ID

VAR-200608-0209


CVE

CVE-2006-4001


TITLE

Barracuda Spam Firewall contains hardcoded default login credentials

Trust: 0.8

sources: CERT/CC: VU#199348

DESCRIPTION

Login.pm in Barracuda Spam Firewall (BSF) 3.3.01.001 through 3.3.03.053 contains a hard-coded password for the guest account, which allows remote attackers to read sensitive information such as e-mail logs, and possibly e-mail contents and the admin password. Barracuda Spam Firewalls from version 3.3.01.001 to 3.3.02.053 have default login credentials that can not be modified by an administrator. Spam Firewall is prone to multiple vulnerabilities, including a directory-traversal issue, access-validation issue, and a remote command-execution issue. A remote attacker can exploit these issues to gain access to potentially sensitive information and execute commands in the context of the affected application. Versions 3.3.01.001 to 3.3.03.055 are vulnerable to these issues. Barracuda Spam Firewall is an integrated hardware and software spam solution for protecting mail servers. There is also a file disclosure vulnerability in Barracuda's preview_email.cgi script. This script was used to retrieve messages from Barracuda's local message database, but did not properly filter the file parameter passed through GET to limit file retrieval to the message database directory, resulting in access to any Web Server user accessible files from the web interface. In addition, it is possible to execute arbitrary commands using the pipe symbol (|). Although this script requires a valid user login, this restriction can be easily bypassed by combining the guest password vulnerability described above. ---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Barracuda Spam Firewall Information Disclosure and Default Account SECUNIA ADVISORY ID: SA21258 VERIFY ADVISORY: http://secunia.com/advisories/21258/ CRITICAL: Less critical IMPACT: Security Bypass, Exposure of system information, Exposure of sensitive information WHERE: >From local network OPERATING SYSTEM: Barracuda Spam Firewall http://secunia.com/product/4639/ DESCRIPTION: Greg Sinclair has reported a vulnerability and a security issue in Barracuda Spam Firewall, which can be exploited by malicious people to bypass certain security restrictions and disclose various information. 1) Input passed to the "file" parameter in preview_email.cgi is not properly verified, before it is used to view files. This can be exploited to disclose the contents of arbitrary files via directory traversal attacks (e.g. message logs). Example: https://[host]/cgi-bin/preview_email.cgi?file=/mail/mlog/../[file] Successful exploitation requires that the user has been authenticated. 2) A default guest account with a hard-coded password exists in Login.pm. This can be exploited to disclose various configuration and version information. A combination of the two issues can be exploited by a malicious person to disclose the contents of arbitrary files. The vulnerability and the security issue have been reported in firmware versions 3.3.01.001 through 3.3.03.053. SOLUTION: Update to firmware version 3.3.0.54. PROVIDED AND/OR DISCOVERED BY: Greg Sinclair ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.79

sources: NVD: CVE-2006-4001 // CERT/CC: VU#199348 // JVNDB: JVNDB-2006-001042 // BID: 19276 // VULHUB: VHN-20109 // PACKETSTORM: 48752

AFFECTED PRODUCTS

vendor:barracudamodel:spam firewallscope:eqversion:3.3.01.001

Trust: 1.6

vendor:barracudamodel:spam firewallscope:eqversion:3.3.03.055

Trust: 1.6

vendor:barracudamodel:spam firewallscope:eqversion:3.3.03.053

Trust: 1.6

vendor:barracudamodel: - scope: - version: -

Trust: 0.8

vendor:barracudamodel:spam firewallscope:eqversion:3.3.01.001 to 3.3.03.053

Trust: 0.8

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.03.055

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.03.053

Trust: 0.3

vendor:barracudamodel:networks barracuda spam firewallscope:eqversion:3.3.01.001

Trust: 0.3

sources: CERT/CC: VU#199348 // BID: 19276 // JVNDB: JVNDB-2006-001042 // CNNVD: CNNVD-200608-063 // NVD: CVE-2006-4001

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-4001
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#199348
value: 2.57

Trust: 0.8

NVD: CVE-2006-4001
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200608-063
value: HIGH

