ID

VAR-200607-0396


CVE

CVE-2006-3838


TITLE

eIQnetworks Enterprise Security Analyzer Syslog server buffer overflow

Trust: 0.8

sources: CERT/CC: VU#513068

DESCRIPTION

Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) before 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, (c) Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and possibly other products, allow remote attackers to execute arbitrary code via long (1) DELTAINTERVAL, (2) LOGFOLDER, (3) DELETELOGS, (4) FWASERVER, (5) SYSLOGPUBLICIP, (6) GETFWAIMPORTLOG, (7) GETFWADELTA, (8) DELETERDEPDEVICE, (9) COMPRESSRAWLOGFILE, (10) GETSYSLOGFIREWALLS, (11) ADDPOLICY, and (12) EDITPOLICY commands to the Syslog daemon (syslogserver.exe); (13) GUIADDDEVICE, (14) ADDDEVICE, and (15) DELETEDEVICE commands to the Topology server (Topology.exe); the (15) LICMGR_ADDLICENSE command to the License Manager (EnterpriseSecurityAnalyzer.exe); the (16) TRACE and (17) QUERYMONITOR commands to the Monitoring agent (Monitoring.exe); and possibly other vectors related to the Syslog daemon (syslogserver.exe). Used in the following products eIQnetworks Enterprise Security Analyzer (ESA) Is Syslog daemon (syslogserver.exe) A stack-based buffer overflow vulnerability exists due to a flaw in handling. During the processing of long arguments to the LICMGR_ADDLICENSE command a classic stack based buffer overflow occurs. Authentication is not required to exploit this vulnerability.The specific flaw exists within the Syslog daemon, syslogserver.exe, during the processing of long strings transmitted to the listening TCP port. The vulnerability is not exposed over UDP. The default configuration does not expose the open TCP port. eIQnetworks Enterprise Security Analyzer (ESA) is an enterprise-level security management platform. The following commands are known to be affected by this vulnerability:  DELTAINTERVAL  LOGFOLDER  DELETELOGS  FWASERVER  SYSLOGPUBLICIP  GETFWAIMPORTLOG  GETFWADELTA  DELETERDEPDEVICE  COMPRESSRAWLOGFILE  GETSYSLOGFIREWALLS  ADDPOLICY  EDITPOLICY. OEM vendors' versions prior to 4.6 are also vulnerable. Authentication is not required to exploit these vulnerabilities. Upon connecting to this port the user is immediately prompted for a password. A custom string comparison loop is used to validate the supplied password against the hard-coded value "eiq2esa?", where the question mark represents any alpha-numeric character. Issuing the command "HELP" reveals a number of documented commands: --------------------------------------------------------- Usage: QUERYMONITOR: to fetch events for a particular monitor QUERYMONITOR&<user>&<monid>&timer QUERYEVENTCOUNT or QEC: to get latest event counts RESETEVENTCOUNT or REC: to reset event counts REC&[ALL] or REC&dev1,dev2, STATUS: Display the running status of all the threads TRACE: TRACE&ip or hostname&. TRACE&OFF& will turn off the trace FLUSH: reset monitors as though the hour has changed ALRT-OFF and ALRT-ON: toggle the life of alerts-thread. RECV-OFF and RECV-ON: toggle the life of event-collection thread. EM-OFF and EM-ON toggle event manager DMON-OFF and DMON-ON toggle device event monitoring HMON-OFF and HMON-ON toggle host event monitoring NFMON-OFF and NFMON-ON toggle netflow event monitoring HPMON-OFF and HPMON-ON toggle host perf monitoring X or EXIT: to close the session --------------------------------------------------------- Supplying a long string to the TRACE command results in an overflow of the global variable at 0x004B1788. A neighboring global variable, 116 bytes after the overflowed variable, contains a file output stream pointer that is written to every 30 seconds by a garbage collection thread. The log message can be influenced and therefore this is a valid exploit vector, albeit complicated. A trivial exploit vector exists within the parsing of the actual command at the following equivalent API call: sscanf(socket_data, "%[^&]&%[^&]&", 60_byte_stack_var, global_var); Because no explicit check is made for the exact command "TRACE", an attacker can abuse this call to sscanf by passing a long suffix to the TRACE command that is free of the field terminating character, '&'. This vector is trivial to exploit. The service will accept up to approximately 16K of data from unauthenticated clients which is later parsed, in a similar fashion to above, in search of the delimiting character '&'. Various trivial vectors of exploitation exist, for example, through the QUERYMONITOR command. -- Vendor Response: eIQnetworks has issued an update to correct this vulnerability. More details can be found at: http://www.eiqnetworks.com/products/enterprisesecurity/ EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf -- Disclosure Timeline: 2006.05.10 - Vulnerability reported to vendor 2006.07.31 - Digital Vaccine released to TippingPoint customers 2006.08.08 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by Pedram Amini, TippingPoint Security Research Team. -- About the TippingPoint Security Research Team (TSRT): The TippingPoint Security Research Team (TSRT) consists of industry recognized security researchers that apply their cutting-edge engineering, reverse engineering and analysis talents in our daily operations. More information about the team is available at: http://www.tippingpoint.com/security The by-product of these efforts fuels the creation of vulnerability filters that are automatically delivered to our customers' intrusion prevention systems through the Digital Vaccine(R) service. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 5.22

