|
Vulnerability Elron IM Affected Elron IM Description Erik Tayler found following. At least two products of the Elron Internet Manager family of tools contain directory traversal vulnerabilities. The problem exists in the following products: - IM Message Inspector - IM Anti-Virus Elron Internet Manager products that are not vulnerable are: - IM Firewall IM Web Inspector has not been tested. If the IM Web Inspector comes with Elron Software's proprietary web server as well, it is undoubtedly vulnerable as well. Exact version numbers were not obtained, this can be attributed to the tragic loss of 3 VMWare images [it was a painful experience]. Vulnerabilities were discovered on 2-21-01, so whichever versions were current at time of discovery, those are the vulnerable versions. The problem is within Elron Software's proprietary web server. It does not perform proper path checking, allowing potential intruders to perform basic directory traversal attacks. For example: http://63.72.97.3:80/../../../../../../boot.ini will in most cases, return the specified file. In some cases, more "../" sequences will be required. As a side note, this method was also used to obtain a SAM file. Using the GET perl script that comes with the LWP toolset, one can do the following: GET http://target/../../../../../../winnt/repair/sam._ >sam._ Then just expand and begin cracking. It's doubtful that anyone will encounter much of these, but just in case, this was written up. Solution The error in this note is now fixed in MI/AV v3.0.4.