ID

VAR-200711-0143


CVE

CVE-2007-6096


TITLE

Ingate Firewall and SIParator Vulnerable to reading plaintext passwords

Trust: 0.8

sources: JVNDB: JVNDB-2007-004666

DESCRIPTION

Ingate Firewall before 4.6.0 and SIParator before 4.6.0 use cleartext storage for passwords of "administrators with less privileges," which might allow attackers to read these passwords via unknown vectors. Ingate Firewall and SIParator products are prone to multiple vulnerabilities that include buffer-overflow, information-disclosure, and denial-of-service issues. An attacker may access sensitive information, cause denial-of-service conditions, or potentially execute arbitrary code. Versions prior to Ingate Firewall 4.6.0 and Ingate SIParator 4.6.0 are vulnerable. Both Ingate Firewall and SIParator are enterprise-level hardware firewall devices. Sensitive information disclosure vulnerabilities exist in Ingate Firewall and SIParator. The password of the administrator \"administration\" account is stored in plain text, which may cause malicious attackers to obtain the password information of the management account through unknown means. ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Ingate Firewall and SIParator Multiple Vulnerabilities SECUNIA ADVISORY ID: SA27688 VERIFY ADVISORY: http://secunia.com/advisories/27688/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: Ingate Firewall 4.x http://secunia.com/product/4050/ Ingate SIParator 4.x http://secunia.com/product/5687/ DESCRIPTION: Some vulnerabilities and security issues have been reported in Ingate Firewall and SIParator, which potentially can be exploited by malicious people or users to cause a DoS (Denial of Service) or gain knowledge of sensitive information, or by malicious people to compromise a vulnerable system. 1) A boundary error in libsrtp can be exploited to cause a buffer overflow. 2) An error in the SRTP component when processing an overly large RTCP index could cause a kernel crash. 3) An error when processing IPsec phase two proposals without PFS could cause the IPSec module to crash. 4) An error in the SIP component when using Remote NAT Traversal could allow user's registrations to conflict and messages to be sent to the wrong user. Other issues have also been reported, which may have security impacts. SOLUTION: Update to version 4.6.0. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.ingate.com/relnote-460.php ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-6096 // JVNDB: JVNDB-2007-004666 // BID: 26486 // VULHUB: VHN-29458 // PACKETSTORM: 61048

AFFECTED PRODUCTS

vendor:ingatemodel:siparatorscope:lteversion:4.5.2

Trust: 1.0

vendor:ingatemodel:firewallscope:lteversion:4.5.2

Trust: 1.0

vendor:ingatemodel:siparatorscope:eqversion:4.5.2

Trust: 0.9

vendor:ingatemodel:firewallscope:eqversion:4.5.2

Trust: 0.9

vendor:ingatemodel:firewallscope:ltversion:4.6.0

Trust: 0.8

vendor:ingatemodel:siparatorscope:ltversion:4.6.0

Trust: 0.8

vendor:ingatemodel:siparatorscope:eqversion:4.5.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.4

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.3.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4

Trust: 0.3

vendor:ingatemodel:firewalllscope:eqversion:4.4

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.5.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.4.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.4

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.1.3

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.3.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2

Trust: 0.3

vendor:ingatemodel:siparatorscope:neversion:4.6

Trust: 0.3

vendor:ingatemodel:firewallscope:neversion:4.6

Trust: 0.3

sources: BID: 26486 // JVNDB: JVNDB-2007-004666 // CNNVD: CNNVD-200711-317 // NVD: CVE-2007-6096

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-6096
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-6096
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200711-317
value: MEDIUM

Trust: 0.6

VULHUB: VHN-29458
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-6096
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-29458
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-29458 // JVNDB: JVNDB-2007-004666 // CNNVD: CNNVD-200711-317 // NVD: CVE-2007-6096

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-29458 // JVNDB: JVNDB-2007-004666 // NVD: CVE-2007-6096

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200711-317

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-200711-317

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-004666

PATCH

title:Ingate Firewallurl:http://www.ingate.com/firewalls.php

Trust: 0.8

sources: JVNDB: JVNDB-2007-004666

EXTERNAL IDS

db:NVDid:CVE-2007-6096

Trust: 2.8

db:BIDid:26486

Trust: 2.0

db:SECUNIAid:27688

Trust: 1.8

db:OSVDBid:42171

Trust: 1.7

db:JVNDBid:JVNDB-2007-004666

Trust: 0.8

db:CNNVDid:CNNVD-200711-317

Trust: 0.7

db:VULHUBid:VHN-29458

Trust: 0.1

db:PACKETSTORMid:61048

Trust: 0.1

sources: VULHUB: VHN-29458 // BID: 26486 // JVNDB: JVNDB-2007-004666 // PACKETSTORM: 61048 // CNNVD: CNNVD-200711-317 // NVD: CVE-2007-6096

REFERENCES

url:http://www.ingate.com/relnote-460.php

Trust: 2.1

url:http://www.securityfocus.com/bid/26486

Trust: 1.7

url:http://osvdb.org/42171

Trust: 1.7

url:http://secunia.com/advisories/27688

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6096

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-6096

Trust: 0.8

url:http://www.ingate.com/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/4050/

Trust: 0.1

url:http://secunia.com/product/5687/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://secunia.com/advisories/27688/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-29458 // BID: 26486 // JVNDB: JVNDB-2007-004666 // PACKETSTORM: 61048 // CNNVD: CNNVD-200711-317 // NVD: CVE-2007-6096

CREDITS

Ingate Systems

Trust: 0.6

sources: CNNVD: CNNVD-200711-317

SOURCES

db:VULHUBid:VHN-29458
db:BIDid:26486
db:JVNDBid:JVNDB-2007-004666
db:PACKETSTORMid:61048
db:CNNVDid:CNNVD-200711-317
db:NVDid:CVE-2007-6096

LAST UPDATE DATE

2024-11-23T22:03:48.180000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-29458date:2008-11-15T00:00:00
db:BIDid:26486date:2007-12-18T20:06:00
db:JVNDBid:JVNDB-2007-004666date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200711-317date:2007-11-23T00:00:00
db:NVDid:CVE-2007-6096date:2024-11-21T00:39:21.040

SOURCES RELEASE DATE

db:VULHUBid:VHN-29458date:2007-11-22T00:00:00
db:BIDid:26486date:2007-11-16T00:00:00
db:JVNDBid:JVNDB-2007-004666date:2012-09-25T00:00:00
db:PACKETSTORMid:61048date:2007-11-20T16:17:55
db:CNNVDid:CNNVD-200711-317date:2007-11-21T00:00:00
db:NVDid:CVE-2007-6096date:2007-11-22T00:46:00