QualysGuard Known Issues 20130311
QualysGuard Known Issues 20130311
QualysGuard Known Issues 20130311
Abstract
Description of systems that could potentially be adversely affected by scan traffic.
Author
Qualys Technical Support
Copyright
2013 Qualys, Inc. All rights reserved worldwide
Qualys, Inc. 1600 Bridge Parkway, Suite 201 Redwood Shores, CA 94065 Telephone: (650) 801-6100 Web: www.qualys.com
Table of Contents
1 1.1 2 Introduction ......................................................................................................................................... 5 Document Scope..............................................................................................................................................5 Qualified Reports ................................................................................................................................ 6
2.1 Applix TM1 ..................................................................................................................................................... 6 2.1.1 Applix TM1 Service Crash ....................................................................................................................... 6 2.2 Candle Roma ...................................................................................................................................................7 2.2.1 Candle Roma Memory Consumption Denial of Service ...........................................................................7 2.3 Cisco Products ................................................................................................................................................7 2.3.1 Cisco Secure ACS Memory Consumption Denial of Service ...................................................................7 2.3.2 CatOS 5.x, 6.x, 7.x, 8.x, 8.xGLX Denial of Service ..............................................................................8 2.3.3 Cisco CNS Network Registrar Multiple Vulnerabilities ...........................................................................9 2.3.4 Cisco Catalyst 6500 Host Crash .............................................................................................................. 10 2.3.5 Cisco Catalyst 3750X Denial of Service memory leak ........................................................................... 11 2.4 Citrix Secured Gateway Service .................................................................................................................. 11 2.4.1 Secured Gateway Service DOS/Service Crash ...................................................................................... 11 2.5 CODA Financials .......................................................................................................................................... 12 2.5.1 CODA Financials Denial of Service ..................................................................................................... 12 2.6 Computer Associates BrightStor Agent ...................................................................................................... 12 2.6.1 CA BrightStor Agent Denial of Service .................................................................................................. 12 2.7 Dell SAS RAID Storage Manager ............................................................................................................... 13 2.7.1 2.14.1 Dell SAS RAID Storage Manager Service Crash ........................................................................ 13 2.8 Hewlett-Packard Devices ............................................................................................................................. 13 2.8.1 HP LaserJet M2727NF Input-Validation ................................................................................................ 13 2.8.2 HP-UX Portmapper Denial of Service/Kernel Panic .............................................................................. 14 2.8.3 HP-UX Host Crash .................................................................................................................................. 14 2.9 IBM Products ................................................................................................................................................ 14 2.9.1 IBM BuildForge Agent Weakness Host Crash ...................................................................................... 14 2.9.2 IBM Distributed Computing Environment (DCE) Service Crash ........................................................... 15 2.9.3 IBM Lotus Domino Server Mail Loop Denial of Service ....................................................................... 15 2.10 Nortel Passport ............................................................................................................................................. 16 2.10.1 Nortel Passport 8600 Denial of Service .............................................................................................. 16 2.11 Novell NetWare ............................................................................................................................................. 17 2.11.1 NetWare Version 6.5 Abend in XNFS/XNFS.NLM ....................................................................... 17 2.11.2 NetWare Version 6.0 Abend in PKERNEL.NLM .............................................................................. 17 2.11.3 NetWare Version 5.1 Abend in PKERNEL.NLM ........................................................................... 19 2.12 Oracle Cluster Synchronization Services ................................................................................................... 19 2.12.1 Oracle Cluster Synchronization Services Denial of Service ........................................................... 19
Qualys Support
2.13 Oracle COREid Access Server .................................................................................................................... 20 2.13.1 Oracle COREid Access Server CPU Utilization Denial of Service ................................................ 20 2.14 Polycom SoundPoint .................................................................................................................................... 21 2.14.1 Polycom SoundPoint IP 330 SIP Denial of Service ........................................................................ 21 2.15 Sybase Adaptive Server Enterprise (ASE) ................................................................................................. 21 2.15.1 Sybase ASE - CPU Utilization Denial of Service .................................................................................. 21 2.16 TIDAL Agent ................................................................................................................................................ 22 2.16.1 TIDAL Agent Denial of Service ....................................................................................................... 22 3 Unqualified Reports .......................................................................................................................... 23
