VARIoT IoT vulnerabilities database
| VAR-200708-0097 | CVE-2007-4216 | Check Point Zone Labs ZoneAlarm of vsdatant.sys Vulnerability gained in |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
vsdatant.sys 6.5.737.0 in Check Point Zone Labs ZoneAlarm before 7.0.362 allows local users to gain privileges via a crafted Interrupt Request Packet (Irp) in a METHOD_NEITHER (1) IOCTL 0x8400000F or (2) IOCTL 0x84000013 request, which can be used to overwrite arbitrary memory locations. Multiple Check Point ZoneAlarm products are prone to local privilege-escalation vulnerabilities.
An attacker can exploit these issues to gain elevated privileges and completely compromise an affected computer.
These issues have been confirmed in:
ZoneAlarm 6.5.737
ZoneAlarm Security Suite 5.5.062.004 and 6.5.737.
Other versions are likely vulnerable as well.
NOTE: This BID is being retired because it is a duplicate of BID 25365 (Check Point Zone Labs Multiple Products Local Privilege Escalation Vulnerabilities).
The following are vulnerable:
- Versions prior to ZoneAlarm 7.0.362
- Zone Labs products that include 'vsdatant.sys' 6.5.737.0. ZoneAlarm is a personal computer firewall that protects personal data and privacy. There are multiple security vulnerabilities in the implementation and installation of ZoneAlarm, local attackers may use this vulnerability to elevate their own privileges. Since some programs run as system services, attackers can replace the installed ZoneAlarm files with their own code, which will then be executed with system-level privileges.
----------------------------------------------------------------------
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and
categorises it as either Insecure, End-of-Life, or Up-To-Date.
Effectively enabling you to focus your attention on software
installations where more secure versions are available from the
vendors.
Download the free PSI BETA from the Secunia website:
https://psi.secunia.com/
----------------------------------------------------------------------
TITLE:
ZoneAlarm Products Insecure Directory Permissions and IOCTL Handler
Privilege Escalation
SECUNIA ADVISORY ID:
SA26513
VERIFY ADVISORY:
http://secunia.com/advisories/26513/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
ZoneAlarm 6.x
http://secunia.com/product/5806/
ZoneAlarm 7.x
http://secunia.com/product/13889/
ZoneAlarm 5.x
http://secunia.com/product/4647/
ZoneAlarm Pro 5.x
http://secunia.com/product/4280/
ZoneAlarm Pro 6.x
http://secunia.com/product/6071/
ZoneAlarm Security Suite 5.x
http://secunia.com/product/4272/
ZoneAlarm 2.x
http://secunia.com/product/3056/
ZoneAlarm 3.x
http://secunia.com/product/153/
ZoneAlarm 4.x
http://secunia.com/product/150/
ZoneAlarm Anti-Spyware 6.x
http://secunia.com/product/6073/
ZoneAlarm Antivirus 5.x
http://secunia.com/product/4271/
ZoneAlarm Antivirus 6.x
http://secunia.com/product/6074/
ZoneAlarm Internet Security Suite 6.x
http://secunia.com/product/6072/
ZoneAlarm Plus 3.x
http://secunia.com/product/3057/
ZoneAlarm Plus 4.x
http://secunia.com/product/151/
ZoneAlarm Pro 2.x
http://secunia.com/product/152/
ZoneAlarm Pro 3.x
http://secunia.com/product/1960/
ZoneAlarm Pro 4.x
http://secunia.com/product/1961/
ZoneAlarm Wireless Security 5.x
http://secunia.com/product/4648/
DESCRIPTION:
Some vulnerabilities and a security issue have been reported in
ZoneAlarm products, which can be exploited by malicious, local users
to gain escalated privileges.
1) Insufficient address space verification within the 0x8400000F and
0x84000013 IOCTL handlers of vsdatant.sys and insecure permissions on
the "\\.\vsdatant" device interface can be exploited to e.g. access
the said IOCTL handlers and overwrite arbitrary memory and execute
code with kernel privileges.
2) Insecure default Access Control List (ACL) settings when ZoneAlarm
tools are installed can be exploited to gain escalated privileges by
replacing certain files.
SOLUTION:
Update to version 7.0.362.
2) Discovered by an anonymous person and reported via iDefense Labs.
ORIGINAL ADVISORY:
iDefense Labs:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=584
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=585
Reversemode:
http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=53
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. BACKGROUND
Zone Alarm products provide security solutions such as anti-virus,
firewall, spy-ware, and ad-ware protection. The vsdatant.sys driver,
also known as the TrueVector Device Driver, is the core firewall driver
in ZoneAlarm products.
http://www.zonelabs.com/
II.
The problems specifically exist within the IOCTL handling code in the
vsdatant.sys device driver. The device driver fails to validate
user-land supplied addresses passed to IOCTL 0x8400000F and IOCTL
0x84000013.
Since the Irp parameters are not correctly validated, an attacker could
utilize these IOCTLs to overwrite arbitrary memory with the constant
double-word value of 0x60001 or the contents of a buffer returned from
ZwQuerySystemInformation. This includes kernel memory as well as the
code segments of running processes.
III. The access control mechanisms under a default installation
allow restricted accounts to access the affected device drivers.
IV.
V. WORKAROUND
Changing the access control mechanisms for the affected device drivers
will prevent exploitation by restricted accounts.
VI.
http://www.zonealarm.com/store/content/catalog/products/trial_zaFamily/trial_zaFamily.jsp
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2007-4216 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.
VIII. DISCLOSURE TIMELINE
12/19/2006 Initial vendor notification
12/20/2006 Initial vendor response
08/20/2007 Coordinated public disclosure
IX. CREDIT
These vulnerabilities were reported to iDefense by Ruben Santamarta of
reversemode.com.
Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php
Free tools, research and upcoming events
http://labs.idefense.com/
X. LEGAL NOTICES
Copyright \xa9 2007 iDefense, Inc.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically,
please e-mail customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information
| VAR-200704-0313 | CVE-2007-2174 | Check Point ZoneAlarm of ZoneAlarm SRE Vulnerable to arbitrary file execution |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The IOCTL handling in srescan.sys in the ZoneAlarm Spyware Removal Engine (SRE) in Check Point ZoneAlarm before 5.0.156.0 allows local users to execute arbitrary code via certain IOCTL lrp parameter addresses. Check Point ZoneAlarm is prone to multiple local privilege-escalation vulnerabilities.
