BugTraq
Arkeia Possible remote root & information leakage Jan 12 2005 03:46PM
Maciej Bogucki (maciej bogucki artegence com)
During the testing of arkeia a few security holes has been discovered.

Vulnerable System: Arkeia 4.2.x, 5.2.x and 5.3.x

Details:

1. Writable directory

$ ls -ld /opt/arkeia/server/dbase/
drwxrwxrwx 10 root root 4096 gru 27 13:40 /opt/arkeia/server/dbase/

2. Default the "root" account password is set to null

$ cat /opt/arkeia/server/dbase/f3sec/usr.lst
ITEM {
"NODE" "*"
"PASSWORD" ""
"ROLE" "ADMINISTRATOR"
"NAME" "root"
}

3. Password file readable by any user

$ ls -l /opt/arkeia/server/dbase/f3sec/usr.lst
-rw-r--r-- 1 root root 117 gru 27 13:59
/opt/arkeia/server/dbase/f3sec/usr.lst

4. password is hashed with the crypt function with a constant salt
( the characters "n3" ) - 8 character passwords maximum
See: http://seclists.org/lists/bugtraq/2001/Aug/0237.html

5. arkeiad is starting default on all computers

$ netstat -nlp | grep 617
tcp 0 0 0.0.0.0:617 0.0.0.0:* LISTEN 5570/arkeiad

arkeiad isn't needed on client-gui

Conclusion: Nothing has changed since version 4.2. See References.
Vendor informed: April, 2004
Thanks: Quentyn Taylor
References:
http://www.securityfocus.com/archive/1/205378
http://www.arkeia.com/

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus