ID

VAR-200711-0142


CVE

CVE-2007-6095


TITLE

Ingate Firewall Such as SIP Vulnerability in receiving messages addressed to other users in components

Trust: 0.8

sources: JVNDB: JVNDB-2007-004665

DESCRIPTION

The SIP component in Ingate Firewall before 4.6.0 and SIParator before 4.6.0, when Remote NAT Traversal is employed, does not properly perform user registration and message distribution, which might allow remote authenticated users to receive messages intended for other users. Ingate Firewall and SIParator products are prone to multiple vulnerabilities that include buffer-overflow, information-disclosure, and denial-of-service issues. An attacker may access sensitive information, cause denial-of-service conditions, or potentially execute arbitrary code. Versions prior to Ingate Firewall 4.6.0 and Ingate SIParator 4.6.0 are vulnerable. Both Ingate Firewall and SIParator are enterprise-level hardware firewall devices. ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Ingate Firewall and SIParator Multiple Vulnerabilities SECUNIA ADVISORY ID: SA27688 VERIFY ADVISORY: http://secunia.com/advisories/27688/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: Ingate Firewall 4.x http://secunia.com/product/4050/ Ingate SIParator 4.x http://secunia.com/product/5687/ DESCRIPTION: Some vulnerabilities and security issues have been reported in Ingate Firewall and SIParator, which potentially can be exploited by malicious people or users to cause a DoS (Denial of Service) or gain knowledge of sensitive information, or by malicious people to compromise a vulnerable system. 1) A boundary error in libsrtp can be exploited to cause a buffer overflow. 2) An error in the SRTP component when processing an overly large RTCP index could cause a kernel crash. 3) An error when processing IPsec phase two proposals without PFS could cause the IPSec module to crash. 5) Passwords of administrators with less privileges are stored in clear text. Other issues have also been reported, which may have security impacts. SOLUTION: Update to version 4.6.0. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.ingate.com/relnote-460.php ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-6095 // JVNDB: JVNDB-2007-004665 // BID: 26486 // VULHUB: VHN-29457 // PACKETSTORM: 61048

AFFECTED PRODUCTS

vendor:ingatemodel:siparatorscope:lteversion:4.5.2

Trust: 1.0

vendor:ingatemodel:firewallscope:lteversion:4.5.2

Trust: 1.0

vendor:ingatemodel:siparatorscope:eqversion:4.5.2

Trust: 0.9

vendor:ingatemodel:firewallscope:eqversion:4.5.2

Trust: 0.9

vendor:ingatemodel:firewallscope:ltversion:4.6.0

Trust: 0.8

vendor:ingatemodel:siparatorscope:ltversion:4.6.0

Trust: 0.8

vendor:ingatemodel:siparatorscope:eqversion:4.5.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.4

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.3.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4

Trust: 0.3

vendor:ingatemodel:firewalllscope:eqversion:4.4

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.5.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.4.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.4

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.1.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.3.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:neversion:4.6

Trust: 0.3

vendor:ingatemodel:firewallscope:neversion:4.6

Trust: 0.3

sources: BID: 26486 // JVNDB: JVNDB-2007-004665 // CNNVD: CNNVD-200711-316 // NVD: CVE-2007-6095

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-6095
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-6095
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200711-316
value: MEDIUM

Trust: 0.6

VULHUB: VHN-29457
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-6095
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-29457
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-29457 // JVNDB: JVNDB-2007-004665 // CNNVD: CNNVD-200711-316 // NVD: CVE-2007-6095

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

problemtype:CWE-DesignError

Trust: 0.8

sources: VULHUB: VHN-29457 // JVNDB: JVNDB-2007-004665 // NVD: CVE-2007-6095

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200711-316

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-200711-316

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-004665

PATCH

title:Ingate Firewallurl:http://www.ingate.com/firewalls.php

Trust: 0.8

sources: JVNDB: JVNDB-2007-004665

EXTERNAL IDS

db:NVDid:CVE-2007-6095

Trust: 2.8

db:BIDid:26486

Trust: 2.0

db:SECUNIAid:27688

Trust: 1.8

db:OSVDBid:42172

Trust: 1.7

db:JVNDBid:JVNDB-2007-004665

Trust: 0.8

db:CNNVDid:CNNVD-200711-316

Trust: 0.7

db:VULHUBid:VHN-29457

Trust: 0.1

db:PACKETSTORMid:61048

Trust: 0.1

sources: VULHUB: VHN-29457 // BID: 26486 // JVNDB: JVNDB-2007-004665 // PACKETSTORM: 61048 // CNNVD: CNNVD-200711-316 // NVD: CVE-2007-6095

REFERENCES

url:http://www.ingate.com/relnote-460.php

Trust: 2.1

url:http://www.securityfocus.com/bid/26486

Trust: 1.7

url:http://osvdb.org/42172

Trust: 1.7

url:http://secunia.com/advisories/27688

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6095

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-6095

Trust: 0.8

url:http://www.ingate.com/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/4050/

Trust: 0.1

url:http://secunia.com/product/5687/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://secunia.com/advisories/27688/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-29457 // BID: 26486 // JVNDB: JVNDB-2007-004665 // PACKETSTORM: 61048 // CNNVD: CNNVD-200711-316 // NVD: CVE-2007-6095

CREDITS

Ingate Systems

Trust: 0.6

sources: CNNVD: CNNVD-200711-316

SOURCES

db:VULHUBid:VHN-29457
db:BIDid:26486
db:JVNDBid:JVNDB-2007-004665
db:PACKETSTORMid:61048
db:CNNVDid:CNNVD-200711-316
db:NVDid:CVE-2007-6095

LAST UPDATE DATE

2024-11-23T22:03:48.326000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-29457date:2008-11-15T00:00:00
db:BIDid:26486date:2007-12-18T20:06:00
db:JVNDBid:JVNDB-2007-004665date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200711-316date:2007-11-23T00:00:00
db:NVDid:CVE-2007-6095date:2024-11-21T00:39:20.903

SOURCES RELEASE DATE

db:VULHUBid:VHN-29457date:2007-11-22T00:00:00
db:BIDid:26486date:2007-11-16T00:00:00
db:JVNDBid:JVNDB-2007-004665date:2012-09-25T00:00:00
db:PACKETSTORMid:61048date:2007-11-20T16:17:55
db:CNNVDid:CNNVD-200711-316date:2007-11-21T00:00:00
db:NVDid:CVE-2007-6095date:2007-11-22T00:46:00