ID

VAR-201301-0344


CVE

CVE-2013-1103


TITLE

Cisco Wireless LAN Controller Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-001272

DESCRIPTION

Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (Access Point reload) via crafted SIP packets, aka Bug ID CSCts87659. Exploiting these issues could allow an attacker to deny service to legitimate users, execute arbitrary code, or gain unauthorized access. Other attacks may also be possible. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Cisco Wireless LAN Controllers Multiple Vulnerabilities SECUNIA ADVISORY ID: SA51965 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51965/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51965 RELEASE DATE: 2013-01-24 DISCUSS ADVISORY: http://secunia.com/advisories/51965/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51965/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51965 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Cisco Wireless Lan Controllers, which can be exploited by malicious users to bypass certain security restrictions and compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service). 1) An error within the wIPS component when handling certain IP packets can be exploited to cause a reload. Successful exploitation requires that Cisco WLCs are configured with Wireless Intrusion Prevention System (wIPS). 2) An error when handling certain Session Initiation Protocol (SIP) packets can be exploited to cause a reload. 3) An input sanitisation error can be exploited to execute arbitrary code by sending a specially crafted UserAgent string. 4) An error when handling access restrictions can be exploited to view or modify sensitive information such as configuration files. The vulnerabilities are reported in the following products: * Cisco 2000 Series WLC * Cisco 2100 Series WLC * Cisco 2500 Series WLC * Cisco 4100 Series WLC * Cisco 4400 Series WLC * Cisco 5500 Series WLC * Cisco 7500 Series WLC * Cisco 8500 Series WLC * Cisco 500 Series Wireless Express Mobility Controllers * Cisco Wireless Services Module (Cisco WiSM) * Cisco Wireless Services Module version 2 (Cisco WiSM version 2) * Cisco NME-AIR-WLC Module for Integrated Services Routers (ISRs) * Cisco NM-AIR-WLC Module for Integrated Services Routers (ISRs) * Cisco Catalyst 3750G Integrated WLCs * Cisco Flex 7500 Series Cloud Controller * Cisco Virtual Wireless Controller * Cisco Wireless Controller Software for Integrated Services Module 300 and Cisco Services-Ready Engine 700, 710, 900, and 910 SOLUTION: Apply update (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: #1, #2, #3) Reported by the vendor. #4) The vendor credits Darren Johnson. ORIGINAL ADVISORY: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2013-1103 // JVNDB: JVNDB-2013-001272 // CNVD: CNVD-2013-00524 // BID: 57524 // VULHUB: VHN-61105 // PACKETSTORM: 119786

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-00524

AFFECTED PRODUCTS

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.0.98.0

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.1

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.0

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.2

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.3

Trust: 1.6

vendor:ciscomodel:4100 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:4400 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:8500 wireless lan controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:2100 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:2000 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:5500 wireless lan controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:7500 wireless lan controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:2500 wireless lan controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:wireless lan controlscope:eqversion:7.0

Trust: 0.9

vendor:ciscomodel:wireless lan controlscope:eqversion:7.1

Trust: 0.9

vendor:ciscomodel:wireless lan controlscope:eqversion:7.2

Trust: 0.9

vendor:ciscomodel:2100 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:2500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.0.220.0

Trust: 0.8

vendor:ciscomodel:4400 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:7500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.2.103.0

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.1.91.0

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:ltversion:7.1

Trust: 0.8

vendor:ciscomodel:5500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:ltversion:7.0

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:ltversion:7.2

Trust: 0.8

vendor:ciscomodel:8500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:4100 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:2000 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controlscope:eqversion:7.3

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.3.110.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.3.101.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.2.111.3

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.2.110.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.2.103.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.1.91.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.0.240.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.0.220.0

Trust: 0.3

sources: CNVD: CNVD-2013-00524 // BID: 57524 // JVNDB: JVNDB-2013-001272 // CNNVD: CNNVD-201301-499 // NVD: CVE-2013-1103

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1103
value: HIGH

Trust: 1.0

NVD: CVE-2013-1103
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201301-499
value: HIGH

