ID

VAR-200709-0397


CVE

CVE-2007-4788


TITLE

Cisco CSM Service disruption (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-002610

DESCRIPTION

Cisco Content Switching Modules (CSM) 4.2 before 4.2.3a, and Cisco Content Switching Module with SSL (CSM-S) 2.1 before 2.1.2a, allow remote attackers to cause a denial of service (CPU consumption or reboot) via sets of out-of-order TCP packets with unspecified characteristics, aka CSCsd27478. A remote attacker can exploit these issues to cause the affected devices to become unresponsive and possibly to reset. The Catalyst Content Switching Module (CSM) is an integrated server load-balancing line card for the Catalyst 6500 and 7600 series that improves the response time of client communications to endpoints. There is a denial of service vulnerability when the Catalyst content exchange module processes malformed traffic. Remote attackers may use this vulnerability to cause service unavailability. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. 1) An unspecified error exists when processing certain TCP packets that were received out of order. This can be exploited to cause a high CPU load or a device reload due to a FPGA4 exception with icp.fatPath length error by sending specially crafted TCP packets to a vulnerable system. 2) An unspecified error exists within the "service termination" option, which can be exploited to cause a PGA4 exception 1 IDLE error under a high network load by sending specially crafted TCP packets to a vulnerable system. Vulnerability #1 is reported in CSM 4.2 prior to 4.2.3a and CMS-S 2.1prior to 2.1.2a. Vulnerability #2 is reported in CSM 4.2 prior to 4.2.7 and CMS-S 2.1 prior to 2.1.6. SOLUTION: Apply updated versions. See vendor advisory for details. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/en/US/products/products_security_advisory09186a00808b4d3b.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-4788 // JVNDB: JVNDB-2007-002610 // BID: 25547 // VULHUB: VHN-28150 // PACKETSTORM: 59133

AFFECTED PRODUCTS

vendor:ciscomodel:content switching modulesscope:lteversion:4.2

Trust: 1.0

vendor:ciscomodel:content switching module with sslscope:lteversion:2.1

Trust: 1.0

vendor:ciscomodel:content switching module with sslscope:ltversion:2.1

Trust: 0.8

vendor:ciscomodel:content switching module with sslscope:eqversion:2.1.2a

Trust: 0.8

vendor:ciscomodel:content switching modulesscope:eqversion:4.2.3a

Trust: 0.8

vendor:ciscomodel:content switching modulesscope:ltversion:4.2

Trust: 0.8

vendor:ciscomodel:content switching modulesscope:eqversion:4.2

Trust: 0.6

vendor:ciscomodel:content switching module with sslscope:eqversion:2.1

Trust: 0.6

vendor:ciscomodel:csm-sscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:csmscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:csmscope: - version: -

Trust: 0.3

vendor:ciscomodel:csm-sscope:neversion:2.1.6

Trust: 0.3

vendor:ciscomodel:csm-s 2.1.2ascope:neversion: -

Trust: 0.3

vendor:ciscomodel:csmscope:neversion:4.2.7

Trust: 0.3

vendor:ciscomodel:csm 4.2.3ascope:neversion: -

Trust: 0.3

sources: BID: 25547 // JVNDB: JVNDB-2007-002610 // CNNVD: CNNVD-200709-099 // NVD: CVE-2007-4788

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4788
value: HIGH

Trust: 1.0

NVD: CVE-2007-4788
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200709-099
value: HIGH

Trust: 0.6

VULHUB: VHN-28150
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-4788
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28150
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-28150 // JVNDB: JVNDB-2007-002610 // CNNVD: CNNVD-200709-099 // NVD: CVE-2007-4788

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2007-4788

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200709-099

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200709-099

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002610

PATCH

title:cisco-sa-20070905-csmurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20070905-csm

Trust: 0.8

sources: JVNDB: JVNDB-2007-002610

EXTERNAL IDS

db:NVDid:CVE-2007-4788

Trust: 2.8

db:BIDid:25547

Trust: 2.0

db:SECUNIAid:26724

Trust: 1.8

db:OSVDBid:37500

Trust: 1.7

db:VUPENid:ADV-2007-3062

Trust: 1.7

db:SECTRACKid:1018654

Trust: 1.7

db:JVNDBid:JVNDB-2007-002610

Trust: 0.8

db:XFid:36450

Trust: 0.6

db:CISCOid:20070905 DENIAL OF SERVICE VULNERABILITIES IN CONTENT SWITCHING MODULE

Trust: 0.6

db:CNNVDid:CNNVD-200709-099

Trust: 0.6

db:VULHUBid:VHN-28150

Trust: 0.1

db:PACKETSTORMid:59133

Trust: 0.1

sources: VULHUB: VHN-28150 // BID: 25547 // JVNDB: JVNDB-2007-002610 // PACKETSTORM: 59133 // CNNVD: CNNVD-200709-099 // NVD: CVE-2007-4788

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sa-20070905-csm.shtml

Trust: 2.0

url:http://www.securityfocus.com/bid/25547

Trust: 1.7

url:http://osvdb.org/37500

Trust: 1.7

url:http://securitytracker.com/id?1018654

Trust: 1.7

url:http://secunia.com/advisories/26724

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/3062

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36450

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4788

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4788

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/36450

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/3062

Trust: 0.6

url:http://www.cisco.com/en/us/products/hw/modules/ps2706/ps780/index.html

Trust: 0.3

url:http://www.cisco.com/en/us/products/hw/modules/ps2706/products_qanda_item0900aecd801cad00.shtml

Trust: 0.3

url:/archive/1/478620

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/15616/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/advisories/26724/

Trust: 0.1

url:http://secunia.com/product/15617/

Trust: 0.1

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00808b4d3b.shtml

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-28150 // BID: 25547 // JVNDB: JVNDB-2007-002610 // PACKETSTORM: 59133 // CNNVD: CNNVD-200709-099 // NVD: CVE-2007-4788

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200709-099

SOURCES

db:VULHUBid:VHN-28150
db:BIDid:25547
db:JVNDBid:JVNDB-2007-002610
db:PACKETSTORMid:59133
db:CNNVDid:CNNVD-200709-099
db:NVDid:CVE-2007-4788

LAST UPDATE DATE

2025-04-10T23:16:43.941000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-28150date:2017-07-29T00:00:00
db:BIDid:25547date:2016-07-05T22:00:00
db:JVNDBid:JVNDB-2007-002610date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200709-099date:2007-09-12T00:00:00
db:NVDid:CVE-2007-4788date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-28150date:2007-09-10T00:00:00
db:BIDid:25547date:2007-09-05T00:00:00
db:JVNDBid:JVNDB-2007-002610date:2012-06-26T00:00:00
db:PACKETSTORMid:59133date:2007-09-07T06:01:27
db:CNNVDid:CNNVD-200709-099date:2007-09-10T00:00:00
db:NVDid:CVE-2007-4788date:2007-09-10T21:17:00