3.1 Blue Coat Director ........................................................................................................................................ 23 3.1.1 Blue Coat Director Host Crash............................................................................................................... 23 3.2 Brocade Fabric OS ....................................................................................................................................... 23 3.2.1 Brocade Fabric OS Memory Consumption Denial of Service ............................................................ 23 3.3 Cisco 3640 ...................................................................................................................................................... 24 3.3.1 Cisco 3640 Denial of Service ................................................................................................................ 24 3.4 Citrix .............................................................................................................................................................. 25 3.4.1 Citrix Access Gateway ............................................................................................................................... 25 3.5 EMC............................................................................................................................................................... 26 3.5.1 EMC EmailXtender Service Crash ....................................................................................................... 26 3.5.2 EMC Master Agent Service Crash ........................................................................................................ 26 3.6 IBM Remote Supervisor Adapter ............................................................................................................... 27 3.6.1 IBM Remote Supervisor Adapter Service Crash ................................................................................. 27 3.7 NEC projector LT265 .................................................................................................................................. 27 3.7.1 NEC projector LT265 Device becomes unresponsive ............................................................................ 27 3.8 Netopia Caymon 3546 .................................................................................................................................. 28 3.8.1 Netopia Caymon 3546 Host Crash........................................................................................................ 28 3.9 NetScaler ....................................................................................................................................................... 28 3.9.1 NetScaler Load Balancer Host Crash ................................................................................................... 28 3.10 Nortel Switches 4500 and 5500 Series ......................................................................................................... 29 3.10.1 Nortel Switch Host Crash .................................................................................................................. 29 3.11 Oracle Rdb .................................................................................................................................................... 29 3.11.1 Oracle Rdb Denial of Service ........................................................................................................... 29 3.12 Red Hat Enterprise Linux ........................................................................................................................... 30 3.12.1 RHEL Dual NIC Kernel Panic ............................................................................................................ 30 3.13 SAP Netweaver ............................................................................................................................................. 30 3.13.1 SAP Netweaver Service Crash .......................................................................................................... 30 3.14 Sun Applications ........................................................................................................................................... 31 3.14.1 Sun Forte Developer .............................................................................................................................. 31
Qualys Support
3.15 VMWare ESX Server ................................................................................................................................... 31 3.15.1 VMWare ESX Server Service Crash ................................................................................................ 31 3.16 Websense ....................................................................................................................................................... 32 3.16.1 Websense Reporter Service Crash .................................................................................................... 32 3.17 Xerox DC405 Printer ................................................................................................................................... 32 3.17.1 Xerox DC405 Printer Excessive Network Traffic ........................................................................... 32
Qualys Support
1 Introduction
Scanning for security vulnerabilities on your network can cause potential impact to select systems and configurations. Qualys would like to bring to your attention a few known issues on certain target systems. For each issue, there is current information and a resolution when available. If you have any of these systems on your network, be sure to check the vendor references provided for the latest information. For the latest version of this document please visit Qualys Community Help Center at https://community.qualys.com/community/help. Qualys Support makes every effort to keep this document up-to-date, incorporating the latest information from our customers on a regular basis. We encourage our customers to visit the community and contribute to the content of this document.
Qualys Support
2 Qualified Reports
2.1.1
Issue Date
Description
Products affected
The vendor has fixed the issues in the latest builds. The vendor did not provide Qualys with a reference number. Details on obtaining updates to the Applix TM1 product are available on the Applix web site at the following URL: http://www.applix.com/
Qualys Support
Vendor Reference
Qualys Support
Products affected
Cisco Secure ACS 4.0 running on Windows Server 2003 with Service Pack 1. Note: We have only tested the above version on the above operating system. Other Cisco Secure ACS versions or configurations may also be affected.
There is no known fix for this issue. Please visit the Cisco Systems web site for updates to the Cisco Secure ACS product at the following URL: http://www.cisco.com/
Qualys Support
Workaround
For tested workarounds to this issue, please reference the Cisco security advisory, available at the following URL: http://www.cisco.com/warp/public/707/cisco-sa20040609-catos.shtml
Vendor Reference
Cisco bug IDs: CSCec42751, CSCed45576, and CSCed48590. Cisco security advisory is posted at the following URL: http://www.cisco.com/warp/public/707/cisco-sa20040609-catos.shtml
2.3.3
Issue Date
Description
Products affected
Cisco CNS Network Registrar Versions for Windows NT server and Windows 2000 are affected. For Cisco CSCeg27625, CNS Network Registrar Versions 6.0 through 6.1.1.3 are affected. For Cisco CSCeg27614, all CNS Network Registrar Versions up to and including Version 6.1.1.3 are affected. Vendor has released CNS Network Registrar Version 6.1.1.4 which addresses these issues. Cisco has made free software available to address this vulnerability for all affected customers.
Resolution
Qualys Support
Vendor Reference
2.3.4
Issue Date
Description
Vendor Reference
Cisco bug ID: CSCef59484. For the latest information, log into your CCO account, and use the BugNavigator tool to find the bug details.
