VARIoT IoT vulnerabilities database
| VAR-200501-0463 | CVE-2004-1235 | Linux Kernel of Multiple function race condition vulnerabilities |
CVSS V2: 6.2 CVSS V3: - Severity: MEDIUM |
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor. Linux Kernel of (1) load_elf_library() function, (2) binfmt_aout() Functions include brk There is a flaw in the handling of the segment that causes a race condition.root You may get permission. Linux kernel is reported prone to a local privilege-escalation vulnerability. This issue arises in the 'uselib()' functions of the Linux binary-format loader as a result of a race condition. Successful exploitation of this vulnerability can allow a local attacker to gain elevated privileges on a vulnerable computer.
The ELF and a.out loaders are reportedly affected by this vulnerability. The Linux kernel provides a binary format loader layer to load programs in different formats such as ELF or a.out or others, and the kernel also provides the sys_uselib() function to load corresponding binary programs. From the analysis of the uselib function of load_elf_library() in the binfmt_elf.c file, there is a problem in the processing of the BRK segment (VMA) of the library. This segment is established through current->mm->mmap_sem. When modifying the memory layout of the calling process\ '\' semaphore \'\' (semaphore) is not maintained, this can be used to mess with memory management and elevate privileges. Part of the source code fs/binfmt_elf.c is as follows: static int load_elf_library(struct file *file) { [904] down_write(¤t->mm->mmap_sem); error = do_mmap(file, ELF_PAGESTART(elf_phdata->p_vaddr), ( elf_phdata- > p_filesz + ELF_PAGEOFFSET(elf_phdata- > p_vaddr)), PROT_READ | PROT_WRITE | PROT_EXEC, MAP_FIXED | MAP_PRIVATE | MAP_DENYWRITE, (elf_phdata- > p_offset - ELF_PAGEOFFSET(elf_phdata- > p_vaddr))); >mmap_sem); if (error != ELF_PAGESTART(elf_phdata->p_vaddr)) goto out_free_ph;.
----------------------------------------------------------------------
Want to join the Secunia Security Team?
Secunia offers a position as a security specialist, where your daily
work involves reverse engineering of software and exploit code,
auditing of source code, and analysis of vulnerability reports.
http://secunia.com/secunia_security_specialist/
----------------------------------------------------------------------
TITLE:
Debian update for kernel-source-2.4.17
SECUNIA ADVISORY ID:
SA20338
VERIFY ADVISORY:
http://secunia.com/advisories/20338/
CRITICAL:
Moderately critical
IMPACT:
Exposure of system information, Exposure of sensitive information,
Privilege escalation, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Debian GNU/Linux 3.0
http://secunia.com/product/143/
DESCRIPTION:
Debian has issued an update for kernel-source-2.4.17. This fixes some
vulnerabilities, which can be exploited by malicious, local users to
gain knowledge of sensitive information, cause a DoS (Denial of
Service), gain escalated privileges, and by malicious people to cause
a DoS, and disclose potentially sensitive information.
For more information:
SA10533
SA11464
SA11861
SA11943
SA13232
SA13469
SA13126
SA13308
SA13627
SA13756
SA13493
SA13822
SA14295
SA14570
SA13784
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 3.0 alias woody --
Source archives:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc
Size/MD5 checksum: 713 6ff55b14d3ae957c55bbed7fabf4c047
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz
Size/MD5 checksum: 30437486 86601103169da686167972e5e560e3d4
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc
Size/MD5 checksum: 736 f97d95c6ecc26401f8f2fc2ead6cf421
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz
Size/MD5 checksum: 25419305 9bc354f889edd4964840475400b088b7
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc
Size/MD5 checksum: 800 d20db4ab99e311150734b70519cc31e9
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz
Size/MD5 checksum: 12283 f51a7e01941baca7010fb8c2f0f67fe3
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc
Size/MD5 checksum: 694 2d48f4cfa4917904b6c1f806ecc1bdb4
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz
Size/MD5 checksum: 491935 94638c0c03b6b163f46319e777d4aa71
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc
Size/MD5 checksum: 805 b48cbc9c2cd59eee3a52f54cfa5356e0
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz
Size/MD5 checksum: 1150966 6748462e7bce7c917e066e0594d42571
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc
Size/MD5 checksum: 664 f49e9cba55a8a4b098e5dc522f2a07fc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz
Size/MD5 checksum: 344642 3a488cc38ffc619bfff4bfbb75eff4cd
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc
Size/MD5 checksum: 609 4e0f66c1811cfb9e926c21566e55b202
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz
Size/MD5 checksum: 29768549 bc1f8eab880a33bfe2ebeb3ef8b6557a
Architecture independent components:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb
Size/MD5 checksum: 24455128 ed5362b12c6327295cd89027ff8e80ab
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb
Size/MD5 checksum: 24735538 cf9ddb702811464ac2dd2231512053f9
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb
Size/MD5 checksum: 1151866 6f2575f26e7800e1e7a7cafdaf02b3a6
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb
Size/MD5 checksum: 300202 0f5db53cdab20024b4a3a75bd0799b1a
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb
Size/MD5 checksum: 1708122 7d18878351662289ac0841e0ad8f10f4
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb
Size/MD5 checksum: 23972270 a0bf4a2796a9b49c36579166e6a72d62
HP Precision architecture:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb
Size/MD5 checksum: 3523044 63c790a70164e579c8bb3b8a08ea69b5
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb
Size/MD5 checksum: 2869994 e9e2be22d5fdf40f2e879570adc1132d
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb
Size/MD5 checksum: 3006192 cf53ac718c6ed26a59802e74c5926f00
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb
Size/MD5 checksum: 3029436 d0e0fd747af9ff7a3633ee9cc6b1f1e6
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb
Size/MD5 checksum: 3170356 ca408698a580463da3a547b2f87006e4
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb
Size/MD5 checksum: 16886 437018078d9d01e25702cf1a20c23414
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb
Size/MD5 checksum: 3638280 b6cd4e0d4129b6f4d0734253818cd828
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb
Size/MD5 checksum: 7026800 55e4cd610c06297c7132ce2aeb88d029
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb
Size/MD5 checksum: 7172892 a66f94c18d8ee4354e9446655837c72a
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb
Size/MD5 checksum: 7014470 d99cc0f293c747a295230de934328007
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb
Size/MD5 checksum: 7165570 997a9dbf17821067de6ceb65548e7c2b
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb
Size/MD5 checksum: 21616 1eab80187061fbd304b6328533d7dc33
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb
Size/MD5 checksum: 3379418 74817217abf90896eb63d6c6792839fe
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb
Size/MD5 checksum: 1346190 39433c757763336b6c14bf0d00652596
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb
Size/MD5 checksum: 16404 9cfcf10a2a2ef99bbb009a650cddd227
PowerPC architecture:
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb
Size/MD5 checksum: 3409712 698750e3998ee3792db43f445a8a8d96
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb
Size/MD5 checksum: 2211146 103890e43508a5913a10ff8be80e9cdc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb
Size/MD5 checksum: 4602 31ef3f45675fc13836337dee97486e20
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb
Size/MD5 checksum: 490842 799441a4e49b88f780353d7aff9f29d2
