CVE-2002-0778
CVSS7.5
发布时间 :2002-08-12 00:00:00
修订时间 :2008-09-05 16:28:55
NMCO    

[原文]The default configuration of the proxy for Cisco Cache Engine and Content Engine allows remote attackers to use HTTPS to make TCP connections to allowed IP addresses while hiding the actual source IP.


[CNNVD]Cisco Cache Engine默认配置任意用户可使用代理漏洞(CNNVD-200208-017)

        
        Cisco Cache Engine系列产品是CISCO公司开发和维护的网络集成的高速缓存解决方案,可以减少广域网带宽使用,最大限度地提高网络服务质量,提高现有网络的可伸缩性。
        Cisco Cache Engine默认配置存在漏洞,可导致远程攻击者滥用代理,连接任意远程IP地址。
        Cisco Cache Engine除了对远程WEB服务器提供页面缓冲外,软件也提供使用各种协议如FTP和HTTPS来缓冲数据到其他代理服务器,此功能在产品默认配置中是使能的,由于代理HTTPS服务可以在系统不同端口使用,使的攻击者利用客户端指示设备重定向代理请求打开TCP连接到任意可达IP地址和端口,导致滥用资源和隐藏连接源地址等操作。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:cisco:content_engine:507
cpe:/a:cisco:content_engine:560_4.1
cpe:/a:cisco:content_distribution_manager_4650:4.0Cisco Content Distribution Manager 4650 4.0
cpe:/a:cisco:content_engine:560_4.0
cpe:/a:cisco:content_engine:590
cpe:/h:cisco:cache_engine_570:570Cisco Cache Engine 570
cpe:/a:cisco:content_distribution_manager_4630:4.1Cisco Content Distribution Manager 4630 4.1
cpe:/a:cisco:content_engine:507_4.1
cpe:/a:cisco:content_distribution_manager_4630:4.0Cisco Content Distribution Manager 4630 4.0
cpe:/h:cisco:cache_engine_570:2.4.0Cisco Cache Engine 570 4.0
cpe:/h:cisco:cache_engine_550Cisco Cache Engine 505
cpe:/a:cisco:content_engine:7320_3.1
cpe:/a:cisco:content_engine:590_2.2.0
cpe:/a:cisco:content_engine:560_3.1
cpe:/h:cisco:cache_engine_570:3.0Cisco Cache Engine 570 3.0
cpe:/h:cisco:cache_engine_505:2.4.0Cisco Cache Engine 505 4.0
cpe:/a:cisco:content_engine:590_4.1
cpe:/a:cisco:content_engine:7320_2.2.0
cpe:/h:cisco:content_router_4430Cisco Content Router 4430
cpe:/h:cisco:cache_engine_550:3.0Cisco Cache Engine 550 3.0
cpe:/a:cisco:content_engine:507_4.0
cpe:/a:cisco:content_distribution_manager_4650:4.1Cisco Content Distribution Manager 4650 4.1
cpe:/a:cisco:content_engine:7320_4.0
cpe:/a:cisco:content_engine:590_3.1
cpe:/a:cisco:content_engine:590_4.0
cpe:/h:cisco:cache_engine_550:2.4.0Cisco Cache Engine 550 4.0
cpe:/a:cisco:content_distribution_manager_4650Cisco Content Distribution Manager 4650
cpe:/a:cisco:content_distribution_manager_4630Cisco Content Distribution Manager 4630
cpe:/h:cisco:cache_engine_550:2.2.0Cisco Cache Engine 505 2.2.0
cpe:/o:cisco:content_router_4430:4.0
cpe:/a:cisco:content_engine:560
cpe:/h:cisco:cache_engine_570:2.2.0Cisco Cache Engine 570 2.2.0
cpe:/a:cisco:content_engine:560_2.2.0
cpe:/o:cisco:content_router_4430:4.1
cpe:/h:cisco:cache_engine_505:3.0Cisco Cache Engine 505 3.0
cpe:/a:cisco:content_engine:7320_4.1
cpe:/a:cisco:content_engine:507_3.1
cpe:/a:cisco:content_engine:507_2.2.0
cpe:/a:cisco:content_engine:7320

