VARIoT IoT vulnerabilities database

VAR-201002-0074 | CVE-2010-0151 | Cisco Firewall Services Module Denial of service in Japan (DoS) Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The Cisco Firewall Services Module (FWSM) 4.0 before 4.0(8), as used in for the Cisco Catalyst 6500 switches, Cisco 7600 routers, and ASA 5500 Adaptive Security Appliances, allows remote attackers to cause a denial of service (crash) via a malformed Skinny Client Control Protocol (SCCP) message.
An attacker can exploit this issue to cause a denial-of-service condition.
This issue is being tracked by Cisco BugID CSCsz79757 and CSCtb60485.
4) An error in WebVPN can be exploited to trigger an appliance
reload via a specially crafted DTLS packet.
7) An error in the implementation of the NT LAN Manager version 1
(NTLMv1) protocol can be exploited to bypass authentication via a
specially crafted username.
SOLUTION:
Update to a fixed version. Please see the vendor's advisory for
detailed patch information.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
The following example shows a system with a Cisco FWSM (WS-SVC-FWM-1)
installed in slot 2:
switch>show module
Mod Ports Card Type Model Serial No.
--- ----- -------------------------------------- ------------------ -----------
1 16 SFM-capable 16 port 1000mb GBIC WS-X6516-GBIC SAL06334NS9
2 6 Firewall Module WS-SVC-FWM-1 SAD10360485
3 8 Intrusion Detection System WS-SVC-IDSM-2 SAD0932089Z
4 4 SLB Application Processor Complex WS-X6066-SLB-APC SAD093004BD
5 2 Supervisor Engine 720 (Active) WS-SUP720-3B SAL0934888E
Mod MAC addresses Hw Fw Sw Status
--- ---------------------------------- ------ ------------ ------------ -------
1 0009.11e3.ade8 to 0009.11e3.adf7 5.1 6.3(1) 8.5(0.46)RFW Ok
2 0018.ba41.5092 to 0018.ba41.5099 4.0 7.2(1) 3.2(2)10 Ok
3 0014.a90c.9956 to 0014.a90c.995d 5.0 7.2(1) 5.1(6)E1 Ok
4 0014.a90c.66e6 to 0014.a90c.66ed 1.7 4.2(3) Ok
5 0013.c42e.7fe0 to 0013.c42e.7fe3 4.4 8.1(3) 12.2(18)SXF1 Ok
[...]
After locating the correct slot, issue the "show module <slot number>"
command to identify the software version that is running. Example output
follows:
switch>show module 2
Mod Ports Card Type Model Serial No.
--- ----- -------------------------------------- ------------------ -----------
2 6 Firewall Module WS-SVC-FWM-1 SAD10360485
Mod MAC addresses Hw Fw Sw Status
--- ---------------------------------- ------ ------------ ------------ -------
2 0018.ba41.5092 to 0018.ba41.5099 4.0 7.2(1) 3.2(2)10 Ok
[...]
The preceding example shows that the FWSM is running software version
3.2(2)10 as indicated by the column under "Sw."
Note: Recent versions of Cisco IOS Software will show the software
version of each module in the output from the "show module" command;
therefore, executing the "show module <slot number>" command is not
necessary.
If a Virtual Switching System (VSS) is used to allow two physical Cisco
Catalyst 6500 Series Switches to operate as a single logical virtual
switch, the "show module switch all" command can display the software
version of all FWSMs that belong to switch 1 and switch 2. The output
from this command will be similar to the output from the "show module
<slot number>" but will include module information for the modules in
each switch in the VSS.
Alternatively, version information can be obtained directly from the
FWSM through the "show version" command. The version notation is similar to the following example. The FWSM
offers firewall services with stateful packet filtering and deep packet
inspection.
There are workarounds for some of the vulnerabilities disclosed in this
advisory.
Cisco has released free software updates that address these
vulnerabilities.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml. Affected versions of Cisco ASA Software
vary depending on the specific vulnerability. For specific version
information, refer to the "Software Versions and Fixes" section of this
advisory.
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP
connection exhaustion condition (no new TCP connections are accepted)
that can be triggered through the receipt of specific TCP segments
during the TCP connection termination phase. Appliances that are running
versions 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected when they
are configured for any of the following features:
* SSL VPNs
* Cisco Adaptive Security Device Manager (ASDM) Administrative
Access
* Telnet Access
* SSH Access
* Virtual Telnet
* Virtual HTTP
* Transport Layer Security (TLS) Proxy for Encrypted Voice
Inspection
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
Two denial of service (DoS) vulnerabilities affect the SIP inspection
feature of Cisco ASA 5500 Series Adaptive Security Appliances. Versions
7.0.x, 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected. SIP
inspection is enabled by default.
To check if SIP inspection is enabled, issue the "show service-policy |
include sip" command and confirm that some output is returned. Sample
output is displayed in the following example:
ciscoasa#show service-policy | include sip
Inspect: sip , packet 0, drop 0, reset-drop 0
Alternatively, an appliance that has SIP inspection enabled has a
configuration similar to the following:
class-map inspection_default
match default-inspection-traffic
!
policy-map global_policy
class inspection_default
...
inspect sip
... Versions 8.0.x,
8.1.x, and 8.2.x are affected. SCCP inspection is enabled by default.
To check if SCCP inspection is enabled, issue the "show service-policy |
include skinny" command and confirm that some output is returned. Sample
output is displayed in the following example:
ciscoasa#show service-policy | include skinny
Inspect: skinny , packet 0, drop 0, reset-drop 0
Alternatively, an appliance that has SCCP inspection enabled has a
configuration similar to the following:
class-map inspection_default
match default-inspection-traffic
!
policy-map global_policy
class inspection_default
...
inspect skinny
... Affected versions include 7.1.x, 7.2.x, 8.0.x, 8.1.x, and
8.2.x. Administrators can enable WebVPN with the "enable <interface
name>" command in "webvpn" configuration mode. DTLS can be enabled
by issuing the "svc dtls enable" command in "group policy webvpn"
configuration mode. The following configuration snippet provides an
example of a WebVPN configuration that enables DTLS:
webvpn
enable outside
svc enable
...
!
group-policy <group name> internal
group-policy <group name> attributes
...
webvpn
svc dtls enable
...
Altough WebVPN is disabled by default, DTLS is enabled by default in
recent software releases. This vulnerability only affects
configurations that use the "nailed" option at the end of their static
statement. Additionally, traffic that matches "static" statement must
also be inspected by a Cisco AIP-SSM (an Intrusion Prevention System
(IPS) module) in inline mode. IPS inline operation mode is enabled by
using the "ips inline {fail-close | fail-open}" command in "class"
configuration mode. Versions 7.0.x, 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are
affected. IKE is not enabled by default. If IKE is enabled, the "isakmp
enable <interface name>" command appears in the configuration.
Versions 7.0.x, 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected.
Administrators can configure NTLMv1 authentication by defining an
Authentication, Authorization, and Accounting (AAA) server group that
uses the NTLMv1 protocol with the "aaa-server <AAA server group tag>
protocol nt" command and then configuring a service that requires
authentication to use that AAA server group. To verify that NTLMv1
authentication is enabled and active, issue the "show aaa-server
protocol nt" command. Sample output is displayed in the following
example:
ciscoasa#show aaa-server protocol nt
Server Group: test
Server Protocol: nt
Server Address: 192.168.10.11
Server port: 139
Server status: ACTIVE, Last transaction (success) at 11:10:08 UTC Fri Jan 29
<output truncated>
Cisco PIX 500 Series Security Appliance Vulnerability Status
+-----------------------------------------------------------
Cisco PIX 500 Series Security Appliances are affected by the
following vulnerabilities:
* TCP Connection Exhaustion Denial of Service Vulnerability
* SIP Inspection Denial of Service Vulnerabilities
* SCCP Inspection Denial of Service Vulnerability
* Crafted IKE Message Denial of Service Vulnerability
* NTLMv1 Authentication Bypass Vulnerability
Because the Cisco PIX 500 Series Security Appliances reached End of
Software Maintenance Releases on July 28, 2009, no further software
releases will be available for the Cisco PIX 500 Series Security
Appliances.
For more information, refer to the End of Life announcement at:
http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5709/ps2030/end_of_life_notice_cisco_pix_525_sec_app.html.
How To Determine The Running Software Version
+--------------------------------------------
To determine whether a vulnerable version of Cisco ASA Software is
running on an appliance, administrators can issue the "show version"
command-line interface (CLI) command. The following example shows a
Cisco ASA 5500 Series Adaptive Security Appliance that is running
software version 8.0(4):
ASA#show version
Cisco Adaptive Security Appliance Software Version 8.0(4)
Device Manager Version 6.0(1)
<output truncated>
Customers who use Cisco ASDM to manage devices can locate the software
version in the table that is displayed in the login window or upper-left
corner of the Cisco ASDM window.
Products Confirmed Not Vulnerable
+--------------------------------
The Cisco Firewall Services Module (FWSM) is affected by
some of the vulnerabilities in this advisory. A separate
Cisco Security Advisory has been published to disclose the
vulnerabilities that affect the FWSM. This advisory is available at
http://www.cisco.com/warp/public/707/cisco-sa-20100217-fwsm.shtml.
With the exception of the Cisco FWSM, no other Cisco products are
currently known to be affected by these vulnerabilities. It offers firewall,
intrusion prevention (IPS), anti-X, and VPN services.
This vulnerability is triggered only when specific TCP segments are sent
to certain TCP-based services that terminate on the affected appliance.
Although exploitation of this vulnerability requires a TCP three-way
handshake, authentication is not required.
This vulnerability is documented in Cisco bug ID CSCsz77717 and has been
assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2010-0149. Appliances are only vulnerable
when SIP inspection is enabled.
Only transit traffic can trigger these vulnerabilities; traffic that is
destined to the appliance will not trigger the vulnerabilities.
These vulnerabilities are documented in Cisco bug IDs CSCsy91157,
and CSCtc96018, and have been assigned CVE IDs CVE-2010-0150, and
CVE-2010-0569 respectively. Appliances are only
vulnerable when SCCP inspection is enabled.
Only transit traffic can trigger this vulnerability; traffic that is
destined to the appliance will not trigger the vulnerabily.
This vulnerability is documented in Cisco bug ID CSCsz79757 and has been
assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2010-0151.
Appliances are only vulnerable when they are configured for WebVPN and
DTLS transport.
This vulnerability is only triggered by traffic that is destined to the
appliance; transit traffic will not trigger the vulnerability.
This vulnerability is documented in Cisco bug ID CSCtb64913 and has been
assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2010-0565. A malformed, transit TCP segment is received.
2. The TCP segment matches a static NAT translation that has the
"nailed" option configured on it.
3. The TCP segment is also processed by the Cisco AIP-SSM, which is
configured for inline mode of operation.
A TCP three-way handshake is not necessary to exploit this
vulnerability.
This vulnerability is documented in Cisco bug ID CSCtb37219 and has been
assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2010-0566. The tunnels are not torn down immediately; IPsec traffic
will continue to flow until the next rekey, at which time the rekey
will fail and the tunnels will be torn down. Both site-to-site and
remote access VPN tunnels are affected. The vulnerability is triggered
when the appliance processes a malformed IKE message on port UDP 4500
that traverses an existing IPsec tunnel. The only way to recover and
re-establish IPsec VPN tunnels is to reload the appliance.
When this vulnerability is exploited, the security appliance will
generate syslog messages 713903 and 713906, which will be followed by
the loss of IPsec peers.
This vulnerability is documented in Cisco bug ID CSCtc47782 and has been
assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2010-0567.
Users can bypass authentication by providing an an invalid, crafted
username during an authentication request. Any services that use a
AAA server group that is configured to use the NTLMv1 authentication
protocol is affected. Affected services include:
* Telnet access to the security appliance
* SSH access to the security appliance
* HTTPS access to the security appliance (including Cisco ASDM
access)
* Serial console access
* Privileged (enable) mode access
* Cut-through proxy for network access
* VPN access
This vulnerability is documented in Cisco bug ID CSCte21953 and has been
assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2010-0568.
Vulnerability Scoring Details
=============================
Cisco has provided scores for the vulnerabilities in this advisory based
on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in
this Security Advisory is done in accordance with CVSS version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of the
vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding CVSS
at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss.
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
* CSCsz77717 ("TCP sessions remain in CLOSEWAIT indefinitely")
CVSS Base Score - 7.1
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 5.9
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
* CSCsy91157 ("Watchdog when inspecting malformed SIP traffic")
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
* CSCtc96018 ("ASA watchdog when inspecting malformed SIP traffic")
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
SCCP Inspection Denial of Service Vulnerability
+----------------------------------------------
* CSCsz79757 ("Traceback - Thread Name: Dispatch Unit with skinny
inspect enabled")
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
WebVPN DTLS Denial of Service Vulnerability
+------------------------------------------
* CSCtb64913 ("WEBVPN: page fault in thread name dispath unit, eip udpmod_user_put")
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Crafted TCP Segment Denial of Service Vulnerability
+--------------------------------------------------
* CSCtb37219 ("Traceback in Dispatch Unit AIP-SSM Inline and nailed
option on static")
CVSS Base Score - 7.1
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 5.9
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Crafted IKE Message Denial of Service Vulnerability
+--------------------------------------------------
* CSCtc47782 ("Malformed IKE traffic causes rekey to fail")
CVSS Base Score - 5.0
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Partial
CVSS Temporal Score - 4.1
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
* CSCte21953 ("ASA may allow authentication of an invalid username for
NT auth")
CVSS Base Score - 7.1
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - None
Availability Impact - None
CVSS Temporal Score - 6.2
Exploitability - High
Remediation Level - Official-Fix
Report Confidence - Confirmed
Impact
======
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
Successful exploitation of this vulnerability may lead to an exhaustion
condition where the affected appliance cannot accept new TCP
connections. A reload of the appliance is necessary to recover from the
TCP connection exhaustion condition. If a TCP-based protocol is used
for device management (like telnet, SSH, or HTTPS), a serial console
connection may be needed to access to the appliance.
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
Successful exploitation of this vulnerability may cause a reload of
the affected appliance. Repeated exploitation could result in a
sustained DoS condition.
SCCP Inspection Denial of Service Vulnerability
+----------------------------------------------
Successful exploitation of this vulnerability may cause a reload of
the affected appliance. Repeated exploitation could result in a
sustained DoS condition.
WebVPN DTLS Denial of Service Vulnerability
+------------------------------------------
Successful exploitation of this vulnerability may cause a reload of
the affected appliance. Repeated exploitation could result in a
sustained DoS condition.
Crafted TCP Segment Denial of Service Vulnerability
+--------------------------------------------------
Successful exploitation of this vulnerability may cause a reload of
the affected appliance. Repeated exploitation could result in a
sustained DoS condition.
Crafted IKE Message Denial of Service Vulnerability
+--------------------------------------------------
Successful exploitation of this vulnerability could cause all IPsec
VPN tunnels (LAN-to-LAN or remote) that terminate on the security
appliance to be torn down and prevent new tunnels from being
established. A manual reload of the appliance is required to
re-establish all VPN tunnels.
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
Successful exploitation of this vulnerability could result in
unauthorized access to the network or appliance.
Software Versions and Fixes
===========================
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to determine
exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.
The following table contains the first fixed software release of each
vulnerability. A device running a version of the given release in
a specific row (less than the First Fixed Release) is known to be
vulnerable.
+---------------------------------------+
| | Major | First |
| Vulnerability | Release | Fixed |
| | | Release |
|-----------------+---------+-----------|
| | 7.0 | Not |
| | | affected |
|TCP Connection |---------+-----------|
| Exhaustion | 7.2 | 7.2(4.46) |
|Denial of |---------+-----------|
| Service | 8.0 | 8.0(4.38) |
|Vulnerability ( |---------+-----------|
| CSCsz77717) | 8.1 | 8.1(2.29) |
| |---------+-----------|
| | 8.2 | 8.2(1.5) |
|-----------------+---------+-----------|
| | 7.0 | 7.0(8.10) |
|SIP Inspection |---------+-----------|
| Denial of | 7.2 | 7.2(4.45) |
|Service |---------+-----------|
| Vulnerabilities | 8.0 | 8.0(5.2) |
|(CSCsy91157 and |---------+-----------|
| CSCtc96018) | 8.1 | 8.1(2.37) |
| |---------+-----------|
| | 8.2 | 8.2(1.16) |
|-----------------+---------+-----------|
| | 7.0 | Not |
| | | affected |
| |---------+-----------|
| SCCP Inspection | 7.2 | Not |
| Denial of | | affected |
|Service |---------+-----------|
| Vulnerability ( | 8.0 | 8.0(4.38) |
|CSCsz79757) |---------+-----------|
| | 8.1 | 8.1(2.29) |
| |---------+-----------|
| | 8.2 | 8.2(1.2) |
|-----------------+---------+-----------|
| | 7.0 | Not |
| | | affected |
|WebVPN DTLS |---------+-----------|
| Denial of | 7.2 | 7.2(4.45) |
|Service |---------+-----------|
| Vulnerability ( | 8.0 | 8.0(4.44) |
|CSCtb64913) |---------+-----------|
| | 8.1 | 8.1(2.35) |
| |---------+-----------|
| | 8.2 | 8.2(1.10) |
|-----------------+---------+-----------|
| | 7.0 | 7.0(8.10) |
| |---------+-----------|
| Crafted TCP | 7.2 | 7.2(4.45) |
|Segment Denial |---------+-----------|
| of Service | 8.0 | 8.0(4.44) |
|Vulnerability ( |---------+-----------|
| CSCtb37219) | 8.1 | 8.1(2.35) |
| |---------+-----------|
| | 8.2 | 8.2(1.10) |
|-----------------+---------+-----------|
| | 7.0 | 7.0(8.10) |
| |---------+-----------|
| Crafted IKE | 7.2 | 7.2(4.45) |
|Message Denial |---------+-----------|
| of Service | 8.0 | 8.0(5.1) |
|Vulnerability ( |---------+-----------|
| CSCtc47782) | 8.1 | 8.1(2.37) |
| |---------+-----------|
| | 8.2 | 8.2(1.15) |
|-----------------+---------+-----------|
| | 7.0 | 7.0(8.10) |
| |---------+-----------|
| | 7.2 | 7.2(4.45) |
| |---------+-----------|
| NTLMv1 | 8.0 | 8.0(5.7) |
|Authentication |---------+-----------|
| Bypass | | 8.1 |
| Vulnerability ( | | (2.40), |
| CSCte21953) | 8.1 | available |
| | | early |
| | | March |
| | | 2010 |
| |---------+-----------|
| | 8.2 | 8.2(2.1) |
+---------------------------------------+
Note: Cisco ASA Software versions 7.1.x are affected by some of the
vulnerabilities in this advisory. However, no fixed 7.1.x software
versions are planned because the 7.1.x major release has reached the End
of Software Maintenance Releases milestone.
Fixed Cisco ASA Software can be downloaded from:
http://www.cisco.com/pcgi-bin/tablebuild.pl/ASAPSIRT?psrtdcat20e2
Recommended Releases
+-------------------
Releases 7.0(8.10), 7.2(4.46), 8.0(5.9), 8.1(2.40) (available early
March 2010), and 8.2(2.4) are recommended releases because they contain
the fixes for all vulnerabilities in this advisory. Cisco recommends
upgrading to a release that is equal to or later than these recommended
releases.
Workarounds
===========
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
It is possible to mitigate this vulnerability for TCP-based services
that are offered to known clients. For example, it may be possible to
restrict SSH, Cisco ASDM/HTTPS, and Telnet administrative access to
known hosts or IP subnetworks. For other services like remote access
SSL VPN, where clients connect from unknown hosts and networks, no
mitigations exist.
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
These vulnerabilities can be mitigated by disabling SIP inspection if it
is not required. Administrators can disable SIP inspection by issuing
the "no inspect sip" command in class configuration sub-mode within
policy-map configuration.
SCCP Inspection Denial of Service Vulnerability
+----------------------------------------------
This vulnerability can be mitigated by disabling SCCP inspection if it
is not required. Administrators can disable SCCP inspection by issuing
the "no inspect skinny" command in class configuration sub-mode within
the policy-map configuration.
WebVPN DTLS Denial of Service Vulnerability
+------------------------------------------
This vulnerability can be mitigated by disabling DTLS transport
for WebVPN. Administrators can disable DTLS by issuing the "no svc
dtls enable" command under the "webvpn" attributes section of the
corresponding group policy.
Crafted TCP Segment Denial of Service Vulnerability
+--------------------------------------------------
Possible workarounds for this vulnerability are the following:
* Migrate from "nailed" static NAT entries to TCP-state bypass.
* Use the Cisco AIP-SSM in promiscuous mode. This mode can be
configured by issuing the "ips promiscuous" command in "class"
configuration mode.
* Disable IPS inspection for "nailed" static NAT entries.
* If possible, change "nailed" static NAT entries to standard
static NAT entries. This may be feasible since in most
cases there is no need for allowing IPsec tunnels inside IPsec tunnels.
Filtering out UDP port 4500 traffic across an IPsec tunnel can be
accomplished by using a VPN filter, as shown in the following example:
!-- Deny only UDP port 4500 traffic and allow everything else
access-list VPNFILTER extended deny udp any any eq 4500
access-list VPNFILTER extended permit ip any any
!-- Create a group policy and specify a VPN filter that uses the
!-- previous ACL
group-policy VPNPOL internal
group-policy VPNPOL attributes
vpn-filter value VPNFILTER
!-- Reference the group policy with the VPN filter from the tunnel group
tunnel-group 172.16.0.1 type ipsec-l2l
tunnel-group 172.16.0.1 general-attributes
default-group-policy VPNPOL
For this workaround to be effective, the group policy needs to be
applied to all site-to-site (tunnel type "ipsec-l2l") and remote access
(tunnel type "ipsec-ra") tunnel groups.
Warning: In addition to filtering out IKE traffic on UDP port 4500, this
workaround may also affect other procotols like DNS and SNMP that send
traffic on UDP port 4500. For example, if a DNS resolver sends traffic
from UDP port 4500 to a DNS server, the response from the DNS server
will be destined to UDP port 4500, which then may be filtered out by the
filter used in this workaround.
For a more comprehensive example of the VPN filter feature of the Cisco
ASA 5500 Series Adaptive Security Appliances, refer to the whitepaper
"PIX/ASA 7.x and Later: VPN Filter (Permit Specific Port or Protocol)
Configuration Example for L2L and Remote Access" available at:
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9a87.shtml
In addition, if the security appliance does not terminate any tunnels,
the vulnerability can be mitigated by disabling IKE by issuing the "no
isakmp enable <interface name>" command.
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
If NTLMv1 authentication is required, there are no workarounds for this
vulnerability. If NTLMv1 authentication can be substituted by other
authentication protocols (LDAP, RADIUS, TACACS+, etc.), it is possible
to mitigate the vulnerability.
Obtaining Fixed Software
========================
Cisco has released free software updates that address these
vulnerabilities. Prior to deploying software, customers should consult
their maintenance provider or check the software for feature set
compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature
sets they have purchased. By installing, downloading, accessing
or otherwise using such software upgrades, customers agree to be
bound by the terms of Cisco's software license terms found at
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html,
or as otherwise set forth at Cisco.com Downloads at
http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Do not contact psirt@cisco.com or security-alert@cisco.com for software
upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through their
regular update channels. For most customers, this means that upgrades
should be obtained through the Software Center on Cisco's worldwide
website at http://www.cisco.com.
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through prior
or existing agreements with third-party support organizations, such
as Cisco Partners, authorized resellers, or service providers should
contact that support organization for guidance and assistance with the
appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations, such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or fix
is the most appropriate for use in the intended network before it is
deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco service
contract, and customers who purchase through third-party vendors but are
unsuccessful in obtaining fixed software through their point of sale
should acquire upgrades by contacting the Cisco Technical Assistance
Center (TAC). TAC contacts are as follows.
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Customers should have their product serial number available and be
prepared to give the URL of this notice as evidence of entitlement to a
free upgrade. Free upgrades for non-contract customers must be requested
through the TAC.
Refer to
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
for additional TAC contact information, including localized telephone
numbers, and instructions and e-mail addresses for use in various
languages.
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of any of the vulnerabilities described in this advisory.
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
This vulnerability was discovered during the resolution of a customer
service request.
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
CSCsy91157 was discovered during internal testing. CSCtc96018 was
discovered during the resolution of customer service requests.
SCCP Inspection Denial of Service Vulnerability
+----------------------------------------------
This vulnerability was discovered during the resolution of customer
service requests.
WebVPN DTLS Denial of Service Vulnerability
+------------------------------------------
This vulnerability was discovered during the resolution of customer
service requests.
Crafted TCP Segment Denial of Service Vulnerability
+--------------------------------------------------
This vulnerability was discovered during internal testing.
Crafted IKE Message Denial of Service Vulnerability
+--------------------------------------------------
This vulnerability was discovered during the resolution of customer
service requests.
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
This vulnerability was discovered during internal testing.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY
ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that omits
the distribution URL in the following section is an uncontrolled copy,
and may lack important information or contain factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml
In addition to worldwide web posting, a text version of this notice is
clear-signed with the Cisco PSIRT PGP key and is posted to the following
e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-bulletins@lists.first.org
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.grok.org.uk
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on mailing
lists or newsgroups. Users concerned about this problem are encouraged
to check the above URL for any updates.
Revision History
================
+------------------------------------------------------------+
| Revision 1.0 | 2010-February-17 | Initial public release. |
+------------------------------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities
in Cisco products, obtaining assistance with security
incidents, and registering to receive security information
from Cisco, is available on Cisco's worldwide website at
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.
This includes instructions for press inquiries regarding
Cisco security notices. All Cisco security advisories are available at
http://www.cisco.com/go/psirt. All rights reserved.
+--------------------------------------------------------------------
Updated: Feb 17, 2010 Document ID: 111485
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkt8GTYACgkQ86n/Gc8U/uBi6QCfYFKvAUdFrRvusqKoaFmMwfcH
XOYAnRymbNOcRg5gmPFMO/zqgm2wOyKQ
=JUg3
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-201002-0162 | CVE-2010-0565 |
Cisco Adaptive Security Appliance Service disruption in (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-201002-0420 |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.2 before 7.2(4.45), 8.0 before 8.0(4.44), 8.1 before 8.1(2.35), and 8.2 before 8.2(1.10), allows remote attackers to cause a denial of service (page fault and device reload) via a malformed DTLS message, aka Bug ID CSCtb64913 and "WebVPN DTLS Denial of Service Vulnerability.". Cisco Adaptive Security Appliance There is a service disruption (DoS) There is a vulnerability that becomes a condition. The problem is Bug ID : CSCtb64913 It is a problem.Unauthorized by a third party DTLS Service disruption via message (DoS) There is a possibility of being put into a state.
Attackers can exploit this issue to cause the device to reload, denying service to legitimate users.
This issue is documented in Cisco bug ID CSCtb64913.
4) An error in WebVPN can be exploited to trigger an appliance
reload via a specially crafted DTLS packet.
7) An error in the implementation of the NT LAN Manager version 1
(NTLMv1) protocol can be exploited to bypass authentication via a
specially crafted username.
SOLUTION:
Update to a fixed version. Please see the vendor's advisory for
detailed patch information.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
There are workarounds for some of the vulnerabilities disclosed in this
advisory.
Cisco has released free software updates that address these
vulnerabilities.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml. For specific version
information, refer to the "Software Versions and Fixes" section of this
advisory.
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP
connection exhaustion condition (no new TCP connections are accepted)
that can be triggered through the receipt of specific TCP segments
during the TCP connection termination phase. Appliances that are running
versions 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected when they
are configured for any of the following features:
* SSL VPNs
* Cisco Adaptive Security Device Manager (ASDM) Administrative
Access
* Telnet Access
* SSH Access
* Virtual Telnet
* Virtual HTTP
* Transport Layer Security (TLS) Proxy for Encrypted Voice
Inspection
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
Two denial of service (DoS) vulnerabilities affect the SIP inspection
feature of Cisco ASA 5500 Series Adaptive Security Appliances. Versions
7.0.x, 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected. SIP
inspection is enabled by default.