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb
Size/MD5 checksum: 16280 4e54c040bc83523d8122287bab6df7a5
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb
Size/MD5 checksum: 3523520 45f001c255a3a66f22148d84d035abb1
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb
Size/MD5 checksum: 2045436 c840c6ff8c9e3ab455d38021d09a391d
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb
Size/MD5 checksum: 2045226 709ccbc6754644fa448c93058f0df504
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb
Size/MD5 checksum: 16556 019623b1dbc75bff84d7f056435dc6db
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb
Size/MD5 checksum: 3522422 2118440d1658730fd93f47867848573c
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb
Size/MD5 checksum: 2200968 63bc732deee6df19b83f10a50485a476
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb
Size/MD5 checksum: 2195278 697eb9b05f765c332eca175284eb24b8
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb
Size/MD5 checksum: 17836 61df1f292dccb4e64cb956a629f729fc
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb
Size/MD5 checksum: 16558 f8382b01aca2c535988b5ab5709dae90
Alpha architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb
Size/MD5 checksum: 17180 7d1cf8fb24431c01f45fadf7becb6d2e
ARM architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb
Size/MD5 checksum: 15878 fcf97ed103c205699fb5396c3a49e293
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb
Size/MD5 checksum: 15518 2e7d50090a469a84ef7f3ae8aa97b85f
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb
Size/MD5 checksum: 15368 41a11620bf7ea34b15742ccf59ff6895
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb
Size/MD5 checksum: 18356 71b076d3eeff837bfb54a7f538b11b58
ORIGINAL ADVISORY:
http://www.us.debian.org/security/2006/dsa-1082
OTHER REFERENCES:
SA10533:
http://secunia.com/advisories/10533/
SA11464:
http://secunia.com/advisories/11464/
SA11861:
http://secunia.com/advisories/11861/
SA11943:
http://secunia.com/advisories/11943/
SA13232:
http://secunia.com/advisories/13232/
SA13469:
http://secunia.com/advisories/13469/
SA13126:
http://secunia.com/advisories/13126/
SA13308:
http://secunia.com/advisories/13308/
SA13627:
http://secunia.com/advisories/13627/
SA13756:
http://secunia.com/advisories/13756/
SA13493:
http://secunia.com/advisories/13493/
SA13822:
http://secunia.com/advisories/13822/
SA14295:
http://secunia.com/advisories/14295/
SA14570:
http://secunia.com/advisories/14570/
SA13784:
http://secunia.com/advisories/13784/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200505-0585 | CVE-2005-0289 | Apple AirPort Wireless Distributed System Remote Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Apple AirPort Express prior to 6.1.1 and Extreme prior to 5.5.1, configured as a Wireless Data Service (WDS), allows remote attackers to cause a denial of service (device freeze) by connecting to UDP port 161 and before link-state change occurs. This issue could allow a remote attacker to cause the base station to stop processing traffic. This can be exploited to cause a vulnerable device
to stop responding by sending certain data via UDP on port 161.
SOLUTION:
Apply updated firmwares.
-- Airport Express --
Update to firmware version 6.1.1.
Mac OS X:
http://www.apple.com/support/downloads/airportexpressfirmware611formacosx.html
Windows:
http://www.apple.com/support/downloads/airportexpressfirmware611forwindows.html
-- Airport Extreme --
Update to firmware version 5.5.1.
Mac OS X:
http://www.apple.com/support/downloads/airportextremefirmware551formacosx.html
Windows:
http://www.apple.com/support/downloads/airportextremefirmware551forwindows.html
PROVIDED AND/OR DISCOVERED BY:
Dylan Griffiths
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200412-0735 | CVE-2004-2682 | PeerSec MatrixSSL Private key vulnerabilities |
CVSS V2: 5.8 CVSS V3: - Severity: MEDIUM |
PeerSec MatrixSSL before 1.1 does not implement RSA blinding, which allows context-dependent attackers to obtain the server's private key by determining factors using timing differences on (1) the number of extra reductions during Montgomery reduction, and (2) the use of different integer multiplication algorithms ("Karatsuba" and normal), a related issue to CVE-2003-0147. MatrixSSL is prone to a cross-site scripting vulnerability
| VAR-200412-0086 | CVE-2004-0498 | stonesoft of firewall engine Vulnerability in |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The H.323 protocol agent in StoneSoft firewall engine 2.2.8 and earlier allows remote attackers to cause a denial of service (crash) via crafted H.323 packets. stonesoft of firewall engine Exists in unspecified vulnerabilities.None. There are vulnerabilities in the H.323 proxy protocol of StoneSoft Firewall Engine 2.2.8 and earlier versions