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0778
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0778
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200208-017
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4751
(VENDOR_ADVISORY)  BID  4751
http://www.iss.net/security_center/static/9082.php
(VENDOR_ADVISORY)  XF  cisco-cache-content-tcp-forward(9082)
http://www.cisco.com/warp/public/707/transparentcache-tcp-relay-vuln-pub.shtml
(VENDOR_ADVISORY)  CISCO  20020528 Transparent Cache Engine and Content Engine TCP Relay Vulnerability

- 漏洞信息

Cisco Cache Engine默认配置任意用户可使用代理漏洞
高危 未知
2002-08-12 00:00:00 2005-05-02 00:00:00
远程  
        
        Cisco Cache Engine系列产品是CISCO公司开发和维护的网络集成的高速缓存解决方案,可以减少广域网带宽使用,最大限度地提高网络服务质量,提高现有网络的可伸缩性。
        Cisco Cache Engine默认配置存在漏洞,可导致远程攻击者滥用代理,连接任意远程IP地址。
        Cisco Cache Engine除了对远程WEB服务器提供页面缓冲外,软件也提供使用各种协议如FTP和HTTPS来缓冲数据到其他代理服务器,此功能在产品默认配置中是使能的,由于代理HTTPS服务可以在系统不同端口使用,使的攻击者利用客户端指示设备重定向代理请求打开TCP连接到任意可达IP地址和端口,导致滥用资源和隐藏连接源地址等操作。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 使用如下配置方法来使设备只重定向端口为443的代理请求:
        https destination-port allow 443
        https destination-port deny all
        * 如果HTTPS代理不需要,请使用如下命令关闭HTTPS服务:
        https
        destination-port allow 443
        厂商补丁:
        Cisco
        -----
        Cisco已经为此发布了一个安全公告(Cisco-transparentcache-tcp-relay-vuln)以及相应补丁:
        Cisco-transparentcache-tcp-relay-vuln:Transparent Cache Engine and Content Engine TCP Relay Vulnerability
        链接:
        http://www.cisco.com/warp/public/707/transparentcache-tcp-relay-vuln-pub.shtml

        补丁下载:
        Cisco Cache Engine 505 :
        Cisco Cache Engine 570 :
        Cisco Content Engine 507 :
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 560 :
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 590 :
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 7320 :
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Router 4430 :
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Distribution Manager 4630 :
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Distribution Manager 4650 :
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Cache Engine 550 :
        Cisco Cache Engine 550 2.2 .0:
        Cisco Cache Engine 505 2.2 .0:
        Cisco Cache Engine 570 2.2 .0:
        Cisco Content Engine 507 2.2 .0:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 560 2.2 .0:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 590 2.2 .0:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 7320 2.2 .0:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Cache Engine 570 3.0:
        Cisco Cache Engine 505 3.0:
        Cisco Cache Engine 550 3.0:
        Cisco Content Engine 507 3.1:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 560 3.1:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 590 3.1:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 7320 3.1:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 507 4.0:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 560 4.0:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 590 4.0:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 7320 4.0:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Cache Engine 550 4.0:
        Cisco Cache Engine 505 4.0:
        Cisco Cache Engine 570 4.0:
        Cisco Content Router 4430 4.0:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Distribution Manager 4630 4.0:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Distribution Manager 4650 4.0:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Distribution Manager 4650 4.1:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Distribution Manager 4630 4.1:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Router 4430 4.1:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 507 4.1:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 560 4.1:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 590 4.1:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

        Cisco Content Engine 7320 4.1:
        Cisco Upgrade ACNS 4.1(3.3)
        
        http://www.cisco.com/tac

- 漏洞信息

5111
Cisco Cache/Content Engine HTTPS Anonymous Relay
Remote / Network Access Misconfiguration
Loss of Integrity
Exploit Public

- 漏洞描述

Cisco Cache/Content engines contain a flaw that may allow a malicious user to use them as anonymous relay. The issue is triggered when the engines do not properly sanitize HTTPS traffic. It is possible that the flaw may allow anonymous relaying of the https protocol giving attackers the ability to launch anonymous or spoofed attacks resulting in a loss of integrity.

- 时间线

2004-04-08 Unknow
2004-04-08 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): changing the confuration on the device.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站