ID

VAR-200801-0305


CVE

CVE-2008-0324


TITLE

Cisco Systems VPN Client IPSec Driver (CVPNDRVA.sys) Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-002035

DESCRIPTION

Cisco Systems VPN Client IPSec Driver (CVPNDRVA.sys) 5.0.02.0090 allows local users to cause a denial of service (crash) by calling the 0x80002038 IOCTL with a small size value, which triggers memory corruption. Successfully exploiting this issue allows local attackers to crash affected computers, denying further service to legitimate users. This issue affects 'cvpndrva.sys' 5.0.02.0090; other versions of the driver may also be affected. Cisco VPN Client is a set of cross-platform VPN client software from Cisco. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. This can be exploited to cause a memory corruption within kernel space by sending specially crafted IOCTLs to the affected driver, resulting in a system crash. The vulnerability is reported in CVPNDRVA.sys version 5.0.02.0090. SOLUTION: Restrict access to trusted users. PROVIDED AND/OR DISCOVERED BY: mu-b, Digit-Labs ORIGINAL ADVISORY: http://milw0rm.com/exploits/4911 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-0324 // JVNDB: JVNDB-2008-002035 // BID: 27289 // VULHUB: VHN-30449 // PACKETSTORM: 62733

AFFECTED PRODUCTS

vendor:ciscomodel:vpn clientscope:eqversion:5.0.2.0090

Trust: 2.4

vendor:ciscomodel:vpn client for windowsscope:eqversion:5.0.2.0090

Trust: 0.3

sources: BID: 27289 // JVNDB: JVNDB-2008-002035 // CNNVD: CNNVD-200801-261 // NVD: CVE-2008-0324

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0324
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-0324
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200801-261
value: MEDIUM

Trust: 0.6

VULHUB: VHN-30449
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-0324
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-30449
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-30449 // JVNDB: JVNDB-2008-002035 // CNNVD: CNNVD-200801-261 // NVD: CVE-2008-0324

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-30449 // JVNDB: JVNDB-2008-002035 // NVD: CVE-2008-0324

THREAT TYPE

local

Trust: 1.0

sources: BID: 27289 // PACKETSTORM: 62733 // CNNVD: CNNVD-200801-261

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200801-261

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-002035

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-30449

PATCH

title:Top Pageurl:http://cisco.com/

Trust: 0.8

sources: JVNDB: JVNDB-2008-002035

EXTERNAL IDS

db:NVDid:CVE-2008-0324

Trust: 2.8

db:BIDid:27289

Trust: 2.0

db:SECUNIAid:28472

Trust: 1.9

db:EXPLOIT-DBid:4911

Trust: 1.8

db:VUPENid:ADV-2008-0170

Trust: 1.7

db:SECTRACKid:1019240

Trust: 1.7

db:JVNDBid:JVNDB-2008-002035

Trust: 0.8

db:XFid:39694

Trust: 0.6

db:MILW0RMid:4911

Trust: 0.6

db:CNNVDid:CNNVD-200801-261

Trust: 0.6

db:VULHUBid:VHN-30449

Trust: 0.1

db:PACKETSTORMid:62733

Trust: 0.1

sources: VULHUB: VHN-30449 // BID: 27289 // JVNDB: JVNDB-2008-002035 // PACKETSTORM: 62733 // CNNVD: CNNVD-200801-261 // NVD: CVE-2008-0324

REFERENCES

url:http://www.securityfocus.com/bid/27289

Trust: 1.7

url:http://www.securitytracker.com/id?1019240

Trust: 1.7

url:http://secunia.com/advisories/28472

Trust: 1.7

url:https://www.exploit-db.com/exploits/4911

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/0170

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/39694

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0324

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0324

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/39694

Trust: 0.6

url:http://www.milw0rm.com/exploits/4911

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/0170

Trust: 0.6

url:http://www.cisco.com/en/us/products/sw/secursw/ps2308/index.html

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/14325/

Trust: 0.1

url:http://milw0rm.com/exploits/4911

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/28472/

Trust: 0.1

sources: VULHUB: VHN-30449 // BID: 27289 // JVNDB: JVNDB-2008-002035 // PACKETSTORM: 62733 // CNNVD: CNNVD-200801-261 // NVD: CVE-2008-0324

CREDITS

mu-b mu-b@digit-labs.org

Trust: 0.6

sources: CNNVD: CNNVD-200801-261

SOURCES

db:VULHUBid:VHN-30449
db:BIDid:27289
db:JVNDBid:JVNDB-2008-002035
db:PACKETSTORMid:62733
db:CNNVDid:CNNVD-200801-261
db:NVDid:CVE-2008-0324

LAST UPDATE DATE

2024-11-23T22:19:36.637000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-30449date:2017-09-29T00:00:00
db:BIDid:27289date:2015-05-07T17:33:00
db:JVNDBid:JVNDB-2008-002035date:2008-12-19T00:00:00
db:CNNVDid:CNNVD-200801-261date:2008-09-05T00:00:00
db:NVDid:CVE-2008-0324date:2024-11-21T00:41:39.947

SOURCES RELEASE DATE

db:VULHUBid:VHN-30449date:2008-01-17T00:00:00
db:BIDid:27289date:2008-01-15T00:00:00
db:JVNDBid:JVNDB-2008-002035date:2008-12-19T00:00:00
db:PACKETSTORMid:62733date:2008-01-18T08:50:24
db:CNNVDid:CNNVD-200801-261date:2008-01-16T00:00:00
db:NVDid:CVE-2008-0324date:2008-01-17T03:00:00