ID

VAR-200511-0298


CVE

CVE-2005-3788


TITLE

Cisco Adaptive Security Applicance Failover denial of service vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200511-369

DESCRIPTION

Race condition in Cisco Adaptive Security Appliance (ASA) 7.0(0), 7.0(2), and 7.0(4), when running with an Active/Standby configuration and when the failover LAN interface fails, allows remote attackers to cause a denial of service (standby firewall failure) by sending spoofed ARP responses from an IP address of an active firewall, which prevents the standby firewall from becoming active, aka "failover denial of service.". Cisco Adaptive Security Appliances are prone to a weakness that may cause a denial of service condition in certain circumstances. This issue is due to insufficient validation of ARP responses. This issue reportedly affects Cisco ASA devices running 7.0(0), 7.0(2), and 7.0(4). Other versions may also be affected. The Cisco ASA Series Adaptive Security Appliances are Cisco's purpose-designed solutions that combine the highest security and VPN services with a new Adaptive Identification and Defense (AIM) architecture. Whether the firewall is alive, but not authenticating the response to the request. The weakness is caused due to the ASA failover testing algorithm failing to properly identify that the active firewall has failed. This can be exploited to prevent the standby firewall from activating via spoofed ARP responses. The failover may also fail to happen if there is another device with the same IP address as the active firewall on the same network subnet. The weakness has been reported in ASA running 7.0(0), 7.0(2), and 7.0(4). SOLUTION: The vendor recommends that port security should be configured for all switch ports in the same VLANs as the active and standby firewalls enabled interfaces to prevent an attacker from spoofing the active firewall's interface MAC address. The firewall log should also be monitored for any IP address collisions. PROVIDED AND/OR DISCOVERED BY: Amin Tora, ePlus Security Team. ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.44

sources: NVD: CVE-2005-3788 // BID: 15407 // VULHUB: VHN-14996 // VULMON: CVE-2005-3788 // PACKETSTORM: 41564

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(4\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(2\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(0\)

Trust: 1.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0\(4\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0\(0\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0\(2\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0(4)

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0(2)

Trust: 0.3

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0(0)

Trust: 0.3

sources: BID: 15407 // NVD: CVE-2005-3788 // CNNVD: CNNVD-200511-369

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2005-3788
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200511-369
value: MEDIUM

Trust: 0.6

VULHUB: VHN-14996
value: MEDIUM

Trust: 0.1

VULMON: CVE-2005-3788
value: MEDIUM

Trust: 0.1

NVD:
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

VULHUB: VHN-14996
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

VULMON: CVE-2005-3788
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-14996 // VULMON: CVE-2005-3788 // NVD: CVE-2005-3788 // CNNVD: CNNVD-200511-369

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-3788

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200511-369

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200511-369

CONFIGURATIONS

sources: NVD: CVE-2005-3788

EXTERNAL IDS

db:BIDid:15407

Trust: 2.1

db:SECUNIAid:17550

Trust: 1.9

db:SECTRACKid:1015205

Trust: 1.8

db:SREASONid:178

Trust: 1.8

db:NVDid:CVE-2005-3788

Trust: 1.8

db:CNNVDid:CNNVD-200511-369

Trust: 0.7

db:XFid:23160

Trust: 0.6

db:BUGTRAQid:20051114 RE: [ADVISORY] CISCO ASA FAILOVER DOS VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20051114 [ADVISORY] CISCO ASA FAILOVER DOS VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-14996

Trust: 0.1

db:VULMONid:CVE-2005-3788

Trust: 0.1

db:PACKETSTORMid:41564

Trust: 0.1

sources: VULHUB: VHN-14996 // VULMON: CVE-2005-3788 // BID: 15407 // PACKETSTORM: 41564 // NVD: CVE-2005-3788 // CNNVD: CNNVD-200511-369

REFERENCES

url:http://secunia.com/advisories/17550/

Trust: 1.9

url:http://www.securityfocus.com/bid/15407

Trust: 1.8

url:http://securitytracker.com/id?1015205

Trust: 1.8

url:http://securityreason.com/securityalert/178

Trust: 1.8

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/23160

Trust: 1.2

url:http://marc.info/?l=bugtraq&m=113201784415859&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=113199814008230&w=2

Trust: 1.1

url:http://xforce.iss.net/xforce/xfdb/23160

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=113201784415859&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=113199814008230&w=2

Trust: 0.6

url:http://www.cisco.com/en/us/products/ps6120/index.html

Trust: 0.3

url:/archive/1/416544

Trust: 0.3

url:http://marc.info/?l=bugtraq&m=113201784415859&w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&m=113199814008230&w=2

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

sources: VULHUB: VHN-14996 // VULMON: CVE-2005-3788 // BID: 15407 // PACKETSTORM: 41564 // NVD: CVE-2005-3788 // CNNVD: CNNVD-200511-369

CREDITS

Amin Tora atora@EPLUS.com

Trust: 0.6

sources: CNNVD: CNNVD-200511-369

SOURCES

db:VULHUBid:VHN-14996
db:VULMONid:CVE-2005-3788
db:BIDid:15407
db:PACKETSTORMid:41564
db:NVDid:CVE-2005-3788
db:CNNVDid:CNNVD-200511-369

LAST UPDATE DATE

2023-12-18T12:13:27.512000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-14996date:2018-10-30T00:00:00
db:VULMONid:CVE-2005-3788date:2018-10-30T00:00:00
db:BIDid:15407date:2005-11-14T00:00:00
db:NVDid:CVE-2005-3788date:2023-08-11T18:54:47.730
db:CNNVDid:CNNVD-200511-369date:2005-11-28T00:00:00

SOURCES RELEASE DATE

db:VULHUBid:VHN-14996date:2005-11-24T00:00:00
db:VULMONid:CVE-2005-3788date:2005-11-24T00:00:00
db:BIDid:15407date:2005-11-14T00:00:00
db:PACKETSTORMid:41564date:2005-11-15T18:49:25
db:NVDid:CVE-2005-3788date:2005-11-24T11:03:00
db:CNNVDid:CNNVD-200511-369date:2005-11-24T00:00:00