On a default installation, only certain restricted accounts can access the vulnerable sections of the application.
An attacker can exploit these issues to execute arbitrary code with SYSTEM-level privileges. A successful exploit will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition. ZoneAlarm is a personal computer firewall that protects personal data and privacy. There is a vulnerability in ZoneAlarm's srescan.sys driver implementation. Local attackers may use this vulnerability to elevate their privileges in the system. The IOCTL handling code of the srescan.sys device driver does not correctly handle userland addresses passed to IOCTL 0x22208F and IOCTL 0x2220CF. In the case of IOCTL 0x2220CF, the attacker can write the constant double word value 0x30000; in the case of IOCTL 0x22208F, the attacker can write the contents of the ZwQuerySystemInformation return buffer.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
ZoneAlarm Products SRESCAN.SYS IOCTL Handler Privilege Escalation
SECUNIA ADVISORY ID:
SA24986
VERIFY ADVISORY:
http://secunia.com/advisories/24986/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
ZoneAlarm 4.x
http://secunia.com/product/150/
ZoneAlarm 3.x
http://secunia.com/product/153/
ZoneAlarm 2.x
http://secunia.com/product/3056/
ZoneAlarm 5.x
http://secunia.com/product/4647/
ZoneAlarm 6.x
http://secunia.com/product/5806/
ZoneAlarm 7.x
http://secunia.com/product/13889/
ZoneAlarm Anti-Spyware 6.x
http://secunia.com/product/6073/
ZoneAlarm Antivirus 5.x
http://secunia.com/product/4271/
ZoneAlarm Antivirus 6.x
http://secunia.com/product/6074/
ZoneAlarm Internet Security Suite 6.x
http://secunia.com/product/6072/
ZoneAlarm Plus 3.x
http://secunia.com/product/3057/
ZoneAlarm Plus 4.x
http://secunia.com/product/151/
ZoneAlarm Pro 2.x
http://secunia.com/product/152/
ZoneAlarm Pro 3.x
http://secunia.com/product/1960/
ZoneAlarm Pro 4.x
http://secunia.com/product/1961/
ZoneAlarm Pro 5.x
http://secunia.com/product/4280/
ZoneAlarm Pro 6.x
http://secunia.com/product/6071/
ZoneAlarm Security Suite 5.x
http://secunia.com/product/4272/
ZoneAlarm Wireless Security 5.x
http://secunia.com/product/4648/
DESCRIPTION:
Some vulnerabilities have been reported in ZomeAlarm products, which
can be exploited by malicious, local users to gain escalated
privileges.
Insufficient address space verification within the 0x22208F and
0x0x2220CF IOCTL handlers of SRESCAN.SYS and insecure permissions on
the \\.\SreScan DOS device interface can be exploited to e.g.
The vulnerabilities are reported in SRESCAN.SYS version 5.0.63.0
included in the free version of ZoneAlarm. Other versions may also be
affected.
SOLUTION:
Update to version 5.0.156.0 or higher of the ZoneAlarm Spyware
Removal Engine (current deployed version is 5.0.162.0).
http://www.zonealarm.com/store/content/catalog/download_buy.jsp?dc=12bms&ctry=US&lang=en
PROVIDED AND/OR DISCOVERED BY:
Discovered by Ruben Santamarta and reported via iDefense Labs.
ORIGINAL ADVISORY:
iDefense Labs:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=517
Reversemode:
http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=48
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200704-0456 | CVE-2007-2332 | Nortel VPN Router Password acquisition vulnerability |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 6_05.140 uses a fixed DES key to encrypt passwords, which allows remote authenticated users to obtain a password via a brute force attack on a hash from the LDAP store. Nortel VPN routers are prone to multiple remote unauthorized-access vulnerabilities due to design errors.
Successful exploits will allow attackers to access administrative functionality and completely compromise vulnerable devices or gain direct access to the private network.
This issue affects all model numbers for Nortel VPN Routers 1000, 2000, 4000, 5000. Nortel VPN routers were formerly known as Contivity. Nortel VPN routers provide routing, VPN, firewall, bandwidth management, encryption, authentication, and data integrity functions for secure connections over IP networks and the Internet.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
Nortel VPN Router Default User Accounts and Missing Authentication
Checks
SECUNIA ADVISORY ID:
SA24962
VERIFY ADVISORY:
http://secunia.com/advisories/24962/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Manipulation of data
WHERE:
>From remote
OPERATING SYSTEM:
Nortel Contivity VPN Switches
http://secunia.com/product/2425/
Nortel VPN Routers
http://secunia.com/product/2426/
DESCRIPTION:
A vulnerability and a security issue have been reported in Nortel VPN
Routers, which can be exploited by malicious people to bypass certain
security restrictions or manipulate certain data.
1) Two default user accounts ("FIPSecryptedtest1219" and
"FIPSunecryptedtest1219") are configured on the VPN Router, which are
not readily visible to the system manager.
2) Missing authentication checks within two template files of the web
management tool can be exploited to e.g. modify certain router
configurations.
The vulnerability and security issue reportedly affect the following
products:
* Contivity 1000 VPN Switch
* Contivity 2000 VPN Switch
* Contivity 4000 VPN Switch
* VPN Router 5000
*VPN Router Portfolio
SOLUTION:
Update to versions 6_05.140, 5_05.304, or 5_05.149.
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Detack GmbH.
ORIGINAL ADVISORY:
Nortel:
http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=567877&RenditionID=&poid=null
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200704-0314 | CVE-2007-2333 | Nortel VPN Router Is vulnerable to private network access |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 includes the FIPSecryptedtest1219 and FIPSunecryptedtest1219 default accounts in the LDAP template, which might allow remote attackers to access the private network. Nortel VPN routers are prone to multiple remote unauthorized-access vulnerabilities due to design errors.
