var-200811-0235
Vulnerability from variot
dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \.\DNE device interface. Deterministic Network Enhancer (DNE) Contains an elevation of privilege vulnerability. As a result, local users Windows Arbitrary code may be executed with kernel privileges. Deterministic Networks Provided by Deterministic Network Enhancer (DNE) Is Microsoft Windows This product is an extension of the network stack. DNE Is Cisco VPN Client It is used by multiple products. DNE Driver dne2000.sys Contains an elevation of privilege vulnerability. For details, refer to the information provided by each vendor.Local users Windows Arbitrary code may be executed with kernel privileges. Successful attacks will completely compromise affected computers. DNE 'dne2000.sys' 2.21.7.233 to 3.21.8 are vulnerable; other versions may also be affected. There is a loophole in the implementation of the DNE driver.
The vulnerability is reported in dne2000.sys versions 2.21.7.233 to 3.21.7.17464.
SOLUTION: Grant only trusted users access to affected systems.
PROVIDED AND/OR DISCOVERED BY: mu-b
ORIGINAL ADVISORY: http://www.digit-labs.org/files/exploits/dne2000-call.c
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "deterministic network enhancer", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "2.21.7.223" }, { "_id": null, "model": "deterministic network enhancer", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "3.21.7.17464" }, { "_id": null, "model": null, "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "_id": null, "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "_id": null, "model": null, "scope": null, "trust": 0.8, "vendor": "deterministic", "version": null }, { "_id": null, "model": null, "scope": null, "trust": 0.8, "vendor": "safenet", "version": null }, { "_id": null, "model": "deterministic network enhancer", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "dne2000.sys 3.21.12.17902 earlier" }, { "_id": null, "model": "highassurance remote", "scope": null, "trust": 0.8, "vendor": "safenet", "version": null }, { "_id": null, "model": "softremote vpn client", "scope": null, "trust": 0.8, "vendor": "safenet", "version": null }, { "_id": null, "model": "vpn client", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "_id": null, "model": "deterministic network enhancer", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "2.21.7.233 to 3.21.7.17464" }, { "_id": null, "model": "winproxy", "scope": null, "trust": 0.8, "vendor": "blue coat", "version": null }, { "_id": null, "model": "deterministic network enhancer", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "3.21.12.17902" }, { "_id": null, "model": "deterministic network enhancer", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "3.21.8" }, { "_id": null, "model": "deterministic network enhancer", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "2.21.7.233" }, { "_id": null, "model": "deterministic network enhancer", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "2.21.7.17464" }, { "_id": null, "model": "deterministic network enhancer", "scope": "ne", "trust": 0.3, "vendor": "citrix", "version": "3.21.9" }, { "_id": null, "model": "vpn client for windows", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.0.3.0530" } ], "sources": [ { "db": "CERT/CC", "id": "VU#858993" }, { "db": "BID", "id": "29772" }, { "db": "JVNDB", "id": "JVNDB-2008-001884" }, { "db": "JVNDB", "id": "JVNDB-2008-003645" }, { "db": "CNNVD", "id": "CNNVD-200811-282" }, { "db": "NVD", "id": "CVE-2008-5121" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:citrix:deterministic_network_enhancer", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001884" } ] }, "credits": { "_id": null, "data": "mu-b mu-b@digit-labs.org", "sources": [ { "db": "CNNVD", "id": "CNNVD-200811-282" } ], "trust": 0.6 }, "cve": "CVE-2008-5121", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2008-5121", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-35246", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-5121", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#858993", "trust": 0.8, "value": "22.50" }, { "author": "NVD", "id": "CVE-2008-5121", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200811-282", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-35246", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#858993" }, { "db": "VULHUB", "id": "VHN-35246" }, { "db": "JVNDB", "id": "JVNDB-2008-003645" }, { "db": "CNNVD", "id": "CNNVD-200811-282" }, { "db": "NVD", "id": "CVE-2008-5121" } ] }, "description": { "_id": null, "data": "dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\\\.\\DNE device interface. Deterministic Network Enhancer (DNE) Contains an elevation of privilege vulnerability. As a result, local users Windows Arbitrary code may be executed with kernel privileges. Deterministic Networks Provided by Deterministic Network Enhancer (DNE) Is Microsoft Windows This product is an extension of the network stack. DNE Is Cisco VPN Client It is used by multiple products. DNE Driver dne2000.sys Contains an elevation of privilege vulnerability. For details, refer to the information provided by each vendor.Local users Windows Arbitrary code may be executed with kernel privileges. Successful attacks will completely compromise affected computers. \nDNE \u0027dne2000.sys\u0027 2.21.7.233 to 3.21.8 are vulnerable; other versions may also be affected. There is a loophole in the implementation of the DNE driver. \n\nThe vulnerability is reported in dne2000.sys versions 2.21.7.233 to\n3.21.7.17464. \n\nSOLUTION:\nGrant only trusted users access to affected systems. \n\nPROVIDED AND/OR DISCOVERED BY:\nmu-b\n\nORIGINAL ADVISORY:\nhttp://www.digit-labs.org/files/exploits/dne2000-call.c\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-5121" }, { "db": "CERT/CC", "id": "VU#858993" }, { "db": "JVNDB", "id": "JVNDB-2008-001884" }, { "db": "JVNDB", "id": "JVNDB-2008-003645" }, { "db": "BID", "id": "29772" }, { "db": "VULHUB", "id": "VHN-35246" }, { "db": "PACKETSTORM", "id": "67460" }, { "db": "PACKETSTORM", "id": "67431" }, { "db": "PACKETSTORM", "id": "67433" }, { "db": "PACKETSTORM", "id": "67449" } ], "trust": 3.78 }, "exploit_availability": { "_id": null, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-35246", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-35246" } ] }, "external_ids": { "_id": null, "data": [ { "db": "CERT/CC", "id": "VU#858993", "trust": 4.4 }, { "db": "NVD", "id": "CVE-2008-5121", "trust": 2.8 }, { "db": "SECUNIA", "id": "30747", "trust": 2.6 }, { "db": "SECUNIA", "id": "30744", "trust": 2.6 }, { "db": "SECUNIA", "id": "30753", "trust": 2.6 }, { "db": "SECUNIA", "id": "30728", "trust": 2.6 }, { "db": "BID", "id": "29772", "trust": 2.0 }, { "db": "VUPEN", "id": "ADV-2008-1867", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-1868", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-1866", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-1865", "trust": 1.7 }, { "db": "SREASON", "id": "4600", "trust": 1.7 }, { "db": "EXPLOIT-DB", "id": "5837", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2008-001884", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2008-003645", "trust": 0.8 }, { "db": "MISC", "id": "HTTP://WWW.DIGIT-LABS.ORG/FILES/EXPLOITS/DNE2000-CALL.C", "trust": 0.6 }, { "db": "XF", "id": "43153", "trust": 0.6 }, { "db": "XF", "id": "2000", "trust": 0.6 }, { "db": "MILW0RM", "id": "5837", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200811-282", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-35246", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "67460", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "67431", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "67433", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "67449", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#858993" }, { "db": "VULHUB", "id": "VHN-35246" }, { "db": "BID", "id": "29772" }, { "db": "JVNDB", "id": "JVNDB-2008-001884" }, { "db": "JVNDB", "id": "JVNDB-2008-003645" }, { "db": "PACKETSTORM", "id": "67460" }, { "db": "PACKETSTORM", "id": "67431" }, { "db": "PACKETSTORM", "id": "67433" }, { "db": "PACKETSTORM", "id": "67449" }, { "db": "CNNVD", "id": "CNNVD-200811-282" }, { "db": "NVD", "id": "CVE-2008-5121" } ] }, "id": "VAR-200811-0235", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-35246" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:47:38.513000Z", "patch": { "_id": null, "data": [ { "title": "DNE Support", "trust": 0.8, "url": "http://www.citrix.com/lang/English/lp/lp_1680845.asp" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.bluecoat.com/" }, { "title": "VPN Client", "trust": 0.8, "url": "http://www.cisco.com/univercd/cc/td/doc/product/vpn/client/" }, { "title": "CTX117751", "trust": 0.8, "url": "http://support.citrix.com/article/CTX117751" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.safenet-inc.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001884" }, { "db": "JVNDB", "id": "JVNDB-2008-003645" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-35246" }, { "db": "JVNDB", "id": "JVNDB-2008-003645" }, { "db": "NVD", "id": "CVE-2008-5121" } ] }, "references": { "_id": null, "data": [ { "trust": 3.6, "url": "http://www.kb.cert.org/vuls/id/858993" }, { "trust": 2.9, "url": "http://www.digit-labs.org/files/exploits/dne2000-call.c" }, { "trust": 2.4, "url": "http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails\u0026bugid=cscsm25860" }, { "trust": 2.0, "url": "http://support.citrix.com/article/ctx117751" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/29772" }, { "trust": 1.7, "url": "http://secunia.com/advisories/30728" }, { "trust": 1.7, "url": "http://secunia.com/advisories/30744" }, { "trust": 1.7, "url": "http://secunia.com/advisories/30747" }, { "trust": 1.7, "url": "http://secunia.com/advisories/30753" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/4600" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2008/1865" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2008/1866" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2008/1867" }, { "trust": 1.7, "url": "http://www.vupen.com/english/advisories/2008/1868" }, { "trust": 1.2, "url": "http://secunia.com/advisories/30728/" }, { "trust": 1.1, "url": "https://www.exploit-db.com/exploits/5837" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43153" }, { "trust": 0.9, "url": "http://secunia.com/advisories/30753/" }, { "trust": 0.9, "url": "http://secunia.com/advisories/30744/" }, { "trust": 0.9, "url": "http://secunia.com/advisories/30747/" }, { "trust": 0.8, "url": "http://www.deterministicnetworks.com/support/dnesupport.asp" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu858993/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-5121" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-5121" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/43153" }, { "trust": 0.6, "url": "http://www.milw0rm.com/exploits/5837" }, { "trust": 0.4, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.4, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.4, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.4, "url": "http://secunia.com/secunia_security_specialist/" }, { "trust": 0.4, "url": "http://corporate.secunia.com/about_secunia/64/" }, { "trust": 0.4, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.3, "url": "http://www.citrix.com" }, { "trust": 0.3, "url": "http://www.deterministicnetworks.com/products/dne.asp" }, { "trust": 0.1, "url": "http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails\u0026amp;bugid=cscsm25860" }, { "trust": 0.1, "url": "http://secunia.com/product/1122/" }, { "trust": 0.1, "url": "http://secunia.com/product/1121/" }, { "trust": 0.1, "url": "http://secunia.com/product/6750/" }, { "trust": 0.1, "url": "http://secunia.com/product/1574/" }, { "trust": 0.1, "url": "http://secunia.com/product/14325/" }, { "trust": 0.1, "url": "http://secunia.com/product/123/" }, { "trust": 0.1, "url": "http://secunia.com/product/124/" }, { "trust": 0.1, "url": "http://secunia.com/product/14465/" }, { "trust": 0.1, "url": "http://secunia.com/product/17450/" }, { "trust": 0.1, "url": "http://secunia.com/product/9097/" }, { "trust": 0.1, "url": "http://secunia.com/product/19105/" }, { "trust": 0.1, "url": "http://secunia.com/product/19106/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#858993" }, { "db": "VULHUB", "id": "VHN-35246" }, { "db": "BID", "id": "29772" }, { "db": "JVNDB", "id": "JVNDB-2008-001884" }, { "db": "JVNDB", "id": "JVNDB-2008-003645" }, { "db": "PACKETSTORM", "id": "67460" }, { "db": "PACKETSTORM", "id": "67431" }, { "db": "PACKETSTORM", "id": "67433" }, { "db": "PACKETSTORM", "id": "67449" }, { "db": "CNNVD", "id": "CNNVD-200811-282" }, { "db": "NVD", "id": "CVE-2008-5121" } ] }, "sources": { "_id": null, "data": [ { "db": "CERT/CC", "id": "VU#858993", "ident": null }, { "db": "VULHUB", "id": "VHN-35246", "ident": null }, { "db": "BID", "id": "29772", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2008-001884", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2008-003645", "ident": null }, { "db": "PACKETSTORM", "id": "67460", "ident": null }, { "db": "PACKETSTORM", "id": "67431", "ident": null }, { "db": "PACKETSTORM", "id": "67433", "ident": null }, { "db": "PACKETSTORM", "id": "67449", "ident": null }, { "db": "CNNVD", "id": "CNNVD-200811-282", "ident": null }, { "db": "NVD", "id": "CVE-2008-5121", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2008-06-18T00:00:00", "db": "CERT/CC", "id": "VU#858993", "ident": null }, { "date": "2008-11-18T00:00:00", "db": "VULHUB", "id": "VHN-35246", "ident": null }, { "date": "2008-06-17T00:00:00", "db": "BID", "id": "29772", "ident": null }, { "date": "2008-11-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001884", "ident": null }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-003645", "ident": null }, { "date": "2008-06-18T23:41:53", "db": "PACKETSTORM", "id": "67460", "ident": null }, { "date": "2008-06-18T21:15:54", "db": "PACKETSTORM", "id": "67431", "ident": null }, { "date": "2008-06-18T21:15:54", "db": "PACKETSTORM", "id": "67433", "ident": null }, { "date": "2008-06-18T21:55:50", "db": "PACKETSTORM", "id": "67449", "ident": null }, { "date": "2008-06-17T00:00:00", "db": "CNNVD", "id": "CNNVD-200811-282", "ident": null }, { "date": "2008-11-18T00:30:00.517000", "db": "NVD", "id": "CVE-2008-5121", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2008-06-27T00:00:00", "db": "CERT/CC", "id": "VU#858993", "ident": null }, { "date": "2017-09-29T00:00:00", "db": "VULHUB", "id": "VHN-35246", "ident": null }, { "date": "2015-04-16T17:59:00", "db": "BID", "id": "29772", "ident": null }, { "date": "2008-11-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001884", "ident": null }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-003645", "ident": null }, { "date": "2009-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200811-282", "ident": null }, { "date": "2024-11-21T00:53:20.093000", "db": "NVD", "id": "CVE-2008-5121", "ident": null } ] }, "threat_type": { "_id": null, "data": "local", "sources": [ { "db": "BID", "id": "29772" }, { "db": "PACKETSTORM", "id": "67460" }, { "db": "PACKETSTORM", "id": "67431" }, { "db": "PACKETSTORM", "id": "67433" }, { "db": "PACKETSTORM", "id": "67449" }, { "db": "CNNVD", "id": "CNNVD-200811-282" } ], "trust": 1.3 }, "title": { "_id": null, "data": "Deterministic Network Enhancer privilege escalation vulnerability", "sources": [ { "db": "CERT/CC", "id": "VU#858993" } ], "trust": 0.8 }, "type": { "_id": null, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-200811-282" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.