sources: NVD: CVE-2006-3838 // CERT/CC: VU#513068 // JVNDB: JVNDB-2006-002905 // ZDI: ZDI-06-024 // ZDI: ZDI-06-023 // CNVD: CNVD-2006-5703 // BID: 19164 // BID: 19163 // BID: 19424 // PACKETSTORM: 48592 // PACKETSTORM: 49114 // PACKETSTORM: 48591

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2006-5703

AFFECTED PRODUCTS

vendor:eiqnetworksmodel:enterprise security analyzerscope: - version: -

Trust: 1.4

vendor:eiqnetworksmodel:enterprise security analyzerscope:lteversion:2.4.0

Trust: 1.0

vendor:astaromodel: - scope: - version: -

Trust: 0.8

vendor:fortinetmodel: - scope: - version: -

Trust: 0.8

vendor:secure computing network security divisionmodel: - scope: - version: -

Trust: 0.8

vendor:top layermodel: - scope: - version: -

Trust: 0.8

vendor:viking interworksmodel: - scope: - version: -

Trust: 0.8

vendor:eiqnetworksmodel: - scope: - version: -

Trust: 0.8

vendor:eiqnetworksmodel:enterprise security analyzerscope:ltversion:2.5.0

Trust: 0.8

vendor:nonemodel: - scope: - version: -

Trust: 0.6

vendor:eiqnetworksmodel:enterprise security analyzerscope:eqversion:2.1

Trust: 0.6

vendor:eiqnetworksmodel:enterprise security analyzerscope:eqversion:2.0

Trust: 0.6

vendor:eiqnetworksmodel:enterprise security analyzerscope:neversion:2.5

Trust: 0.6

vendor:eiqnetworksmodel:enterprise security analyzerscope:eqversion:2.4.0

Trust: 0.6

vendor:topmodel:layer network security analyzerscope:eqversion:0

Trust: 0.3

vendor:securecomputingmodel:g2 security reporterscope:eqversion:0

Trust: 0.3

vendor:sanminamodel:viking multi-log managerscope:eqversion:0

Trust: 0.3

vendor:fortinetmodel:fortireporterscope:eqversion:0

Trust: 0.3

vendor:astaromodel:report managerscope:eqversion:0

Trust: 0.3

vendor:ipolicymodel:security reporterscope:neversion:0

Trust: 0.3

vendor:eiqnetworksmodel:enterprise security analyzerscope:eqversion:2.5

Trust: 0.3

sources: CERT/CC: VU#513068 // ZDI: ZDI-06-024 // ZDI: ZDI-06-023 // CNVD: CNVD-2006-5703 // BID: 19164 // BID: 19163 // BID: 19424 // JVNDB: JVNDB-2006-002905 // CNNVD: CNNVD-200607-454 // NVD: CVE-2006-3838

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-3838
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#513068
value: 34.79

Trust: 0.8

NVD: CVE-2006-3838
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200607-454
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2006-3838
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: CERT/CC: VU#513068 // JVNDB: JVNDB-2006-002905 // CNNVD: CNNVD-200607-454 // NVD: CVE-2006-3838

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2006-002905 // NVD: CVE-2006-3838

THREAT TYPE

network

Trust: 0.9

sources: BID: 19164 // BID: 19163 // BID: 19424

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 19164 // BID: 19163 // BID: 19424