This issue affects all model numbers for Nortel VPN Routers 1000, 2000, 4000, 5000. Nortel VPN routers were formerly known as Contivity. Nortel VPN routers provide routing, VPN, firewall, bandwidth management, encryption, authentication, and data integrity functions for secure connections over IP networks and the Internet.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
Nortel VPN Router Default User Accounts and Missing Authentication
Checks
SECUNIA ADVISORY ID:
SA24962
VERIFY ADVISORY:
http://secunia.com/advisories/24962/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Manipulation of data
WHERE:
>From remote
OPERATING SYSTEM:
Nortel Contivity VPN Switches
http://secunia.com/product/2425/
Nortel VPN Routers
http://secunia.com/product/2426/
DESCRIPTION:
A vulnerability and a security issue have been reported in Nortel VPN
Routers, which can be exploited by malicious people to bypass certain
security restrictions or manipulate certain data.
1) Two default user accounts ("FIPSecryptedtest1219" and
"FIPSunecryptedtest1219") are configured on the VPN Router, which are
not readily visible to the system manager.
2) Missing authentication checks within two template files of the web
management tool can be exploited to e.g. modify certain router
configurations.
An issue regarding same DES keys used to encrypt user's passwords has
also been reported, which can facilitate brute-force attacks on user's
passwords if the attacker were to gain access to the LDAP store.
The vulnerability and security issue reportedly affect the following
products:
* Contivity 1000 VPN Switch
* Contivity 2000 VPN Switch
* Contivity 4000 VPN Switch
* VPN Router 5000
*VPN Router Portfolio
SOLUTION:
Update to versions 6_05.140, 5_05.304, or 5_05.149.
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Detack GmbH.
ORIGINAL ADVISORY:
Nortel:
http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=567877&RenditionID=&poid=null
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200704-0315 | CVE-2007-2334 | Nortel VPN Router Vulnerabilities that allow access to the management interface |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 5_05.149, 5_05.3xx before 5_05.304, and 6.x before 6_05.140 has two template HTML files lacking certain verification tags, which allows remote attackers to access the administration interface and change the device configuration via certain requests. Nortel VPN routers are prone to multiple remote unauthorized-access vulnerabilities due to design errors.
Successful exploits will allow attackers to access administrative functionality and completely compromise vulnerable devices or gain direct access to the private network.
This issue affects all model numbers for Nortel VPN Routers 1000, 2000, 4000, 5000. Nortel VPN routers were formerly known as Contivity. Nortel VPN routers provide routing, VPN, firewall, bandwidth management, encryption, authentication, and data integrity functions for secure connections over IP networks and the Internet.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
Nortel VPN Router Default User Accounts and Missing Authentication
Checks
SECUNIA ADVISORY ID:
SA24962
VERIFY ADVISORY:
http://secunia.com/advisories/24962/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Manipulation of data
WHERE:
>From remote
OPERATING SYSTEM:
Nortel Contivity VPN Switches
http://secunia.com/product/2425/
Nortel VPN Routers
http://secunia.com/product/2426/
DESCRIPTION:
A vulnerability and a security issue have been reported in Nortel VPN
Routers, which can be exploited by malicious people to bypass certain
security restrictions or manipulate certain data.
1) Two default user accounts ("FIPSecryptedtest1219" and
"FIPSunecryptedtest1219") are configured on the VPN Router, which are
not readily visible to the system manager.
2) Missing authentication checks within two template files of the web
management tool can be exploited to e.g. modify certain router
configurations.
An issue regarding same DES keys used to encrypt user's passwords has
also been reported, which can facilitate brute-force attacks on user's
passwords if the attacker were to gain access to the LDAP store.
The vulnerability and security issue reportedly affect the following
products:
* Contivity 1000 VPN Switch
* Contivity 2000 VPN Switch
* Contivity 4000 VPN Switch
* VPN Router 5000
*VPN Router Portfolio
SOLUTION:
Update to versions 6_05.140, 5_05.304, or 5_05.149.
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Detack GmbH.
ORIGINAL ADVISORY:
Nortel:
http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=567877&RenditionID=&poid=null
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200705-0404 | CVE-2007-2680 | Canon Network Camera Server VB100 Series vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the management interface in Canon Network Camera Server VB100 and VB101 with firmware 3.0 R69 and earlier, and VB150 with firmware 1.1 R39 and earlier, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Exploiting this issue may help the attacker steal cookie-based authentication credentials and launch other attacks.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
Input passed to certain parameters is not properly sanitised before
being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site.
SOLUTION:
Update to the latest firmware versions.
VB100 V3.0 R71:
http://cweb.canon.jp/drv-upd/webview/vb100farm.html
VB101 V3.0 R71:
http://cweb.canon.jp/drv-upd/webview/vb101farm.html
VB150 V1.1 R41:
http://cweb.canon.jp/drv-upd/webview/vb150farm.html
PROVIDED AND/OR DISCOVERED BY:
Reported in a JVN repository.
ORIGINAL ADVISORY:
Canon:
http://cweb.canon.jp/drv-upd/webview/notification.html
OTHER REFERENCES:
JVN#06735665:
http://jvn.jp/jp/JVN%2306735665/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200704-0020 | CVE-2007-2036 |
Cisco WLC of SNMP In the implementation SNMP Variable change vulnerability
Related entries in the VARIoT exploits database: VAR-E-200704-0339 |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The SNMP implementation in the Cisco Wireless LAN Controller (WLC) before 20070419 uses the default read-only community public, and the default read-write community private, which allows remote attackers to read and modify SNMP variables, aka Bug ID CSCse02384. Cisco Wireless LAN Controller (WLC) is prone to multiple remote vulnerabilities, including an unauthorized-access vulnerability, an information-disclosure vulnerability, and a vulnerability that prevents the WLAN's ACLs from being installed.
An attacker can exploit these issues to completely compromise the affected device, cause a denial-of-service condition, obtain potentially sensitive information, and gain unauthorized access to the affected device. Cisco Wireless LAN Controllers (WLCs) manage Cisco Aironet access points using the Lightweight Access Point Protocol (LWAPP). This vulnerability is documented in Cisco Bug ID as CSCse02384
| VAR-200704-0021 | CVE-2007-2037 |
Cisco WLC Service disruption in (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200704-0339 |
CVSS V2: 2.9 CVSS V3: - Severity: LOW |
Cisco Wireless LAN Controller (WLC) before 3.2.116.21, and 4.0.x before 4.0.155.0, allows remote attackers on a local network to cause a denial of service (device crash) via malformed Ethernet traffic.
