ID

VAR-200507-0043


CVE

CVE-2005-2136


TITLE

Raritan DominionSX ConsoleServer Weak security mechanism vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200507-018

DESCRIPTION

Raritan Dominion SX (DSX) Console Servers DSX16, DSX32, DSX4, DSX8, and DSXA-48 set (1) world-readable permissions for /etc/shadow and (2) world-writable permissions for /bin/busybox, which allows local users to obtain hashed passwords or execute arbitrary code as other users. Raritan Dominion SX is reportedly prone to multiple vulnerabilities. Reportedly, the server contains two default accounts that are not protected with a password. This can allow a remote attacker to gain unauthorized access to the server. Another issue can allow an attacker to potentially gain elevated privileges on an affected computer as the shadow password file is world readable. Raritan Dominion SX16, SX32, SX4, SX8, and SXA-48 are reportedly vulnerable. The researcher responsible for reporting these issues has stated that DSX32 running firmware version 2.4.6 was tested and is vulnerable to these issues. This BID will be updated when more details are available. Raritan Dominion SX Console Server is a set of serial device management software. Raritan Dominion SX (DSX) Console Servers DSX16, DSX32, DSX4, DSX8, and DSXA-48 have weak security mechanisms. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Dominion SX Insecure File Permission Security Issues SECUNIA ADVISORY ID: SA15853 VERIFY ADVISORY: http://secunia.com/advisories/15853/ CRITICAL: Less critical IMPACT: Manipulation of data, Exposure of sensitive information WHERE: Local system OPERATING SYSTEM: Dominion SX http://secunia.com/product/5300/ DESCRIPTION: Dirk Wetter has reported two security issues in Dominion SX, which can be exploited by malicious, local users to disclose sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges. 1) The default file permission of "/etc/shadow" is set to world-readable, which makes it possible to gain knowledge of the root user's password hash. 2) The default file permission of "/bin/busybox" is set to world-writable. This can be exploited to move or delete the file and potentially execute arbitrary code with another user's privileges by replacing it with a malicious file. The security issues have been reported in DSX4, DSX8, DSX16, DSX32, and DSXA-48. SOLUTION: Apply updated firmware. http://www.raritan.com/support/sup_upgrades.aspx PROVIDED AND/OR DISCOVERED BY: Dirk Wetter ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-2136 // BID: 14084 // VULHUB: VHN-13345 // PACKETSTORM: 38332

AFFECTED PRODUCTS

vendor:raritanmodel:dominion sx32scope:eqversion:2.4.6

Trust: 1.3

vendor:raritanmodel:dominion sxa-48scope:eqversion: -

Trust: 1.0

vendor:raritanmodel:dominion sx8scope:eqversion: -

Trust: 1.0

vendor:raritanmodel:dominion sx4scope:eqversion: -

Trust: 1.0

vendor:raritanmodel:dominion sx16scope:eqversion: -

Trust: 1.0

vendor:raritanmodel:dominionscope:eqversion:sx32_2.4.6_firmware

Trust: 0.6

vendor:raritanmodel:dominionscope:eqversion:sx32

Trust: 0.6

vendor:raritanmodel:dominionscope:eqversion:sx8

Trust: 0.6

vendor:raritanmodel:dominionscope:eqversion:sxa-48

Trust: 0.6

vendor:raritanmodel:dominionscope:eqversion:sx16

Trust: 0.6

vendor:raritanmodel:dominionscope:eqversion:sx4

Trust: 0.6

vendor:raritanmodel:dominion sxa-48scope: - version: -

Trust: 0.3

vendor:raritanmodel:dominion sx8scope: - version: -

Trust: 0.3

vendor:raritanmodel:dominion sx4scope: - version: -

Trust: 0.3

vendor:raritanmodel:dominion sx32scope: - version: -

Trust: 0.3

vendor:raritanmodel:dominion sx16scope: - version: -

Trust: 0.3

sources: BID: 14084 // CNNVD: CNNVD-200507-018 // NVD: CVE-2005-2136

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-2136
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200507-018
value: MEDIUM

Trust: 0.6

VULHUB: VHN-13345
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2005-2136
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-13345
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-13345 // CNNVD: CNNVD-200507-018 // NVD: CVE-2005-2136

PROBLEMTYPE DATA

problemtype:CWE-863

Trust: 1.0

sources: NVD: CVE-2005-2136

THREAT TYPE

local

Trust: 0.7

sources: PACKETSTORM: 38332 // CNNVD: CNNVD-200507-018

TYPE

Design Error

Trust: 0.9

sources: BID: 14084 // CNNVD: CNNVD-200507-018

PATCH

title:Raritan DominionSX ConsoleServer Repair Measures for Weak Security Mechanism Vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=234905

Trust: 0.6

sources: CNNVD: CNNVD-200507-018

EXTERNAL IDS

db:BIDid:14084

Trust: 2.0

db:SECUNIAid:15853

Trust: 1.8

db:NVDid:CVE-2005-2136

Trust: 1.7

db:CNNVDid:CNNVD-200507-018

Trust: 0.7

db:VULHUBid:VHN-13345

Trust: 0.1

db:PACKETSTORMid:38332

Trust: 0.1

sources: VULHUB: VHN-13345 // BID: 14084 // PACKETSTORM: 38332 // CNNVD: CNNVD-200507-018 // NVD: CVE-2005-2136

REFERENCES

url:http://www.securityfocus.com/bid/14084

Trust: 1.7

url:http://seclists.org/lists/bugtraq/2005/jun/0251.html

Trust: 1.7

url:http://secunia.com/advisories/15853

Trust: 1.7

url:http://www.raritan.com/products/serial_console/dominion_sx/dom_sx/prd_cms_index.aspx?currpg=prd_cms_index&name=dominion%20sx&content_category=1&overview_flag=y&features_flag=y&spec_flag=y&support_flag

Trust: 0.3

url:/archive/1/403589

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/15853/

Trust: 0.1

url:http://secunia.com/product/5300/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.raritan.com/support/sup_upgrades.aspx

Trust: 0.1

sources: VULHUB: VHN-13345 // BID: 14084 // PACKETSTORM: 38332 // CNNVD: CNNVD-200507-018 // NVD: CVE-2005-2136

CREDITS

Discovery is credited to Dr. Dirk Wetter.

Trust: 0.9

sources: BID: 14084 // CNNVD: CNNVD-200507-018

SOURCES

db:VULHUBid:VHN-13345
db:BIDid:14084
db:PACKETSTORMid:38332
db:CNNVDid:CNNVD-200507-018
db:NVDid:CVE-2005-2136

LAST UPDATE DATE

2024-08-14T15:45:41.904000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-13345date:2008-09-05T00:00:00
db:BIDid:14084date:2005-06-28T00:00:00
db:CNNVDid:CNNVD-200507-018date:2023-04-26T00:00:00
db:NVDid:CVE-2005-2136date:2023-04-25T17:27:31.373

SOURCES RELEASE DATE

db:VULHUBid:VHN-13345date:2005-07-05T00:00:00
db:BIDid:14084date:2005-06-28T00:00:00
db:PACKETSTORMid:38332date:2005-07-01T04:46:03
db:CNNVDid:CNNVD-200507-018date:2005-07-05T00:00:00
db:NVDid:CVE-2005-2136date:2005-07-05T04:00:00