Trust: 0.6

VULHUB: VHN-61105
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-1103
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61105
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61105 // JVNDB: JVNDB-2013-001272 // CNNVD: CNNVD-201301-499 // NVD: CVE-2013-1103

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2013-1103

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201301-499

TYPE

Unknown

Trust: 0.3

sources: BID: 57524

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001272

PATCH

title:cisco-sa-20130123-wlcurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc

Trust: 0.8

title:cisco-sa-20130123-wlcurl:http://www.cisco.com/cisco/web/support/JP/111/1117/1117081_cisco-sa-20130123-wlc-j.html

Trust: 0.8

title:Patch for Cisco Wireless LAN Controller Denial of Service Vulnerability (CNVD-2013-00524)url:https://www.cnvd.org.cn/patchInfo/show/31471

Trust: 0.6

sources: CNVD: CNVD-2013-00524 // JVNDB: JVNDB-2013-001272

EXTERNAL IDS

db:NVDid:CVE-2013-1103

Trust: 3.4

db:BIDid:57524

Trust: 2.0

db:SECUNIAid:51965

Trust: 1.2

db:OSVDBid:89530

Trust: 1.1

db:SECTRACKid:1028027

Trust: 1.1

db:JVNDBid:JVNDB-2013-001272

Trust: 0.8

db:CNNVDid:CNNVD-201301-499

Trust: 0.7

db:CNVDid:CNVD-2013-00524

Trust: 0.6

db:CISCOid:20130123 MULTIPLE VULNERABILITIES IN CISCO WIRELESS LAN CONTROLLERS

Trust: 0.6

db:VULHUBid:VHN-61105

Trust: 0.1

db:PACKETSTORMid:119786

Trust: 0.1

sources: CNVD: CNVD-2013-00524 // VULHUB: VHN-61105 // BID: 57524 // JVNDB: JVNDB-2013-001272 // PACKETSTORM: 119786 // CNNVD: CNNVD-201301-499 // NVD: CVE-2013-1103

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130123-wlc

Trust: 2.1

url:http://www.securityfocus.com/bid/57524

Trust: 1.7

url:http://osvdb.org/89530

Trust: 1.1

url:http://www.securitytracker.com/id/1028027

Trust: 1.1

url:http://secunia.com/advisories/51965

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1103

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1103

Trust: 0.8

url:http://tools.cisco.com/security/center/viewalert.x?alertid=27902

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51965

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/51965/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/51965/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2013-00524 // VULHUB: VHN-61105 // BID: 57524 // JVNDB: JVNDB-2013-001272 // PACKETSTORM: 119786 // CNNVD: CNNVD-201301-499 // NVD: CVE-2013-1103

CREDITS

Cisco and Darren Johnson

Trust: 0.9

sources: BID: 57524 // CNNVD: CNNVD-201301-499

SOURCES

db:CNVDid:CNVD-2013-00524
db:VULHUBid:VHN-61105
db:BIDid:57524
db:JVNDBid:JVNDB-2013-001272
db:PACKETSTORMid:119786
db:CNNVDid:CNNVD-201301-499
db:NVDid:CVE-2013-1103

LAST UPDATE DATE

2024-11-23T21:45:49.828000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-00524date:2013-01-25T00:00:00
db:VULHUBid:VHN-61105date:2013-02-02T00:00:00
db:BIDid:57524date:2013-01-23T00:00:00
db:JVNDBid:JVNDB-2013-001272date:2013-01-28T00:00:00
db:CNNVDid:CNNVD-201301-499date:2013-01-25T00:00:00
db:NVDid:CVE-2013-1103date:2024-11-21T01:48:54.843

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-00524date:2013-01-25T00:00:00
db:VULHUBid:VHN-61105date:2013-01-24T00:00:00
db:BIDid:57524date:2013-01-23T00:00:00
db:JVNDBid:JVNDB-2013-001272date:2013-01-28T00:00:00
db:PACKETSTORMid:119786date:2013-01-24T06:41:56
db:CNNVDid:CNNVD-201301-499date:2013-01-25T00:00:00
db:NVDid:CVE-2013-1103date:2013-01-24T21:55:05.947