ID

VAR-200610-0036


CVE

CVE-2006-5553


TITLE

Cisco Security Agent Remote Port Scan Denial of Service Vulnerability

Trust: 0.9

sources: BID: 20737 // CNNVD: CNNVD-200610-458

DESCRIPTION

Cisco Security Agent (CSA) for Linux 4.5 before 4.5.1.657 and 5.0 before 5.0.0.193, as used by Unified CallManager (CUCM) and Unified Presence Server (CUPS), allows remote attackers to cause a denial of service (resource consumption) via a port scan with certain options. Successfully exploiting this issue allows remote attackers to cause the affected software to enter into an unresponsive state, denying further service to legitimate users. This issue does not affect CSA for Windows or Solaris. Cisco Security Agent (CSA) provides threat protection for server and desktop computing systems. Vulnerabilities exist when CSA handles special cases such as port scanning, and remote attackers may exploit this vulnerability to degrade service responsiveness. ---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. The vulnerability is caused due to an error within the detection of port scans. SOLUTION: Apply Hotfixes. http://www.cisco.com/pcgi-bin/tablebuild.pl/cups-10?psrtdcat20e2 CSA version 4.5 for Linux: Apply Hotfix 4.5.1.657 CSA version 5.0 for Linux: Apply Hotfix 5.0.0.193 CUCM 5.0 version including 5.0(4): Apply COS COP upgrade. CUPS 1.0 version including 1.0(2): Apply COS COP upgrade. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/en/US/products/products_security_advisory09186a00807693c7.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2006-5553 // JVNDB: JVNDB-2006-001449 // BID: 20737 // VULHUB: VHN-21661 // PACKETSTORM: 51345

AFFECTED PRODUCTS

vendor:ciscomodel:unified presence serverscope:eqversion:1.0

Trust: 1.9

vendor:ciscomodel:security agentscope:eqversion:4.5.1.639

Trust: 1.9

vendor:ciscomodel:security agentscope:eqversion:4.5.1

Trust: 1.9

vendor:ciscomodel:security agentscope:eqversion:4.5

Trust: 1.9

vendor:ciscomodel:security agentscope:eqversion:5.0

Trust: 1.9

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0\(4\)

Trust: 1.6

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0\(3\)

Trust: 1.6

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0\(2\)

Trust: 1.6

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0\(1\)

Trust: 1.6

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0\(3a\)

Trust: 1.6

vendor:ciscomodel:unified presence serverscope:eqversion:1.0\(2\)

Trust: 1.0

vendor:ciscomodel:unified presence serverscope: - version: -

Trust: 0.8

vendor:ciscomodel:security agentscope:ltversion:linux edition 4.5.1.657

Trust: 0.8

vendor:ciscomodel:unified callmanagerscope: - version: -

Trust: 0.8

vendor:ciscomodel:unified presence serverscope:eqversion:1.0(2)

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0(4)

Trust: 0.3

vendor:ciscomodel:unified callmanager 5.0scope: - version: -

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0(3)

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0(2)

Trust: 0.3

vendor:ciscomodel:unified callmanagerscope:eqversion:5.0(1)

Trust: 0.3

vendor:ciscomodel:security agentscope:neversion:5.0.193

Trust: 0.3

vendor:ciscomodel:security agentscope:neversion:4.5.1.657

Trust: 0.3

vendor:ciscomodel:security agentscope:neversion:5.1

Trust: 0.3

sources: BID: 20737 // JVNDB: JVNDB-2006-001449 // CNNVD: CNNVD-200610-458 // NVD: CVE-2006-5553

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-5553
value: HIGH

Trust: 1.0

NVD: CVE-2006-5553
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200610-458
value: HIGH

Trust: 0.6

VULHUB: VHN-21661
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-5553
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-21661
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-21661 // JVNDB: JVNDB-2006-001449 // CNNVD: CNNVD-200610-458 // NVD: CVE-2006-5553

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-5553

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200610-458

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200610-458

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-001449

PATCH

title:cisco-sa-20061025-csaurl:http://www.cisco.com/en/US/products/csa/cisco-sa-20061025-csa.html

Trust: 0.8

sources: JVNDB: JVNDB-2006-001449

EXTERNAL IDS

db:NVDid:CVE-2006-5553

Trust: 2.5

db:BIDid:20737

Trust: 2.0

db:SECUNIAid:22574

Trust: 1.8

db:VUPENid:ADV-2006-4198

Trust: 1.7

db:OSVDBid:30055

Trust: 1.7

db:SECTRACKid:1017118

Trust: 1.7

db:JVNDBid:JVNDB-2006-001449

Trust: 0.8

db:CNNVDid:CNNVD-200610-458

Trust: 0.7

db:XFid:29829

Trust: 0.6

db:CISCOid:20061025 CISCO SECURITY AGENT FOR LINUX PORT SCAN DENIAL OF SERVICE

Trust: 0.6

db:VULHUBid:VHN-21661

Trust: 0.1

db:PACKETSTORMid:51345

Trust: 0.1

sources: VULHUB: VHN-21661 // BID: 20737 // JVNDB: JVNDB-2006-001449 // PACKETSTORM: 51345 // CNNVD: CNNVD-200610-458 // NVD: CVE-2006-5553

REFERENCES

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00807693c7.shtml

Trust: 1.8

url:http://www.securityfocus.com/bid/20737

Trust: 1.7

url:http://www.osvdb.org/30055

Trust: 1.7

url:http://securitytracker.com/id?1017118

Trust: 1.7

url:http://secunia.com/advisories/22574

Trust: 1.7

url:http://www.vupen.com/english/advisories/2006/4198

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/29829

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5553

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-5553

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/29829

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/4198

Trust: 0.6

url:http://www.cisco.com/warp/public/707/cisco-sa-20061025-csa.shtml

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/secursw/ps5057/

Trust: 0.3

url:/archive/1/449664

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.cisco.com/pcgi-bin/tablebuild.pl/cups-10?psrtdcat20e2

Trust: 0.1

url:http://secunia.com/product/12423/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/product/11019/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/4246/

Trust: 0.1

url:http://secunia.com/product/12424/

Trust: 0.1

url:http://secunia.com/advisories/22574/

Trust: 0.1

sources: VULHUB: VHN-21661 // BID: 20737 // JVNDB: JVNDB-2006-001449 // PACKETSTORM: 51345 // CNNVD: CNNVD-200610-458 // NVD: CVE-2006-5553

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200610-458

SOURCES

db:VULHUBid:VHN-21661
db:BIDid:20737
db:JVNDBid:JVNDB-2006-001449
db:PACKETSTORMid:51345
db:CNNVDid:CNNVD-200610-458
db:NVDid:CVE-2006-5553

LAST UPDATE DATE

2024-08-14T14:35:30.271000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-21661date:2017-07-20T00:00:00
db:BIDid:20737date:2006-10-25T21:38:00
db:JVNDBid:JVNDB-2006-001449date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200610-458date:2006-10-30T00:00:00
db:NVDid:CVE-2006-5553date:2017-07-20T01:33:49.773

SOURCES RELEASE DATE

db:VULHUBid:VHN-21661date:2006-10-26T00:00:00
db:BIDid:20737date:2006-10-25T00:00:00
db:JVNDBid:JVNDB-2006-001449date:2012-06-26T00:00:00
db:PACKETSTORMid:51345date:2006-10-27T18:39:08
db:CNNVDid:CNNVD-200610-458date:2006-10-26T00:00:00
db:NVDid:CVE-2006-5553date:2006-10-26T17:07:00