ID

VAR-200702-0339


CVE

CVE-2007-0959


TITLE

Cisco Firewall Services Module vulnerable to DoS via inspection of malformed SIP messages

Trust: 0.8

sources: CERT/CC: VU#430969

DESCRIPTION

Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets. Cisco Firewall Services Module fails to properly inspect SIP messages. This vulnerability may allow a remote attacker to cause a denial of service condition. According to Cisco Systems information TCP base The protocol inspection feature is enabled by default.Crafted by a third party TCP Device processing disruption by processing packets (DoS) It may be in a state. Cisco PIX and ASA are prone to a privilege-escalation vulnerability. Exploiting this issue allows authenticated attackers to gain administrative privileges on affected computers. This may facilitate the complete compromise of the affected device. This issue is tracked by Cisco Bug ID: CSCsh33287. Multiple Cisco products are prone to multiple denial-of-service vulnerabilities. Attackers can exploit these issues to cause vulnerable devices to reload, potentially causing denial-of-service conditions. Protocols must be handled through the inspect function. The message may be sent to the device, or it may only pass through the device. Cisco PIX and ASA appliances can inspect the following TCP-based protocols: * Computer Telephony Interface Quick Buffer Encoding (CITQBE) * Distributed Computing Environment/Remote Procedure Call (DCE/RPC) * Domain Name Service (DNS) * Extended Simple Mail Transfer Protocol (ESMTP) * File Transfer Protocol (FTP) * H.323 Protocol * Hypertext Transfer Protocol (HTTP) * Internet Location Server (ILS) * Instant Messaging (IM) * Point-to-Point Tunneling Protocol (PPTP) * Remote Shell (RSH ) * Real Time Streaming Protocol (RTSP) * Session Initiation Protocol (SIP) * Small (or Simple) Client Control Protocol (SCCP) * Simple Mail Transfer Protocol (SMTP) * Oracle SQL*Net * Sun RPC. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Cisco PIX and ASA Privilege Escalation and Denial of Service SECUNIA ADVISORY ID: SA24160 VERIFY ADVISORY: http://secunia.com/advisories/24160/ CRITICAL: Moderately critical IMPACT: Privilege escalation, DoS WHERE: >From remote OPERATING SYSTEM: Cisco PIX 7.x http://secunia.com/product/6102/ Cisco Adaptive Security Appliance (ASA) 7.x http://secunia.com/product/6115/ DESCRIPTION: Some vulnerabilities have been reported in Cisco PIX and ASA, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service). 1) An unspecified error exists within the enhanced HTTP inspection feature. This can be exploited to crash the device via malformed HTTP requests, but requires that enhanced HTTP inspection is enabled. 2) An unspecified error exists within the SIP packet inspection. This can be exploited to crash the device by sending specially crafted SIP packets, but requires that "inspect" is enabled (it is disabled by default). 3) An unspecified error exists within the TCP-based protocol inspection. This can be exploited to crash the device via malformed packets, but requires that inspection of TCP-based protocols (e.g. FTP or HTTP) is enabled. 4) An unspecified error within the "LOCAL" authentication method can be exploited to gain escalated privileges. Successful exploitation allows gaining privilege level 15 and changing the complete configuration of the device, but requires that the attacker can authenticate to the device and that he is defined in the local database with privilege level 0. SOLUTION: Apply updated versions. See the vendor advisory for a patch matrix. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.06

sources: NVD: CVE-2007-0959 // CERT/CC: VU#430969 // JVNDB: JVNDB-2007-000158 // BID: 22562 // BID: 22561 // VULHUB: VHN-24321 // PACKETSTORM: 54452

AFFECTED PRODUCTS

vendor:ciscomodel:pix firewall softwarescope:eqversion:7.2\(2\)

Trust: 1.6

vendor:ciscomodel:asa 5500scope:eqversion:7.2\(2\)

Trust: 1.6

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:pix/asascope:eqversion:7.2 (7.2.2 only )

Trust: 0.8

vendor:ciscomodel:pix/asascope:neversion:7.2(2.10)

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:7.2\(2\)

Trust: 0.6

vendor:ciscomodel:pix/asascope:eqversion:7.2.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.1.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.5(112)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.3(133)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.2

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3.1

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(5)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(3.109)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(3.102)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(3)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3(1)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:eqversion:6.3

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(3.24)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(1.9)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(1.7)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(3.3)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(3.2)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(3.18)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(3.11)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(3.1)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:2.3(4.7)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:2.3(4)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:2.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.1(2.5)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0(5.2)

Trust: 0.3

vendor:ciscomodel:pix firewallscope:neversion:6.3(5.115)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:neversion:3.1(4)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:neversion:2.3(4.12)

