int(3190)

Vulnerability Bulletins


Escaneo de puertos en SeaMonkey

Vulnerability classification

Property Value
Confidence level Oficial
Impact Confidencialidad
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio estandar

System information

Property Value
Affected manufacturer GNU/Linux
Affected software SeaMonkey

Description

Se ha encontrado una vulnerabilidad en SeaMonkey. La vulnerabilidad reside cuando se manejan ciertos comandos FTP PASV.

Un atacante remoto podría escanear los puertos de máquinas protegidas por un firewall de usuario mediante un servidor FTP debidamente manipulado.

Solution



Actualización de software

Red Hat (RHSA-2007:0402-4)
Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
https://rhn.redhat.com/

Red Hat (RHSA-2007:0400-3)
RHEL Desktop Workstation (v. 5 client)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
https://rhn.redhat.com/

SGI
Advanced Linux Environment 3 / RPM / Patch 10415
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS
Advanced Linux Environment 3 / SRPM / Patch 10415
ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS

Suse Linux
Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux

Standar resources

Property Value
CVE CVE-2007-1562
BID

Other resources

Red Hat Security Advisory (RHSA-2007:0402-4)
https://rhn.redhat.com/errata/RHSA-2007-0402.html

Red Hat Security Advisory (RHSA-2007:0400-3)
https://rhn.redhat.com/errata/RHSA-2007-0400.html

SGI Security Advisory (20070601-01-P)
ftp://patches.sgi.com/support/free/security/advisories/20070601-01-P.asc

SUSE Security Advisory (SUSE-SA:2007:036)
http://www.novell.com/linux/security/advisories/2007_36_mozilla.html

Version history

Version Comments Date
1.0 Aviso emitido 2007-05-31
1.1 Aviso emitido por SGI (20070601-01-P) 2007-06-11
1.2 Aviso emitido por Suse (SUSE-SA:2007:036) 2007-07-03
Ministerio de Defensa
CNI
CCN
CCN-CERT