ID

VAR-200809-0012


CVE

CVE-2008-2441


TITLE

Cisco Secure ACS In EAP-Response Packet processing vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2008-002001

DESCRIPTION

Cisco Secure ACS 3.x before 3.3(4) Build 12 patch 7, 4.0.x, 4.1.x before 4.1(4) Build 13 Patch 11, and 4.2.x before 4.2(0) Build 124 Patch 4 does not properly handle an EAP Response packet in which the value of the length field exceeds the actual packet length, which allows remote authenticated users to cause a denial of service (CSRadius and CSAuth service crash) or possibly execute arbitrary code via a crafted RADIUS (1) EAP-Response/Identity, (2) EAP-Response/MD5, or (3) EAP-Response/TLS Message Attribute packet. Provided by Cisco Systems Cisco Secure ACS There is a service disruption (DoS) Vulnerabilities and arbitrary code execution vulnerabilities. Also illegal RADIUS (1) EAP-Response/Identity (2) EAP-Response/MD5 (3) EAP-Response/TLS May cause arbitrary code execution.Please refer to the “Overview” for the impact of this vulnerability. Cisco Secure ACS is prone to a denial-of-service vulnerability because it fails to properly validate user-supplied input. An attacker can exploit this issue to crash the CSRadius and CSAuth processes, denying service to legitimate users. Given the nature of this issue, the attacker may also be able to run arbitrary code, but this has not been confirmed. This vulnerability is documented in Cisco bug ID CSCsq10103. This bug may be triggered if the length field of an EAP-Response packet has a certain big value, greater than the real packet length. Any EAP-Response can trigger this bug: EAP-Response/Identity, EAP-Response/MD5, EAP-Response/TLS... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ * For example, the following packet will trigger the vulnerability and crash CSRadius.exe: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 2 | 0 | 0xdddd | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | 1 | abcd +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Attack Impact: -------------- * Denial-of-service and possibly remote arbitrary code execution Attack Vector: -------------- * Have access as a RADIUS client (knowing or guessing the RADIUS shared secret) or from an unauthenticated wireless device if the access point relays malformed EAP frames Timeline: --------- * 2008-05-05 - Vulnerability reported to Cisco * 2008-05-05 - Cisco acknowledged the notification * 2008-05-05 - PoC sent to Cisco * 2008-05-13 - Cisco confirmed the issue * 2008-09-03 - Coordinated public release of advisory Credits: -------- * This vulnerability was discovered by Gabriel Campana and Laurent Butti from France Telecom / Orange . SOLUTION: Apply patches. Please see the vendor advisory for details. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cisco Security Response: Cisco Secure ACS Denial Of Service Vulnerability http://www.cisco.com/warp/public/707/cisco-sr-20080903-csacs.shtml Revision 1.0 ============ For Public Release 2008 September 03 1600 UTC (GMT) Cisco Response ============== This is the Cisco PSIRT response to the statements made by Laurent Butti and Gabriel Campana of Orange Labs / France Telecom Group, in their advisory: "Cisco Secure ACS EAP Parsing Vulnerability". Because this affects CSAuth all authentication requests via RADIUS or TACACS+ will be affected during exploitation of this vulnerability. Cisco ACS installations that are configured with AAA Clients to authenticate using TACACS+ only are not affected by this vulnerability. The RADIUS shared secret and a valid known Network Access Server (NAS) IP address must be known to carry out this exploit. The Cisco PSIRT team greatly appreciates the opportunity to work with researchers on security vulnerabilities, and we welcome the opportunity to review and assist in product reports. We thank Laurent Butti and Gabriel Campana of Orange Labs / France Telecom Group for reporting this vulnerability to Cisco PSIRT. Software patches are available for customers with support contracts and should be obtained through their regular support channels. The upgrade to fixed software is not a free upgrade. See Software Versions and Fixes section within this advisory for further information on obtaining fixed software. It is the integration and control layer for managing enterprise network users, administrators, and the resources of the network infrastructure. Described in RFC2865, RADIUS is a distributed client/server system that secures networks against unauthorized access. In the Cisco implementation, RADIUS clients run on Cisco devices and send authentication requests to a central RADIUS server (Cisco Secure ACS) that contains all user authentication and network service access information. Described in RFC3748, EAP is an authentication framework that supports multiple authentication methods. Typically, EAP runs directly over data link layers, such as Point-to-Point Protocol (PPP) or IEEE 802, without requiring IP. A specially crafted RADIUS EAP Message Attribute packet will crash the CSRadius and CSAuth services. An error message will be indicated in the Windows event viewer - System Log indicating "The CSAuth service terminated unexpectedly" and "The CSRadius service terminated unexpectedly". In the Cisco ACS Reports and Activity tab, under ACS Service Monitoring, the logs will indicate CSAuth is not running and attempts to restart. The CSRadius service handles communication between the service for authentication and authorization (CSAuth service) and the access device requesting the authentication and authorization services for RADIUS. In many cases continued exploitation will prevent network access to devices which first require authentication or authorization via the AAA Server. Software Versions and Fixes +-------------------------- When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution. In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center (TAC) or your contracted maintenance provider for assistance. +--------------------------------------------------------+ | Affected | First Fixed Release | | Release | | |------------+-------------------------------------------| | 3.X.Y | Release 3.3(4) Build 12 patch 7 or later | |------------+-------------------------------------------| | 4.0.X | Vulnerable; Contact TAC | |------------+-------------------------------------------| | 4.1.X | Release 4.1(4) Build 13 Patch 11 or later | |------------+-------------------------------------------| | 4.2.X | Release 4.2(0) Build 124 Patch 4 or later | +--------------------------------------------------------+ The fixed software for Cisco Secure ACS for Windows (ACS) can be downloaded from: http://www.cisco.com/cgi-bin/tablebuild.pl/acs-win-3des The fixed software for Cisco Secure ACS Solution Engine (ACSE) can be downloaded from: http://www.cisco.com/pcgi-bin/tablebuild.pl/acs-soleng-3des?psrtdcat20e2 The first fixed release files names are indicated below: +-----------------------------------------------------------+ | | 3.x cumulative patch | 4.1 cumulative patch | |----------+-----------------------+------------------------+ | CS ACS | | | | for | Acs-3.3.4.12.7-SW.zip | Acs-4.1.4.13.11-SW.zip | | Windows | | | |----------+-----------------------+------------------------+ | CS ACS | | | | Solution | applAcs-3.3.4.12.7.zip| applAcs_4.1.4.13.11.zip| | Engine | | | +-----------------------------------------------------------+ +------------------------------------+ | | 4.2 cumulative patch | |----------+-------------------------| | CS ACS | | | for | ACS-4.2.0.124.4-SW.zip | | Windows | | |----------+-------------------------| | CS ACS | | | Solution | applAcs_4.2.0.124.4.zip | | Engine | | +------------------------------------+ THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. Revision History ================ +-------------------------------------------------------------+ | Revision 1.0 | 2008-September-03 | Initial Public Release. | +-------------------------------------------------------------+ Cisco Security Procedures ========================= Complete information on reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco, is available on Cisco's worldwide website at http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html This includes instructions for press inquiries regarding Cisco security notices. All Cisco security advisories are available at http://www.cisco.com/go/psir -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (Darwin) iEYEARECAAYFAki+vfsACgkQ86n/Gc8U/uA10wCff/HycCGi+SD6hm5g82Hi9WD0 X54AnikxZGx5tHDzpdsRfHNqEAb2qATD =kaFk -----END PGP SIGNATURE-----

