ID

VAR-200710-0326


CVE

CVE-2007-5568


TITLE

Cisco Product MGCP Service disruption in packets (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-000782

DESCRIPTION

Cisco PIX and ASA appliances with 7.0 through 8.0 software, and Cisco Firewall Services Module (FWSM) 3.1(5) and earlier, allow remote attackers to cause a denial of service (device reload) via a crafted MGCP packet, aka CSCsi90468 (appliance) and CSCsi00694 (FWSM). (CSCsi90468 and CSCsi00694)Device restarted by third party, denial of service (DoS) There is a possibility of being put into a state. An attacker can exploit these issues to cause the affected devices to reload, denying service to legitimate users. Repeat attacks will result in a prolonged denial-of-service condition. MGCP messages are transported over the User Datagram Protocol (UDP), which allows specially crafted MGCP messages to be initiated from spoofed addresses. Only MGCP for gateway applications (MGCP communication on UDP port 2427) is affected. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. 1) An unspecified error exists within the handling of HTTPS packets. This can be exploited to reboot an affected FWSM by sending specially crafted HTTPS packets. Successful exploitation requires that the HTTPS server is enabled (disabled by default). The vulnerability is reported in versions 3.1 and 3.2. 2) An unspecified error exists within the handling of Media Gateway Control Protocol (MGCP) packets. This can be exploited to reboot the FWSM by sending specially crafted MGCP packets. Successful exploitation requires that the MGCP application layer protocol inspection is enabled (disabled by default). The vulnerability is reported in version 3.1. NOTE: An error when loading manipulated ACLs (Access Control Lists) is also reported. SOLUTION: Update to a fixed version (please see vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20071017-fwsm.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2007-5568 // JVNDB: JVNDB-2007-000782 // BID: 26104 // VULHUB: VHN-28930 // PACKETSTORM: 60221 // PACKETSTORM: 60216

AFFECTED PRODUCTS

vendor:ciscomodel:pix/asascope:eqversion:7.0

Trust: 1.1

vendor:ciscomodel:pix/asascope:eqversion:8.0

Trust: 1.1

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.7\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.15\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.16\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(4\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.10\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2.49\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.19\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(1\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(6.7\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2.5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0\(5.2\)

Trust: 1.0

vendor:ciscomodel:firewall services modulescope:lteversion:3.1\(5\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.4.3

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2.27\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.0.1.4

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.8\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1\(2.48\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.17\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(1.22\)

Trust: 1.0

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2\(2.14\)

Trust: 1.0

vendor:ciscomodel:firewall services modulescope:eqversion:3.1

Trust: 0.8

vendor:ciscomodel:pix/asascope:eqversion:7.1

Trust: 0.8

vendor:ciscomodel:pix/asascope:eqversion:7.2

Trust: 0.8

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.1\(2.49\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2\(1\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2\(2.15\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2\(2.16\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2\(2.17\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2\(2.14\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2\(2\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2\(2.19\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2\(2.10\)

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2\(1.22\)

Trust: 0.6

vendor:ciscomodel:pix/asascope:eqversion:7.0.4.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.1.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.8)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.7)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.19)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.17)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.16)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.15)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.14)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.10)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1.22)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.49)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.48)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.5)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.27)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(6.7)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(5.2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(5)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(2.24)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.1(2.55)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0(6.33)

Trust: 0.3

sources: BID: 26104 // JVNDB: JVNDB-2007-000782 // CNNVD: CNNVD-200710-368 // NVD: CVE-2007-5568

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-5568
value: HIGH

Trust: 1.0

NVD: CVE-2007-5568
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200710-368
value: HIGH

Trust: 0.6

VULHUB: VHN-28930
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-5568
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28930
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-28930 // JVNDB: JVNDB-2007-000782 // CNNVD: CNNVD-200710-368 // NVD: CVE-2007-5568

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-28930 // JVNDB: JVNDB-2007-000782 // NVD: CVE-2007-5568

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200710-368

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200710-368

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000782

PATCH

title:cisco-sa-20071017-asaurl:http://www.cisco.com/warp/public/707/cisco-sa-20071017-asa.shtml

Trust: 0.8

title:cisco-sa-20071017-fwsmurl:http://www.cisco.com/warp/public/707/cisco-sa-20071017-fwsm.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2007-000782

