VARIoT IoT vulnerabilities database

VAR-200110-0107 | CVE-2001-1281 | Ipswitch IMail Server User Modification Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Web Messaging Server for Ipswitch IMail 7.04 and earlier allows remote authenticated users to change information for other users by modifying the olduser parameter in the "Change User Information" web form. Ipswitch IMail is an email server that serves clients their mail via a web interface. IMail supports most common email protocols such as SMTP, POP3, IMAP4, and LDAP etc. It is possible to specify another userid to whom changes in the editing form will be applied by simply modifying a hidden variable.
Successful exploitation of this vulnerability could lead to a denial of service for the victim user. Vulnerabilities exist in Ipswitch IMail 7.04 and earlier versions of Web Messaging Server
VAR-200110-0108 | CVE-2001-1282 | Ipswitch IMail Server Path leak vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Ipswitch IMail 7.04 and earlier records the physical path of attachments in an e-mail message header, which could allow remote attackers to obtain potentially sensitive configuration information. Ipswitch IMail is an email server that serves clients their mail via a web interface. IMail supports most common email protocols such as SMTP, POP3, IMAP4, and LDAP, etc.
A vulnerability exists which may remotely disclose sensitive information about the host running IMail Server.
The disclosed information may be used to maliciously map out the directory structure of the host, facilitating further "intelligent" attacks on the host
VAR-200110-0109 | CVE-2001-1283 | Ipswitch IMail Server Mailbox Service Rejection Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The webmail interface for Ipswitch IMail 7.04 and earlier allows remote authenticated users to cause a denial of service (crash) via a mailbox name that contains a large number of . (dot) or other characters to programs such as (1) readmail.cgi or (2) printmail.cgi, possibly due to a buffer overflow that may allow execution of arbitrary code. Ipswitch IMail is an email server that serves clients their mail via a web interface. IMail supports most common email protocols such as SMTP, POP3, IMAP4, and LDAP, etc.
The IPSwitch IMail Server webmail interface is prone to a denial of service. Theweb interface will crash if a mailbox with a name that contains 248+ dots('.') is accessed. If the webmail interface crashes then it must be restarted to regain normal functionality. CGI scripts that access mailboxes may also induce a denial of service in the same manner.
Though it is unconfirmed, this issue may be caused by a buffer overflow. If thisis the case, a possibility does exist that this issue may be exploited to execute arbitrary code on the host. (dot) or other characters, resulting in service denial (crash)
VAR-200110-0110 | CVE-2001-1284 | Ipswitch IMail Server Predictable Session ID Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Ipswitch IMail 7.04 and earlier uses predictable session IDs for authentication, which allows remote attackers to hijack sessions of other users. Ipswitch IMail is an email server that serves clients their mail via a web interface. IMail supports most common email protocols such as SMTP, POP3, IMAP4, and LDAP, etc. If the attacker can anticipate a current valid session ID then they will be able to access webmail accounts without possessing a valid username/password.
Session IDs are generated using alphanumeric characters. A number of the characters are static
VAR-200110-0111 | CVE-2001-1285 | pswitch Imail User Mailbox Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Directory traversal vulnerability in readmail.cgi for Ipswitch IMail 7.04 and earlier allows remote attackers to access the mailboxes of other users via a .. (dot dot) in the mbx parameter. Ipswitch IMail is an email server that serves clients their mail via a web interface. IMail supports most common email protocols such as SMTP, POP3, IMAP4, and LDAP etc.
A vulnerability exists in IMail which could enable an authenticated user to view the mailbox of another IMail user.
This accomplished using directory traversal techniques while logged into the server with a valid session ID. Remote attackers use the .
VAR-200110-0112 | CVE-2001-1286 | Ipswitch IMail User Mailbox Disclosure Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Ipswitch IMail 7.04 and earlier stores a user's session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control. Ipswitch IMail is an email server that serves clients their mail via a web interface. IMail supports most common email protocols such as SMTP, POP3, IMAP4, and LDAP etc.
A vulnerability exists in IMail which could enable an authenticated user to view the mailbox of another IMail user.