| VAR-200412-0734 | CVE-2004-2681 | PeerSec MatrixSSL Session hijacking vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
PeerSec MatrixSSL before 1.1 caches session keys for an indefinitely long time, which might make it easier for remote attackers to hijack a session. MatrixSSL is prone to a cross-site scripting vulnerability
| VAR-200412-1186 | CVE-2004-1791 | Edimax AR-6004 ADSL router web Management Interface Permissions License and Access Control Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The web management interface in Edimax AR-6004 ADSL Routers uses a default administrator name and password, which also appear as the default login text for the management interface, which allows remote attackers to gain access. Full Rate Adsl Router is prone to a remote security vulnerability. A remote attacker could exploit this vulnerability to gain access
| VAR-200412-0601 | CVE-2004-2276 | Windows F-Secure Anti-Virus versus Linux Samba Servers Virus detection bypass vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
F-Secure Anti-Virus 5.41 and 5.42 on Windows, Client Security 5.50 and 5.52, 4.60 for Samba Servers, and 4.52 and earlier for Linux does not properly detect certain viruses in a PKZip archive, which allows viruses such as Sober.D and Sober.G to bypass initial detection
| VAR-200412-0461 | CVE-2004-2354 | PHP-Nuke 4nGuestbookSQL Injection vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
SQL injection vulnerability in 4nGuestbook 0.92 for PHP-Nuke 6.5 through 6.9 allows remote attackers to modify SQL statements via the entry parameter to modules.php, which can also facilitate cross-site scripting (XSS) attacks when MySQL errors are triggered. 4Nguestbook is prone to a cross-site scripting vulnerability. A SQL injection vulnerability exists in 4nGuestbook 0.92 of PHP-Nuke 6.5 and 6.9 versions
| VAR-200412-0326 | CVE-2004-2405 | F-Secure Anti-Virus Product buffer overflow vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Buffer overflow in multiple F-Secure Anti-Virus products, including F-Secure Anti-Virus 5.42 and earlier, allows remote attackers to bypass scanning or cause a denial of service (crash or module restart), depending on the product, via a malformed LHA archive. F-Secure Anti-Virus is prone to a denial-of-service vulnerability. Several F-Secure Anti-Virus products, including F-Secure Anti-Virus 5.42 and earlier versions, have buffer overflow vulnerabilities
| VAR-200412-0381 | CVE-2004-2427 | Axis Network Camera versus Video Server Information disclosure and service rejection vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to obtain sensitive information via direct requests to (1) admin/getparam.cgi, (2) admin/systemlog.cgi, (3) admin/serverreport.cgi, and (4) admin/paramlist.cgi, modify system information via (5) setparam.cgi and (6) factorydefault.cgi, or (7) cause a denial of service (reboot) via restart.cgi. 2420 Video Server is prone to a denial-of-service vulnerability
| VAR-200412-0744 | CVE-2004-2691 | 3Com SuperStack 3 4400 switches Denial of service vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in 3Com SuperStack 3 4400 switches with firmware version before 3.31 allows remote attackers to cause a denial of service (device reset) via a crafted request to the web management interface. NOTE: the provenance of this information is unknown; details are obtained from third party reports. 3C17210-Us is prone to a denial-of-service vulnerability. 3Com SuperStack 3 4400 switches with firewall versions prior to 3.31 have an unspecified vulnerability
| VAR-200412-0740 | CVE-2004-2687 | Apple Xcode Tools Configuration error vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks. Xcode is prone to a remote security vulnerability
| VAR-200412-0096 | CVE-2004-0467 | Juniper JunOS Routing Engine MPLS denial of service |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Juniper JUNOS 5.x through JUNOS 7.x allows remote attackers to cause a denial of service (routing disabled) via a large number of MPLS packets, which are not filtered or verified before being sent to the Routing Engine, which reduces the speed at which other packets are processed. Juniper routers will become severely disrupted when attacked with specially-crafted MPLS packets. Juniper Routers receive a spoofed packet to disrupt service operation (DoS) You can be attacked.Serious denial of service by remote third party (DoS) You can be attacked. The attack could result in a routing service outage on a router affected by this issue. It is reported that this vulnerability exists in all releases of Juniper JUNOS that were built prior to January 7th 2005.
