ID

VAR-200512-0744


CVE

CVE-2005-4499


TITLE

Cisco Product IP ACL Vulnerabilities that bypass authentication in functions

Trust: 0.8

sources: JVNDB: JVNDB-2005-000750

DESCRIPTION

The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS. plural Cisco Product implements IP ACL In function, the device ACL When downloading ACL Name RAS/NAS Username and password for authentication by ( Same as user name ) As we use as ACL If the name is known, ACL There is a vulnerability that makes it possible to pass authentication illegally using a name.There is a possibility of unauthorized access to the network. Cisco PIX and VPN 3000 concentrators, when managed by Cisco Secure Access Control Servers are vulnerable to an information disclosure vulnerability. This issue is due to a design flaw that communicates sensitive information over an unencrypted communications channel. This issue allows remote attackers with the ability to gain access to sensitive information if they can sniff network packets traveling between affected devices and the RADIUS server. This information potentially aids them in further attacks. Specific Cisco versions and products affected by this issue are not currently known. The list of affected packages will be updated as further information is disclosed. Cisco PIX is a very popular network firewall, while CS ACS is a network device that provides authentication, authorization, and account services. Cisco PIX has a loophole in network management communication, and attackers may use this loophole to gain unauthorized access to the device. At the same time, CS ACS will also create an internal hidden user named #ACSACL#-IP-uacl-43a97a9d with the password #ACSACL#-IP-uacl-43a97a9d (!). The CS ACS GUI cannot see the user. The protocol used by the PIX downloads the ACL steps as follows: 0) The user accesses the Internet through the PIX with HTTP(s); the PIX requests the user name and password, and then the user enters the user name and password in the dialog box. 1) PIX sends a Radius access request to CS ACS to authenticate the user (user password is encrypted by Radius). 2) The Radius server authenticates the user and sends back the cisco-av-pair vendor-specific attribute (VSA) with the ACS: CiscoSecure-Defined-ACL=#ACSACL#-IP-uacl-43a97a9d value. 3) PIX sends Radius access request again to authenticate user#ACSACL#-IP-uacl-43a97a9d 4) Radius server authenticates user, sends back ACL body with another cisco-av-pair VSA attribute (ip:inacl#1=... ). This means that anyone can see the plaintext #ACSACL#-IP-uacl-43a97a9d user name sent from the CS ACS server to the PIX by the Radius protocol through the network, and the user's password is the same as the user name. If the network device is configured to use the same CS ACS server for login authentication, you can use the sniffed user name to log in to the network device. The vulnerability is caused due to a design error in the Downloadable IP ACL (Access Control List) feature. This can be exploited by malicious people who knows the name of a Downloadable IP ACL configured on the ACS server to authenticate to the RAS/NAS (Remote Access Server/Network Access Server) by using the name of that ACL as their user name. Successful exploitation requires that the attacker knows the name of the Downloadable IP ACL e.g. by sniffing network traffic between the RAS/NAS and the ACS server. SOLUTION: The vulnerability has been fixed in the following versions. * Cisco Secure ACS Version 4.0.1 * PIX version 6.3(5) * PIX/ASA 7.0(2) * Cisco IOS Software Version 12.3(8)T4 * VPN 3000 versions 4.0.5.B and 4.1.5.B Cisco FWSM: Refer to vendor's original advisory for workaround instructions. PROVIDED AND/OR DISCOVERED BY: ovt ORIGINAL ADVISORY: Cisco: http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_field_notice09186a00805bf1c4.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2005-4499 // JVNDB: JVNDB-2005-000750 // BID: 16025 // VULHUB: VHN-15707 // PACKETSTORM: 42760

AFFECTED PRODUCTS

vendor:ciscomodel:vpn concentratorscope:eqversion:30002.5.2

Trust: 1.5

vendor:ciscomodel:secure access control serverscope:eqversion:3.3.2

Trust: 1.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.3.1

Trust: 1.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.3

Trust: 1.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2.2

Trust: 1.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2.1

Trust: 1.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2

Trust: 1.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.1

Trust: 1.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.0

Trust: 1.3

vendor:ciscomodel:pix/asascope:eqversion:7.0

Trust: 1.1

vendor:ciscomodel:pix firewallscope:eqversion:6.3

Trust: 1.1

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:2.0

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:2.5.2.a

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.6.5

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(4\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.0.3.a

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.1

Trust: 1.0

vendor:ciscomodel:vpn 3015 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(9\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:4.2\(5\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(3.100\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:2.5.2.f

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:4.4\(4\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:4.1\(6b\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.1

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:3.1.1

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:3.0.3

Trust: 1.0

vendor:ciscomodel:vpn 3030 concentatorscope:eqversion:4.7.1.f

Trust: 1.0

vendor:ciscomodel:vpn 3080 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.0

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3\(3.102\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(2\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:2.5.2.b

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.1.2

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:2.5

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(4.101\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.7.1

Trust: 1.0

vendor:ciscomodel:vpn 3030 concentatorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.6