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-002905

PATCH

title:Top Pageurl:http://www.eiqnetworks.com/

Trust: 0.8

sources: JVNDB: JVNDB-2006-002905

EXTERNAL IDS

db:NVDid:CVE-2006-3838

Trust: 5.6

db:CERT/CCid:VU#513068

Trust: 3.2

db:ZDIid:ZDI-06-023

Trust: 3.1

db:SECUNIAid:21215

Trust: 2.4

db:SECUNIAid:21214

Trust: 2.4

db:SECUNIAid:21213

Trust: 2.4

db:SECUNIAid:21211

Trust: 2.4

db:SECUNIAid:21217

Trust: 2.4

db:ZDIid:ZDI-06-024

Trust: 2.3

db:BIDid:19164

Trust: 1.9

db:BIDid:19163

Trust: 1.9

db:BIDid:19167

Trust: 1.6

db:BIDid:19165

Trust: 1.6

db:VUPENid:ADV-2006-3007

Trust: 1.6

db:VUPENid:ADV-2006-2985

Trust: 1.6

db:VUPENid:ADV-2006-3010

Trust: 1.6

db:VUPENid:ADV-2006-3006

Trust: 1.6

db:VUPENid:ADV-2006-3008

Trust: 1.6

db:VUPENid:ADV-2006-3009

Trust: 1.6

db:OSVDBid:27527

Trust: 1.6

db:OSVDBid:27526

Trust: 1.6

db:OSVDBid:27525

Trust: 1.6

db:OSVDBid:27528

Trust: 1.6

db:SECUNIAid:21218

Trust: 1.6

db:SECTRACKid:1016580

Trust: 1.6

db:AUSCERTid:ESB-2006.0517

Trust: 0.8

db:JVNDBid:JVNDB-2006-002905

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-052

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-053

Trust: 0.7

db:CNVDid:CNVD-2006-5703

Trust: 0.6

db:BUGTRAQid:20060808 TSRT-06-07: EIQNETWORKS ENTERPRISE SECURITY ANALYZER MONITORING AGENT BUFFER OVERFLOW VULNERABILITIES

Trust: 0.6

db:BUGTRAQid:20060725 TSRT-06-03: EIQNETWORKS ENTERPRISE SECURITY ANALYZER SYSLOG SERVER BUFFER OVERFLOW VULNERABILITIES

Trust: 0.6

db:BUGTRAQid:20060725 ZDI-06-023: EIQNETWORKS ENTERPRISE SECURITY ANALYZER SYSLOG SERVER BUFFER OVERFLOW VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20060725 ZDI-06-024: EIQNETWORKS ENTERPRISE SECURITY ANALYZER LICENSE MANAGER BUFFER OVERFLOW VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20060725 TSRT-06-04: EIQNETWORKS ENTERPRISE SECURITY ANALYZER TOPOLOGY SERVER BUFFER OVERFLOW VULNERABILITY

Trust: 0.6

db:XFid:27954

Trust: 0.6

db:XFid:27951

Trust: 0.6

db:XFid:27950

Trust: 0.6

db:XFid:27952

Trust: 0.6

db:XFid:27953

Trust: 0.6

db:CNNVDid:CNNVD-200607-454

Trust: 0.6

db:BIDid:19424

Trust: 0.3

db:PACKETSTORMid:48592

Trust: 0.1

db:PACKETSTORMid:49114

Trust: 0.1

db:PACKETSTORMid:48591

Trust: 0.1

sources: CERT/CC: VU#513068 // ZDI: ZDI-06-024 // ZDI: ZDI-06-023 // CNVD: CNVD-2006-5703 // BID: 19164 // BID: 19163 // BID: 19424 // JVNDB: JVNDB-2006-002905 // PACKETSTORM: 48592 // PACKETSTORM: 49114 // PACKETSTORM: 48591 // CNNVD: CNNVD-200607-454 // NVD: CVE-2006-3838

REFERENCES

url:http://www.eiqnetworks.com/products/enterprisesecurity/enterprisesecurityanalyzer/esa_2.5.0_release_notes.pdf

Trust: 3.3

url:http://www.zerodayinitiative.com/advisories/zdi-06-023.html

Trust: 2.4

url:http://www.kb.cert.org/vuls/id/513068

Trust: 2.4

url:http://www.tippingpoint.com/security/advisories/tsrt-06-07.html

Trust: 2.0

url:http://www.zerodayinitiative.com/advisories/zdi-06-024.html

Trust: 1.6

url:http://www.tippingpoint.com/security/advisories/tsrt-06-04.html

Trust: 1.6

url:http://www.tippingpoint.com/security/advisories/tsrt-06-03.html

Trust: 1.6

url:http://www.securityfocus.com/bid/19167

Trust: 1.6

url:http://www.securityfocus.com/bid/19165

Trust: 1.6

url:http://www.securityfocus.com/bid/19164

Trust: 1.6

url:http://www.securityfocus.com/bid/19163

Trust: 1.6

url:http://www.osvdb.org/27528

Trust: 1.6

url:http://www.osvdb.org/27527

Trust: 1.6

url:http://www.osvdb.org/27526

Trust: 1.6

url:http://www.osvdb.org/27525

Trust: 1.6

url:http://securitytracker.com/id?1016580

Trust: 1.6

url:http://secunia.com/advisories/21218

Trust: 1.6

url:http://secunia.com/advisories/21217

Trust: 1.6

url:http://secunia.com/advisories/21215

Trust: 1.6

url:http://secunia.com/advisories/21214

Trust: 1.6

url:http://secunia.com/advisories/21213

Trust: 1.6

url:http://secunia.com/advisories/21211

Trust: 1.6

url:http://archive.cert.uni-stuttgart.de/bugtraq/2006/08/msg00152.html

Trust: 1.6

url:http://www.securityfocus.com/archive/1/441195/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/441197/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/441198/100/0/threaded

