ID

VAR-200702-0341


CVE

CVE-2007-0961


TITLE

Cisco Firewall Services Module vulnerable to DoS via inspection of malformed SIP messages

Trust: 0.8

sources: CERT/CC: VU#430969

DESCRIPTION

Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the "inspect sip" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets. Cisco Firewall Services Module fails to properly inspect SIP messages. This vulnerability may allow a remote attacker to cause a denial of service condition. According to information from Cisco Systems, SIP The inspection function is activated by default.Crafted by a third party SIP Device processing disruption by processing packets (DoS) It may be in a state. Cisco PIX and ASA are prone to a privilege-escalation vulnerability. Exploiting this issue allows authenticated attackers to gain administrative privileges on affected computers. This may facilitate the complete compromise of the affected device. This issue is tracked by Cisco Bug ID: CSCsh33287. Note that normal HTTP inspection (configured via inspect http, without HTTP mapping) is not affected by this vulnerability. To trigger this vulnerability, the SIP fixup (for 6.x software) or inspect (for 7.x software) function must be enabled. SIP fixup (in 6.x and earlier) and SIP check (in 7. x and earlier) is enabled by default. Check malformed TCP packet flow+------------------------------------------- ------ Cisco PIX and ASA equipment may crash when processing malformed packet flow based on TCP protocol. Protocols must be handled through the inspect function. The message may be sent to the device, or it may only pass through the device. Cisco PIX and ASA appliances can inspect the following TCP-based protocols: * Computer Telephony Interface Quick Buffer Encoding (CITQBE) * Distributed Computing Environment/Remote Procedure Call (DCE/RPC) * Domain Name Service (DNS) * Extended Simple Mail Transfer Protocol (ESMTP) * File Transfer Protocol (FTP) * H.323 Protocol * Hypertext Transfer Protocol (HTTP) * Internet Location Server (ILS) * Instant Messaging (IM) * Point-to-Point Tunneling Protocol (PPTP) * Remote Shell (RSH ) * Real Time Streaming Protocol (RTSP) * Session Initiation Protocol (SIP) *... ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Cisco PIX and ASA Privilege Escalation and Denial of Service SECUNIA ADVISORY ID: SA24160 VERIFY ADVISORY: http://secunia.com/advisories/24160/ CRITICAL: Moderately critical IMPACT: Privilege escalation, DoS WHERE: >From remote OPERATING SYSTEM: Cisco PIX 7.x http://secunia.com/product/6102/ Cisco Adaptive Security Appliance (ASA) 7.x http://secunia.com/product/6115/ DESCRIPTION: Some vulnerabilities have been reported in Cisco PIX and ASA, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service). 1) An unspecified error exists within the enhanced HTTP inspection feature. This can be exploited to crash the device via malformed HTTP requests, but requires that enhanced HTTP inspection is enabled. 2) An unspecified error exists within the SIP packet inspection. This can be exploited to crash the device by sending specially crafted SIP packets, but requires that "inspect" is enabled (it is disabled by default). 3) An unspecified error exists within the TCP-based protocol inspection. This can be exploited to crash the device via malformed packets, but requires that inspection of TCP-based protocols (e.g. FTP or HTTP) is enabled. 4) An unspecified error within the "LOCAL" authentication method can be exploited to gain escalated privileges. Successful exploitation allows gaining privilege level 15 and changing the complete configuration of the device, but requires that the attacker can authenticate to the device and that he is defined in the local database with privilege level 0. SOLUTION: Apply updated versions. See the vendor advisory for a patch matrix. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Successful exploitation requires that "SIP fixup" is enabled, which is the default setting. 2) A security issue when manipulating ACLs (Access Control Lists) that make use of object groups can corrupt ACLs, resulting in ACEs (Access Control Entries) being skipped or not evaluated in order, which can be exploited to bypass certain security restrictions. Note: Only an administrative user can change ACLs. Additionally, this does not affected devices which are reloaded after ACLs have been manipulated

Trust: 2.97

sources: NVD: CVE-2007-0961 // CERT/CC: VU#430969 // JVNDB: JVNDB-2007-000141 // BID: 22562 // VULHUB: VHN-24323 // PACKETSTORM: 54452 // PACKETSTORM: 54443 // PACKETSTORM: 54453

AFFECTED PRODUCTS

vendor:ciscomodel:asa 5500scope:eqversion:7.2

Trust: 1.6

vendor:ciscomodel:pix firewall softwarescope:eqversion:7.2

Trust: 1.6

vendor:ciscomodel:asa 5500scope:eqversion:7.0

Trust: 1.6

vendor:ciscomodel:asa 5500scope:eqversion:7.1

Trust: 1.6

vendor:ciscomodel:asa 5500scope:eqversion:6.3

Trust: 1.6

vendor:ciscomodel:pix firewall softwarescope:eqversion:7.0

Trust: 1.6

vendor:ciscomodel:pix firewallscope:eqversion:6.3

Trust: 1.4

vendor:ciscomodel:pix firewall softwarescope:eqversion:6.3

Trust: 1.0

vendor:ciscomodel:pix firewall softwarescope:eqversion:7.1

Trust: 1.0

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:firewall services modulescope:eqversion:2.x

Trust: 0.8

vendor:ciscomodel:firewall services modulescope:eqversion:3.x

Trust: 0.8

vendor:ciscomodel:pix/asascope:eqversion:7.0

Trust: 0.8

vendor:ciscomodel:pix/asascope:eqversion:7.1

Trust: 0.8

vendor:ciscomodel:pix firewallscope:eqversion:7.1

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:7.0

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:7.2

Trust: 0.6

vendor:ciscomodel:pix/asascope:eqversion:7.2.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(2.10)

