{"vuid":"VU#487617","idnumber":"487617","name":"Secure Elements Class 5 AVR server fails to properly authenticate session start messages","keywords":["Secure Elements","DoS","CE_SESSION_START_MESSAGE","class 5 EVM","c5 evm"],"overview":"The Secure Elements Class 5 AVR server fails to properly authenticate \"session start\" messages. This may allow an attacker to cause the server to initiate TCP connections to arbitrary destinations, which can cause a denial of service to both the server and the specified target.","clean_desc":"Class 5 AVR Secure Elements Class 5 AVR (Automated Vulnerability Remediation) is a security product that monitors and enforces security policies on network assets. Class 5 AVR is now known as C5 EVM (Enterprise Vulnerability Management). The Class 5 AVR software includes both server and client components. Class 5 AVR client The Class 5 AVR client listens on 60000/udp and an additional tcp port. This client receives commands sent by the Class 5 AVR server. Class 5 AVR server The Class 5 AVR server is available as an appliance or as software that runs on commodity hardware. The Class 5 AVR server contains information about network assets, vulnerabilities, and remediation history. The problem The Class 5 AVR server fails to properly authenticate \"session start\" messages.","impact":"A remote, unauthenticated attacker may be able to cause the server to initiate TCP connections to arbitrary destinations, which can cause a denial of service to both the server and the specified target.","resolution":"Upgrade or patch\nThis issue has been resolved in C5 EVM 2.8.1.","workarounds":"","sysaffected":"","thanks":"Thanks to the NOAA N-CIRT Lab for reporting this vulnerability.","author":"This document was written by Will Dormann.","public":["h","t","t","p",":","/","/","w","w","w",".","s","e","c","u","r","e","-","e","l","e","m","e","n","t","s",".","c","o","m","/","p","r","o","d","u","c","t","s","/","i","n","d","e","x",".","h","t","m"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-11-02T20:18:53Z","publicdate":"2006-05-30T00:00:00Z","datefirstpublished":"2006-05-30T20:39:43Z","dateupdated":"2007-05-04T18:52:23Z","revision":7,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"2","cam_impact":"5","cam_easeofexploitation":"10","cam_attackeraccessrequired":"15","cam_scorecurrent":"0.309375","cam_scorecurrentwidelyknown":"0.84375","cam_scorecurrentwidelyknownexploited":"1.40625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.309375,"vulnote":null}