ID

VAR-200809-0041


CVE

CVE-2008-3807


TITLE

Cisco uBR10012 Runs on series devices Cisco IOS of SNMP Service community name vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2008-001766

DESCRIPTION

Cisco IOS 12.2 and 12.3 on Cisco uBR10012 series devices, when linecard redundancy is configured, enables a read/write SNMP service with "private" as the community, which allows remote attackers to obtain administrative access by guessing this community and sending SNMP requests. Cisco uBR10012 routers are high-performance network devices. The routers are prone to a weak default configuration issue. A remote attacker may exploit this issue to gain complete access to the vulnerable device. Cisco uBR10012 routers are vulnerable. This issue is being tracked by Cisco bug ID CSCek57932. ---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Cisco IOS Multiple Vulnerabilities SECUNIA ADVISORY ID: SA31990 VERIFY ADVISORY: http://secunia.com/advisories/31990/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From remote OPERATING SYSTEM: Cisco IOS R12.x http://secunia.com/advisories/product/50/ Cisco IOS 12.x http://secunia.com/advisories/product/182/ DESCRIPTION: Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or to compromise a vulnerable system. 1) An unspecified error exists in the processing of SSL packets during the termination of an SSL session, which can potentially be exploited to crash an affected system. 2) Two unspecified errors exist within the processing of Protocol Independent Multicast (PIM) packets, which can be exploited to cause an affected device to reload. 3) Unspecified errors within the processing of segmented Skinny Call Control Protocol (SCCP) messages can be exploited to cause a Cisco IOS device to reload. Successful exploitation requires that the device is configured with Network Address Translation (NAT) SCCP Fragmentation Support. 4) A memory leak in the processing of Session Initiation Protocol (SIP) messages can be exploited to cause a DoS for all voice services. 5) Multiple unspecified errors exist in the processing of SIP messages, which can be exploited to cause a reload of an affected device. 6) An unspecified error in the IOS Intrusion Prevention System (IPS) feature when processing certain IPS signatures that use the SERVICE.DNS engine can be exploited to cause a DoS via specially crafted network traffic. 7) A security issue exists in the processing of extended communities with Multi Protocol Label Switching (MPLS) Virtual Private Networks (VPN), which can lead to traffic leaking from one MPLS VPN to another. This security issue does not affect Cisco IOS releases based on 12.1. NOTE: This security issue was introduced with CSCee83237. Cisco IOS images that do not include CSCee83237 are reportedly not affected. 8) An unspecified error within the Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) can be exploited to cause a DoS via specially crafted network packets. Successful exploitation requires access to the MPLS network. 9) An unspecified error within the Application Inspection Control (AIC) can be exploited to cause a reload of an affected device via specially crafted HTTP packets. 10) An unspecified error in the processing of Layer 2 Tunneling Protocol (L2TP) packets can be exploited to cause an affected device to reload via a specially crafted L2TP packets. Successful exploitation requires that the L2TP mgmt daemon process is running. This process may be enabled e.g. via Layer 2 virtual private networks (L2VPN), Layer 2 Tunnel Protocol Version 3 (L2TPv3), Stack Group Bidding Protocol (SGBP), or Cisco Virtual Private Dial-Up Networks (VPDN). 11) An unspecified error exists in the processing of IPC messages. This can be exploited to reload an affected device via a specially crafted UDP packet sent to port 1975. 12) A security issue is caused due to the device automatically enabling SNMP with a default community string, which can be exploited to gain control an affected system. Successful exploitation requires that a device is configured for linecard redundancy. This vulnerability affects Cisco uBR10012 series devices running IOS. SOLUTION: Update to the fixed version (please see the vendor's advisories for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-multicast.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-sccp.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-vpn.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-mfi.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosfw.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-l2tp.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-ipc.shtml http://www.cisco.com/warp/public/707/cisco-sa-20080924-ubr.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2008-3807 // JVNDB: JVNDB-2008-001766 // BID: 31355 // VULHUB: VHN-33932 // VULMON: CVE-2008-3807 // PACKETSTORM: 70347

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.2xf

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2bc

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2cy

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2cx

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.3bc

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.8

vendor:ciscomodel:ubrscope:eqversion:100120

Trust: 0.3

sources: BID: 31355 // JVNDB: JVNDB-2008-001766 // CNNVD: CNNVD-200809-374 // NVD: CVE-2008-3807

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-3807
value: HIGH

Trust: 1.0

NVD: CVE-2008-3807
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200809-374
value: CRITICAL