Trust: 2.25

sources: NVD: CVE-2008-2441 // JVNDB: JVNDB-2008-002001 // BID: 30997 // VULHUB: VHN-32566 // PACKETSTORM: 69602 // PACKETSTORM: 69655 // PACKETSTORM: 69603

AFFECTED PRODUCTS

vendor:ciscomodel:secure acsscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:secure access control serverscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:secure access control server softwarescope:eqversion:3

Trust: 0.8

vendor:ciscomodel:secure access control server softwarescope:eqversion:4.0

Trust: 0.8

vendor:ciscomodel:secure access control server softwarescope:eqversion:4.1

Trust: 0.8

vendor:ciscomodel:secure access control server softwarescope:eqversion:4.2

Trust: 0.8

vendor:ciscomodel:secure access control serverscope: - version: -

Trust: 0.6

vendor:ciscomodel:secure acsscope: - version: -

Trust: 0.6

vendor:ciscomodel:secure acs for windowsscope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:secure acs buildscope:eqversion:4.1(1)23

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:4.0.1

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.3.2

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.3.1

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.3(1)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.3

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2.2

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2.1

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2(3)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2(2)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2(1.20)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2(1)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:ciscosecure acs for windowsscope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:ciscosecure acs for windowsscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows build patscope:neversion:4.2(0)124

Trust: 0.3

vendor:ciscomodel:secure acs for windows build patcscope:neversion:4.1(4)13

Trust: 0.3

vendor:ciscomodel:secure acs for windows build patcscope:neversion:3.3(4)12

Trust: 0.3

sources: BID: 30997 // JVNDB: JVNDB-2008-002001 // CNNVD: CNNVD-200809-049 // NVD: CVE-2008-2441

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2441
value: HIGH

Trust: 1.0

NVD: CVE-2008-2441
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200809-049
value: HIGH

Trust: 0.6

VULHUB: VHN-32566
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-2441
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-32566
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-32566 // JVNDB: JVNDB-2008-002001 // CNNVD: CNNVD-200809-049 // NVD: CVE-2008-2441

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-noinfo

Trust: 0.8

sources: VULHUB: VHN-32566 // JVNDB: JVNDB-2008-002001 // NVD: CVE-2008-2441

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 69602 // PACKETSTORM: 69603 // CNNVD: CNNVD-200809-049

