ID

VAR-201010-0012


CVE

CVE-2009-5007


TITLE

Cisco AnyConnect SSL VPN Trial Client Vulnerability to Overwrite Arbitrary Files

Trust: 0.8

sources: JVNDB: JVNDB-2010-002912

DESCRIPTION

The Cisco trial client on Linux for Cisco AnyConnect SSL VPN allows local users to overwrite arbitrary files via a symlink attack on unspecified temporary files. Attackers can exploit this issue to overwrite arbitrary files with root privileges. ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM) Beta. Join the beta: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: Cisco AnyConnect VPN Client Privilege Escalation Vulnerability SECUNIA ADVISORY ID: SA42093 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/42093/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=42093 RELEASE DATE: 2010-11-04 DISCUSS ADVISORY: http://secunia.com/advisories/42093/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/42093/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=42093 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is reported in versions prior to 2.3 running on Linux and Mac. SOLUTION: Update to version 2.3. PROVIDED AND/OR DISCOVERED BY: Reported in the description of the OpenConnect client. ORIGINAL ADVISORY: http://www.infradead.org/openconnect.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2009-5007 // JVNDB: JVNDB-2010-002912 // BID: 44108 // VULHUB: VHN-42453 // PACKETSTORM: 95487

AFFECTED PRODUCTS

vendor:ciscomodel:anyconnect ssl vpnscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:anyconnect ssl vpnscope: - version: -

Trust: 0.8

vendor:ciscomodel:anyconnect vpn clientscope:eqversion:2.4.202

Trust: 0.3

sources: BID: 44108 // JVNDB: JVNDB-2010-002912 // CNNVD: CNNVD-201010-226 // NVD: CVE-2009-5007

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-5007
value: LOW

Trust: 1.0

NVD: CVE-2009-5007
value: LOW

Trust: 0.8

CNNVD: CNNVD-201010-226
value: LOW

Trust: 0.6

VULHUB: VHN-42453
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2009-5007
severity: LOW
baseScore: 3.3
vectorString: AV:L/AC:M/AU:N/C:N/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-42453
severity: LOW
baseScore: 3.3
vectorString: AV:L/AC:M/AU:N/C:N/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-42453 // JVNDB: JVNDB-2010-002912 // CNNVD: CNNVD-201010-226 // NVD: CVE-2009-5007

PROBLEMTYPE DATA

problemtype:CWE-59

Trust: 1.9

sources: VULHUB: VHN-42453 // JVNDB: JVNDB-2010-002912 // NVD: CVE-2009-5007

THREAT TYPE

local

Trust: 0.7

sources: PACKETSTORM: 95487 // CNNVD: CNNVD-201010-226

TYPE

post link

Trust: 0.6

sources: CNNVD: CNNVD-201010-226

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-002912

PATCH

title:OpenConnecturl:http://www.infradead.org/openconnect.html

Trust: 0.8

sources: JVNDB: JVNDB-2010-002912

EXTERNAL IDS

db:NVDid:CVE-2009-5007

Trust: 2.8

db:SECUNIAid:42093

Trust: 1.2

db:JVNDBid:JVNDB-2010-002912

Trust: 0.8

db:CNNVDid:CNNVD-201010-226

Trust: 0.7

db:BIDid:44108

Trust: 0.4

db:VULHUBid:VHN-42453

Trust: 0.1

db:PACKETSTORMid:95487

Trust: 0.1

sources: VULHUB: VHN-42453 // BID: 44108 // JVNDB: JVNDB-2010-002912 // PACKETSTORM: 95487 // CNNVD: CNNVD-201010-226 // NVD: CVE-2009-5007

REFERENCES

url:http://www.infradead.org/openconnect.html

Trust: 1.8

url:http://secunia.com/advisories/42093

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-5007

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-5007

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://www.infradead.org/openconnect/

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=42093

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/42093/

Trust: 0.1

url:http://secunia.com/advisories/42093/#comments

Trust: 0.1

sources: VULHUB: VHN-42453 // BID: 44108 // JVNDB: JVNDB-2010-002912 // PACKETSTORM: 95487 // CNNVD: CNNVD-201010-226 // NVD: CVE-2009-5007

CREDITS

Reported by the vendor.

Trust: 0.3

sources: BID: 44108

SOURCES

db:VULHUBid:VHN-42453
db:BIDid:44108
db:JVNDBid:JVNDB-2010-002912
db:PACKETSTORMid:95487
db:CNNVDid:CNNVD-201010-226
db:NVDid:CVE-2009-5007

LAST UPDATE DATE

2025-04-11T22:50:25.876000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-42453date:2010-11-11T00:00:00
db:BIDid:44108date:2010-10-29T16:38:00
db:JVNDBid:JVNDB-2010-002912date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201010-226date:2010-10-18T00:00:00
db:NVDid:CVE-2009-5007date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-42453date:2010-10-14T00:00:00
db:BIDid:44108date:2010-10-14T00:00:00
db:JVNDBid:JVNDB-2010-002912date:2012-03-27T00:00:00
db:PACKETSTORMid:95487date:2010-11-04T04:05:09
db:CNNVDid:CNNVD-201010-226date:2010-10-18T00:00:00
db:NVDid:CVE-2009-5007date:2010-10-14T05:52:19.683