EXTERNAL IDS

db:BIDid:26104

Trust: 2.8

db:NVDid:CVE-2007-5568

Trust: 2.8

db:SECUNIAid:27236

Trust: 2.6

db:SECTRACKid:1018826

Trust: 2.5

db:SECTRACKid:1018827

Trust: 2.5

db:BIDid:26109

Trust: 2.5

db:SECUNIAid:27193

Trust: 1.8

db:SECTRACKid:1018825

Trust: 1.7

db:VUPENid:ADV-2007-3530

Trust: 1.7

db:VUPENid:ADV-2007-3531

Trust: 1.7

db:XFid:37259

Trust: 1.4

db:JVNDBid:JVNDB-2007-000782

Trust: 0.8

db:CISCOid:20071017 MULTIPLE VULNERABILITIES IN CISCO PIX AND ASA APPLIANCE

Trust: 0.6

db:CISCOid:20071017 MULTIPLE VULNERABILITIES IN FIREWALL SERVICES MODULE

Trust: 0.6

db:XFid:37257

Trust: 0.6

db:CNNVDid:CNNVD-200710-368

Trust: 0.6

db:VULHUBid:VHN-28930

Trust: 0.1

db:PACKETSTORMid:60221

Trust: 0.1

db:PACKETSTORMid:60216

Trust: 0.1

sources: VULHUB: VHN-28930 // BID: 26104 // JVNDB: JVNDB-2007-000782 // PACKETSTORM: 60221 // PACKETSTORM: 60216 // CNNVD: CNNVD-200710-368 // NVD: CVE-2007-5568

REFERENCES

url:http://www.securityfocus.com/bid/26104

Trust: 2.5

url:http://www.securityfocus.com/bid/26109

Trust: 2.5

url:http://secunia.com/advisories/27236

Trust: 2.5

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00808dda56.shtml

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00808dda61.shtml

Trust: 1.7

url:http://www.securitytracker.com/id?1018825

Trust: 1.7

url:http://www.securitytracker.com/id?1018826

Trust: 1.7

url:http://www.securitytracker.com/id?1018827

Trust: 1.7

url:http://secunia.com/advisories/27193

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/3531

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/37259

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/3530

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/3531

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/37259

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/37257

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5568

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5568

Trust: 0.8

url:http://securitytracker.com/alerts/2007/oct/1018826.html

Trust: 0.8

url:http://securitytracker.com/alerts/2007/oct/1018827.html

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/37257

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/3530

Trust: 0.6

url:http://www.cisco.com/warp/public/707/cisco-sa-20071017-asa.shtml

Trust: 0.4

url:http://www.cisco.com/

Trust: 0.3

url:/archive/1/482438

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/network_software_inspector/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:http://www.cisco.com/warp/public/707/cisco-sa-20071017-fwsm.shtml

Trust: 0.1

url:http://secunia.com/product/8614/

Trust: 0.1

url:http://secunia.com/advisories/27236/

Trust: 0.1

url:http://secunia.com/product/16163/

Trust: 0.1

url:http://secunia.com/advisories/27193/

Trust: 0.1

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://www.cisco.com/pcgi-bin/tablebuild.pl/asa?psrtdcat20e2

Trust: 0.1

url:http://secunia.com/product/16164/

Trust: 0.1

url:http://www.cisco.com/pcgi-bin/tablebuild.pl/pix?psrtdcat20e2

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

sources: VULHUB: VHN-28930 // BID: 26104 // JVNDB: JVNDB-2007-000782 // PACKETSTORM: 60221 // PACKETSTORM: 60216 // CNNVD: CNNVD-200710-368 // NVD: CVE-2007-5568

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200710-368

SOURCES

db:VULHUBid:VHN-28930
db:BIDid:26104
db:JVNDBid:JVNDB-2007-000782
db:PACKETSTORMid:60221
db:PACKETSTORMid:60216
db:CNNVDid:CNNVD-200710-368
db:NVDid:CVE-2007-5568

LAST UPDATE DATE

2024-11-23T22:19:38.090000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-28930date:2018-10-30T00:00:00
db:BIDid:26104date:2007-11-05T17:05:00
db:JVNDBid:JVNDB-2007-000782date:2007-10-26T00:00:00
db:CNNVDid:CNNVD-200710-368date:2007-10-22T00:00:00
db:NVDid:CVE-2007-5568date:2024-11-21T00:38:12.237

SOURCES RELEASE DATE

db:VULHUBid:VHN-28930date:2007-10-18T00:00:00
db:BIDid:26104date:2007-10-17T00:00:00
db:JVNDBid:JVNDB-2007-000782date:2007-10-26T00:00:00
db:PACKETSTORMid:60221date:2007-10-19T15:32:30
db:PACKETSTORMid:60216date:2007-10-19T15:32:30
db:CNNVDid:CNNVD-200710-368date:2007-10-18T00:00:00
db:NVDid:CVE-2007-5568date:2007-10-18T21:17:00