ID

VAR-200501-0046


CVE

CVE-2004-1023


TITLE

Kerio Multiple software Weak security mechanism vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200501-129

DESCRIPTION

Kerio Winroute Firewall before 6.0.9, ServerFirewall before 1.0.1, and MailServer before 6.0.5, when installed on Windows based systems, do not modify the ACLs for critical files, which allows local users with Power Users privileges to modify programs, install malicious DLLs in the plug-ins folder, and modify XML files related to configuration. Kerio Mailserver is prone to a local security vulnerability. Kerio is a security software company that offers a variety of security software. ______________________________________________________________________ Secure Computer Group - University of A Coruna http://research.tic.udc.es/scg/ -- x -- dotpi.com Information Technologies Research Labs http://www.dotpi.com ______________________________________________________________________ ID: #20041214-2 Document title: Insecure default file system permissions on Microsoft versions of Kerio Software Document revision: 1.0 Coordinated release date: 2004/12/14 Vendor Acknowledge date: 2004/11/10 Reported date: 2004/11/08 CVE Name: CAN-2004-1023 Other references: N/A ______________________________________________________________________ Summary: Impact: Privilege escalation System sofware tampering Trojan injection Second-stage attack vector Alter configuration files Rating/Severity: Low Recommendation: Update to latest version Enforce file system ACLs Vendor: Kerio Technologies Inc. Affected software: Kerio WinRoute Firewall (all versions) Kerio ServerFirewall (all versions) Kerio MailServer (all windows versions) Updates/Patches: Yes (see below) ______________________________________________________________________ General Information: 1. Executive summary: ------------------ As a result of its collaboration relationship the Secure Computer Group (SCG) along with dotpi.com Research Labs have determined the following security issue on some Kerio Software. Kerio WinRoute Firewall, Kerio ServerFirewall and Kerio MailServer are installed by default under 'Program Files' system folder. No change is done to the ACLs after the installation process. System administrators should enforce ACL security settings in order solve this problem. It is also highly recommended to verify this settings as part of the planning, installation, hardening and auditing processes. New versions of the software solve this an other minor problems so it is upgrade its highly recommended. 2. Technical details: ------------------ Following the latest trends and approaches to responsible disclosure, SCG and dotpi.com are going to withhold details of this flaw for three months. Full details will be published on 2005/03/14. This three month window will allow system administrators the time needed to obtain the patch before the details are released to the general public. 3. Risk Assessment factors: ------------------------ The attacker would need local interactive access to the installation directory. Remote access is also possible but default system settings do not make this easy. The most risky scenarios are the ones in which the server machine is shared among two or more users or those situations where Kerio service management have been delegated to a third party any other than local or domain system administrator. Special care should be taken on such environments and every step of the project: design, planning, deployment and management should consider this security issues. Privilege escalation, system and software tampering and the ability to alter service configuration are all real issues and all of them can be used as a second stage attack vector. 4. Solutions and recommendations: ------------------------------ Enforce the file system ACLs and/or upgrade to the latest versions: o Kerio Winroute Firewall 6.0.9 o Kerio ServerFirewall 1.0.1 o Kerio MailServer 6.0.5 As in any other case, follow, as much as possible, the Industry 'Best Practices' on Planning, Deployment and Operation on this kind of services. 5. Common Vulnerabilities and Exposures (CVE) project: --------------------------------------------------- The Common Vulnerabilities and Exposures (CVE) project has assigned the name CAN-2004-1023 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. ______________________________________________________________________ Acknowledgements: 1. Special thanks to Vladimir Toncar and Pavel Dobry and the whole Technical Team from Kerio Technologies (support at kerio.com) for their quick response and professional handling on this issue. 3. The whole Research Lab at dotpi.com and specially to Carlos Veira for his leadership and support. 3. Secure Computer Group at University of A Coruna (scg at udc.es), and specially to Antonino Santos del Riego powering new research paths at University of a Coruna. ______________________________________________________________________ Credits: Javier Munoz (Secure Computer Group) is credited with this discovery. ______________________________________________________________________ Related Links: [1] Kerio Technologies Inc. http://www.kerio.com/ [2] Kerio WinRoute Firewall Downloads & Updates http://www.kerio.com/kwf_download.html [3] Kerio ServerFirewall Downloads & Updates http://www.kerio.com/ksf_download.html [4] Kerio MailServer Downloads & Updates http://www.kerio.com/kms_download.html [5] Secure Computer Group. University of A Coruna http://research.tic.udc.es/scg/ [6] Secure Computer Group. Updated advisory http://research.tic.udc.es/scg/advisories/20041214-2.txt [7] dotpi.com Information Technologies S.L. http://www.dotpi.com/ [8] dotpi.com Research Labs http://www.dotpi.com/research/ ______________________________________________________________________ Legal notice: Copyright (c) 2002-2004 Secure Computer Group. University of A Coruna Copyright (c) 2004 dotpi.com Information Technologies S.L. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of the authors. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please contact the authors for explicit written permission at the following e-mail addresses: (scg at udc.es) and (info at dotpi.com). Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. _____________________________________________________________________

