ID

VAR-200610-0174


CVE

CVE-2006-5394


TITLE

CSD Vulnerability to read data sent to printer in default settings

Trust: 0.8

sources: JVNDB: JVNDB-2006-001401

DESCRIPTION

The default configuration of Cisco Secure Desktop (CSD) has an unchecked "Disable printing" box in Secure Desktop Settings, which might allow local users to read data that was sent to a printer during another user's SSL VPN session. Cisco Secure Desktop is prone to multiple information-disclosure vulnerabilities. Successfully exploiting these issues allows an attacker to gain access to potentially sensitive information; this may lead to other attacks. The following problems exist in the implementation of CSD, which may lead to the leakage of sensitive information related to SSL VPN sessions. Restoring documents from a Windows printer spool If a document has already been printed, it can be restored from a printer spool. Background files are usually stored in the C:\WINDOWS\system32\spool\PRINTERS\ directory, with the extension .SPL. The life cycle of these files is very short, because they will be deleted after being successfully sent to the printer. However, if there is a printing problem or if data forensics is applied to the hard drive, it may be possible to recover the files

Trust: 2.07

sources: NVD: CVE-2006-5394 // JVNDB: JVNDB-2006-001401 // BID: 20410 // VULHUB: VHN-21502 // VULMON: CVE-2006-5394

AFFECTED PRODUCTS

vendor:ciscomodel:secure desktopscope: - version: -

Trust: 1.4

vendor:ciscomodel:secure desktopscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:secure desktopscope:eqversion:3.1.1

Trust: 0.3

vendor:ciscomodel:secure desktopscope:eqversion:3.1

Trust: 0.3

sources: BID: 20410 // JVNDB: JVNDB-2006-001401 // CNNVD: CNNVD-200610-311 // NVD: CVE-2006-5394

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-5394
value: LOW

Trust: 1.0

NVD: CVE-2006-5394
value: LOW

Trust: 0.8

CNNVD: CNNVD-200610-311
value: LOW

Trust: 0.6

VULHUB: VHN-21502
value: LOW

Trust: 0.1

VULMON: CVE-2006-5394
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2006-5394
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-21502
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-21502 // VULMON: CVE-2006-5394 // JVNDB: JVNDB-2006-001401 // CNNVD: CNNVD-200610-311 // NVD: CVE-2006-5394

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-5394

THREAT TYPE

local

Trust: 0.9

sources: BID: 20410 // CNNVD: CNNVD-200610-311

TYPE

Design Error

Trust: 0.9

sources: BID: 20410 // CNNVD: CNNVD-200610-311

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-001401

PATCH

title:cisco-sa-20061009-csdurl:http://www.cisco.com/en/US/products/csa/cisco-sa-20061009-csd.html

Trust: 0.8

sources: JVNDB: JVNDB-2006-001401

EXTERNAL IDS

db:NVDid:CVE-2006-5394

Trust: 2.9

db:BIDid:20410

Trust: 2.1

db:SECTRACKid:1017018

Trust: 1.8

db:JVNDBid:JVNDB-2006-001401

Trust: 0.8

db:CNNVDid:CNNVD-200610-311

Trust: 0.7

db:CISCOid:20061009 LIMITATIONS IN CISCO SECURE DESKTOP

Trust: 0.6

db:VULHUBid:VHN-21502

Trust: 0.1

db:VULMONid:CVE-2006-5394

Trust: 0.1

sources: VULHUB: VHN-21502 // VULMON: CVE-2006-5394 // BID: 20410 // JVNDB: JVNDB-2006-001401 // CNNVD: CNNVD-200610-311 // NVD: CVE-2006-5394

REFERENCES

url:http://www.securityfocus.com/bid/20410

Trust: 1.8

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080754f34.shtml

Trust: 1.8

url:http://securitytracker.com/id?1017018

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5394

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-5394

Trust: 0.8

url:http://www.cisco.com/en/us/products/ps6742/tsd_products_support_series_home.html

Trust: 0.3

url:http://www.cisco.com/en/us/products/ps6742/products_configuration_guide_chapter09186a00805f9f42.html#wp1041681

Trust: 0.3

url:http://support.microsoft.com/kb/314834/en-us/

Trust: 0.3

url:http://support.microsoft.com/kb/182086/en-us/

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20061009-csd.shtml

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=11844

Trust: 0.1

sources: VULHUB: VHN-21502 // VULMON: CVE-2006-5394 // BID: 20410 // JVNDB: JVNDB-2006-001401 // CNNVD: CNNVD-200610-311 // NVD: CVE-2006-5394

CREDITS

ManTech International Corporation※http://www.mantech.com/

Trust: 0.6

sources: CNNVD: CNNVD-200610-311

SOURCES

db:VULHUBid:VHN-21502
db:VULMONid:CVE-2006-5394
db:BIDid:20410
db:JVNDBid:JVNDB-2006-001401
db:CNNVDid:CNNVD-200610-311
db:NVDid:CVE-2006-5394

LAST UPDATE DATE

2024-08-14T14:41:57.726000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-21502date:2008-09-05T00:00:00
db:VULMONid:CVE-2006-5394date:2008-09-05T00:00:00
db:BIDid:20410date:2016-07-06T14:06:00
db:JVNDBid:JVNDB-2006-001401date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200610-311date:2006-10-20T00:00:00
db:NVDid:CVE-2006-5394date:2008-09-05T21:12:09.623

SOURCES RELEASE DATE

db:VULHUBid:VHN-21502date:2006-10-18T00:00:00
db:VULMONid:CVE-2006-5394date:2006-10-18T00:00:00
db:BIDid:20410date:2006-10-09T00:00:00
db:JVNDBid:JVNDB-2006-001401date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200610-311date:2006-10-18T00:00:00
db:NVDid:CVE-2006-5394date:2006-10-18T19:07:00