ID

VAR-201301-0345


CVE

CVE-2013-1104


TITLE

Cisco Wireless LAN Controller Arbitrary Code Execution Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2013-00528 // CNNVD: CNNVD-201301-500

DESCRIPTION

The HTTP Profiling functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.3.101.0 allows remote authenticated users to execute arbitrary code via a crafted HTTP User-Agent header, aka Bug ID CSCuc15636. The Cisco Wireless LAN Controller is responsible for system-wide wireless LAN functions such as security policy, intrusion protection, RF management, quality of service, and mobility. Cisco Wireless LAN Controllers fail to properly filter user-supplied input, allowing authenticated remote attackers to send specially crafted UserAgent strings over wired or wireless segments. The software handles specially crafted strings allowing an attacker to execute arbitrary code on the system. Other attacks may also be possible. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Cisco Wireless LAN Controllers Multiple Vulnerabilities SECUNIA ADVISORY ID: SA51965 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51965/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51965 RELEASE DATE: 2013-01-24 DISCUSS ADVISORY: http://secunia.com/advisories/51965/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51965/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51965 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Cisco Wireless Lan Controllers, which can be exploited by malicious users to bypass certain security restrictions and compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service). 1) An error within the wIPS component when handling certain IP packets can be exploited to cause a reload. Successful exploitation requires that Cisco WLCs are configured with Wireless Intrusion Prevention System (wIPS). 2) An error when handling certain Session Initiation Protocol (SIP) packets can be exploited to cause a reload. 4) An error when handling access restrictions can be exploited to view or modify sensitive information such as configuration files. The vulnerabilities are reported in the following products: * Cisco 2000 Series WLC * Cisco 2100 Series WLC * Cisco 2500 Series WLC * Cisco 4100 Series WLC * Cisco 4400 Series WLC * Cisco 5500 Series WLC * Cisco 7500 Series WLC * Cisco 8500 Series WLC * Cisco 500 Series Wireless Express Mobility Controllers * Cisco Wireless Services Module (Cisco WiSM) * Cisco Wireless Services Module version 2 (Cisco WiSM version 2) * Cisco NME-AIR-WLC Module for Integrated Services Routers (ISRs) * Cisco NM-AIR-WLC Module for Integrated Services Routers (ISRs) * Cisco Catalyst 3750G Integrated WLCs * Cisco Flex 7500 Series Cloud Controller * Cisco Virtual Wireless Controller * Cisco Wireless Controller Software for Integrated Services Module 300 and Cisco Services-Ready Engine 700, 710, 900, and 910 SOLUTION: Apply update (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: #1, #2, #3) Reported by the vendor. #4) The vendor credits Darren Johnson. ORIGINAL ADVISORY: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2013-1104 // JVNDB: JVNDB-2013-001273 // CNVD: CNVD-2013-00528 // BID: 57524 // VULHUB: VHN-61106 // PACKETSTORM: 119786

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-00528

AFFECTED PRODUCTS

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.3.101.0

Trust: 1.8

vendor:ciscomodel:2500 wireless lan controllerscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:7500 wireless lan controllerscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:5500 wireless lan controllerscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:8500 wireless lan controllerscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:4400 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:2100 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:2000 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:4100 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:2000 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:2100 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:2500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:4100 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:4400 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:5500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:7500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:8500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controlscope:eqversion:7.3.101.0

Trust: 0.6

vendor:ciscomodel:2000 wireless lan controllerscope: - version: -

Trust: 0.6

vendor:ciscomodel:4400 wireless lan controllerscope: - version: -

Trust: 0.6

vendor:ciscomodel:2100 wireless lan controllerscope: - version: -

Trust: 0.6

vendor:ciscomodel:4100 wireless lan controllerscope: - version: -

Trust: 0.6

vendor:ciscomodel:wireless lan controlscope:eqversion:7.3

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:7.2

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.3.110.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.3.101.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.2.111.3

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.2.110.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.2.103.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.1.91.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.0.240.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.0.220.0

Trust: 0.3

sources: CNVD: CNVD-2013-00528 // BID: 57524 // JVNDB: JVNDB-2013-001273 // CNNVD: CNNVD-201301-500 // NVD: CVE-2013-1104