Trust: 1.35

sources: NVD: CVE-2004-1023 // BID: 90583 // VULHUB: VHN-9453 // PACKETSTORM: 35332

AFFECTED PRODUCTS

vendor:keriomodel:winroute firewallscope:eqversion:6.0.3

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.2

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.1

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.0

Trust: 1.9

vendor:keriomodel:serverfirewallscope:eqversion:1.0.0

Trust: 1.9

vendor:keriomodel:mailserverscope:eqversion:6.0.4

Trust: 1.9

vendor:keriomodel:mailserverscope:eqversion:6.0.3

Trust: 1.9

vendor:keriomodel:mailserverscope:eqversion:6.0.2

Trust: 1.9

vendor:keriomodel:mailserverscope:eqversion:6.0.1

Trust: 1.9

vendor:keriomodel:mailserverscope:eqversion:6.0.0

Trust: 1.9

vendor:keriomodel:winroute firewallscope:eqversion:6.0.8

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.5

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.4

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.7

Trust: 1.3

vendor:keriomodel:winroute firewallscope:eqversion:6.0.6

Trust: 1.3

sources: BID: 90583 // CNNVD: CNNVD-200501-129 // NVD: CVE-2004-1023

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2004-1023
value: LOW

Trust: 1.0

CNNVD: CNNVD-200501-129
value: LOW

Trust: 0.6

VULHUB: VHN-9453
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2004-1023
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-9453
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-9453 // CNNVD: CNNVD-200501-129 // NVD: CVE-2004-1023

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2004-1023

THREAT TYPE

local

Trust: 0.9

sources: BID: 90583 // CNNVD: CNNVD-200501-129

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200501-129

EXTERNAL IDS

db:NVDid:CVE-2004-1023

Trust: 2.1

db:XFid:18471

Trust: 0.9

db:BUGTRAQid:20041214 [CAN-2004-1023] INSECURE DEFAULT FILE SYSTEM PERMISSIONS ON MICROSOFT VERSIONS OF KERIO SOFTWARE

Trust: 0.6

db:CNNVDid:CNNVD-200501-129

Trust: 0.6

db:BIDid:90583

Trust: 0.4

db:PACKETSTORMid:35332

Trust: 0.2

db:VULHUBid:VHN-9453

Trust: 0.1

sources: VULHUB: VHN-9453 // BID: 90583 // PACKETSTORM: 35332 // CNNVD: CNNVD-200501-129 // NVD: CVE-2004-1023

REFERENCES

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/18471

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=110305387813002&w=2

Trust: 1.0

url:http://marc.theaimsgroup.com/?l=bugtraq&m=110305387813002&w=2

Trust: 0.9

url:http://xforce.iss.net/xforce/xfdb/18471

Trust: 0.9

url:http://marc.info/?l=bugtraq&m=110305387813002&w=2

Trust: 0.1

url:http://www.kerio.com/

Trust: 0.1

url:http://www.dotpi.com/

Trust: 0.1

url:http://www.dotpi.com

Trust: 0.1

url:http://www.kerio.com/kwf_download.html

Trust: 0.1

url:http://www.kerio.com/ksf_download.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2004-1023

Trust: 0.1

url:http://www.kerio.com/kms_download.html

Trust: 0.1

url:http://research.tic.udc.es/scg/advisories/20041214-2.txt

Trust: 0.1

url:http://cve.mitre.org),

Trust: 0.1

url:http://www.dotpi.com/research/

Trust: 0.1

url:http://research.tic.udc.es/scg/

Trust: 0.1

sources: VULHUB: VHN-9453 // BID: 90583 // PACKETSTORM: 35332 // CNNVD: CNNVD-200501-129 // NVD: CVE-2004-1023

CREDITS

Unknown

Trust: 0.3

sources: BID: 90583

SOURCES

db:VULHUBid:VHN-9453
db:BIDid:90583
db:PACKETSTORMid:35332
db:CNNVDid:CNNVD-200501-129
db:NVDid:CVE-2004-1023

LAST UPDATE DATE

2024-08-14T15:25:41.786000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-9453date:2017-07-11T00:00:00
db:BIDid:90583date:2005-01-10T00:00:00
db:CNNVDid:CNNVD-200501-129date:2006-09-27T00:00:00
db:NVDid:CVE-2004-1023date:2017-07-11T01:30:40.277

SOURCES RELEASE DATE

db:VULHUBid:VHN-9453date:2005-01-10T00:00:00
db:BIDid:90583date:2005-01-10T00:00:00
db:PACKETSTORMid:35332date:2004-12-30T07:19:43
db:CNNVDid:CNNVD-200501-129date:2005-01-10T00:00:00
db:NVDid:CVE-2004-1023date:2005-01-10T05:00:00