ID

VAR-200912-0074


CVE

CVE-2009-4118


TITLE

Cisco VPN client for Windows of StartServiceCtrlDispatcher Service disruption in functions (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2009-002690

DESCRIPTION

The StartServiceCtrlDispatcher function in the cvpnd service (cvpnd.exe) in Cisco VPN client for Windows before 5.0.06.0100 does not properly handle an ERROR_FAILED_SERVICE_CONTROLLER_CONNECT error, which allows local users to cause a denial of service (service crash and VPN connection loss) via a manual start of cvpnd.exe while the cvpnd service is running. Cisco VPN Client for Windows is prone to a local denial-of-service vulnerability. A local attacker can exploit this issue to crash the 'cvpnd' service and terminate all active VPN sessions, resulting in denial-of-service conditions. This issue affects versions prior to VPN Client 5.0.06.0100 for Windows. Cause a denial of service vulnerability. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. The vulnerability is reported in versions prior to 5.0.06.0100. SOLUTION: Update to version 5.0.06.0100. PROVIDED AND/OR DISCOVERED BY: Alex Hernandez ORIGINAL ADVISORY: Cisco: http://tools.cisco.com/security/center/viewAlert.x?alertId=19445 Alex Hernandez: http://packetstormsecurity.org/0911-exploits/sybsec-adv17.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2009-4118 // JVNDB: JVNDB-2009-002690 // BID: 37077 // VULHUB: VHN-41564 // VULMON: CVE-2009-4118 // PACKETSTORM: 82833

AFFECTED PRODUCTS

vendor:ciscomodel:vpn clientscope:eqversion:3.1

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:4.8.00.0440

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:3.5.1c

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:4.8.00.0000

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:5.0.01

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:5.0.2.0090

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:3.5.1

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:3.0

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:4.8.1

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:3.0.5

Trust: 1.6

vendor:ciscomodel:vpn clientscope:eqversion:3.6.5

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:5.0.00.340

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:4.9

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:3.5.2

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:4.8.02.0010

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:5.0.02.0090

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:0490

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:4.8.01

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:4.7.00.0000

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:5.0.01.0600

Trust: 1.0

vendor:ciscomodel:vpn clientscope:eqversion:2.0

Trust: 1.0

vendor:ciscomodel:vpn clientscope:ltversion:for windows 5.0.06.0100

Trust: 0.8

vendor:ciscomodel:vpn client for windowsscope:eqversion:5.0.1

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:4.8.2.0010

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:4.8.2

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:4.8.1

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:4.8

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:4.7.0533

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:4.7

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:eqversion:4.6

Trust: 0.3

vendor:ciscomodel:vpn client for windowsscope:neversion:5.0.6.0100

Trust: 0.3

sources: BID: 37077 // JVNDB: JVNDB-2009-002690 // CNNVD: CNNVD-200912-003 // NVD: CVE-2009-4118

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-4118
value: LOW

Trust: 1.0

NVD: CVE-2009-4118
value: LOW

Trust: 0.8

CNNVD: CNNVD-200912-003
value: LOW

Trust: 0.6

VULHUB: VHN-41564
value: LOW

Trust: 0.1

VULMON: CVE-2009-4118
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2009-4118
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-41564
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-41564 // VULMON: CVE-2009-4118 // JVNDB: JVNDB-2009-002690 // CNNVD: CNNVD-200912-003 // NVD: CVE-2009-4118

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2009-002690 // NVD: CVE-2009-4118

THREAT TYPE

local

Trust: 1.0

sources: BID: 37077 // PACKETSTORM: 82833 // CNNVD: CNNVD-200912-003

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200912-003

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002690

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-41564 // VULMON: CVE-2009-4118

PATCH

title:19445url:http://tools.cisco.com/security/center/viewAlert.x?alertId=19445

Trust: 0.8

title:CVE-2009-4118url:https://github.com/alt3kx/CVE-2009-4118

Trust: 0.1

title:awesome-network-stuffurl:https://github.com/aniksarakash/awesome-network-stuff

