Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:8660
HistoryMay 18, 2005 - 12:00 a.m.

[SA15388] ignitionServer Access Entry Deletion and Channel Locking Vulnerabilities

2005-05-1800:00:00
vulners.com
21

Want a new IT Security job?

Vacant positions at Secunia:
http://secunia.com/secunia_vacancies/


TITLE:
ignitionServer Access Entry Deletion and Channel Locking
Vulnerabilities

SECUNIA ADVISORY ID:
SA15388

VERIFY ADVISORY:
http://secunia.com/advisories/15388/

CRITICAL:
Moderately critical

IMPACT:
Security Bypass, DoS

WHERE:
>From remote

SOFTWARE:
ignitionServer 0.1.x
http://secunia.com/product/3123/
ignitionServer 0.2.x
http://secunia.com/product/3124/
ignitionServer 0.3.x
http://secunia.com/product/3565/

DESCRIPTION:
Two vulnerabilities have been reported in ignitionServer, which can
be exploited by malicious users to delete access entries or prevent
protected operators from accessing certain channels.

1) According to the IRCX draft, only owners are allowed to delete
access entries set by owners. However, this is not checked before
access entries are deleted, which breaches channel security and
allows hosts to delete access entries set by owners.

2) Due to a design error, protected IRC operators can't access
channels created and locked by normal users.

SOLUTION:
The vulnerabilities have been fixed in version 0.3.6-P1.
http://www.ignition-project.com/download

PROVIDED AND/OR DISCOVERED BY:
1) Keith Gable, Lead Programmer of the Ignition Project.
2) WebdesignX007

ORIGINAL ADVISORY:
http://www.ignition-project.com/security/20050414-hosts-delete-owner-access-entries
http://www.ignition-project.com/security/20050515-protected-opers-cannot-join-channel-with-key


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.