CVE-2001-0711
CVSS5.0
发布时间 :2001-08-31 00:00:00
修订时间 :2008-09-05 16:24:44
NMCOES    

[原文]Cisco IOS 11.x and 12.0 with ATM support allows attackers to cause a denial of service via the undocumented Interim Local Management Interface (ILMI) SNMP community string.


[CNNVD]Cisco IOS ILMI SNMP共同体串漏洞(CNNVD-200108-159)

        
        IOS是运行Cisco公司开发的网络设备上操作系统,由Cisco公司维护和发布。
        IOS 11.x到12.0版本的软件在SNMP实现上存在一个漏洞,远程攻击者可能利用此漏洞取得对系统的非法访问。
        ILMI SNMP共同体串允许对MIB-II community组中的系统对象进行读写访问。这些配置参数不影响设备的正常运行,但被改变之后会导致混乱或社会工程(social engineering)攻击。恶意的远程攻击者有可能修改MIB-II Community中的配置对象、重命名系统、修改系统中的位置名称或修改系统的联系人信息。这个漏洞只影响特定的设备。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:cisco:ios:12.0Cisco IOS 12.0
cpe:/o:cisco:ios:11Cisco IOS 11.x

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0711
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0711
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200108-159
(官方数据源) CNNVD

- 其它链接及资源

http://www.cisco.com/warp/public/707/ios-snmp-ilmi-vuln-pub.shtml
(VENDOR_ADVISORY)  CISCO  20010207 Cisco IOS Software SNMP Read-Write ILMI Community String Vulnerability
http://xforce.iss.net/static/6169.php
(UNKNOWN)  XF  cisco-ios-modify-snmp(6169)

- 漏洞信息

Cisco IOS ILMI SNMP共同体串漏洞
中危 访问验证错误
2001-08-31 00:00:00 2005-10-20 00:00:00
远程  
        
        IOS是运行Cisco公司开发的网络设备上操作系统,由Cisco公司维护和发布。
        IOS 11.x到12.0版本的软件在SNMP实现上存在一个漏洞,远程攻击者可能利用此漏洞取得对系统的非法访问。
        ILMI SNMP共同体串允许对MIB-II community组中的系统对象进行读写访问。这些配置参数不影响设备的正常运行,但被改变之后会导致混乱或社会工程(social engineering)攻击。恶意的远程攻击者有可能修改MIB-II Community中的配置对象、重命名系统、修改系统中的位置名称或修改系统的联系人信息。这个漏洞只影响特定的设备。
        

- 公告与补丁

        厂商补丁:
        Cisco
        -----
        Cisco已经为此发布了一个安全公告(CI-01.02)以及相应补丁:
        CI-01.02:Cisco IOS Software SNMP Read-Write ILMI Community String Vulnerability
        链接:
        补丁下载:
        
        http://www.cisco.com

- 漏洞信息 (20652)

Cisco IOS 11.x/12.0 ILMI SNMP Community String Vulnerability (EDBID:20652)
hardware remote
2001-02-27 Verified
0 pask
N/A [点击下载]
source: http://www.securityfocus.com/bid/2427/info

IOS is the operating system designed for various Cisco devices. It is maintained and distributed by Cisco systems.

A problem in the versions of IOS 11.x and 12.0 could allow unauthorized access to certain configuration variables within a Cisco device. The ILMI SNMP Community string allows read and write access to system objects in the MIB-II community group. These configuration parameters do not affect the normal operation of the device, although if changed, can cause confusion or lead to a social engineering attack.

It is possible for a malicious remote user to change configuration objects within the MIB-II Community, and rename the system, change the location name in the system, and/or the contact information for the system. This vulnerability affects only certain devices.

snmpwalk router ILMI |more 		

- 漏洞信息

8820
Cisco IOS ILMI Default Community String Remote Configuration Manipulation
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

By default, Cisco IOS versions that support ATM install with a default SNMP string of ILMI enabled. The ILMI SNMP string is publicly known and documented, though not documented by Cisco with the rest of the release. This allows attackers to trivially access the program or system, and to cause denial of service conditions at will.

