Информационная безопасность
[RU] switch to English


Многочисленные уязвимости в TANDBERG Video Communication Server
Опубликовано:14 апреля 2010 г.
Источник:
SecurityVulns ID:10756
Тип:удаленная
Уровень опасности:
5/10
Описание:Статические ключи ssh, обход аутентификации, доступ к файлам.
Затронутые продукты:TANDBERG : TANDBERG VCS 4.3
 TANDBERG : TANDBERG VCS 4.2
CVE:CVE-2009-4511 (Multiple directory traversal vulnerabilities in the web administration interface on the TANDBERG Video Communication Server (VCS) before X5.1 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the page parameter to (1) helppage.php or (2) user/helppage.php.)
 CVE-2009-4510 (The SSH service on the TANDBERG Video Communication Server (VCS) before X5.1 uses a fixed DSA key, which makes it easier for remote attackers to conduct man-in-the-middle attacks and spoof arbitrary servers via crafted SSH packets.)
 CVE-2009-4509 (The administrative web console on the TANDBERG Video Communication Server (VCS) before X4.3 uses predictable session cookies in (1) tandberg/web/lib/secure.php and (2) tandberg/web/user/lib/secure.php, which makes it easier for remote attackers to bypass authentication, and execute arbitrary code by loading a custom software update, via a crafted "Cookie: tandberg_login=" HTTP header.)
Оригинальный текстdocumentTimothy D. Morgan, CVE-2009-4509: TANDBERG VCS Authentication Bypass (14.04.2010)
 documentVSR Advisories, CVE-2009-4511: TANDBERG VCS Arbitrary File Retrieval (14.04.2010)
 documentVSR Advisories, CVE-2009-4510: TANDBERG VCS Static SSH Host Keys (14.04.2010)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород