ID

VAR-200701-0557


CVE

CVE-2007-0188


TITLE

F5 Firepass Multiple Input Validation Vulnerabilities

Trust: 0.9

sources: BID: 21957 // CNNVD: CNNVD-200701-178

DESCRIPTION

F5 FirePass 5.4 through 5.5.1 does not properly enforce host access restrictions when a client uses a single integer (dword) representation of an IP address ("dotless IP address"), which allows remote authenticated users to connect to the FirePass administrator console and certain other network resources. FirePass A vulnerability exists that uses the management console and other network resources.By a remotely authenticated user FirePass The management console and other network resources may be used. F5 Firepass is prone to multiple input-validation vulnerabilities because the device fails to sufficiently sanitize user-supplied input. These issues include information-disclosure, security bypass, and cross-site scripting vulnerabilities. An attacker can exploit these issues to bypass security restrictions, to view sensitive information, and to steal cookie-based authentication credentials. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible

Trust: 1.98

sources: NVD: CVE-2007-0188 // JVNDB: JVNDB-2007-001371 // BID: 21957 // VULHUB: VHN-23550

AFFECTED PRODUCTS

vendor:f5model:firepassscope:eqversion:5.4

Trust: 1.6

vendor:f5model:firepassscope:eqversion:5.4.3

Trust: 1.6

vendor:f5model:firepassscope:eqversion:5.4.4

Trust: 1.6

vendor:f5model:firepassscope:eqversion:5.4.6

Trust: 1.6

vendor:f5model:firepassscope:eqversion:5.4.9

Trust: 1.6

vendor:f5model:firepassscope:eqversion:5.4.2

Trust: 1.6

vendor:f5model:firepassscope:eqversion:5.4.7

Trust: 1.6

vendor:f5model:firepassscope:eqversion:5.4.8

Trust: 1.6

vendor:f5model:firepassscope:eqversion:5.4.5

Trust: 1.6

vendor:f5model:firepassscope:eqversion:5.4.1

Trust: 1.6

vendor:f5model:firepassscope:eqversion:5.5

Trust: 1.0

vendor:f5model:firepassscope:eqversion:5.5.2

Trust: 1.0

vendor:f5model:firepassscope:eqversion:5.5.1

Trust: 1.0

vendor:f5model:firepassscope:eqversion:6.0

Trust: 1.0

vendor:f5model:firepassscope:eqversion:5.4 to 5.5.1

Trust: 0.8

vendor:ubuntumodel:linux sparcscope:eqversion:6.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:6.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:6.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:6.10

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:f5model:firepassscope: - version: -

Trust: 0.3

sources: BID: 21957 // JVNDB: JVNDB-2007-001371 // CNNVD: CNNVD-200701-178 // NVD: CVE-2007-0188

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0188
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-0188
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200701-178
value: MEDIUM

Trust: 0.6

VULHUB: VHN-23550
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-0188
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-23550
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-23550 // JVNDB: JVNDB-2007-001371 // CNNVD: CNNVD-200701-178 // NVD: CVE-2007-0188

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0188

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200701-178

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200701-178

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001371

PATCH

title:Top Pageurl:http://www.f5.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-001371

EXTERNAL IDS

db:NVDid:CVE-2007-0188

Trust: 2.5

db:BIDid:21957

Trust: 2.0

db:OSVDBid:32734

Trust: 1.7

db:SECUNIAid:23640

Trust: 1.7

db:JVNDBid:JVNDB-2007-001371

Trust: 0.8

db:CNNVDid:CNNVD-200701-178

Trust: 0.7

db:FULLDISCid:20070106 NNL-LABS & MNIN - F5 FIREPASS SECURITY ADVISORY

Trust: 0.6

db:VULHUBid:VHN-23550

Trust: 0.1

sources: VULHUB: VHN-23550 // BID: 21957 // JVNDB: JVNDB-2007-001371 // CNNVD: CNNVD-200701-178 // NVD: CVE-2007-0188

REFERENCES

url:http://www.mnin.org/advisories/2007_firepass.pdf

Trust: 2.0

url:http://www.securityfocus.com/bid/21957

Trust: 1.7

url:https://tech.f5.com/home/solutions/sol6922.html

Trust: 1.7

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051651.html

Trust: 1.7

url:http://www.osvdb.org/32734

Trust: 1.7

url:http://secunia.com/advisories/23640

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0188

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0188

Trust: 0.8

url:https://tech.f5.com/home/solutions/sol7005.html

Trust: 0.3

url:http://f5.com/products/firepass/

Trust: 0.3

sources: VULHUB: VHN-23550 // BID: 21957 // JVNDB: JVNDB-2007-001371 // CNNVD: CNNVD-200701-178 // NVD: CVE-2007-0188

CREDITS

Michael Ligh from mnin.org and Greg Sinclair from NNL-Labs are credited with the discovery of these vulnerabilities.

Trust: 0.9

sources: BID: 21957 // CNNVD: CNNVD-200701-178

SOURCES

db:VULHUBid:VHN-23550
db:BIDid:21957
db:JVNDBid:JVNDB-2007-001371
db:CNNVDid:CNNVD-200701-178
db:NVDid:CVE-2007-0188

LAST UPDATE DATE

2024-11-23T22:04:02.214000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-23550date:2008-09-05T00:00:00
db:BIDid:21957date:2007-01-25T16:28:00
db:JVNDBid:JVNDB-2007-001371date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200701-178date:2007-01-14T00:00:00
db:NVDid:CVE-2007-0188date:2024-11-21T00:25:12.340

SOURCES RELEASE DATE

db:VULHUBid:VHN-23550date:2007-01-12T00:00:00
db:BIDid:21957date:2007-01-09T00:00:00
db:JVNDBid:JVNDB-2007-001371date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200701-178date:2007-01-12T00:00:00
db:NVDid:CVE-2007-0188date:2007-01-12T05:04:00