ID

VAR-200809-0040


CVE

CVE-2008-3806


TITLE

Cisco IOS In UDP Vulnerability in packet processing

Trust: 0.8

sources: JVNDB: JVNDB-2008-001999

DESCRIPTION

Cisco IOS 12.0 through 12.4 on Cisco 10000, uBR10012 and uBR7200 series devices handles external UDP packets that are sent to 127.0.0.0/8 addresses intended for IPC communication within the device, which allows remote attackers to cause a denial of service (device or linecard reload) via crafted UDP packets, a different vulnerability than CVE-2008-3805. Provided by Cisco Systems Cisco IOS The denial of service (DoS) There are vulnerabilities. This vulnerability is CVE-2008-3805 This is a different vulnerability.See the "Summary" for the impact of this vulnerability. Ios is prone to a denial-of-service vulnerability. ---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Cisco IOS Multiple Vulnerabilities SECUNIA ADVISORY ID: SA31990 VERIFY ADVISORY: http://secunia.com/advisories/31990/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: Cisco IOS R12.x http://secunia.com/advisories/product/50/ Cisco IOS 12.x http://secunia.com/advisories/product/182/ DESCRIPTION: Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or to compromise a vulnerable system. 1) An unspecified error exists in the processing of SSL packets during the termination of an SSL session, which can potentially be exploited to crash an affected system. 2) Two unspecified errors exist within the processing of Protocol Independent Multicast (PIM) packets, which can be exploited to cause an affected device to reload. 3) Unspecified errors within the processing of segmented Skinny Call Control Protocol (SCCP) messages can be exploited to cause a Cisco IOS device to reload. Successful exploitation requires that the device is configured with Network Address Translation (NAT) SCCP Fragmentation Support. 4) A memory leak in the processing of Session Initiation Protocol (SIP) messages can be exploited to cause a DoS for all voice services. 5) Multiple unspecified errors exist in the processing of SIP messages, which can be exploited to cause a reload of an affected device. 6) An unspecified error in the IOS Intrusion Prevention System (IPS) feature when processing certain IPS signatures that use the SERVICE.DNS engine can be exploited to cause a DoS via specially crafted network traffic. 7) A security issue exists in the processing of extended communities with Multi Protocol Label Switching (MPLS) Virtual Private Networks (VPN), which can lead to traffic leaking from one MPLS VPN to another. This security issue does not affect Cisco IOS releases based on 12.1. NOTE: This security issue was introduced with CSCee83237. Cisco IOS images that do not include CSCee83237 are reportedly not affected. 8) An unspecified error within the Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) can be exploited to cause a DoS via specially crafted network packets. Successful exploitation requires access to the MPLS network. 9) An unspecified error within the Application Inspection Control (AIC) can be exploited to cause a reload of an affected device via specially crafted HTTP packets. 10) An unspecified error in the processing of Layer 2 Tunneling Protocol (L2TP) packets can be exploited to cause an affected device to reload via a specially crafted L2TP packets. Successful exploitation requires that the L2TP mgmt daemon process is running. This process may be enabled e.g. via Layer 2 virtual private networks (L2VPN), Layer 2 Tunnel Protocol Version 3 (L2TPv3), Stack Group Bidding Protocol (SGBP), or Cisco Virtual Private Dial-Up Networks (VPDN). 11) An unspecified error exists in the processing of IPC messages. This vulnerability is reported in Cisco 10000, uBR10012, and uBR7200 series devices. 12) A security issue is caused due to the device automatically enabling SNMP with a default community string, which can be exploited to gain control an affected system. Successful exploitation requires that a device is configured for linecard redundancy. SOLUTION: Update to the fixed version (please see the vendor's advisories for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-multicast.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-sccp.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-vpn.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-mfi.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosfw.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-l2tp.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-ipc.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-ubr.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-3806 // JVNDB: JVNDB-2008-001999 // BID: 84880 // VULHUB: VHN-33931 // PACKETSTORM: 70347

