ID

VAR-200806-0198


CVE

CVE-2008-2058


TITLE

Cisco PIX/ASA Service disruption in the processing of port scans (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-001424

DESCRIPTION

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 7.2.x before 7.2(3)2 and 8.0.x before 8.0(2)17 allows remote attackers to cause a denial of service (device reload) via a port scan against TCP port 443 on the device. interferes with service operation (DoS) There is a possibility of being put into a state. Cisco PIX and Cisco ASA are prone to multiple denial-of-service vulnerabilities and an unauthorized-access vulnerability. An attacker can exploit these issues to bypass ACL lists and to cause an affected device to reboot or crash. Certain vulnerability/port scanners can cause system overloads. 1) An unspecified error in the processing of TCP ACK packets can be exploited to cause a DoS by sending a specially crafted packet to an affected device. This vulnerability affects software versions 7.1.x, 7.2.x, and 8.0.x. 2) An unspecified error in the handling of the TLS protocol can be exploited to cause an affected device to reload by sending a specially crafted TLS packet to an affected device. This vulnerability affects software version 8.0.x and 8.1.x. 3) An unspecified error in the Instant Messaging Inspection can be exploited to cause a DoS. Successful exploitation requires that Instant Messaging Inspection is enabled. This vulnerability affects software versions 7.2.x, 8.0.x, and 8.1.x. 4) An unspecified error can be exploited to cause an affected system to reload via specially crafted network traffic (e.g. by certain vulnerability / port scanners) to TCP port 443. This vulnerability affects software versions 7.2.x and 8.0.x. 5) An unspecified error causes the control-plane access control lists (ACL) to not work properly, which can be exploited to bypass configured control-plane ACLs. This vulnerability affects software versions 8.0.x. NOTE: Depending on the configuration some of the vulnerabilities are exploitable via the outside interface (please see the vendor's advisory for more information). SOLUTION: Update to fixed versions (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-2058 // JVNDB: JVNDB-2008-001424 // BID: 29541 // VULHUB: VHN-32183 // PACKETSTORM: 67053

AFFECTED PRODUCTS

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:7.2.2

Trust: 1.6

vendor:ciscomodel:pix security appliancescope:eqversion:7.2

Trust: 1.6

vendor:ciscomodel:pix security appliancescope:eqversion:8.0

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0

Trust: 1.6

vendor:ciscomodel:pix/asascope:eqversion:8.1

Trust: 1.1

vendor:ciscomodel:pix/asascope:eqversion:8.0

Trust: 1.1

vendor:ciscomodel:pix/asascope:eqversion:7.2

Trust: 0.8

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0

Trust: 0.6

vendor:ciscomodel:adaptive security appliancescope:eqversion:7.2

Trust: 0.6

vendor:ciscomodel:pix/asascope:eqversion:7.2(3)006

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0.4.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.5)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(4)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.15)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0.1.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.27)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.17)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.16)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(2)17

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.24)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.1(1)1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.14)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1.22)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(3)10

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(3)9

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(3)2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.7)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.8)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(3)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.49)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.1(1)2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.19)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.55)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.10)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.48)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.1(2)70

Trust: 0.3

sources: BID: 29541 // JVNDB: JVNDB-2008-001424 // CNNVD: CNNVD-200806-072 // NVD: CVE-2008-2058

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2058
value: HIGH

Trust: 1.0

NVD: CVE-2008-2058
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200806-072
value: HIGH

Trust: 0.6

VULHUB: VHN-32183
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-2058
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-32183
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-32183 // JVNDB: JVNDB-2008-001424 // CNNVD: CNNVD-200806-072 // NVD: CVE-2008-2058

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-32183 // JVNDB: JVNDB-2008-001424 // NVD: CVE-2008-2058

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200806-072

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200806-072

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001424

PATCH

title:cisco-sa-20080604-asaurl:http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2008-001424

EXTERNAL IDS

db:NVDid:CVE-2008-2058

Trust: 2.8

db:SECUNIAid:30552

Trust: 2.6

db:SECTRACKid:1020182

Trust: 2.5

db:SECTRACKid:1020183

Trust: 2.5

db:VUPENid:ADV-2008-1750

Trust: 1.7

db:JVNDBid:JVNDB-2008-001424

Trust: 0.8

db:CISCOid:20080604 MULTIPLE VULNERABILITIES IN CISCO PIX AND CISCO ASA

Trust: 0.6

db:CNNVDid:CNNVD-200806-072

Trust: 0.6

db:BIDid:29541

Trust: 0.3

db:VULHUBid:VHN-32183

Trust: 0.1

db:PACKETSTORMid:67053

Trust: 0.1

sources: VULHUB: VHN-32183 // BID: 29541 // JVNDB: JVNDB-2008-001424 // PACKETSTORM: 67053 // CNNVD: CNNVD-200806-072 // NVD: CVE-2008-2058

REFERENCES

url:http://secunia.com/advisories/30552

Trust: 2.5

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00809a8354.shtml

Trust: 2.1

url:http://securitytracker.com/id?1020182

Trust: 1.7

url:http://securitytracker.com/id?1020183

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/1750/references

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2058

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/1750

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-2058

Trust: 0.8

url:http://www.securitytracker.com/id?1020183

Trust: 0.8

url:http://www.securitytracker.com/id?1020182

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/1750/references

Trust: 0.6

url:http://www.cisco.com/en/us/products/products_applied_mitigation_bulletin09186a00809a8359.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

url:/archive/1/493078

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/16163/

Trust: 0.1

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/advisories/30552/

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://secunia.com/product/16164/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

sources: VULHUB: VHN-32183 // BID: 29541 // JVNDB: JVNDB-2008-001424 // PACKETSTORM: 67053 // CNNVD: CNNVD-200806-072 // NVD: CVE-2008-2058

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200806-072

SOURCES

db:VULHUBid:VHN-32183
db:BIDid:29541
db:JVNDBid:JVNDB-2008-001424
db:PACKETSTORMid:67053
db:CNNVDid:CNNVD-200806-072
db:NVDid:CVE-2008-2058

LAST UPDATE DATE

2024-11-23T21:48:33.654000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-32183date:2018-10-30T00:00:00
db:BIDid:29541date:2008-06-04T00:00:00
db:JVNDBid:JVNDB-2008-001424date:2008-06-30T00:00:00
db:CNNVDid:CNNVD-200806-072date:2008-09-05T00:00:00
db:NVDid:CVE-2008-2058date:2024-11-21T00:45:59.307

SOURCES RELEASE DATE

db:VULHUBid:VHN-32183date:2008-06-04T00:00:00
db:BIDid:29541date:2008-06-04T00:00:00
db:JVNDBid:JVNDB-2008-001424date:2008-06-30T00:00:00
db:PACKETSTORMid:67053date:2008-06-06T22:51:33
db:CNNVDid:CNNVD-200806-072date:2008-06-04T00:00:00
db:NVDid:CVE-2008-2058date:2008-06-04T21:32:00