CVE-2004-2554
CVSS7.2
发布时间 :2004-12-31 00:00:00
修订时间 :2008-09-05 16:44:28
NMCOS    

[原文]Novell Client Firewall (NCF) 2.0, as based on the Agnitum Outpost Firewall, allows local users to execute arbitrary code with SYSTEM privileges by opening the NCF tray icon and using the Help functionality to launch programs with SYSTEM privileges.


[CNNVD]Agnitum Outpost Firewall本地权限提升漏洞(CNNVD-200412-485)

        
        Agnitum Outpost Firewall是一款桌面防火墙系统。
        Agnitum Outpost Firewall防火墙桌面托盘存在问题,本地攻击者可以利用这个漏洞提升权限。
        当使用Outpost防火墙时,其桌面控制台以SYSTEM权限运行。攻击者能访问桌面可利用访问验证错误提升他们的权限。问题是桌面控制台运行后没有正确丢弃权限,用户可以利用这个控制台工具以高权限执行任意命令。
        Novell Client Firewall version 2.0同样也存在此漏洞。
        

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2554
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2554
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-485
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/15367
(UNKNOWN)  XF  ncf-tray-icon-gain-privileges(15367)
http://www.securityfocus.com/bid/9441
(UNKNOWN)  BID  9441
http://www.osvdb.org/4120
(UNKNOWN)  OSVDB  4120
http://www.ciac.org/ciac/bulletins/o-090.shtml
(VENDOR_ADVISORY)  CIAC  O-090
http://support.novell.com/cgi-bin/search/searchtid.cgi?/10090585.htm
(VENDOR_ADVISORY)  CONFIRM  http://support.novell.com/cgi-bin/search/searchtid.cgi?/10090585.htm
http://securitytracker.com/id?1008755
(UNKNOWN)  SECTRACK  1008755
http://secunia.com/advisories/11014
(VENDOR_ADVISORY)  SECUNIA  11014

- 漏洞信息

Agnitum Outpost Firewall本地权限提升漏洞
高危 访问验证错误
2004-12-31 00:00:00 2005-12-12 00:00:00
本地  
        
        Agnitum Outpost Firewall是一款桌面防火墙系统。
        Agnitum Outpost Firewall防火墙桌面托盘存在问题,本地攻击者可以利用这个漏洞提升权限。
        当使用Outpost防火墙时,其桌面控制台以SYSTEM权限运行。攻击者能访问桌面可利用访问验证错误提升他们的权限。问题是桌面控制台运行后没有正确丢弃权限,用户可以利用这个控制台工具以高权限执行任意命令。
        Novell Client Firewall version 2.0同样也存在此漏洞。
        

- 公告与补丁

        厂商补丁:
        Agnitum
        -------
        Agnitum Outpost Firewall可通过如下地址获得升级程序:
        
        http://www.agnitum.com/news

- 漏洞信息

4120
Novell Client Firewall Privilege Escalation
Physical Access Required, Local Access Required Other
Loss of Confidentiality, Loss of Integrity, Loss of Availability
Exploit Unknown

- 漏洞描述

Novell Client Firewall contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered because the tray icon executes the help interface with SYSTEM privileges. This flaw may lead to a loss of confidentiality, integrity and/or availability.

- 时间线

2004-02-27 2004-01-23
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Novell has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Agnitum Outpost Firewall Local Privilege Escalation Vulnerability
Access Validation Error 9441
No Yes
2004-01-18 12:00:00 2004-01-18 12:00:00
Announced by KF <dotslash@snosoft.com> of Secure Network Operations.

- 受影响的程序版本

Novell Client Firewall 2.0
Agnitum Outpost Firewall 2.0
Agnitum Outpost Firewall 1.0

- 漏洞讨论

When Outpost Firewall is in use, the desktop console runs with SYSTEM privileges. It has been reported that it is possible for attackers with desktop access to elevate to these privileges through access validation errors. There are allegedly two instances where the console invokes, without dropping privileges first, commands or programs not under its control that can be hijacked by malicious users.

Novell Client Firewall version 2.0 has been reported to be affected by these issues as well. Novell Client Firewall is based on Agnitum Outpost firewall.

- 漏洞利用

There is no exploit code required.

- 解决方案

A patch is reportedly forthcoming. The vendor has stated that concerned users should subscribe to the Agnitum mailing list for future patch and security announcements:

http://www.agnitum.com/news

Novell has released Technical Information Document TID10090585 with fix information to address these issues. Please see the document in web references for more information.

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站