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200809-049

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-002001

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-32566

PATCH

title:cisco-sr-20080903-csacsurl:http://www.cisco.com/warp/public/707/cisco-sr-20080903-csacs.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2008-002001

EXTERNAL IDS

db:NVDid:CVE-2008-2441

Trust: 3.0

db:SREASONid:4216

Trust: 1.7

db:SECTRACKid:1020814

Trust: 1.7

db:BIDid:30997

Trust: 1.4

db:SECUNIAid:31731

Trust: 1.2

db:JVNDBid:JVNDB-2008-002001

Trust: 0.8

db:BUGTRAQid:20080903 CISCO SECURE ACS EAP PARSING VULNERABILITY

Trust: 0.6

db:CISCOid:20080903 CISCO SECURITY RESPONSE: CISCO SECURE ACS DENIAL OF SERVICE VULNERABILITY

Trust: 0.6

db:CNNVDid:CNNVD-200809-049

Trust: 0.6

db:PACKETSTORMid:69602

Trust: 0.2

db:PACKETSTORMid:69603

Trust: 0.2

db:VULHUBid:VHN-32566

Trust: 0.1

db:PACKETSTORMid:69655

Trust: 0.1

sources: VULHUB: VHN-32566 // BID: 30997 // JVNDB: JVNDB-2008-002001 // PACKETSTORM: 69602 // PACKETSTORM: 69655 // PACKETSTORM: 69603 // CNNVD: CNNVD-200809-049 // NVD: CVE-2008-2441

REFERENCES

url:http://www.cisco.com/warp/public/707/cisco-sr-20080903-csacs.shtml

Trust: 2.2

url:http://www.securitytracker.com/id?1020814

Trust: 1.7

url:http://securityreason.com/securityalert/4216

Trust: 1.7

url:http://www.securityfocus.com/bid/30997

Trust: 1.1

url:http://www.securityfocus.com/archive/1/495937/100/0/threaded

Trust: 1.1

url:http://secunia.com/advisories/31731

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/44871

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2441

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-2441

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/495937/100/0/threaded

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:/archive/1/495952

Trust: 0.3

url:/archive/1/495937

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2008-2441

Trust: 0.2

url:http://secunia.com/product/10635/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/31731/

Trust: 0.1

url:http://secunia.com/product/4206/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/product/679/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://archives.neohapsis.com/archives/bugtraq/2008-09/0033.html

Trust: 0.1

url:http://secunia.com/product/13658/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.cisco.com/cgi-bin/tablebuild.pl/acs-win-3des

Trust: 0.1

url:http://www.cisco.com/go/psirt

Trust: 0.1

url:http://www.cisco.com/go/psir

Trust: 0.1

url:http://www.securityfocus.com/archive/1/495937/30/0/threaded

Trust: 0.1

url:http://www.cisco.com/pcgi-bin/tablebuild.pl/acs-soleng-3des?psrtdcat20e2

Trust: 0.1

url:http://www.cisco.com/en/us/products/products_security_vulnerability_policy.html

Trust: 0.1

sources: VULHUB: VHN-32566 // BID: 30997 // JVNDB: JVNDB-2008-002001 // PACKETSTORM: 69602 // PACKETSTORM: 69655 // PACKETSTORM: 69603 // CNNVD: CNNVD-200809-049 // NVD: CVE-2008-2441

CREDITS

Laurent Butti※ laurent.butti@orange-ftgroup.com

Trust: 0.6

sources: CNNVD: CNNVD-200809-049

SOURCES

db:VULHUBid:VHN-32566
db:BIDid:30997
db:JVNDBid:JVNDB-2008-002001
db:PACKETSTORMid:69602
db:PACKETSTORMid:69655
db:PACKETSTORMid:69603
db:CNNVDid:CNNVD-200809-049
db:NVDid:CVE-2008-2441

LAST UPDATE DATE

2024-11-23T23:03:12.850000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-32566date:2018-10-11T00:00:00
db:BIDid:30997date:2008-09-03T19:45:00
db:JVNDBid:JVNDB-2008-002001date:2008-12-19T00:00:00
db:CNNVDid:CNNVD-200809-049date:2009-01-29T00:00:00
db:NVDid:CVE-2008-2441date:2024-11-21T00:46:53.480

SOURCES RELEASE DATE

db:VULHUBid:VHN-32566date:2008-09-04T00:00:00
db:BIDid:30997date:2008-09-03T00:00:00
db:JVNDBid:JVNDB-2008-002001date:2008-12-19T00:00:00
db:PACKETSTORMid:69602date:2008-09-03T21:30:13
db:PACKETSTORMid:69655date:2008-09-05T15:36:36
db:PACKETSTORMid:69603date:2008-09-03T21:31:51
db:CNNVDid:CNNVD-200809-049date:2008-09-04T00:00:00
db:NVDid:CVE-2008-2441date:2008-09-04T16:41:00