To check if SIP inspection is enabled, issue the "show service-policy |
include sip" command and confirm that some output is returned. Sample
output is displayed in the following example:
ciscoasa#show service-policy | include sip
Inspect: sip , packet 0, drop 0, reset-drop 0
Alternatively, an appliance that has SIP inspection enabled has a
configuration similar to the following:
class-map inspection_default
match default-inspection-traffic
!
policy-map global_policy
class inspection_default
...
inspect sip
... Versions 8.0.x,
8.1.x, and 8.2.x are affected. SCCP inspection is enabled by default.
To check if SCCP inspection is enabled, issue the "show service-policy |
include skinny" command and confirm that some output is returned. Sample
output is displayed in the following example:
ciscoasa#show service-policy | include skinny
Inspect: skinny , packet 0, drop 0, reset-drop 0
Alternatively, an appliance that has SCCP inspection enabled has a
configuration similar to the following:
class-map inspection_default
match default-inspection-traffic
!
policy-map global_policy
class inspection_default
...
inspect skinny
... Affected versions include 7.1.x, 7.2.x, 8.0.x, 8.1.x, and
8.2.x. Administrators can enable WebVPN with the "enable <interface
name>" command in "webvpn" configuration mode. DTLS can be enabled
by issuing the "svc dtls enable" command in "group policy webvpn"
configuration mode. The following configuration snippet provides an
example of a WebVPN configuration that enables DTLS:
webvpn
enable outside
svc enable
...
!
group-policy <group name> internal
group-policy <group name> attributes
...
webvpn
svc dtls enable
...
Altough WebVPN is disabled by default, DTLS is enabled by default in
recent software releases. This vulnerability only affects
configurations that use the "nailed" option at the end of their static
statement. Additionally, traffic that matches "static" statement must
also be inspected by a Cisco AIP-SSM (an Intrusion Prevention System
(IPS) module) in inline mode. IPS inline operation mode is enabled by
using the "ips inline {fail-close | fail-open}" command in "class"
configuration mode. Versions 7.0.x, 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are
affected. IKE is not enabled by default. If IKE is enabled, the "isakmp
enable <interface name>" command appears in the configuration.
Versions 7.0.x, 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected.
Administrators can configure NTLMv1 authentication by defining an
Authentication, Authorization, and Accounting (AAA) server group that
uses the NTLMv1 protocol with the "aaa-server <AAA server group tag>
protocol nt" command and then configuring a service that requires
authentication to use that AAA server group. To verify that NTLMv1
authentication is enabled and active, issue the "show aaa-server
protocol nt" command. Cisco PIX 500 Series Security Appliances customers are
encouraged to migrate to Cisco ASA 5500 Series Adaptive Security
Appliances or to implement any applicable workarounds that are listed
in the "Workarounds" section of this advisory.
For more information, refer to the End of Life announcement at:
http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5709/ps2030/end_of_life_notice_cisco_pix_525_sec_app.html.
How To Determine The Running Software Version
+--------------------------------------------
To determine whether a vulnerable version of Cisco ASA Software is
running on an appliance, administrators can issue the "show version"
command-line interface (CLI) command. The following example shows a
Cisco ASA 5500 Series Adaptive Security Appliance that is running
software version 8.0(4):
ASA#show version
Cisco Adaptive Security Appliance Software Version 8.0(4)
Device Manager Version 6.0(1)
<output truncated>
Customers who use Cisco ASDM to manage devices can locate the software
version in the table that is displayed in the login window or upper-left
corner of the Cisco ASDM window.
Products Confirmed Not Vulnerable
+--------------------------------
The Cisco Firewall Services Module (FWSM) is affected by
some of the vulnerabilities in this advisory. A separate
Cisco Security Advisory has been published to disclose the
vulnerabilities that affect the FWSM. This advisory is available at
http://www.cisco.com/warp/public/707/cisco-sa-20100217-fwsm.shtml.
With the exception of the Cisco FWSM, no other Cisco products are
currently known to be affected by these vulnerabilities. It offers firewall,
intrusion prevention (IPS), anti-X, and VPN services.
Cisco ASA 5500 Series Adaptive Security Appliances are affected by the
following vulnerabilities:
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP
connection exhaustion condition (no new TCP connections are accepted)
when specific TCP segments are received during the TCP connection
termination phase.
This vulnerability is triggered only when specific TCP segments are sent
to certain TCP-based services that terminate on the affected appliance.
Although exploitation of this vulnerability requires a TCP three-way
handshake, authentication is not required. Appliances are only vulnerable
when SIP inspection is enabled.
Only transit traffic can trigger these vulnerabilities; traffic that is
destined to the appliance will not trigger the vulnerabilities. Appliances are only
vulnerable when SCCP inspection is enabled.
Only transit traffic can trigger this vulnerability; traffic that is
destined to the appliance will not trigger the vulnerabily.
Appliances are only vulnerable when they are configured for WebVPN and
DTLS transport.
This vulnerability is only triggered by traffic that is destined to the
appliance; transit traffic will not trigger the vulnerability. A malformed, transit TCP segment is received.
2. The TCP segment matches a static NAT translation that has the
"nailed" option configured on it.
3. The TCP segment is also processed by the Cisco AIP-SSM, which is
configured for inline mode of operation.
A TCP three-way handshake is not necessary to exploit this
vulnerability. The tunnels are not torn down immediately; IPsec traffic
will continue to flow until the next rekey, at which time the rekey
will fail and the tunnels will be torn down. Both site-to-site and
remote access VPN tunnels are affected. The vulnerability is triggered
when the appliance processes a malformed IKE message on port UDP 4500
that traverses an existing IPsec tunnel. The only way to recover and
re-establish IPsec VPN tunnels is to reload the appliance.
When this vulnerability is exploited, the security appliance will
generate syslog messages 713903 and 713906, which will be followed by
the loss of IPsec peers.
Users can bypass authentication by providing an an invalid, crafted
username during an authentication request. Any services that use a
AAA server group that is configured to use the NTLMv1 authentication
protocol is affected. Affected services include:
* Telnet access to the security appliance
* SSH access to the security appliance
* HTTPS access to the security appliance (including Cisco ASDM
access)
* Serial console access
* Privileged (enable) mode access
* Cut-through proxy for network access
* VPN access
This vulnerability is documented in Cisco bug ID CSCte21953 and has been
assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2010-0568.
Vulnerability Scoring Details
=============================
Cisco has provided scores for the vulnerabilities in this advisory based
on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in
this Security Advisory is done in accordance with CVSS version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of the
vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding CVSS
at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss.
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
* CSCsz77717 ("TCP sessions remain in CLOSEWAIT indefinitely")
CVSS Base Score - 7.1
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 5.9
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
* CSCsy91157 ("Watchdog when inspecting malformed SIP traffic")
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
* CSCtc96018 ("ASA watchdog when inspecting malformed SIP traffic")
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
SCCP Inspection Denial of Service Vulnerability
+----------------------------------------------
* CSCsz79757 ("Traceback - Thread Name: Dispatch Unit with skinny
inspect enabled")
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
WebVPN DTLS Denial of Service Vulnerability
+------------------------------------------
* CSCtb64913 ("WEBVPN: page fault in thread name dispath unit, eip udpmod_user_put")
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Crafted TCP Segment Denial of Service Vulnerability
+--------------------------------------------------
* CSCtb37219 ("Traceback in Dispatch Unit AIP-SSM Inline and nailed
option on static")
CVSS Base Score - 7.1
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 5.9
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Crafted IKE Message Denial of Service Vulnerability
+--------------------------------------------------
* CSCtc47782 ("Malformed IKE traffic causes rekey to fail")
CVSS Base Score - 5.0
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Partial
CVSS Temporal Score - 4.1
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
* CSCte21953 ("ASA may allow authentication of an invalid username for
NT auth")
CVSS Base Score - 7.1
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - None
Availability Impact - None
CVSS Temporal Score - 6.2
Exploitability - High
Remediation Level - Official-Fix
Report Confidence - Confirmed
Impact
======
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
Successful exploitation of this vulnerability may lead to an exhaustion
condition where the affected appliance cannot accept new TCP
connections. A reload of the appliance is necessary to recover from the
TCP connection exhaustion condition. If a TCP-based protocol is used
for device management (like telnet, SSH, or HTTPS), a serial console
connection may be needed to access to the appliance. Repeated exploitation could result in a
sustained DoS condition. Repeated exploitation could result in a
sustained DoS condition. Repeated exploitation could result in a
sustained DoS condition. Repeated exploitation could result in a
sustained DoS condition. A manual reload of the appliance is required to
re-establish all VPN tunnels.
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
Successful exploitation of this vulnerability could result in
unauthorized access to the network or appliance.
Software Versions and Fixes
===========================
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to determine
exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.
The following table contains the first fixed software release of each
vulnerability. A device running a version of the given release in
a specific row (less than the First Fixed Release) is known to be
vulnerable. However, no fixed 7.1.x software
versions are planned because the 7.1.x major release has reached the End
of Software Maintenance Releases milestone.
Fixed Cisco ASA Software can be downloaded from:
http://www.cisco.com/pcgi-bin/tablebuild.pl/ASAPSIRT?psrtdcat20e2
Recommended Releases
+-------------------
Releases 7.0(8.10), 7.2(4.46), 8.0(5.9), 8.1(2.40) (available early
March 2010), and 8.2(2.4) are recommended releases because they contain
the fixes for all vulnerabilities in this advisory. Cisco recommends
upgrading to a release that is equal to or later than these recommended
releases.
Workarounds
===========
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
It is possible to mitigate this vulnerability for TCP-based services
that are offered to known clients. For example, it may be possible to
restrict SSH, Cisco ASDM/HTTPS, and Telnet administrative access to
known hosts or IP subnetworks. For other services like remote access
SSL VPN, where clients connect from unknown hosts and networks, no
mitigations exist.
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
These vulnerabilities can be mitigated by disabling SIP inspection if it
is not required. Administrators can disable SIP inspection by issuing
the "no inspect sip" command in class configuration sub-mode within
policy-map configuration.
SCCP Inspection Denial of Service Vulnerability
+----------------------------------------------
This vulnerability can be mitigated by disabling SCCP inspection if it
is not required. Administrators can disable SCCP inspection by issuing
the "no inspect skinny" command in class configuration sub-mode within
the policy-map configuration.
WebVPN DTLS Denial of Service Vulnerability
+------------------------------------------
This vulnerability can be mitigated by disabling DTLS transport
for WebVPN. Administrators can disable DTLS by issuing the "no svc
dtls enable" command under the "webvpn" attributes section of the
corresponding group policy.
Crafted TCP Segment Denial of Service Vulnerability
+--------------------------------------------------
Possible workarounds for this vulnerability are the following:
* Migrate from "nailed" static NAT entries to TCP-state bypass.
* Use the Cisco AIP-SSM in promiscuous mode. This mode can be
configured by issuing the "ips promiscuous" command in "class"
configuration mode.
* Disable IPS inspection for "nailed" static NAT entries.
* If possible, change "nailed" static NAT entries to standard
static NAT entries. This may be feasible since in most
cases there is no need for allowing IPsec tunnels inside IPsec tunnels.
Filtering out UDP port 4500 traffic across an IPsec tunnel can be
accomplished by using a VPN filter, as shown in the following example:
!-- Deny only UDP port 4500 traffic and allow everything else
access-list VPNFILTER extended deny udp any any eq 4500
access-list VPNFILTER extended permit ip any any
!-- Create a group policy and specify a VPN filter that uses the
!-- previous ACL
group-policy VPNPOL internal
group-policy VPNPOL attributes
vpn-filter value VPNFILTER
!-- Reference the group policy with the VPN filter from the tunnel group
tunnel-group 172.16.0.1 type ipsec-l2l
tunnel-group 172.16.0.1 general-attributes
default-group-policy VPNPOL
For this workaround to be effective, the group policy needs to be
applied to all site-to-site (tunnel type "ipsec-l2l") and remote access
(tunnel type "ipsec-ra") tunnel groups.
Warning: In addition to filtering out IKE traffic on UDP port 4500, this
workaround may also affect other procotols like DNS and SNMP that send
traffic on UDP port 4500. For example, if a DNS resolver sends traffic
from UDP port 4500 to a DNS server, the response from the DNS server
will be destined to UDP port 4500, which then may be filtered out by the
filter used in this workaround.
For a more comprehensive example of the VPN filter feature of the Cisco
ASA 5500 Series Adaptive Security Appliances, refer to the whitepaper
"PIX/ASA 7.x and Later: VPN Filter (Permit Specific Port or Protocol)
Configuration Example for L2L and Remote Access" available at:
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9a87.shtml
In addition, if the security appliance does not terminate any tunnels,
the vulnerability can be mitigated by disabling IKE by issuing the "no
isakmp enable <interface name>" command.
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
If NTLMv1 authentication is required, there are no workarounds for this
vulnerability. If NTLMv1 authentication can be substituted by other
authentication protocols (LDAP, RADIUS, TACACS+, etc.), it is possible
to mitigate the vulnerability.
Obtaining Fixed Software
========================
Cisco has released free software updates that address these
vulnerabilities. Prior to deploying software, customers should consult
their maintenance provider or check the software for feature set
compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature
sets they have purchased. By installing, downloading, accessing
or otherwise using such software upgrades, customers agree to be
bound by the terms of Cisco's software license terms found at
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html,
or as otherwise set forth at Cisco.com Downloads at
http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Do not contact psirt@cisco.com or security-alert@cisco.com for software
upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through their
regular update channels. For most customers, this means that upgrades
should be obtained through the Software Center on Cisco's worldwide
website at http://www.cisco.com.
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through prior
or existing agreements with third-party support organizations, such
as Cisco Partners, authorized resellers, or service providers should
contact that support organization for guidance and assistance with the
appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations, such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or fix
is the most appropriate for use in the intended network before it is
deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco service
contract, and customers who purchase through third-party vendors but are
unsuccessful in obtaining fixed software through their point of sale
should acquire upgrades by contacting the Cisco Technical Assistance
Center (TAC). TAC contacts are as follows.
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Customers should have their product serial number available and be
prepared to give the URL of this notice as evidence of entitlement to a
free upgrade. Free upgrades for non-contract customers must be requested
through the TAC.
Refer to
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
for additional TAC contact information, including localized telephone
numbers, and instructions and e-mail addresses for use in various
languages.
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of any of the vulnerabilities described in this advisory.
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
This vulnerability was discovered during the resolution of a customer
service request.
