Novell Access Manager SSL VPN 'policy.txt' File Can By Modified By Remote Authenticated Users to Bypass VPN Network Access Controls
|
|
SecurityTracker Alert ID: 1017722 |
|
SecurityTracker URL: http://securitytracker.com/id/1017722
|
|
CVE Reference:
CVE-2007-1309
(Links to External Site)
|
Updated: Mar 7 2007
|
Original Entry Date: Mar 3 2007
|
Impact:
Host/resource access via network
|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes
|
Version(s): 3
|
Description:
A vulnerability was reported in Novell Access Manager. A remote authenticated user can bypass VPN network access controls.
A remote authenticated user can change the permissions of the 'policy.txt' file to read-only while a VPN session is active, disconnect, and then edit the file. When the user reconnects and authenticates, the user can bypass any network access controls invoked by the VPN session.
|
Impact:
A remote authenticated user can bypass VPN network access controls.
|
Solution:
The vendor has issued a fix (am3sslvpn.tar.gz), available at:
http://support.novell.com
The Novell advisory is available at:
https://secure-support.novell.com/KanisaPlatform/Publishing/648/3429077_f.SAL_Public.html
|
Vendor URL: secure-support.novell.com/KanisaPlatform/Publishing/648/3429077_f.SAL_Public.html (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (SuSE)
|
|
Message History:
None.
|
Source Message Contents
|
|
|
[Original Message Not Available for Viewing]
|
|