NOVL-2002-2963349 - Rconag6 Secure IP Login Vulnerability -NW6SP2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

For Immediate Disclosure

============================== Summary ==============================

 Security Alert: NOVL-2002-2963349
          Title: Rconag6 Secure IP Login Vulnerability - NW6SP2
           Date: 21-Aug-2002
       Revision: Original
   Product Name: Netware 6 Service Pack 2
 OS/Platform(s): NetWare 6
  Reference URL: http://support.novell.com/servlet/tidfinder/2963349
    Vendor Name: Novell, Inc. 
     Vendor URL: http://www.novell.com
Security Alerts: http://support.novell.com/security-alerts 
        Affects: RCONAG6.NLM
    Identifiers: None
        Credits: None

============================ Description ============================

These files fix the security issue running RconJ in secure mode where
you can gain access to the server without a password. This is only a
problem on NetWare 6 servers after applying SP2. 

============================== Impact ===============================

Remote access to a NetWare 6 server on which Service Pack 2 has been
applied running RCONAG6 may be granted without checking the console
password of the target server if the RconJ "Secure IP" (SSL) option
is used to establish the connection.

======================== Recommended Actions ========================

Note:  The patch file is currently available as a BETA patch, which
means a user registration (no fee) is required to download the file.

Extract the files
Copy RCONAG6.NLM to SYS:\SYSTEM
Copy RCONAG6.MSG to SYS:\SYSTEM\NLS\4
RESTART SERVER

See detailed instructions in the referenced Technical Information
Document (TID) http://support.novell.com/servlet/tidfinder/2963349.

============================ DISCLAIMER =============================

The content of this document is believed to be accurate at the time
of publishing based on currently available information. However, the
information is provided "AS IS" without any warranty or
representation. Your use of the document constitutes acceptance of
this disclaimer. Novell disclaims all warranties, express or implied,
regarding this document, including the warranties of merchantability
and fitness for a particular purpose. Novell is not liable for any
direct, indirect, or consequential loss or damage arising from use
of, or reliance on, this document or any security alert, even if
Novell has been advised of the possibility of such damages and even
if such damages are foreseeable.

============================ Appendices =============================

None

================ Contacting Novell Security Alerts ==================

To report suspected security vulnerabilities in Novell products, send
email to
            secure@novell.com

PGP users may send signed/encrypted information to us using our PGP
key, available from the pgpkeys.mit.edu server, or our website at: 

            http://support.novell.com/security-alerts


Security Alerts, Novell, Inc. PGP Key Fingerprint:

F5AE 9265 0A34 F84E 580E  9B87 3AC1 1974 DE05 0FDB

========================= Revision History ==========================
       Original: 21-Aug-2002 - Original Publication

-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Security 7.0.3

iQA/AwUBPWPtoTrBGXTeBQ/bEQKeAQCggbso/oijUvXi2rVedrgxqKuUOzMAn3m/
X9SGhP8548Ii81y1OxJHp/ng
=bKmJ
-----END PGP SIGNATURE-----

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux