ID

VAR-200903-0283


CVE

CVE-2009-0628


TITLE

Cisco IOS of SSLVPN function Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2009-001558

DESCRIPTION

Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak. Cisco IOS of SSLVPN Function in an unusual way SSL Service disruption due to session disconnection (DoS) There is a vulnerability that becomes a condition.Service disruption by a third party (DoS) There is a possibility of being put into a state. Cisco IOS is prone to multiple remote denial-of-service vulnerabilities. Successfully exploiting these issues allows remote attackers to cause targeted device to crash, denying service to legitimate users. The Cisco SSLVPN function is an enhanced version of the WebVPN function, allowing users anywhere on the Internet to remotely access corporate sites. A device configured with SSLVPN may leak TCBs when processing an abnormally disconnected SSL session. Continuous attacks may cause the device to run out of memory resources and crash. This vulnerability can be exploited without authentication. ---------------------------------------------------------------------- Secunia is pleased to announce the release of the annual Secunia report for 2008. Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/ Stay Secure, Secunia ---------------------------------------------------------------------- TITLE: Cisco IOS Multiple Vulnerabilities SECUNIA ADVISORY ID: SA34438 VERIFY ADVISORY: http://secunia.com/advisories/34438/ DESCRIPTION: Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious users to gain escalated privileges and by malicious people to cause a DoS (Denial of Service). 1) An unspecified error in the Cisco Tunneling Control Protocol (cTCP) feature can be exploited to exhaust all memory and may crash the cTCP server via a series of specially crafted TCP packets. This vulnerability is reported in Cisco IOS versions 12.4(9)T or later, which are configured for Cisco Tunneling Control Protocol (cTCP) encapsulation (disabled by default) for EZVPN server. 2) An unspecified error exists in the handling of IP sockets, which can be exploited to prevent accepting new connections or sessions, exhaust memory, cause high CPU load, or to cause a reload of an affected device. Successful exploitation of this vulnerability requires a complete TCP three-way handshake to an associated TCP port. This vulnerability is reported in Cisco IOS and Cisco IOS XE software with the following features enabled: * Cisco Unified Communications Manager Express * SIP Gateway Signaling Support Over Transport Layer Security (TLS) Transport * Secure Signaling and Media Encryption * Blocks Extensible Exchange Protocol (BEEP) * Network Admission Control HTTP Authentication Proxy * Per-user URL Redirect for EAPoUDP, Dot1x, and MAC Authentication Bypass * Distributed Director with HTTP Redirects * DNS (TCP mode only) 3) An unspecified error in Cisco IOS software when being configured for Mobile IP NAT Traversal or Mobile IPv6 can be exploited to stop processing traffic on an interface by sending specially crafted packets to an affected device. 4) An unspecified error in the Cisco IOS SCP server (disabled by default) can be exploited to retrieve or write to arbitrary files on the device's file system, regardless of the CLI view configuration. Successful exploitation of this vulnerability requires valid user access with an attached command-line interface (CLI) view. This vulnerability is reported in Cisco IOS software with the SCP server functionality enabled and configured to use role-based ACL access. 5) An unspecified error in the implementation of the Session Initiation Protocol (SIP) can be exploited to reload an affected device via a specially crafted SIP message. This vulnerability is reported in Cisco IOS with SIP voice services enabled, and which process SIP messages as part of configured VoIP functionality. 6) An unspecified error in the handling of TCP packets can be exploited to reload an affected device via a sequence of specially crafted TCP packets. Successful exploitation of this vulnerability requires a complete TCP three-way handshake to an associated TCP port. This vulnerability is reported in Cisco IOS with the following features enabled: * Airline Product Set (ALPS) * Serial Tunnel Code (STUN) and Block Serial Tunnel Code (BSTUN) * Native Client Interface Architecture support (NCIA) * Data-link switching (DLSw) * Remote Source-Route Bridging (RSRB) * Point to Point Tunneling Protocol (PPTP) * X.25 for Record Boundary Preservation (RBP) * X.25 over TCP (XOT) * X.25 Routing 7) An unspecified error in the handling of UDP packets can be exploited to block an interface of an affected device by sending a specially crafted UDP packets. This vulnerability is reported in Cisco IOS with the following features enabled: * IP Service Level Agreements (SLA) Responder * Session Initiation Protocol (SIP) * H.323 Annex E Call Signaling Transport * Media Gateway Control Protocol (MGCP) 8) An unspecified error within the Cisco IOS WebVPN and Cisco IOS SSLVPN (SSLVPN) features can be exploited to cause a crash of an affected device via specially crafted HTTPS packets. 9) A memory leak within the Cisco IOS WebVPN and Cisco IOS SSLVPN (SSLVPN) features can be exploited to exhaust memory via SSLVPN sessions. SOLUTION: Please see the following vendor advisory for fixed versions. http://www.cisco.com/warp/public/707/cisco-sa-20090325-bundle.shtml PROVIDED AND/OR DISCOVERED BY: 1, 3, 5 - 9) Reported by the vendor. 2) The vendor also credits Jens Link. 4) The vendor credits Kevin Graham. ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sa-20090325-ctcp.shtml http://www.cisco.com/warp/public/707/cisco-sa-20090325-ip.shtml http://www.cisco.com/warp/public/707/cisco-sa-20090325-mobileip.shtml http://www.cisco.com/warp/public/707/cisco-sa-20090325-scp.shtml http://www.cisco.com/warp/public/707/cisco-sa-20090325-sip.shtml http://www.cisco.com/warp/public/707/cisco-sa-20090325-tcp.shtml http://www.cisco.com/warp/public/707/cisco-sa-20090325-udp.shtml http://www.cisco.com/warp/public/707/cisco-sa-20090325-webvpn.shtml OTHER REFERENCES: http://www.cisco.com/warp/public/707/cisco-amb-20090325-sip-and-udp.shtml http://www.cisco.com/warp/public/707/cisco-amb-20090325-ctcp.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2009-0628 // JVNDB: JVNDB-2009-001558 // BID: 34239 // VULHUB: VHN-38074 // PACKETSTORM: 76097

