CVE-2006-2185
CVSS4.0
发布时间 :2006-05-22 13:02:00
修订时间 :2011-03-07 21:35:30
NMCOS    

[原文]PORTAL.NLM in Novell Netware 6.5 SP5 writes the username and password in cleartext to the abend.log log file when the groupOperationsMethod function fails, which allows context-dependent attackers to gain privileges.


[CNNVD]Novell NetWare PORTAL.NLM 本地信息泄露漏洞(CNNVD-200605-408)

        Novell Netware 6.5 SP5的PORTAL.NLM在groupOperationsMethod函数失败时,将明文的用户名和密码写入abend.log日志文件,可以使依赖于上下文的攻击者获得特权。

- CVSS (基础分值)

CVSS分值: 4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2185
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2185
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-408
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/26488
(PATCH)  XF  netware-portal-information-disclosure(26488)
http://support.novell.com/cgi-bin/search/searchtid.cgi?2973698.htm
(PATCH)  CONFIRM  http://support.novell.com/cgi-bin/search/searchtid.cgi?2973698.htm
http://securitytracker.com/id?1016106
(PATCH)  SECTRACK  1016106
http://www.vupen.com/english/advisories/2006/1829
(UNKNOWN)  VUPEN  ADV-2006-1829
http://www.securityfocus.com/bid/18017
(UNKNOWN)  BID  18017
http://www.osvdb.org/25780
(UNKNOWN)  OSVDB  25780
http://secunia.com/advisories/20288
(UNKNOWN)  SECUNIA  20288

- 漏洞信息

Novell NetWare PORTAL.NLM 本地信息泄露漏洞
中危 设计错误
2006-05-22 00:00:00 2006-05-22 00:00:00
本地  
        Novell Netware 6.5 SP5的PORTAL.NLM在groupOperationsMethod函数失败时,将明文的用户名和密码写入abend.log日志文件,可以使依赖于上下文的攻击者获得特权。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Novell Netware 6.5 SP5
        Novell httpstk5.exe
        http://support.novell.com/servlet/filedownload/sec/ftf/httpstk5.exe

- 漏洞信息

25780
Novell NetWare abend.log User Credentials Disclosure
Local Access Required Information Disclosure
Loss of Confidentiality
Exploit Unknown Vendor Verified

- 漏洞描述

Novell NetWare contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when PORTAL.NLM function groupOperationsMethod() fails, which will write the username and password in cleartext to the abend.log file, resulting in a loss of confidentiality.

- 时间线

2006-05-08 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, vendor has released a patch httpstk5.exe to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Novell NetWare Local Information Disclosure Vulnerability
Design Error 18017
No Yes
2006-05-17 12:00:00 2006-05-17 09:44:00
The vendor disclosed this issue.

- 受影响的程序版本

Novell Netware 6.5 SP5

- 漏洞讨论

Novell NetWare is susceptible to a local information-disclosure vulnerability. This issue is due to potentially sensitive information being written to a log file on affected computers.

This issue allows local attackers to gain access to potentially sensitive information. Information gained through exploiting this issue may aid them in further attacks.

Novell NetWare version 6.5 Support Pack 5 is vulnerable to this issue; other versions may also be affected.

- 漏洞利用

Attackers use standard system utilities to exploit this issue.

- 解决方案

The vendor has released an advisory along with fixes to address this issue.

Please see the referenced vendor advisories for details on obtaining and applying fixes.


Novell Netware 6.5 SP5

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站