ID

VAR-201403-0465


CVE

CVE-2014-2119


TITLE

plural Cisco Security The appliance for Cisco AsyncOS In root Vulnerability to execute arbitrary code with privileges

Trust: 0.8

sources: JVNDB: JVNDB-2014-001748

DESCRIPTION

The End User Safelist/Blocklist (aka SLBL) service in Cisco AsyncOS Software for Email Security Appliance (ESA) before 7.6.3-023 and 8.x before 8.0.1-023 and Cisco Content Security Management Appliance (SMA) before 7.9.1-110 and 8.x before 8.1.1-013 allows remote authenticated users to execute arbitrary code with root privileges via an FTP session that uploads a modified SLBL database file, aka Bug IDs CSCug79377 and CSCug80118. The Cisco IronPort family of products is a widely used mail encryption gateway, and AsyncOS is the operating system used by the product. Cisco AsyncOS Software is prone to a remote code-execution vulnerability. An attacker can leverage this issue to execute arbitrary code with root privileges. Failed exploit attempts will likely result in denial-of-service conditions. This issue is tracked by Cisco BugId's CSCug79377, and CSCug80118. End User Safelist/Blocklist (aka SLBL ) service has a security vulnerability, which stems from the fact that the program does not fully verify the SLBL database file

Trust: 2.52

sources: NVD: CVE-2014-2119 // JVNDB: JVNDB-2014-001748 // CNVD: CNVD-2014-01906 // BID: 66309 // VULHUB: VHN-70058

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-01906

AFFECTED PRODUCTS

vendor:ciscomodel:ironport asyncosscope:eqversion:8.1

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:8.0.1

Trust: 1.6

vendor:ciscomodel:ironport asyncosscope:eqversion:8.0

Trust: 1.6

vendor:ciscomodel:content security management appliancescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:email security appliancescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ironport asyncosscope:lteversion:7.9.1-039

Trust: 1.0

vendor:ciscomodel:ironport asyncosscope:lteversion:7.6.2-201

Trust: 1.0

vendor:ciscomodel:asyncosscope:eqversion:7.6.3-023

Trust: 0.8

vendor:ciscomodel:asyncosscope:ltversion:8.x (*1)

Trust: 0.8

vendor:ciscomodel:asyncosscope:ltversion:8.x (*2)

Trust: 0.8

vendor:ciscomodel:e email security the appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:asyncosscope:eqversion:7.9.1-110

Trust: 0.8

vendor:ciscomodel:content security management appliancescope: - version: -

Trust: 0.8

vendor:ciscomodel:asyncosscope:ltversion:(*2)

Trust: 0.8

vendor:ciscomodel:asyncosscope:eqversion:8.0.1-023

Trust: 0.8

vendor:ciscomodel:asyncosscope:ltversion:(*1)

Trust: 0.8

vendor:ciscomodel:asyncosscope:eqversion:8.1.1-013

Trust: 0.8

vendor:ciscomodel:ironport asyncos softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:ironport asyncosscope:eqversion:7.9.1-039

Trust: 0.6

vendor:ciscomodel:ironport asyncosscope:eqversion:7.6.2-201

Trust: 0.6

sources: CNVD: CNVD-2014-01906 // JVNDB: JVNDB-2014-001748 // CNNVD: CNNVD-201403-387 // NVD: CVE-2014-2119

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-2119
value: HIGH

Trust: 1.0

NVD: CVE-2014-2119
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-01906
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201403-387
value: HIGH

Trust: 0.6

VULHUB: VHN-70058
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-2119
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-01906
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-70058
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:M/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.8
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-01906 // VULHUB: VHN-70058 // JVNDB: JVNDB-2014-001748 // CNNVD: CNNVD-201403-387 // NVD: CVE-2014-2119

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-70058 // JVNDB: JVNDB-2014-001748 // NVD: CVE-2014-2119

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201403-387

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201403-387

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001748

PATCH

title:cisco-sa-20140319-asyncosurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140319-asyncos

Trust: 0.8

title:33309url:http://tools.cisco.com/security/center/viewAlert.x?alertId=33309

Trust: 0.8

title:cisco-sa-20140319-asyncosurl:http://www.cisco.com/cisco/web/support/JP/112/1122/1122225_cisco-sa-20140319-asyncos-j.html

Trust: 0.8

title:Cisco AsyncOS Software 'Safelist/Blocklist (SLBL)' Function Remote Code Execution Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/44475

Trust: 0.6

sources: CNVD: CNVD-2014-01906 // JVNDB: JVNDB-2014-001748

EXTERNAL IDS

db:NVDid:CVE-2014-2119

Trust: 3.4

db:BIDid:66309

Trust: 1.0

db:JVNDBid:JVNDB-2014-001748

Trust: 0.8

db:CNNVDid:CNNVD-201403-387

Trust: 0.7

db:CNVDid:CNVD-2014-01906

Trust: 0.6

db:CISCOid:20140319 CISCO ASYNCOS SOFTWARE CODE EXECUTION VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-70058

Trust: 0.1

sources: CNVD: CNVD-2014-01906 // VULHUB: VHN-70058 // BID: 66309 // JVNDB: JVNDB-2014-001748 // CNNVD: CNNVD-201403-387 // NVD: CVE-2014-2119

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140319-asyncos

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2119

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2119

Trust: 0.8

url:http://tools.cisco.com/security/center/viewipssignature.x?signatureid=3889&signaturesubid=0&softwareversion=6.0&releaseversion=s778

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2014-01906 // VULHUB: VHN-70058 // BID: 66309 // JVNDB: JVNDB-2014-001748 // CNNVD: CNNVD-201403-387 // NVD: CVE-2014-2119

CREDITS

Cisco

Trust: 0.3

sources: BID: 66309

SOURCES

db:CNVDid:CNVD-2014-01906
db:VULHUBid:VHN-70058
db:BIDid:66309
db:JVNDBid:JVNDB-2014-001748
db:CNNVDid:CNNVD-201403-387
db:NVDid:CVE-2014-2119

LAST UPDATE DATE

2024-11-23T21:55:26.838000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-01906date:2014-03-24T00:00:00
db:VULHUBid:VHN-70058date:2018-10-30T00:00:00
db:BIDid:66309date:2014-03-19T00:00:00
db:JVNDBid:JVNDB-2014-001748date:2014-03-24T00:00:00
db:CNNVDid:CNNVD-201403-387date:2014-03-25T00:00:00
db:NVDid:CVE-2014-2119date:2024-11-21T02:05:41.360

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-01906date:2014-03-24T00:00:00
db:VULHUBid:VHN-70058date:2014-03-21T00:00:00
db:BIDid:66309date:2014-03-19T00:00:00
db:JVNDBid:JVNDB-2014-001748date:2014-03-24T00:00:00
db:CNNVDid:CNNVD-201403-387date:2014-03-25T00:00:00
db:NVDid:CVE-2014-2119date:2014-03-21T01:04:02.937