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
CSCsy91157 was discovered during internal testing. CSCtc96018 was
discovered during the resolution of customer service requests.
SCCP Inspection Denial of Service Vulnerability
+----------------------------------------------
This vulnerability was discovered during the resolution of customer
service requests.
WebVPN DTLS Denial of Service Vulnerability
+------------------------------------------
This vulnerability was discovered during the resolution of customer
service requests.
Crafted TCP Segment Denial of Service Vulnerability
+--------------------------------------------------
This vulnerability was discovered during internal testing.
Crafted IKE Message Denial of Service Vulnerability
+--------------------------------------------------
This vulnerability was discovered during the resolution of customer
service requests.
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
This vulnerability was discovered during internal testing.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY
ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that omits
the distribution URL in the following section is an uncontrolled copy,
and may lack important information or contain factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml
In addition to worldwide web posting, a text version of this notice is
clear-signed with the Cisco PSIRT PGP key and is posted to the following
e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-bulletins@lists.first.org
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.grok.org.uk
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on mailing
lists or newsgroups. Users concerned about this problem are encouraged
to check the above URL for any updates.
Revision History
================
+------------------------------------------------------------+
| Revision 1.0 | 2010-February-17 | Initial public release. |
+------------------------------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities
in Cisco products, obtaining assistance with security
incidents, and registering to receive security information
from Cisco, is available on Cisco's worldwide website at
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.
This includes instructions for press inquiries regarding
Cisco security notices. All Cisco security advisories are available at
http://www.cisco.com/go/psirt.
+--------------------------------------------------------------------
Copyright 2008-2010 Cisco Systems, Inc. All rights reserved.
+--------------------------------------------------------------------
Updated: Feb 17, 2010 Document ID: 111485
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkt8GTYACgkQ86n/Gc8U/uBi6QCfYFKvAUdFrRvusqKoaFmMwfcH
XOYAnRymbNOcRg5gmPFMO/zqgm2wOyKQ
=JUg3
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-201002-0163 | CVE-2010-0566 | Cisco Adaptive Security Appliance Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 before 7.0(8.10), 7.2 before 7.2(4.45), 8.0 before 8.0(4.44), 8.1 before 8.1(2.35), and 8.2 before 8.2(1.10) allows remote attackers to cause a denial of service (device reload) via a malformed TCP segment when certain NAT translation and Cisco AIP-SSM configurations are used, aka Bug ID CSCtb37219. Cisco Adaptive Security Appliance There is a service disruption (DoS) There is a vulnerability that becomes a condition. The problem is Bug ID : CSCtb37219 It is a problem.specific NAT Or Cisco AIP-SSM Incorrect settings are used TCP Service disruption through segments (DoS) There is a possibility of being put into a state. Cisco ASA 5500 devices are prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause an affected device to restart, denying service to legitimate users.
This issue is tracked by Cisco Bug ID CSCtb37219.
4) An error in WebVPN can be exploited to trigger an appliance
reload via a specially crafted DTLS packet.
7) An error in the implementation of the NT LAN Manager version 1
(NTLMv1) protocol can be exploited to bypass authentication via a
specially crafted username.
SOLUTION:
Update to a fixed version. Please see the vendor's advisory for
detailed patch information.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
There are workarounds for some of the vulnerabilities disclosed in this
advisory.
Cisco has released free software updates that address these
vulnerabilities.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml. For specific version
information, refer to the "Software Versions and Fixes" section of this
advisory. Appliances that are running
versions 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected when they
are configured for any of the following features:
* SSL VPNs
* Cisco Adaptive Security Device Manager (ASDM) Administrative
Access
* Telnet Access
* SSH Access
* Virtual Telnet
* Virtual HTTP
* Transport Layer Security (TLS) Proxy for Encrypted Voice
Inspection
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
Two denial of service (DoS) vulnerabilities affect the SIP inspection
feature of Cisco ASA 5500 Series Adaptive Security Appliances. Versions
7.0.x, 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected. SIP
inspection is enabled by default.
To check if SIP inspection is enabled, issue the "show service-policy |
include sip" command and confirm that some output is returned. Sample
output is displayed in the following example:
ciscoasa#show service-policy | include sip
Inspect: sip , packet 0, drop 0, reset-drop 0
Alternatively, an appliance that has SIP inspection enabled has a
configuration similar to the following:
class-map inspection_default
match default-inspection-traffic
!
policy-map global_policy
class inspection_default
...
inspect sip
... Versions 8.0.x,
8.1.x, and 8.2.x are affected. SCCP inspection is enabled by default.
To check if SCCP inspection is enabled, issue the "show service-policy |
include skinny" command and confirm that some output is returned. Sample
output is displayed in the following example:
ciscoasa#show service-policy | include skinny
Inspect: skinny , packet 0, drop 0, reset-drop 0
Alternatively, an appliance that has SCCP inspection enabled has a
configuration similar to the following:
class-map inspection_default
match default-inspection-traffic
!
policy-map global_policy
class inspection_default
...
inspect skinny
... Affected versions include 7.1.x, 7.2.x, 8.0.x, 8.1.x, and
8.2.x. Administrators can enable WebVPN with the "enable <interface
name>" command in "webvpn" configuration mode. DTLS can be enabled
by issuing the "svc dtls enable" command in "group policy webvpn"
configuration mode. The following configuration snippet provides an
example of a WebVPN configuration that enables DTLS:
webvpn
enable outside
svc enable
...
!
group-policy <group name> internal
group-policy <group name> attributes
...
webvpn
svc dtls enable
...
Altough WebVPN is disabled by default, DTLS is enabled by default in
recent software releases. This vulnerability only affects
configurations that use the "nailed" option at the end of their static
statement. Additionally, traffic that matches "static" statement must
also be inspected by a Cisco AIP-SSM (an Intrusion Prevention System
(IPS) module) in inline mode. IPS inline operation mode is enabled by
using the "ips inline {fail-close | fail-open}" command in "class"
configuration mode. Versions 7.0.x, 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are
affected. IKE is not enabled by default. If IKE is enabled, the "isakmp
enable <interface name>" command appears in the configuration.
Versions 7.0.x, 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected.
Administrators can configure NTLMv1 authentication by defining an
Authentication, Authorization, and Accounting (AAA) server group that
uses the NTLMv1 protocol with the "aaa-server <AAA server group tag>
protocol nt" command and then configuring a service that requires
authentication to use that AAA server group. To verify that NTLMv1
authentication is enabled and active, issue the "show aaa-server
protocol nt" command. Sample output is displayed in the following
example:
ciscoasa#show aaa-server protocol nt
Server Group: test
Server Protocol: nt
Server Address: 192.168.10.11
Server port: 139
Server status: ACTIVE, Last transaction (success) at 11:10:08 UTC Fri Jan 29
<output truncated>
Cisco PIX 500 Series Security Appliance Vulnerability Status
+-----------------------------------------------------------
Cisco PIX 500 Series Security Appliances are affected by the
following vulnerabilities:
* TCP Connection Exhaustion Denial of Service Vulnerability
* SIP Inspection Denial of Service Vulnerabilities
* SCCP Inspection Denial of Service Vulnerability
* Crafted IKE Message Denial of Service Vulnerability
* NTLMv1 Authentication Bypass Vulnerability
Because the Cisco PIX 500 Series Security Appliances reached End of
Software Maintenance Releases on July 28, 2009, no further software
releases will be available for the Cisco PIX 500 Series Security
Appliances. Cisco PIX 500 Series Security Appliances customers are
encouraged to migrate to Cisco ASA 5500 Series Adaptive Security
Appliances or to implement any applicable workarounds that are listed
in the "Workarounds" section of this advisory.
For more information, refer to the End of Life announcement at:
http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5709/ps2030/end_of_life_notice_cisco_pix_525_sec_app.html.
How To Determine The Running Software Version
+--------------------------------------------
To determine whether a vulnerable version of Cisco ASA Software is
running on an appliance, administrators can issue the "show version"
command-line interface (CLI) command. The following example shows a
Cisco ASA 5500 Series Adaptive Security Appliance that is running
software version 8.0(4):
ASA#show version
Cisco Adaptive Security Appliance Software Version 8.0(4)
Device Manager Version 6.0(1)
<output truncated>
Customers who use Cisco ASDM to manage devices can locate the software
version in the table that is displayed in the login window or upper-left
corner of the Cisco ASDM window.
Products Confirmed Not Vulnerable
+--------------------------------
The Cisco Firewall Services Module (FWSM) is affected by
some of the vulnerabilities in this advisory. A separate
Cisco Security Advisory has been published to disclose the
vulnerabilities that affect the FWSM. This advisory is available at
http://www.cisco.com/warp/public/707/cisco-sa-20100217-fwsm.shtml.
With the exception of the Cisco FWSM, no other Cisco products are
currently known to be affected by these vulnerabilities. It offers firewall,
intrusion prevention (IPS), anti-X, and VPN services.
This vulnerability is triggered only when specific TCP segments are sent
to certain TCP-based services that terminate on the affected appliance.
Although exploitation of this vulnerability requires a TCP three-way
handshake, authentication is not required. Appliances are only vulnerable
when SIP inspection is enabled.
Only transit traffic can trigger these vulnerabilities; traffic that is
destined to the appliance will not trigger the vulnerabilities.
These vulnerabilities are documented in Cisco bug IDs CSCsy91157,
and CSCtc96018, and have been assigned CVE IDs CVE-2010-0150, and
CVE-2010-0569 respectively. Appliances are only
vulnerable when SCCP inspection is enabled.
Only transit traffic can trigger this vulnerability; traffic that is
destined to the appliance will not trigger the vulnerabily.
Appliances are only vulnerable when they are configured for WebVPN and
DTLS transport.
This vulnerability is only triggered by traffic that is destined to the
appliance; transit traffic will not trigger the vulnerability. A malformed, transit TCP segment is received.
2. The TCP segment matches a static NAT translation that has the
"nailed" option configured on it.
3. The TCP segment is also processed by the Cisco AIP-SSM, which is
configured for inline mode of operation.
A TCP three-way handshake is not necessary to exploit this
vulnerability. The tunnels are not torn down immediately; IPsec traffic
will continue to flow until the next rekey, at which time the rekey
will fail and the tunnels will be torn down. Both site-to-site and
remote access VPN tunnels are affected. The vulnerability is triggered
when the appliance processes a malformed IKE message on port UDP 4500
that traverses an existing IPsec tunnel. The only way to recover and
re-establish IPsec VPN tunnels is to reload the appliance.
When this vulnerability is exploited, the security appliance will
generate syslog messages 713903 and 713906, which will be followed by
the loss of IPsec peers.
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
Cisco ASA 5500 Series Adaptive Security Appliances contain a
vulnerability that could result in authentication bypass when the
affected appliance is configured to authenticate users against Microsoft
Windows servers using the NTLMv1 protocol.
Users can bypass authentication by providing an an invalid, crafted
username during an authentication request. Any services that use a
AAA server group that is configured to use the NTLMv1 authentication
protocol is affected. Affected services include:
* Telnet access to the security appliance
* SSH access to the security appliance
* HTTPS access to the security appliance (including Cisco ASDM
access)
* Serial console access
* Privileged (enable) mode access
* Cut-through proxy for network access
* VPN access
This vulnerability is documented in Cisco bug ID CSCte21953 and has been
assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2010-0568.
Vulnerability Scoring Details
=============================
Cisco has provided scores for the vulnerabilities in this advisory based
on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in
this Security Advisory is done in accordance with CVSS version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of the
vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding CVSS
at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss.
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
* CSCsz77717 ("TCP sessions remain in CLOSEWAIT indefinitely")
CVSS Base Score - 7.1
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 5.9
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
* CSCsy91157 ("Watchdog when inspecting malformed SIP traffic")
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
* CSCtc96018 ("ASA watchdog when inspecting malformed SIP traffic")
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
SCCP Inspection Denial of Service Vulnerability
+----------------------------------------------
* CSCsz79757 ("Traceback - Thread Name: Dispatch Unit with skinny
inspect enabled")
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
WebVPN DTLS Denial of Service Vulnerability
+------------------------------------------
* CSCtb64913 ("WEBVPN: page fault in thread name dispath unit, eip udpmod_user_put")
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Crafted TCP Segment Denial of Service Vulnerability
+--------------------------------------------------
* CSCtb37219 ("Traceback in Dispatch Unit AIP-SSM Inline and nailed
option on static")
CVSS Base Score - 7.1
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Complete
CVSS Temporal Score - 5.9
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Crafted IKE Message Denial of Service Vulnerability
+--------------------------------------------------
* CSCtc47782 ("Malformed IKE traffic causes rekey to fail")
CVSS Base Score - 5.0
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - None
Integrity Impact - None
Availability Impact - Partial
CVSS Temporal Score - 4.1
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
* CSCte21953 ("ASA may allow authentication of an invalid username for
NT auth")
CVSS Base Score - 7.1
Access Vector - Network
Access Complexity - Medium
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - None
Availability Impact - None
CVSS Temporal Score - 6.2
Exploitability - High
Remediation Level - Official-Fix
Report Confidence - Confirmed
Impact
======
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
Successful exploitation of this vulnerability may lead to an exhaustion
condition where the affected appliance cannot accept new TCP
connections. A reload of the appliance is necessary to recover from the
TCP connection exhaustion condition. If a TCP-based protocol is used
for device management (like telnet, SSH, or HTTPS), a serial console
connection may be needed to access to the appliance.
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
Successful exploitation of this vulnerability may cause a reload of
the affected appliance. Repeated exploitation could result in a
sustained DoS condition. Repeated exploitation could result in a
sustained DoS condition. Repeated exploitation could result in a
sustained DoS condition.
Crafted TCP Segment Denial of Service Vulnerability
+--------------------------------------------------
Successful exploitation of this vulnerability may cause a reload of
the affected appliance. Repeated exploitation could result in a
sustained DoS condition.
Crafted IKE Message Denial of Service Vulnerability
+--------------------------------------------------
Successful exploitation of this vulnerability could cause all IPsec
VPN tunnels (LAN-to-LAN or remote) that terminate on the security
appliance to be torn down and prevent new tunnels from being
established. A manual reload of the appliance is required to
re-establish all VPN tunnels.
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
Successful exploitation of this vulnerability could result in
unauthorized access to the network or appliance.
