ID

VAR-200606-0512


CVE

CVE-2006-2838


TITLE

F-Secure Anti-Virus and Internet Gatekeeper Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2006-004021

DESCRIPTION

Buffer overflow in the web console in F-Secure Anti-Virus for Microsoft Exchange 6.40, and Internet Gatekeeper 6.40 through 6.42 and 6.50 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors. NOTE: By default, the connections are only allowed from the local host. F-Secure Anti-Virus is prone to a denial-of-service vulnerability. ---------------------------------------------------------------------- Want to join the Secunia Security Team? Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports. The vulnerability is caused due to an unspecified boundary error within the web console prior to authentication and can be exploited to cause a buffer overflow. Successful exploitation crashes the web console process and may potentially allow execution of arbitrary code. The criticality of the vulnerability therefore depends on how the web console has been configured to accept connections. SOLUTION: Update to a fixed version or apply hotfix. -- F-Secure Anti-Virus for Microsoft Exchange -- Apply hotfix for version 6.40: ftp://ftp.f-secure.com/support/hotfix/fsav-mse/fsavmse640-05.zip -- F-Secure Internet Gatekeeper -- Update to version 6.60 or apply hotfix (for version 6.50): ftp://ftp.f-secure.com/support/hotfix/fsig/fsigk650-01.zip PROVIDED AND/OR DISCOVERED BY: The vendor credits Mikko Korppi. ORIGINAL ADVISORY: http://www.f-secure.com/security/fsc-2006-3.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2006-2838 // JVNDB: JVNDB-2006-004021 // BID: 80162 // VULHUB: VHN-18946 // PACKETSTORM: 46921

AFFECTED PRODUCTS

vendor:f securemodel:internet gatekeeperscope:eqversion:6.50

Trust: 1.9

vendor:f securemodel:internet gatekeeperscope:eqversion:6.42

Trust: 1.9

vendor:f securemodel:internet gatekeeperscope:eqversion:6.41

Trust: 1.9

vendor:f securemodel:internet gatekeeperscope:eqversion:6.4

Trust: 1.9

vendor:f securemodel:f-secure anti-virusscope:eqversion:6.40

Trust: 1.6

vendor:f securemodel:f-secure anti-virusscope:eqversion:for microsoft exchange 6.40

Trust: 0.8

vendor:f securemodel:f-secure internet gatekeeperscope:eqversion:6.40 to 6.42

Trust: 0.8

vendor:f securemodel:f-secure internet gatekeeperscope:eqversion:6.50

Trust: 0.8

vendor:f securemodel:f-secure anti-virus ms exchangescope:eqversion:6.40

Trust: 0.3

sources: BID: 80162 // JVNDB: JVNDB-2006-004021 // CNNVD: CNNVD-200606-133 // NVD: CVE-2006-2838

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2838
value: HIGH

Trust: 1.0

NVD: CVE-2006-2838
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200606-133
value: HIGH

Trust: 0.6

VULHUB: VHN-18946
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-2838
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-18946
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-18946 // JVNDB: JVNDB-2006-004021 // CNNVD: CNNVD-200606-133 // NVD: CVE-2006-2838

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-2838

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200606-133

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200606-133

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-004021

PATCH

title:fsc-2006-3.shtmlurl:http://www.f-secure.com/security/fsc-2006-3.shtml

Trust: 0.8

title:id?1016197url:http://securitytracker.com/id?1016197

Trust: 0.8

title:20407url:http://secunia.com/advisories/20407

Trust: 0.8

sources: JVNDB: JVNDB-2006-004021

EXTERNAL IDS

db:NVDid:CVE-2006-2838

Trust: 2.8

db:SECTRACKid:1016197

Trust: 2.0

db:SECTRACKid:1016196

Trust: 2.0

db:SECUNIAid:20407

Trust: 1.8

db:VUPENid:ADV-2006-2076

Trust: 1.7

db:XFid:26799

Trust: 0.9

db:JVNDBid:JVNDB-2006-004021

Trust: 0.8

db:CNNVDid:CNNVD-200606-133

Trust: 0.7

db:BIDid:80162

Trust: 0.4

db:VULHUBid:VHN-18946

Trust: 0.1

db:PACKETSTORMid:46921

Trust: 0.1

sources: VULHUB: VHN-18946 // BID: 80162 // JVNDB: JVNDB-2006-004021 // PACKETSTORM: 46921 // CNNVD: CNNVD-200606-133 // NVD: CVE-2006-2838

REFERENCES

url:http://www.f-secure.com/security/fsc-2006-3.shtml

Trust: 2.1

url:http://securitytracker.com/id?1016196

Trust: 2.0

url:http://securitytracker.com/id?1016197

Trust: 2.0

url:http://secunia.com/advisories/20407

Trust: 1.7

url:http://www.vupen.com/english/advisories/2006/2076

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26799

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/26799

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2838

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-2838

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/2076

Trust: 0.6

url:http://secunia.com/product/454/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/3339/

Trust: 0.1

url:http://secunia.com/advisories/20407/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-18946 // BID: 80162 // JVNDB: JVNDB-2006-004021 // PACKETSTORM: 46921 // CNNVD: CNNVD-200606-133 // NVD: CVE-2006-2838

CREDITS

Unknown

Trust: 0.3

sources: BID: 80162

SOURCES

db:VULHUBid:VHN-18946
db:BIDid:80162
db:JVNDBid:JVNDB-2006-004021
db:PACKETSTORMid:46921
db:CNNVDid:CNNVD-200606-133
db:NVDid:CVE-2006-2838

LAST UPDATE DATE

2024-11-23T22:47:04.128000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-18946date:2017-07-20T00:00:00
db:BIDid:80162date:2006-06-06T00:00:00
db:JVNDBid:JVNDB-2006-004021date:2014-03-11T00:00:00
db:CNNVDid:CNNVD-200606-133date:2007-05-31T00:00:00
db:NVDid:CVE-2006-2838date:2024-11-21T00:12:12.660

SOURCES RELEASE DATE

db:VULHUBid:VHN-18946date:2006-06-06T00:00:00
db:BIDid:80162date:2006-06-06T00:00:00
db:JVNDBid:JVNDB-2006-004021date:2014-03-11T00:00:00
db:PACKETSTORMid:46921date:2006-06-01T21:29:25
db:CNNVDid:CNNVD-200606-133date:2006-06-06T00:00:00
db:NVDid:CVE-2006-2838date:2006-06-06T20:06:00