copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

AA-2009.0094 -- [Win][Linux] -- Novell Teaming: Multiple Vulnerabilities

Date: 17 April 2009

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
AA-2009.0094                  AUSCERT Advisory

                               [Win][Linux]
                 Novell Teaming: Multiple Vulnerabilities
                               17 April 2009
- ---------------------------------------------------------------------------

        AusCERT Advisory Summary
        ------------------------

Product:              Novell Teaming
Operating System:     Linux variants
                      Windows Server 2003
Impact:               Cross-site Scripting
                      Reduced Security
Access:               Remote/Unauthenticated
CVE Names:            CVE-2009-1294 CVE-2009-1293
Member content until: Thursday, May 14 2009

Revision History:     April 17 2009: Added CVE Reference
                      April 16 2009: Initial Release

OVERVIEW:

       Multiple vulnerabilities have been discovered in Novell Teaming.


IMPACT:

       Novell have provided the following information regarding these
       vulnerabilities:

       "Novell Teaming is vulnerable to Username Enumeration attacks in that 
       the application reacts differently for valid and invalid usernames. 
       This allows an attacker to deduce whether the specified username 
       exists or not." [1]

       "Novell Teaming, through the Liferay 4.3.0 portal, is vulnerable to 
       Cross-site Scripting attacks which can allow an attacker to cause 
       execution of malicious scripting code in the browser of an end-user, 
       resulting in a persistent defacement of the target site, or the 
       redirection of confidential information to unauthorized third 
       parties." [2]


MITIGATION:

       Novell have provided steps to correct the first vulnerabillity by
       modifying the relevant properties files. Please see the vendor's
       publication for more information. [1]

       The second vulnerability can be corrected by either upgrading the
       vulnerable Liferay portal or by waiting for the release of Novell
       Teaming 2.x. For more information regarding these options please
       see the vendor's publication. [2]


REFERENCES:

       [1] Novell Teaming username enumeration vulnerability fix
           http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7002997&sliceId=1&docTypeID=DT_TID_1_1&dialogID=33090060&stateId=1%200%2033084737

       [2] Novell Teaming Cross-Site Scripting Vulnerability fix
           http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7002999&sliceId=1&docTypeID=DT_TID_1_1&dialogID=33090060&stateId=1%200%2033084737

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFJ5/ltNVH5XJJInbgRAkjqAJ0eTWlkLgpbUi45g1hmM9fnZZ8ndwCfcblu
FRhTAjXdi9qIFBpHqKvLlO8=
=Nj8T
-----END PGP SIGNATURE-----