发布时间 :2000-05-30 00:00:00
修订时间 :2008-09-10 15:04:48

[原文]Buffer overflow in Cisco TACACS+ tac_plus server allows remote attackers to cause a denial of service via a malformed packet with a long length field.

[CNNVD]TACACS+ 拒绝服务漏洞(CNNVD-200005-104)

        Cisco TACACS+ tac_plus服务器存在缓冲区溢出漏洞漏洞。远程攻击者借助含有超长长度字段的畸形包导致拒绝服务。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:cisco:tacacs%2B:f4.0.3alphaCisco tac_plus 4.0.3alpha
cpe:/a:cisco:tacacs%2B:f4.0.2alphaCisco tac_plus 4.0.2alpha

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  20000530 An Analysis of the TACACS+ Protocol and its Implementations
(UNKNOWN)  XF  tacacsplus-packet-length-dos
(UNKNOWN)  BID  1293

- 漏洞信息

TACACS+ 拒绝服务漏洞
中危 缓冲区溢出
2000-05-30 00:00:00 2005-05-02 00:00:00
        Cisco TACACS+ tac_plus服务器存在缓冲区溢出漏洞漏洞。远程攻击者借助含有超长长度字段的畸形包导致拒绝服务。

- 公告与补丁

        From Damir Rajnovic :
        We updated our unsupported version of TACACS+ server so it is no longer vulnerable to oversized T+ packets. You can download the new version, F4.0.4 alpha, if you follow this URL:
        A patch was supplied by Solar Designer in his paper analyzing tacacs+ vulnerabilities.
        Cisco tac_plus 4.0.3 alpha

- 漏洞信息

Cisco TACACS+ tac_plus Server Malformed Packet Memory Exhaustion DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Unknown

- 漏洞描述

TACACS+ contains a flaw that may allow a remote denial of service. The issue is triggered when sending a packet with a long length field, which causes the server to run out of memory, and will result in loss of availability for the service.

- 时间线

2000-05-30 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Solar Designer has released an unsupported patch to address this vulnerability.

- 相关参考

- 漏洞作者