The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of eEye Retina

vulnerability note CVE-2011-3337

eEye Retina: code execution via Audit ID 2499

Synthesis of the vulnerability

An attacker can create a malicious file in /usr/local, in order to execute code when eEye Retina uses the script Audit ID 2499.
Impacted products: Retina.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 09/11/2011.
Identifiers: AL20111108, BID-50585, CVE-2011-3337, VIGILANCE-VUL-11144, VU#448051.

Description of the vulnerability

The Audit ID 2499 script of eEye Retina detects a vulnerability of Gauntlet Firewall. In order to do so, it obtains the version of Gauntlet, by executing the command:
  find /usr/local -name gauntlet -exec {} -v \;
This command searches a file named "gauntlet" located in "/usr/local", and then executes "/usr/local/.../gauntlet -v".

However, if an attacker is allowed to store a file named "gauntlet" in a subdirectory of "/usr/local", the attacker's program will be run with privileges of the script Audit ID 2499 (root).

An attacker can therefore create a malicious file in /usr/local, in order to execute code when eEye Retina uses the script Audit ID 2499.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce 8852

Retina Network Security Scanner: buffer overflow of RWS

Synthesis of the vulnerability

An attacker can invite the victim to open a malicious RWS file with Retina Wireless Scanner in order to execute code.
Impacted products: Retina.
Severity: 1/4.
Consequences: user access/rights.
Provenance: document.
Creation date: 10/07/2009.
Identifiers: AD20090710, BID-35624, VIGILANCE-VUL-8852.

Description of the vulnerability

The Retina Wireless Scanner module, provided with Retina Network Security Scanner, detects WiFi networks. The list of detected devices can be saved in a file with the RWS extension.

A RWS file in version 1.0 starts with the "RWS010" pattern, followed by the list of detected networks.

When the device list is too long, opening the file creates a buffer overflow in Retina Wireless Scanner.

An attacker can therefore invite the victim to open a malicious RWS file in order to execute code on his computer.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.