Qualys Support
10
2.3.5
Issue Date
Description
Vendor Reference
Products affected
This vulnerability is present in all versions of Citrix Secured Gateway up to and including version 3.1. Please note that the Citrix Access Gateway appliance is not affected by this vulnerability when configured to act as a Citrix Secure Gateway.
Qualys Support
11
Resolution
Vendor Reference
Qualys Support
12
Products affected
CA BrightStor version 11.1 running on RedHat 9 with Linux Kernel 2.4.20-8. Note: We have only tested the above version running on the above operating system. Other CA BrightStor versions and configurations may also be affected.
There is no known fix for this issue. Please visit the Computer Associates web site for updates to the BrightStor product at this URL: http://www.ca.com/
Vendor Reference
Qualys Support
13
HP LaserJet M2727NF multi-function devices; similar devices also likely to be affected. Contact HP support for resolution. N/A
2.8.2
Issue
2.8.3
Issue
Qualys Support
14
BuildForge Agent version 7.0.2 IBM has and update available that address this issue. Refer to Vendor Reference. For more information and available fixes please go to: http://www01.ibm.com/support/docview.wss?uid=swg21303877
2.9.2
Issue
2.9.3
Issue Date
Description
Products affected
IBM Lotus Domino Server versions 5.0.8 and earlier are affected.
Qualys Support
15
Resolution
Upgrade to Lotus Domino Server version 5.0.9 or greater. Or configure Domino rules to not reply to Qualys mail relay tests and drop them directly. Qualys mail relay tests always use in the source email address the qgmrfrom user and qgmrtest user. The QualysGuard external scanner IP ranges are listed in your QualysGuard account, under Help-> About.
Vendor Reference
Please visit the IBM Lotus support site for the latest information at this URL: http://www306.ibm.com/software/lotus/support/centers.html
Vendor Reference
Qualys Support
16
XNFS 13 Jan 2004 XNFS Abend when accessing invalid ports. Abend in RPCWorker7 Process when Nessus Port Scanner scans a NetWare 6.5 server with invalid ports like: 1234. NetWare 6.5 http://support.novell.com/cgibin/search/searchtid.cgi?/10087844.htm
Qualys Support
17
NetWare 6.0 NetWare 5.1 Novell NFS Services 3.0 Novell Native File Access for UNIX (NFAU) http://support.novell.com/cgibin/search/searchtid.cgi?/10088719.htm
Vendor Reference
HTTPSTK.NLM 07 Jul 2003 Abend: EIP in HTTPSTK.NLM at code start +00004CFBh . Performing security scan of NetWare 6 Server causes server to abend in HTTPSTK.NLM. NetWare 6.0 Support Pack 2 NetWare 6.0 Support Pack 3 http://support.novell.com/cgibin/search/searchtid.cgi?/10084780.htm
HTTPSTK Vulnerability Fix - TID2966181 06 JUN 2003 HTTPSTK.NLM to address an Abend in the Netware HTTP Stack caused by a modified keep-alive packet. The Netware HTTP Stack running on Novell Netware 6 (SP3) server ABENDs (abnormal ends) when it receives a modified keep alive packet request on the same TCP connection, which can result in denial of service. NetWare 6.0 Service Pack 3 http://support.novell.com/cgibin/search/searchtid.cgi?/2966181.htm
BTCPCOM 11 Jul 2003 BTCPCOM CPU Hog ABEND Fix. There is a possibility of a CPU Hog Timeout ABEND in BTCPCOM.NLM when running a port scanning utility against a NetWare server. NetWare 6.0 NetWare 5.1 http://support.novell.com/cgibin/search/searchtid.cgi?/2966492.htm
Qualys Support
18
Vendor Reference
BTCPCOM 11 Jul 2003 BTCPCOM CPU Hog ABEND Fix. There is a possibility of a CPU Hog Timeout ABEND in BTCPCOM.NLM when running a port scanning utility against a NetWare server. NetWare 6.0 NetWare 5.1 http://support.novell.com/cgibin/search/searchtid.cgi?/2966492.htm
Qualys Support
19
Description
The OCSSD process listens on a dynamic port. When a remote attacker connects to the OCSSD's listening port and sends 0, 1, 2, or 3 bytes of data before terminating the connection, the OCSSD process fails to free the socket it acquired for the connection. Since there is a limit on the number of file descriptors a process can own, the remote attacker may repeat the above process until OCSSD exhausts the maximum number of file descriptors and stops accepting new connections. Once triggered into this denial of service condition, the OCSSD process must be manually restarted to regain its normal functionality. Oracle Cluster Synchronization Services (OCSSD) in Oracle 10g (versions 10.1.0.4 and 10.1.0.3) running on Windows 2003 and RedHat AS3. Note: We have only tested the above versions on the above operating systems. Other Oracle OCSSD versions for the above and other operating systems may also be affected.