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1104
value: HIGH

Trust: 1.0

NVD: CVE-2013-1104
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201301-500
value: CRITICAL

Trust: 0.6

VULHUB: VHN-61106
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-1104
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61106
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61106 // JVNDB: JVNDB-2013-001273 // CNNVD: CNNVD-201301-500 // NVD: CVE-2013-1104

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2013-1104

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201301-500

TYPE

Unknown

Trust: 0.3

sources: BID: 57524

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001273

PATCH

title:cisco-sa-20130123-wlcurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc

Trust: 0.8

title:cisco-sa-20130123-wlcurl:http://www.cisco.com/cisco/web/support/JP/111/1117/1117081_cisco-sa-20130123-wlc-j.html

Trust: 0.8

title:Patch for Cisco Wireless LAN Controller arbitrary code execution vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/31492

Trust: 0.6

sources: CNVD: CNVD-2013-00528 // JVNDB: JVNDB-2013-001273

EXTERNAL IDS

db:NVDid:CVE-2013-1104

Trust: 3.4

db:BIDid:57524

Trust: 2.0

db:SECUNIAid:51965

Trust: 1.2

db:OSVDBid:89533

Trust: 1.1

db:SECTRACKid:1028027

Trust: 1.1

db:JVNDBid:JVNDB-2013-001273

Trust: 0.8

db:CNNVDid:CNNVD-201301-500

Trust: 0.7

db:CNVDid:CNVD-2013-00528

Trust: 0.6

db:CISCOid:20130123 MULTIPLE VULNERABILITIES IN CISCO WIRELESS LAN CONTROLLERS

Trust: 0.6

db:VULHUBid:VHN-61106

Trust: 0.1

db:PACKETSTORMid:119786

Trust: 0.1

sources: CNVD: CNVD-2013-00528 // VULHUB: VHN-61106 // BID: 57524 // JVNDB: JVNDB-2013-001273 // PACKETSTORM: 119786 // CNNVD: CNNVD-201301-500 // NVD: CVE-2013-1104

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130123-wlc

Trust: 2.1

url:http://www.securityfocus.com/bid/57524

Trust: 1.7

url:http://osvdb.org/89533

Trust: 1.1

url:http://www.securitytracker.com/id/1028027

Trust: 1.1

url:http://secunia.com/advisories/51965

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/81489

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1104

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1104

Trust: 0.8

url:http://tools.cisco.com/security/center/viewalert.x?alertid=27903

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51965

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/51965/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/51965/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2013-00528 // VULHUB: VHN-61106 // BID: 57524 // JVNDB: JVNDB-2013-001273 // PACKETSTORM: 119786 // CNNVD: CNNVD-201301-500 // NVD: CVE-2013-1104

CREDITS

Cisco and Darren Johnson

Trust: 0.9

sources: BID: 57524 // CNNVD: CNNVD-201301-500

SOURCES

db:CNVDid:CNVD-2013-00528
db:VULHUBid:VHN-61106
db:BIDid:57524
db:JVNDBid:JVNDB-2013-001273
db:PACKETSTORMid:119786
db:CNNVDid:CNNVD-201301-500
db:NVDid:CVE-2013-1104

LAST UPDATE DATE

2024-11-23T21:45:49.906000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-00528date:2013-01-25T00:00:00
db:VULHUBid:VHN-61106date:2017-08-29T00:00:00
db:BIDid:57524date:2013-01-23T00:00:00
db:JVNDBid:JVNDB-2013-001273date:2013-01-28T00:00:00
db:CNNVDid:CNNVD-201301-500date:2013-01-25T00:00:00
db:NVDid:CVE-2013-1104date:2024-11-21T01:48:54.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-00528date:2013-01-25T00:00:00
db:VULHUBid:VHN-61106date:2013-01-24T00:00:00
db:BIDid:57524date:2013-01-23T00:00:00
db:JVNDBid:JVNDB-2013-001273date:2013-01-28T00:00:00
db:PACKETSTORMid:119786date:2013-01-24T06:41:56
db:CNNVDid:CNNVD-201301-500date:2013-01-25T00:00:00
db:NVDid:CVE-2013-1104date:2013-01-24T21:55:05.977