exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

angrypacket-cisco-vpnclient.txt

angrypacket-cisco-vpnclient.txt
Posted Jun 20, 2002
Site sec.angrypacket.com

AngryPacket Security Advisory - A vulnerability found in the Cisco VPN client for Linux can allow local users to gain root level privileges. This vulnerability affects VPN client v3.5.1 and below.

tags | local, root
systems | cisco, linux
SHA-256 | 3f0616261733901823c963b777907ca611ed3bca722aab3941413458f07acfc2

angrypacket-cisco-vpnclient.txt

Change Mirror Download
                - -- ------------------------- -- -
[>(] AngryPacket Security Advisory [>(]
- -- ------------------------- -- -

+--------------------- -- -
+ advisory information
+------------------ -- -
author: methodic <methodic@bigunz.angrypacket.com>
release date: 05/28/2002
homepage: http://sec.angrypacket.com
advisory id: 0x0002

+-------------------- -- -
+ product information
+----------------- -- -
software: Cisco vpnclient for Linux
vendor: Cisco Systems
homepage: http://www.cisco.com
description:
"Cisco VPN client allows a user to connect to a Cisco VPN device
using the Linux operating system."

+---------------------- -- -
+ vulnerability details
+------------------- -- -
problem: Local root
affected: vpnclient-linux-3.5.1.Rel-k9 and perhaps earlier versions
explaination: Any local user can gain root privileges via a buffer overflow
in the 'connect' argument when a long profile name (520 bytes
to own the eip) is specified and the executable is suid root.

Cisco's install script installs vpnclient suid root by default,
although it does advise administrators about the permissions
set on vpnclient, and that they may wish to change them.
risk: High
status: Vendor was notified, and a fix is available
exploit: http://sec.angrypacket.com/exploits/vpnKILLient.c
fix: Upgrade your Cisco vpnclient software, or chmod -s vpnclient

+-------- -- -
+ credits
+----- -- -
Bug was found by methodic of AngryPacket security group.
Additional help by:
dmuz and vegac of AngryPacket security group, and shok of w00w00.

+----------- -- -
+ disclaimer
+-------- -- -
The contents of this advisory are Copyright (c) 2002 AngryPacket
Security, and may be distributed freely provided that no fee is charged
for distribution and that proper credit is given. As such, AngryPacket
Security group, collectively or individually, shall not be held liable
or responsible for the misuse of any information contained herein.

- -- ------------------------- -- -
[>(] AngryPacket Security Advisory [>(]
- -- ------------------------- -- -
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    13 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close