ID

VAR-201002-0175


CVE

CVE-2010-0569


TITLE

plural Cisco Service disruption in products (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2010-001135

DESCRIPTION

Unspecified vulnerability in Cisco ASA 5500 Series Adaptive Security Appliance 7.0 before 7.0(8.10), 7.2 before 7.2(4.45), 8.0 before 8.0(5.2), 8.1 before 8.1(2.37), and 8.2 before 8.2(1.16); and Cisco PIX 500 Series Security Appliance; allows remote attackers to cause a denial of service (device reload) via malformed SIP messages, aka Bug ID CSCtc96018. The problem is Bug ID : CSCtc96018 It is a problem.Unauthorized by a third party SIP Service disruption via message (DoS) There is a possibility of being put into a state. This issue is tracked by Cisco Bug ID CSCtc96018. An attacker can exploit this issue to cause a vulnerable device to crash, denying service to legitimate users. For more information see vulnerabilities #1, #2, #3, #6, and #7 in: SA38618 SOLUTION: Affected products have reached End of Software Maintenance Releases on July 28, 2009. 1) An error when receiving certain TCP segments while a connection is being terminated can be exploited to make a device unable to accept new TCP connections. 2) Two errors in the Session Initiation Protocol (SIP) inspection feature can be exploited to trigger an appliance reload. 3) An error in the Skinny Client Control Protocol (SCCP) inspection feature can be exploited to trigger an appliance reload. 4) An error in WebVPN can be exploited to trigger an appliance reload via a specially crafted DTLS packet. 5) An error when using the "nailed" option can be exploited to reload an appliance via a specially crafted TCP segment that transits the appliance. 6) An error when parsing Internet Key Exchange (IKE) messages can be exploited to disrupt all IPsec tunnels that terminate on an affected device. 7) An error in the implementation of the NT LAN Manager version 1 (NTLMv1) protocol can be exploited to bypass authentication via a specially crafted username. SOLUTION: Update to a fixed version. Please see the vendor's advisory for detailed patch information. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . TPTI-11-05: Adobe Shockwave PFR1 Font Chunk Parsing Remote Code Execution Vulnerability http://dvlabs.tippingpoint.com/advisory/TPTI-11-05 February 8, 2011 -- CVE ID: CVE-2011-0569 -- CVSS: 9, (AV:N/AC:L/Au:N/C:P/I:P/A:C) -- Affected Vendors: Adobe -- Affected Products: Adobe Shockwave Player -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 10825. For further product information on the TippingPoint IPS, visit: http://www.tippingpoint.com -- Vulnerability Details: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the code responsible for parsing font structures within Director files. While processing data within the PFR1 chunk, the process trusts a size value and compares a sign-extended counter against it within a copy loop. By providing a sufficiently large value, this flaw can be abused by a remote attacker to execute arbitrary code under the context of the user running the browser. -- Vendor Response: Adobe has issued an update to correct this vulnerability. More details can be found at: http://www.adobe.com/support/security/bulletins/apsb11-01.html -- Disclosure Timeline: 2011-01-24 - Vulnerability reported to vendor 2011-02-08 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Logan Brown and Aaron Portnoy, TippingPoint DVLabs * Luigi Auriemma

Trust: 2.34

sources: NVD: CVE-2010-0569 // JVNDB: JVNDB-2010-001135 // BID: 38281 // VULHUB: VHN-43174 // PACKETSTORM: 86632 // PACKETSTORM: 86446 // PACKETSTORM: 86631 // PACKETSTORM: 98372

AFFECTED PRODUCTS

vendor:ciscomodel:asa 5500scope:eqversion:8.0

Trust: 1.6

vendor:ciscomodel:asa 5500scope:eqversion:7.2

Trust: 1.6

vendor:ciscomodel:asa 5500scope:eqversion:8.2

Trust: 1.6

vendor:ciscomodel:asa 5500scope:eqversion:7.1

Trust: 1.6

vendor:ciscomodel:asa 5500scope:eqversion:8.1

Trust: 1.6

vendor:ciscomodel:pix 500scope:eqversion:*

Trust: 1.0

vendor:ciscomodel:adaptive security appliancescope:ltversion:7.0(8.10)

Trust: 0.8

vendor:ciscomodel:adaptive security appliancescope:ltversion:7.2(4.45)

Trust: 0.8

vendor:ciscomodel:adaptive security appliancescope:ltversion:8.0(5.2)

Trust: 0.8

vendor:ciscomodel:adaptive security appliancescope:ltversion:8.1(2.37)

Trust: 0.8

vendor:ciscomodel:adaptive security appliancescope:ltversion:8.2(1.16)

Trust: 0.8

vendor:ciscomodel:pix 500 series security appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:pix 500scope: - version: -

Trust: 0.6

vendor:ciscomodel:asa series adaptive security appliancescope:neversion:55007.2(4.45)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:neversion:55008.0(5.2)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0.4

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0.4.3

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(5.1)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.2

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(1.10)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:neversion:55008.2(1.16)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.35)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1(2.29)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55007.0

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.2(1.15)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(4.38)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.0(4.44)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:eqversion:55008.1

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:neversion:55007.0(8.10)

Trust: 0.3

vendor:ciscomodel:asa series adaptive security appliancescope:neversion:55008.1(2.37)