Trust: 1.0

url:http://www.securityfocus.com/archive/1/441200/100/0/threaded

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/2985

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3006

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3007

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3008

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3009

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3010

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/27950

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/27951

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/27952

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/27953

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/27954

Trust: 1.0

url:http://www.zerodayinitiative.com/advisories/tsrt-06-03.html

Trust: 0.9

url:http://www.eiqnetworks.com/products/enterprisesecurityanalyzer.shtml

Trust: 0.9

url:http://www.eiqnetworks.com/support/security_advisory.pdf

Trust: 0.8

url:http://secunia.com/advisories/21211/

Trust: 0.8

url:http://secunia.com/advisories/21213/

Trust: 0.8

url:http://secunia.com/advisories/21214/

Trust: 0.8

url:http://secunia.com/advisories/21215/

Trust: 0.8

url:http://secunia.com/advisories/21217/

Trust: 0.8

url:http://www.auscert.org.au/6544

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3838

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-3838

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/2985

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/27954

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/27953

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/27952

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/27951

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/27950

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/441200/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/441198/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/441197/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/441195/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3010

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3009

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3008

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3007

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3006

Trust: 0.6

url:/archive/1/441528

Trust: 0.3

url:/archive/1/441198

Trust: 0.3

url:/archive/1/441195

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2006-3838

Trust: 0.3

url:http://www.tippingpoint.com/security

Trust: 0.3

url:http://www.eiqnetworks.com/products/enterprisesecurity/

Trust: 0.3

url:http://www.tippingpoint.com

Trust: 0.3

url:http://secunia.com/

Trust: 0.2

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.2

url:http://www.zerodayinitiative.com/advisories/tsrt-06-04.html

Trust: 0.1

sources: CERT/CC: VU#513068 // BID: 19164 // BID: 19163 // BID: 19424 // JVNDB: JVNDB-2006-002905 // PACKETSTORM: 48592 // PACKETSTORM: 49114 // PACKETSTORM: 48591 // CNNVD: CNNVD-200607-454 // NVD: CVE-2006-3838

CREDITS

Titon, JxT, KF and the rest of Bastard Labs

Trust: 1.4

sources: ZDI: ZDI-06-024 // ZDI: ZDI-06-023

SOURCES

db:CERT/CCid:VU#513068
db:ZDIid:ZDI-06-024
db:ZDIid:ZDI-06-023
db:CNVDid:CNVD-2006-5703
db:BIDid:19164
db:BIDid:19163
db:BIDid:19424
db:JVNDBid:JVNDB-2006-002905
db:PACKETSTORMid:48592
db:PACKETSTORMid:49114
db:PACKETSTORMid:48591
db:CNNVDid:CNNVD-200607-454
db:NVDid:CVE-2006-3838

LAST UPDATE DATE

2024-11-07T22:30:45.895000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#513068date:2007-01-18T00:00:00
db:ZDIid:ZDI-06-024date:2006-07-25T00:00:00
db:ZDIid:ZDI-06-023date:2006-07-25T00:00:00
db:CNVDid:CNVD-2006-5703date:2006-07-25T00:00:00
db:BIDid:19164date:2008-02-01T20:17:00
db:BIDid:19163date:2006-09-05T22:28:00
db:BIDid:19424date:2006-09-05T22:43:00
db:JVNDBid:JVNDB-2006-002905date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200607-454date:2007-04-16T00:00:00
db:NVDid:CVE-2006-3838date:2018-10-17T21:31:46.783

SOURCES RELEASE DATE

db:CERT/CCid:VU#513068date:2006-08-01T00:00:00
db:ZDIid:ZDI-06-024date:2006-07-25T00:00:00
db:ZDIid:ZDI-06-023date:2006-07-25T00:00:00
db:CNVDid:CNVD-2006-5703date:2006-07-25T00:00:00
db:BIDid:19164date:2006-07-26T00:00:00
db:BIDid:19163date:2006-07-26T00:00:00
db:BIDid:19424date:2006-08-08T00:00:00
db:JVNDBid:JVNDB-2006-002905date:2012-12-20T00:00:00
db:PACKETSTORMid:48592date:2006-07-26T09:16:16
db:PACKETSTORMid:49114date:2006-08-18T05:54:32
db:PACKETSTORMid:48591date:2006-07-26T09:15:27
db:CNNVDid:CNNVD-200607-454date:2006-07-26T00:00:00
db:NVDid:CVE-2006-3838date:2006-07-27T01:04:00