A remote attacker may exploit this vulnerability to effectively deny network-based services to legitimate users.
This BID will be updated as soon as further information regarding this vulnerability is made public. Juniper Networks Routers is a router product developed by Juniper Networks in the United States. According to the description of Juniper Security Bulletin PSN-2005-01-010: This vulnerability can be triggered by a directly attached neighbor device or a remote attacker who can send some communication packets to the router. Routers running Junos software with this vulnerability exist. Vulnerability that prevents the use of firewall filtering to protect affected routers.
TITLE:
Juniper JUNOS Unspecified Packet Processing Denial of Service
SECUNIA ADVISORY ID:
SA14049
VERIFY ADVISORY:
http://secunia.com/advisories/14049/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
OPERATING SYSTEM:
JUNOS 6.x
http://secunia.com/product/3418/
DESCRIPTION:
A vulnerability has been reported in JUNOS, which can be exploited by
malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an unspecified error within the
processing of certain network packets. This can be exploited to
disrupt the operation of a vulnerable device via some specially
crafted network packets.
SOLUTION:
See the vendor advisory for information about patches.
PROVIDED AND/OR DISCOVERED BY:
Qwest Communication Software Certification
ORIGINAL ADVISORY:
Juniper Networks:
https://www.juniper.net/alerts/viewalert.jsp?txtAlertNumber=PSN-2005-01-009&actionBtn=Search
OTHER REFERENCES:
US-CERT VU#409555:
http://www.kb.cert.org/vuls/id/409555
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-200412-0673 | CVE-2004-2650 | Apache James Spooler Memory Leak Denial Of Service Vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Spooler in Apache Foundation James 2.2.0 allows local users to cause a denial of service (memory consumption) by triggering various error conditions in the retrieve function, which prevents a lock from being released and causes a memory leak. James is prone to a memory leak denial of service vulnerability.
This issue occurs during an error condition in the spooler.
An attacker can exploit this issue by creating multiple error conditions and eventually consume system resources.
Successful exploitation will ultimately crash the application denying service to legitimate users
| VAR-200501-0046 | CVE-2004-1023 | Kerio Multiple software Weak security mechanism vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Kerio Winroute Firewall before 6.0.9, ServerFirewall before 1.0.1, and MailServer before 6.0.5, when installed on Windows based systems, do not modify the ACLs for critical files, which allows local users with Power Users privileges to modify programs, install malicious DLLs in the plug-ins folder, and modify XML files related to configuration. Kerio Mailserver is prone to a local security vulnerability. Kerio is a security software company that offers a variety of security software. ______________________________________________________________________
Secure Computer Group - University of A Coruna
http://research.tic.udc.es/scg/
-- x --
dotpi.com Information Technologies Research Labs
http://www.dotpi.com
______________________________________________________________________
ID: #20041214-2
Document title: Insecure default file system permissions on
Microsoft versions of Kerio Software
Document revision: 1.0
Coordinated release date: 2004/12/14
Vendor Acknowledge date: 2004/11/10
Reported date: 2004/11/08
CVE Name: CAN-2004-1023
Other references: N/A
______________________________________________________________________
Summary:
Impact: Privilege escalation
System sofware tampering
Trojan injection
Second-stage attack vector
Alter configuration files
Rating/Severity: Low
Recommendation: Update to latest version
Enforce file system ACLs
Vendor: Kerio Technologies Inc.
Affected software: Kerio WinRoute Firewall (all versions)
Kerio ServerFirewall (all versions)
Kerio MailServer (all windows versions)
Updates/Patches: Yes (see below)
______________________________________________________________________
General Information:
1. Executive summary:
------------------
As a result of its collaboration relationship the Secure Computer
Group (SCG) along with dotpi.com Research Labs have determined
the following security issue on some Kerio Software.
Kerio WinRoute Firewall, Kerio ServerFirewall and Kerio MailServer
are installed by default under 'Program Files' system folder. No
change is done to the ACLs after the installation process.