Software Versions and Fixes
===========================
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to determine
exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center (TAC) or your contracted
maintenance provider for assistance.
The following table contains the first fixed software release of each
vulnerability. A device running a version of the given release in
a specific row (less than the First Fixed Release) is known to be
vulnerable.
+---------------------------------------+
| | Major | First |
| Vulnerability | Release | Fixed |
| | | Release |
|-----------------+---------+-----------|
| | 7.0 | Not |
| | | affected |
|TCP Connection |---------+-----------|
| Exhaustion | 7.2 | 7.2(4.46) |
|Denial of |---------+-----------|
| Service | 8.0 | 8.0(4.38) |
|Vulnerability ( |---------+-----------|
| CSCsz77717) | 8.1 | 8.1(2.29) |
| |---------+-----------|
| | 8.2 | 8.2(1.5) |
|-----------------+---------+-----------|
| | 7.0 | 7.0(8.10) |
|SIP Inspection |---------+-----------|
| Denial of | 7.2 | 7.2(4.45) |
|Service |---------+-----------|
| Vulnerabilities | 8.0 | 8.0(5.2) |
|(CSCsy91157 and |---------+-----------|
| CSCtc96018) | 8.1 | 8.1(2.37) |
| |---------+-----------|
| | 8.2 | 8.2(1.16) |
|-----------------+---------+-----------|
| | 7.0 | Not |
| | | affected |
| |---------+-----------|
| SCCP Inspection | 7.2 | Not |
| Denial of | | affected |
|Service |---------+-----------|
| Vulnerability ( | 8.0 | 8.0(4.38) |
|CSCsz79757) |---------+-----------|
| | 8.1 | 8.1(2.29) |
| |---------+-----------|
| | 8.2 | 8.2(1.2) |
|-----------------+---------+-----------|
| | 7.0 | Not |
| | | affected |
|WebVPN DTLS |---------+-----------|
| Denial of | 7.2 | 7.2(4.45) |
|Service |---------+-----------|
| Vulnerability ( | 8.0 | 8.0(4.44) |
|CSCtb64913) |---------+-----------|
| | 8.1 | 8.1(2.35) |
| |---------+-----------|
| | 8.2 | 8.2(1.10) |
|-----------------+---------+-----------|
| | 7.0 | 7.0(8.10) |
| |---------+-----------|
| Crafted TCP | 7.2 | 7.2(4.45) |
|Segment Denial |---------+-----------|
| of Service | 8.0 | 8.0(4.44) |
|Vulnerability ( |---------+-----------|
| CSCtb37219) | 8.1 | 8.1(2.35) |
| |---------+-----------|
| | 8.2 | 8.2(1.10) |
|-----------------+---------+-----------|
| | 7.0 | 7.0(8.10) |
| |---------+-----------|
| Crafted IKE | 7.2 | 7.2(4.45) |
|Message Denial |---------+-----------|
| of Service | 8.0 | 8.0(5.1) |
|Vulnerability ( |---------+-----------|
| CSCtc47782) | 8.1 | 8.1(2.37) |
| |---------+-----------|
| | 8.2 | 8.2(1.15) |
|-----------------+---------+-----------|
| | 7.0 | 7.0(8.10) |
| |---------+-----------|
| | 7.2 | 7.2(4.45) |
| |---------+-----------|
| NTLMv1 | 8.0 | 8.0(5.7) |
|Authentication |---------+-----------|
| Bypass | | 8.1 |
| Vulnerability ( | | (2.40), |
| CSCte21953) | 8.1 | available |
| | | early |
| | | March |
| | | 2010 |
| |---------+-----------|
| | 8.2 | 8.2(2.1) |
+---------------------------------------+
Note: Cisco ASA Software versions 7.1.x are affected by some of the
vulnerabilities in this advisory. However, no fixed 7.1.x software
versions are planned because the 7.1.x major release has reached the End
of Software Maintenance Releases milestone.
Fixed Cisco ASA Software can be downloaded from:
http://www.cisco.com/pcgi-bin/tablebuild.pl/ASAPSIRT?psrtdcat20e2
Recommended Releases
+-------------------
Releases 7.0(8.10), 7.2(4.46), 8.0(5.9), 8.1(2.40) (available early
March 2010), and 8.2(2.4) are recommended releases because they contain
the fixes for all vulnerabilities in this advisory. Cisco recommends
upgrading to a release that is equal to or later than these recommended
releases.
Workarounds
===========
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
It is possible to mitigate this vulnerability for TCP-based services
that are offered to known clients. For example, it may be possible to
restrict SSH, Cisco ASDM/HTTPS, and Telnet administrative access to
known hosts or IP subnetworks. For other services like remote access
SSL VPN, where clients connect from unknown hosts and networks, no
mitigations exist.
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
These vulnerabilities can be mitigated by disabling SIP inspection if it
is not required. Administrators can disable SIP inspection by issuing
the "no inspect sip" command in class configuration sub-mode within
policy-map configuration.
SCCP Inspection Denial of Service Vulnerability
+----------------------------------------------
This vulnerability can be mitigated by disabling SCCP inspection if it
is not required. Administrators can disable SCCP inspection by issuing
the "no inspect skinny" command in class configuration sub-mode within
the policy-map configuration.
WebVPN DTLS Denial of Service Vulnerability
+------------------------------------------
This vulnerability can be mitigated by disabling DTLS transport
for WebVPN. Administrators can disable DTLS by issuing the "no svc
dtls enable" command under the "webvpn" attributes section of the
corresponding group policy.
Crafted TCP Segment Denial of Service Vulnerability
+--------------------------------------------------
Possible workarounds for this vulnerability are the following:
* Migrate from "nailed" static NAT entries to TCP-state bypass.
* Use the Cisco AIP-SSM in promiscuous mode. This mode can be
configured by issuing the "ips promiscuous" command in "class"
configuration mode.
* Disable IPS inspection for "nailed" static NAT entries.
* If possible, change "nailed" static NAT entries to standard
static NAT entries. This may be feasible since in most
cases there is no need for allowing IPsec tunnels inside IPsec tunnels.
Filtering out UDP port 4500 traffic across an IPsec tunnel can be
accomplished by using a VPN filter, as shown in the following example:
!-- Deny only UDP port 4500 traffic and allow everything else
access-list VPNFILTER extended deny udp any any eq 4500
access-list VPNFILTER extended permit ip any any
!-- Create a group policy and specify a VPN filter that uses the
!-- previous ACL
group-policy VPNPOL internal
group-policy VPNPOL attributes
vpn-filter value VPNFILTER
!-- Reference the group policy with the VPN filter from the tunnel group
tunnel-group 172.16.0.1 type ipsec-l2l
tunnel-group 172.16.0.1 general-attributes
default-group-policy VPNPOL
For this workaround to be effective, the group policy needs to be
applied to all site-to-site (tunnel type "ipsec-l2l") and remote access
(tunnel type "ipsec-ra") tunnel groups.
Warning: In addition to filtering out IKE traffic on UDP port 4500, this
workaround may also affect other procotols like DNS and SNMP that send
traffic on UDP port 4500. For example, if a DNS resolver sends traffic
from UDP port 4500 to a DNS server, the response from the DNS server
will be destined to UDP port 4500, which then may be filtered out by the
filter used in this workaround.
For a more comprehensive example of the VPN filter feature of the Cisco
ASA 5500 Series Adaptive Security Appliances, refer to the whitepaper
"PIX/ASA 7.x and Later: VPN Filter (Permit Specific Port or Protocol)
Configuration Example for L2L and Remote Access" available at:
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9a87.shtml
In addition, if the security appliance does not terminate any tunnels,
the vulnerability can be mitigated by disabling IKE by issuing the "no
isakmp enable <interface name>" command.
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
If NTLMv1 authentication is required, there are no workarounds for this
vulnerability. If NTLMv1 authentication can be substituted by other
authentication protocols (LDAP, RADIUS, TACACS+, etc.), it is possible
to mitigate the vulnerability.
Obtaining Fixed Software
========================
Cisco has released free software updates that address these
vulnerabilities. Prior to deploying software, customers should consult
their maintenance provider or check the software for feature set
compatibility and known issues specific to their environment.
Customers may only install and expect support for the feature
sets they have purchased. By installing, downloading, accessing
or otherwise using such software upgrades, customers agree to be
bound by the terms of Cisco's software license terms found at
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html,
or as otherwise set forth at Cisco.com Downloads at
http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
Do not contact psirt@cisco.com or security-alert@cisco.com for software
upgrades.
Customers with Service Contracts
+-------------------------------
Customers with contracts should obtain upgraded software through their
regular update channels. For most customers, this means that upgrades
should be obtained through the Software Center on Cisco's worldwide
website at http://www.cisco.com.
Customers using Third Party Support Organizations
+------------------------------------------------
Customers whose Cisco products are provided or maintained through prior
or existing agreements with third-party support organizations, such
as Cisco Partners, authorized resellers, or service providers should
contact that support organization for guidance and assistance with the
appropriate course of action in regards to this advisory.
The effectiveness of any workaround or fix is dependent on specific
customer situations, such as product mix, network topology, traffic
behavior, and organizational mission. Due to the variety of affected
products and releases, customers should consult with their service
provider or support organization to ensure any applied workaround or fix
is the most appropriate for use in the intended network before it is
deployed.
Customers without Service Contracts
+----------------------------------
Customers who purchase direct from Cisco but do not hold a Cisco service
contract, and customers who purchase through third-party vendors but are
unsuccessful in obtaining fixed software through their point of sale
should acquire upgrades by contacting the Cisco Technical Assistance
Center (TAC). TAC contacts are as follows.
* +1 800 553 2447 (toll free from within North America)
* +1 408 526 7209 (toll call from anywhere in the world)
* e-mail: tac@cisco.com
Customers should have their product serial number available and be
prepared to give the URL of this notice as evidence of entitlement to a
free upgrade. Free upgrades for non-contract customers must be requested
through the TAC.
Refer to
http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html
for additional TAC contact information, including localized telephone
numbers, and instructions and e-mail addresses for use in various
languages.
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of any of the vulnerabilities described in this advisory.
TCP Connection Exhaustion Denial of Service Vulnerability
+--------------------------------------------------------
This vulnerability was discovered during the resolution of a customer
service request.
SIP Inspection Denial of Service Vulnerabilities
+-----------------------------------------------
CSCsy91157 was discovered during internal testing. CSCtc96018 was
discovered during the resolution of customer service requests.
SCCP Inspection Denial of Service Vulnerability
+----------------------------------------------
This vulnerability was discovered during the resolution of customer
service requests.
WebVPN DTLS Denial of Service Vulnerability
+------------------------------------------
This vulnerability was discovered during the resolution of customer
service requests.
Crafted TCP Segment Denial of Service Vulnerability
+--------------------------------------------------
This vulnerability was discovered during internal testing.
Crafted IKE Message Denial of Service Vulnerability
+--------------------------------------------------
This vulnerability was discovered during the resolution of customer
service requests.
NTLMv1 Authentication Bypass Vulnerability
+-----------------------------------------
This vulnerability was discovered during internal testing.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY
ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that omits
the distribution URL in the following section is an uncontrolled copy,
and may lack important information or contain factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml
In addition to worldwide web posting, a text version of this notice is
clear-signed with the Cisco PSIRT PGP key and is posted to the following
e-mail and Usenet news recipients.
* cust-security-announce@cisco.com
* first-bulletins@lists.first.org
* bugtraq@securityfocus.com
* vulnwatch@vulnwatch.org
* cisco@spot.colorado.edu
* cisco-nsp@puck.nether.net
* full-disclosure@lists.grok.org.uk
* comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on mailing
lists or newsgroups. Users concerned about this problem are encouraged
to check the above URL for any updates.
Revision History
================
+------------------------------------------------------------+
| Revision 1.0 | 2010-February-17 | Initial public release. |
+------------------------------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities
in Cisco products, obtaining assistance with security
incidents, and registering to receive security information
from Cisco, is available on Cisco's worldwide website at
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.
This includes instructions for press inquiries regarding
Cisco security notices. All Cisco security advisories are available at
http://www.cisco.com/go/psirt.
+--------------------------------------------------------------------
Copyright 2008-2010 Cisco Systems, Inc. All rights reserved.
+--------------------------------------------------------------------
Updated: Feb 17, 2010 Document ID: 111485
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkt8GTYACgkQ86n/Gc8U/uBi6QCfYFKvAUdFrRvusqKoaFmMwfcH
XOYAnRymbNOcRg5gmPFMO/zqgm2wOyKQ
=JUg3
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
VAR-201004-0451 | CVE-2010-1609 | SAP NetWeaver Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in SAP NetWeaver 2004 before SP21 and 2004s before SP13 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NetWeaver is prone to a cross-site scripting vulnerability. ----------------------------------------------------------------------
Secunia integrated with Microsoft WSUS
http://secunia.com/blog/71/
----------------------------------------------------------------------
TITLE:
SAP NetWeaver WebDynpro Runtime Cross-Site Scripting Vulnerability
SECUNIA ADVISORY ID:
SA38629
VERIFY ADVISORY:
http://secunia.com/advisories/38629/
DESCRIPTION:
Mariano Nu\xf1ez Di Croce has reported a vulnerability in SAP NetWeaver,
which can be exploited by malicious people to conduct cross-site
scripting attacks.
Certain unspecified input passed to the WebDynpro Runtime is not
properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.
The vulnerability is reported in SAP NetWeaver 2004 prior to SP21 and
SAP NetWeaver 2004s prior to SP13.
SOLUTION:
Patches are available via SAP Note 1424863.
https://service.sap.com/sap/support/notes/1424863
PROVIDED AND/OR DISCOVERED BY:
Mariano Nu\xf1ez Di Croce, Onapsis
ORIGINAL ADVISORY:
Onapsis:
http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0216.html
SAP Note 1424863:
https://service.sap.com/sap/support/notes/1424863
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-201002-0027 | CVE-2009-4643 | Juniper Odyssey Access Client Stack-based buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Stack-based buffer overflow in dsInstallerService.dll in the Juniper Installer Service, as used in Juniper Odyssey Access Client 4.72.11421.0 and other products, allows remote attackers to execute arbitrary code via a long string in a malformed DSSETUPSERVICE_CMD_UNINSTALL command to the NeoterisSetupService named pipe. Odyssey Access Client is prone to a stack-based buffer-overflow vulnerability.