An attacker can exploit these issues to completely compromise the affected device, cause a denial-of-service condition, obtain potentially sensitive information, and gain unauthorized access to the affected device. Cisco Wireless LAN Controllers (WLCs) manage Cisco Aironet access points using the Lightweight Access Point Protocol (LWAPP). There are multiple security holes in the implementation of WLC: The default SNMP community string +----------------------------- WLC reads it only The public and private values are used for reading and writing SNMP community strings. This vulnerability is documented in Cisco Bug ID as CSCse02384. Malformed Ethernet communication crash +----------------------------- WLC may crash when responding to malformed Ethernet communication. This vulnerability is documented in Cisco Bug ID as CSCsc90179. Multiple NPU Lock-Up Vulnerabilities +----------------------------- The Network Processing Unit (NPU) is responsible for handling communication in the WLC. One or more NPUs may lock up if certain types of traffic are sent to the affected WLC. These communications include specially crafted SNAP messages, malformed 802. 11 Communication and some headers contain messages with unexpected length values. Each NPU operates independently, servicing two physical ports on the WLC, and locking one NPU does not affect the other, so the number of NPUs available and device configuration determine whether these vulnerabilities can result in partial or complete inability to forward traffic. If you want to clear the NPU lock, you must restart the WLC. If a lockout prevents access to the management interface, a reboot must be performed through the console port or the service port. These vulnerabilities are documented in Cisco Bug IDs as CSCsg36361, CSCsg15901, and CSCsh10841. Service password hardcoded in lightweight AP + -------------------------- Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points include There is a hardcoded service password for debugging. This service account is only accessible through a physical connection to the console port, but the password is the same for all devices in these families. This vulnerability is documented in Cisco Bug ID as CSCsg15192. WLAN ACL becomes invalid after restarting +-------------------------- WLC has a loophole in processing WLAN ACL, resulting in an invalid verification and save the WLAN ACL configuration. If the configuration is later reloaded at boot time, the checksum will be invalidated and the WLAN ACL will not be installed. This vulnerability is documented in Cisco Bug ID as CSCse58195
| VAR-200704-0022 | CVE-2007-2038 |
Cisco WLC of NPU Service disruption in (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-200704-0339 |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.193.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1) crafted SNAP packets, (2) malformed 802.11 traffic, or (3) packets with certain header length values, aka Bug ID CSCsg36361. Cisco Wireless LAN Controller (WLC) is prone to multiple remote vulnerabilities, including an unauthorized-access vulnerability, an information-disclosure vulnerability, and a vulnerability that prevents the WLAN's ACLs from being installed.
An attacker can exploit these issues to completely compromise the affected device, cause a denial-of-service condition, obtain potentially sensitive information, and gain unauthorized access to the affected device. Cisco Wireless LAN Controllers (WLCs) manage Cisco Aironet access points using the Lightweight Access Point Protocol (LWAPP). Multiple NPU Lock-Up Vulnerabilities +----------------------------- The Network Processing Unit (NPU) is responsible for handling communication in the WLC. One or more NPUs may lock up if certain types of traffic are sent to the affected WLC. These communications include specially crafted SNAP packets, malformed 802.11 communications, and packets with unexpected length values in some headers. Each NPU operates independently, servicing two physical ports on the WLC, and locking one NPU does not affect the other, so the number of NPUs available and device configuration determine whether these vulnerabilities can result in partial or complete inability to forward traffic. If you want to clear the NPU lock, you must restart the WLC. If a lockout prevents access to the management interface, a reboot must be performed through the console port or the service port. These vulnerabilities are documented in Cisco Bug IDs as CSCsg36361, CSCsg15901, and CSCsh10841
| VAR-200704-0023 | CVE-2007-2039 |
Cisco WLC of NPU Denial of service in Japan (DoS) Vulnerability
Related entries in the VARIoT exploits database: VAR-E-200704-0339 |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.171.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1) crafted SNAP packets, (2) malformed 802.11 traffic, or (3) packets with certain header length values, aka Bug IDs CSCsg15901 and CSCsh10841. Cisco Wireless LAN Controller (WLC) is prone to multiple remote vulnerabilities, including an unauthorized-access vulnerability, an information-disclosure vulnerability, and a vulnerability that prevents the WLAN's ACLs from being installed.
An attacker can exploit these issues to completely compromise the affected device, cause a denial-of-service condition, obtain potentially sensitive information, and gain unauthorized access to the affected device. Cisco Wireless LAN Controllers (WLCs) manage Cisco Aironet access points using the Lightweight Access Point Protocol (LWAPP). Multiple NPU Lock-Up Vulnerabilities +----------------------------- The Network Processing Unit (NPU) is responsible for handling communication in the WLC. One or more NPUs may lock up if certain types of traffic are sent to the affected WLC. These communications include specially crafted SNAP packets, malformed 802.11 communications, and packets with unexpected length values in some headers. Each NPU operates independently, servicing two physical ports on the WLC, and locking one NPU does not affect the other, so the number of NPUs available and device configuration determine whether these vulnerabilities can result in partial or complete inability to forward traffic. If you want to clear the NPU lock, you must restart the WLC. If a lockout prevents access to the management interface, a reboot must be performed through the console port or the service port. These vulnerabilities are documented in Cisco Bug IDs as CSCsg36361, CSCsg15901, and CSCsh10841
| VAR-200704-0024 | CVE-2007-2040 |
Cisco Aironet Vulnerable to arbitrary operations on devices
Related entries in the VARIoT exploits database: VAR-E-200704-0339 |
CVSS V2: 6.2 CVSS V3: - Severity: MEDIUM |
Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192. Cisco Wireless LAN Controller (WLC) is prone to multiple remote vulnerabilities, including an unauthorized-access vulnerability, an information-disclosure vulnerability, and a vulnerability that prevents the WLAN's ACLs from being installed.
