ID

VAR-200806-0196


CVE

CVE-2008-2056


TITLE

Cisco PIX/ASA of TLS Service disruption in packet processing (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-001422

DESCRIPTION

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 8.0.x before 8.0(3)9 and 8.1.x before 8.1(1)1 allows remote attackers to cause a denial of service (device reload) via a crafted Transport Layer Security (TLS) packet to the device interface. Cisco PIX and Cisco ASA are prone to multiple denial-of-service vulnerabilities and an unauthorized-access vulnerability. An attacker can exploit these issues to bypass ACL lists and to cause an affected device to reboot or crash. Only packets sent to the device, not through the device, can trigger this vulnerability. 1) An unspecified error in the processing of TCP ACK packets can be exploited to cause a DoS by sending a specially crafted packet to an affected device. This vulnerability affects software versions 7.1.x, 7.2.x, and 8.0.x. 2) An unspecified error in the handling of the TLS protocol can be exploited to cause an affected device to reload by sending a specially crafted TLS packet to an affected device. This vulnerability affects software version 8.0.x and 8.1.x. 3) An unspecified error in the Instant Messaging Inspection can be exploited to cause a DoS. Successful exploitation requires that Instant Messaging Inspection is enabled. This vulnerability affects software versions 7.2.x, 8.0.x, and 8.1.x. 4) An unspecified error can be exploited to cause an affected system to reload via specially crafted network traffic (e.g. by certain vulnerability / port scanners) to TCP port 443. This vulnerability affects software versions 7.2.x and 8.0.x. 5) An unspecified error causes the control-plane access control lists (ACL) to not work properly, which can be exploited to bypass configured control-plane ACLs. This vulnerability affects software versions 8.0.x. NOTE: Depending on the configuration some of the vulnerabilities are exploitable via the outside interface (please see the vendor's advisory for more information). SOLUTION: Update to fixed versions (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-2056 // JVNDB: JVNDB-2008-001422 // BID: 29541 // VULHUB: VHN-32181 // PACKETSTORM: 67053

AFFECTED PRODUCTS

vendor:ciscomodel:pix security appliancescope:eqversion:8.1

Trust: 1.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.1

Trust: 1.6

vendor:ciscomodel:pix security appliancescope:eqversion:8.0

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0

Trust: 1.6

vendor:ciscomodel:pix/asascope:eqversion:8.1

Trust: 1.1

vendor:ciscomodel:pix/asascope:eqversion:8.0

Trust: 1.1

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0

Trust: 0.6

vendor:ciscomodel:pix/asascope:eqversion:7.2(3)006

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0.4.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.5)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(4)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.15)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0.1.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.27)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.17)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.16)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(2)17

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.24)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.1(1)1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.14)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1.22)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(3)10

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(3)9

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(3)2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.7)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.8)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(3)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.49)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.1(1)2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.19)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.55)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.10)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.48)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.1(2)70

Trust: 0.3

sources: BID: 29541 // JVNDB: JVNDB-2008-001422 // CNNVD: CNNVD-200806-070 // NVD: CVE-2008-2056

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2056
value: HIGH

Trust: 1.0

NVD: CVE-2008-2056
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200806-070
value: HIGH

Trust: 0.6

VULHUB: VHN-32181
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-2056
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-32181
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-32181 // JVNDB: JVNDB-2008-001422 // CNNVD: CNNVD-200806-070 // NVD: CVE-2008-2056

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-32181 // JVNDB: JVNDB-2008-001422 // NVD: CVE-2008-2056

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200806-070

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200806-070

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001422

PATCH

title:cisco-sa-20080604-asaurl:http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2008-001422

EXTERNAL IDS

db:NVDid:CVE-2008-2056

Trust: 2.8

db:SECUNIAid:30552

Trust: 2.6

db:SECTRACKid:1020178

Trust: 2.5

db:SECTRACKid:1020179

Trust: 2.5

db:VUPENid:ADV-2008-1750

Trust: 1.7

db:XFid:42836

Trust: 1.4

db:JVNDBid:JVNDB-2008-001422

Trust: 0.8

db:CISCOid:20080604 MULTIPLE VULNERABILITIES IN CISCO PIX AND CISCO ASA

Trust: 0.6

db:CNNVDid:CNNVD-200806-070

Trust: 0.6

db:BIDid:29541

Trust: 0.3

db:VULHUBid:VHN-32181

Trust: 0.1

db:PACKETSTORMid:67053

Trust: 0.1

sources: VULHUB: VHN-32181 // BID: 29541 // JVNDB: JVNDB-2008-001422 // PACKETSTORM: 67053 // CNNVD: CNNVD-200806-070 // NVD: CVE-2008-2056

REFERENCES

url:http://www.securitytracker.com/id?1020178

Trust: 2.5

url:http://www.securitytracker.com/id?1020179

Trust: 2.5

url:http://secunia.com/advisories/30552

Trust: 2.5

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00809a8354.shtml

Trust: 2.1

url:http://xforce.iss.net/xforce/xfdb/42836

Trust: 1.4

url:http://www.vupen.com/english/advisories/2008/1750/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/42836

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2056

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/1750

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-2056

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/1750/references

Trust: 0.6

url:http://www.cisco.com/en/us/products/products_applied_mitigation_bulletin09186a00809a8359.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

url:/archive/1/493078

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/16163/

Trust: 0.1

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/advisories/30552/

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://secunia.com/product/16164/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

sources: VULHUB: VHN-32181 // BID: 29541 // JVNDB: JVNDB-2008-001422 // PACKETSTORM: 67053 // CNNVD: CNNVD-200806-070 // NVD: CVE-2008-2056

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200806-070

SOURCES

db:VULHUBid:VHN-32181
db:BIDid:29541
db:JVNDBid:JVNDB-2008-001422
db:PACKETSTORMid:67053
db:CNNVDid:CNNVD-200806-070
db:NVDid:CVE-2008-2056

LAST UPDATE DATE

2024-11-23T21:48:33.581000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-32181date:2018-10-30T00:00:00
db:BIDid:29541date:2008-06-04T00:00:00
db:JVNDBid:JVNDB-2008-001422date:2008-06-30T00:00:00
db:CNNVDid:CNNVD-200806-070date:2008-09-05T00:00:00
db:NVDid:CVE-2008-2056date:2024-11-21T00:45:59.083

SOURCES RELEASE DATE

db:VULHUBid:VHN-32181date:2008-06-04T00:00:00
db:BIDid:29541date:2008-06-04T00:00:00
db:JVNDBid:JVNDB-2008-001422date:2008-06-30T00:00:00
db:PACKETSTORMid:67053date:2008-06-06T22:51:33
db:CNNVDid:CNNVD-200806-070date:2008-06-04T00:00:00
db:NVDid:CVE-2008-2056date:2008-06-04T21:32:00