Attackers can exploit these issues to execute arbitrary code within the context of the affected application. Failed exploits will result in denial-of-service condition
VAR-201002-0210 | CVE-2010-0641 | CCS of webline/html/admin/wcs/LoginPage.jhtml Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in webline/html/admin/wcs/LoginPage.jhtml in Cisco Collaboration Server (CCS) 5 allows remote attackers to inject arbitrary web script or HTML via the dest parameter.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Cisco Collaboration Server 5 is vulnerable; other versions may be affected as well.
NOTE: The vendor has discontinued this product
VAR-201002-0211 | CVE-2010-0642 | CCS In JHTML Vulnerability to read file source code |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco Collaboration Server (CCS) 5 allows remote attackers to read the source code of JHTML files via URL encoded characters in the filename extension, as demonstrated by (1) changing .jhtml to %2Ejhtml, (2) changing .jhtml to .jhtm%6C, (3) appending %00 after .jhtml, and (4) appending %c0%80 after .jhtml, related to the (a) doc/docindex.jhtml, (b) browserId/wizardForm.jhtml, (c) webline/html/forms/callback.jhtml, (d) webline/html/forms/callbackICM.jhtml, (e) webline/html/agent/AgentFrame.jhtml, (f) webline/html/agent/default/badlogin.jhtml, (g) callme/callForm.jhtml, (h) webline/html/multichatui/nowDefunctWindow.jhtml, (i) browserId/wizard.jhtml, (j) admin/CiscoAdmin.jhtml, (k) msccallme/mscCallForm.jhtml, and (l) webline/html/admin/wcs/LoginPage.jhtml components. Cisco Collaboration Server (CCS) Is flawed in the processing related to the following components, JHTML A vulnerability exists that allows the source code of a file to be read. Cisco Collaboration Server is prone to multiple vulnerabilities that may allow remote attackers to obtain sourcecode, which may aid them in further attacks.
Cisco Collaboration Server 5 is vulnerable; other versions may be affected as well.
NOTE: The vendor has discontinued this product. A remote attacker can read the source code of JHTML script files by adding encoded URLs to the file name extensions of multiple scripts
VAR-201002-0067 | CVE-2010-0144 | Cisco IronPort Encryption Appliance Etc. WebSafe DistributorServlet Vulnerable to reading arbitrary files |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the WebSafe DistributorServlet in the embedded HTTPS server on the Cisco IronPort Encryption Appliance 6.2.x before 6.2.9.1 and 6.5.x before 6.5.2, and the IronPort PostX MAP before 6.2.9.1, allows remote attackers to read arbitrary files via unknown vectors, aka IronPort Bug 65922
VAR-201002-0338 | No CVE | SAP J2EE Engine Core Unspecified Phishing Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
SAP J2EE Engine Core is prone to a vulnerability that can aid in phishing attacks.
Successful exploits may allow attackers to redirect victims to a malicious website, which may lead to other attacks.
Versions prior to the following are vulnerable:
J2EE Engine Core 6.40 SP26
J2EE Engine Core 7.00 SP22
J2EE Engine Core 7.01 SP07
J2EE Engine Core 7.02 SP03
Additional products that include the J2EE Engine Core may also be vulnerable.
VAR-201002-0329 | No CVE | SAP WebDynpro Runtime Unspecified HTML Injection Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
SAP WebDynpro Runtime included in SAP NetWeaver is prone to an HTML-injection vulnerability because the application fails to sanitize user-supplied input.
Attacker-supplied HTML and script code would run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
VAR-201002-0756 | CVE-2010-0144 | Cisco IronPort Encryption Appliance Etc. WebSafe DistributorServlet Vulnerable to reading arbitrary files |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the WebSafe DistributorServlet in the embedded HTTPS server on the Cisco IronPort Encryption Appliance 6.2.x before 6.2.9.1 and 6.5.x before 6.5.2, and the IronPort PostX MAP before 6.2.9.1, allows remote attackers to read arbitrary files via unknown vectors, aka IronPort Bug 65922.
ORIGINAL ADVISORY:
Cisco:
http://www.cisco.com/warp/public/707/cisco-sa-20100210-ironport.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco Security Advisory: Multiple Vulnerabilities in Cisco IronPort
Encryption Appliance
Advisory ID: cisco-sa-20100210-ironport
Revision 1.0
For Public Release 2010 February 10 1600 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
Cisco IronPort Encryption Appliance devices contain two
vulnerabilities that allow remote, unauthenticated access to any file
on the device and one vulnerability that allows remote,
unauthenticated users to execute arbitrary code with elevated
privileges. There are workarounds available to mitigate these
vulnerabilities.
Cisco has released free software updates that address these
vulnerabilities. This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20100210-ironport.shtml
Affected Products
=================
Vulnerable Products
+------------------
The following Cisco IronPort Encryption Appliance versions are
affected by these vulnerabilities:
• Cisco IronPort Encryption Appliance 6.5 versions prior to 6.5.2
• Cisco IronPort Encryption Appliance 6.2 versions prior to 6.2.9.1
• Cisco IronPort PostX MAP versions prior to 6.2.9.1
The version of software that is running on a Cisco IronPort
Encryption Appliance is located on the "About" page of the Cisco
IronPort Encryption Appliance administration interface.
Note: Customers should contact IronPort support to determine which
software fixes are applicable for their environment. Please consult
the Obtaining Fixed Software section of this advisory for more
information.
Products Confirmed Not Vulnerable
+--------------------------------
Cisco IronPort C, M, and S-Series appliances are not affected by
these vulnerabilities. No other Cisco products are currently known to
be affected by these vulnerabilities.
Details
=======
Note: IronPort tracks bugs using an internal system that is not
available to customers. The IronPort bug tracking identifiers are
provided for reference only. The first vulnerability affecting the Cisco IronPort
Encryption Appliance administration interface is documented in
IronPort bug 65921 and has been assigned Common Vulnerabilities and
Exposures (CVE) identifier CVE-2010-0143. The second vulnerability
affecting the WebSafe servlet is documented in IronPort bug 65922 and
has been assigned Common Vulnerabilities and Exposures (CVE)
identifier CVE-2010-0144. The vulnerability is documented in
IronPort bug 65923 and has been assigned Common Vulnerabilities and
Exposures (CVE) identifier CVE-2010-0145.
Vulnerability Scoring Details
=============================
Cisco has provided scores for the vulnerabilities in this advisory
based on the Common Vulnerability Scoring System (CVSS). The CVSS
scoring in this Security Advisory is done in accordance with CVSS
version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of
the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding
CVSS at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss
IronPort Bug 65921 - Arbitrary File Access Through Administrative Interface
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - None
Availability Impact - None
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
IronPort Bug 65922 - WebSafe DistributorServlet Allows Unauthenticated Arbitrary File Access
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - None
Availability Impact - None
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
IronPort Bug 65923 - Default Config Allows Unauthenticated Remote Arbitrary Code
CVSS Base Score - 10
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Impact
======
Successful exploitation of these vulnerabilities may allow a remote,
unauthenticated attacker to access arbitrary files or execute
arbitrary code with elevated privileges.
Software Versions and Fixes
===========================
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to
determine exposure and a complete upgrade solution.
Workarounds
===========
It is possible to mitigate the administration interface file access
vulnerability (IronPort Bug 65921) by using the IP address
restriction feature of the administration interface to limit access
to trusted hosts. Access to the administration interface is not
restricted by default. To configure access limits, an administrator
should navigate to "Configuration -> Web Services -> Admin -> Console
Security" area in the Cisco IronPort Encryption Appliance
administration interface. To disable the HTTP
Invoker, an administrator must delete several files in the PostX
application home directory and remove a directive from the web server
configuration. The following files must be deleted:
jboss/server/postx/deploy/http-invoker.sar
jboss/server/postx/deploy/jms/jbossmq-httpil.sar
The following directive must be removed from the
"jboss/server/postx/conf/jboss-service.xml web" server configuration
file.
<mbean code="org.jboss.varia.deployment.BeanShellSubDeployer"
name="jboss.scripts:service=BSHDeployer">
</mbean>
After deleting the files and removing the directive from the
configuration file, the PostX application service must be restarted.
Additional mitigation techniques that can be deployed on Cisco
devices within the network are available in the Cisco Applied
Mitigation Bulletin companion document for this advisory:
http://www.cisco.com/warp/public/707/cisco-amb-20100210-ironport.shtml
Obtaining Fixed Software
========================
Cisco has released free software updates that address these
vulnerabilities. The affected products in this advisory are directly
supported by Cisco IronPort. Customers should contact Cisco IronPort
technical support at the link below to obtain software fixes. Cisco
IronPort technical support will assist customers in determining the
correct fixes and installation procedures. Customers should direct
all warranty questions to IronPort technical support.
Note: Do not contact psirt@cisco.com or security-alert@cisco.com for
software upgrades.
http://www.ironport.com/support/contact_support.html
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerabilities described in this advisory.
These vulnerabilities were discovered and reported to Cisco by Jesse
Michael and Alexander Senkevitch of Blue Cross Blue Shield of
Illinois. Cisco would like to thank Jesse and Alexander for reporting
these vulnerabilities to us and for working with us on a coordinated
disclosure.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that
omits the distribution URL in the following section is an
uncontrolled copy, and may lack important information or contain
factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20100210-ironport.shtml
In addition to worldwide web posting, a text version of this notice
is clear-signed with the Cisco PSIRT PGP key and is posted to the
following e-mail and Usenet news recipients.
• cust-security-announce@cisco.com
• first-bulletins@lists.first.org
• bugtraq@securityfocus.com
• vulnwatch@vulnwatch.org
• cisco@spot.colorado.edu
• cisco-nsp@puck.nether.net
• full-disclosure@lists.grok.org.uk
• comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on
mailing lists or newsgroups. Users concerned about this problem are
encouraged to check the above URL for any updates.
Revision History
================
┌──────────┬─────────────┬──────────────┐
│ Revision │ │ Initial │
│ 1.0 │ 2010-FEB-10 │ public │
│ │ │ release │
└──────────┴─────────────┴──────────────┘
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco
security notices. All Cisco security advisories are available at:
http://www.cisco.com/go/psirt
-----BEGIN PGP SIGNATURE-----
iD8DBQFLctPY86n/Gc8U/uARAozcAKCZKW3TZKhWHGqRyyPhEz/sFRNGoACbB8rh
H9asrIkxuFpOpSgFLdpV7D8=
=ahIn
-----END PGP SIGNATURE-----
VAR-201002-0066 | CVE-2010-0143 | Cisco IronPort Encryption Appliance Vulnerability to read arbitrary files in management interfaces such as |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the administrative interface in the embedded HTTPS server on the Cisco IronPort Encryption Appliance 6.2.x before 6.2.9.1 and 6.5.x before 6.5.2, and the IronPort PostX MAP before 6.2.9.1, allows remote attackers to read arbitrary files via unknown vectors, aka IronPort Bug 65921. Cisco IronPort Encryption Appliance is prone to an information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information contained in arbitrary files.
This issue is being tracked by IronPort bug 65921.
The following products are affected.
IronPort Encryption Appliance 6.5 (prior to 6.5.2)
IronPort Encryption Appliance 6.2 (prior to 6.2.9.1)
IronPort PostX MAP (prior to 6.2.9.1). A remote attacker reads arbitrary files through unknown vectors
VAR-201002-0068 | CVE-2010-0145 | Cisco IronPort Encryption Appliance Etc. HTTPS Vulnerability in arbitrary code execution on server |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the embedded HTTPS server on the Cisco IronPort Encryption Appliance 6.2.x before 6.2.9.1 and 6.5.x before 6.5.2, and the IronPort PostX MAP before 6.2.9.1, allows remote attackers to execute arbitrary code via unknown vectors, aka IronPort Bug 65923. Cisco IronPort Encryption Appliance is prone to a remote code-execution vulnerability.
This vulnerability is documented by IronPort bug 65923.
An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will completely compromise affected computers. Failed exploit attempts will result in a denial-of-service condition
VAR-201002-0325 | No CVE | RSLinx EDS File Remote Stack Buffer Overflow Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
RSLinx is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.
Successful exploits may allow remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will likely cause denial-of-service conditions.
RSLinx Lite 2.31.00 is vulnerable; other versions may also be affected.
VAR-201002-0755 | CVE-2010-0145 | Cisco IronPort Encryption Appliance Etc. HTTPS Vulnerability in arbitrary code execution on server |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the embedded HTTPS server on the Cisco IronPort Encryption Appliance 6.2.x before 6.2.9.1 and 6.5.x before 6.5.2, and the IronPort PostX MAP before 6.2.9.1, allows remote attackers to execute arbitrary code via unknown vectors, aka IronPort Bug 65923. Cisco IronPort Encryption Appliance is prone to a remote code-execution vulnerability.
This vulnerability is documented by IronPort bug 65923.
An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will completely compromise affected computers. Failed exploit attempts will result in a denial-of-service condition.
2) An error in the IronPort Encryption Appliance WebSafe servlet can
be exploited to disclose arbitrary files.
ORIGINAL ADVISORY:
Cisco:
http://www.cisco.com/warp/public/707/cisco-sa-20100210-ironport.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. There are workarounds available to mitigate these
vulnerabilities.
Cisco has released free software updates that address these
vulnerabilities.
Note: Customers should contact IronPort support to determine which
software fixes are applicable for their environment. Please consult
the Obtaining Fixed Software section of this advisory for more
information.
Products Confirmed Not Vulnerable
+--------------------------------
Cisco IronPort C, M, and S-Series appliances are not affected by
these vulnerabilities. No other Cisco products are currently known to
be affected by these vulnerabilities.
Details
=======
Note: IronPort tracks bugs using an internal system that is not
available to customers. The IronPort bug tracking identifiers are
provided for reference only. The first vulnerability affecting the Cisco IronPort
Encryption Appliance administration interface is documented in
IronPort bug 65921 and has been assigned Common Vulnerabilities and
Exposures (CVE) identifier CVE-2010-0143. The second vulnerability
affecting the WebSafe servlet is documented in IronPort bug 65922 and
has been assigned Common Vulnerabilities and Exposures (CVE)
identifier CVE-2010-0144.