An attacker can exploit these issues to completely compromise the affected device, cause a denial-of-service condition, obtain potentially sensitive information, and gain unauthorized access to the affected device. Cisco Wireless LAN Controllers (WLCs) manage Cisco Aironet access points using the Lightweight Access Point Protocol (LWAPP). This service account is only accessible through a physical connection to the console port, but the password is the same for all devices in these families. This vulnerability is documented in Cisco Bug ID as CSCsg15192
| VAR-200704-0025 | CVE-2007-2041 |
Cisco WLC Vulnerable to access restrictions
Related entries in the VARIoT exploits database: VAR-E-200704-0339 |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
Cisco Wireless LAN Controller (WLC) before 4.0.206.0 saves the WLAN ACL configuration with an invalid checksum, which prevents WLAN ACLs from being loaded at boot time, and might allow remote attackers to bypass intended access restrictions, aka Bug ID CSCse58195. Cisco Wireless LAN Controller (WLC) is prone to multiple remote vulnerabilities, including an unauthorized-access vulnerability, an information-disclosure vulnerability, and a vulnerability that prevents the WLAN's ACLs from being installed.
An attacker can exploit these issues to completely compromise the affected device, cause a denial-of-service condition, obtain potentially sensitive information, and gain unauthorized access to the affected device. Cisco Wireless LAN Controllers (WLCs) manage Cisco Aironet access points using the Lightweight Access Point Protocol (LWAPP). WLAN ACL becomes invalid after restarting +-------------------------- WLC has a loophole in processing WLAN ACL, resulting in an invalid verification and save the WLAN ACL configuration. This vulnerability is documented in Cisco Bug ID as CSCse58195
| VAR-200704-0016 | CVE-2007-2032 | Cisco WCS Vulnerable to arbitrary file modification |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Cisco Wireless Control System (WCS) before 4.0.96.0 has a hard-coded FTP username and password for backup operations, which allows remote attackers to read and modify arbitrary files via unspecified vectors related to "properties of the FTP server," aka Bug ID CSCse93014. Cisco Wireless Control System is prone to multiple vulnerabilities, including an unauthorized-access issue, a privilege-escalation issue, and an information-disclosure issue.
An attacker can exploit these issues to obtain sensitive information, gain unauthorized access, and elevate privileges, which will compromise affected devices and aid in further attacks.
Versions prior to 4.0.96.0 are vulnerable.
These issues are being tracked by Cisco Bug IDs:
CSCse93014
CSCse78596
CSCsg05190
CSCsg04301. Cisco Wireless Control System (WCS) provides wireless LAN planning and design, system configuration, location tracking, security monitoring and wireless LAN management tools. In some cases, this can lead to changing system files and hacking the server.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
Cisco Wireless Control System Vulnerability and Security Issues
SECUNIA ADVISORY ID:
SA24865
VERIFY ADVISORY:
http://secunia.com/advisories/24865/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Exposure of system information, Exposure of
sensitive information, Privilege escalation, System access
WHERE:
>From remote
SOFTWARE:
Cisco Wireless Control System (WCS)
http://secunia.com/product/6332/
DESCRIPTION:
A vulnerability and two security issues have been reported in Cisco
Wireless Control System (WCS), which can be exploited by malicious
users to gain escalated privileges, and by malicious people to
disclose sensitive information, bypass certain security restrictions,
or potentially compromise a vulnerable system.
1) WCS includes a fixed username and password for backup operations
via FTP. This can be exploited to read from and write to arbitrary
files on affected systems.
Successful exploitation potentially allows the server to be
compromised, but requires knowledge of other properties of the FTP
server.
The security issue has been reported in WCS prior to version
4.0.96.0.
2) An unspecified error exists in the authentication system, which
can be exploited by an authenticated user to change his account group
membership.
Successful exploitation can allow full administrative control of WCS,
but requires a valid username and password.
The vulnerability is reported in WCS prior to version 4.0.87.0.
3) Certain directories in WCS are not password protected. This can be
exploited to disclose certain system information, e.g. organization of
the network including access point locations.
The security issue is reported in WCS prior to version 4.0.66.0.
SOLUTION:
Update to version 4.0.96.0 or later.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070412-wcs.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200704-0019 | CVE-2007-2035 | Cisco WCS Vulnerability in obtaining network configuration data |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco Wireless Control System (WCS) before 4.0.66.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain network organization data via a direct request for files in certain directories, aka Bug ID CSCsg04301. Cisco Wireless Control System is prone to multiple vulnerabilities, including an unauthorized-access issue, a privilege-escalation issue, and an information-disclosure issue.
An attacker can exploit these issues to obtain sensitive information, gain unauthorized access, and elevate privileges, which will compromise affected devices and aid in further attacks.
Versions prior to 4.0.96.0 are vulnerable.
These issues are being tracked by Cisco Bug IDs:
CSCse93014
CSCse78596
CSCsg05190
CSCsg04301. Cisco Wireless Control System (WCS) provides wireless LAN planning and design, system configuration, location tracking, security monitoring and wireless LAN management tools.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
1) WCS includes a fixed username and password for backup operations
via FTP. This can be exploited to read from and write to arbitrary
files on affected systems.
Successful exploitation potentially allows the server to be
compromised, but requires knowledge of other properties of the FTP
server.
The security issue has been reported in WCS prior to version
4.0.96.0.
2) An unspecified error exists in the authentication system, which
can be exploited by an authenticated user to change his account group
membership.
Successful exploitation can allow full administrative control of WCS,
but requires a valid username and password.
The vulnerability is reported in WCS prior to version 4.0.87.0.
3) Certain directories in WCS are not password protected. This can be
exploited to disclose certain system information, e.g. organization of
the network including access point locations.
The security issue is reported in WCS prior to version 4.0.66.0.
SOLUTION:
Update to version 4.0.96.0 or later.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070412-wcs.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200704-0018 | CVE-2007-2034 | Cisco WCS Vulnerabilities in managing applications and networks |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in Cisco Wireless Control System (WCS) before 4.0.87.0 allows remote authenticated users to gain the privileges of the SuperUsers group, and manage the application and its networks, related to the group membership of user accounts, aka Bug ID CSCsg05190. Cisco Wireless Control System is prone to multiple vulnerabilities, including an unauthorized-access issue, a privilege-escalation issue, and an information-disclosure issue.