System administrators should enforce ACL security settings in
order solve this problem. It is also highly recommended to
verify this settings as part of the planning, installation,
hardening and auditing processes.
New versions of the software solve this an other minor problems
so it is upgrade its highly recommended.
2. Technical details:
------------------
Following the latest trends and approaches to responsible
disclosure, SCG and dotpi.com are going to withhold details of
this flaw for three months.
Full details will be published on 2005/03/14. This three month
window will allow system administrators the time needed to
obtain the patch before the details are released to the general
public.
3. Risk Assessment factors:
------------------------
The attacker would need local interactive access to the
installation directory. Remote access is also possible but
default system settings do not make this easy.
The most risky scenarios are the ones in which the server machine
is shared among two or more users or those situations where Kerio
service management have been delegated to a third party any other
than local or domain system administrator.
Special care should be taken on such environments and every step
of the project: design, planning, deployment and management
should consider this security issues.
Privilege escalation, system and software tampering and the
ability to alter service configuration are all real issues and
all of them can be used as a second stage attack vector.
4. Solutions and recommendations:
------------------------------
Enforce the file system ACLs and/or upgrade to the latest
versions:
o Kerio Winroute Firewall 6.0.9
o Kerio ServerFirewall 1.0.1
o Kerio MailServer 6.0.5
As in any other case, follow, as much as possible, the Industry
'Best Practices' on Planning, Deployment and Operation on this
kind of services.
5. Common Vulnerabilities and Exposures (CVE) project:
---------------------------------------------------
The Common Vulnerabilities and Exposures (CVE) project has
assigned the name CAN-2004-1023 to this issue. This is a
candidate for inclusion in the CVE list (http://cve.mitre.org),
which standardizes names for security problems.
______________________________________________________________________
Acknowledgements:
1. Special thanks to Vladimir Toncar and Pavel Dobry and the whole
Technical Team from Kerio Technologies (support at kerio.com)
for their quick response and professional handling on this issue.
3. The whole Research Lab at dotpi.com and specially to Carlos Veira
for his leadership and support.
3. Secure Computer Group at University of A Coruna (scg at udc.es),
and specially to Antonino Santos del Riego powering new research
paths at University of a Coruna.
______________________________________________________________________
Credits:
Javier Munoz (Secure Computer Group) is credited with this discovery.
______________________________________________________________________
Related Links:
[1] Kerio Technologies Inc.
http://www.kerio.com/
[2] Kerio WinRoute Firewall Downloads & Updates
http://www.kerio.com/kwf_download.html
[3] Kerio ServerFirewall Downloads & Updates
http://www.kerio.com/ksf_download.html
[4] Kerio MailServer Downloads & Updates
http://www.kerio.com/kms_download.html
[5] Secure Computer Group. University of A Coruna
http://research.tic.udc.es/scg/
[6] Secure Computer Group. Updated advisory
http://research.tic.udc.es/scg/advisories/20041214-2.txt
[7] dotpi.com Information Technologies S.L.
http://www.dotpi.com/
[8] dotpi.com Research Labs
http://www.dotpi.com/research/
______________________________________________________________________
Legal notice:
Copyright (c) 2002-2004 Secure Computer Group. University of A Coruna
Copyright (c) 2004 dotpi.com Information Technologies S.L.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of the authors.
If you wish to reprint the whole or any part of this alert in any
other medium other than electronically, please contact the authors
for explicit written permission at the following e-mail addresses:
(scg at udc.es) and (info at dotpi.com).
Disclaimer: The information in the advisory is believed to be
accurate at the time of publishing based on currently available
information. Use of the information constitutes acceptance for use
in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information.
