ID

VAR-200806-0197


CVE

CVE-2008-2057


TITLE

Cisco PIX/ASA of Instant Messenger (IM) Service disruption in the audit engine (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-001423

DESCRIPTION

The Instant Messenger (IM) inspection engine in Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(4), 8.0.x before 8.0(3)10, and 8.1.x before 8.1(1)2 allows remote attackers to cause a denial of service via a crafted packet. Cisco PIX and Cisco ASA are prone to multiple denial-of-service vulnerabilities and an unauthorized-access vulnerability. An attacker can exploit these issues to bypass ACL lists and to cause an affected device to reboot or crash. Cisco ASA and Cisco PIX IM inspection engines are used to apply fine-grained control over IM usage in the network. 1) An unspecified error in the processing of TCP ACK packets can be exploited to cause a DoS by sending a specially crafted packet to an affected device. This vulnerability affects software versions 7.1.x, 7.2.x, and 8.0.x. 2) An unspecified error in the handling of the TLS protocol can be exploited to cause an affected device to reload by sending a specially crafted TLS packet to an affected device. This vulnerability affects software version 8.0.x and 8.1.x. 3) An unspecified error in the Instant Messaging Inspection can be exploited to cause a DoS. Successful exploitation requires that Instant Messaging Inspection is enabled. This vulnerability affects software versions 7.2.x, 8.0.x, and 8.1.x. 4) An unspecified error can be exploited to cause an affected system to reload via specially crafted network traffic (e.g. by certain vulnerability / port scanners) to TCP port 443. This vulnerability affects software versions 7.2.x and 8.0.x. 5) An unspecified error causes the control-plane access control lists (ACL) to not work properly, which can be exploited to bypass configured control-plane ACLs. This vulnerability affects software versions 8.0.x. NOTE: Depending on the configuration some of the vulnerabilities are exploitable via the outside interface (please see the vendor's advisory for more information). SOLUTION: Update to fixed versions (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-2057 // JVNDB: JVNDB-2008-001423 // BID: 29541 // VULHUB: VHN-32182 // PACKETSTORM: 67053

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.2

Trust: 1.6

vendor:ciscomodel:pix security appliancescope:eqversion:7.2

Trust: 1.6

vendor:ciscomodel:pix security appliancescope:eqversion:8.0

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0

Trust: 1.6

vendor:ciscomodel:pix/asascope:eqversion:8.1

Trust: 1.1

vendor:ciscomodel:pix/asascope:eqversion:8.0

Trust: 1.1

vendor:ciscomodel:pix/asascope:eqversion:7.2

Trust: 0.8

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2

Trust: 0.6

vendor:ciscomodel:pix/asascope:eqversion:7.2(3)006

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0.4.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.5)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(4)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.15)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0.1.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.27)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.17)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.16)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(2)17

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.24)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.1(1)1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.14)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1.22)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(3)10

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(3)9

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(3)2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.7)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.8)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(3)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.49)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.1(1)2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.19)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.55)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.10)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.48)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.1(2)70

Trust: 0.3

sources: BID: 29541 // JVNDB: JVNDB-2008-001423 // CNNVD: CNNVD-200806-071 // NVD: CVE-2008-2057

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2057
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-2057
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200806-071
value: MEDIUM

Trust: 0.6

VULHUB: VHN-32182
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-2057
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-32182
severity: MEDIUM
baseScore: 5.4
vectorString: AV:N/AC:H/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-32182 // JVNDB: JVNDB-2008-001423 // CNNVD: CNNVD-200806-071 // NVD: CVE-2008-2057

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2008-2057

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200806-071

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200806-071

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001423

PATCH

title:cisco-sa-20080604-asaurl:http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2008-001423

EXTERNAL IDS

db:NVDid:CVE-2008-2057

Trust: 2.8

db:SECUNIAid:30552

Trust: 2.6

db:SECTRACKid:1020181

Trust: 2.5

db:SECTRACKid:1020180

Trust: 2.5

db:VUPENid:ADV-2008-1750

Trust: 1.7

db:XFid:42837

Trust: 1.4

db:JVNDBid:JVNDB-2008-001423

Trust: 0.8

db:CISCOid:20080604 MULTIPLE VULNERABILITIES IN CISCO PIX AND CISCO ASA

Trust: 0.6

db:CNNVDid:CNNVD-200806-071

Trust: 0.6

db:BIDid:29541

Trust: 0.3

db:VULHUBid:VHN-32182

Trust: 0.1

db:PACKETSTORMid:67053

Trust: 0.1

sources: VULHUB: VHN-32182 // BID: 29541 // JVNDB: JVNDB-2008-001423 // PACKETSTORM: 67053 // CNNVD: CNNVD-200806-071 // NVD: CVE-2008-2057

REFERENCES

url:http://secunia.com/advisories/30552

Trust: 2.5

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00809a8354.shtml

Trust: 2.1

url:http://securitytracker.com/id?1020180

Trust: 1.7

url:http://securitytracker.com/id?1020181

Trust: 1.7

url:http://xforce.iss.net/xforce/xfdb/42837

Trust: 1.4

url:http://www.vupen.com/english/advisories/2008/1750/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/42837

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2057

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/1750

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-2057

Trust: 0.8

url:http://www.securitytracker.com/id?1020181

Trust: 0.8

url:http://www.securitytracker.com/id?1020180

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/1750/references

Trust: 0.6

url:http://www.cisco.com/en/us/products/products_applied_mitigation_bulletin09186a00809a8359.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

url:/archive/1/493078

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/16163/

Trust: 0.1

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/advisories/30552/

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://secunia.com/product/16164/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

sources: VULHUB: VHN-32182 // BID: 29541 // JVNDB: JVNDB-2008-001423 // PACKETSTORM: 67053 // CNNVD: CNNVD-200806-071 // NVD: CVE-2008-2057

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200806-071

SOURCES

db:VULHUBid:VHN-32182
db:BIDid:29541
db:JVNDBid:JVNDB-2008-001423
db:PACKETSTORMid:67053
db:CNNVDid:CNNVD-200806-071
db:NVDid:CVE-2008-2057

LAST UPDATE DATE

2024-11-23T21:48:33.501000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-32182date:2018-10-30T00:00:00
db:BIDid:29541date:2008-06-04T00:00:00
db:JVNDBid:JVNDB-2008-001423date:2008-06-30T00:00:00
db:CNNVDid:CNNVD-200806-071date:2008-09-05T00:00:00
db:NVDid:CVE-2008-2057date:2024-11-21T00:45:59.200

SOURCES RELEASE DATE

db:VULHUBid:VHN-32182date:2008-06-04T00:00:00
db:BIDid:29541date:2008-06-04T00:00:00
db:JVNDBid:JVNDB-2008-001423date:2008-06-30T00:00:00
db:PACKETSTORMid:67053date:2008-06-06T22:51:33
db:CNNVDid:CNNVD-200806-071date:2008-06-04T00:00:00
db:NVDid:CVE-2008-2057date:2008-06-04T21:32:00