ID

VAR-200902-0481


CVE

CVE-2009-0062


TITLE

plural Cisco Wireless LAN Elevation of privilege vulnerability in products

Trust: 0.8

sources: JVNDB: JVNDB-2009-001345

DESCRIPTION

Unspecified vulnerability in the Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.2.173.0 allows remote authenticated users to gain privileges via unknown vectors, as demonstrated by escalation from the (1) Lobby Admin and (2) Local Management User privilege levels. Multiple Cisco Wireless LAN Controllers are prone to these remote vulnerabilities: - Multiple denial-of-service vulnerabilities - A remote privilege-escalation vulnerability Remote attackers can exploit these issues to gain administrative rights on an affected device or crash the device, denying service to legitimate users. 1) An unspecified error can be exploited to reload the device or to render the web authentication functionality unusable. 2) An error when processing POST requests sent to the web authentication login.html page can be exploited to trigger a device reload. The vulnerabilities affect Wireless LAN Controller software versions 4.1 and later on all platforms. 3) An error related to the TSEC driver can be exploited to render a device unresponsive via specially crafted IP packets. 4) An unspecified error can be exploited by unprivileged users to gain full administrative rights to an affected system. This vulnerability affects Wireless LAN Controller software version 4.2.173.0. SOLUTION: Update to a fixed version. Please see vendor advisory for a patch matrix. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20090204-wlc.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2009-0062 // JVNDB: JVNDB-2009-001345 // BID: 33608 // VULHUB: VHN-37508 // PACKETSTORM: 74722

AFFECTED PRODUCTS

vendor:ciscomodel:catalyst 6500 wireless services modulesscope:eqversion:4.2

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:4.2

Trust: 1.6

vendor:ciscomodel:catalyst 3750 series integrated wireless lan controllerscope:eqversion:4.2

Trust: 1.6

vendor:ciscomodel:catalyst 6500 wireless services modulesscope:eqversion:4.2.173.0

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:4.2.173.0

Trust: 1.6

vendor:ciscomodel:catalyst 3750 series integrated wireless lan controllerscope:eqversion:4.2.173.0

Trust: 1.6

vendor:ciscomodel:wireless lan controllerscope:eqversion:4.2.173.0 i

Trust: 0.8

vendor:ciscomodel:wireless lan controllerscope:eqversion:4.2.173.0

Trust: 0.6

vendor:ciscomodel:wireless lan controllerscope:eqversion:4.2

Trust: 0.6

vendor:ciscomodel:wireless lan controlscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:4.2.173.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:catalyst series wireless services modulescope:eqversion:76000

Trust: 0.3

vendor:ciscomodel:catalyst series wireless services modulescope:eqversion:65000

Trust: 0.3

vendor:ciscomodel:catalyst series integrated wireless lan contscope:eqversion:37500

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:44000

Trust: 0.3

sources: BID: 33608 // JVNDB: JVNDB-2009-001345 // CNNVD: CNNVD-200902-101 // NVD: CVE-2009-0062

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0062
value: HIGH

Trust: 1.0

NVD: CVE-2009-0062
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200902-101
value: CRITICAL

Trust: 0.6

VULHUB: VHN-37508
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-0062
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-37508
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-37508 // JVNDB: JVNDB-2009-001345 // CNNVD: CNNVD-200902-101 // NVD: CVE-2009-0062

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-37508 // JVNDB: JVNDB-2009-001345 // NVD: CVE-2009-0062

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200902-101

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200902-101

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001345

PATCH

title:cisco-sa-20090204-wlcurl:http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2009-001345

EXTERNAL IDS

db:NVDid:CVE-2009-0062

Trust: 2.8

db:BIDid:33608

Trust: 2.0

db:SECUNIAid:33749

Trust: 1.8

db:SECTRACKid:1021678

Trust: 1.7

db:JVNDBid:JVNDB-2009-001345

Trust: 0.8

db:CISCOid:20090204 MULTIPLE VULNERABILITIES IN CISCO WIRELESS LAN CONTROLLERS

Trust: 0.6

db:CNNVDid:CNNVD-200902-101

Trust: 0.6

db:VULHUBid:VHN-37508

Trust: 0.1

db:PACKETSTORMid:74722

Trust: 0.1

sources: VULHUB: VHN-37508 // BID: 33608 // JVNDB: JVNDB-2009-001345 // PACKETSTORM: 74722 // CNNVD: CNNVD-200902-101 // NVD: CVE-2009-0062

REFERENCES

url:http://www.securityfocus.com/bid/33608

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080a6c1dd.shtml

Trust: 1.7

url:http://www.securitytracker.com/id?1021678

Trust: 1.7

url:http://secunia.com/advisories/33749

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0062

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0062

Trust: 0.8

url:http://www.cisco.com/warp/public/707/cisco-sa-20090204-wlc.shtml

Trust: 0.4

url:http://www.cisco.com/en/us/products/ps6307/index.html

Trust: 0.3

url:/archive/1/500659

Trust: 0.3

url:http://secunia.com/advisories/product/6036/

Trust: 0.1

url:http://secunia.com/advisories/product/13964/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/product/6035/

Trust: 0.1

url:http://secunia.com/advisories/product/13963/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/33749/

Trust: 0.1

url:http://secunia.com/advisories/product/13965/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-37508 // BID: 33608 // JVNDB: JVNDB-2009-001345 // PACKETSTORM: 74722 // CNNVD: CNNVD-200902-101 // NVD: CVE-2009-0062

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200902-101

SOURCES

db:VULHUBid:VHN-37508
db:BIDid:33608
db:JVNDBid:JVNDB-2009-001345
db:PACKETSTORMid:74722
db:CNNVDid:CNNVD-200902-101
db:NVDid:CVE-2009-0062

LAST UPDATE DATE

2024-11-23T22:09:29.589000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-37508date:2018-10-30T00:00:00
db:BIDid:33608date:2009-03-11T22:06:00
db:JVNDBid:JVNDB-2009-001345date:2009-06-30T00:00:00
db:CNNVDid:CNNVD-200902-101date:2009-03-06T00:00:00
db:NVDid:CVE-2009-0062date:2024-11-21T00:58:58.470

SOURCES RELEASE DATE

db:VULHUBid:VHN-37508date:2009-02-05T00:00:00
db:BIDid:33608date:2009-02-04T00:00:00
db:JVNDBid:JVNDB-2009-001345date:2009-06-30T00:00:00
db:PACKETSTORMid:74722date:2009-02-05T17:26:14
db:CNNVDid:CNNVD-200902-101date:2009-02-05T00:00:00
db:NVDid:CVE-2009-0062date:2009-02-05T00:30:00.327