Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Attachmate Verastream Host Integrator (VHI) allows arbitrary file upload and execution
Informations
Name VU#436214 First vendor Publication 2013-11-04
Vendor VU-CERT Last vendor Modification 2013-11-19
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#436214

Attachmate Verastream Host Integrator (VHI) allows arbitrary file upload and execution

Original Release date: 04 Nov 2013 | Last revised: 19 Nov 2013

Overview

The Attachmate Verastream Host Integrator (VHI) is vulnerable to arbitrary file uploads and execution.

Description

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - CVE-2013-3626

The Attachmate VHI Session Server, on all platforms, allows unauthenticated remote attackers to write arbitrary files on the machine in which the product is installed by sending a specially crafted message to the VHI Session Server. The affected versions are:

  • 7.5 SP 1 HF 1
  • 7.5 SP 1
  • 7.5
  • 7.1 SP 2 HF 1 - 6
  • 7.1 SP 2
  • 7.1 SP 1
  • 7.1
  • 7.0
  • 6.6
  • 6.5
  • 6.0

  • Impact

    An attacker may be able to gain complete control of the server on which the application is installed.

    Solution

    Apply a Hotfix
    Attachmate has released a hotfix to address this issue while a patch is being developed. The hotfix can be found at: http://support.attachmate.com/techdocs/2700.html

    Vendor Information (Learn More)

    VendorStatusDate NotifiedDate Updated
    AttachmateAffected02 Oct 201310 Oct 2013
    If you are a vendor and your product is affected, let us know.

    CVSS Metrics (Learn More)

    GroupScoreVector
    Base9.3AV:N/AC:M/Au:N/C:C/I:C/A:C
    Temporal7.5E:POC/RL:TF/RC:C
    Environmental1.9CDP:N/TD:L/CR:ND/IR:ND/AR:ND

    References

    • http://cwe.mitre.org/data/definitions/22.html
    • http://support.attachmate.com/techdocs/2700.html

    Credit

    Thanks to Arnold Geels of Attachmate for reporting this vulnerability.

    This document was written by Chris King.

    Other Information

    • CVE IDs:CVE-2013-3626
    • Date Public:04 Nov 2013
    • Date First Published:04 Nov 2013
    • Date Last Updated:19 Nov 2013
    • Document Revision:12

    Feedback

    If you have feedback, comments, or additional information about this vulnerability, please send us email.

    Original Source

    Url : http://www.kb.cert.org/vuls/id/436214

    CWE : Common Weakness Enumeration

    % Id Name
    100 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

    CPE : Common Platform Enumeration

    TypeDescriptionCount
    Application 7

    Alert History

    If you want to see full details history, please login or register.
    0
    1
    2
    3
    4
    5
    6
    7
    8
    9
    Date Informations
    2016-06-28 20:11:25
    • Multiple Updates
    2016-02-11 08:49:23
    • Multiple Updates
    2016-02-09 11:36:05
    • Multiple Updates
    2013-12-14 17:18:04
    • Multiple Updates
    2013-11-26 05:22:23
    • Multiple Updates
    2013-11-20 00:18:17
    • Multiple Updates
    2013-11-11 13:36:09
    • Multiple Updates
    2013-11-07 00:26:10
    • Multiple Updates
    2013-11-06 21:35:26
    • Multiple Updates
    2013-11-05 00:18:59
    • First insertion