var-200606-0512
Vulnerability from variot
Buffer overflow in the web console in F-Secure Anti-Virus for Microsoft Exchange 6.40, and Internet Gatekeeper 6.40 through 6.42 and 6.50 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors. NOTE: By default, the connections are only allowed from the local host. F-Secure Anti-Virus is prone to a denial-of-service vulnerability.
Want to join the Secunia Security Team?
Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports.
The vulnerability is caused due to an unspecified boundary error within the web console prior to authentication and can be exploited to cause a buffer overflow.
Successful exploitation crashes the web console process and may potentially allow execution of arbitrary code. The criticality of the vulnerability therefore depends on how the web console has been configured to accept connections.
SOLUTION: Update to a fixed version or apply hotfix.
-- F-Secure Anti-Virus for Microsoft Exchange --
Apply hotfix for version 6.40: ftp://ftp.f-secure.com/support/hotfix/fsav-mse/fsavmse640-05.zip
-- F-Secure Internet Gatekeeper --
Update to version 6.60 or apply hotfix (for version 6.50): ftp://ftp.f-secure.com/support/hotfix/fsig/fsigk650-01.zip
PROVIDED AND/OR DISCOVERED BY: The vendor credits Mikko Korppi.
ORIGINAL ADVISORY: http://www.f-secure.com/security/fsc-2006-3.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200606-0512", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "internet gatekeeper", "scope": "eq", "trust": 1.9, "vendor": "f secure", "version": "6.50" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 1.9, "vendor": "f secure", "version": "6.42" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 1.9, "vendor": "f secure", "version": "6.41" }, { "model": "internet gatekeeper", "scope": "eq", "trust": 1.9, "vendor": "f secure", "version": "6.4" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 1.6, "vendor": "f secure", "version": "6.40" }, { "model": "f-secure anti-virus", "scope": "eq", "trust": 0.8, "vendor": "f secure", "version": "for microsoft exchange 6.40" }, { "model": "f-secure internet gatekeeper", "scope": "eq", "trust": 0.8, "vendor": "f secure", "version": "6.40 to 6.42" }, { "model": "f-secure internet gatekeeper", "scope": "eq", "trust": 0.8, "vendor": "f secure", "version": "6.50" }, { "model": "f-secure anti-virus ms exchange", "scope": "eq", "trust": 0.3, "vendor": "f secure", "version": "6.40" } ], "sources": [ { "db": "BID", "id": "80162" }, { "db": "JVNDB", "id": "JVNDB-2006-004021" }, { "db": "CNNVD", "id": "CNNVD-200606-133" }, { "db": "NVD", "id": "CVE-2006-2838" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:f-secure:anti-virus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:f-secure:internet_gatekeeper", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-004021" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "80162" } ], "trust": 0.3 }, "cve": "CVE-2006-2838", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CVE-2006-2838", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "VHN-18946", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-2838", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2006-2838", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200606-133", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-18946", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-18946" }, { "db": "JVNDB", "id": "JVNDB-2006-004021" }, { "db": "CNNVD", "id": "CNNVD-200606-133" }, { "db": "NVD", "id": "CVE-2006-2838" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in the web console in F-Secure Anti-Virus for Microsoft Exchange 6.40, and Internet Gatekeeper 6.40 through 6.42 and 6.50 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown attack vectors. NOTE: By default, the connections are only allowed from the local host. F-Secure Anti-Virus is prone to a denial-of-service vulnerability. \n\n----------------------------------------------------------------------\n\nWant to join the Secunia Security Team?\n\nSecunia offers a position as a security specialist, where your daily\nwork involves reverse engineering of software and exploit code,\nauditing of source code, and analysis of vulnerability reports. \n\nThe vulnerability is caused due to an unspecified boundary error\nwithin the web console prior to authentication and can be exploited\nto cause a buffer overflow. \n\nSuccessful exploitation crashes the web console process and may\npotentially allow execution of arbitrary code. The\ncriticality of the vulnerability therefore depends on how the web\nconsole has been configured to accept connections. \n\nSOLUTION:\nUpdate to a fixed version or apply hotfix. \n\n-- F-Secure Anti-Virus for Microsoft Exchange --\n\nApply hotfix for version 6.40:\nftp://ftp.f-secure.com/support/hotfix/fsav-mse/fsavmse640-05.zip\n\n-- F-Secure Internet Gatekeeper --\n\nUpdate to version 6.60 or apply hotfix (for version 6.50):\nftp://ftp.f-secure.com/support/hotfix/fsig/fsigk650-01.zip\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Mikko Korppi. \n\nORIGINAL ADVISORY:\nhttp://www.f-secure.com/security/fsc-2006-3.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-2838" }, { "db": "JVNDB", "id": "JVNDB-2006-004021" }, { "db": "BID", "id": "80162" }, { "db": "VULHUB", "id": "VHN-18946" }, { "db": "PACKETSTORM", "id": "46921" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-2838", "trust": 2.8 }, { "db": "SECTRACK", "id": "1016197", "trust": 2.0 }, { "db": "SECTRACK", "id": "1016196", "trust": 2.0 }, { "db": "SECUNIA", "id": "20407", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2006-2076", "trust": 1.7 }, { "db": "XF", "id": "26799", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2006-004021", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200606-133", "trust": 0.7 }, { "db": "BID", "id": "80162", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-18946", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46921", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-18946" }, { "db": "BID", "id": "80162" }, { "db": "JVNDB", "id": "JVNDB-2006-004021" }, { "db": "PACKETSTORM", "id": "46921" }, { "db": "CNNVD", "id": "CNNVD-200606-133" }, { "db": "NVD", "id": "CVE-2006-2838" } ] }, "id": "VAR-200606-0512", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-18946" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:47:04.128000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "fsc-2006-3.shtml", "trust": 0.8, "url": "http://www.f-secure.com/security/fsc-2006-3.shtml" }, { "title": "id?1016197", "trust": 0.8, "url": "http://securitytracker.com/id?1016197" }, { "title": "20407", "trust": 0.8, "url": "http://secunia.com/advisories/20407" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-004021" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-2838" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://www.f-secure.com/security/fsc-2006-3.shtml" }, { "trust": 2.0, "url": "http://securitytracker.com/id?1016196" }, { "trust": 2.0, "url": "http://securitytracker.com/id?1016197" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20407" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/2076" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26799" }, { "trust": 0.9, "url": "http://xforce.iss.net/xforce/xfdb/26799" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2838" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-2838" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/2076" }, { "trust": 0.1, "url": "http://secunia.com/product/454/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/3339/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/20407/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_specialist/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-18946" }, { "db": "BID", "id": "80162" }, { "db": "JVNDB", "id": "JVNDB-2006-004021" }, { "db": "PACKETSTORM", "id": "46921" }, { "db": "CNNVD", "id": "CNNVD-200606-133" }, { "db": "NVD", "id": "CVE-2006-2838" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-18946" }, { "db": "BID", "id": "80162" }, { "db": "JVNDB", "id": "JVNDB-2006-004021" }, { "db": "PACKETSTORM", "id": "46921" }, { "db": "CNNVD", "id": "CNNVD-200606-133" }, { "db": "NVD", "id": "CVE-2006-2838" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-06-06T00:00:00", "db": "VULHUB", "id": "VHN-18946" }, { "date": "2006-06-06T00:00:00", "db": "BID", "id": "80162" }, { "date": "2014-03-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-004021" }, { "date": "2006-06-01T21:29:25", "db": "PACKETSTORM", "id": "46921" }, { "date": "2006-06-06T00:00:00", "db": "CNNVD", "id": "CNNVD-200606-133" }, { "date": "2006-06-06T20:06:00", "db": "NVD", "id": "CVE-2006-2838" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-20T00:00:00", "db": "VULHUB", "id": "VHN-18946" }, { "date": "2006-06-06T00:00:00", "db": "BID", "id": "80162" }, { "date": "2014-03-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-004021" }, { "date": "2007-05-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200606-133" }, { "date": "2024-11-21T00:12:12.660000", "db": "NVD", "id": "CVE-2006-2838" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200606-133" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "F-Secure Anti-Virus and Internet Gatekeeper Vulnerable to buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-004021" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200606-133" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.