ID

VAR-200710-0327


CVE

CVE-2007-5569


TITLE

Cisco Product TLS Service disruption in packets (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-000783

DESCRIPTION

Cisco PIX and ASA appliances with 7.1 and 7.2 software, when configured for TLS sessions to the device, allow remote attackers to cause a denial of service (device reload) via a crafted TLS packet, aka CSCsg43276 and CSCsh97120. (CSCsg43276 and CSCsh97120)Device restarted by third party, denial of service (DoS) There is a possibility of being put into a state. An attacker can exploit these issues to cause the affected devices to reload, denying service to legitimate users. Repeat attacks will result in a prolonged denial-of-service condition. PIX is a firewall device that provides policy enforcement, multi-vector attack protection and secure connection services for users and applications; Adaptive Security Appliance (ASA) is a modular platform that provides security and VPN services. PIX and ASA security appliances rely on TLS to protect the confidentiality of communications in all situations. This vulnerability is only possible with clientless WebVPN connections, HTTPS management sessions, pass-through proxies for web access, and TLS proxies for encrypted voice inspection. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. 1) An unspecified error exists within the handling of Transport Layer Security (TLS) packets. This can be exploited to reload an affected device by sending specially crafted TLS packets. 2) An unspecified error exists within the handling of Media Gateway Control Protocol (MGCP) packets. This can be exploited to reload an affected device by sending specially crafted MGCP packets. Successful exploitation of this vulnerability requires that the MGCP application layer protocol inspection is enabled (disabled by default). SOLUTION: Apply updates (please see the vendor's advisory for details). PIX: http://www.cisco.com/pcgi-bin/tablebuild.pl/pix?psrtdcat20e2 ASA: http://www.cisco.com/pcgi-bin/tablebuild.pl/asa?psrtdcat20e2 PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20071017-asa.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-5569 // JVNDB: JVNDB-2007-000783 // BID: 26104 // VULHUB: VHN-28931 // PACKETSTORM: 60216

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.1

Trust: 1.6

vendor:ciscomodel:pix 500scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:pix/asascope:eqversion:7.1

Trust: 0.8

vendor:ciscomodel:pix/asascope:eqversion:7.2

Trust: 0.8

vendor:ciscomodel:pix 500scope:eqversion:7.2_software

Trust: 0.6

vendor:ciscomodel:pix 500scope:eqversion:7.1_software

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.1

Trust: 0.6

vendor:ciscomodel:pix/asascope:eqversion:7.0.4.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.1.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.8)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.7)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.19)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.17)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.16)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.15)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.14)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.10)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1.22)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.49)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.48)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.5)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.27)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(6.7)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(5.2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(5)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(2.24)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.1(2.55)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0(6.33)

Trust: 0.3

sources: BID: 26104 // JVNDB: JVNDB-2007-000783 // CNNVD: CNNVD-200710-390 // NVD: CVE-2007-5569

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-5569
value: HIGH

Trust: 1.0

NVD: CVE-2007-5569
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200710-390
value: HIGH

Trust: 0.6

VULHUB: VHN-28931
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-5569
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28931
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-28931 // JVNDB: JVNDB-2007-000783 // CNNVD: CNNVD-200710-390 // NVD: CVE-2007-5569

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-28931 // JVNDB: JVNDB-2007-000783 // NVD: CVE-2007-5569

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200710-390

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200710-390

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000783

PATCH

title:cisco-sa-20071017-asaurl:http://www.cisco.com/warp/public/707/cisco-sa-20071017-asa.shtml

Trust: 0.8

title:cisco-sa-20071017-fwsmurl:http://www.cisco.com/warp/public/707/cisco-sa-20071017-fwsm.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2007-000783

EXTERNAL IDS

db:NVDid:CVE-2007-5569

Trust: 2.8

db:BIDid:26104

Trust: 2.8

db:SECUNIAid:27193

Trust: 2.6

db:SECTRACKid:1018826

Trust: 2.5

db:SECTRACKid:1018827

Trust: 2.5

db:VUPENid:ADV-2007-3531

Trust: 1.7

db:XFid:37260

Trust: 1.4

db:JVNDBid:JVNDB-2007-000783

Trust: 0.8

db:CISCOid:20071017 MULTIPLE VULNERABILITIES IN CISCO PIX AND ASA APPLIANCE

Trust: 0.6

db:CNNVDid:CNNVD-200710-390

Trust: 0.6

db:VULHUBid:VHN-28931

Trust: 0.1

db:PACKETSTORMid:60216

Trust: 0.1

sources: VULHUB: VHN-28931 // BID: 26104 // JVNDB: JVNDB-2007-000783 // PACKETSTORM: 60216 // CNNVD: CNNVD-200710-390 // NVD: CVE-2007-5569

REFERENCES

url:http://www.securityfocus.com/bid/26104

Trust: 2.5

url:http://secunia.com/advisories/27193

Trust: 2.5

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00808dda56.shtml

Trust: 1.7

url:http://www.securitytracker.com/id?1018826

Trust: 1.7

url:http://www.securitytracker.com/id?1018827

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/3531

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/37260

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/3531

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/37260

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5569

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5569

Trust: 0.8

url:http://securitytracker.com/alerts/2007/oct/1018827.html

Trust: 0.8

url:http://securitytracker.com/alerts/2007/oct/1018826.html

Trust: 0.8

url:http://www.cisco.com/warp/public/707/cisco-sa-20071017-asa.shtml

Trust: 0.4

url:http://www.cisco.com/

Trust: 0.3

url:/archive/1/482438

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/16163/

Trust: 0.1

url:http://secunia.com/advisories/27193/

Trust: 0.1

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://www.cisco.com/pcgi-bin/tablebuild.pl/asa?psrtdcat20e2

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/16164/

Trust: 0.1

url:http://www.cisco.com/pcgi-bin/tablebuild.pl/pix?psrtdcat20e2

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

sources: VULHUB: VHN-28931 // BID: 26104 // JVNDB: JVNDB-2007-000783 // PACKETSTORM: 60216 // CNNVD: CNNVD-200710-390 // NVD: CVE-2007-5569

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200710-390

SOURCES

db:VULHUBid:VHN-28931
db:BIDid:26104
db:JVNDBid:JVNDB-2007-000783
db:PACKETSTORMid:60216
db:CNNVDid:CNNVD-200710-390
db:NVDid:CVE-2007-5569

LAST UPDATE DATE

2024-11-23T22:19:38.221000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-28931date:2018-10-30T00:00:00
db:BIDid:26104date:2007-11-05T17:05:00
db:JVNDBid:JVNDB-2007-000783date:2007-10-26T00:00:00
db:CNNVDid:CNNVD-200710-390date:2007-10-22T00:00:00
db:NVDid:CVE-2007-5569date:2024-11-21T00:38:12.400

SOURCES RELEASE DATE

db:VULHUBid:VHN-28931date:2007-10-18T00:00:00
db:BIDid:26104date:2007-10-17T00:00:00
db:JVNDBid:JVNDB-2007-000783date:2007-10-26T00:00:00
db:PACKETSTORMid:60216date:2007-10-19T15:32:30
db:CNNVDid:CNNVD-200710-390date:2007-10-18T00:00:00
db:NVDid:CVE-2007-5569date:2007-10-18T21:17:00