ID

VAR-200604-0488


CVE

CVE-2006-2044


TITLE

IP3 Networks NetAccess NA75 Multiple Local Vulnerabilities

Trust: 0.9

sources: BID: 17698 // CNNVD: CNNVD-200604-517

DESCRIPTION

na-img-4.0.34.bin for the IP3 Networks NetAccess NA75 has a default username of admin and a default password of admin. IP3 Networks NetAccess NA75 devices are susceptible to multiple local vulnerabilities: - A command-injection vulnerability due to insufficient input-sanitization of user-supplied commands. This issue allows attackers to execute arbitrary shell commands in the underlying UNIX-based operating system. - An encrypted-password information-disclosure vulnerability. This issue may aid attackers in brute-force password-guessing attacks. - An insecure default-permissions vulnerability. This issue allows attackers to access or corrupt potentially sensitive information. These issues are present in version 4.0.34 of the device's firmware; other versions may also be affected. TITLE: IP3 Networks NA75 SQL Injection Vulnerability and Weaknesses SECUNIA ADVISORY ID: SA19818 VERIFY ADVISORY: http://secunia.com/advisories/19818/ CRITICAL: Less critical IMPACT: Security Bypass, Manipulation of data, Exposure of sensitive information, Privilege escalation WHERE: >From local network OPERATING SYSTEM: IP3 Networks NA75 http://secunia.com/product/9602/ DESCRIPTION: Ralph Moonen has reported a vulnerability and some weaknesses in IP3 Networks NA75, which can be exploited by malicious, local users to potentially gain escalated privileges and disclose or manipulate sensitive information, or by malicious people to conduct SQL injection attacks. 1) Some input passed in the web interface is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Example: * The password field during login. 2) Some input validation errors in the command line interface can be exploited to inject arbitrary shell commands via the "`" backtick character. 3) The shadow password file has world-readable permissions, which can be exploited to disclose other users' encrypted passwords. 4) The database file is stored with world-readable and world-writable permissions. SOLUTION: Apply patch available from the vendor. http://www.ip3.com/supportoverview.htm PROVIDED AND/OR DISCOVERED BY: Ralph Moonen ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2006-2044 // BID: 17698 // VULHUB: VHN-18152 // PACKETSTORM: 45748

AFFECTED PRODUCTS

vendor:ip3model:netaccess 75scope:eqversion:4.0.34

Trust: 1.6

vendor:ip3model:networks na75scope:eqversion:4.0.34

Trust: 0.3

sources: BID: 17698 // CNNVD: CNNVD-200604-517 // NVD: CVE-2006-2044

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2044
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200604-517
value: HIGH

Trust: 0.6

VULHUB: VHN-18152
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-2044
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-18152
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-18152 // CNNVD: CNNVD-200604-517 // NVD: CVE-2006-2044

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-2044

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200604-517

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200604-517

EXTERNAL IDS

db:BIDid:17698

Trust: 2.0

db:SECUNIAid:19818

Trust: 1.8

db:SREASONid:793

Trust: 1.7

db:VUPENid:ADV-2006-1540

Trust: 1.7

db:NVDid:CVE-2006-2044

Trust: 1.7

db:CNNVDid:CNNVD-200604-517

Trust: 0.7

db:BUGTRAQid:20060424 MULTIPLE VULNERABILITIES IN IP3 NETWORKS 'NETACCESS' NA75 APPLIANCE

Trust: 0.6

db:XFid:26112

Trust: 0.6

db:XFid:3

Trust: 0.6

db:VULHUBid:VHN-18152

Trust: 0.1

db:PACKETSTORMid:45748

Trust: 0.1

sources: VULHUB: VHN-18152 // BID: 17698 // PACKETSTORM: 45748 // CNNVD: CNNVD-200604-517 // NVD: CVE-2006-2044

REFERENCES

url:http://www.securityfocus.com/bid/17698

Trust: 1.7

url:http://secunia.com/advisories/19818

Trust: 1.7

url:http://securityreason.com/securityalert/793

Trust: 1.7

url:http://www.securityfocus.com/archive/1/432007/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/1540

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26112

Trust: 1.1

url:http://www.securityfocus.com/archive/1/archive/1/432007/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/26112

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/1540

Trust: 0.6

url:http://ip3networks.com/na75.htm

Trust: 0.3

url:http://www.ip3.com/

Trust: 0.3

url:/archive/1/432007

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.ip3.com/supportoverview.htm

Trust: 0.1

url:http://secunia.com/product/9602/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/19818/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-18152 // BID: 17698 // PACKETSTORM: 45748 // CNNVD: CNNVD-200604-517 // NVD: CVE-2006-2044

CREDITS

Ralph Moonen reported these vulnerabilities.

Trust: 0.9

sources: BID: 17698 // CNNVD: CNNVD-200604-517

SOURCES

db:VULHUBid:VHN-18152
db:BIDid:17698
db:PACKETSTORMid:45748
db:CNNVDid:CNNVD-200604-517
db:NVDid:CVE-2006-2044

LAST UPDATE DATE

2024-08-14T12:42:38.256000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-18152date:2018-10-18T00:00:00
db:BIDid:17698date:2006-04-26T20:56:00
db:CNNVDid:CNNVD-200604-517date:2006-04-27T00:00:00
db:NVDid:CVE-2006-2044date:2018-10-18T16:37:49.240

SOURCES RELEASE DATE

db:VULHUBid:VHN-18152date:2006-04-26T00:00:00
db:BIDid:17698date:2006-04-25T00:00:00
db:PACKETSTORMid:45748date:2006-04-27T21:57:26
db:CNNVDid:CNNVD-200604-517date:2006-04-26T00:00:00
db:NVDid:CVE-2006-2044date:2006-04-26T20:06:00