Trust: 0.3

sources: BID: 38281 // JVNDB: JVNDB-2010-001135 // CNNVD: CNNVD-201002-203 // NVD: CVE-2010-0569

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0569
value: HIGH

Trust: 1.0

NVD: CVE-2010-0569
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201002-203
value: HIGH

Trust: 0.6

VULHUB: VHN-43174
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-0569
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-43174
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-43174 // JVNDB: JVNDB-2010-001135 // CNNVD: CNNVD-201002-203 // NVD: CVE-2010-0569

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2010-0569

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 98372 // CNNVD: CNNVD-201002-203

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201002-203

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001135

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-43174

PATCH

title:cisco-sa-20100217-asaurl:http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml

Trust: 0.8

sources: JVNDB: JVNDB-2010-001135

EXTERNAL IDS

db:NVDid:CVE-2010-0569

Trust: 2.9

db:BIDid:38281

Trust: 2.8

db:SECUNIAid:38618

Trust: 2.6

db:VUPENid:ADV-2010-0415

Trust: 2.5

db:SECTRACKid:1023612

Trust: 2.5

db:OSVDBid:62435

Trust: 1.9

db:SECUNIAid:38636

Trust: 1.8

db:XFid:56337

Trust: 0.8

db:JVNDBid:JVNDB-2010-001135

Trust: 0.8

db:CNNVDid:CNNVD-201002-203

Trust: 0.7

db:CISCOid:20100217 MULTIPLE VULNERABILITIES IN CISCO ASA 5500 SERIES ADAPTIVE SECURITY APPLIANCES

Trust: 0.6

db:PACKETSTORMid:98372

Trust: 0.2

db:VULHUBid:VHN-43174

Trust: 0.1

db:SECUNIAid:38621

Trust: 0.1

db:PACKETSTORMid:86632

Trust: 0.1

db:PACKETSTORMid:86446

Trust: 0.1

db:PACKETSTORMid:86631

Trust: 0.1

sources: VULHUB: VHN-43174 // BID: 38281 // JVNDB: JVNDB-2010-001135 // PACKETSTORM: 86632 // PACKETSTORM: 86446 // PACKETSTORM: 86631 // PACKETSTORM: 98372 // CNNVD: CNNVD-201002-203 // NVD: CVE-2010-0569

REFERENCES

url:http://www.securityfocus.com/bid/38281

Trust: 2.5

url:http://www.securitytracker.com/id?1023612

Trust: 2.5

url:http://secunia.com/advisories/38618

Trust: 2.5

url:http://www.vupen.com/english/advisories/2010/0415

Trust: 2.5

url:http://www.cisco.com/en/us/products/products_security_advisory09186a0080b1910c.shtml

Trust: 2.0

url:http://osvdb.org/62435

Trust: 1.9

url:http://secunia.com/advisories/38636

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/56337

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0569

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/56337

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0569

Trust: 0.8

url:http://www.cisco.com/en/us/products/ps6120/index.html

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/advisories/38618/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/blog/74

Trust: 0.3

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sa-20100217-asa.shtml

Trust: 0.2

url:http://www.cisco.com/warp/public/707/cisco-sa-20100217-fwsm.shtml

Trust: 0.1

url:http://secunia.com/advisories/38621/

Trust: 0.1

url:http://www.cisco.com/cisco/web/download/index.html

Trust: 0.1

url:http://secunia.com/advisories/38636/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0569

Trust: 0.1

url:http://dvlabs.tippingpoint.com/advisory/tpti-11-05

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:http://www.adobe.com/support/security/bulletins/apsb11-01.html

Trust: 0.1

sources: VULHUB: VHN-43174 // BID: 38281 // JVNDB: JVNDB-2010-001135 // PACKETSTORM: 86632 // PACKETSTORM: 86446 // PACKETSTORM: 86631 // PACKETSTORM: 98372 // CNNVD: CNNVD-201002-203 // NVD: CVE-2010-0569

CREDITS

Cisco

Trust: 0.9

sources: BID: 38281 // CNNVD: CNNVD-201002-203

SOURCES

db:VULHUBid:VHN-43174
db:BIDid:38281
db:JVNDBid:JVNDB-2010-001135
db:PACKETSTORMid:86632
db:PACKETSTORMid:86446
db:PACKETSTORMid:86631
db:PACKETSTORMid:98372
db:CNNVDid:CNNVD-201002-203
db:NVDid:CVE-2010-0569

LAST UPDATE DATE

2024-11-23T21:47:34.892000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-43174date:2017-08-17T00:00:00
db:BIDid:38281date:2010-02-17T00:00:00
db:JVNDBid:JVNDB-2010-001135date:2010-03-10T00:00:00
db:CNNVDid:CNNVD-201002-203date:2010-02-19T00:00:00
db:NVDid:CVE-2010-0569date:2024-11-21T01:12:28.303

SOURCES RELEASE DATE

db:VULHUBid:VHN-43174date:2010-02-19T00:00:00
db:BIDid:38281date:2010-02-17T00:00:00
db:JVNDBid:JVNDB-2010-001135date:2010-03-10T00:00:00
db:PACKETSTORMid:86632date:2010-02-24T08:40:16
db:PACKETSTORMid:86446date:2010-02-18T17:45:08
db:PACKETSTORMid:86631date:2010-02-24T08:40:13
db:PACKETSTORMid:98372date:2011-02-10T08:21:26
db:CNNVDid:CNNVD-201002-203date:2010-02-19T00:00:00
db:NVDid:CVE-2010-0569date:2010-02-19T17:30:00.987