---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: Geo++ GNCASTER Multiple Weaknesses and Vulnerabilities SECUNIA ADVISORY ID: SA38323 VERIFY ADVISORY: http://secunia.com/advisories/38323/ DESCRIPTION: RedTeam Pentesting has reported some weaknesses and vulnerabilities in Geo++ GNCASTER, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system, and by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS, and potentially compromise a vulnerable system. 1) An error within the processing of certain overly long "HTTP GET" requests can be exploited to e.g. crash the server and potentially execute arbitrary code. 2) An error within the processing of certain overly long NMEA-data sentences can be exploited to e.g. crash the server and potentially execute arbitrary code. Successful exploitation requires valid user credentials. 3) The server allows the HTTP Basic authentication method to access "admin.htm" although it should only allow it the HTTP Digest authentication method. 4) The server does not regenerate the nonce used during HTTP Digest authentication, which can be exploited to e.g. conduct replay attacks. 5) The server leaks 32 bytes of memory in case of a failed authentication, which can be exploited to disclose potentially sensitive information (e.g. authentication headers of other users). The vulnerabilities and weaknesses are reported in version 1.4.0.7. Prior versions may also be affected. SOLUTION: Update to version 1.4.0.8. PROVIDED AND/OR DISCOVERED BY: RedTeam Pentesting ORIGINAL ADVISORY: 1) http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-001/-geo-r-gncaster-insecure-handling-of-long-urls 2) http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-002/-geo-r-gncaster-insecure-handling-of-nmea-data 3-5) http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-003/-geo-r-gncaster-faulty-implementation-of-http-digest-authentication ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------