lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 21 May 2003 18:40:06 +0100
From: "Brewis, Mark" <mark.brewis@....com>
To: "'bugtraq@...urityfocus.com'" <bugtraq@...urityfocus.com>
Subject: Compaq Insight Manager - related to Bugtraq ID 2500


Another one out of the back catalogue, seen again today.

Version:

Compaq Insight Manager Version 5.0 or below

Issue:

The Proxy vulnerability identified in Bugtraq ID 2500, and the patch
produced by Compaq for that vuln. does not prevent ftp proxying.

On a host denying http proxying, it is possible to ftp over http to a third
party host, using CIM as the proxy.  You can't put or get (probably because
there isn't an ftp server on CIM to buffer the transfer), but you can
browse, allowing for a targeted attack.


Again, I talked to Compaq about this over a year ago, and they appeared to
work on the principle that the problem went away in the newest version of
CIM.  I'd forgotten about it until today, when I saw  a CIM/CMA installation
again.

Advice - keep upgrading and patching, or stop using CIM.

Mark Brewis

Security Consultant
EDS
Information Assurance Group
Wavendon Tower
Milton Keynes
Buckinghamshire
MK17 8LX.

Tel:	+44 (0)1908 28 4234/4013
Fax:	+44 (0)1908 28 4393
E@:	mark.brewis@....com

This email is confidential and intended solely for the use of the
individual(s) to whom it is addressed. Any views or opinions presented are
solely those of the author.  If you are not the intended recipient, be
advised that you have received this email in error and that any use,
dissemination, forwarding, printing, or copying of this mail is strictly
prohibited.

Precautions have been taken to minimise the risk of transmitting software
viruses, but you must carry out your own virus checks on any attachment to
this message. No liability can be accepted for any loss or damage caused by
software viruses.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