Vulnerability Scoring Details
=============================
Cisco has provided scores for the vulnerabilities in this advisory
based on the Common Vulnerability Scoring System (CVSS). The CVSS
scoring in this Security Advisory is done in accordance with CVSS
version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of
the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding
CVSS at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss
IronPort Bug 65921 - Arbitrary File Access Through Administrative Interface
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - None
Availability Impact - None
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
IronPort Bug 65922 - WebSafe DistributorServlet Allows Unauthenticated Arbitrary File Access
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - None
Availability Impact - None
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
IronPort Bug 65923 - Default Config Allows Unauthenticated Remote Arbitrary Code
CVSS Base Score - 10
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Impact
======
Successful exploitation of these vulnerabilities may allow a remote,
unauthenticated attacker to access arbitrary files or execute
arbitrary code with elevated privileges.
Software Versions and Fixes
===========================
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to
determine exposure and a complete upgrade solution.
Workarounds
===========
It is possible to mitigate the administration interface file access
vulnerability (IronPort Bug 65921) by using the IP address
restriction feature of the administration interface to limit access
to trusted hosts. Access to the administration interface is not
restricted by default. To configure access limits, an administrator
should navigate to "Configuration -> Web Services -> Admin -> Console
Security" area in the Cisco IronPort Encryption Appliance
administration interface. To disable the HTTP
Invoker, an administrator must delete several files in the PostX
application home directory and remove a directive from the web server
configuration. The following files must be deleted:
jboss/server/postx/deploy/http-invoker.sar
jboss/server/postx/deploy/jms/jbossmq-httpil.sar
The following directive must be removed from the
"jboss/server/postx/conf/jboss-service.xml web" server configuration
file.
<mbean code="org.jboss.varia.deployment.BeanShellSubDeployer"
name="jboss.scripts:service=BSHDeployer">
</mbean>
After deleting the files and removing the directive from the
configuration file, the PostX application service must be restarted.
Additional mitigation techniques that can be deployed on Cisco
devices within the network are available in the Cisco Applied
Mitigation Bulletin companion document for this advisory:
http://www.cisco.com/warp/public/707/cisco-amb-20100210-ironport.shtml
Obtaining Fixed Software
========================
Cisco has released free software updates that address these
vulnerabilities. The affected products in this advisory are directly
supported by Cisco IronPort. Customers should contact Cisco IronPort
technical support at the link below to obtain software fixes. Cisco
IronPort technical support will assist customers in determining the
correct fixes and installation procedures. Customers should direct
all warranty questions to IronPort technical support.
Note: Do not contact psirt@cisco.com or security-alert@cisco.com for
software upgrades.
http://www.ironport.com/support/contact_support.html
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerabilities described in this advisory.
These vulnerabilities were discovered and reported to Cisco by Jesse
Michael and Alexander Senkevitch of Blue Cross Blue Shield of
Illinois. Cisco would like to thank Jesse and Alexander for reporting
these vulnerabilities to us and for working with us on a coordinated
disclosure.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that
omits the distribution URL in the following section is an
uncontrolled copy, and may lack important information or contain
factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20100210-ironport.shtml
In addition to worldwide web posting, a text version of this notice
is clear-signed with the Cisco PSIRT PGP key and is posted to the
following e-mail and Usenet news recipients.
• cust-security-announce@cisco.com
• first-bulletins@lists.first.org
• bugtraq@securityfocus.com
• vulnwatch@vulnwatch.org
• cisco@spot.colorado.edu
• cisco-nsp@puck.nether.net
• full-disclosure@lists.grok.org.uk
• comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on
mailing lists or newsgroups. Users concerned about this problem are
encouraged to check the above URL for any updates.
Revision History
================
┌──────────┬─────────────┬──────────────┐
│ Revision │ │ Initial │
│ 1.0 │ 2010-FEB-10 │ public │
│ │ │ release │
└──────────┴─────────────┴──────────────┘
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco
security notices. All Cisco security advisories are available at:
http://www.cisco.com/go/psirt
-----BEGIN PGP SIGNATURE-----
iD8DBQFLctPY86n/Gc8U/uARAozcAKCZKW3TZKhWHGqRyyPhEz/sFRNGoACbB8rh
H9asrIkxuFpOpSgFLdpV7D8=
=ahIn
-----END PGP SIGNATURE-----
VAR-201002-0754 | CVE-2010-0143 | Cisco IronPort Encryption Appliance Vulnerability to read arbitrary files in management interfaces such as |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the administrative interface in the embedded HTTPS server on the Cisco IronPort Encryption Appliance 6.2.x before 6.2.9.1 and 6.5.x before 6.5.2, and the IronPort PostX MAP before 6.2.9.1, allows remote attackers to read arbitrary files via unknown vectors, aka IronPort Bug 65921. Cisco IronPort Encryption Appliance is prone to an information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information contained in arbitrary files.
This issue is being tracked by IronPort bug 65921.
The following products are affected.
IronPort Encryption Appliance 6.5 (prior to 6.5.2)
IronPort Encryption Appliance 6.2 (prior to 6.2.9.1)
IronPort PostX MAP (prior to 6.2.9.1).
ORIGINAL ADVISORY:
Cisco:
http://www.cisco.com/warp/public/707/cisco-sa-20100210-ironport.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco Security Advisory: Multiple Vulnerabilities in Cisco IronPort
Encryption Appliance
Advisory ID: cisco-sa-20100210-ironport
Revision 1.0
For Public Release 2010 February 10 1600 UTC (GMT)
+---------------------------------------------------------------------
Summary
=======
Cisco IronPort Encryption Appliance devices contain two
vulnerabilities that allow remote, unauthenticated access to any file
on the device and one vulnerability that allows remote,
unauthenticated users to execute arbitrary code with elevated
privileges. There are workarounds available to mitigate these
vulnerabilities.
Cisco has released free software updates that address these
vulnerabilities.
Note: Customers should contact IronPort support to determine which
software fixes are applicable for their environment. Please consult
the Obtaining Fixed Software section of this advisory for more
information.
Products Confirmed Not Vulnerable
+--------------------------------
Cisco IronPort C, M, and S-Series appliances are not affected by
these vulnerabilities. No other Cisco products are currently known to
be affected by these vulnerabilities.
Details
=======
Note: IronPort tracks bugs using an internal system that is not
available to customers. The IronPort bug tracking identifiers are
provided for reference only. The first vulnerability affecting the Cisco IronPort
Encryption Appliance administration interface is documented in
IronPort bug 65921 and has been assigned Common Vulnerabilities and
Exposures (CVE) identifier CVE-2010-0143. The second vulnerability
affecting the WebSafe servlet is documented in IronPort bug 65922 and
has been assigned Common Vulnerabilities and Exposures (CVE)
identifier CVE-2010-0144. The vulnerability is documented in
IronPort bug 65923 and has been assigned Common Vulnerabilities and
Exposures (CVE) identifier CVE-2010-0145.
Vulnerability Scoring Details
=============================
Cisco has provided scores for the vulnerabilities in this advisory
based on the Common Vulnerability Scoring System (CVSS). The CVSS
scoring in this Security Advisory is done in accordance with CVSS
version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability
severity and helps determine urgency and priority of response.
Cisco has provided a base and temporal score. Customers can then
compute environmental scores to assist in determining the impact of
the vulnerability in individual networks.
Cisco has provided an FAQ to answer additional questions regarding
CVSS at:
http://www.cisco.com/web/about/security/intelligence/cvss-qandas.html
Cisco has also provided a CVSS calculator to help compute the
environmental impact for individual networks at:
http://intellishield.cisco.com/security/alertmanager/cvss
IronPort Bug 65921 - Arbitrary File Access Through Administrative Interface
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - None
Availability Impact - None
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
IronPort Bug 65922 - WebSafe DistributorServlet Allows Unauthenticated Arbitrary File Access
CVSS Base Score - 7.8
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - None
Availability Impact - None
CVSS Temporal Score - 6.4
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
IronPort Bug 65923 - Default Config Allows Unauthenticated Remote Arbitrary Code
CVSS Base Score - 10
Access Vector - Network
Access Complexity - Low
Authentication - None
Confidentiality Impact - Complete
Integrity Impact - Complete
Availability Impact - Complete
CVSS Temporal Score - 8.3
Exploitability - Functional
Remediation Level - Official-Fix
Report Confidence - Confirmed
Impact
======
Successful exploitation of these vulnerabilities may allow a remote,
unauthenticated attacker to access arbitrary files or execute
arbitrary code with elevated privileges.
Software Versions and Fixes
===========================
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to
determine exposure and a complete upgrade solution.
Workarounds
===========
It is possible to mitigate the administration interface file access
vulnerability (IronPort Bug 65921) by using the IP address
restriction feature of the administration interface to limit access
to trusted hosts. Access to the administration interface is not
restricted by default. To configure access limits, an administrator
should navigate to "Configuration -> Web Services -> Admin -> Console
Security" area in the Cisco IronPort Encryption Appliance
administration interface. To disable the HTTP
Invoker, an administrator must delete several files in the PostX
application home directory and remove a directive from the web server
configuration. The following files must be deleted:
jboss/server/postx/deploy/http-invoker.sar
jboss/server/postx/deploy/jms/jbossmq-httpil.sar
The following directive must be removed from the
"jboss/server/postx/conf/jboss-service.xml web" server configuration
file.
<mbean code="org.jboss.varia.deployment.BeanShellSubDeployer"
name="jboss.scripts:service=BSHDeployer">
</mbean>
After deleting the files and removing the directive from the
configuration file, the PostX application service must be restarted.
Additional mitigation techniques that can be deployed on Cisco
devices within the network are available in the Cisco Applied
Mitigation Bulletin companion document for this advisory:
http://www.cisco.com/warp/public/707/cisco-amb-20100210-ironport.shtml
Obtaining Fixed Software
========================
Cisco has released free software updates that address these
vulnerabilities. Customers should contact Cisco IronPort
technical support at the link below to obtain software fixes. Cisco
IronPort technical support will assist customers in determining the
correct fixes and installation procedures. Customers should direct
all warranty questions to IronPort technical support.
Note: Do not contact psirt@cisco.com or security-alert@cisco.com for
software upgrades.
http://www.ironport.com/support/contact_support.html
Exploitation and Public Announcements
=====================================
The Cisco PSIRT is not aware of any public announcements or malicious
use of the vulnerabilities described in this advisory.
These vulnerabilities were discovered and reported to Cisco by Jesse
Michael and Alexander Senkevitch of Blue Cross Blue Shield of
Illinois. Cisco would like to thank Jesse and Alexander for reporting
these vulnerabilities to us and for working with us on a coordinated
disclosure.
Status of this Notice: FINAL
============================
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE
INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS
AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS
DOCUMENT AT ANY TIME.
A stand-alone copy or Paraphrase of the text of this document that
omits the distribution URL in the following section is an
uncontrolled copy, and may lack important information or contain
factual errors.
Distribution
============
This advisory is posted on Cisco's worldwide website at:
http://www.cisco.com/warp/public/707/cisco-sa-20100210-ironport.shtml
In addition to worldwide web posting, a text version of this notice
is clear-signed with the Cisco PSIRT PGP key and is posted to the
following e-mail and Usenet news recipients.
• cust-security-announce@cisco.com
• first-bulletins@lists.first.org
• bugtraq@securityfocus.com
• vulnwatch@vulnwatch.org
• cisco@spot.colorado.edu
• cisco-nsp@puck.nether.net
• full-disclosure@lists.grok.org.uk
• comp.dcom.sys.cisco@newsgate.cisco.com
Future updates of this advisory, if any, will be placed on Cisco's
worldwide website, but may or may not be actively announced on
mailing lists or newsgroups. Users concerned about this problem are
encouraged to check the above URL for any updates.
Revision History
================
┌──────────┬─────────────┬──────────────┐
│ Revision │ │ Initial │
│ 1.0 │ 2010-FEB-10 │ public │
│ │ │ release │
└──────────┴─────────────┴──────────────┘
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and
registering to receive security information from Cisco, is available
on Cisco's worldwide website at:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
This includes instructions for press inquiries regarding Cisco
security notices. All Cisco security advisories are available at:
http://www.cisco.com/go/psirt
-----BEGIN PGP SIGNATURE-----
iD8DBQFLctPY86n/Gc8U/uARAozcAKCZKW3TZKhWHGqRyyPhEz/sFRNGoACbB8rh
H9asrIkxuFpOpSgFLdpV7D8=
=ahIn
-----END PGP SIGNATURE-----
VAR-201002-0650 | CVE-2010-0243 | Microsoft Office of MSO.DLL Vulnerable to buffer overflow |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Buffer overflow in MSO.DLL in Microsoft Office XP SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Office document, aka "MSO.DLL Buffer Overflow.". Microsoft Office is prone to a remote code-execution vulnerability.
An attacker could exploit this issue by enticing a victim to open a malicious Office file.
Successful exploits would allow the attacker to execute arbitrary code in the context of the currently logged-in user.
The vulnerability is caused due to an error when parsing
OfficeArtSpgr containers and can be exploited to cause a buffer
overflow via a specially crafted Office file.
SOLUTION:
Apply patches.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Core Security Technologies - CoreLabs Advisory
http://www.coresecurity.com/corelabs/
Microsoft Office Excel / Word OfficeArtSpgr Container Pointer Overwrite
Vulnerability
1. *Advisory Information*
Title: Microsoft Office Excel / Word OfficeArtSpgr Container Pointer
Overwrite Vulnerability
Advisory Id: CORE-2009-0827
Advisory URL: http://www.coresecurity.com/content/excel-buffer-overflow
Date published: 2010-02-09
Date of last update: 2010-02-08
Vendors contacted: Microsoft
Release mode: Coordinated release
2. *Vulnerability Information*
Class: Buffer overflow [CWE-119]
Impact: Code execution
Remotely Exploitable: Yes
Locally Exploitable: No
Bugtraq ID: 38073
CVE Name: CVE-2010-0243
3. *Vulnerability Description*
A vulnerability exists in MSO.DLL affecting Excel 9 (Office 2000) and
Excel 10 (Office XP) in the code responsible for parsing OfficeArtSpgr
(recType 0xF003) containers that allows an attacker to cause a class
pointer to be interpreted incorrectly, leading to code execution in the
context of the currently logged on user.