Trust: 0.6

VULHUB: VHN-33932
value: HIGH

Trust: 0.1

VULMON: CVE-2008-3807
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-3807
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2008-3807
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:P/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-33932
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-33932 // VULMON: CVE-2008-3807 // JVNDB: JVNDB-2008-001766 // CNNVD: CNNVD-200809-374 // NVD: CVE-2008-3807

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-16

Trust: 0.9

sources: VULHUB: VHN-33932 // JVNDB: JVNDB-2008-001766 // NVD: CVE-2008-3807

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200809-374

TYPE

configuration error

Trust: 0.6

sources: CNNVD: CNNVD-200809-374

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001766

PATCH

title:cisco-amb-20080924-ipc-and-ubrurl:http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a01522.html

Trust: 0.8

title:cisco-sa-20080924-ubrurl:http://www.cisco.com/en/US/products/products_security_advisory09186a0080a014b1.shtml

Trust: 0.8

title:Cisco uBR10012 router default SNMP Fixes for Community String Vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=194936

Trust: 0.6

sources: JVNDB: JVNDB-2008-001766 // CNNVD: CNNVD-200809-374

EXTERNAL IDS

db:NVDid:CVE-2008-3807

Trust: 2.9

db:SECUNIAid:31990

Trust: 2.7

db:SECTRACKid:1020941

Trust: 1.7

db:VUPENid:ADV-2008-2670

Trust: 1.7

db:BIDid:31355

Trust: 1.2

db:JVNDBid:JVNDB-2008-001766

Trust: 0.8

db:CNNVDid:CNNVD-200809-374

Trust: 0.6

db:VULHUBid:VHN-33932

Trust: 0.1

db:VUPENid:2008/2670

Trust: 0.1

db:VULMONid:CVE-2008-3807

Trust: 0.1

db:PACKETSTORMid:70347

Trust: 0.1

sources: VULHUB: VHN-33932 // VULMON: CVE-2008-3807 // BID: 31355 // JVNDB: JVNDB-2008-001766 // PACKETSTORM: 70347 // CNNVD: CNNVD-200809-374 // NVD: CVE-2008-3807

REFERENCES

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080a014b1.shtml

Trust: 1.8

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5452

Trust: 1.8

url:http://www.securitytracker.com/id?1020941

Trust: 1.8

url:http://secunia.com/advisories/31990

Trust: 1.8

url:http://www.vupen.com/english/advisories/2008/2670

Trust: 1.8

url:http://secunia.com/advisories/31990/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3807

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/2670

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3807

Trust: 0.8

url:http://www.securityfocus.com/bid/31355

Trust: 0.8

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-ubr.shtml

Trust: 0.4

url:http://www.cisco.com

Trust: 0.3

url:/archive/1/496709

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/16.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=16634

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml

Trust: 0.1

url:http://secunia.com/advisories/product/182/

Trust: 0.1

url:http://secunia.com/advisories/product/50/

Trust: 0.1

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-sccp.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-vpn.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-l2tp.shtml

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosfw.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-multicast.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-mfi.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-ipc.shtml

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-33932 // VULMON: CVE-2008-3807 // BID: 31355 // JVNDB: JVNDB-2008-001766 // PACKETSTORM: 70347 // CNNVD: CNNVD-200809-374 // NVD: CVE-2008-3807

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200809-374

SOURCES

db:VULHUBid:VHN-33932
db:VULMONid:CVE-2008-3807
db:BIDid:31355
db:JVNDBid:JVNDB-2008-001766
db:PACKETSTORMid:70347
db:CNNVDid:CNNVD-200809-374
db:NVDid:CVE-2008-3807

LAST UPDATE DATE

2024-11-23T21:48:23.650000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-33932date:2017-09-29T00:00:00
db:VULMONid:CVE-2008-3807date:2017-09-29T00:00:00
db:BIDid:31355date:2008-09-24T19:49:00
db:JVNDBid:JVNDB-2008-001766date:2008-10-24T00:00:00
db:CNNVDid:CNNVD-200809-374date:2022-06-08T00:00:00
db:NVDid:CVE-2008-3807date:2024-11-21T00:50:10.567

SOURCES RELEASE DATE

db:VULHUBid:VHN-33932date:2008-09-26T00:00:00
db:VULMONid:CVE-2008-3807date:2008-09-26T00:00:00
db:BIDid:31355date:2008-09-24T00:00:00
db:JVNDBid:JVNDB-2008-001766date:2008-10-24T00:00:00
db:PACKETSTORMid:70347date:2008-09-25T23:06:17
db:CNNVDid:CNNVD-200809-374date:2008-09-26T00:00:00
db:NVDid:CVE-2008-3807date:2008-09-26T16:21:44.237