ID

VAR-200807-0291


CVE

CVE-2008-3149


TITLE

F5 FirePass SSL VPN SNMP Daemon Remote Denial of Service Vulnerability

Trust: 0.9

sources: BID: 30090 // CNNVD: CNNVD-200807-201

DESCRIPTION

The SNMP daemon in the F5 FirePass 1200 6.0.2 hotfix 3 allows remote attackers to cause a denial of service (daemon crash) by walking the hrSWInstalled OID branch in HOST-RESOURCES-MIB. FirePass is prone to a denial-of-service vulnerability in the SNMP daemon. An attacker can exploit this issue to cause the affected application to crash, resulting in a denial-of-service condition. F5 FirePass SSL VPN devices allow users to securely connect to critical business applications. ---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: F5 FirePass 1200 SSL VPN SNMP Denial of Service SECUNIA ADVISORY ID: SA30965 VERIFY ADVISORY: http://secunia.com/advisories/30965/ CRITICAL: Less critical IMPACT: DoS WHERE: >From local network OPERATING SYSTEM: FirePass 5.x http://secunia.com/product/4695/ FirePass 6.x http://secunia.com/product/13146/ DESCRIPTION: nnposter has reported a vulnerability in F5 FirePass 1200 SSL VPN, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error when traversing certain OID branches (e.g. hrSWInstalled in HOST-RESOURCES-MIB / OID 1.3.6.1.2.1.25.6) and can be exploited to crash the daemon. The vulnerability is reported in version 6.0.2 hotfix 3. Other versions may also be affected. PROVIDED AND/OR DISCOVERED BY: nnposter ORIGINAL ADVISORY: http://archives.neohapsis.com/archives/bugtraq/2008-07/0037.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-3149 // JVNDB: JVNDB-2008-003242 // BID: 30090 // VULHUB: VHN-33274 // PACKETSTORM: 67936

AFFECTED PRODUCTS

vendor:f5model:firepass 1200scope:eqversion:6.0.2

Trust: 1.6

vendor:f5model:firepass 1200scope:eqversion:6.0.2 hotfix 3

Trust: 0.8

vendor:f5model:firepassscope:eqversion:6.0.2.3

Trust: 0.3

vendor:f5model:firepassscope:eqversion:1200

Trust: 0.3

sources: BID: 30090 // JVNDB: JVNDB-2008-003242 // CNNVD: CNNVD-200807-201 // NVD: CVE-2008-3149

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-3149
value: HIGH

Trust: 1.0

NVD: CVE-2008-3149
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200807-201
value: HIGH

Trust: 0.6

VULHUB: VHN-33274
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-3149
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-33274
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-33274 // JVNDB: JVNDB-2008-003242 // CNNVD: CNNVD-200807-201 // NVD: CVE-2008-3149

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-33274 // JVNDB: JVNDB-2008-003242 // NVD: CVE-2008-3149

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200807-201

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-200807-201

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-003242

PATCH

title:Top Pageurl:http://www.f5.com/products/firepass/

Trust: 0.8

sources: JVNDB: JVNDB-2008-003242

EXTERNAL IDS

db:NVDid:CVE-2008-3149

Trust: 2.8

db:BIDid:30090

Trust: 2.0

db:SECUNIAid:30965

Trust: 1.8

db:SREASONid:3985

Trust: 1.7

db:JVNDBid:JVNDB-2008-003242

Trust: 0.8

db:BUGTRAQid:20080704 F5 FIREPASS 1200 SNMP DAEMON DOS

Trust: 0.6

db:XFid:43670

Trust: 0.6

db:CNNVDid:CNNVD-200807-201

Trust: 0.6

db:VULHUBid:VHN-33274

Trust: 0.1

db:PACKETSTORMid:67936

Trust: 0.1

sources: VULHUB: VHN-33274 // BID: 30090 // JVNDB: JVNDB-2008-003242 // PACKETSTORM: 67936 // CNNVD: CNNVD-200807-201 // NVD: CVE-2008-3149

REFERENCES

url:http://www.securityfocus.com/bid/30090

Trust: 1.7

url:http://secunia.com/advisories/30965

Trust: 1.7

url:http://securityreason.com/securityalert/3985

Trust: 1.7

url:http://www.securityfocus.com/archive/1/493950/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43670

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3149

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3149

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/43670

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/493950/100/0/threaded

Trust: 0.6

url:http://f5.com/products/firepass/

Trust: 0.3

url:/archive/1/493950

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/30965/

Trust: 0.1

url:http://secunia.com/product/4695/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://archives.neohapsis.com/archives/bugtraq/2008-07/0037.html

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://secunia.com/product/13146/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-33274 // BID: 30090 // JVNDB: JVNDB-2008-003242 // PACKETSTORM: 67936 // CNNVD: CNNVD-200807-201 // NVD: CVE-2008-3149

CREDITS

nnposter※ nnposter@disclosed.not

Trust: 0.6

sources: CNNVD: CNNVD-200807-201

SOURCES

db:VULHUBid:VHN-33274
db:BIDid:30090
db:JVNDBid:JVNDB-2008-003242
db:PACKETSTORMid:67936
db:CNNVDid:CNNVD-200807-201
db:NVDid:CVE-2008-3149

LAST UPDATE DATE

2024-11-23T22:14:43.360000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-33274date:2018-10-11T00:00:00
db:BIDid:30090date:2015-05-07T17:27:00
db:JVNDBid:JVNDB-2008-003242date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200807-201date:2009-05-14T00:00:00
db:NVDid:CVE-2008-3149date:2024-11-21T00:48:33.863

SOURCES RELEASE DATE

db:VULHUBid:VHN-33274date:2008-07-11T00:00:00
db:BIDid:30090date:2008-07-04T00:00:00
db:JVNDBid:JVNDB-2008-003242date:2012-06-26T00:00:00
db:PACKETSTORMid:67936date:2008-07-10T00:15:42
db:CNNVDid:CNNVD-200807-201date:2008-07-11T00:00:00
db:NVDid:CVE-2008-3149date:2008-07-11T19:41:00