COMMAND
Sonata
SYSTEMS AFFECTED
Voyant Technologies Sonata
PROBLEM
Larry W. Cashdollar by Vapid Labs found following. Sonata is a
teleconfrencing solution developed by Voyant Technologies. This
advisory concerns the Sonata application server and bridge
componet of the Sonata package. The application server is an
Ultra Sparc 5 running Solaris 2.x as required by Voyant
technologies. The bridge is an IBM PC running OS/2 Warp. These
hosts are usually built in house by Voyant personnel and installed
at customer locations by a field engineer.
Six vulnerabilities have been found in the application server host
and Sonata package, they are categorized below:
1) Reused default user accounts and passwords.
2) Easily guessable passwords.
3) Poor file permissions.
4) Lack of host hardening.
5) X console authentication has been disabled.
6) Hard coded default passwords.
Vulnerable packages/systems:
- Sonata v3.x on Solaris 2.x
- Sonata bridge OS/2 Warp
I. Application Server, Solaris 2.x
By using available default services on the host an attacker can
enumerate accounts. Using this easily obtainable account
information combined with poor password selection and weak file
permissions a remote attacker can gain root access. The
passwords guessed are the default for _all_ installations of
Sonata.
By default xhost authentication is disabled allowing a remote
attacker to log key strokes and capture screen shots of the X
console.
II. Bridging Server, OS/2 Warp.
These default passwords are also re-used on the bridging host
(OS/2). Which has telnet enabled for remote administration.
SOLUTION
Please contact Voyant technologies for assistance.