ID

VAR-200608-0067


CVE

CVE-2006-4194


TITLE

Cisco PIX SIP Unauthorized implementation UDP Port forwarding vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200608-265

DESCRIPTION

Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: the vendor, after working with the researcher, has been unable to reproduce the issue. Cisco PIX is reportedly prone to an unauthorized UDP port-forwarding vulnerability. Attackers may exploit this issue to forward UDP datagrams to arbitrary hosts protected by affected firewall devices, potentially bypassing firewall rules. This may aid attackers in further attacks against computers protected by affected firewall devices. This BID will be updated as further information becomes available

Trust: 1.26

sources: NVD: CVE-2006-4194 // BID: 19536 // VULHUB: VHN-20302

AFFECTED PRODUCTS

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3

Trust: 1.6

vendor:ciscomodel:pix firewall 506scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 520scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 525scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 535scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 501scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 515scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 515escope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix firewall 515escope: - version: -

Trust: 0.9

vendor:ciscomodel:pix firewallscope:eqversion:6.3

Trust: 0.9

vendor:ciscomodel:pix firewall 506scope: - version: -

Trust: 0.6

vendor:ciscomodel:pix firewall 535scope: - version: -

Trust: 0.6

vendor:ciscomodel:pix firewall 501scope: - version: -

Trust: 0.6

vendor:ciscomodel:pix firewall 515scope: - version: -

Trust: 0.6

vendor:ciscomodel:pix firewall 520scope: - version: -

Trust: 0.6

vendor:ciscomodel:pix firewall 525scope: - version: -

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:5350

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5256.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:525

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:520

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:515

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5060

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5010

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.5(112)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.3(133)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(3.109)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(3.102)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.3(110)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.2.111

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(3.100)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.5(104)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.5

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(4.101)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(1.200)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(9)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(7)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(6)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(3.210)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.1.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.1(4.206)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.4(8)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.4(7.202)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.4(4)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.4

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.2.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.2.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.2(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:pix firewall bscope:eqversion:4.1.6

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.1.6

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:2.7

Trust: 0.3

vendor:ciscomodel:gigabit switch router delscope:eqversion:6.1

Trust: 0.3

sources: BID: 19536 // CNNVD: CNNVD-200608-265 // NVD: CVE-2006-4194

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-4194
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200608-265
value: MEDIUM

Trust: 0.6

VULHUB: VHN-20302
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-4194
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-20302
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-20302 // CNNVD: CNNVD-200608-265 // NVD: CVE-2006-4194

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-4194

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200608-265

TYPE

Design Error

Trust: 0.9

sources: BID: 19536 // CNNVD: CNNVD-200608-265

EXTERNAL IDS

db:BIDid:19536

Trust: 2.0

db:NVDid:CVE-2006-4194

Trust: 1.7

db:OSVDBid:29781

Trust: 1.7

db:CNNVDid:CNNVD-200608-265

Trust: 0.7

db:CISCOid:20060815 UNCONFIRMED SIP INSPECTION VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-20302

Trust: 0.1

sources: VULHUB: VHN-20302 // BID: 19536 // CNNVD: CNNVD-200608-265 // NVD: CVE-2006-4194

REFERENCES

url:http://www.cisco.com/en/us/products/hw/vpndevc/ps2030/tsd_products_security_response09186a008070d33b.html

Trust: 2.0

url:http://www.securityfocus.com/bid/19536

Trust: 1.7

url:http://www.idoel.smilejogja.com/2006/08/14/blinded-by-the-glare-of-facial-piercings-at-black-hat-or-the-one-that-got-away/

Trust: 1.7

url:http://www.networkworld.com/news/2006/080406-black-hat-unpatched-flaw-revealed.html?t5

Trust: 1.7

url:http://www.osvdb.org/29781

Trust: 1.7

url:http://searchsecurity.techtarget.com/originalcontent/0%2c289142%2csid14_gci1207450%2c00.html

Trust: 1.0

url:http://searchsecurity.techtarget.com/originalcontent/0,289142,sid14_gci1207450,00.html

Trust: 0.7

url:http://www.cisco.com/en/us/products/sw/secursw/ps2120/index.html

Trust: 0.3

sources: VULHUB: VHN-20302 // BID: 19536 // CNNVD: CNNVD-200608-265 // NVD: CVE-2006-4194

CREDITS

Hendrik Scholz discovered this issue.

Trust: 0.9

sources: BID: 19536 // CNNVD: CNNVD-200608-265

SOURCES

db:VULHUBid:VHN-20302
db:BIDid:19536
db:CNNVDid:CNNVD-200608-265
db:NVDid:CVE-2006-4194

LAST UPDATE DATE

2024-08-14T14:08:27.366000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-20302date:2018-10-30T00:00:00
db:BIDid:19536date:2006-08-16T17:50:00
db:CNNVDid:CNNVD-200608-265date:2006-08-24T00:00:00
db:NVDid:CVE-2006-4194date:2024-08-07T19:15:42.793

SOURCES RELEASE DATE

db:VULHUBid:VHN-20302date:2006-08-17T00:00:00
db:BIDid:19536date:2006-08-04T00:00:00
db:CNNVDid:CNNVD-200608-265date:2006-08-16T00:00:00
db:NVDid:CVE-2006-4194date:2006-08-17T01:04:00