_____________________________________________________________________
| VAR-200412-0902 | CVE-2004-1307 | Apple Terminal fails to properly sanitize input for "x-man-page" URI |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow. Apple Mac OS X Directory Service utilities use external programs insecurely, potentially allowing an attacker to execute arbitrary code. LibTIFF Library TIFFFetchStripThing() Perform memory allocation in functions CheckMalloc() An integer overflow vulnerability exists due to a flaw in the validation of the value passed to the function.LibTIFF Arbitrary code may be executed with the execution authority of the application that uses the library
| VAR-200412-0887 | CVE-2004-1320 | Asante FM2008 Managed Ethernet Switch's default backdoor account vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Asante FM2008 running firmware 1.06 is shipped with a default username and password, which could allow remote attackers to gain unauthorized access. Asante FM2008 managed Ethernet switches contain a default backdoor account vulnerability. Note that these credentials aren't usable in the web administration interface, but only in the telnet or serial interfaces.
Asante FM2008 v01.06 switches are vulnerable; other devices may be vulnerable as well
| VAR-200412-0888 | CVE-2004-1321 | Asante FM Get unauthorized access vulnerabilities |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The configuration backup in Asante FM2008 running firmware 1.06 stores the username and password in cleartext, which could allow remote attackers to gain unauthorized access. FM2008 Managed Ethernet Switch is prone to a remote security vulnerability
| VAR-200412-0889 | CVE-2004-1322 | integrated Exchange of Cisco Unity There is a default password vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Cisco Unity 2.x, 3.x, and 4.x, when integrated with Microsoft Exchange, has several hard coded usernames and passwords, which allows remote attackers to gain unauthorized access and change configuration settings or read outgoing or incoming e-mail messages. It is reported that vulnerable Unity systems contain default user accounts and passwords that can be used by an attacker to gain unauthorized access. This issue only arises when Unity is integrated with Microsoft Exchange.
Unauthorized attakers may use these accounts to gain administrative access to vulnerable systems. Some accounts can allow attackers to disclose messages going to and from external voicemail systems. When used in conjunction with Exchange, there are multiple default username/password combinations. These default accounts are: EAdmin<systemid> UNITY_<servername> UAMIS_<servername> UOMNI_<servername> UVPIM_<servername> ESubsubscriber Accessible management interface with EAdmin <systemid> for application control. Any incoming or outgoing messages can be read using UNITY_<servername>, UAMIS_<servername>, UOMNI_<servername> or UVPIM_<servername>
| VAR-200501-0045 | CVE-2004-1022 | Kerio Multiple products Weak encryption vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Kerio Winroute Firewall before 6.0.7, ServerFirewall before 1.0.1, and MailServer before 6.0.5 use symmetric encryption for user passwords, which allows attackers to decrypt the user database and obtain the passwords by extracting the secret key from within the software. Kerio WinRoute Firewall, Kerio ServerFirewall, and Kerio MailServer are all reported prone to a design flaw. It is reported that these products store credentials in a local database store, these credentials are obscured using an unspecified symmetric encryption algorithm. Reports indicate that a universal secret key is employed to extract plain text from the credential hashes; this presents a security risk because the universal secret key is stored in the WinRoute Firewall, Kerio ServerFirewall, and Kerio MailServer binaries. Kerio is an Internet security software company whose main products include firewall and mail system. ______________________________________________________________________
Secure Computer Group - University of A Coruna
http://research.tic.udc.es/scg/
-- x --
dotpi.com Information Technologies Research Labs
http://www.dotpi.com
______________________________________________________________________
ID: #20041214-1
Document title: Insecure Credential Storage on Kerio
Software
Document revision: 1.0
Coordinated release date: 2004/12/14
Vendor Acknowledge date: 2004/10/06
Reported date: 2004/10/01
CVE Name: CAN-2004-1022
Other references: N/A
______________________________________________________________________
Summary:
Impact: Insecure Credential Storage
Rating/Severity: Medium
Recommendation: Update to latest version
Vendor: Kerio Technologies Inc.
Affected software: Kerio WinRoute Firewall (all versions)
Kerio ServerFirewall (all versions)
Kerio MailServer (all versions)
Updates/Patches: Yes (see below)
______________________________________________________________________
General Information:
1. Executive summary:
------------------
As a result of its collaboration relationship the Secure Computer
Group (SCG) along with dotpi.com Research Labs have determined
this security issue on Kerio WinRoute Firewall (KWF), Kerio
ServerFirewall (KSF) and Kerio MailServer (KMS).
