Lucene search

K
certCERTVU:642076
HistorySep 22, 2006 - 12:00 a.m.

Cisco Intrusion Prevention System administration interface fails to properly handle Secure Socket Layer packets

2006-09-2200:00:00
www.kb.cert.org
9

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.046

Percentile

92.6%

Overview

The web administration interface of Cisco Intrusion Prevention System and Intrusion Detection System devices fails to properly handle certain Secure Socket Layer packets. This vulnerability may cause a denial of service.

Description

According to Cisco Security Advisory cisco-sa-20060920-ips:

It is possible to send a malformed SSLv2 Client Hello packet to the IPS/IDS web administration interface, which may cause the process (mainApp) responsible for managing remote access to fail. This results in an IPS/IDS device becoming unresponsive to all future remote management requests through the web administration interface or the command-line interface (CLI) via SSH and the console.
The specific nature of the malformed packets that exploit this vulnerability is unknown. Vulnerable products include Cisco IDS 4.1(x) software prior to 4.1(5c), Cisco IPS 5.0(x) software prior to 5.0(6p1), and Cisco IPS 5.1(x) software prior to 5.1(2).


Impact

A remote, unauthenticated attacker could cause the administrative interface of an affected device to become unavailable, leading to various secondary denial of service impacts.


Solution

Upgrade
Cisco has made fixed versions of the software available to address these vulnerabilities. For more information see Cisco Security Advisory cisco-sa-20060920-ips.


Apply Access Control List

Users that are unable to upgrade should apply an access control list (ACL) on the vulnerable device to restrict access to trusted management systems. Details on creating and uploading an ACL can be found in Cisco’s Product Configuration Guide.


Vendor Information

642076

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Cisco Systems, Inc. __ Affected

Updated: September 20, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to <http://www.cisco.com/warp/public/707/cisco-sa-20060920-ips.shtml&gt;.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23642076 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This issue was reported in Cisco Security Advisory cisco-sa-20060920-ips.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2006-4910
Severity Metric: 3.66 Date Public:

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.046

Percentile

92.6%

Related for VU:642076