- 时间线

2001-02-27 Unknow
Unknow Unknow

- 解决方案

Upgrade to the version appropriate for your installation, as outlined in the vulnerable version matrix provided by Cisco. It is also possible to correct the flaw by implementing the following workaround(s): Disable SNMP access to the router, or remove the ILMI community string and view.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Cisco IOS ILMI SNMP Community String Vulnerability
Access Validation Error 2427
Yes No
2001-02-27 12:00:00 2009-07-11 04:46:00
This vulnerability was first announced to Bugtraq in a Cisco Security Advisory February 27, 2001.

- 受影响的程序版本

Cisco IOS 12.0XV
Cisco IOS 12.0XS
Cisco IOS 12.0XR
Cisco IOS 12.0XQ
Cisco IOS 12.0XM
Cisco IOS 12.0XL
Cisco IOS 12.0XK
Cisco IOS 12.0XJ
Cisco IOS 12.0XI
Cisco IOS 12.0XH
Cisco IOS 12.0XG
Cisco IOS 12.0XF
Cisco IOS 12.0XE
Cisco IOS 12.0XD
Cisco IOS 12.0XC
Cisco IOS 12.0XB
Cisco IOS 12.0XA
Cisco IOS 12.0WT
Cisco IOS 12.0W5
Cisco IOS 12.0T
Cisco IOS 12.0SX
Cisco IOS 12.0ST
Cisco IOS 12.0SL
Cisco IOS 12.0SC
Cisco IOS 12.0S
Cisco IOS 12.0DC
Cisco IOS 12.0DB
Cisco IOS 12.0DA
Cisco IOS 12.0
Cisco IOS 11.3WA4
Cisco IOS 11.3T
Cisco IOS 11.3NA
Cisco IOS 11.3MA
Cisco IOS 11.3DB
Cisco IOS 11.3DA
Cisco IOS 11.3AA
Cisco IOS 11.3(2)XA
Cisco IOS 11.3
Cisco IOS 11.2WA3
Cisco IOS 11.2SA
Cisco IOS 11.2P
Cisco IOS 11.2GS
Cisco IOS 11.2BC
Cisco IOS 11.2(9)XA
Cisco IOS 11.2(4)XA
Cisco IOS 11.1IA
Cisco IOS 11.1CT
Cisco IOS 11.1CC
Cisco IOS 11.1CA
Cisco IOS 11.1AA
Cisco IOS 11.1
Cisco IOS 11.0

- 漏洞讨论

IOS is the operating system designed for various Cisco devices. It is maintained and distributed by Cisco systems.

A problem in the versions of IOS 11.x and 12.0 could allow unauthorized access to certain configuration variables within a Cisco device. The ILMI SNMP Community string allows read and write access to system objects in the MIB-II community group. These configuration parameters do not affect the normal operation of the device, although if changed, can cause confusion or lead to a social engineering attack.

It is possible for a malicious remote user to change configuration objects within the MIB-II Community, and rename the system, change the location name in the system, and/or the contact information for the system. This vulnerability affects only certain devices.

- 漏洞利用

Exploit contributed by Juan Manuel Pascual Escriba <pask@plazasite.com>:

snmpwalk router ILMI |more

- 解决方案

Updates available:


Cisco IOS 11.1AA
  • Cisco IOS 12.1(7)


Cisco IOS 11.2WA3
  • Cisco IOS 12.0(10)W(18b)

  • Cisco IOS 12.0(13)W5(19b)


Cisco IOS 11.1CA
  • Cisco IOS 11.1(36)CA1


Cisco IOS 12.0SC
  • Cisco IOS 12.0(15)SC1


Cisco IOS 12.0XA
  • Cisco IOS 12.1(7)


Cisco IOS 12.0XI
  • Cisco IOS 12.1(7)


Cisco IOS 12.0XM
  • Cisco IOS 12.1(7)


