From ereed@novell.com Wed Aug 21 17:11:52 2002 From: Ed Reed To: cert@cert.org, bugtraq@securityfocus.com Date: Wed, 21 Aug 2002 13:50:01 -0600 Subject: NOVL-2002-2963349 - Rconag6 Secure IP Login Vulnerability - NW6SP2 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 For Immediate Disclosure ============================== Summary ============================== Security Alert: NOVL-2002-2963349 Title: Rconag6 Secure IP Login Vulnerability - NW6SP2 Date: 21-Aug-2002 Revision: Original Product Name: Netware 6 Service Pack 2 OS/Platform(s): NetWare 6 Reference URL: http://support.novell.com/servlet/tidfinder/2963349 Vendor Name: Novell, Inc. Vendor URL: http://www.novell.com Security Alerts: http://support.novell.com/security-alerts Affects: RCONAG6.NLM Identifiers: None Credits: None ============================ Description ============================ These files fix the security issue running RconJ in secure mode where you can gain access to the server without a password. This is only a problem on NetWare 6 servers after applying SP2. ============================== Impact =============================== Remote access to a NetWare 6 server on which Service Pack 2 has been applied running RCONAG6 may be granted without checking the console password of the target server if the RconJ "Secure IP" (SSL) option is used to establish the connection. ======================== Recommended Actions ======================== Note: The patch file is currently available as a BETA patch, which means a user registration (no fee) is required to download the file. Extract the files Copy RCONAG6.NLM to SYS:\SYSTEM Copy RCONAG6.MSG to SYS:\SYSTEM\NLS\4 RESTART SERVER See detailed instructions in the referenced Technical Information Document (TID) http://support.novell.com/servlet/tidfinder/2963349. ============================ DISCLAIMER ============================= The content of this document is believed to be accurate at the time of publishing based on currently available information. However, the information is provided "AS IS" without any warranty or representation. Your use of the document constitutes acceptance of this disclaimer. Novell disclaims all warranties, express or implied, regarding this document, including the warranties of merchantability and fitness for a particular purpose. Novell is not liable for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this document or any security alert, even if Novell has been advised of the possibility of such damages and even if such damages are foreseeable. ============================ Appendices ============================= None ================ Contacting Novell Security Alerts ================== To report suspected security vulnerabilities in Novell products, send email to secure@novell.com PGP users may send signed/encrypted information to us using our PGP key, available from the pgpkeys.mit.edu server, or our website at: http://support.novell.com/security-alerts Security Alerts, Novell, Inc. PGP Key Fingerprint: F5AE 9265 0A34 F84E 580E 9B87 3AC1 1974 DE05 0FDB ========================= Revision History ========================== Original: 21-Aug-2002 - Original Publication -----BEGIN PGP SIGNATURE----- Version: PGP Personal Security 7.0.3 iQA/AwUBPWPtoTrBGXTeBQ/bEQKeAQCggbso/oijUvXi2rVedrgxqKuUOzMAn3m/ X9SGhP8548Ii81y1OxJHp/ng =bKmJ -----END PGP SIGNATURE-----