exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

angrypacket-cisco-vpnclient.txt

angrypacket-cisco-vpnclient.txt
Posted Jun 20, 2002
Site sec.angrypacket.com

AngryPacket Security Advisory - A vulnerability found in the Cisco VPN client for Linux can allow local users to gain root level privileges. This vulnerability affects VPN client v3.5.1 and below.

tags | local, root
systems | cisco, linux
SHA-256 | 3f0616261733901823c963b777907ca611ed3bca722aab3941413458f07acfc2

angrypacket-cisco-vpnclient.txt

Change Mirror Download
                - -- ------------------------- -- -
[>(] AngryPacket Security Advisory [>(]
- -- ------------------------- -- -

+--------------------- -- -
+ advisory information
+------------------ -- -
author: methodic <methodic@bigunz.angrypacket.com>
release date: 05/28/2002
homepage: http://sec.angrypacket.com
advisory id: 0x0002

+-------------------- -- -
+ product information
+----------------- -- -
software: Cisco vpnclient for Linux
vendor: Cisco Systems
homepage: http://www.cisco.com
description:
"Cisco VPN client allows a user to connect to a Cisco VPN device
using the Linux operating system."

+---------------------- -- -
+ vulnerability details
+------------------- -- -
problem: Local root
affected: vpnclient-linux-3.5.1.Rel-k9 and perhaps earlier versions
explaination: Any local user can gain root privileges via a buffer overflow
in the 'connect' argument when a long profile name (520 bytes
to own the eip) is specified and the executable is suid root.

Cisco's install script installs vpnclient suid root by default,
although it does advise administrators about the permissions
set on vpnclient, and that they may wish to change them.
risk: High
status: Vendor was notified, and a fix is available
exploit: http://sec.angrypacket.com/exploits/vpnKILLient.c
fix: Upgrade your Cisco vpnclient software, or chmod -s vpnclient

+-------- -- -
+ credits
+----- -- -
Bug was found by methodic of AngryPacket security group.
Additional help by:
dmuz and vegac of AngryPacket security group, and shok of w00w00.

+----------- -- -
+ disclaimer
+-------- -- -
The contents of this advisory are Copyright (c) 2002 AngryPacket
Security, and may be distributed freely provided that no fee is charged
for distribution and that proper credit is given. As such, AngryPacket
Security group, collectively or individually, shall not be held liable
or responsible for the misuse of any information contained herein.

- -- ------------------------- -- -
[>(] AngryPacket Security Advisory [>(]
- -- ------------------------- -- -
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    0 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close