ID

VAR-200711-0140


CVE

CVE-2007-6093


TITLE

Ingate Firewall Such as SRTP Service disruption in implementation (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-004663

DESCRIPTION

The SRTP implementation in Ingate Firewall before 4.6.0 and SIParator before 4.6.0 allows remote attackers to cause a denial of service (kernel crash) via an RTCP index that is "much more than expected.". Ingate Firewall and SIParator products are prone to multiple vulnerabilities that include buffer-overflow, information-disclosure, and denial-of-service issues. An attacker may access sensitive information, cause denial-of-service conditions, or potentially execute arbitrary code. Versions prior to Ingate Firewall 4.6.0 and Ingate SIParator 4.6.0 are vulnerable. Both Ingate Firewall and SIParator are enterprise-level hardware firewall devices. ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Ingate Firewall and SIParator Multiple Vulnerabilities SECUNIA ADVISORY ID: SA27688 VERIFY ADVISORY: http://secunia.com/advisories/27688/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: Ingate Firewall 4.x http://secunia.com/product/4050/ Ingate SIParator 4.x http://secunia.com/product/5687/ DESCRIPTION: Some vulnerabilities and security issues have been reported in Ingate Firewall and SIParator, which potentially can be exploited by malicious people or users to cause a DoS (Denial of Service) or gain knowledge of sensitive information, or by malicious people to compromise a vulnerable system. 1) A boundary error in libsrtp can be exploited to cause a buffer overflow. 3) An error when processing IPsec phase two proposals without PFS could cause the IPSec module to crash. 4) An error in the SIP component when using Remote NAT Traversal could allow user's registrations to conflict and messages to be sent to the wrong user. 5) Passwords of administrators with less privileges are stored in clear text. Other issues have also been reported, which may have security impacts. SOLUTION: Update to version 4.6.0. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.ingate.com/relnote-460.php ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-6093 // JVNDB: JVNDB-2007-004663 // BID: 26486 // VULHUB: VHN-29455 // PACKETSTORM: 61048

AFFECTED PRODUCTS

vendor:ingatemodel:siparatorscope:lteversion:4.5.2

Trust: 1.0

vendor:ingatemodel:firewallscope:lteversion:4.5.2

Trust: 1.0

vendor:ingatemodel:siparatorscope:eqversion:4.5.2

Trust: 0.9

vendor:ingatemodel:firewallscope:eqversion:4.5.2

Trust: 0.9

vendor:ingatemodel:firewallscope:ltversion:4.6.0

Trust: 0.8

vendor:ingatemodel:siparatorscope:ltversion:4.6.0

Trust: 0.8

vendor:ingatemodel:siparatorscope:eqversion:4.5.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.4

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.3.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4

Trust: 0.3

vendor:ingatemodel:firewalllscope:eqversion:4.4

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.5.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.4.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.4

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.1.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.3.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:neversion:4.6

Trust: 0.3

vendor:ingatemodel:firewallscope:neversion:4.6

Trust: 0.3

sources: BID: 26486 // JVNDB: JVNDB-2007-004663 // CNNVD: CNNVD-200711-329 // NVD: CVE-2007-6093

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-6093
value: HIGH

Trust: 1.0

NVD: CVE-2007-6093
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200711-329
value: HIGH

Trust: 0.6

VULHUB: VHN-29455
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-6093
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-29455
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-29455 // JVNDB: JVNDB-2007-004663 // CNNVD: CNNVD-200711-329 // NVD: CVE-2007-6093

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-29455 // JVNDB: JVNDB-2007-004663 // NVD: CVE-2007-6093

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200711-329

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200711-329

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-004663

PATCH

title:Ingate Firewallurl:http://www.ingate.com/firewalls.php

Trust: 0.8

sources: JVNDB: JVNDB-2007-004663

EXTERNAL IDS

db:NVDid:CVE-2007-6093

Trust: 2.8

db:BIDid:26486

Trust: 2.0

db:SECUNIAid:27688

Trust: 1.8

db:OSVDBid:42174

Trust: 1.7

db:JVNDBid:JVNDB-2007-004663

Trust: 0.8

db:CNNVDid:CNNVD-200711-329

Trust: 0.6

db:VULHUBid:VHN-29455

Trust: 0.1

db:PACKETSTORMid:61048

Trust: 0.1

sources: VULHUB: VHN-29455 // BID: 26486 // JVNDB: JVNDB-2007-004663 // PACKETSTORM: 61048 // CNNVD: CNNVD-200711-329 // NVD: CVE-2007-6093

REFERENCES

url:http://www.ingate.com/relnote-460.php

Trust: 2.1

url:http://www.securityfocus.com/bid/26486

Trust: 1.7

url:http://osvdb.org/42174

Trust: 1.7

url:http://secunia.com/advisories/27688

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6093

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-6093

Trust: 0.8

url:http://www.ingate.com/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/4050/

Trust: 0.1

url:http://secunia.com/product/5687/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://secunia.com/advisories/27688/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-29455 // BID: 26486 // JVNDB: JVNDB-2007-004663 // PACKETSTORM: 61048 // CNNVD: CNNVD-200711-329 // NVD: CVE-2007-6093

CREDITS

Ingate Systems

Trust: 0.6

sources: CNNVD: CNNVD-200711-329

SOURCES

db:VULHUBid:VHN-29455
db:BIDid:26486
db:JVNDBid:JVNDB-2007-004663
db:PACKETSTORMid:61048
db:CNNVDid:CNNVD-200711-329
db:NVDid:CVE-2007-6093

LAST UPDATE DATE

2024-11-23T22:03:48.289000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-29455date:2008-11-15T00:00:00
db:BIDid:26486date:2007-12-18T20:06:00
db:JVNDBid:JVNDB-2007-004663date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200711-329date:2007-11-23T00:00:00
db:NVDid:CVE-2007-6093date:2024-11-21T00:39:20.610

SOURCES RELEASE DATE

db:VULHUBid:VHN-29455date:2007-11-22T00:00:00
db:BIDid:26486date:2007-11-16T00:00:00
db:JVNDBid:JVNDB-2007-004663date:2012-09-25T00:00:00
db:PACKETSTORMid:61048date:2007-11-20T16:17:55
db:CNNVDid:CNNVD-200711-329date:2007-11-21T00:00:00
db:NVDid:CVE-2007-6093date:2007-11-22T00:46:00