Trust: 0.6

VULHUB: VHN-20109
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-4001
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-20109
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#199348 // VULHUB: VHN-20109 // JVNDB: JVNDB-2006-001042 // CNNVD: CNNVD-200608-063 // NVD: CVE-2006-4001

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-4001

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200608-063

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200608-063

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-001042

PATCH

title:Top Pageurl:http://www.barracudanetworks.com/ns/

Trust: 0.8

sources: JVNDB: JVNDB-2006-001042

EXTERNAL IDS

db:NVDid:CVE-2006-4001

Trust: 2.8

db:SECUNIAid:21258

Trust: 2.6

db:BIDid:19276

Trust: 2.0

db:VUPENid:ADV-2006-3104

Trust: 1.7

db:CERT/CCid:VU#199348

Trust: 0.8

db:JVNDBid:JVNDB-2006-001042

Trust: 0.8

db:CNNVDid:CNNVD-200608-063

Trust: 0.7

db:XFid:28213

Trust: 0.6

db:BUGTRAQid:20060801 BARRACUDA VULNERABILITY: HARDCODED PASSWORD [NNL-20060801-01]

Trust: 0.6

db:BUGTRAQid:20060802 RE: BARRACUDA VULNERABILITY: HARDCODED PASSWORD [NNL-20060801-01]

Trust: 0.6

db:VULHUBid:VHN-20109

Trust: 0.1

db:PACKETSTORMid:48752

Trust: 0.1

sources: CERT/CC: VU#199348 // VULHUB: VHN-20109 // BID: 19276 // JVNDB: JVNDB-2006-001042 // PACKETSTORM: 48752 // CNNVD: CNNVD-200608-063 // NVD: CVE-2006-4001

REFERENCES

url:http://www.securityfocus.com/bid/19276

Trust: 1.7

url:http://secunia.com/advisories/21258

Trust: 1.7

url:http://www.barracudanetworks.com/ns/products/spam_overview.php

Trust: 1.1

url:http://www.securityfocus.com/archive/1/441857/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/442039/100/0/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/3104

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/28213

Trust: 1.1

url:http://secunia.com/advisories/21258/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4001

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4001

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/441857/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/28213

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/442039/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3104

Trust: 0.6

url:https://lists.grok.org.uk/mailman/listinfo/full-disclosure

Trust: 0.3

url:/archive/1/442249

Trust: 0.3

url:/archive/1/442132

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/4639/

Trust: 0.1

url:https://[host]/cgi-bin/preview_email.cgi?file=/mail/mlog/../[file]

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#199348 // VULHUB: VHN-20109 // BID: 19276 // JVNDB: JVNDB-2006-001042 // PACKETSTORM: 48752 // CNNVD: CNNVD-200608-063 // NVD: CVE-2006-4001

CREDITS

Greg Sinclair gssincla@nnlsoftware.com

Trust: 0.6

sources: CNNVD: CNNVD-200608-063

SOURCES

db:CERT/CCid:VU#199348
db:VULHUBid:VHN-20109
db:BIDid:19276
db:JVNDBid:JVNDB-2006-001042
db:PACKETSTORMid:48752
db:CNNVDid:CNNVD-200608-063
db:NVDid:CVE-2006-4001

LAST UPDATE DATE

2024-08-14T13:50:43.459000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#199348date:2006-08-29T00:00:00
db:VULHUBid:VHN-20109date:2018-10-17T00:00:00
db:BIDid:19276date:2016-07-06T12:19:00
db:JVNDBid:JVNDB-2006-001042date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200608-063date:2006-08-08T00:00:00
db:NVDid:CVE-2006-4001date:2018-10-17T21:32:46.440

SOURCES RELEASE DATE

db:CERT/CCid:VU#199348date:2006-08-24T00:00:00
db:VULHUBid:VHN-20109date:2006-08-05T00:00:00
db:BIDid:19276date:2006-08-01T00:00:00
db:JVNDBid:JVNDB-2006-001042date:2012-06-26T00:00:00
db:PACKETSTORMid:48752date:2006-08-03T03:35:36
db:CNNVDid:CNNVD-200608-063date:2006-08-04T00:00:00
db:NVDid:CVE-2006-4001date:2006-08-05T01:04:00