ID

VAR-200806-0199


CVE

CVE-2008-2059


TITLE

Cisco PIX/ASA Control plane at ACL Vulnerability to avoid

Trust: 0.8

sources: JVNDB: JVNDB-2008-001425

DESCRIPTION

Cisco Adaptive Security Appliance (ASA) and Cisco PIX security appliance 8.0.x before 8.0(3)9 allows remote attackers to bypass control-plane ACLs for the device via unknown vectors. Cisco PIX and Cisco ASA are prone to multiple denial-of-service vulnerabilities and an unauthorized-access vulnerability. An attacker can exploit these issues to bypass ACL lists and to cause an affected device to reboot or crash. Control-plane ACLs are used to secure traffic sent to security devices. 1) An unspecified error in the processing of TCP ACK packets can be exploited to cause a DoS by sending a specially crafted packet to an affected device. This vulnerability affects software versions 7.1.x, 7.2.x, and 8.0.x. 2) An unspecified error in the handling of the TLS protocol can be exploited to cause an affected device to reload by sending a specially crafted TLS packet to an affected device. This vulnerability affects software version 8.0.x and 8.1.x. 3) An unspecified error in the Instant Messaging Inspection can be exploited to cause a DoS. Successful exploitation requires that Instant Messaging Inspection is enabled. This vulnerability affects software versions 7.2.x, 8.0.x, and 8.1.x. 4) An unspecified error can be exploited to cause an affected system to reload via specially crafted network traffic (e.g. by certain vulnerability / port scanners) to TCP port 443. This vulnerability affects software versions 7.2.x and 8.0.x. 5) An unspecified error causes the control-plane access control lists (ACL) to not work properly, which can be exploited to bypass configured control-plane ACLs. This vulnerability affects software versions 8.0.x. NOTE: Depending on the configuration some of the vulnerabilities are exploitable via the outside interface (please see the vendor's advisory for more information). SOLUTION: Update to fixed versions (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-2059 // JVNDB: JVNDB-2008-001425 // BID: 29541 // VULHUB: VHN-32184 // PACKETSTORM: 67053

AFFECTED PRODUCTS

vendor:ciscomodel:pix security appliancescope:eqversion:8.0

Trust: 1.6

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:8.0

Trust: 1.6

vendor:ciscomodel:pix/asascope:eqversion:8.0

Trust: 1.1

vendor:ciscomodel:adaptive security appliancescope:eqversion:8.0

Trust: 0.6

vendor:ciscomodel:pix/asascope:eqversion:7.2(3)006

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0.4.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.5)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(4)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.15)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.0.1.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.27)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.17)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.16)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(2)17

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.24)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.1(1)1

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.14)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1.22)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(3)10

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.0(3)9

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.2(3)2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.7)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.8)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:8.0(3)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.49)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:8.1(1)2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.19)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.55)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.10)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.48)

Trust: 0.3

vendor:ciscomodel:pix/asascope:neversion:7.1(2)70

Trust: 0.3

sources: BID: 29541 // JVNDB: JVNDB-2008-001425 // CNNVD: CNNVD-200806-073 // NVD: CVE-2008-2059

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2059
value: HIGH

Trust: 1.0

NVD: CVE-2008-2059
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200806-073
value: HIGH

Trust: 0.6

VULHUB: VHN-32184
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-2059
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-32184
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-32184 // JVNDB: JVNDB-2008-001425 // CNNVD: CNNVD-200806-073 // NVD: CVE-2008-2059

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-32184 // JVNDB: JVNDB-2008-001425 // NVD: CVE-2008-2059

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200806-073

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200806-073

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001425

PATCH

title:cisco-sa-20080604-asaurl:http://www.cisco.com/en/US/products/products_security_advisory09186a00809a8354.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2008-001425

EXTERNAL IDS

db:NVDid:CVE-2008-2059

Trust: 2.8

db:SECUNIAid:30552

Trust: 2.6

db:SECTRACKid:1020185

Trust: 2.5

db:SECTRACKid:1020184

Trust: 2.5

db:VUPENid:ADV-2008-1750

Trust: 1.7

db:JVNDBid:JVNDB-2008-001425

Trust: 0.8

db:CNNVDid:CNNVD-200806-073

Trust: 0.7

db:CISCOid:20080604 MULTIPLE VULNERABILITIES IN CISCO PIX AND CISCO ASA

Trust: 0.6

db:XFid:42841

Trust: 0.6

db:BIDid:29541

Trust: 0.3

db:VULHUBid:VHN-32184

Trust: 0.1

db:PACKETSTORMid:67053

Trust: 0.1

sources: VULHUB: VHN-32184 // BID: 29541 // JVNDB: JVNDB-2008-001425 // PACKETSTORM: 67053 // CNNVD: CNNVD-200806-073 // NVD: CVE-2008-2059

REFERENCES

url:http://www.securitytracker.com/id?1020184

Trust: 2.5

url:http://www.securitytracker.com/id?1020185

Trust: 2.5

url:http://secunia.com/advisories/30552

Trust: 2.5

url:http://www.cisco.com/en/us/products/products_security_advisory09186a00809a8354.shtml

Trust: 2.1

url:http://www.vupen.com/english/advisories/2008/1750/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/42841

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2059

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/1750

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-2059

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/42841

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/1750/references

Trust: 0.6

url:http://www.cisco.com/en/us/products/products_applied_mitigation_bulletin09186a00809a8359.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

url:/archive/1/493078

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/16163/

Trust: 0.1

url:http://secunia.com/product/6102/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/advisories/30552/

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://secunia.com/product/16164/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/6115/

Trust: 0.1

sources: VULHUB: VHN-32184 // BID: 29541 // JVNDB: JVNDB-2008-001425 // PACKETSTORM: 67053 // CNNVD: CNNVD-200806-073 // NVD: CVE-2008-2059

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200806-073

SOURCES

db:VULHUBid:VHN-32184
db:BIDid:29541
db:JVNDBid:JVNDB-2008-001425
db:PACKETSTORMid:67053
db:CNNVDid:CNNVD-200806-073
db:NVDid:CVE-2008-2059

LAST UPDATE DATE

2024-11-23T21:48:33.619000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-32184date:2018-10-30T00:00:00
db:BIDid:29541date:2008-06-04T00:00:00
db:JVNDBid:JVNDB-2008-001425date:2008-06-30T00:00:00
db:CNNVDid:CNNVD-200806-073date:2008-09-11T00:00:00
db:NVDid:CVE-2008-2059date:2024-11-21T00:45:59.407

SOURCES RELEASE DATE

db:VULHUBid:VHN-32184date:2008-06-04T00:00:00
db:BIDid:29541date:2008-06-04T00:00:00
db:JVNDBid:JVNDB-2008-001425date:2008-06-30T00:00:00
db:PACKETSTORMid:67053date:2008-06-06T22:51:33
db:CNNVDid:CNNVD-200806-073date:2008-06-04T00:00:00
db:NVDid:CVE-2008-2059date:2008-06-04T21:32:00