Lucene search

K
saintSAINT CorporationSAINT:EC522F5DF020A3400B7FFD53A64F470B
HistoryApr 07, 2008 - 12:00 a.m.

Cisco Secure ACS UCP CSuserCGI.exe buffer overflow

2008-04-0700:00:00
SAINT Corporation
my.saintcorporation.com
22

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.927

Percentile

99.0%

Added: 04/07/2008
CVE: CVE-2008-0532
BID: 28222
OSVDB: 42961

Background

Cisco Secure Access Control Server (ACS) is a centralized user access control framework which can be used with routers, switches, firewalls, VPNs, and other devices. User Changeable Passwords (UCP), a utility implemented by Cisco Secure ACS, allows users to change their ACS passwords using a web browser.

Problem

A buffer overflow in the **CSuserCGI.exe** program allows remote attackers to execute arbitrary commands by sending a specially crafted HTTP request with a long Logout argument.

Resolution

Upgrade to UCP 4.2.

References

<http://www.cisco.com/warp/public/707/cisco-sa-20080312-ucp.shtml&gt;
<http://www.frsirt.com/english/advisories/2008/0868&gt;

Limitations

Exploit works on Cisco UCP 4.1.4.13.

On Windows Server 2003, Read and Execute privileges on the file **%windir%\system32\cmd.exe** must be granted to the Internet Guest Account “IUSR_” for the exploit to work properly.

Platforms

Windows 2000
Windows Server 2003

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.927

Percentile

99.0%