ID

VAR-200511-0356


CVE

CVE-2005-3489


TITLE

Asus Video Security Buffer overflow vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200511-111

DESCRIPTION

Buffer overflow in Asus Video Security 3.5.0.0 and earlier, when using authorization, allows remote attackers to execute arbitrary code via a long username/password string. Asus VideoSecurity Online is prone to a buffer overflow in the authentication mechanism of the included Web server. This issue only exists if authentication is enabled on the Web server. The Web server included with Asus VideoSecurity Online is not enabled by default. This vulnerability is reported to affect Asus VideoSecurity Online 3.5.0 and earlier. VideoSecurity is a powerful video surveillance software. TITLE: Asus VideoSecurity Online Two Vulnerabilities SECUNIA ADVISORY ID: SA17419 VERIFY ADVISORY: http://secunia.com/advisories/17419/ CRITICAL: Moderately critical IMPACT: Unknown, Exposure of sensitive information WHERE: >From remote SOFTWARE: Asus VideoSecurity Online 3.x http://secunia.com/product/6043/ DESCRIPTION: Luigi Auriemma has reported two vulnerabilities in Asus VideoSecurity Online, where one has an unknown impact, and the other can be exploited by malicious people to disclose sensitive information. 1) A boundary error in the authorisation handling can be exploited to cause a buffer overflow by sending a specially crafted request to the web server. 2) An input validation error in the request handling can be exploited to disclose the content of arbitrary files via directory traversal attacks. The vulnerabilities have been reported in version 3.5.0.0 and prior. Other versions may also be affected. PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/asusvsbugs-adv.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-3489 // BID: 15279 // VULHUB: VHN-14698 // PACKETSTORM: 41249

AFFECTED PRODUCTS

vendor:asusmodel:video security onlinescope:lteversion:3.5.0.0

Trust: 1.0

vendor:asusmodel:video security onlinescope:eqversion:3.5.0.0

Trust: 0.6

vendor:asusmodel:videosecurity onlinescope:eqversion:3.5

Trust: 0.3

sources: BID: 15279 // CNNVD: CNNVD-200511-111 // NVD: CVE-2005-3489

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-3489
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200511-111
value: HIGH

Trust: 0.6

VULHUB: VHN-14698
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-3489
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-14698
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-14698 // CNNVD: CNNVD-200511-111 // NVD: CVE-2005-3489

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-3489

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200511-111

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200511-111

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-14698

EXTERNAL IDS

db:BIDid:15279

Trust: 2.0

db:SECUNIAid:17419

Trust: 1.8

db:VUPENid:ADV-2005-2289

Trust: 1.7

db:OSVDBid:20457

Trust: 1.7

db:NVDid:CVE-2005-3489

Trust: 1.7

db:CNNVDid:CNNVD-200511-111

Trust: 0.7

db:FULLDISCid:20051102 BUFFER-OVERFLOW AND DIRECTORY TRAVERSAL IN ASUS

Trust: 0.6

db:SEEBUGid:SSVID-80095

Trust: 0.1

db:EXPLOIT-DBid:26460

Trust: 0.1

db:VULHUBid:VHN-14698

Trust: 0.1

db:PACKETSTORMid:41249

Trust: 0.1

sources: VULHUB: VHN-14698 // BID: 15279 // PACKETSTORM: 41249 // CNNVD: CNNVD-200511-111 // NVD: CVE-2005-3489

REFERENCES

url:http://aluigi.altervista.org/adv/asusvsbugs-adv.txt

Trust: 1.8

url:http://www.securityfocus.com/bid/15279

Trust: 1.7

url:http://www.osvdb.org/20457

Trust: 1.7

url:http://secunia.com/advisories/17419

Trust: 1.7

url:http://www.vupen.com/english/advisories/2005/2289

Trust: 1.1

url:http://marc.info/?l=full-disclosure&m=113096055302614&w=2

Trust: 1.0

url:http://www.frsirt.com/english/advisories/2005/2289

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=full-disclosure&m=113096055302614&w=2

Trust: 0.6

url:http://www.asus.com/products1.aspx?l1=2&share=icon/12

Trust: 0.3

url:/archive/1/415640

Trust: 0.3

url:http://marc.info/?l=full-disclosure&m=113096055302614&w=2

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/17419/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/6043/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-14698 // BID: 15279 // PACKETSTORM: 41249 // CNNVD: CNNVD-200511-111 // NVD: CVE-2005-3489

CREDITS

Discovery credited to Luigi Auriemma <aluigi@autistici.org>.

Trust: 0.9

sources: BID: 15279 // CNNVD: CNNVD-200511-111

SOURCES

db:VULHUBid:VHN-14698
db:BIDid:15279
db:PACKETSTORMid:41249
db:CNNVDid:CNNVD-200511-111
db:NVDid:CVE-2005-3489

LAST UPDATE DATE

2024-08-14T14:42:12.640000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-14698date:2016-10-18T00:00:00
db:BIDid:15279date:2005-11-02T00:00:00
db:CNNVDid:CNNVD-200511-111date:2005-11-15T00:00:00
db:NVDid:CVE-2005-3489date:2016-10-18T03:35:48.467

SOURCES RELEASE DATE

db:VULHUBid:VHN-14698date:2005-11-04T00:00:00
db:BIDid:15279date:2005-11-02T00:00:00
db:PACKETSTORMid:41249date:2005-11-03T23:53:58
db:CNNVDid:CNNVD-200511-111date:2005-11-03T00:00:00
db:NVDid:CVE-2005-3489date:2005-11-04T00:02:00