CVE-2000-1022
CVSS7.5
发布时间 :2000-12-11 00:00:00
修订时间 :2008-09-05 16:22:27
NMCOE    

[原文]The mailguard feature in Cisco Secure PIX Firewall 5.2(2) and earlier does not properly restrict access to SMTP commands, which allows remote attackers to execute restricted commands by sending a DATA command before sending the restricted commands.


[CNNVD]Cisco Secure PIX Firewall漏洞(CNNVD-200012-055)

        Cisco Secure PIX Firewall 5.2(2)及其早期版本的mailguard特性不能正确限制访问到STMP命令。远程攻击者通过在发送限制命令之前发送DATA命令执行限制命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:cisco:pix_firewall:5.2
cpe:/o:cisco:pix_firewall:4.4%284%29
cpe:/o:cisco:pix_firewall:4.3
cpe:/o:cisco:pix_firewall:4.2%285%29
cpe:/o:cisco:pix_firewall:5.0
cpe:/o:cisco:pix_firewall:4.2%282%29
cpe:/o:cisco:pix_firewall:5.1
cpe:/o:cisco:pix_firewall:4.2%281%29

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1022
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-1022
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200012-055
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/5277.php
(VENDOR_ADVISORY)  XF  cisco-pix-smtp-filtering
http://www.securityfocus.com/bid/1698
(VENDOR_ADVISORY)  BID  1698
http://www.cisco.com/warp/public/707/PIXfirewallSMTPfilter-pub.shtml
(UNKNOWN)  CISCO  20001005 Cisco Secure PIX Firewall Mailguard Vulnerability
http://archives.neohapsis.com/archives/bugtraq/2000-09/0241.html
(UNKNOWN)  BUGTRAQ  20000920 Re: Cisco PIX Firewall (smtp content filtering hack) - Version 4.2(1) not exploitable
http://archives.neohapsis.com/archives/bugtraq/2000-09/0222.html
(UNKNOWN)  BUGTRAQ  20000919 Cisco PIX Firewall (smtp content filtering hack)

- 漏洞信息

Cisco Secure PIX Firewall漏洞
高危 未知
2000-12-11 00:00:00 2005-05-02 00:00:00
远程  
        Cisco Secure PIX Firewall 5.2(2)及其早期版本的mailguard特性不能正确限制访问到STMP命令。远程攻击者通过在发送限制命令之前发送DATA命令执行限制命令。

- 公告与补丁

        

- 漏洞信息 (20231)

Cisco PIX Firewall 4.x/5.x SMTP Content Filtering Evasion Vulnerability (EDBID:20231)
hardware remote
2000-09-19 Verified
0 Lincoln Yeoh
N/A [点击下载]
source: http://www.securityfocus.com/bid/1698/info

Like other firewalls, the Cisco PIX Firewall implements technology that reads the contents of packets passing through it for application-level filtering. In the case of SMTP, it can be configured so only certain smtp commands can be allowed through (for example, dropping extra functionality, such as HELP or commands that could be a security concern, like EXPN or VRFY). When recieving messages, it allows all text through between "data" and "<CR><LF><CR><LF>.<CR><LF>", as this is where the body of the message would normally go and there could be words in it that are smtp commands which shouldn't be filtered. Due to the nature of SMTP and flaws in exceptional condition handling of PIX, it is reportedly possible to evade the smtp command restrictions by tricking the firewall into thinking the body of the message is being sent when it isn't.

During communication with an smtp server, if the "data" command is sent before the more important information is sent, such as "rcpt to", the smtp server will return error 503, saying that rcpt was required. The firewall, however, thinks everything is alright and will let everything through until recieving "<CR><LF><CR><LF>.<CR><LF>". It is then possible for the attacker to do whatever he wishes on the email server. 

Here an example of what i could do exploiting this bug:
helo ciao
mail from: pinco@pallino.it
data ( From here pix disable fixup)
expn guest ( Now i could enumerate user
vrfy oracle and have access to all command)
help
whatever command i want
quit 		

- 漏洞信息

419
Cisco PIX Firewall Mailguard Feature SMTP Content Filter Bypass Remote SMTP Command Execution
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Exploit Public Vendor Verified, Third-party Verified

- 漏洞描述

- 时间线

2000-09-19 Unknow
Unknow 2000-09-27

- 解决方案

Upgrade to the latest version as of 2000-09-27, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站