Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:28851
HistoryDec 11, 2012 - 12:00 a.m.

Snare for Linux Password Disclosure

2012-12-1100:00:00
vulners.com
11

Snare for Linux Password Disclosure

I. BACKGROUND

Snare for Linux provides a 'C2' or 'CAPP' style audit
subsystem for the Linux operating system. It can be
used as a standalone auditing tool for Linux, or can
send data to the Snare Server for analysis and storage.

II. DESCRIPTION

Snare for Linux ships with a web interface that can be
used for viewing log data and configuring the agent. In
the web interface at /remote, a user is able to set a password
for remote configuration of the agent. The rendered page
contains the field "RemotePassword" with its input type set
to password which masks the password in the interface, however
this is purely aesthetic. By inspecting the page source and
examining the RemotePassword field, it is possible to retrieve
the MD5 hash of the current password.

III. AFFECTED PRODUCTS

All versions of Snare for Linux prior to 1.7.0 are vulnerable.

IV.

Users should upgrade to version 1.7.0 of Snare for Linux.

V. Credit

This vulnerability was discovered by Andrew Brooks.

VI. References

CVE-2011-5247
http://rpmfind.net/linux/RPM/sourceforge/s/sn/snare/Snare%20for%20Linux/1.7.0/SnareLinux-1.7.0-0.i386.html

VII. Timeline

7/11/11 - Vendor notification
8/09/11 - Fixed and closed

Related for SECURITYVULNS:DOC:28851