Secunia Security Advisory - Thomas H. Ptacek has reported a vulnerability in Network Appliance Data ONTAP, which can be exploited by malicious people to bypass certain security restrictions.
8dbd4b266ae1477f111ab6cf3bfcdd5b401b02d907fccf2f8cee27a93912ce2e
TITLE:
Network Appliance Data ONTAP iSCSI Authentication Bypass
SECUNIA ADVISORY ID:
SA17321
VERIFY ADVISORY:
http://secunia.com/advisories/17321/
CRITICAL:
Moderately critical
IMPACT:
Security Bypass
WHERE:
>From local network
OPERATING SYSTEM:
Network Appliance Data ONTAP 6.x
http://secunia.com/product/2601/
Network Appliance Data ONTAP 7.x
http://secunia.com/product/5985/
DESCRIPTION:
Thomas H. Ptacek has reported a vulnerability in Network Appliance
Data ONTAP, which can be exploited by malicious people to bypass
certain security restrictions.
The vulnerability is cause due to an error in the handling of iSCSI
authentication requests. This can be exploited to bypass
authentication via a specially-crafted iSCSI client.
Successful exploitation allows the manipulation of data stored in
iSCSI-mapped LUNs on affected Network Appliance Filers.
The vulnerability has been reported in versions 6.4, 6.5, and 7.0.
SOLUTION:
The vulnerability has reportedly been fixed in version 7.0.2.
http://now.netapp.com/NOW/cgi-bin/software
PROVIDED AND/OR DISCOVERED BY:
Thomas H. Ptacek, Matasano Security.
ORIGINAL ADVISORY:
http://www.matasano.com/advisories/netapp-iSCSI.txt
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------