4. *Vulnerable packages*
. *Non-vulnerable packages*
. Open XML File Format Converter for Mac
. PowerPoint Viewer 2007 Service Pack 1 and PowerPoint Viewer 2007
Service Pack 2
. Visio Viewer 2007 Service Pack 1 and Visio Viewer 2007 Service Pack 2
. Microsoft Works 8.5
. Microsoft Works 9
6. *Vendor Information, Solutions and Workarounds*
Microsoft has addressed this vulnerability by issuing an update located
at http://www.microsoft.com/technet/security/bulletin/MS10-003.msp
7. *Credits*
This vulnerability was discovered and researched by Damian Frizza from
Core Security Technologies during Bugweek 2009 [1].
8. *Technical Description / Proof of Concept Code*
8.1. *Excel / Word - OfficeArtSpgr container - invalid recType value
leads to attacker controlled pointer usage [MSRC 9368]*
A vulnerability exists in MSO.DLL affecting Excel 9 (Office 2000) and
Excel 10 (Office XP) in the code responsible for parsing OfficeArtSpgr
(recType 0xF003) containers that allows an attacker to cause a class
pointer to be interpreted incorrectly, leading to code execution in the
context of the currently logged on user.
The precise affected executable version we tested is 'Excel.exe
v10.0.6854' and the DLL is 'mso.dll v10.0.6845'
Likely attack vectors include:
. Targeted attacks involving e-mailed malicious files combined with
social engineering to entice the user to open the malicious attachment. Targeted attacks involving malicious files hosted on a remote web
site combined with social engineering to entice the user to open the
malicious attachment.
The root cause description of the vulnerability is that there is no
check to make sure that there is a valid group before loading the SPGR
from the file.
A disassembly of the vulnerable code follows:
/-----
30BDE405 CMP ECX,0F003
30BDE40B JB mso.30EFD183
30BDE411 CMP ECX,0F004
30BDE417 JA mso.30BDE4C8
30BDE41D XOR ESI,ESI
30BDE41F LEA EAX,DWORD PTR SS:[EBP-8]
30BDE422 PUSH ESI
30BDE423 PUSH EAX
30BDE424 PUSH EDI
30BDE425 MOV ECX,EBX
30BDE427 CALL mso.30BDEC18
30BDE42C TEST EAX,EAX
30BDE42E JE mso.30EFD21A
30BDE434 MOV EDX,DWORD PTR SS:[EBP-8]
30BDE437 MOV EAX,DWORD PTR DS:[EDX+50]
30BDE43A TEST AL,10
30BDE43C JE mso.30BDE356
30BDE442 TEST AL,4
30BDE444 JE mso.30EFD21A
30BDE44A CMP WORD PTR DS:[EDX+24],SI
30BDE44E JNZ mso.30EFD21A
30BDE454 PUSH 23
30BDE456 LEA EDI,DWORD PTR DS:[EBX+90]
30BDE45C POP ECX
30BDE45D MOV ESI,EDX
30BDE45F LEA EAX,DWORD PTR DS:[EBX+F0]
30BDE465 ADD EDX,58
30BDE468 REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS:[ESI]
30BDE46A CMP DWORD PTR DS:[EAX],EDX
30BDE46C MOV DWORD PTR DS:[EBX+CC],EBX
30BDE472 JE mso.30EFD12E
30BDE478 MOV ECX,DWORD PTR DS:[EAX]
30BDE47A MOV DWORD PTR DS:[ECX],EAX ;*Access Violation On Write*
registers
eax=017f068c ebx=017f059c ecx=0e000e00 edx=017f0870 esi=017f08a4
edi=017f06b8
eip=30dd70cc esp=00137674 ebp=00137714 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
- -----/
8.2. *Memory Corruption related to Graphic Description [MSRC case 9562]*
Core Security Technologies reported a second bug in Excel which resulted
non exploitable. In its investigation, MSRC has analyzed BIFF5++, BIFF4,
and BIFF2 file formats for exploitability of this vulnerability. MSRC
has been unable to reproduce it in such a way that an exploitable
condition occurs.
9. *Report Timeline*
. 2009-09-04:
Core Security Technologies notifies the Microsoft team of the
vulnerability #1 and sends a Proof of Concept malformed file. 2009-09-04:
Microsoft acknowledges receipt of the vulnerability report, and opens
MSRC case 9368 to track this issue. 2009-09-07:
Core sends a second Proof of Concept malformed file triggering
vulnerability #2 in Excel 2000/2002. 2009-09-08:
The Microsoft team acknowledges receipt of the information and estimates
that they will have more detailed information in two weeks. They
inform us that they will send updated information on the fix release
date as the investigation progresses. 2009-09-14:
Core acknowledges receipt of the previous mail from the Microsoft team
and reminds them that the publication date proposed by Core is November
24th, 2009. 2009-09-14:
Core requests Microsoft's analysis of the second reported bug. 2009-09-14:
Microsoft confirms that the first bug reported on Excel is exploitable
and that they are working on defining a ship date. Microsoft also states
that the bug reported as MSRC case 9154 / CORE-2009-0504 is not
exploitable and no security bulletin will be issued for that case. 2009-09-16:
Core notifies the Microsoft team that there has been a misunderstanding,
and that the bug MSRC case 9154 / CORE-2009-0504 was dismissed as not
exploitable in July 2009. Core sends again the Proof of Concepts for the
two bugs reported as CORE-2009-0827. 2009-09-17:
Microsoft requests Core to hold off the publication of the advisory
CORE-2009-0827 until Microsoft comes up with a plan to fix the
vulnerability. 2009-09-21:
Core notifies the Microsoft team that it had made a mistake in the names
of the Proof of Concept files that lead to further confusion. Core
confirms that two new bugs were reported and that the third
non-exploitable bug belongs to another previous case/advisory. The Excel
Proof of Concept files are sent again including identifier CORE-2009-0827. 2009-09-22:
The Microsoft team acknowledges the clarification sent by Core and
estimates that they will have a deeper analysis of the proof of concept
#2 sent by Core in a few days. 2009-10-26:
Core sends a summary of the status of the reported vulnerabilities, and
requests from Microsoft additional information about its technical
analysis of the reported bugs (in particular concerning exploitability
of the second bug) and about its schedule to produce fixes. 2009-10-27:
Microsoft confirms that they have reproduced the reported bugs, and
communicates that they will be unable to release updates for these
issues until February 9th, 2010. 2009-10-28:
Core communicates that it is willing to reschedule the publication of
its advisory provided that Microsoft gives technical information that
justifies this decision. 2009-11-02:
Microsoft explains that in general both the product team (in this case
within Office) as well as MSRC Engineering team look for potential
variant bugs for each vulnerability that is reported to them. This is
followed by the development of a fix, and the testing of the fix.
Microsoft states that it will be able to share additional technical
information (requested by Core) about 3-4 weeks before release. 2009-11-02:
Core confirms that it will reschedule publication of its advisory to
February 9th, 2010, and that it looks forward to receiving technical
information about the vulnerabilities. 2009-11-02:
Microsoft acknowledges receipt of the previous communication. 2009-11-03:
Core asks whether Microsoft considers the two bugs that have been
reported as variants of the same problem, or as different issues. 2009-11-06:
Microsoft replies that the vulnerability #2 has been lost in the mix,
explains how MSRC triage officers assign MSRC tracking case numbers. The
vulnerability #2 is assigned MSRC case 9562. 2009-11-06:
Core confirms that it considers the second bug (MSRC 9562) to be a
different bug than MSRC 9368. 2009-11-18:
Microsoft sends a technical analysis of bug MSRC 9562, indicating that
this bug causes Excel to crash safely. 2009-12-02:
Microsoft sends technical information about bug MSRC 9368, including the
root cause of the problem and the list of affected versions. 2009-12-16:
Microsoft sends further analysis of bug MSRC 9562, which has been
analyzed in conjunction with the reported bug MSRC case 9326 in Virtual
PC. MSRC indicates that it has been unable to reproduce an exploitable
condition using the Excel bug (MSRC 9562). 2009-12-22:
Core acknowledges receipt of the analysis of bug MSRC 9562, and agrees
with the technical analysis. 2009-12-18:
Microsoft sends a spreadsheet summarising Core cases, which indicates
that fixes are confirmed to be released on March 9th 2010. 2009-12-21:
Core acknowledges receipt of the technical information, and asks
Microsoft whether the release of a fixed version has moved to March 9th
2010. 2009-12-21:
Microsoft replies that the ship date for the vulnerability MSRC 9368 in
MSO.dll is still February 9th 2010 (the spreadsheet contained a clerical
error). 2010-02-01:
Core requests MSRC the list of non vulnerable versions of Excel /
Office, and a statement for the "vendor information" section of the
advisory. 2010-02-03:
Microsoft sends the CVE identifier for the vulnerability, and the list
of affected and non affected software. 2010-02-09:
The advisory CORE-2009-0827 is published.
10. *References*
[1] About Core Security's Bugweek
http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=project&name=Bugweek
[2] Microsoft Security Bulletin MS10-003
http://www.microsoft.com/technet/security/bulletin/MS10-003.msp
11. *About CoreLabs*
CoreLabs, the research center of Core Security Technologies, is charged
with anticipating the future needs and requirements for information
security technologies. We conduct our research in several important
areas of computer security including system vulnerabilities, cyber
attack planning and simulation, source code auditing, and cryptography.
Our results include problem formalization, identification of
vulnerabilities, novel solutions and prototypes for new technologies.
CoreLabs regularly publishes security advisories, technical papers,
project information and shared software tools for public use at:
http://corelabs.coresecurity.com.
12. *About Core Security Technologies*
Core Security Technologies develops strategic solutions that help
security-conscious organizations worldwide develop and maintain a
proactive process for securing their networks. The company's flagship
product, CORE IMPACT, is the most comprehensive product for performing
enterprise security assurance testing. CORE IMPACT evaluates network,
endpoint and end-user vulnerabilities and identifies what resources are
exposed. It enables organizations to determine if current security
investments are detecting and preventing attacks. Core Security
Technologies augments its leading technology solution with world-class
security consulting services, including penetration testing and software
security auditing. Based in Boston, MA and Buenos Aires, Argentina, Core
Security Technologies can be reached at 617-399-6980 or on the Web at
http://www.coresecurity.com.
13. *Disclaimer*
The contents of this advisory are copyright (c) 2010 Core Security
Technologies and (c) 2010 CoreLabs, and may be distributed freely
provided that no fee is charged for this distribution and proper credit
is given.
14. *PGP/GPG Keys*
This advisory has been signed with the GPG key of Core Security
Technologies advisories team, which is available for download at
http://www.coresecurity.com/files/attachments/core_security_advisories.asc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iEYEARECAAYFAktxq9cACgkQyNibggitWa2ZfgCgsgImwlV9D+uNQnuzgmWefT8U
BngAn06q1Ub1HhaqeKBigZaI3SCCPFg3
=Cmi1
-----END PGP SIGNATURE-----
.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA10-040A
Microsoft Updates for Multiple Vulnerabilities
Original release date:
Last revised: --
Source: US-CERT
Systems Affected
* Microsoft Windows and Windows Server
* Microsoft Internet Explorer
* Microsoft Office
Overview
Microsoft has released updates to address vulnerabilities in
Microsoft Windows, Windows Server, Internet Explorer, and Microsoft
Office. Description
Microsoft has released multiple security bulletins for critical
vulnerabilities in Microsoft Windows, Windows Server, Internet
Explorer, and Microsoft Office.
II.
III. The security
bulletin describes any known issues related to the updates.
Administrators are encouraged to note these issues and test for any
potentially adverse effects. Administrators should consider using
an automated update distribution system such as Windows Server
Update Services (WSUS).
IV. References
* Microsoft Security Bulletin Summary for February 2010 -
<http://www.microsoft.com/technet/security/bulletin/MS10-feb.mspx>
* Microsoft Windows Server Update Services -
<http://technet.microsoft.com/en-us/wsus/default.aspx>
____________________________________________________________________
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA10-040A.html>
____________________________________________________________________
Feedback can be directed to US-CERT Technical Staff. Please send
email to <cert@cert.org> with "TA10-040A Feedback VU#799780" in
the subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2010 by US-CERT, a government organization
VAR-201002-0160 | CVE-2010-0563 | IBM WebSphere Application Server of Single Sign-on Vulnerabilities that capture important information on functions |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Single Sign-on (SSO) functionality in IBM WebSphere Application Server (WAS) 7.0.0.0 through 7.0.0.8 does not recognize the Requires SSL configuration option, which might allow remote attackers to obtain sensitive information by sniffing network sessions that were expected to be encrypted. Based on the Java and Servlet engines, the IBM Websphere Application Server supports a variety of HTTP services to help users with everything from development and release to maintaining interactive, dynamic websites. IBM WebSphere Application Server (WAS) is prone to a security-bypass vulnerability.
Successful exploits may allow attackers to bypass certain security restrictions, which may lead to other attacks.
This issue affects WAS 7.0 through 7.0.0.8
VAR-201002-0744 | CVE-2010-0563 | IBM WebSphere Application Server of Single Sign-on Vulnerabilities that capture important information on functions |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Single Sign-on (SSO) functionality in IBM WebSphere Application Server (WAS) 7.0.0.0 through 7.0.0.8 does not recognize the Requires SSL configuration option, which might allow remote attackers to obtain sensitive information by sniffing network sessions that were expected to be encrypted. Based on the Java and Servlet engines, the IBM Websphere Application Server supports a variety of HTTP services to help users with everything from development and release to maintaining interactive, dynamic websites. IBM WebSphere Application Server (WAS) is prone to a security-bypass vulnerability.
Successful exploits may allow attackers to bypass certain security restrictions, which may lead to other attacks.
This issue affects WAS 7.0 through 7.0.0.8.
SOLUTION:
Apply Interim Fix APAR PM00610 (please see the vendor's advisory for
more information).
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
IBM (PM00610):
http://www-01.ibm.com/support/docview.wss?uid=swg21417839
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-201002-0299 | CVE-2003-1582 | Microsoft Internet Information Services Security hole |
CVSS V2: 2.6 CVSS V3: - Severity: LOW |
Microsoft Internet Information Services (IIS) 6.0, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files via an HTTP request in conjunction with a crafted DNS response, as demonstrated by injecting XSS sequences, related to an "Inverse Lookup Log Corruption (ILLC)" issue. IIS is prone to a cross-site scripting vulnerability