This accomplished using directory traversal techniques while logged into the server with a valid session ID
VAR-200110-0113 | CVE-2001-1287 | Ipswitch IMail Web Calender Buffer Overflow Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Buffer overflow in Web Calendar in Ipswitch IMail 7.04 and earlier allows remote attackers to execute arbitrary code via a long HTTP GET request. Ipswitch IMail is an email server that serves clients their mail via a web interface. IMail supports most common email protocols such as SMTP, POP3, IMAP4, and LDAP etc.
Due to improper bounds checking, the Web Calendaring feature of IMail could allow the execution of arbitrary code with the privileges of SYSTEM. This is achieveable by submitting a specially crafted GET request. Ipswitch IMail 7.04 and earlier versions have a buffer overflow vulnerability
VAR-200110-0013 | CVE-2001-1098 | Cisco PIX Firewall Manager Plaintext Password Vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Cisco PIX firewall manager (PFM) 4.3(2)g logs the enable password in plaintext in the pfm.log file, which could allow local users to obtain the password by reading the file.
A malicious user could use this password to connect to the PIX Firewall and make configuration changes.
It is important to note that a malicious user would have to obtain access to the local workstation in order to exploit this vulnerability
VAR-200110-0004 | CVE-2001-1071 | Cisco IOS vulnerable to denial of service via Cisco Discovery Protocol |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements. The Cisco IOS contains a denial-of-service vulnerability that allows nearby remote attackers to crash or temporarily disable affected network devices.
CDP is implemented with some releases of the Cisco Internet Operating System. It is possible for a host on a local segment of network to cause a Cisco router to become unstable, and potentially stop routing traffic by generating large amounts of CDP traffic. This protocol can not be routed across routers to remote network segments.
This could lead to the ceasing of operation of Cisco routers, and a denial of service
VAR-200110-0139 | CVE-2001-1431 | Check Point VPN-1/FireWall-1 4.1 on Nokia IPXXX firewall appliance retransmits original packets |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Nokia Firewall Appliances running IPSO 3.3 and VPN-1/FireWall-1 4.1 Service Pack 3, IPSO 3.4 and VPN-1/FireWall-1 4.1 Service Pack 4, and IPSO 3.4 or IPSO 3.4.1 and VPN-1/FireWall-1 4.1 Service Pack 5, when SYN Defender is configured in Active Gateway mode, does not properly rewrite the third packet of a TCP three-way handshake to use the NAT IP address, which allows remote attackers to gain sensitive information. A vulnerability in Check Point VPN-1/FireWall-1 running on Nokia IPXXX Appliances can allow an attacker to pass traffic allowed by the security policy through the firewall while retaining the external (untranslated) destination IP address. VPN-1 is prone to a information disclosure vulnerability
VAR-201006-0363 | CVE-2010-2292 | IBM AIX nslookup fails to drop root privileges |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the Ping tools web interface in Dlink Di-604 router allows remote attackers to inject arbitrary web script or HTML via the IP field. The nslookup command fails to drop privileges, allowing local attackers to gain root privileges. The D-link DI-604 is a small router device. The 'Ping tools' WEB interface does not verify the size of the ip textfield, changing its size, and sending requests exceeding 500 characters can cause a denial of service attack. There is also a cross-site scripting attack on this textfield. Dlink Di-604 products are prone to a cross-site scripting and a denial-of-service vulnerability because the devices fail to properly handle user-supplied input.
An attacker may leverage these issues to cause denial-of-service conditions or to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site
VAR-201006-0364 | CVE-2010-2293 | IBM AIX nslookup fails to drop root privileges |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The Ping tools web interface in Dlink Di-604 router allows remote authenticated users to cause a denial of service via a large "ip textfield" size. The nslookup command fails to drop privileges, allowing local attackers to gain root privileges. The D-link DI-604 is a small router device. There is also a cross-site scripting attack on this textfield. Dlink Di-604 products are prone to a cross-site scripting and a denial-of-service vulnerability because the devices fail to properly handle user-supplied input.
