lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.21.0402181959270.22811-100000@clifton.zoomnet.net>
Date: Wed, 18 Feb 2004 21:29:41 -0500 (EST)
From: Keith Clifton <clifton@...mnet.net>
To: James Green <james@...althnet.co.uk>
Cc: bugtraq@...urityfocus.com
Subject: Re: Fw: APC 9606 SmartSlot Web/SNMP management card "backdoor" -
 MORE PROBLEMS


The fix is already released.  I'm testing it on a 9211 Masterswitch with a
AP9606 web management card.  So far so good.

http://www.apcc.com/tools/download/

I went to "Update patch for APC MasterSwitch" on that page.  Then I
grabbed both files.

First, you ftp into your Masterswitch.  Using binary transfer, I upload
the AOS file.  After the transfer completed, the unit rebooted on its
own.  After about 10 or 15 seconds, I ftp'ed into the Masterswitch again,
and uploaded the APP file using binary transfer.  This has to be done in
order according to APC's tech's.

This information doesn't appear to be anywhere on apc.com.  I had to get
this information from an APC tech rep by calling their 800 number.

-- Keith

On Tue, 17 Feb 2004, James Green wrote:

> On Tuesday 17 Feb 2004 6:23 pm, thiago.vazquez@...ht.com.br wrote:
> > We have many products from APC and we've tested that vulnerability in some
> > of them and ..... following are the results.
> 
> [ snip ]
> 
> According to a Matias Kvaternik at APC (US) today, the bug was discovered 
> after the AP9606 was discontinued (we bought some less than one year ago), 
> and the engineering team has "no fix in the pipeline". He advises us to 
> switch off telnet access.
> 
> I would imagine most APC products are installed to last for a good three to 
> six years - upgrading power hardware is probably about as practical as 
> upgrading a load of networking equipment. I'm surprised, indeed disappointed, 
> that APC doesn't appear to provide critical security fixes for these 
> discontinued products; although I do only speak from very limited experience 
> of APC.
> 
> 
> James Green
> 







Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