Trust: 0.3

sources: CERT/CC: VU#430969 // BID: 22562 // JVNDB: JVNDB-2007-000141 // CNNVD: CNNVD-200702-317 // NVD: CVE-2007-0961

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0961
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#430969
value: 12.60

Trust: 0.8

NVD: CVE-2007-0961
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200702-317
value: HIGH

Trust: 0.6

VULHUB: VHN-24323
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-0961
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24323
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#430969 // VULHUB: VHN-24323 // JVNDB: JVNDB-2007-000141 // CNNVD: CNNVD-200702-317 // NVD: CVE-2007-0961

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0961

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200702-317

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200702-317

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000141

PATCH

title:cisco-sa-20070214-pixurl:http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml

Trust: 0.8

title:cisco-sa-20070214-fwsmurl:http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2007-000141

EXTERNAL IDS

db:CERT/CCid:VU#430969

Trust: 3.3

db:NVDid:CVE-2007-0961

Trust: 2.8

db:SECUNIAid:24180

Trust: 2.6

db:SECUNIAid:24160

Trust: 2.6

db:SECUNIAid:24179

Trust: 2.6

db:BIDid:22561

Trust: 2.5

db:BIDid:22562

Trust: 2.0

db:OSVDBid:33054

Trust: 1.7

db:SECTRACKid:1017652

Trust: 1.7

db:SECTRACKid:1017651

Trust: 1.7

db:VUPENid:ADV-2007-0608

Trust: 1.7

db:SECTRACKid:1017650

Trust: 0.8

db:JVNDBid:JVNDB-2007-000141

Trust: 0.8

db:CNNVDid:CNNVD-200702-317

Trust: 0.7

db:XFid:32487

Trust: 0.6

db:XFid:32501

Trust: 0.6

db:CISCOid:20070214 MULTIPLE VULNERABILITIES IN FIREWALL SERVICES MODULE

Trust: 0.6

db:CISCOid:20070214 MULTIPLE VULNERABILITIES IN CISCO PIX AND ASA APPLIANCES

Trust: 0.6

db:VULHUBid:VHN-24323

Trust: 0.1

db:PACKETSTORMid:54452

Trust: 0.1

db:PACKETSTORMid:54443

Trust: 0.1

db:PACKETSTORMid:54453

Trust: 0.1

sources: CERT/CC: VU#430969 // VULHUB: VHN-24323 // BID: 22562 // JVNDB: JVNDB-2007-000141 // PACKETSTORM: 54452 // PACKETSTORM: 54443 // PACKETSTORM: 54453 // CNNVD: CNNVD-200702-317 // NVD: CVE-2007-0961

REFERENCES

url:http://www.securityfocus.com/bid/22561

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/430969

Trust: 2.5

url:http://www.securityfocus.com/bid/22562

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00807e2484.shtml

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00807e2481.shtml

Trust: 1.7

url:http://osvdb.org/33054

Trust: 1.7

url:http://securitytracker.com/id?1017651

Trust: 1.7

url:http://www.securitytracker.com/id?1017652

Trust: 1.7

url:http://secunia.com/advisories/24160

Trust: 1.7

url:http://secunia.com/advisories/24179

Trust: 1.7

url:http://secunia.com/advisories/24180

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/0608

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/0608

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/32501

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/32487

Trust: 1.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml

Trust: 0.9

url:http://secunia.com/advisories/24179/

Trust: 0.9

url:http://secunia.com/advisories/24180/

Trust: 0.9

url:http://secunia.com/advisories/24160/

Trust: 0.9

url:http://securitytracker.com/alerts/2007/feb/1017650.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0961

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0961

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/32501

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/32487

Trust: 0.6

url:http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml

Trust: 0.5

url:http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/

Trust: 0.3

url:/archive/1/460079

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/software_inspector/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/about_secunia_advisories/

Trust: 0.3

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

url:http://secunia.com/product/5088/

Trust: 0.1

url:http://secunia.com/product/56/

Trust: 0.1

sources: CERT/CC: VU#430969 // VULHUB: VHN-24323 // BID: 22562 // JVNDB: JVNDB-2007-000141 // PACKETSTORM: 54452 // PACKETSTORM: 54443 // PACKETSTORM: 54453 // CNNVD: CNNVD-200702-317 // NVD: CVE-2007-0961

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200702-317

SOURCES

db:CERT/CCid:VU#430969
db:VULHUBid:VHN-24323
db:BIDid:22562
db:JVNDBid:JVNDB-2007-000141
db:PACKETSTORMid:54452
db:PACKETSTORMid:54443
db:PACKETSTORMid:54453
db:CNNVDid:CNNVD-200702-317
db:NVDid:CVE-2007-0961

LAST UPDATE DATE

2024-11-23T21:49:12.904000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#430969date:2007-02-22T00:00:00
db:VULHUBid:VHN-24323date:2018-10-30T00:00:00
db:BIDid:22562date:2016-07-06T14:39:00
db:JVNDBid:JVNDB-2007-000141date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200702-317date:2007-02-19T00:00:00
db:NVDid:CVE-2007-0961date:2024-11-21T00:27:10.050

SOURCES RELEASE DATE

db:CERT/CCid:VU#430969date:2007-02-16T00:00:00
db:VULHUBid:VHN-24323date:2007-02-16T00:00:00
db:BIDid:22562date:2007-02-14T00:00:00
db:JVNDBid:JVNDB-2007-000141date:2007-04-01T00:00:00
db:PACKETSTORMid:54452date:2007-02-16T06:49:41
db:PACKETSTORMid:54443date:2007-02-16T06:49:41
db:PACKETSTORMid:54453date:2007-02-16T06:49:41
db:CNNVDid:CNNVD-200702-317date:2007-02-15T00:00:00
db:NVDid:CVE-2007-0961date:2007-02-16T00:28:00