An attacker may leverage these issues to cause denial-of-service conditions or to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. There is a vulnerability in the web interface of the Ping tool of the Dlink Di-604 route
VAR-200803-0054 | CVE-2008-1258 | IBM AIX nslookup fails to drop root privileges |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in prim.htm on the D-Link DI-604 router allows remote attackers to inject arbitrary web script or HTML via the rf parameter. The nslookup command fails to drop privileges, allowing local attackers to gain root privileges. D-Link is an internationally renowned provider of network equipment and solutions, and its products include a variety of router equipment.
D-Link DI-524 has multiple vulnerabilities in processing user requests. Remote attackers may use these vulnerabilities to make device services unavailable or perform cross-site scripting attacks.
The D-Link DI-524 router does not properly handle the login request sent to the web interface. If the attacker sends a long username, it will trigger a crash; if the long HTTP header is sent, it may also cause the router's web server. collapse.
The D-Link DSL-G604T router did not properly filter the input passed to the var: category parameter in cgi-bin / webcm and returned it to the user, which could cause arbitrary HTML and script code to be executed in the user's browser session. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. D-Link is a network company founded by Taiwan D-Link Group, dedicated to the R&D, production and marketing of LAN, broadband network, wireless network, voice network and related network equipment. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
D-Link DI-604 "rf" Cross-Site Scripting Vulnerability
SECUNIA ADVISORY ID:
SA29531
VERIFY ADVISORY:
http://secunia.com/advisories/29531/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
OPERATING SYSTEM:
D-Link DI-604 Broadband Router
http://secunia.com/product/11068/
DESCRIPTION:
Jonas has reported a vulnerability in D-Link DI-604, which can be
exploited by malicious people to conduct cross-site scripting
attacks.
SOLUTION:
Filter malicious characters and character sequences in a web proxy.
PROVIDED AND/OR DISCOVERED BY:
Jonas
ORIGINAL ADVISORY:
http://www.gnucitizen.org/projects/router-hacking-challenge/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200803-0049 | CVE-2008-1253 | IBM AIX nslookup fails to drop root privileges |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in cgi-bin/webcm on the D-Link DSL-G604T router allows remote attackers to inject arbitrary web script or HTML via the var:category parameter, as demonstrated by a request for advanced/portforw.htm on the fwan page. The nslookup command fails to drop privileges, allowing local attackers to gain root privileges. D-Link is an internationally renowned provider of network equipment and solutions, and its products include a variety of router equipment.
D-Link DI-524 has multiple vulnerabilities in processing user requests. Remote attackers may use these vulnerabilities to make device services unavailable or perform cross-site scripting attacks.
The D-Link DI-524 router does not properly handle the login request sent to the web interface. If the attacker sends a long username, it will trigger a crash; if the long HTTP header is sent, it may also cause the router's web server. collapse.
The D-Link DI-604 router did not properly filter the input passed to the rf parameter in prim.htm and returned it to the user, which could cause arbitrary HTML and script code to be executed in the user's browser session.
The D-Link DSL-G604T router did not properly filter the input passed to the var: category parameter in cgi-bin / webcm and returned it to the user, which could cause arbitrary HTML and script code to be executed in the user's browser session. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. D-Link is a network company founded by Taiwan D-Link Group, dedicated to the R&D, production and marketing of LAN, broadband network, wireless network, voice network and related network equipment. ----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
D-Link DSL-G604T "var:category" Cross-Site Scripting Vulnerability
SECUNIA ADVISORY ID:
SA29530
VERIFY ADVISORY:
http://secunia.com/advisories/29530/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
OPERATING SYSTEM:
D-Link DSL-G604T
http://secunia.com/product/5127/
DESCRIPTION:
Gareth Heyes has reported a vulnerability in D-Link DSL-G604T, which
can be exploited by malicious people to conduct cross-site scripting
attacks.
SOLUTION:
Do not browse untrusted websites or follow untrusted links while
logged on to the application.
