发布时间 :1995-07-31 00:00:00
修订时间 :2008-09-09 08:33:53

[原文]In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering.

[CNNVD]Cisco IOS漏洞(CNNVD-199507-002)

        含有tacacs-ds 或tacacs关键字的Cisco IOS 10.3版本存在漏洞。扩展的IP访问控制列表可以绕过过滤。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:cisco:ios:10.3%283.4%29Cisco IOS
cpe:/o:cisco:ios:10.3%284.2%29Cisco IOS 10.3.4 .2

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:5297Cisco IOS access-list "tacacs-ds" or "tacacs" Keyword Vulnerability

- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

Cisco IOS漏洞
高危 未知
1995-07-31 00:00:00 2005-05-02 00:00:00
        含有tacacs-ds 或tacacs关键字的Cisco IOS 10.3版本存在漏洞。扩展的IP访问控制列表可以绕过过滤。

- 公告与补丁


- 漏洞信息

Cisco IOS tacacs Keyword ACL Bypass
Authentication Management, Input Manipulation
Loss of Integrity
Vendor Verified

- 漏洞描述

Cisco IOS contains a flaw that may allow a malicious user to bypass access control lists. The issue is caused by incorrect parses of extended ACLs which use the "tacacs" and "tacacs-ds" keywords. It is possible that the flaw may allow unauthorized traffic to traverse the network.

- 时间线

1995-07-31 1995-07-31
Unknow Unknow

- 解决方案

Upgrade to version indicated by Cisco product matrixx, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete