ID

VAR-E-200504-0453


CVE

cve_id:CVE-2005-1057

Trust: 0.3

sources: BID: 13031

TITLE

Cisco IOS Easy VPN Server XAUTH Authentication Bypass Vulnerability

Trust: 0.3

sources: BID: 13031

DESCRIPTION

Cisco IOS Easy VPN Server is reported prone to an authentication bypass vulnerability. This issue can allow remote attackers to bypass Extended Authentication (XAUTH) and gain unauthorized access to resources.
An unauthorized attacker may send certain malformed UDP packets to UDP port 500 to complete XAUTH authentication and gain unauthorized access to network resources.

Trust: 0.3

sources: BID: 13031

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.2zjscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2ywscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2xkscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2cxscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.2zhscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zgscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zfscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zdscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zcscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2zbscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yyscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yxscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yvscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2yuscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2ytscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2ypscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2ynscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2ymscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2xjscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.2syscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.3

vendor:ciscomodel:ios 12.2zpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2znscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ylscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2suscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2czscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2cyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2byscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

sources: BID: 13031

EXPLOIT

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

Trust: 0.3

sources: BID: 13031

PRICE

Free

Trust: 0.3

sources: BID: 13031

TYPE

Design Error

Trust: 0.3

sources: BID: 13031

CREDITS

This issue was reported by the vendor.

Trust: 0.3

sources: BID: 13031

EXTERNAL IDS

db:NVDid:CVE-2005-1057

Trust: 0.3

db:BIDid:13031

Trust: 0.3

sources: BID: 13031

SOURCES

db:BIDid:13031

LAST UPDATE DATE

2022-07-27T09:23:35.006000+00:00


SOURCES UPDATE DATE

db:BIDid:13031date:2009-07-12T11:57:00

SOURCES RELEASE DATE

db:BIDid:13031date:2005-04-06T00:00:00