum/viewtopic.php?t=12313 http://www.infrant.com/forum/viewtopic.php?t=12249 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-200709-0354 CVE-2007-4720 JP1/Cm2/Network Node Manager Arbitrary Code Execution Vulnerability CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Unspecified vulnerability in the Shared Trace Service in Hitachi JP1/Cm2/Network Node Manager (NNM) 07-10 through 07-10-05, and NNM Starter Edition Enterprise and 250 08-00 through 08-10, allows remote attackers to execute arbitrary code via unspecified vectors. Hitachi JP1/CM2/Network Node Manager is prone to a code-execution vulnerability. Hitachi JP1/CM2/Network Node Manager 07-10 through 07-10-5, 08-00 through 08-00-03, and 08-10 are vulnerable. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: HP OpenView Products Shared Trace Service Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA26394 VERIFY ADVISORY: http://secunia.com/advisories/26394/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From local network SOFTWARE: HP OpenView Performance Insight (OVPI) 5.x http://secunia.com/product/15212/ HP OpenView Dashboard 2.x http://secunia.com/product/15211/ HP OpenView Business Process Insight (OVBPI) 1.x http://secunia.com/product/15202/ HP OpenView Business Process Insight (OVBPI) 2.x http://secunia.com/product/15203/ HP OpenView Service Desk Process Insight (SDPI) 1.x http://secunia.com/product/15204/ HP OpenView Service Desk Process Insight (SDPI) 2.x http://secunia.com/product/15205/ HP Business Process Insight (HPBPI) 1.x http://secunia.com/product/15207/ HP Business Process Insight (HPBPI) 2.x http://secunia.com/product/15208/ HP Service Desk Process Insight (HPSDPI) 1.x http://secunia.com/product/15209/ HP Service Desk Process Insight (HPSDPI) 2.x http://secunia.com/product/15210/ HP OpenView Network Node Manager (NNM) 6.x http://secunia.com/product/2384/ HP OpenView Network Node Manager (NNM) 7.x http://secunia.com/product/3608/ HP OpenView Service Quality Manager (OV SQM) 1.x http://secunia.com/product/15200/ HP OpenView Operations Manager for Windows (OVOW) 7.x http://secunia.com/product/15199/ HP OpenView Operations HTTPS Agent 8.x http://secunia.com/product/8641/ HP OpenView Reporter 3.x http://secunia.com/product/15198/ HP OpenView Performance Agent http://secunia.com/product/2100/ HP OpenView Performance Manager (OVPM) 5.x http://secunia.com/product/15196/ HP OpenView Performance Manager (OVPM) 6.x http://secunia.com/product/15197/ HP OpenView Internet Service (OVIS) 6.x http://secunia.com/product/15195/ DESCRIPTION: Some vulnerabilities have been reported in HP OpenView products, which can be exploited by malicious people to compromise a vulnerable system. The vulnerabilities are caused due to boundary errors within the Shared Trace Service component when handling certain requests. These can be exploited to cause stack-based buffer overflows via sending specially crafted requests to the service. The vulnerabilities affect the following products and versions: * HP OpenView Internet Service (OVIS) v6.00, v6.10, v6.11 (Japanese), v6.20 running HP OpenView Cross Platform Component (XPL) vB.60.81.00, vB.60.90.00, and vB.61.90.000 * HP OpenView Performance Manager (OVPM) 5.x and 6.x * HP OpenView Performance Agent (OVPA) 4.5 and 4.6 * HP OpenView Reporter 3.7 * HP OpenView Operations (OVO) Agents OVO8.x HTTPS agents * HP OpenView Operations Manager for Windows (OVOW) v7.5 with the OpenView Operations (OVO) add on module for OpenView Operations-Business Availability Center (OVO-BAC) * HP OpenView Quality Manager (OV SQM) v1.2 SP1, v1.3, v1.40 running HP OpenView Cross Platform Component (XPL) 2.60.041, 2.61.060 and 2.61.110 * HP OpenView Network Node Manager (OV NNM) v6.41, v7.01, v7.50 running XPL earlier than 03.10.040 * HP OpenView Business Process Insight (OVBPI), HP Business Process Insight (HPBPI) , HP OpenView Service Desk Process Insight (SDPI), and HP Service Desk Process Insight (HPSDPI) versions 1.0, 1.1x, 2.0x and 2.10x * HP OpenView Dashboard v2.01 running HP OpenView Cross Platform Component (XPL) vB.60.90.00 and vB.61.90.000 * HP OpenView Performance Insight (OVPI) v5.0, v5.1, v5.1.1, v5.1.2, v5.2 running HP OpenView Cross Platform Component (XPL) earlier than v3.10.040 SOLUTION: Apply hotfixes. Please see the vendor's advisories for details. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Cody Pierce, TippingPoint DV Labs. 2) An anonymous researcher, reported via iDefense Labs. ORIGINAL ADVISORY: HPSBMA02235 SSRT061260: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01106515 HPSBMA02236 SSRT061260: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01109171 HPSBMA02237 SSRT061260: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01109584 HPSBMA02238 SSRT061260: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01109617 HPSBMA02239 SSRT061260: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01110576 HPSBMA02240 SSRT061260: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01110627 HPSBMA02241 SSRT061260: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01111851 HPSBMA02242 SSRT061260: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01112038 HPSBMA02244 SSRT061260: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01114023 HPSBMA02245 SSRT061260: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01114156 HPSBMA02246 SSRT061260: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01115068 iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=574 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . No further information is currently available. Please see the vendor's advisory for a list of affected products and versions
VAR-200708-0019 CVE-2007-4317 Zyxel Zywall 2 Run on device ZyNOS Management interface cross-site request forgery vulnerability

Related entries in the VARIoT exploits database: VAR-E-200708-0103
CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Multiple cross-site request forgery (CSRF) vulnerabilities in the management interface in ZyNOS firmware 3.62(WK.6) on the Zyxel Zywall 2 device allow remote attackers to perform certain actions as administrators, as demonstrated by a request to Forms/General_1 with the (1) sysSystemName and (2) sysDomainName parameters. ZyXEL ZyWALL 2 is prone to multiple remote vulnerabilities that affect the management interface. An attacker can exploit these issues to carry out cross-site request forgery, HTML-injection, and denial-of-service attacks. ZyWALL 2 running with firmware V3.62(WK.6) is reported vulnerable to this issue. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: ZyXEL ZyWALL / ZyNOS Cross-Site Request Forgery SECUNIA ADVISORY ID: SA26381 VERIFY ADVISORY: http://secunia.com/advisories/26381/ CRITICAL: Less critical IMPACT: Cross Site Scripting WHERE: >From remote OPERATING SYSTEM: ZyXEL ZyWALL Series http://secunia.com/product/147/ ZyXEL ZyNOS 3.x http://secunia.com/product/149/ DESCRIPTION: Henri Lindberg has reported a vulnerability in ZyXEL ZyWALL / ZyNOS, which can be exploited by malicious people to conduct cross-site request forgery attacks. NOTE: Reportedly, this can further be exploited to conduct script insertion attacks. Other versions may also be affected. SOLUTION: Do not browser untrusted sites while being logged in to the administrative section of the device. PROVIDED AND/OR DISCOVERED BY: Henri Lindberg of Louhi Networks. ORIGINAL ADVISORY: http://www.louhi.fi/advisory/zyxel_070810.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
VAR-200708-0021 CVE-2007-4319 Zyxel Zywall 2 Run on device ZyNOS Service disruption in the management interface (DoS) Vulnerabilities

Related entries in the VARIoT exploits database: VAR-E-200708-0103
CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
The management interface in ZyNOS firmware 3.62(WK.6) on the Zyxel Zywall 2 device allows remote authenticated administrators to cause a denial of service (infinite reboot loop) via invalid configuration data. NOTE: this issue might not cross privilege boundaries, and it might be resultant from CSRF; if so, then it should not be included in CVE. ZyXEL ZyWALL 2 is prone to multiple remote vulnerabilities that affect the management interface. An attacker can exploit these issues to carry out cross-site request forgery, HTML-injection, and denial-of-service attacks. ZyWALL 2 running with firmware V3.62(WK.6) is reported vulnerable to this issue