Cisco IOS 11.2P
  • Cisco IOS 11.2(25a)P


Cisco IOS 12.0SL
  • Cisco IOS 12.0(14)SL1

  • Cisco IOS 12.1(5c)E8


Cisco IOS 12.0S
  • Cisco IOS 12.0(15)SC1


Cisco IOS 11.3MA
  • Cisco IOS 11.3(1)MA8


Cisco IOS 12.0XC
  • Cisco IOS 12.1(7)


Cisco IOS 12.0XH
  • Cisco IOS 12.0(4)XH5


Cisco IOS 12.0W5
  • Cisco IOS 12.0(10)W5(18)

  • Cisco IOS 12.0(10)W5(18e)

  • Cisco IOS 12.0(10)W5(18f)

  • Cisco IOS 12.0(13)W5(19)

  • Cisco IOS 12.0(13)W5(19c)


Cisco IOS 11.3WA4
  • Cisco IOS 12.0(10)W(18b)

  • Cisco IOS 12.0(13)W5(19b)


Cisco IOS 12.0DC
  • Cisco IOS 12.1(4)DC2


Cisco IOS 12.0XB
  • Cisco IOS 12.1(7)


Cisco IOS 12.0T
  • Cisco IOS 12.1(7)


Cisco IOS 12.0SX
  • Cisco IOS 12.1(5c)E8


Cisco IOS 11.3NA
  • Cisco IOS 12.1(7)


Cisco IOS 12.0WT
  • Cisco IOS 12.0(13)WT6(1)


Cisco IOS 11.0
  • Cisco IOS 11.0(22a)


Cisco IOS 11.3AA
  • Cisco IOS 11.3(11a)AA


Cisco IOS 12.0XG
  • Cisco IOS 12.1(7)


Cisco IOS 12.0DA
  • Cisco IOS 12.1(5)DA1

  • Cisco IOS 12.1(7)


Cisco IOS 12.0XQ
  • Cisco IOS 12.1(7)


Cisco IOS 12.0XS
  • Cisco IOS 12.1(5c)E8


Cisco IOS 11.2(9)XA
  • Cisco IOS 11.2(9)XA1


Cisco IOS 11.3DB
  • Cisco IOS 12.1(4)DB1


Cisco IOS 11.3T
  • Cisco IOS 11.3(11b)T1


Cisco IOS 11.1
  • Cisco IOS 11.1(24a)


Cisco IOS 11.3
  • Cisco IOS 11.3(11b)


Cisco IOS 11.3DA
  • Cisco IOS 12.1(5)DA1


Cisco IOS 12.0XL
  • Cisco IOS 12.1(5)T5


Cisco IOS 12.0XV
  • Cisco IOS 12.1(5)T5


Cisco IOS 12.0XF
  • Cisco IOS 12.1(7)


Cisco IOS 11.2GS
  • Cisco IOS 12.0(15)S1


Cisco IOS 11.3(2)XA
  • Cisco IOS 11.3(11b)T1


Cisco IOS 11.1CT
  • Cisco IOS 12.0(11)ST2


Cisco IOS 11.2SA
  • Cisco IOS 12.0(5)WC


Cisco IOS 12.0XK
  • Cisco IOS 12.0(7)XK4


Cisco IOS 12.0XR
  • Cisco IOS 12.1(5)T5


Cisco IOS 12.0DB
  • Cisco IOS 12.1(4)DB1

  • Cisco IOS 12.1(4)DC2


Cisco IOS 12.0XE
  • Cisco IOS 12.0(4)XH5

  • Cisco IOS 12.1(5c)E8


Cisco IOS 12.0XJ
  • Cisco IOS 12.1(7)


Cisco IOS 11.1IA
  • Cisco IOS 11.1(28)IA1


Cisco IOS 11.2BC
  • Cisco IOS 12.1(7)


Cisco IOS 12.0XD
  • Cisco IOS 12.1(7)


Cisco IOS 11.2(4)XA
  • Cisco IOS 11.2(25a)P


Cisco IOS 11.1CC
  • Cisco IOS 11.1(36)CC1


Cisco IOS 12.0
  • Cisco IOS 12.0(16)

  • Cisco IOS 12.0(8)

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站