Products affected
There is no known fix for this issue. Please visit the Oracle web site for updates to Oracle's database products at the following URL: http://www.oracle.com/
Products affected
Qualys Support
20
There is no known fix for this issue. Please visit the Oracle web site for updates to the COREid Access Server product at the following URL: http://www.oracle.com/
Qualys Support
21
Resolution
Qualys Support
22
3 Unqualified Reports
Qualys Support
23
Products affected
Switches based on Brocade Fabric OS Version 3.0.2f and earlier are affected, such as Brocade Silkworm switches and EMC Connectrix DS-16B2. Some Silkworm V2.x and V3.x switches are affected. Note: Silkworm switches using Fabric OS V4.x are not affected, including SW3900, SW12000, SW24000, SW3250, and SW3850.
Resolution
It is recommended that you upgrade to the latest firmware level, which fixes several memory leak issues. For Silkworm V2.x switches, upgrade to Fabric OS V2.6.2 or later. For Silkworm V3.x switches using Fabric OS V3.x, upgrade to Fabric OS V3.1.2 or later.
Vendor Reference
For more information on this known issue, customers can obtain Release Notes Revision 3.1.2 from the equipment provider.
Qualys Support
24
Products affected
Cisco 3640 (R4700) processor (revision 0x00) with 98304K/32768K bytes of memory. Processor board ID 27612296 R4700 CPU at 100Mhz, Implementation 33, Rev 1.0 Bridging software. X.25 software, Version 3.0.0. SuperLAT software ( 1990 by Meridian Technology Corp). 4 Ethernet/IEEE 802.3 interface(s) 2 FastEthernet/IEEE 802.3 interface(s) 1 Serial network interface(s) DRAM configuration is 64 bits wide with parity disabled. 125K bytes of non-volatile configuration memory. 32768K bytes of processor board System flash (Read/Write) ROM: System Bootstrap, Version 11.1(20)AA2, EARLY DEPLOYMENT RELEASE SOFTWARE (fc1) ROM: 3600 Software (C3640-IK9S-M), Version 12.2(16b), RELEASE SOFTWARE (fc1) System image file is "flash:c3640-ik9s-mz.12216f.bin"
3.4 Citrix
3.4.1 Citrix Access Gateway
Issue Date / Qualys Reference Description Service Crash 12 Oct 2009 / BID 75820 It has been reported that Citrix Access Gateway Standard Edition 4.5.5 build 45 may crash when being scanned. Qualys has narrowed the cause down to a particular request. ---[code]--GET ftp://89.167.157.104/~<img%20src=test% 20onclick=alert(XSS)> HTTP/1.0\r\n\r\n ---[code]--Citrix Access Gateway Standard Edition 4.5.5 build 45 (others may be affected as well)
Products affected
Qualys Support
25
Resolution
Qualys has implemented a modification to avoid service impact. Qualys is not aware of a vendor fix to this vulnerability. N/A
Vendor Reference
3.5 EMC
3.5.1 EMC EmailXtender Service Crash
Issue Date / Qualys Reference Description Multiple service crash 03 Dec 2007 / BID 49671 Multiple services related to EMC EmailXtender appear to lack robust error handling when accepting data from a remote host. It is possible to crash the following services remotely: exHealthCheck.exe, exQuery.exe, exMail.exe, and exAdmin.exe. EMC EmailXtender 4.8 Patch 266. Other versions may be vulnerable as well. Qualys is unaware of a vendor patch. N/A
3.5.2
Issue
Vendor Reference
Qualys Support
26
Vendor Reference
Qualys Support
27
3.8.1
Issue Date
Vendor Reference
3.9 NetScaler
NetScaler Application Delivery Systems provide a solution for optimized delivery of applications, while ensuring continuous availability of applications and content.
Resolution
Vendor Reference
Qualys Support
28
Resolution
Vendor Reference
N/A
Qualys Support
29
Qualys Support
30
Vendor Reference
Vendor Reference
Qualys Support
31
3.16 Websense
3.16.1 Websense Reporter Service Crash
Issue Date Description Products affected ExplorerServer.exe service crash 03 Jan 2008 ExplorerServer.exe, the web-server interface to the Websense reporting engine, crashes when scanned. Websense Reporter v.5.5; ExplorerServer.exe v.5.5.0.161 Other versions may be vulnerable as well. Websense has reportedly fixed this vulnerability in a later version. N/A
Qualys Support
32