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:2.7

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.3\(3\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.1.5.b

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(5\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.3\(1\)

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:2.42

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(1\)

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:2.1

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(3.210\)

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:2.6.3

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:2.5.2.c

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:2.4

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:3.2\(2\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.1.1

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.3\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.5.4

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3\(3.109\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:4.4

Trust: 1.0

vendor:ciscomodel:pix firewallscope:eqversion:6.3.3_\(133\)

Trust: 1.0

vendor:ciscomodel:vpn 3060 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 535scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.5.2

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(6\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:4.2

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3\(3\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall 515scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.6.7.f

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.7.1.f

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.0

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:2.5.2.d

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:4.0

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.0.2

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.1.7.b

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:2.3.6.1

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.6.1

Trust: 1.0

vendor:ciscomodel:pix firewall 520scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(4\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(3\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.1.4

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1.5\(104\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.1\(4\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:4.2\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3\(5\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.0\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.1.4

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.1.7.a

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:2.6

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.6.7.a

Trust: 1.0

vendor:ciscomodel:vpn 3001 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:3.2\(1.20\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.6.7.d

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.3

Trust: 1.0

vendor:ciscomodel:pix firewall 506scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.2\(7\)

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:2.6.2

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.3\(1.200\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.0

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3\(2\)

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:2.3

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.4.3

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:4.4\(8\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:4.2\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(2\)

Trust: 1.0

vendor:ciscomodel:pix firewall 515escope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.6.7.c

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:4.3

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2

Trust: 1.0

vendor:ciscomodel:pix firewallscope:eqversion:6.2.2_.111

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.0.3.b

Trust: 1.0

vendor:ciscomodel:vpn 3002 hardware clientscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.0.4

Trust: 1.0

vendor:ciscomodel:vpn 3005 concentrator softwarescope:eqversion:4.0.1

Trust: 1.0

vendor:ciscomodel:pix asa idsscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.6.7d

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(3\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:3.1

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:2.0

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:3.2\(3\)

Trust: 1.0

vendor:ciscomodel:pix firewall 525scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(1\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.1\(rel\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.6.7.b

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:3.2\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewallscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.0.1

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:4.4\(7.202\)

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:2.3.5.1

Trust: 1.0

vendor:ciscomodel:vpn 3020 concentratorscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.6.3

Trust: 1.0

vendor:ciscomodel:vpn 3030 concentatorscope:eqversion:4.7.1

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:4.1\(6\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(5\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:3.0

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:5.1\(4.206\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.5\(rel\)

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:2.6.4

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.6.7

Trust: 1.0

vendor:ciscomodel:pix firewallscope:eqversion:6.2.3_\(110\)

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:3.0.1

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.1\(4\)

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:3.3\(1\)

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.2\(3\)

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.5.3

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:4.0.5.b

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.5.1

Trust: 1.0

vendor:ciscomodel:vpn 3000 concentrator series softwarescope:eqversion:3.5.5

Trust: 1.0

vendor:ciscomodel:pix firewall 501scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0

Trust: 0.9

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.8

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1

Trust: 0.6

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0.3

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0.4.3

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.0.1.4

Trust: 0.6

vendor:ciscomodel:vpn 3060 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3001 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3020 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3030 concentatorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn 3080 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.04

Trust: 0.6

vendor:ciscomodel:vpn 3015 concentratorscope: - version: -

Trust: 0.6

vendor:ciscomodel:vpn concentrator fscope:eqversion:30804.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30804.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3080

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30604.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30604.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30603.5.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3060

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30304.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30304.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30304.0.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3030

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30204.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30204.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3020

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30154.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30154.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:3015

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30054.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.0.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30054.0

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator dscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator cscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator bscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentrator ascope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30053.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30053.6.5

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30053.6.3

Trust: 0.3

vendor:ciscomodel:vpn hardware clientscope:eqversion:3002

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30010

Trust: 0.3

vendor:ciscomodel:vpn concentrator fscope:eqversion:30004.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.7.1

Trust: 0.3

vendor:ciscomodel:vpn concentrator .bscope:eqversion:30004.1.5

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.1.x

Trust: 0.3

vendor:ciscomodel:vpn concentrator .bscope:eqversion:30004.0.5

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.0.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.0.x

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30004.0

Trust: 0.3

vendor:ciscomodel:vpn concentrator dscope:eqversion:30003.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.6.7

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.6.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.6

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.5

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.4

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.3

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.5

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.4

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.2

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.1.1

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0.4

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30003.0

Trust: 0.3

vendor:ciscomodel:vpn concentratorscope:eqversion:30002.0

Trust: 0.3

vendor:ciscomodel:vpn concentrator 4.1.7.bscope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:vpn concentrator 4.1.7.ascope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:secure acs for windows serverscope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.1.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.42

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.4

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.5

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.4

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3.6.1

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3.5.1

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.3(1)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2(3)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2(2)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2(1.20)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2(1)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope: - version: -