An attacker can exploit these issues to obtain sensitive information, gain unauthorized access, and elevate privileges, which will compromise affected devices and aid in further attacks.
Versions prior to 4.0.96.0 are vulnerable.
These issues are being tracked by Cisco Bug IDs:
CSCse93014
CSCse78596
CSCsg05190
CSCsg04301. Cisco Wireless Control System (WCS) provides wireless LAN planning and design, system configuration, location tracking, security monitoring and wireless LAN management tools. For example, a user in the LobbyAmbassador group can be added to the SuperUsers group.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
Cisco Wireless Control System Vulnerability and Security Issues
SECUNIA ADVISORY ID:
SA24865
VERIFY ADVISORY:
http://secunia.com/advisories/24865/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Exposure of system information, Exposure of
sensitive information, Privilege escalation, System access
WHERE:
>From remote
SOFTWARE:
Cisco Wireless Control System (WCS)
http://secunia.com/product/6332/
DESCRIPTION:
A vulnerability and two security issues have been reported in Cisco
Wireless Control System (WCS), which can be exploited by malicious
users to gain escalated privileges, and by malicious people to
disclose sensitive information, bypass certain security restrictions,
or potentially compromise a vulnerable system.
1) WCS includes a fixed username and password for backup operations
via FTP. This can be exploited to read from and write to arbitrary
files on affected systems.
Successful exploitation potentially allows the server to be
compromised, but requires knowledge of other properties of the FTP
server.
The security issue has been reported in WCS prior to version
4.0.96.0.
2) An unspecified error exists in the authentication system, which
can be exploited by an authenticated user to change his account group
membership.
Successful exploitation can allow full administrative control of WCS,
but requires a valid username and password.
The vulnerability is reported in WCS prior to version 4.0.87.0.
3) Certain directories in WCS are not password protected. This can be
exploited to disclose certain system information, e.g. organization of
the network including access point locations.
The security issue is reported in WCS prior to version 4.0.66.0.
SOLUTION:
Update to version 4.0.96.0 or later.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070412-wcs.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200704-0017 | CVE-2007-2033 | Cisco WCS Vulnerability in reading configuration page |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in Cisco Wireless Control System (WCS) before 4.0.81.0 allows remote authenticated users to read any configuration page by changing the group membership of user accounts, aka Bug ID CSCse78596. Cisco Wireless Control System is prone to multiple vulnerabilities, including an unauthorized-access issue, a privilege-escalation issue, and an information-disclosure issue.
An attacker can exploit these issues to obtain sensitive information, gain unauthorized access, and elevate privileges, which will compromise affected devices and aid in further attacks.
Versions prior to 4.0.96.0 are vulnerable.
These issues are being tracked by Cisco Bug IDs:
CSCse93014
CSCse78596
CSCsg05190
CSCsg04301. Cisco Wireless Control System (WCS) provides wireless LAN planning and design, system configuration, location tracking, security monitoring and wireless LAN management tools. For example, a user in the LobbyAmbassador group can be added to the SuperUsers group.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
Cisco Wireless Control System Vulnerability and Security Issues
SECUNIA ADVISORY ID:
SA24865
VERIFY ADVISORY:
http://secunia.com/advisories/24865/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass, Exposure of system information, Exposure of
sensitive information, Privilege escalation, System access
WHERE:
>From remote
SOFTWARE:
Cisco Wireless Control System (WCS)
http://secunia.com/product/6332/
DESCRIPTION:
A vulnerability and two security issues have been reported in Cisco
Wireless Control System (WCS), which can be exploited by malicious
users to gain escalated privileges, and by malicious people to
disclose sensitive information, bypass certain security restrictions,
or potentially compromise a vulnerable system.
1) WCS includes a fixed username and password for backup operations
via FTP. This can be exploited to read from and write to arbitrary
files on affected systems.
Successful exploitation potentially allows the server to be
compromised, but requires knowledge of other properties of the FTP
server.
The security issue has been reported in WCS prior to version
4.0.96.0.
Successful exploitation can allow full administrative control of WCS,
but requires a valid username and password.
The vulnerability is reported in WCS prior to version 4.0.87.0.
3) Certain directories in WCS are not password protected. This can be
exploited to disclose certain system information, e.g. organization of
the network including access point locations.
The security issue is reported in WCS prior to version 4.0.66.0.
SOLUTION:
Update to version 4.0.96.0 or later.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20070412-wcs.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200704-0695 | No CVE | Miniwebsvr Server Directory Traversal Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
Miniwebsvr is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.
Note that the attacker can traverse to only one directory above the current working directory of the webserver application.
Miniwebsvr 0.0.7 is vulnerable to this issue; other versions may also be affected.
UPDATE (March 4, 2008): Miniwebsvr 0.0.9a is also reported vulnerable.
| VAR-200704-0182 | CVE-2007-1995 | Quagga BGPD UPDATE Message Remote Denial Of Service Vulnerability |
CVSS V2: 6.3 CVSS V3: - Severity: MEDIUM |
bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes, which allows remote attackers to cause a denial of service (daemon crash or exit) via crafted UPDATE messages that trigger an assertion error or out of bounds read. (DoS) There is a vulnerability that becomes a condition.Crafted by a third party UPDATE Service disruption by sending a message (DoS) It may be in a state. Quagga is prone to a remote denial-of-service vulnerability because it fails to handle a malformed multi-protocol message.
A remote attacker can exploit this issue by submitting a maliciously crafted message to the application.
Successful exploits will cause the Quagga 'bgpd' daemon to abort, denying further service to legitimate users.
Quagga 0.99.6 and prior versions (0.99 branch) as well as 0.98.6 and prior versions (0.98 branch) are vulnerable. ===========================================================
Ubuntu Security Notice USN-461-1 May 17, 2007
quagga vulnerability
CVE-2007-1995
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
quagga 0.99.2-1ubuntu3.1
Ubuntu 6.10:
quagga 0.99.4-4ubuntu1.1
Ubuntu 7.04:
quagga 0.99.6-2ubuntu3.1
In general, a standard system upgrade is sufficient to effect the
necessary changes.