PROVIDED AND/OR DISCOVERED BY:
Gareth Heyes
ORIGINAL ADVISORY:
http://www.gnucitizen.org/projects/router-hacking-challenge/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200605-0108 | CVE-2006-2337 | IBM AIX nslookup fails to drop root privileges |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Directory traversal vulnerability in webcm in the D-Link DSL-G604T Wireless ADSL Router Modem allows remote attackers to read arbitrary files via an absolute path in the getpage parameter. The nslookup command fails to drop privileges, allowing local attackers to gain root privileges
VAR-200109-0004 | CVE-2001-1032 | PHPNuke 'admin.php' script does not adequately authenticate users, thereby allowing malicious user to copy, move, or upload files |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
admin.php in PHP-Nuke 5.2 and earlier, except 5.0RC1, does not check login credentials for upload operations, which allows remote attackers to copy and upload arbitrary files and read the PHP-Nuke configuration file by directly calling admin.php with an upload parameter and specifying the file to copy. PHPNuke's "admin.php" script does not properly authenticate users of its filemanager capabilities. PHP Nuke is a website creation/maintenance tool written in PHP3.
PHP Nuke contains a vulnerability in 'admin.php' that may allow for remote attackers to overwrite files with custom data on target webservers.
May allow for an attacker to gain access to the host, cause denial of service or deface the target website.
PostNuke, a derivative of PHP Nuke, is also vulnerable. PHP-Nuke is a website creation and management tool that can use many database software as the backend, such as MySQL, PostgreSQL, mSQL, Interbase, Sybase, etc
VAR-200109-0060 | CVE-2001-0649 | Personal Web Sharing Service rejection |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Personal Web Sharing 1.5.5 allows a remote attacker to cause a denial of service via a long HTTP request. Personal Web Sharing is prone to a denial-of-service vulnerability
VAR-200109-0135 | CVE-2001-1105 | RSA BSAFE SSL-J Verification bypass vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
RSA BSAFE SSL-J 3.0, 3.0.1 and 3.1, as used in Cisco iCND 2.0, caches session IDs from failed login attempts, which could allow remote attackers to bypass SSL client authentication and gain access to sensitive data by logging in after an initial failure. A vulnerability exists in several versions of RSA's SSL-J Software Development Kit (SDK) that can enable an attacker to bypass SSL client authentication.
Under certain conditions, if an error occurs during the SSL client-server handshake, the SSL session key may be stored in a cache rather than being discarded. Once cached, this session key can be used by an attacker to cause a server to skip the full client authentication scheme, using a much shorter one. This effectively allows the attacker to fully bypass the client authentication.
On systems that rely solely on the authentication mechanism provided by SSL, this could enable an attacker to perform unauthorized actions.
Additional technical details are forthcoming
VAR-200109-0040 | CVE-2001-0940 | Check Point Firewall-1 GUI Log Viewer Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Buffer overflow in the GUI authentication code of Check Point VPN-1/FireWall-1 Management Server 4.0 and 4.1 allows remote attackers to execute arbitrary code via a long user name. Firewall-1 is a popular stateful-inspection firewall.
It has been reported that Firewall-1 may contain a buffer overflow vulnerability. The vulnerability is allegedly in logging of authentication attempts by GUI log viewing clients.
The attack must be launched from hosts who are permitted to view logs via the GUI interface. This vulnerability is present only in the Windows NT and 2000 versions of the product
VAR-200109-0134 | CVE-2001-1446 | Apache web server performs case sensitive filtering on Mac OS X HFS+ case insensitive filesystem |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Find-By-Content in Mac OS X 10.0 through 10.0.4 creates world-readable index files named .FBCIndex in every directory, which allows remote attackers to learn the contents of files in web accessible directories. The Apache (1.3.14) web server's file access protection scheme can be bypassed for the Mac OS X HFS+ filesystem. Mac OS X's Find-By-Content indexing may store file data where it can be served to remote users by Apache. Requesting a URL with the relative path of a '.DS_Store' file, will reveal the contents of the requested directory.
This vulnerability could be used in conjunction with a previously discovered issue (BID 2852), which causes files to be arbitrarily disclosed through mixed case file requests.
A remote attacker may read the indexed contents of files by submitting a URL to the vulnerable host's web service of the following form:
http://www.example.com/target_directory/.FBCIndex.
This information could provide an attacker with sensitive information including potential passwords useful in dictionary attacks, system configuration, installed applications, etc. Properly exploited, this information could allow an attacker to further compromise the security of the host