var-201008-0178
Vulnerability from variot
Unspecified vulnerability in the Transport Layer Security (TLS) implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 before 7.2(5), 8.0 before 8.0(5.15), 8.1 before 8.1(2.44), 8.2 before 8.2(2.17), and 8.3 before 8.3(1.6) and Cisco PIX Security Appliances 500 series devices allows remote attackers to cause a denial of service (device reload) via a sequence of crafted TLS packets, aka Bug ID CSCtf37506. The problem is Bug ID : CSCtd37506 It is a problem.Skillfully crafted by a third party TLS Denial of service through a sequence of packets (DoS) There is a possibility of being put into a state. An attacker can exploit this issue to cause the affected device to crash and reload, denying service to legitimate users. This issue being tracked by Cisco bug ID CSCtf37506. ----------------------------------------------------------------------
"From 2007 to 2009 vulnerabilities in a typical end-user PC almost doubled from about 220 to 420."
Non-Microsoft software to blame for increase in vulnerabilities affecting typical Windows end-users, read more:
http://secunia.com/gfx/pdf/Secunia_Half_Year_Report_2010.pdf
TITLE: Cisco ASA 5500 Series Multiple Denial of Service Vulnerabilities
SECUNIA ADVISORY ID: SA40842
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40842/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40842
RELEASE DATE: 2010-08-05
DISCUSS ADVISORY: http://secunia.com/advisories/40842/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/40842/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=40842
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Some vulnerabilities have been reported in Cisco ASA (Adaptive Security Appliance) 5500 Series, which can be exploited by malicious people to cause a DoS (Denial of Service).
1) Three errors exist in the SunRPC inspection engine while processing certain SunRPC messages. This can be exploited to reload a device via specially crafted UDP SunRPC packets that transit the appliance.
3) An error in the Session Initiation Protocol (SIP) inspection feature can be exploited to trigger an appliance reload via a specially crafted SIP packet that transits the appliance via TCP or UDP port 5060. Please see the vendor's advisory for detailed patch information.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: cisco-sa-20100804-asa: http://www.cisco.com/warp/public/707/cisco-sa-20100804-asa.shtml
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
There are workarounds for some of the vulnerabilities disclosed in this advisory.
This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20100804-asa.shtml
Note: The Cisco Firewall Services Module (FWSM) is affected by the SunRPC DoS vulnerabilities. A separate Cisco Security Advisory has been published to disclose the vulnerabilities that affect the FWSM. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability.
Vulnerable Products +------------------
For specific version information, refer to the Software Versions and Fixes section of this advisory. A successful attack may result in a sustained DoS condition.
Versions 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected. SunRPC inspection is enabled by default.
To check if SunRPC inspection is enabled, issue the "show service-policy | include sunrpc" command and confirm that output, such as what is displayed in the following example, is returned.
ciscoasa# show service-policy | include sunrpc
Inspect: sunrpc, packet 0, drop 0, reset-drop 0
The following configuration commands are used to enable SunRPC inspection in the Cisco ASA.
class-map inspection_default
match default-inspection-traffic
!
policy-map global_policy
class inspection_default
...
inspect sunrpc
... A
successful attack may result in a sustained DoS condition. Versions 7.2.x, 8.0.x, 8.1.x, 8.2.x, and 8.3.x are affected by one or more of these vulnerabilities. A Cisco ASA device configured for any of the following features is affected:
- Secure Socket Layer Virtual Private Network (SSL VPN)
- When the affected device is configured to accept Cisco Adaptive Security Device Manager (ASDM) connections
- TLS Proxy for Encrypted Voice Inspection
- Cut-Through Proxy for Network Access when using HTTPS
SSL VPN (or WebVPN) is enabled with the "enable
webvpn
enable outside
...
ASDM access is affected by three of these vulnerabilities. To use ASDM, the HTTPS server must be enabled to allow HTTPS connections to the Cisco ASA. The server can be enabled using the "http server enable [port]" command. The default port is 443. To specify hosts that can access the HTTP server internal to the security appliance, use the "http" command in global configuration mode.
The TLS Proxy for Encrypted Voice Inspection feature is affected by these vulnerabilities. This feature was introduced in Cisco ASA version 8.0(2) and is disabled by default.
To determine if the TLS Proxy for Encrypted Voice Inspection feature is enabled on the device, use the show tls-proxy command, as shown in the following example:
ciscoasa# show tls-proxy
Maximum number of sessions: 1200
TLS-Proxy 'sip_proxy': ref_cnt 1, seq# 3
Server proxy:
Trust-point: local_ccm
Client proxy:
Local dynamic certificate issuer: LOCAL-CA-SERVER
Local dynamic certificate key-pair: phone_common
Cipher suite: aes128-sha1 aes256-sha1
Run-time proxies:
Proxy 0xcbae1538: Class-map: sip_ssl, Inspect: sip
Active sess 1, most sess 3, byte 3456043
...
<output truncated>
TLS proxy supports SIP and Skinny protocols. TLS proxy for Skinny
inspection can be enabled using the "inspect skinny
asa(config-pmap)# class inspection_default
asa(config-pmap-c)# inspect skinny my-inspect tls-proxy my-tls-proxy
asa(config)# service-policy global_policy global
Note: Secure SCCP uses TCP port 2443; however, it can be configured to a different port.
TLS proxy for SIP inspection can be enabled using the "inspect sip
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.