ID

VAR-200604-0489


CVE

CVE-2006-2045


TITLE

IP3 Networks NetAccess NA75 Information disclosure vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200604-511

DESCRIPTION

The (1) shadow password file in na-img-4.0.34.bin for the IP3 Networks NetAccess NA75 has world readable permissions, which allows local users to view encrypted passwords; and the (2) NetAccess database file has world readable and writable permissions, which allows local users to view sensitive information and modify data. IP3 Networks NetAccess NA75 devices are susceptible to multiple local vulnerabilities: - A command-injection vulnerability due to insufficient input-sanitization of user-supplied commands. This issue allows attackers to execute arbitrary shell commands in the underlying UNIX-based operating system. - An encrypted-password information-disclosure vulnerability. This issue may aid attackers in brute-force password-guessing attacks. - An insecure default-permissions vulnerability. This issue allows attackers to access or corrupt potentially sensitive information. These issues are present in version 4.0.34 of the device's firmware; other versions may also be affected. TITLE: IP3 Networks NA75 SQL Injection Vulnerability and Weaknesses SECUNIA ADVISORY ID: SA19818 VERIFY ADVISORY: http://secunia.com/advisories/19818/ CRITICAL: Less critical IMPACT: Security Bypass, Manipulation of data, Exposure of sensitive information, Privilege escalation WHERE: >From local network OPERATING SYSTEM: IP3 Networks NA75 http://secunia.com/product/9602/ DESCRIPTION: Ralph Moonen has reported a vulnerability and some weaknesses in IP3 Networks NA75, which can be exploited by malicious, local users to potentially gain escalated privileges and disclose or manipulate sensitive information, or by malicious people to conduct SQL injection attacks. 1) Some input passed in the web interface is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Example: * The password field during login. 2) Some input validation errors in the command line interface can be exploited to inject arbitrary shell commands via the "`" backtick character. 4) The database file is stored with world-readable and world-writable permissions. SOLUTION: Apply patch available from the vendor. http://www.ip3.com/supportoverview.htm PROVIDED AND/OR DISCOVERED BY: Ralph Moonen ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2006-2045 // BID: 17698 // VULHUB: VHN-18153 // PACKETSTORM: 45748

AFFECTED PRODUCTS

vendor:ip3model:netaccess 75scope:eqversion:4.0.34_firmware

Trust: 1.6

vendor:ip3model:networks na75scope:eqversion:4.0.34

Trust: 0.3

sources: BID: 17698 // CNNVD: CNNVD-200604-511 // NVD: CVE-2006-2045

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2045
value: LOW

Trust: 1.0

CNNVD: CNNVD-200604-511
value: LOW

Trust: 0.6

VULHUB: VHN-18153
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2006-2045
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-18153
severity: LOW
baseScore: 3.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-18153 // CNNVD: CNNVD-200604-511 // NVD: CVE-2006-2045

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-2045

THREAT TYPE

local

Trust: 1.0

sources: BID: 17698 // PACKETSTORM: 45748 // CNNVD: CNNVD-200604-511

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200604-511

EXTERNAL IDS

db:BIDid:17698

Trust: 2.0

db:SECUNIAid:19818

Trust: 1.8

db:NVDid:CVE-2006-2045

Trust: 1.7

db:VUPENid:ADV-2006-1540

Trust: 1.7

db:XFid:26110

Trust: 0.6

db:XFid:26109

Trust: 0.6

db:XFid:3

Trust: 0.6

db:BUGTRAQid:20060424 MULTIPLE VULNERABILITIES IN IP3 NETWORKS 'NETACCESS' NA75 APPLIANCE

Trust: 0.6

db:CNNVDid:CNNVD-200604-511

Trust: 0.6

db:VULHUBid:VHN-18153

Trust: 0.1

db:PACKETSTORMid:45748

Trust: 0.1

sources: VULHUB: VHN-18153 // BID: 17698 // PACKETSTORM: 45748 // CNNVD: CNNVD-200604-511 // NVD: CVE-2006-2045

REFERENCES

url:http://www.securityfocus.com/bid/17698

Trust: 1.7

url:http://secunia.com/advisories/19818

Trust: 1.7

url:http://www.securityfocus.com/archive/1/432007/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/1540

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26110

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26109

Trust: 1.1

url:http://www.securityfocus.com/archive/1/archive/1/432007/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/26110

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/26109

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/1540

Trust: 0.6

url:http://ip3networks.com/na75.htm

Trust: 0.3

url:http://www.ip3.com/

Trust: 0.3

url:/archive/1/432007

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.ip3.com/supportoverview.htm

Trust: 0.1

url:http://secunia.com/product/9602/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/19818/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-18153 // BID: 17698 // PACKETSTORM: 45748 // CNNVD: CNNVD-200604-511 // NVD: CVE-2006-2045

CREDITS

Ralph Moonen reported these vulnerabilities.

Trust: 0.9

sources: BID: 17698 // CNNVD: CNNVD-200604-511

SOURCES

db:VULHUBid:VHN-18153
db:BIDid:17698
db:PACKETSTORMid:45748
db:CNNVDid:CNNVD-200604-511
db:NVDid:CVE-2006-2045

LAST UPDATE DATE

2024-08-14T13:08:19.674000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-18153date:2018-10-18T00:00:00
db:BIDid:17698date:2006-04-26T20:56:00
db:CNNVDid:CNNVD-200604-511date:2006-04-28T00:00:00
db:NVDid:CVE-2006-2045date:2018-10-18T16:37:49.647

SOURCES RELEASE DATE

db:VULHUBid:VHN-18153date:2006-04-26T00:00:00
db:BIDid:17698date:2006-04-25T00:00:00
db:PACKETSTORMid:45748date:2006-04-27T21:57:26
db:CNNVDid:CNNVD-200604-511date:2006-04-26T00:00:00
db:NVDid:CVE-2006-2045date:2006-04-26T20:06:00