Details follow:
It was discovered that Quagga did not correctly verify length
information sent from configured peers. Remote malicious peers could
send a specially crafted UPDATE message which would cause bgpd to abort,
leading to a denial of service.
Updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1995
_______________________________________________________________________
Updated Packages:
Corporate 4.0:
becaf6ded7283c9c6021b225cdf4610a corporate/4.0/i586/libquagga0-0.99.3-1.1.20060mlcs4.i586.rpm
71834dab731b65e7a35a9fdd9732a889 corporate/4.0/i586/libquagga0-devel-0.99.3-1.1.20060mlcs4.i586.rpm
cfbeb9e74071ffac712e5162f2613ac9 corporate/4.0/i586/quagga-0.99.3-1.1.20060mlcs4.i586.rpm
7cde7b9c156b90b8dcc960bfc1e32cbe corporate/4.0/i586/quagga-contrib-0.99.3-1.1.20060mlcs4.i586.rpm
725cf792adafc90d58a34178e4066771 corporate/4.0/SRPMS/quagga-0.99.3-1.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
92d1d28d06eb4eaff483882a41a5d31b corporate/4.0/x86_64/lib64quagga0-0.99.3-1.1.20060mlcs4.x86_64.rpm
ccfa5e5665423f19b0c36ff13db53164 corporate/4.0/x86_64/lib64quagga0-devel-0.99.3-1.1.20060mlcs4.x86_64.rpm
a9af90e11e1b9f0485718d4762b1f8fd corporate/4.0/x86_64/quagga-0.99.3-1.1.20060mlcs4.x86_64.rpm
596581e4051d2e02ae2b476e3aa83f74 corporate/4.0/x86_64/quagga-contrib-0.99.3-1.1.20060mlcs4.x86_64.rpm
725cf792adafc90d58a34178e4066771 corporate/4.0/SRPMS/quagga-0.99.3-1.1.20060mlcs4.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFGONI7mqjQ0CJFipgRAhmXAKCr1iOp0SaSv1WdD2EsWJjqR3ZF4ACfZ2FP
56VBScMSKds3eiA29koFg5w=
=IS+w
-----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200705-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Quagga: Denial of Service
Date: May 02, 2007
Bugs: #174206
ID: 200705-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A vulnerability has been discovered in Quagga allowing for a Denial of
Service.
Background
==========
Quagga is a free routing daemon, supporting RIP, OSPF and BGP
protocols.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/quagga < 0.98.6-r2 >= 0.98.6-r2
Description
===========
The Quagga development team reported a vulnerability in the BGP routing
deamon when processing NLRI attributes inside UPDATE messages.
Impact
======
A malicious peer inside a BGP area could send a specially crafted
packet to a Quagga instance, possibly resulting in a crash of the
Quagga daemon.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Quagga users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/quagga-0.98.6-r2"
References
==========
[ 1 ] CVE-2007-1995
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1995
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200705-05.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1293-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
May 17th, 2007 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : quagga
Vulnerability : out of boundary read
Problem type : remote
Debian-specific: no
CVE ID : CVE-2007-1995
BugTraq ID : 23417
Debian Bug : 418323
Paul Jakma discovered that specially crafted UPDATE messages can
trigger an out of boundary read that can result in a system crash of
quagga, the BGP/OSPF/RIP routing daemon.
For the old stable distribution (sarge) this problem has been fixed in
version 0.98.3-7.4.
For the stable distribution (etch) this problem has been fixed in
version 0.99.5-5etch2.
For the unstable distribution (sid) this problem has been fixed in
version 0.99.6-5.
We recommend that you upgrade your quagga package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4.dsc
Size/MD5 checksum: 1017 668014e3d7bde772eac63fc2809538c8
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4.diff.gz
Size/MD5 checksum: 45503 ce79e6a7a23c57551af673936957b520
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3.orig.tar.gz
Size/MD5 checksum: 2118348 68be5e911e4d604c0f5959338263356e
Architecture independent components:
http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.98.3-7.4_all.deb
Size/MD5 checksum: 488726 9176bb6c2d44c83c6b0235fe2d787c24
Alpha architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_alpha.deb
Size/MD5 checksum: 1613754 754e865cef5379625e6ac77fc03a1175
AMD64 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_amd64.deb
Size/MD5 checksum: 1413316 5aa1b7a4d2a9a262d89e6ff050b61140
ARM architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_arm.deb
Size/MD5 checksum: 1290700 071171571b6afb1937cfe6d535a571dc
HP Precision architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_hppa.deb
Size/MD5 checksum: 1447856 c4137c1ad75efb58c080a96aa9c0699e
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_i386.deb
Size/MD5 checksum: 1193528 52640ebe894244e34b98b43150028c01
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_ia64.deb
Size/MD5 checksum: 1829130 27191432085ad6ebff2160874aa06826
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_m68k.deb
Size/MD5 checksum: 1160000 c2f78f24982732c9804de4297c4c2672
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_mips.deb
Size/MD5 checksum: 1353040 6ceb137f2908165b4d1420f56b8be65b
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_mipsel.deb
Size/MD5 checksum: 1355964 a1685523eede48afe70b1861a6b38038
PowerPC architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_powerpc.deb
Size/MD5 checksum: 1317034 2d80694cf741a3ed85617dbf4e7b4776
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_s390.deb
Size/MD5 checksum: 1401630 458f1f892e6ed57677971334589ecc45
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.98.3-7.4_sparc.deb
Size/MD5 checksum: 1287812 e92233bfc759de15910da4241e27ebd1
Debian GNU/Linux 4.0 alias etch
- -------------------------------
Source archives:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2.dsc
Size/MD5 checksum: 762 667f0d6ae4984aa499d912b12d9146b9
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2.diff.gz
Size/MD5 checksum: 33122 ac7da5cf6b143338aef2b8c6da3b2b3a
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5.orig.tar.gz
Size/MD5 checksum: 2311140 3f9c71aca6faa22a889e2f84ecfd0076
Architecture independent components:
http://security.debian.org/pool/updates/main/q/quagga/quagga-doc_0.99.5-5etch2_all.deb
Size/MD5 checksum: 719938 01bcc6c571f620c957e1ea2b5cacf9f6
Alpha architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_alpha.deb
Size/MD5 checksum: 1681634 1f05ece668256dce58fe303801eb80b9
AMD64 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_amd64.deb
Size/MD5 checksum: 1415656 6e88dd4c6f56eba87c752369590cf486
ARM architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_arm.deb
Size/MD5 checksum: 1347388 c33f7ed4aed2e8f846975ace01cee97c
HP Precision architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_hppa.deb
Size/MD5 checksum: 1531224 22ce4a12ec77dae40ab0d064a7caeb9b
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_i386.deb
Size/MD5 checksum: 1246878 d358565ab725d69a366115ff6ef277c3
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_ia64.deb
Size/MD5 checksum: 1955390 9327ea2cf8778b8cca45d1ccea8092f7
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_mips.deb
Size/MD5 checksum: 1455582 a415e82fd838b9ce0f5badcdf4278770
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_mipsel.deb
Size/MD5 checksum: 1460546 af16aa91c13c54fa84769e3e30d521f0
PowerPC architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_powerpc.deb
Size/MD5 checksum: 1379422 e7f92220a37daac49ddb3b0da124b9f7
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_s390.deb
Size/MD5 checksum: 1482556 87509f6d9afef8940e0b35055f590ed8
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/q/quagga/quagga_0.99.5-5etch2_sparc.deb
Size/MD5 checksum: 1347908 db02aaf16c68dfac81a509b8145ca001
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFGTA8+W5ql+IAeqTIRApJFAJ0Zzdee8GfPVGWPY4woGKs4K1av8ACdH6xD
EQiEXt1eQaZqI//EEe6eEcI=
=NJHp
-----END PGP SIGNATURE-----
.
