ID

VAR-200702-0342


CVE

CVE-2007-0962


TITLE

Cisco PIX/ASA and FWSM Rogue HTTP Service disruption due to traffic (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-000142

DESCRIPTION

Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when "inspect http" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic. According to Cisco Systems information, advanced HTTP The inspection function is disabled by default and is "inspect http" (HTTP Inspection ) Has been reported to be unaffected.Crafted by a third party HTTP Processing the request causes the device to interfere with service operation (DoS) It may be in a state. Cisco PIX and ASA are prone to a privilege-escalation vulnerability. Exploiting this issue allows authenticated attackers to gain administrative privileges on affected computers. This may facilitate the complete compromise of the affected device. This issue is tracked by Cisco Bug ID: CSCsh33287. The Cisco PIX/ASA and Firewall Services Module (FWSM) provide firewall services with stateful packet filtering and deep packet inspection. Note that normal HTTP inspection (configured via inspect http, without HTTP mapping) is not affected by this vulnerability. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Cisco PIX and ASA Privilege Escalation and Denial of Service SECUNIA ADVISORY ID: SA24160 VERIFY ADVISORY: http://secunia.com/advisories/24160/ CRITICAL: Moderately critical IMPACT: Privilege escalation, DoS WHERE: >From remote OPERATING SYSTEM: Cisco PIX 7.x http://secunia.com/product/6102/ Cisco Adaptive Security Appliance (ASA) 7.x http://secunia.com/product/6115/ DESCRIPTION: Some vulnerabilities have been reported in Cisco PIX and ASA, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service). 1) An unspecified error exists within the enhanced HTTP inspection feature. This can be exploited to crash the device via malformed HTTP requests, but requires that enhanced HTTP inspection is enabled. 2) An unspecified error exists within the SIP packet inspection. This can be exploited to crash the device by sending specially crafted SIP packets, but requires that "inspect" is enabled (it is disabled by default). 3) An unspecified error exists within the TCP-based protocol inspection. This can be exploited to crash the device via malformed packets, but requires that inspection of TCP-based protocols (e.g. FTP or HTTP) is enabled. 4) An unspecified error within the "LOCAL" authentication method can be exploited to gain escalated privileges. Successful exploitation allows gaining privilege level 15 and changing the complete configuration of the device, but requires that the attacker can authenticate to the device and that he is defined in the local database with privilege level 0. SOLUTION: Apply updated versions. See the vendor advisory for a patch matrix. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Successful exploitation requires that "SIP fixup" is enabled, which is the default setting. 2) A security issue when manipulating ACLs (Access Control Lists) that make use of object groups can corrupt ACLs, resulting in ACEs (Access Control Entries) being skipped or not evaluated in order, which can be exploited to bypass certain security restrictions. Note: Only an administrative user can change ACLs. Additionally, this does not affected devices which are reloaded after ACLs have been manipulated

Trust: 2.16

sources: NVD: CVE-2007-0962 // JVNDB: JVNDB-2007-000142 // BID: 22562 // VULHUB: VHN-24324 // PACKETSTORM: 54452 // PACKETSTORM: 54443

AFFECTED PRODUCTS

vendor:ciscomodel:asa 5500scope:eqversion:7.1

Trust: 1.6

vendor:ciscomodel:firewall services modulescope:eqversion:2.3

Trust: 1.6

vendor:ciscomodel:pix firewall softwarescope:eqversion:7.1

Trust: 1.6

vendor:ciscomodel:firewall services modulescope:eqversion:3.1

Trust: 1.6

vendor:ciscomodel:asa 5500scope:eqversion:7.0

Trust: 1.6

vendor:ciscomodel:pix firewall softwarescope:eqversion:7.0

Trust: 1.6

vendor:ciscomodel:firewall services modulescope:eqversion:3.x

Trust: 0.8

vendor:ciscomodel:pix/asascope:eqversion:7.0

Trust: 0.8

vendor:ciscomodel:pix/asascope:eqversion:7.1

Trust: 0.8

vendor:ciscomodel:pix firewallscope:eqversion:7.1

Trust: 0.6

vendor:ciscomodel:pix firewallscope:eqversion:7.0

Trust: 0.6

vendor:ciscomodel:pix/asascope:eqversion:7.2.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(2.10)

Trust: 0.3

sources: BID: 22562 // JVNDB: JVNDB-2007-000142 // CNNVD: CNNVD-200702-315 // NVD: CVE-2007-0962

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0962
value: HIGH

Trust: 1.0

NVD: CVE-2007-0962
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200702-315
value: HIGH

