ID

VAR-200906-0065


CVE

CVE-2009-1162


TITLE

Cisco AsyncOS of Spam Quarantine Cross-site scripting vulnerability in login page

Trust: 0.8

sources: JVNDB: JVNDB-2009-002661

DESCRIPTION

Cross-site scripting (XSS) vulnerability in the Spam Quarantine login page in Cisco IronPort AsyncOS before 6.5.2 on Series C, M, and X appliances allows remote attackers to inject arbitrary web script or HTML via the referrer parameter. IronPort AsyncOS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. IronPort series C, M, and X appliances running versions prior to AsyncOS 6.5.2 are vulnerable. IronPort series products are widely used mail encryption gateways. AsyncOS is the operating system used by this product, which is specially designed to deal with the bottleneck of concurrent communication and the limitation of file-based mail queues. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: IronPort AsyncOS "referrer" Cross-Site Scripting Vulnerability SECUNIA ADVISORY ID: SA34895 VERIFY ADVISORY: http://secunia.com/advisories/34895/ DESCRIPTION: A vulnerability has been reported in IronPort AsyncOS, which can be exploited by malicious people to conduct cross-site scripting attacks. NOTE: IronPort Series S appliances are not affected. SOLUTION: Update to version 6.5.2, or apply fixes by using the upgrade command from the command line interface or by using the System Upgrade option in the graphical user interface (GUI). PROVIDED AND/OR DISCOVERED BY: Reported by an anonymous person. ORIGINAL ADVISORY: Cisco: http://tools.cisco.com/security/center/viewAlert.x?alertId=18365 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2009-1162 // JVNDB: JVNDB-2009-002661 // BID: 35203 // VULHUB: VHN-38608 // PACKETSTORM: 78104

AFFECTED PRODUCTS

vendor:ciscomodel:ironport asyncosscope:eqversion:6.1.0-304

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:6.5.0-405

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:6.6.4.0-273

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:6.3.5-003

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:6.5.1-005

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:6.1.0-307

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:6.1.5-110

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:6.3.6-003

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:6.1.6-003

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:6.1.0-306

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:6.0.0-754

Trust: 1.0

vendor:ciscomodel:ironport asyncosscope:eqversion:6.1.0-301

Trust: 1.0

vendor:ciscomodel:ironport email security appliancesscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:ironport asyncosscope:eqversion:6.0.0-757

Trust: 1.0

vendor:ciscomodel:asyncosscope:ltversion:6.5.2

Trust: 0.8

vendor:ciscomodel:e email security appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:ironport asyncosscope:eqversion:6.5.1

Trust: 0.3

vendor:ciscomodel:ironport asyncosscope:neversion:6.5.2

Trust: 0.3

sources: BID: 35203 // JVNDB: JVNDB-2009-002661 // CNNVD: CNNVD-200906-071 // NVD: CVE-2009-1162

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-1162
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-1162
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200906-071
value: MEDIUM

Trust: 0.6

VULHUB: VHN-38608
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-1162
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-38608
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-38608 // JVNDB: JVNDB-2009-002661 // CNNVD: CNNVD-200906-071 // NVD: CVE-2009-1162

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-38608 // JVNDB: JVNDB-2009-002661 // NVD: CVE-2009-1162

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200906-071

TYPE

xss

Trust: 0.7

sources: PACKETSTORM: 78104 // CNNVD: CNNVD-200906-071

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002661

PATCH

title:18365url:http://tools.cisco.com/security/center/viewAlert.x?alertId=18365

Trust: 0.8

sources: JVNDB: JVNDB-2009-002661

EXTERNAL IDS

db:NVDid:CVE-2009-1162

Trust: 2.8

db:BIDid:35203

Trust: 2.8

db:SECUNIAid:34895

Trust: 2.6

db:OSVDBid:54884

Trust: 2.5

db:SECTRACKid:1022335

Trust: 2.5

db:XFid:50948

Trust: 1.4

db:JVNDBid:JVNDB-2009-002661

Trust: 0.8

db:CNNVDid:CNNVD-200906-071

Trust: 0.6

db:VULHUBid:VHN-38608

Trust: 0.1

db:PACKETSTORMid:78104

Trust: 0.1

sources: VULHUB: VHN-38608 // BID: 35203 // JVNDB: JVNDB-2009-002661 // PACKETSTORM: 78104 // CNNVD: CNNVD-200906-071 // NVD: CVE-2009-1162

REFERENCES

url:http://www.securityfocus.com/bid/35203

Trust: 2.5

url:http://osvdb.org/54884

Trust: 2.5

url:http://www.securitytracker.com/id?1022335

Trust: 2.5

url:http://secunia.com/advisories/34895

Trust: 2.5

url:http://tools.cisco.com/security/center/viewalert.x?alertid=18365

Trust: 2.1

url:http://xforce.iss.net/xforce/xfdb/50948

Trust: 1.4

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/50948

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1162

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1162

Trust: 0.8

url:http://www.ironport.com/products/

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/34895/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-38608 // BID: 35203 // JVNDB: JVNDB-2009-002661 // PACKETSTORM: 78104 // CNNVD: CNNVD-200906-071 // NVD: CVE-2009-1162

CREDITS

Secunia

Trust: 0.7

sources: PACKETSTORM: 78104 // CNNVD: CNNVD-200906-071

SOURCES

db:VULHUBid:VHN-38608
db:BIDid:35203
db:JVNDBid:JVNDB-2009-002661
db:PACKETSTORMid:78104
db:CNNVDid:CNNVD-200906-071
db:NVDid:CVE-2009-1162

LAST UPDATE DATE

2024-11-23T22:39:32.643000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-38608date:2017-08-17T00:00:00
db:BIDid:35203date:2009-06-04T15:59:00
db:JVNDBid:JVNDB-2009-002661date:2011-06-08T00:00:00
db:CNNVDid:CNNVD-200906-071date:2009-06-12T00:00:00
db:NVDid:CVE-2009-1162date:2024-11-21T01:01:48.467

SOURCES RELEASE DATE

db:VULHUBid:VHN-38608date:2009-06-05T00:00:00
db:BIDid:35203date:2009-06-03T00:00:00
db:JVNDBid:JVNDB-2009-002661date:2011-06-08T00:00:00
db:PACKETSTORMid:78104date:2009-06-04T15:42:33
db:CNNVDid:CNNVD-200906-071date:2009-06-05T00:00:00
db:NVDid:CVE-2009-1162date:2009-06-05T16:00:00.280