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 2.7

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 1.8

vendor:ciscomodel:ios 12.4 xw10scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 xz2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 mr2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xcscope: - version: -

Trust: 0.3

sources: BID: 34239 // JVNDB: JVNDB-2009-001558 // CNNVD: CNNVD-200903-480 // NVD: CVE-2009-0628

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0628
value: HIGH

Trust: 1.0

NVD: CVE-2009-0628
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200903-480
value: CRITICAL

Trust: 0.6

VULHUB: VHN-38074
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-0628
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-38074
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-38074 // JVNDB: JVNDB-2009-001558 // CNNVD: CNNVD-200903-480 // NVD: CVE-2009-0628

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-38074 // JVNDB: JVNDB-2009-001558 // NVD: CVE-2009-0628

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200903-480

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-200903-480

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001558

PATCH

title:cisco-sa-20090325-webvpnurl:http://www.cisco.com/warp/public/707/cisco-sa-20090325-webvpn.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2009-001558

EXTERNAL IDS

db:BIDid:34239

Trust: 2.8

db:NVDid:CVE-2009-0628

Trust: 2.8

db:SECUNIAid:34438

Trust: 2.6

db:SECTRACKid:1021896

Trust: 2.5

db:VUPENid:ADV-2009-0851

Trust: 2.5

db:XFid:49427

Trust: 1.4

db:JVNDBid:JVNDB-2009-001558

Trust: 0.8

db:CNNVDid:CNNVD-200903-480

Trust: 0.7

db:CISCOid:20090325 CISCO IOS SOFTWARE WEBVPN AND SSLVPN VULNERABILITIES

Trust: 0.6

db:VULHUBid:VHN-38074

Trust: 0.1

db:PACKETSTORMid:76097

Trust: 0.1

sources: VULHUB: VHN-38074 // BID: 34239 // JVNDB: JVNDB-2009-001558 // PACKETSTORM: 76097 // CNNVD: CNNVD-200903-480 // NVD: CVE-2009-0628

REFERENCES

url:http://www.securityfocus.com/bid/34239

Trust: 2.5

url:http://securitytracker.com/id?1021896

Trust: 2.5

url:http://secunia.com/advisories/34438

Trust: 2.5

url:http://www.vupen.com/english/advisories/2009/0851

Trust: 2.5

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080a90424.shtml

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080a90469.shtml

Trust: 1.7

url:http://xforce.iss.net/xforce/xfdb/49427

Trust: 1.4

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12092

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/49427

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0628

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0628

Trust: 0.8

url:http://www.cisco.com/public/sw-center/sw-ios.shtml

Trust: 0.3

url:http://www.cisco.com/en/us/products/products_security_advisories_listing.html

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-amb-20090325-ctcp.shtml

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20090325-scp.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20090325-tcp.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20090325-udp.shtml

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-amb-20090325-sip-and-udp.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20090325-ip.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20090325-ctcp.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20090325-sip.shtml

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20090325-bundle.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20090325-webvpn.shtml

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sa-20090325-mobileip.shtml

Trust: 0.1

url:http://secunia.com/advisories/34438/

Trust: 0.1

url:http://secunia.com/advisories/try_vi/request_2008_report/

Trust: 0.1

sources: VULHUB: VHN-38074 // BID: 34239 // JVNDB: JVNDB-2009-001558 // PACKETSTORM: 76097 // CNNVD: CNNVD-200903-480 // NVD: CVE-2009-0628

CREDITS

Cisco Security bulletin

Trust: 0.6

sources: CNNVD: CNNVD-200903-480

SOURCES

db:VULHUBid:VHN-38074
db:BIDid:34239
db:JVNDBid:JVNDB-2009-001558
db:PACKETSTORMid:76097
db:CNNVDid:CNNVD-200903-480
db:NVDid:CVE-2009-0628

LAST UPDATE DATE

2024-11-23T21:56:39.700000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-38074date:2017-09-29T00:00:00
db:BIDid:34239date:2009-09-08T20:11:00
db:JVNDBid:JVNDB-2009-001558date:2009-07-03T00:00:00
db:CNNVDid:CNNVD-200903-480date:2009-03-27T00:00:00
db:NVDid:CVE-2009-0628date:2024-11-21T01:00:33.397

SOURCES RELEASE DATE

db:VULHUBid:VHN-38074date:2009-03-27T00:00:00
db:BIDid:34239date:2009-03-25T00:00:00
db:JVNDBid:JVNDB-2009-001558date:2009-07-03T00:00:00
db:PACKETSTORMid:76097date:2009-03-27T14:09:14
db:CNNVDid:CNNVD-200903-480date:2009-03-27T00:00:00
db:NVDid:CVE-2009-0628date:2009-03-27T16:30:01.967