ID

VAR-200702-0314


CVE

CVE-2007-0918


TITLE

Cisco IOS of IPS Service disruption in functionality (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-000139

DESCRIPTION

The ATOMIC.TCP signature engine in the Intrusion Prevention System (IPS) feature for Cisco IOS 12.4XA, 12.3YA, 12.3T, and other trains allows remote attackers to cause a denial of service (IPS crash and traffic loss) via unspecified manipulations that are not properly handled by the regular expression feature, as demonstrated using the 3123.0 (Netbus Pro Traffic) signature. Cisco IOS is prone to a security-bypass vulnerability and a denial-of-service vulnerability. An attacker could exploit the security-bypass issue to send malicious data to computers that would otherwise be protected by signature inspection. An attacker could exploit the denial-of-service vulnerability to crash affected devices, denying service to legitimate users. Cisco IOS is the operating system used by Cisco networking devices, and Cisco IOS Intrusion Prevention System (IPS) is a built-in deep packet inspection feature that allows Cisco IOS software to mitigate network attacks. Several vulnerabilities exist in the IOS IPS function, and only IOS images that include the IPS function are affected by these vulnerabilities. Fragmented packet evasion detection vulnerability + -------------------------------------- Some IPS features use regular expression. All IP protocols (such as TCP, UDP, ICMP) are affected by this vulnerability. ATOMIC.TCP Regular Expression Denial of Service Vulnerability+------------------------------------------- -------------------- Certain network communications may trigger IPS signatures using the regular expression capabilities of the ATOMIC.TCP signature engine, resulting in denial of service and interruption of network communications. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Cisco IOS IPS Security Bypass and Denial of Service SECUNIA ADVISORY ID: SA24142 VERIFY ADVISORY: http://secunia.com/advisories/24142/ CRITICAL: Moderately critical IMPACT: Security Bypass, DoS WHERE: >From remote OPERATING SYSTEM: Cisco IOS R12.x http://secunia.com/product/50/ Cisco IOS 12.x http://secunia.com/product/182/ DESCRIPTION: Two vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). 1) Cisco IOS IPS signatures using regular expressions may not correctly identify malicious traffic within fragmented IP packets. This can be exploited to bypass the detection mechanism by sending specially crafted, fragmented IP packets. 2) An error exists within the ATOMIC.TCP scanning mechanism and signatures, which use regular expressions (e.g. Signature 3123.0 for Netbus Pro Traffic). This can be exploited to crash a device by producing specially crafted network traffic. SOLUTION: See the vendor advisory for a patch matrix and workarounds. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20070213-iosips.shtml http://www.cisco.com/en/US/products/products_security_response09186a00807e0a5e.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-0918 // JVNDB: JVNDB-2007-000139 // BID: 22549 // VULHUB: VHN-24280 // PACKETSTORM: 54399

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.3 tscope: - version: -

Trust: 3.3

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 2.1

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 1.9

vendor:ciscomodel:iosscope:eqversion:12.3yg

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3xy

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3ya

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3xw

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3yd

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3xq

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3xs

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3xr

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3yh

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ym

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yj

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yq

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4mr

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yz

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yk

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3ys

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yi

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4t

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yx

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xa

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.4xb

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3yt

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.8

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

sources: BID: 22549 // JVNDB: JVNDB-2007-000139 // CNNVD: CNNVD-200702-250 // NVD: CVE-2007-0918

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0918
value: HIGH

Trust: 1.0

NVD: CVE-2007-0918
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200702-250
value: LOW

Trust: 0.6

VULHUB: VHN-24280
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-0918
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2007-0918
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-24280
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-24280 // JVNDB: JVNDB-2007-000139 // CNNVD: CNNVD-200702-250 // NVD: CVE-2007-0918

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-20

Trust: 0.9

sources: VULHUB: VHN-24280 // JVNDB: JVNDB-2007-000139 // NVD: CVE-2007-0918

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200702-250

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-200702-250

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000139

PATCH

title:cisco-sa-20070213-iosipsurl:http://www.cisco.com/warp/public/707/cisco-sa-20070213-iosips.shtml

Trust: 0.8

title:Cisco IOS Remediation Measures for Multiple Security Vulnerabilities in Intrusion Protection Systemurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194946

Trust: 0.6

sources: JVNDB: JVNDB-2007-000139 // CNNVD: CNNVD-200702-250

EXTERNAL IDS

db:NVDid:CVE-2007-0918

Trust: 2.8

db:BIDid:22549

Trust: 2.8

db:SECUNIAid:24142

Trust: 2.6

db:OSVDBid:33053

Trust: 1.7

db:SECTRACKid:1017631

Trust: 1.7

db:VUPENid:ADV-2007-0597

Trust: 1.7

db:JVNDBid:JVNDB-2007-000139

Trust: 0.8

db:CNNVDid:CNNVD-200702-250

Trust: 0.7

db:VULHUBid:VHN-24280

Trust: 0.1

db:PACKETSTORMid:54399

Trust: 0.1

sources: VULHUB: VHN-24280 // BID: 22549 // JVNDB: JVNDB-2007-000139 // PACKETSTORM: 54399 // CNNVD: CNNVD-200702-250 // NVD: CVE-2007-0918

REFERENCES

url:http://www.securityfocus.com/bid/22549

Trust: 2.5

url:http://www.cisco.com/en/us/products/products_security_response09186a00807e0a5e.html

Trust: 1.8

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00807e0a5b.shtml

Trust: 1.7

url:http://osvdb.org/33053

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5832

Trust: 1.7

url:http://www.securitytracker.com/id?1017631

Trust: 1.7

url:http://secunia.com/advisories/24142

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/0597

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/32474

Trust: 1.7

url:http://secunia.com/advisories/24142/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0918

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/0597

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0918

Trust: 0.8

url:http://www.cisco.com/warp/public/707/cisco-sa-20070213-iosips.shtml

Trust: 0.4

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:msg://bugtraq/200702131150.iosips@psirt.cisco.com

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/50/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/182/

Trust: 0.1

sources: VULHUB: VHN-24280 // BID: 22549 // JVNDB: JVNDB-2007-000139 // PACKETSTORM: 54399 // CNNVD: CNNVD-200702-250 // NVD: CVE-2007-0918

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200702-250

SOURCES

db:VULHUBid:VHN-24280
db:BIDid:22549
db:JVNDBid:JVNDB-2007-000139
db:PACKETSTORMid:54399
db:CNNVDid:CNNVD-200702-250
db:NVDid:CVE-2007-0918

LAST UPDATE DATE

2025-04-10T23:16:51.547000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-24280date:2018-10-30T00:00:00
db:BIDid:22549date:2016-07-06T14:40:00
db:JVNDBid:JVNDB-2007-000139date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200702-250date:2022-06-08T00:00:00
db:NVDid:CVE-2007-0918date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-24280date:2007-02-14T00:00:00
db:BIDid:22549date:2007-02-13T00:00:00
db:JVNDBid:JVNDB-2007-000139date:2007-04-01T00:00:00
db:PACKETSTORMid:54399date:2007-02-14T19:41:53
db:CNNVDid:CNNVD-200702-250date:2007-02-13T00:00:00
db:NVDid:CVE-2007-0918date:2007-02-14T02:28:00