Anyone with a cyphertext of this database (that is, with access to
the configuration files) could reverse the encryption using a
universal secret key hidden into the program logic.
New versions of the software solve this and other minor problems
so it is upgrade its highly recommended.
2. Technical details:
------------------
Following the latest trends and approaches to responsible
disclosure, SCG and dotpi.com are going to withhold details of
this flaw for three months.
Full details will be published on 2005/03/14. This three month
window will allow system administrators the time needed to
obtain the patch before the details are released to the general
public.
3. Risk Assessment factors:
------------------------
The attacker needs access to the user database, which is not
normally a usual condition on a properly hardened firewall and/or
mail server.
Despite this, special care should be taken on shared environments
where more than one technical staff work together on the firewall
and/or the mail server. This kind of scenarios offer a potential
opportunity for the insiders on the work of stealing identities
and, therefore, breaking access control measures.
It is also important to note that this could be an important
second-stage resource for a successful attacker on an already
compromised firewall and/or mail server.
4. Solutions and recommendations:
------------------------------
Upgrade to the latest versions:
o Kerio Winroute Firewall 6.0.9
o Kerio ServerFirewall 1.0.1
o Kerio MailServer 6.0.5
As in any other case, follow, as much as possible, the Industry
'Best Practices' on Planning, Deployment and Operation on this
kind of services.
Note:
Kerio Winroute Firewall 6.0.7 fixed CAN-2004-1022. Kerio Winroute
Firewall 6.0.9 is the current version fixing CAN-2004-1022 and
CAN-2004-1023
5. Common Vulnerabilities and Exposures (CVE) project:
---------------------------------------------------
The Common Vulnerabilities and Exposures (CVE) project has
assigned the name CAN-2004-1022 to this issue. This is a
candidate for inclusion in the CVE list (http://cve.mitre.org),
which standardizes names for security problems.
______________________________________________________________________
Acknowledgements:
1. Special thanks to Vladimir Toncar and Pavel Dobry and the whole
Technical Team from Kerio Technologies (support at kerio.com)
for their quick response and professional handling on this issue.
3. The whole Research Lab at dotpi.com and specially to Carlos Veira
for his leadership and support.
3. Secure Computer Group at University of A Coruna (scg at udc.es),
and specially to Antonino Santos del Riego powering new research
paths at University of a Coruna.
______________________________________________________________________
Credits:
Javier Munoz (Secure Computer Group) is credited with this discovery.
______________________________________________________________________
Related Links:
[1] Kerio Technologies Inc.
http://www.kerio.com/
[2] Kerio WinRoute Firewall Downloads & Updates
http://www.kerio.com/kwf_download.html
[3] Kerio ServerFirewall Downloads & Updates
http://www.kerio.com/ksf_download.html
[4] Kerio MailServer Downloads & Updates
http://www.kerio.com/kms_download.html
[5] Secure Computer Group. University of A Coruna
http://research.tic.udc.es/scg/
[6] Secure Computer Group. Updated advisory
http://research.tic.udc.es/scg/advisories/20041214-1.txt
[7] dotpi.com Information Technologies S.L.
http://www.dotpi.com/
[8] dotpi.com Research Labs
http://www.dotpi.com/research/
______________________________________________________________________
Legal notice:
Copyright (c) 2002-2004 Secure Computer Group. University of A Coruna
Copyright (c) 2004 dotpi.com Information Technologies S.L.
Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of the authors.
If you wish to reprint the whole or any part of this alert in any
other medium other than electronically, please contact the authors
for explicit written permission at the following e-mail addresses:
(scg at udc.es) and (info at dotpi.com).
Disclaimer: The information in the advisory is believed to be
accurate at the time of publishing based on currently available
information. Use of the information constitutes acceptance for use
in an AS IS condition.
There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information.
_____________________________________________________________________