Trust: 0.3

sources: CERT/CC: VU#430969 // BID: 22562 // BID: 22561 // JVNDB: JVNDB-2007-000158 // CNNVD: CNNVD-200702-329 // NVD: CVE-2007-0959

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0959
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#430969
value: 12.60

Trust: 0.8

NVD: CVE-2007-0959
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200702-329
value: HIGH

Trust: 0.6

VULHUB: VHN-24321
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-0959
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24321
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#430969 // VULHUB: VHN-24321 // JVNDB: JVNDB-2007-000158 // CNNVD: CNNVD-200702-329 // NVD: CVE-2007-0959

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0959

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200702-329

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200702-329

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000158

PATCH

title:cisco-sa-20070214-pixurl:http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2007-000158

EXTERNAL IDS

db:NVDid:CVE-2007-0959

Trust: 3.1

db:BIDid:22561

Trust: 2.8

db:SECUNIAid:24160

Trust: 2.6

db:BIDid:22562

Trust: 2.0

db:SECTRACKid:1017652

Trust: 1.7

db:SECTRACKid:1017651

Trust: 1.7

db:OSVDBid:33062

Trust: 1.7

db:VUPENid:ADV-2007-0608

Trust: 1.7

db:CERT/CCid:VU#430969

Trust: 1.1

db:SECTRACKid:1017650

Trust: 0.8

db:JVNDBid:JVNDB-2007-000158

Trust: 0.8

db:CNNVDid:CNNVD-200702-329

Trust: 0.7

db:CISCOid:20070214 MULTIPLE VULNERABILITIES IN CISCO PIX AND ASA APPLIANCES

Trust: 0.6

db:XFid:32488

Trust: 0.6

db:VULHUBid:VHN-24321

Trust: 0.1

db:PACKETSTORMid:54452

Trust: 0.1

sources: CERT/CC: VU#430969 // VULHUB: VHN-24321 // BID: 22562 // BID: 22561 // JVNDB: JVNDB-2007-000158 // PACKETSTORM: 54452 // CNNVD: CNNVD-200702-329 // NVD: CVE-2007-0959

REFERENCES

url:http://www.securityfocus.com/bid/22561

Trust: 2.5

url:http://www.securityfocus.com/bid/22562

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00807e2484.shtml

Trust: 1.7

url:http://osvdb.org/33062

Trust: 1.7

url:http://www.securitytracker.com/id?1017651

Trust: 1.7

url:http://www.securitytracker.com/id?1017652

Trust: 1.7

url:http://secunia.com/advisories/24160

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/0608

Trust: 1.4

url:http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/0608

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/32488

Trust: 1.1

url:http://secunia.com/advisories/24160/

Trust: 0.9

url:http://securitytracker.com/alerts/2007/feb/1017650.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0959

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0959

Trust: 0.8

url:http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml

Trust: 0.7

url:http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/

Trust: 0.6

url:/archive/1/460079

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/32488

Trust: 0.6

url:http://www.kb.cert.org/vuls/id/430969

Trust: 0.3

url:/archive/1/460080

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

sources: CERT/CC: VU#430969 // VULHUB: VHN-24321 // BID: 22562 // BID: 22561 // JVNDB: JVNDB-2007-000158 // PACKETSTORM: 54452 // CNNVD: CNNVD-200702-329 // NVD: CVE-2007-0959

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200702-329

SOURCES

db:CERT/CCid:VU#430969
db:VULHUBid:VHN-24321
db:BIDid:22562
db:BIDid:22561
db:JVNDBid:JVNDB-2007-000158
db:PACKETSTORMid:54452
db:CNNVDid:CNNVD-200702-329
db:NVDid:CVE-2007-0959

LAST UPDATE DATE

2024-11-23T21:49:12.852000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#430969date:2007-02-22T00:00:00
db:VULHUBid:VHN-24321date:2018-10-30T00:00:00
db:BIDid:22562date:2016-07-06T14:39:00
db:BIDid:22561date:2016-07-06T14:40:00
db:JVNDBid:JVNDB-2007-000158date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200702-329date:2007-02-19T00:00:00
db:NVDid:CVE-2007-0959date:2024-11-21T00:27:09.770

SOURCES RELEASE DATE

db:CERT/CCid:VU#430969date:2007-02-16T00:00:00
db:VULHUBid:VHN-24321date:2007-02-16T00:00:00
db:BIDid:22562date:2007-02-14T00:00:00
db:BIDid:22561date:2007-02-14T00:00:00
db:JVNDBid:JVNDB-2007-000158date:2007-04-01T00:00:00
db:PACKETSTORMid:54452date:2007-02-16T06:49:41
db:CNNVDid:CNNVD-200702-329date:2007-02-15T00:00:00
db:NVDid:CVE-2007-0959date:2007-02-16T00:28:00