Trust: 0.6

VULHUB: VHN-24324
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-0962
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24324
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-24324 // JVNDB: JVNDB-2007-000142 // CNNVD: CNNVD-200702-315 // NVD: CVE-2007-0962

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-0962

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200702-315

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200702-315

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000142

PATCH

title:cisco-sa-20070214-pixurl:http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml

Trust: 0.8

title:cisco-sa-20070214-fwsmurl:http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2007-000142

EXTERNAL IDS

db:NVDid:CVE-2007-0962

Trust: 2.8

db:SECUNIAid:24160

Trust: 2.6

db:BIDid:22561

Trust: 2.5

db:BIDid:22562

Trust: 2.0

db:SECUNIAid:24180

Trust: 1.8

db:OSVDBid:33055

Trust: 1.7

db:SECTRACKid:1017652

Trust: 1.7

db:SECTRACKid:1017651

Trust: 1.7

db:VUPENid:ADV-2007-0608

Trust: 1.7

db:JVNDBid:JVNDB-2007-000142

Trust: 0.8

db:CNNVDid:CNNVD-200702-315

Trust: 0.7

db:CISCOid:20070214 MULTIPLE VULNERABILITIES IN FIREWALL SERVICES MODULE

Trust: 0.6

db:CISCOid:20070214 MULTIPLE VULNERABILITIES IN CISCO PIX AND ASA APPLIANCES

Trust: 0.6

db:XFid:32486

Trust: 0.6

db:VULHUBid:VHN-24324

Trust: 0.1

db:PACKETSTORMid:54452

Trust: 0.1

db:PACKETSTORMid:54443

Trust: 0.1

sources: VULHUB: VHN-24324 // BID: 22562 // JVNDB: JVNDB-2007-000142 // PACKETSTORM: 54452 // PACKETSTORM: 54443 // CNNVD: CNNVD-200702-315 // NVD: CVE-2007-0962

REFERENCES

url:http://www.securityfocus.com/bid/22561

Trust: 2.5

url:http://www.securityfocus.com/bid/22562

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00807e2484.shtml

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00807e2481.shtml

Trust: 1.7

url:http://osvdb.org/33055

Trust: 1.7

url:http://securitytracker.com/id?1017651

Trust: 1.7

url:http://www.securitytracker.com/id?1017652

Trust: 1.7

url:http://secunia.com/advisories/24160

Trust: 1.7

url:http://secunia.com/advisories/24180

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/0608

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/0608

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/32486

Trust: 1.1

url:http://secunia.com/advisories/24160/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0962

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0962

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/32486

Trust: 0.6

url:http://www.cisco.com/warp/public/707/cisco-sa-20070214-pix.shtml

Trust: 0.4

url:http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/

Trust: 0.3

url:/archive/1/460079

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/software_inspector/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

url:http://secunia.com/product/5088/

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20070214-fwsm.shtml

Trust: 0.1

url:http://secunia.com/advisories/24180/

Trust: 0.1

sources: VULHUB: VHN-24324 // BID: 22562 // JVNDB: JVNDB-2007-000142 // PACKETSTORM: 54452 // PACKETSTORM: 54443 // CNNVD: CNNVD-200702-315 // NVD: CVE-2007-0962

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200702-315

SOURCES

db:VULHUBid:VHN-24324
db:BIDid:22562
db:JVNDBid:JVNDB-2007-000142
db:PACKETSTORMid:54452
db:PACKETSTORMid:54443
db:CNNVDid:CNNVD-200702-315
db:NVDid:CVE-2007-0962

LAST UPDATE DATE

2024-11-23T21:49:12.996000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-24324date:2018-10-30T00:00:00
db:BIDid:22562date:2016-07-06T14:39:00
db:JVNDBid:JVNDB-2007-000142date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200702-315date:2007-02-19T00:00:00
db:NVDid:CVE-2007-0962date:2024-11-21T00:27:10.203

SOURCES RELEASE DATE

db:VULHUBid:VHN-24324date:2007-02-16T00:00:00
db:BIDid:22562date:2007-02-14T00:00:00
db:JVNDBid:JVNDB-2007-000142date:2007-04-01T00:00:00
db:PACKETSTORMid:54452date:2007-02-16T06:49:41
db:PACKETSTORMid:54443date:2007-02-16T06:49:41
db:CNNVDid:CNNVD-200702-315date:2007-02-15T00:00:00
db:NVDid:CVE-2007-0962date:2007-02-16T00:28:00