ID

VAR-200705-0565


CVE

CVE-2007-2461


TITLE

Cisco PIX/ASA DHCP Relay Remote Denial of Service Vulnerability

Trust: 0.9

sources: BID: 23763 // CNNVD: CNNVD-200705-062

DESCRIPTION

The DHCP relay agent in Cisco Adaptive Security Appliance (ASA) and PIX 7.2 allows remote attackers to cause a denial of service (dropped packets) via a DHCPREQUEST or DHCPINFORM message that causes multiple DHCPACK messages to be sent from DHCP servers to the agent, which consumes the memory allocated for a local buffer. NOTE: this issue only occurs when multiple DHCP servers are used. The Cisco ASA and PIX firewalls contain an authentication bypass vulnerability. This vulnerability may allow a remote attacker to gain unauthorized access to the internal network or firewall. Cisco PIX and ASA are prone to a remote denial-of-service vulnerability because the software fails to properly handle DHCP packets in certain circumstances. Successfully exploiting this issue allows attackers with access to a LAN served by a vulnerable device to consume excessive memory resources. This will eventually cause the device to stop forwarding further packets, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCsh50277. PIX is a firewall device that provides policy enforcement, multi-vector attack protection and secure connection services for users and applications; Adaptive Security Appliance (ASA) is a modular platform that provides security and VPN services. If a DHCPACK message is received from multiple DHCP servers in response to a DHCPREQUEST or DHCPINFORM message from a DHCP client, it may result in a block memory consumption of 1550 bytes. Once the 1550-byte block memory is completely consumed, the device will start to drop packets, making it impossible to forward packets. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/ The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: Cisco PIX and ASA Denial of Service and Security Bypass SECUNIA ADVISORY ID: SA25109 VERIFY ADVISORY: http://secunia.com/advisories/25109/ CRITICAL: Moderately critical IMPACT: Security Bypass, DoS WHERE: >From remote OPERATING SYSTEM: Cisco Adaptive Security Appliance (ASA) 7.x http://secunia.com/product/6115/ Cisco PIX 7.x http://secunia.com/product/6102/ DESCRIPTION: Some vulnerabilities have been reported in Cisco PIX and ASA, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). 1) An unspecified error exists when using the LDAP authentication mechanism, which can be exploited to bypass the authentication and gain access to the device or the network. Successful exploitation requires that the device uses the Layer 2 Tunneling Protocol (L2TP) and is configured to use LDAP servers with another protocol other than PAP for authentication, or that the device offers remote management access (telnet, SSH, HTTP) and uses an LDAP AAA server for authentication. 2) An unspecified error when using VPN connections configured with password expiry can be exploited to cause a DoS. Successful exploitation requires that the tunnel group is configured with password expiry. In order to exploit this in IPSec VPN connections, an attacker also needs to know the group name and group password. 3) A race condition within the processing of non-standard SSL sessions in the SSL VPN server of Cisco ASA appliances can be exploited to cause the device to reload. Successful exploitation requires that clientless SSL is used. Successful exploitation requires that devices are configured to use the DHCP relay agent. SOLUTION: Apply updated software versions. Please see vendor advisories for details. PROVIDED AND/OR DISCOVERED BY: 1-3) Reported by the vendor. 4) Lisa Sittler and Grant Deffenbaugh, CERT/CC. ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sa-20070502-asa.shtml http://www.cisco.com/warp/public/707/cisco-sr-20070502-pix.shtml http://www.cisco.com/en/US/products/products_security_response09186a0080833172.html http://www.cisco.com/en/US/products/products_applied_intelligence_response09186a008083316f.html US-CERT VU#530057: http://www.kb.cert.org/vuls/id/530057 OTHER REFERENCES: US-CERT VU#210876: http://www.kb.cert.org/vuls/id/210876 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.51

sources: NVD: CVE-2007-2461 // CERT/CC: VU#210876 // CERT/CC: VU#530057 // JVNDB: JVNDB-2007-000334 // BID: 23763 // VULHUB: VHN-25823 // PACKETSTORM: 56436

AFFECTED PRODUCTS

vendor:ciscomodel: - scope: - version: -

Trust: 1.6

vendor:ciscomodel:pixscope:eqversion:7.2

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.2

Trust: 1.6

vendor:ciscomodel:pix/asascope:eqversion:7.2

Trust: 0.8

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2

Trust: 0.6

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.14)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.10)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(2.15)

Trust: 0.3

sources: CERT/CC: VU#210876 // CERT/CC: VU#530057 // BID: 23763 // JVNDB: JVNDB-2007-000334 // CNNVD: CNNVD-200705-062 // NVD: CVE-2007-2461

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2461
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#210876
value: 2.43

Trust: 0.8

CARNEGIE MELLON: VU#530057
value: 0.64

Trust: 0.8

NVD: CVE-2007-2461
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200705-062
value: HIGH

Trust: 0.6

VULHUB: VHN-25823
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-2461
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-25823
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#210876 // CERT/CC: VU#530057 // VULHUB: VHN-25823 // JVNDB: JVNDB-2007-000334 // CNNVD: CNNVD-200705-062 // NVD: CVE-2007-2461

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-2461

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200705-062

TYPE

Design Error

Trust: 0.9

sources: BID: 23763 // CNNVD: CNNVD-200705-062

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000334

PATCH

title:cisco-sr-20070502-pixurl:http://www.cisco.com/warp/public/707/cisco-sr-20070502-pix.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2007-000334

EXTERNAL IDS

db:CERT/CCid:VU#530057

Trust: 3.7

db:BIDid:23763

Trust: 2.8

db:NVDid:CVE-2007-2461

Trust: 2.8

db:SECUNIAid:25109

Trust: 2.7

db:SECTRACKid:1018000

Trust: 2.5

db:SECTRACKid:1017999

Trust: 2.5

db:OSVDBid:35330

Trust: 1.7

db:VUPENid:ADV-2007-1635

Trust: 1.7

db:CERT/CCid:VU#210876

Trust: 0.9

db:OSVDBid:35331

Trust: 0.8

db:JVNDBid:JVNDB-2007-000334

Trust: 0.8

db:XFid:34026

Trust: 0.6

db:CISCOid:20070502 DHCP RELAY AGENT VULNERABILITY IN CISCO PIX AND ASA APPLIANCES

Trust: 0.6

db:CNNVDid:CNNVD-200705-062

Trust: 0.6

db:VULHUBid:VHN-25823

Trust: 0.1

db:PACKETSTORMid:56436

Trust: 0.1

sources: CERT/CC: VU#210876 // CERT/CC: VU#530057 // VULHUB: VHN-25823 // BID: 23763 // JVNDB: JVNDB-2007-000334 // PACKETSTORM: 56436 // CNNVD: CNNVD-200705-062 // NVD: CVE-2007-2461

REFERENCES

url:http://www.kb.cert.org/vuls/id/530057

Trust: 2.9

url:http://www.securityfocus.com/bid/23763

Trust: 2.5

url:http://www.cisco.com/en/us/products/products_security_response09186a0080833172.html

Trust: 1.8

url:http://www.osvdb.org/35330

Trust: 1.7

url:http://www.securitytracker.com/id?1017999

Trust: 1.7

url:http://www.securitytracker.com/id?1018000

Trust: 1.7

url:http://secunia.com/advisories/25109

Trust: 1.7

url:http://www.cisco.com/en/us/products/ps6120/index.html

Trust: 1.6

url:http://en.wikipedia.org/wiki/intrusion-prevention_system

Trust: 1.6

url:http://www.frsirt.com/english/advisories/2007/1635

Trust: 1.4

url:http://www.cisco.com/warp/public/707/cisco-sr-20070502-pix.shtml

Trust: 1.2

url:http://www.vupen.com/english/advisories/2007/1635

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/34026

Trust: 1.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20070502-asa.shtml

Trust: 0.9

url:http://secunia.com/advisories/25109/

Trust: 0.9

url:http://www.osvdb.org/35331

Trust: 0.8

url:http://www.cisco.com/pcgi-bin/support/bugtool/onebug.pl?bugid=cscsh50277

Trust: 0.8

url:http://www.cisco.com/en/us/products/ps6120/products_configuration_guide_chapter09186a0080636f31.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2461

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2461

Trust: 0.8

url:http://securitytracker.com/id?1018000

Trust: 0.8

url:http://securitytracker.com/id?1017999

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/34026

Trust: 0.6

url:http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://www.cisco.com/en/us/products/products_applied_intelligence_response09186a008083316f.html

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/210876

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

sources: CERT/CC: VU#210876 // CERT/CC: VU#530057 // VULHUB: VHN-25823 // BID: 23763 // JVNDB: JVNDB-2007-000334 // PACKETSTORM: 56436 // CNNVD: CNNVD-200705-062 // NVD: CVE-2007-2461

CREDITS

Lisa SittlerGrant Deffenbaugh

Trust: 0.6

sources: CNNVD: CNNVD-200705-062

SOURCES

db:CERT/CCid:VU#210876
db:CERT/CCid:VU#530057
db:VULHUBid:VHN-25823
db:BIDid:23763
db:JVNDBid:JVNDB-2007-000334
db:PACKETSTORMid:56436
db:CNNVDid:CNNVD-200705-062
db:NVDid:CVE-2007-2461

LAST UPDATE DATE

2024-11-23T22:43:22.873000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#210876date:2007-06-15T00:00:00
db:CERT/CCid:VU#530057date:2007-05-03T00:00:00
db:VULHUBid:VHN-25823date:2018-10-30T00:00:00
db:BIDid:23763date:2015-05-07T17:39:00
db:JVNDBid:JVNDB-2007-000334date:2007-05-24T00:00:00
db:CNNVDid:CNNVD-200705-062date:2007-05-03T00:00:00
db:NVDid:CVE-2007-2461date:2024-11-21T00:30:50.817

SOURCES RELEASE DATE

db:CERT/CCid:VU#210876date:2007-05-02T00:00:00
db:CERT/CCid:VU#530057date:2007-05-02T00:00:00
db:VULHUBid:VHN-25823date:2007-05-02T00:00:00
db:BIDid:23763date:2007-05-02T00:00:00
db:JVNDBid:JVNDB-2007-000334date:2007-05-24T00:00:00
db:PACKETSTORMid:56436date:2007-05-04T05:48:13
db:CNNVDid:CNNVD-200705-062date:2007-05-02T00:00:00
db:NVDid:CVE-2007-2461date:2007-05-02T22:19:00