---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: CS-MARS Multiple Vulnerabilities SECUNIA ADVISORY ID: SA21118 VERIFY ADVISORY: http://secunia.com/advisories/21118/ CRITICAL: Moderately critical IMPACT: Security Bypass, Exposure of system information, System access WHERE: >From local network OPERATING SYSTEM: Cisco Security Monitoring, Analysis and Response System (CS-MARS) 4.x http://secunia.com/product/6780/ DESCRIPTION: Multiple vulnerabilities have been reported in CS-MARS, which can be exploited by malicious, local users to bypass certain security restrictions and malicious people to gain knowledge of system information and compromise a vulnerable system. 1) Insecure exposure of the JMX console in the included JBoss web application server (version 3.2.7) can be exploited to execute arbitrary shell commands with the privileges of the CS-MARS administrator. 2) The included JBoss web application server is also affected by an information disclosure weakness. For more information: SA15746 3) The CLI contains several unspecified vulnerabilities, which can be exploited by authenticated administrative users to execute arbitrary shell commands with root privileges. The vulnerabilities have been reported in versions prior to 4.2.1. CS-MARS also ships with an Oracle database containing several default Oracle accounts with well-known passwords. SOLUTION: Update to version 4.2.1 or later. PROVIDED AND/OR DISCOVERED BY: 1+2) Jon Hart 3) Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20060719-mars.shtml OTHER REFERENCES: SA15746: http://secunia.com/advisories/15746/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------