ID

VAR-200710-0329


CVE

CVE-2007-5571


TITLE

Cisco FWSM Vulnerabilities that can bypass network traffic restrictions

Trust: 0.8

sources: JVNDB: JVNDB-2007-002805

DESCRIPTION

Cisco Firewall Services Module (FWSM) 3.1(6), and 3.2(2) and earlier, does not properly enforce edited ACLs, which might allow remote attackers to bypass intended restrictions on network traffic, aka CSCsj52536. Three vulnerabilities were reported in total: 1. Specially crafted HTTPS may cause the FWSM to reload. If exploited repeatedly, this could cause a persistent denial of service. 2. Specially crafted MGCP packets may cause the FWSM to reload. If exploited repeatedly, this could cause a persistent denial of service. 3. Manipulating Access Control Entries (ACE) in the ACL via the command line or ASDM (Adaptive Security Device Manager) may inadvertently cause them to not be evaluated. This will corrupt ACLs. Cisco FWSM is a firewall service module on Cisco equipment. ACLs can be controlled through the command line interface or ASDM, including removing and re-adding ACEs. If the access list is controlled in this way, the internal structure of the ACL will be broken, causing FWSM to not evaluate some ACEs. Because the ACEs in the ACL are not evaluated, the ACL may allow traffic that would normally be denied, or deny traffic that would normally be allowed. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Cisco FWSM HTTPS/MGCP Packet Processing Denial of Service SECUNIA ADVISORY ID: SA27236 VERIFY ADVISORY: http://secunia.com/advisories/27236/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote SOFTWARE: Cisco Firewall Services Module (FWSM) 3.x http://secunia.com/product/8614/ DESCRIPTION: Cisco has acknowledged some vulnerabilities in Cisco Firewall Services Module (FWSM), which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An unspecified error exists within the handling of HTTPS packets. Successful exploitation requires that the HTTPS server is enabled (disabled by default). 2) An unspecified error exists within the handling of Media Gateway Control Protocol (MGCP) packets. Successful exploitation requires that the MGCP application layer protocol inspection is enabled (disabled by default). NOTE: An error when loading manipulated ACLs (Access Control Lists) is also reported. SOLUTION: Update to a fixed version (please see vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20071017-fwsm.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-5571 // JVNDB: JVNDB-2007-002805 // BID: 26109 // VULHUB: VHN-28933 // PACKETSTORM: 60221

AFFECTED PRODUCTS

vendor:ciscomodel:firewall services modulescope:lteversion:3.1\(6\)

Trust: 1.0

vendor:ciscomodel:firewall services modulescope:gteversion:3.1

Trust: 1.0

vendor:ciscomodel:firewall services modulescope:lteversion:3.2\(2\)

Trust: 1.0

vendor:ciscomodel:firewall services modulescope:gteversion:3.2

Trust: 1.0

vendor:ciscomodel:firewall services modulescope:eqversion:3.2(6)

Trust: 0.8

vendor:ciscomodel:firewall services modulescope:lteversion:3.2(2)

Trust: 0.8

vendor:ciscomodel:firewall services modulescope:eqversion:3.2\(2\)

Trust: 0.6

vendor:ciscomodel:firewall services modulescope:eqversion:3.1\(6\)

Trust: 0.6

vendor:ciscomodel:firewall services modulescope:eqversion:3.2(2)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(6)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(4)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(3.24)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(1.9)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(1.7)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(3.3)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(3.2)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(3.18)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(3.11)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1(3.1)

Trust: 0.3

vendor:ciscomodel:firewall services modulescope:eqversion:3.1

Trust: 0.3

sources: BID: 26109 // JVNDB: JVNDB-2007-002805 // CNNVD: CNNVD-200710-374 // NVD: CVE-2007-5571

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-5571
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-5571
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200710-374
value: MEDIUM

Trust: 0.6

VULHUB: VHN-28933
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-5571
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28933
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-28933 // JVNDB: JVNDB-2007-002805 // CNNVD: CNNVD-200710-374 // NVD: CVE-2007-5571

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-28933 // JVNDB: JVNDB-2007-002805 // NVD: CVE-2007-5571

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200710-374

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-200710-374

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-002805

PATCH

title:cisco-sa-20071017-fwsmurl:http://www.cisco.com/en/US/products/csa/cisco-sa-20071017-fwsm.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-002805

EXTERNAL IDS

db:NVDid:CVE-2007-5571

Trust: 2.8

db:BIDid:26109

Trust: 2.0

db:SECUNIAid:27236

Trust: 1.8

db:VUPENid:ADV-2007-3530

Trust: 1.7

db:SECTRACKid:1018825

Trust: 1.7

db:JVNDBid:JVNDB-2007-002805

Trust: 0.8

db:CNNVDid:CNNVD-200710-374

Trust: 0.6

db:VULHUBid:VHN-28933

Trust: 0.1

db:PACKETSTORMid:60221

Trust: 0.1

sources: VULHUB: VHN-28933 // BID: 26109 // JVNDB: JVNDB-2007-002805 // PACKETSTORM: 60221 // CNNVD: CNNVD-200710-374 // NVD: CVE-2007-5571

REFERENCES

url:http://www.securityfocus.com/bid/26109

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00808dda61.shtml

Trust: 1.7

url:http://www.securitytracker.com/id?1018825

Trust: 1.7

url:http://secunia.com/advisories/27236

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/3530

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/37258

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5571

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-5571

Trust: 0.8

url:http://www.cisco.com

Trust: 0.3

url:/archive/1/482436

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20071017-fwsm.shtml#@id

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20071017-fwsm.shtml

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/8614/

Trust: 0.1

url:http://secunia.com/advisories/27236/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-28933 // BID: 26109 // JVNDB: JVNDB-2007-002805 // PACKETSTORM: 60221 // CNNVD: CNNVD-200710-374 // NVD: CVE-2007-5571

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200710-374

SOURCES

db:VULHUBid:VHN-28933
db:BIDid:26109
db:JVNDBid:JVNDB-2007-002805
db:PACKETSTORMid:60221
db:CNNVDid:CNNVD-200710-374
db:NVDid:CVE-2007-5571

LAST UPDATE DATE

2024-11-23T22:19:38.176000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-28933date:2019-08-01T00:00:00
db:BIDid:26109date:2007-11-15T00:39:00
db:JVNDBid:JVNDB-2007-002805date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200710-374date:2019-08-02T00:00:00
db:NVDid:CVE-2007-5571date:2024-11-21T00:38:12.680

SOURCES RELEASE DATE

db:VULHUBid:VHN-28933date:2007-10-18T00:00:00
db:BIDid:26109date:2007-10-17T00:00:00
db:JVNDBid:JVNDB-2007-002805date:2012-06-26T00:00:00
db:PACKETSTORMid:60221date:2007-10-19T15:32:30
db:CNNVDid:CNNVD-200710-374date:2007-10-18T00:00:00
db:NVDid:CVE-2007-5571date:2007-10-18T21:17:00