Published:2013/12/25 Last Updated:2013/12/25
JVN#81706478
Cybozu Garoon Keitai vulnerable to authentication bypass
Overview
Cybozu Garoon Keitai contains an authentication bypass vulnerability.
Products Affected
- Cybozu Garoon 3.5 through 3.7 Service Pack 2
Description
Cybozu Garoon provided by Cybozu,Inc. is a groupware. Cybozu Garoon Keitai contains an authentication bypass vulnerability.
Impact
When an attacker sends a specially crafted request that includes a user ID for a user that has the Keitai function enabled, authentication using Keitai may be bypassed. As a result, information that can be accessed using this user's privileges may be disclosed.
Solution
Apply the Patch
Apply the patch according to the information provided by the developer.
Vendor Status
Vendor | Status | Last Update | Vendor Notes |
---|---|---|---|
Cybozu, Inc. | Vulnerable | 2013/12/25 | Cybozu, Inc. website |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2013.12.25
Measures | Conditions | Severity |
---|---|---|
Access Required | can be attacked over the Internet using packets |
|
Authentication | anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | the vulnerability can be exploited without an honest user taking any action |
|
Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Credit
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2013-6006 |
JVN iPedia |
JVNDB-2013-000125 |
Update History
- 2013/12/25
- Cybozu, Inc. update status
- 2013/12/25
- Information under the section "Vendor Status" was modified.