Computer Security
[EN] securityvulns.ru no-pyccku


TANDBERG Video Communication Server multiple security vulnerabilities
Published:14.04.2010
Source:
SecurityVulns ID:10756
Type:remote
Threat Level:
5/10
Description:Static ssh key, authentication bypass, files access.
Affected:TANDBERG : TANDBERG VCS 4.3
 TANDBERG : TANDBERG VCS 4.2
CVE:CVE-2009-4511 (Multiple directory traversal vulnerabilities in the web administration interface on the TANDBERG Video Communication Server (VCS) before X5.1 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the page parameter to (1) helppage.php or (2) user/helppage.php.)
 CVE-2009-4510 (The SSH service on the TANDBERG Video Communication Server (VCS) before X5.1 uses a fixed DSA key, which makes it easier for remote attackers to conduct man-in-the-middle attacks and spoof arbitrary servers via crafted SSH packets.)
 CVE-2009-4509 (The administrative web console on the TANDBERG Video Communication Server (VCS) before X4.3 uses predictable session cookies in (1) tandberg/web/lib/secure.php and (2) tandberg/web/user/lib/secure.php, which makes it easier for remote attackers to bypass authentication, and execute arbitrary code by loading a custom software update, via a crafted "Cookie: tandberg_login=" HTTP header.)
Original documentdocumentTimothy D. Morgan, CVE-2009-4509: TANDBERG VCS Authentication Bypass (14.04.2010)
 documentVSR Advisories, CVE-2009-4511: TANDBERG VCS Arbitrary File Retrieval (14.04.2010)
 documentVSR Advisories, CVE-2009-4510: TANDBERG VCS Static SSH Host Keys (14.04.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod