Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Web Server/CGI)  >   Tarantella Vendors:   Tarantella, Inc.
Tarantella Native Client Password Saving Restriction Can Be Circumvented
SecurityTracker Alert ID:  1003988
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 5 2002
Impact:   Modification of system information
Exploit Included:  Yes  
Version(s): Tarantella Native Client 3.11, 3.20
Description:   A vulnerability was reported in the Tarantella Native Client for Tarantella Enterprise 3. The policy rule that ensures that users cannot save passwords for the application servers can be circumvented by users of the Tarantella Native Client.

It is reported that the Tarantella array manager allows the administrator to define a rule that prevents users from saving passwords for the application servers. This feature reportedly works for web browser (Java/Javascript) access but can be bypassed for the Tarantella Native Client.

Impact:   A remote user can save their application passwords on their host using the Tarantella Native Client when the administrator has configured the system to not permit passwords to be saved.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Open UNIX-SCO), UNIX (Solaris - SunOS), UNIX (Tru64)

Message History:   None.

 Source Message Contents

Subject:  SECURITY BUG: Tarantella Enterprise 3 and the included Tarantella

The version 3 of Tarantella Enterprise software includes a native client
http://<hostname>/tarantella/cgi-bin/install.cgi ), which you can
if yo dont want to use Java and/or Javascript in a web browser. The
client ist available for all tarantella supported plattforms (Windows,
Solaris, Linux, HP-UX,...).

In the Tarantella array manager it is possible to define a rule, that a
user can't save the passwords for the application servers for security
reasons. These feature works well in a browser (Java/Javascript) but is
broken in the Tarantella Native Client. The user can override the option
given by the Tarantella administrator and is able to save all
server passwords in his profile. If the Tarantella login and password fo
user is known by an unauthorized  user he/she  is able to connect to all
application servers without prompting for a specific login and password.
This bug is found in version 3.11 and 3.20.


          Frank Ickstadt
Development Specialist
NMC Backoffice Data IP/Admin

BT Ignite GmbH & Co
Mergenthalerallee 6-8
65760 Eschborn

Fon:    +49 / (0)69 / 3307 6943
Fax:    +49 / (0)69 / 3307 6135
Mobile: +49 / (0)179 / 697 1080


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC