Secunia Security Advisory - A vulnerability has been reported in CiscoWorks Internetwork Performance Monitor, which can be exploited by malicious people to compromise a vulnerable system.
f98401c9f7f1923a372eedd7f9c85b075f0093b6f57fc9ae9e5d0dc60cfe61f1
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
CiscoWorks Internetwork Performance Monitor Arbitrary Command
Execution
SECUNIA ADVISORY ID:
SA29376
VERIFY ADVISORY:
http://secunia.com/advisories/29376/
CRITICAL:
Moderately critical
IMPACT:
System access
WHERE:
>From local network
SOFTWARE:
CiscoWorks Internetwork Performance Monitor (IPM) 2.x
http://secunia.com/product/11850/
DESCRIPTION:
A vulnerability has been reported in CiscoWorks Internetwork
Performance Monitor, which can be exploited by malicious people to
compromise a vulnerable system.
The vulnerability is caused due to the application binding a command
shell to a random port on the affected system. This can be exploited
to execute arbitrary commands with "casuser" privileges on Solaris,
and with SYSTEM privileges on Windows.
The vulnerability affects version 2.6 on Windows and Solaris.
SOLUTION:
Apply vendor patch.
IPM version 2.6 CSCsj06260:
http://www.cisco.com/pcgi-bin/tablebuild.pl/ipm-sol?psrtdcat20e2
PROVIDED AND/OR DISCOVERED BY:
The vendor credits a Cisco customer.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20080313-ipm.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------