Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.64.1004061119250.11220@faron.mitre.org>
Date: Tue, 6 Apr 2010 11:41:33 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: jmm@...til.org, "Steven M. Christey" <coley@...us.mitre.org>,
        bressers@...hat.com
Subject: Re: CVE Request -- Zabbix v1.8.2 and v.1.6.9


On Sat, 3 Apr 2010, Tomas Hoger wrote:

>>> Use CVE-2010-1144 for this one
>>
>> Josh, in a later mail you've assigned the same ID to a libnids issue:
>
> Looks like a wrong id used in libnids mail as, according to notes, the
> assignment should be:
>
> CVE-2010-0751 libnids v1.24 -- Null pointer dereference
> CVE-2010-1144 Zabbix <= 1.8.1 SQL Injection
> CVE-2010-1145 Zabbix remote commands execution in Zabbix Server

CVE-2010-1144 is in active use for both Zabbix and libnids, so that 
identifier will have to be rejected outright.

Keep CVE-2010-0751 for libnids.

I also assigned CVE-2010-1277 to use for the Zabbix SQL injection.

See below for clarification.

- Steve

======================================================
Name: CVE-2010-0751
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0751
Reference: MISC:http://xorl.wordpress.com/2010/04/04/libnids-ip-fragmentation-remote-null-pointer-dereference/
Reference: CONFIRM:http://freefr.dl.sourceforge.net/project/libnids/libnids/1.24/libnids-1.24.releasenotes.txt
Reference: FEDORA:FEDORA-2010-5535
Reference: URL:http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038375.html
Reference: FEDORA:FEDORA-2010-5545
Reference: URL:http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038388.html
Reference: FEDORA:FEDORA-2010-5562
Reference: URL:http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038410.html
Reference: BID:39142
Reference: URL:http://www.securityfocus.com/bid/39142
Reference: SECUNIA:39225
Reference: URL:http://secunia.com/advisories/39225
Reference: SECUNIA:39249
Reference: URL:http://secunia.com/advisories/39249
Reference: VUPEN:ADV-2010-0777
Reference: URL:http://www.vupen.com/english/advisories/2010/0777
Reference: VUPEN:ADV-2010-0791
Reference: URL:http://www.vupen.com/english/advisories/2010/0791
Reference: XF:libnids-ipfragment-dos(57428)
Reference: URL:http://xforce.iss.net/xforce/xfdb/57428

The ip_evictor function in ip_fragment.c in libnids 1.24, as used in
dsniff and possibly other products, allows remote attackers to cause a
denial of service (NULL pointer dereference and crash) via crafted
fragmented packets.


======================================================
Name: CVE-2010-1144
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1144

** REJECT **

DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-0751,
CVE-2010-1277.  Reason: this candidate was intended for one issue, but
it was accidentally assigned to two different issues, one for libnids
and another for Zabbix.  Notes: All CVE users should consult
CVE-2010-0751 (libnids) and CVE-2010-1277 (Zabbix) to determine which
ID is appropriate.  All references and descriptions in this candidate
have been removed to prevent accidental usage.


======================================================
Name: CVE-2010-1277
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1277
Reference: BUGTRAQ:20100401 Zabbix <= 1.8.1 SQL Injection
Reference: URL:http://www.securityfocus.com/archive/1/archive/1/510480/100/0/threaded
Reference: FULLDISC:20100401 Zabbix <= 1.8.1 SQL Injection
Reference: URL:http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html
Reference: MISC:http://legalhackers.com/advisories/zabbix181api-sql.txt
Reference: MISC:http://legalhackers.com/poc/zabbix181api.pl-poc
Reference: MISC:http://www.zabbix.com/rn1.8.2.php
Reference: BID:39148
Reference: URL:http://www.securityfocus.com/bid/39148
Reference: OSVDB:63456
Reference: URL:http://www.osvdb.org/63456
Reference: SECUNIA:39119
Reference: URL:http://secunia.com/advisories/39119
Reference: VUPEN:ADV-2010-0799
Reference: URL:http://www.vupen.com/english/advisories/2010/0799

SQL injection vulnerability in the user.authenticate method in the API
in Zabbix 1.8 before 1.8.2 allows remote attackers to execute
arbitrary SQL commands via the user parameter in JSON data to
api_jsonrpc.php.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.