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 2.7

vendor:ciscomodel:iosscope:eqversion:12.3xi

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2sca

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2src

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.0sl

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2zx

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3bc

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.0st

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2sb

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.0s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.8

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2zxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2srcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0stscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0slscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

sources: BID: 84880 // JVNDB: JVNDB-2008-001999 // CNNVD: CNNVD-200809-373 // NVD: CVE-2008-3806

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-3806
value: HIGH

Trust: 1.0

NVD: CVE-2008-3806
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200809-373
value: HIGH

Trust: 0.6

VULHUB: VHN-33931
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-3806
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2008-3806
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-33931
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-33931 // JVNDB: JVNDB-2008-001999 // CNNVD: CNNVD-200809-373 // NVD: CVE-2008-3806

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-33931 // JVNDB: JVNDB-2008-001999 // NVD: CVE-2008-3806

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200809-373

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-200809-373

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001999

PATCH

title:cisco-sa-20080924-ipcurl:http://www.cisco.com/warp/public/707/cisco-sa-20080924-ipc.shtml

Trust: 0.8

title:Cisco IOS IPC Remediation for Communication Permission Permission and Access Control Issue Vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194937

Trust: 0.6

sources: JVNDB: JVNDB-2008-001999 // CNNVD: CNNVD-200809-373

EXTERNAL IDS

db:NVDid:CVE-2008-3806

Trust: 2.8

db:SECUNIAid:31990

Trust: 1.8

db:JVNDBid:JVNDB-2008-001999

Trust: 0.8

db:CNNVDid:CNNVD-200809-373

Trust: 0.6

db:BIDid:84880

Trust: 0.4

db:XFid:45592

Trust: 0.3

db:VULHUBid:VHN-33931

Trust: 0.1

db:PACKETSTORMid:70347

Trust: 0.1

sources: VULHUB: VHN-33931 // BID: 84880 // JVNDB: JVNDB-2008-001999 // PACKETSTORM: 70347 // CNNVD: CNNVD-200809-373 // NVD: CVE-2008-3806

REFERENCES

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080a014ae.shtml

Trust: 2.0

url:http://tools.cisco.com/security/center/viewalert.x?alertid=16646

Trust: 2.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7123

Trust: 1.7

url:http://secunia.com/advisories/31990

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/45592

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3806

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3806

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/45592

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml

Trust: 0.1

url:http://secunia.com/advisories/product/182/

Trust: 0.1

url:http://secunia.com/advisories/product/50/

Trust: 0.1

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-sccp.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-vpn.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-l2tp.shtml

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/31990/

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosfw.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-multicast.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-mfi.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-ipc.shtml

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-ubr.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-33931 // BID: 84880 // JVNDB: JVNDB-2008-001999 // PACKETSTORM: 70347 // CNNVD: CNNVD-200809-373 // NVD: CVE-2008-3806

CREDITS

Unknown

Trust: 0.3

sources: BID: 84880

SOURCES

db:VULHUBid:VHN-33931
db:BIDid:84880
db:JVNDBid:JVNDB-2008-001999
db:PACKETSTORMid:70347
db:CNNVDid:CNNVD-200809-373
db:NVDid:CVE-2008-3806

LAST UPDATE DATE

2025-04-10T22:56:58.168000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-33931date:2017-09-29T00:00:00
db:BIDid:84880date:2008-09-26T00:00:00
db:JVNDBid:JVNDB-2008-001999date:2008-12-19T00:00:00
db:CNNVDid:CNNVD-200809-373date:2022-06-07T00:00:00
db:NVDid:CVE-2008-3806date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-33931date:2008-09-26T00:00:00
db:BIDid:84880date:2008-09-26T00:00:00
db:JVNDBid:JVNDB-2008-001999date:2008-12-19T00:00:00
db:PACKETSTORMid:70347date:2008-09-25T23:06:17
db:CNNVDid:CNNVD-200809-373date:2008-09-26T00:00:00
db:NVDid:CVE-2008-3806date:2008-09-26T16:21:44.220