Date: 17 April 2009
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AA-2009.0094 AUSCERT Advisory
[Win][Linux]
Novell Teaming: Multiple Vulnerabilities
17 April 2009
- ---------------------------------------------------------------------------
AusCERT Advisory Summary
------------------------
Product: Novell Teaming
Operating System: Linux variants
Windows Server 2003
Impact: Cross-site Scripting
Reduced Security
Access: Remote/Unauthenticated
CVE Names: CVE-2009-1294 CVE-2009-1293
Member content until: Thursday, May 14 2009
Revision History: April 17 2009: Added CVE Reference
April 16 2009: Initial Release
OVERVIEW:
Multiple vulnerabilities have been discovered in Novell Teaming.
IMPACT:
Novell have provided the following information regarding these
vulnerabilities:
"Novell Teaming is vulnerable to Username Enumeration attacks in that
the application reacts differently for valid and invalid usernames.
This allows an attacker to deduce whether the specified username
exists or not." [1]
"Novell Teaming, through the Liferay 4.3.0 portal, is vulnerable to
Cross-site Scripting attacks which can allow an attacker to cause
execution of malicious scripting code in the browser of an end-user,
resulting in a persistent defacement of the target site, or the
redirection of confidential information to unauthorized third
parties." [2]
MITIGATION:
Novell have provided steps to correct the first vulnerabillity by
modifying the relevant properties files. Please see the vendor's
publication for more information. [1]
The second vulnerability can be corrected by either upgrading the
vulnerable Liferay portal or by waiting for the release of Novell
Teaming 2.x. For more information regarding these options please
see the vendor's publication. [2]
REFERENCES:
[1] Novell Teaming username enumeration vulnerability fix
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7002997&sliceId=1&docTypeID=DT_TID_1_1&dialogID=33090060&stateId=1%200%2033084737
[2] Novell Teaming Cross-Site Scripting Vulnerability fix
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7002999&sliceId=1&docTypeID=DT_TID_1_1&dialogID=33090060&stateId=1%200%2033084737
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFJ5/ltNVH5XJJInbgRAkjqAJ0eTWlkLgpbUi45g1hmM9fnZZ8ndwCfcblu
FRhTAjXdi9qIFBpHqKvLlO8=
=Nj8T
-----END PGP SIGNATURE-----
|