Trust: 0.1

title:awesome-network-stuffurl:https://github.com/alphaSeclab/awesome-network-stuff

Trust: 0.1

title:alt3kx.github.iourl:https://github.com/alt3kx/alt3kx.github.io

Trust: 0.1

sources: VULMON: CVE-2009-4118 // JVNDB: JVNDB-2009-002690

EXTERNAL IDS

db:BIDid:37077

Trust: 2.9

db:NVDid:CVE-2009-4118

Trust: 2.9

db:SECUNIAid:37419

Trust: 2.7

db:VUPENid:ADV-2009-3296

Trust: 1.8

db:JVNDBid:JVNDB-2009-002690

Trust: 0.8

db:CNNVDid:CNNVD-200912-003

Trust: 0.7

db:EXPLOIT-DBid:10190

Trust: 0.2

db:VULHUBid:VHN-41564

Trust: 0.1

db:VULMONid:CVE-2009-4118

Trust: 0.1

db:PACKETSTORMid:82833

Trust: 0.1

sources: VULHUB: VHN-41564 // VULMON: CVE-2009-4118 // BID: 37077 // JVNDB: JVNDB-2009-002690 // PACKETSTORM: 82833 // CNNVD: CNNVD-200912-003 // NVD: CVE-2009-4118

REFERENCES

url:http://www.securityfocus.com/bid/37077

Trust: 2.6

url:http://secunia.com/advisories/37419

Trust: 2.6

url:http://tools.cisco.com/security/center/viewalert.x?alertid=19445

Trust: 2.2

url:http://packetstormsecurity.org/0911-exploits/sybsec-adv17.txt

Trust: 1.9

url:http://www.vupen.com/english/advisories/2009/3296

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4118

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4118

Trust: 0.8

url:http://www.cisco.com/en/us/products/sw/secursw/ps2308/index.html

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://github.com/alt3kx/cve-2009-4118

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/10190/

Trust: 0.1

url:http://secunia.com/advisories/37419/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-41564 // VULMON: CVE-2009-4118 // BID: 37077 // JVNDB: JVNDB-2009-002690 // PACKETSTORM: 82833 // CNNVD: CNNVD-200912-003 // NVD: CVE-2009-4118

CREDITS

Alex Hernandez※ al3xhernandez@ureach.com

Trust: 0.6

sources: CNNVD: CNNVD-200912-003

SOURCES

db:VULHUBid:VHN-41564
db:VULMONid:CVE-2009-4118
db:BIDid:37077
db:JVNDBid:JVNDB-2009-002690
db:PACKETSTORMid:82833
db:CNNVDid:CNNVD-200912-003
db:NVDid:CVE-2009-4118

LAST UPDATE DATE

2024-11-23T22:31:50.392000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-41564date:2012-10-25T00:00:00
db:VULMONid:CVE-2009-4118date:2012-10-25T00:00:00
db:BIDid:37077date:2015-04-13T21:05:00
db:JVNDBid:JVNDB-2009-002690date:2011-09-21T00:00:00
db:CNNVDid:CNNVD-200912-003date:2009-12-01T00:00:00
db:NVDid:CVE-2009-4118date:2024-11-21T01:08:58.127

SOURCES RELEASE DATE

db:VULHUBid:VHN-41564date:2009-12-01T00:00:00
db:VULMONid:CVE-2009-4118date:2009-12-01T00:00:00
db:BIDid:37077date:2009-11-19T00:00:00
db:JVNDBid:JVNDB-2009-002690date:2011-09-21T00:00:00
db:PACKETSTORMid:82833date:2009-11-20T14:06:39
db:CNNVDid:CNNVD-200912-003date:2009-11-19T00:00:00
db:NVDid:CVE-2009-4118date:2009-12-01T00:30:00.233