Trust: 0.3

vendor:ciscomodel:pix/asa idsscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.1.4

Trust: 0.3

vendor:ciscomodel:pix osscope: - version: -

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5350

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5256.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:525

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:520

Trust: 0.3

vendor:ciscomodel:pix firewall 515escope: - version: -

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:515

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5060

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5010

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.3(133)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(3.109)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(3.102)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.3(110)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.2.111

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(3.100)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.5(104)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.5

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(4.101)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(1.200)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(9)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(7)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(6)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(3.210)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.1.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.1(4.206)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.4(8)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.4(7.202)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.4(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.2.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.2.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.2(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:pix firewall bscope:eqversion:4.1.6

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.1.6

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:2.7

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:0

Trust: 0.3

sources: BID: 16025 // JVNDB: JVNDB-2005-000750 // CNNVD: CNNVD-200512-542 // NVD: CVE-2005-4499

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-4499
value: HIGH

Trust: 1.0

NVD: CVE-2005-4499
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200512-542
value: HIGH

Trust: 0.6

VULHUB: VHN-15707
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2005-4499
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-15707
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-15707 // JVNDB: JVNDB-2005-000750 // CNNVD: CNNVD-200512-542 // NVD: CVE-2005-4499

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-4499

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200512-542

TYPE

Design Error

Trust: 0.9

sources: BID: 16025 // CNNVD: CNNVD-200512-542

CONFIGURATIONS

sources: JVNDB: JVNDB-2005-000750

PATCH

title:68484url:http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_field_notice09186a00805bf1c4.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2005-000750

EXTERNAL IDS

db:NVDid:CVE-2005-4499

Trust: 2.8

db:BIDid:16025

Trust: 2.8

db:SECUNIAid:18141

Trust: 2.6

db:OSVDBid:22193

Trust: 1.7

db:JVNDBid:JVNDB-2005-000750

Trust: 0.8

db:CNNVDid:CNNVD-200512-542

Trust: 0.7

db:BUGTRAQid:20051221 CISCO PIX / CS ACS: DOWNLOADABLE RADIUS ACLS VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20051222 RE: CISCO PIX / CS ACS: DOWNLOADABLE RADIUS ACLS VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-15707

Trust: 0.1

db:PACKETSTORMid:42760

Trust: 0.1

sources: VULHUB: VHN-15707 // BID: 16025 // JVNDB: JVNDB-2005-000750 // PACKETSTORM: 42760 // CNNVD: CNNVD-200512-542 // NVD: CVE-2005-4499

REFERENCES

url:http://www.securityfocus.com/bid/16025

Trust: 2.5

url:http://www.cisco.com/en/us/products/sw/secursw/ps2086/products_field_notice09186a00805bf1c4.shtml

Trust: 2.1

url:http://www.osvdb.org/22193

Trust: 1.7

url:http://secunia.com/advisories/18141

Trust: 1.7

url:http://www.securityfocus.com/archive/1/420020/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/420103/100/0/threaded

Trust: 1.1

url:http://secunia.com/advisories/18141/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-4499

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-4499

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/420020/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/420103/100/0/threaded

Trust: 0.6

url:http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/

Trust: 0.3

url:http://www.cisco.com/warp/public/707/advisory.html

Trust: 0.3

url:/archive/1/420020

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/90/

Trust: 0.1

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://secunia.com/product/56/

Trust: 0.1

url:http://secunia.com/product/5088/

Trust: 0.1

url:http://secunia.com/product/679/

Trust: 0.1

url:http://secunia.com/product/2273/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/3382/

Trust: 0.1

sources: VULHUB: VHN-15707 // BID: 16025 // JVNDB: JVNDB-2005-000750 // PACKETSTORM: 42760 // CNNVD: CNNVD-200512-542 // NVD: CVE-2005-4499

CREDITS

Oleg Tipisov

Trust: 0.6

sources: CNNVD: CNNVD-200512-542

SOURCES

db:VULHUBid:VHN-15707
db:BIDid:16025
db:JVNDBid:JVNDB-2005-000750
db:PACKETSTORMid:42760
db:CNNVDid:CNNVD-200512-542
db:NVDid:CVE-2005-4499

LAST UPDATE DATE

2024-08-14T15:09:45.658000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-15707date:2018-10-30T00:00:00
db:BIDid:16025date:2015-03-19T09:46:00
db:JVNDBid:JVNDB-2005-000750date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200512-542date:2005-12-27T00:00:00
db:NVDid:CVE-2005-4499date:2024-07-02T12:57:11.177

SOURCES RELEASE DATE

db:VULHUBid:VHN-15707date:2005-12-22T00:00:00
db:BIDid:16025date:2005-12-21T00:00:00
db:JVNDBid:JVNDB-2005-000750date:2007-04-01T00:00:00
db:PACKETSTORMid:42760date:2006-01-04T04:21:16
db:CNNVDid:CNNVD-200512-542date:2005-12-22T00:00:00
db:NVDid:CVE-2005-4499date:2005-12-22T11:03:00