lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 6 Mar 2013 12:14:11 -0600
From: Just Bugs <sometimesbugs@...il.com>
To: bugtraq@...urityfocus.com
Subject: Verax NMS Password Replay Attack (CVE-2013-1351)

Verax NMS Password Replay Attack (CVE-2013-1351)

I. BACKGROUND
----------------------
Verax NMS provides a service-oriented, unified
management & monitoring of networks, applications
and infrastructure enabling quick problem detection,
root-cause analysis, reporting and automating recovery,
reducing costs and shortening downtimes of IT service delivery.

Source: http://www.veraxsystems.com/en/products/nms

II. DESCRIPTION
----------------------
The primary client-side UI component of Verax NMS is a
flash component named clientMain.swf. In addition to
the Flash UI, Verax NMS uses AMF remoting for client/server
communications.

As part of the login process, when a user logs in to the
application, two parameters (username and password) are passed to
the authenticateUser operation, which is part of the userService
destination. Before this information is sent to the server, the
password is encrypted client-side using an implementation of RSA.
Due to the fact that the private and public keys are hardcoded into
clientMain.swf the encrypted password could be captured and replayed
against the service by an attacker.

III. AFFECTED PRODUCTS
----------------------
All versions of Verax NMS prior to 2.1.0 are vulnerable.

IV. RECOMMENDATION
----------------------
Users should upgrade to version 2.1.0 of Verax NMS.

V. CREDIT
----------------------
This vulnerability was discovered by Andrew Brooks.\

VI. REFERENCES
----------------------
CVE-2013-1351
http://download.veraxsystems.com/download/nms-2.1.0-release-notes.txt

VII. TIMELINE
----------------------
1/10/2013 - Vendor notified
1/11/2013 - Vendor acknowledges bug report
2/20/2013 - Vulnerability remediated and pushed to mainline

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