[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] OP5 Monitor - Multiple Vulnerabilities
- To: full-disclosure@xxxxxxxxxxxxxxxxx, bugtraq@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] OP5 Monitor - Multiple Vulnerabilities
- From: Peter Osterberg <j@xxxxxx>
- Date: Sat, 07 Jan 2012 18:25:49 +0100
Link to full advisory:
http://www.ekelow.se/file_uploads/Advisories/ekelow-aid-2012-01.pdf
Vendor's official statement:
http://www.op5.com/news/support-news/fixed-vulnerabilities-op5-monitor-op5-appliance/
Remote root command execution (non-authenticated)
=================================================
CVSS: 10
CVE: CVE-2012-0261 -
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0261
OSVDB: http://osvdb.org/show/osvdb/78064
Secunia: http://secunia.com/advisories/47417/
Versions: 5.3.5, 5.4.0, 5.4.2, 5.5.0, 5.5.1
Remote root command execution (non-authenticated)
=================================================
CVSS: 10
CVE: CVE-2012-0262 -
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0262
OSVDB: http://osvdb.org/show/osvdb/78065
Secunia: http://secunia.com/advisories/47417/
Versions: 5.3.5, 5.4.0, 5.4.2, 5.5.0, 5.5.1
Credentials leaked in detailed error message (authenticated)
============================================================
CVSS: 1.4
CVE: CVE-2012-0263 -
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0263
Versions: 5.3.5, 5.4.0, 5.4.2
Poor session management in the web application (non-authenticated)
==================================================================
CVSS: 4.7
CVE: CVE-2012-0264 -
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0264
Versions: 5.3.5, 5.4.0, 5.4.2, 5.5.0
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/