References:
[0] http://www.quagga.net/
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1995
____________________________________________________________________________
Primary Package Name: quagga
Primary Package Home: http://openpkg.org/go/package/quagga
Corrected Distribution: Corrected Branch: Corrected Package:
OpenPKG Enterprise E1.0-SOLID quagga-0.99.5-E1.0.1
OpenPKG Community CURRENT quagga-0.99.7-20070430
____________________________________________________________________________
For security reasons, this document was digitally signed with the
OpenPGP public key of the OpenPKG GmbH (public key id 61B7AE34)
which you can download from http://openpkg.com/openpkg.com.pgp
or retrieve from the OpenPGP keyserver at hkp://pgp.openpkg.org/.
Follow the instructions at http://openpkg.com/security/signatures/
for more details on how to verify the integrity of this document
| VAR-200704-0234 | CVE-2007-1279 | Adobe Bridge of OS X for Vulnerability gained in the update installer |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the installer for Adobe Bridge 1.0.3 update for Apple OS X, when patching with desktop management tools, allows local users to gain privileges via unspecified vectors during installation of the update by a different user who has administrative privileges. Adobe Bridge Update Installer is prone to a local privilege-escalation vulnerability.
Exploiting this issue allows local attackers to gain elevated privileges, potentially leading to a complete compromise of affected computers.
This issue affects the Bridge 1.0.3 update on the Mac OS. Adobe Bridge is a file browser that allows users to browse, organize and manipulate design assets between different components of Adobe Creative Suite. This vulnerability cannot be exploited remotely and requires local login privileges.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed. Apple Remote
Desktop). No further information is available.
SOLUTION:
Use the updated installer or update to version 1.0.4.
http://www.adobe.com/support/downloads/detail.jsp?ftpID=3125
http://www.adobe.com/support/downloads/detail.jsp?ftpID=3395
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Jerry Case, Indiana University.
ORIGINAL ADVISORY:
Adobe:
http://www.adobe.com/support/security/bulletins/apsb07-09.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200704-0043 | CVE-2007-1913 | SAP RFC Library Trusted_System_Security Function Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The TRUSTED_SYSTEM_SECURITY function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to verify the existence of users and groups on systems and domains via unspecified vectors, a different vulnerability than CVE-2006-6010. NOTE: This information is based upon a vague initial disclosure. Details will be updated after the grace period has ended. SAP RFC Library is prone to an information-disclosure vulnerability.
Few details regarding this issue are currently available. This BID will be updated as more information emerges.
An attacker can exploit this issue to access sensitive informaiton.
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
SAP RFC Library Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA24722
VERIFY ADVISORY:
http://secunia.com/advisories/24722/
CRITICAL:
Moderately critical
IMPACT:
Exposure of sensitive information, DoS, System access
WHERE:
>From local network
SOFTWARE:
SAP RFC Library 7.x
http://secunia.com/product/13851/
SAP RFC Library 6.x
http://secunia.com/product/13850/
DESCRIPTION:
Mariano Nu\xf1ez Di Croce has reported some vulnerabilities in SAP RFC
Library, which can be exploited by malicious people to disclose
potentially sensitive information, cause a DoS (Denial of Service),
and compromise a vulnerable system.
1) The "RFC_SET_REG_SERVER_PROPERTY" RFC function allows to define
the exclusive use of the RFC Server. This can be exploited to cause a
DoS by denying access to other clients.
2) An unspecified buffer overflow exists within the
"SYSTEM_CREATE_INSTANCE" RFC function, which can be exploited to
execute arbitrary code.
3) An unspecified buffer overflow exists within the "RFC_START_GUI"
RFC function, which can be exploited to execute arbitrary code.
4) Two unspecified errors exist within the "RFC_START_PROGRAM" RFC
function. These can be exploited to gain knowledge about the RFC
server's configuration or execute arbitrary code. Other versions may also be affected.
SOLUTION:
Reportedly, SAP released patches.
PROVIDED AND/OR DISCOVERED BY:
Mariano Nu\xf1ez Di Croce
ORIGINAL ADVISORY:
http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_SET_REG_SERVER_PROPERTY_RFC_Function_Denial_of_Service.pdf
http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_GUI_RFC_Function_Buffer_Overflow.pdf
http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_PROGRAM_RFC_Function_Multiple_Vulnerabilities.pdf
http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_SYSTEM_CREATE_INSTANCE_RFC_Function_Buffer_Overflow.pdf
http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_TRUSTED_SYSTEM_SECURITY_RFC_Function_Information_Disclosure.pdf
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------